United States v. Okello Chatrie ( 2024 )


Menu:
  • USCA4 Appeal: 22-4489         Doc: 63          Filed: 07/09/2024    Pg: 1 of 103
    Rehearing en banc granted, November 1, 2024
    PUBLISHED
    UNITED STATES COURT OF APPEALS
    FOR THE FOURTH CIRCUIT
    No. 22-4489
    UNITED STATES OF AMERICA,
    Plaintiff – Appellee,
    v.
    OKELLO T. CHATRIE,
    Defendant – Appellant.
    --------------------------------
    THE REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS;
    AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES
    UNION OF VIRGINIA; EIGHT FEDERAL PUBLIC DEFENDER OFFICES
    WITHIN THE FOURTH CIRCUIT; TECHNOLOGY LAW AND POLICY
    CLINIC AT NEW YORK UNIVERSITY SCHOOL OF LAW; ELECTRONIC
    FRONTIER FOUNDATION,
    Amici Supporting Appellant.
    Appeal from the United States District Court for the Eastern District of Virginia, at
    Richmond. M. Hannah Lauck, District Judge. (3:19-cr-00130-MHL-1)
    Argued: December 8, 2023                                                  Decided: July 9, 2024
    Before WILKINSON, WYNN, and RICHARDSON, Circuit Judges.
    Affirmed by published opinion. Judge Richardson wrote the opinion, in which Judge
    Wilkinson joined. Judge Wynn wrote a dissenting opinion.
    USCA4 Appeal: 22-4489     Doc: 63         Filed: 07/09/2024    Pg: 2 of 103
    ARGUED: Michael William Price, NATIONAL ASSOCIATION OF CRIMINAL
    DEFENSE LAWYERS, Washington, D.C., for Appellant. Nathan Paul Judish, UNITED
    STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. ON BRIEF:
    Geremy C. Kamens, Federal Public Defender, Alexandria, Virginia, Laura J. Koenig,
    Assistant Federal Public Defender, OFFICE OF THE FEDERAL PUBLIC DEFENDER,
    Richmond, Virginia, for Appellant. Kenneth A. Polite, Jr., Assistant Attorney General,
    Richard W. Downing, Deputy Assistant Attorney General, Computer Crime and
    Intellectual Property Section, UNITED STATES DEPARTMENT OF JUSTICE,
    Washington, D.C.; Jessica D. Aber, United States Attorney, Kenneth R. Simon, Jr.,
    Assistant United States Attorney, Peter S. Duffey, Assistant United States Attorney,
    OFFICE OF THE UNITED STATES ATTORNEY, Richmond, Virginia, for Appellee.
    Jennifer Lynch, Andrew Crocker, Hannah Zhao, ELECTRONIC FRONTIER
    FOUNDATION, San Francisco, California; Jacob M. Karr, Technology Law and Policy
    Clinic, NEW YORK UNIVERSITY SCHOOL OF LAW, New York, New York, for Amici
    Technology Law and Policy Clinic at New York University School of Law and Electronic
    Frontier Foundation. Jennifer Stisa Granick, San Francisco, California, Nathan Freed
    Wessler, Ashley Gorski, Patrick Toomey, Brandon Buskey, Trisha Trigilio, Laura Moraff,
    AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York, New York; Eden
    B. Heilman, Matthew W. Callahan, AMERICAN CIVIL LIBERTIES UNION
    FOUNDATION OF VIRGINIA, Richmond, Virginia; William F. Nettles, IV, Federal
    Public Defender, Columbia, South Carolina, G. Alan DuBois, Federal Public Defender,
    Raleigh, North Carolina, Louis Allen, Federal Public Defender, Greensboro, North
    Carolina, Juval O. Scott, Federal Public Defender, Roanoke, Virginia, Brian J. Kornbrath,
    Federal Public Defender, Clarksburg, West Virginia, James Wyda, Federal Public
    Defender, Baltimore, Maryland, Wesley P. Page, Federal Public Defender, OFFICE OF
    THE FEDERAL PUBLIC DEFENDER, Charleston, West Virginia; John Baker, Federal
    Public Defender, FEDERAL DEFENDERS OF WESTERN NORTH CAROLINA, INC.,
    Charlotte, North Carolina, for Amici American Civil Liberties Union, American Civil
    Liberties Union of Virginia, and Eight Federal Public Defender Offices Within the Fourth
    Circuit. Bruce D. Brown, Katie Townsend, Gabe Rottman, Grayson Clary, Emily Hockett,
    REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS, Washington, D.C., for
    Amicus Reporters Committee for Freedom of the Press.
    2
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 3 of 103
    RICHARDSON, Circuit Judge:
    Okello Chatrie appeals the district court’s denial of his motion to suppress location
    data obtained using a geofence warrant. He argues that the geofence warrant violated the
    Fourth Amendment because it lacked probable cause and particularity. But we find that
    the government did not conduct a Fourth Amendment search when it obtained two hours’
    worth of Chatrie’s location information, since he voluntarily exposed this information to
    Google. We therefore affirm the district court.
    I.     Background
    This case involves government access to a specialized form of location information
    maintained by Google. Understanding the nature of this information, how it is generated,
    and how Google obtains it is necessary to our disposition. Accordingly, we begin with a
    description of the relevant technology.1
    A.     Google Location History and Geofence Warrants
    Few readers need an introduction to Google, the technology supergiant that offers
    products and services like Android, Chrome, Google Search, Maps, Drive, and Gmail. This
    case, however, is about a particular setting for mobile devices that Google calls “Location
    History.”
    1
    After we held argument for this case, Google announced changes to its Location
    History setting. See Marlo McGriff, Updates to Location History and New Controls
    Coming         Soon       to      Maps,        Google        (Dec.     12,       2023),
    https://blog.google/products/maps/updates-to-location-history-and-new-controls-coming-
    soon-to-maps/ [https://perma.cc/Y62G-GBUW]. In this opinion, we describe Location
    History as the record reflects that it existed when the government obtained Chatrie’s
    information in 2019. We do not opine on how Google’s changes will affect future cases.
    3
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 4 of 103
    Location History is an optional account setting that allows Google to track a user’s
    location while he carries his mobile devices. If a user opts in, Google keeps a digital log
    of his movements and stores this data on its servers. Google describes this setting as
    “primarily for the user’s own use and benefit.” J.A. 131. And enabling it does unlock
    several useful features for a user. For instance, he can view a “virtual journal” of his past
    travels in the “Timeline” feature of the Google Maps app. J.A. 128. He can also obtain
    personalized maps and recommendations, find his phone if he loses it, and receive real-
    time traffic updates. But Google uses and benefits from a user opting in, too—mostly in
    the form of advertising revenue. Google uses Location History to show businesses whether
    people who viewed an advertisement visited their stores. It similarly allows businesses to
    send targeted advertisements to people in their stores’ proximity.
    Location History is turned off by default, so a user must take several affirmative
    steps before Google begins tracking and storing his Location History data. First, he must
    enable location sharing on his mobile device.2 Second, he must opt in to the Location
    History setting on his Google account, either through an internet browser, a Google
    application (such as Google Maps), or his device settings (for Android devices). Before
    he can activate the setting, however, Google always presents him language that explains
    the basics of the service.3 Third, he must enable the “Location Reporting” feature on his
    2
    For iOS devices, he must also grant location permission to applications capable of
    using that information.
    3
    This text is the same no matter how a user opts in to Location History. It explains
    that Location History “[s]aves where you go with your devices,” and that “[t]his data may
    (Continued)
    4
    USCA4 Appeal: 22-4489        Doc: 63        Filed: 07/09/2024    Pg: 5 of 103
    mobile device.4 And fourth, he must sign in to his Google account on that device. Only
    when a user follows these steps will Google begin tracking and storing his Location History
    data. Roughly one-third of active Google users have enabled Location History.
    Even after a user opts in, he maintains some control over his location data. He can
    review, edit, or delete any information that Google has already obtained. So, for instance,
    he could decide he only wants to keep data for certain dates and to delete the rest. Or he
    could decide to delete everything. Google also allows him to pause (i.e., disable) the
    collection of future Location History data.5 Whatever his choice, Google will honor it.
    From start to finish, then, the user controls how much Google tracks and stores his Location
    History data.
    Once a user enables Location History, Google constantly monitors his location
    through GPS, even when he isn’t using his phone.6 And if he has an Android phone, he
    be saved and used in any Google service where you were signed in to give you more
    personalized experiences. You can see your data, delete it and change it in your settings at
    account.google.com.” J.A. 1564. It also presents an expansion arrow, which, if tapped by
    the user, displays more information about Location History. For instance, it explains that
    “Google regularly obtains location data from your devices . . . even when you aren’t using
    a specific Google service.” J.A. 1565.
    4
    Location Reporting allows a user to control which devices in particular will
    generate Location History information. So a user could enable Location History at the
    account level but then disable Location Reporting for a particular device. That device then
    would not generate Location History data.
    5
    Additionally, if a user disables location sharing on his device, that device will
    cease sharing location information with Location History, even if Location History and
    Location Reporting remain enabled.
    6
    On average, Google logs a device’s location every two minutes.
    5
    USCA4 Appeal: 22-4489      Doc: 63        Filed: 07/09/2024     Pg: 6 of 103
    can turn on another setting—“Google Location Accuracy”—that enables Google to
    determine his location using more inputs than just GPS, such as Wi-Fi access points and
    mobile networks. As a result, Location History can be more precise than other location-
    tracking mechanisms, including cell-site location information.      But whether Google
    Location Accuracy is activated or not, Location History’s power should not be
    exaggerated. In the end, it is only an estimate of a device’s location. So when Google
    records a set of location coordinates, it includes a value (measured in meters) called a
    “confidence interval,” which represents Google’s confidence in the accuracy of the
    estimate.7 Google represents that for any given location point, there is a 68% chance that
    a user is somewhere within the confidence interval.
    Google stores all Location History data in a repository called the “Sensorvault.”
    The Sensorvault assigns each device a unique identification number and maintains all
    Location History data associated with that device. Google then uses this data to build
    aggregate models to assist applications like Google Maps.
    In 2016, Google began receiving “geofence warrants” from law enforcement
    seeking to access location information. A geofence warrant requires Google to produce
    Location History data for all users who were within a geographic area (called a geofence)
    during a particular time period.8 Since 2016, geofence requests have skyrocketed in
    7
    For example, if the confidence interval is one hundred meters, then Google
    estimates that a user is likely within a one-hundred-meter radius of the coordinates.
    8
    Geofence warrants seek only Location History data and no other forms of location
    information, so they only affect people who had this feature enabled at the requested time
    and place.
    6
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 7 of 103
    number: Google claims it saw a 1,500% increase in requests from 2017 to 2018 and a
    500% increase from 2018 to 2019. Concerned with the potential threat to user privacy,
    Google consulted internal counsel and law enforcement agencies in 2018 and developed
    its own three-step procedure for responding to geofence requests. Since then, Google has
    objected to any geofence request that disregards this procedure.
    Google’s procedure works as follows: At Step One, law enforcement obtains a
    warrant that compels Google to disclose an anonymous list of users whose Location
    History shows they were within the geofence during a specified timeframe. But Google
    does not keep any lists like this on-hand. So it must first comb through its entire Location
    History repository to identify users who were present in the geofence. Google then gives
    law enforcement a list that includes for each user an anonymized device number, the
    latitude and longitude coordinates and timestamp of each location point, a confidence
    interval, and the source of the stored Location History (such as GPS or Wi-Fi). Before
    disclosing this information, Google reviews the request and objects if Google deems it
    overly broad.
    At Step Two, law enforcement reviews the information it receives from Google. If
    it determines that it needs more, then law enforcement can ask Google to produce
    additional location coordinates. This time, the original geographical and temporal limits
    no longer apply; for any user identified at Step One, law enforcement can request
    information about his movements inside and outside the geofence over a broader period.
    Yet Google generally requires law enforcement to narrow its request for this more
    expansive location data to only a subset of the users pinpointed in Step One.
    7
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 8 of 103
    Finally, at Step Three, law enforcement determines which individuals are relevant
    to the investigation and then compels Google to provide their account-identifying
    information (usually their names and email addresses). Here, too, Google typically
    requires law enforcement to taper its request from the previous step, so law enforcement
    can’t merely request the identity of every user identified in Step Two.
    B.     Facts
    On May 20, 2019, someone robbed the Call Federal Credit Union in Midlothian,
    Virginia. The suspect carried a gun and took $195,000 from the bank’s vault. He then fled
    westward before police could respond.
    The initial investigation into the robbery proved unfruitful. When Detective Joshua
    Hylton arrived at the scene, he interviewed witnesses and reviewed the bank’s security
    footage. But these failed to reveal the suspect’s identity. And after chasing down two
    dead-end leads, Detective Hylton seemed to be out of luck.
    Yet there was one thing Detective Hylton still hadn’t tried. He saw on the security
    footage that the suspect had carried a cell phone during the robbery. In the past, Detective
    Hylton had sought and obtained three separate geofence warrants after consulting
    prosecutors. So on June 14, 2019, he applied for and obtained a geofence warrant from the
    Chesterfield County Circuit Court of Virginia.
    The warrant drew a geofence with a 150-meter radius covering the bank. It then
    laid out the three-step process by which law enforcement would obtain location
    information from Google. At Step One, Google would provide anonymized Location
    History information for all devices that appeared within the geofence from thirty minutes
    8
    USCA4 Appeal: 22-4489      Doc: 63        Filed: 07/09/2024     Pg: 9 of 103
    before to thirty minutes after the bank robbery.      This information would include a
    numerical identifier for each account. At Step Two, law enforcement would “attempt[] to
    narrow down that list” to a smaller number of accounts and provide the narrowed list to
    Google. J.A. 116. Google would then disclose anonymized location data for all those
    devices from one hour before to one hour after the robbery. But unlike the Step One
    information, the Step Two information would be unbounded by the geofence. Finally, at
    Step Three, law enforcement would again attempt to shorten the list, and Google would
    provide the username and other identity information for the requested accounts.
    In response to the warrant, Google first provided 209 location data points from
    nineteen accounts that appeared within the geofence during the hour-long period.
    Detective Hylton then requested Step Two information from nine accounts identified at
    Step One. Google responded by producing 680 data points from these accounts over the
    two-hour period. Finally, Detective Hylton requested the subscriber information for three
    accounts, which Google provided. One of these accounts belonged to Okello Chatrie.9
    C.     Procedural History
    On September 17, 2019, a grand jury in the Eastern District of Virginia indicted
    Chatrie for (1) forced accompaniment during an armed credit union robbery, in violation
    of 
    18 U.S.C. §§ 2113
    (a), (d), and (e); and (2) using, carrying, or brandishing a firearm
    during and in relation to a crime of violence, in violation of § 924(c)(1)(A). Chatrie was
    9
    According to Google’s records, Chatrie created a Google account on August 20,
    2017. He later opted in to Location History from a Samsung smartphone on July 9, 2018.
    9
    USCA4 Appeal: 22-4489       Doc: 63        Filed: 07/09/2024      Pg: 10 of 103
    arraigned on October 1, 2019, and pleaded not guilty. He then moved to suppress the
    evidence obtained using the geofence warrant.
    On March 3, 2022, the district court denied Chatrie’s motion to suppress. Although
    the court voiced concern about the threat geofence warrants pose to user privacy, it declined
    to resolve whether the geofence evidence was obtained in violation of the Fourth
    Amendment. Rather, the court denied the motion to suppress based on the good-faith
    exception to the exclusionary rule. See United States v. Leon, 468 U.S 897 (1984).
    Chatrie subsequently entered a conditional guilty plea and was sentenced to 141
    months’ imprisonment and 3 years’ supervised release. This timely appeal followed.
    II.    Discussion
    On appeal, Chatrie asks us to hold that the geofence warrant violated his Fourth
    Amendment rights and that the fruits of the warrant should be suppressed. He argues that
    the government conducted a Fourth Amendment search because it invaded his reasonable
    expectation of privacy in his location information. He further claims that the geofence
    warrant authorizing the search was invalid for lack of probable cause and particularly.
    Finally, he asserts that the good-faith exception to the exclusionary rule does not apply to
    this warrant.
    The district court denied Chatrie’s motion to suppress based on the good-faith
    exception. We agree that the motion should be denied, but for a different reason: Chatrie
    did not have a reasonable expectation of privacy in two hours’ worth of Location History
    data voluntarily exposed to Google. So the government did not conduct a search when it
    obtained this information from Google. We therefore affirm the district court’s decision.
    10
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 11 of 103
    See United States v. Smith, 
    395 F.3d 516
    , 519 (4th Cir. 2005) (holding that we may affirm
    a district court “on any grounds apparent from the record”).
    A.     Carpenter, Beautiful Struggle, and the Third-Party Doctrine
    The Fourth Amendment protects “[t]he right of the people to be secure in their
    persons, houses, papers, and effects, against unreasonable searches and seizures.” U.S.
    Const. amend. IV. To trigger its protections, the government must conduct a “search” (or
    “seizure”) covered by the Fourth Amendment.            “For much of our history, Fourth
    Amendment search doctrine was ‘tied to common-law trespass’ and focused on whether
    the government ‘obtains information by physically intruding on a constitutionally protected
    area.’” Carpenter v. United States, 
    585 U.S. 296
    , 304 (2018) (quoting United States v.
    Jones, 
    565 U.S. 400
    , 405, 406 n.3 (2012)). This trespass-based approach remains alive and
    well to this day. See, e.g., Jones, 565 U.S. at 405–08.
    But as American society changed and technology developed, so too did the
    government’s ability to intrude on sensitive areas. Carpenter, 585 U.S. at 305. So the
    Supreme Court birthed a new privacy-based framework in Katz v. United States, 
    389 U.S. 347
     (1967). Under Katz, a search occurs when the government invades an individual’s
    reasonable expectation of privacy. 
    Id. at 351
    ; 
    id. at 360
     (Harlan, J., concurring); see also
    Smith v. Maryland, 
    442 U.S. 735
    , 740 (1979). This privacy-based approach augments the
    prior trespass-based approach by providing another way to identify a Fourth Amendment
    search. See Jones, 565 U.S. at 405–08; Carpenter, 585 U.S. at 304.
    Though sweeping, Katz’s reasonable-expectation framework is not boundless. One
    important limit on its scope is the “third-party doctrine.” The Supreme Court has long
    11
    USCA4 Appeal: 22-4489        Doc: 63        Filed: 07/09/2024     Pg: 12 of 103
    recognized that “a person has no legitimate expectation of privacy in information he
    voluntarily turns over to third parties.” Smith, 442 U.S. at 743–44. This is because he
    “takes the risk, in revealing his affairs to another, that the information will be conveyed by
    that person to the Government.” United States v. Miller, 
    425 U.S. 435
    , 443 (1976). And
    it holds true “even if the information is revealed on the assumption that it will be used only
    for a limited purpose and the confidence placed in the third party will not be betrayed.” 
    Id.
    Thus, in United States v. Miller, the Court held that the government did not conduct a
    search when it obtained an individual’s bank records from his bank, since he voluntarily
    exposed those records to the bank in the ordinary course of business. 
    Id.
     in 443. Likewise,
    in Smith v. Maryland, the Court held that the government did not conduct a search when it
    used a pen register to record outgoing phone numbers dialed from a person’s telephone,
    because he voluntarily conveyed those numbers to his phone company when placing calls.
    
    442 U.S. at 742
    .10
    Despite its clear mandate, the third-party doctrine has proved difficult to implement
    in the digital age. After all, “people reveal a great deal of information about themselves to
    third parties in the course of carrying out mundane tasks.” Jones, 
    565 U.S. at 417
    (Sotomayor, J., concurring).      If they lack Fourth Amendment protections for any
    10
    Of course, Miller and Smith were not the only cases to invoke this principle. The
    Court has applied the third-party doctrine to other kinds of information, too, including
    incriminating conversations with undercover agents, United States v. White, 
    401 U.S. 745
    ,
    749–52 (1971), and tax documents given to an accountant, Couch v. United States, 
    409 U.S. 322
    , 335 (1973).
    12
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 13 of 103
    electronically shared data, then the government could access whole swaths of private
    information free from constitutional scrutiny.
    The Court addressed this tension in a series of cases involving the government’s use
    of location-tracking technology. First, in United States v. Knotts, the Court held that the
    government did not conduct a search when it placed a tracking device in a container
    purchased by one of Knotts’s co-conspirators and used it to monitor his short trip to Knott’s
    cabin. 
    460 U.S. 276
    , 278–80 (1983). The Court explained that “[a] person traveling in an
    automobile on public thoroughfares has no reasonable expectation of privacy in his
    movements from one place to another,” since he “voluntarily convey[s] [them] to anyone
    who want[s] to look.” 
    Id. at 281
    . The use of the tracker merely “augment[ed]” existing
    police capabilities and “amounted principally to the following of an automobile on public
    streets and highways.” 
    Id.
     at 281–82. Yet the Court reserved whether it would treat long-
    term surveillance differently. 
    Id.
     at 283–84.11
    11
    Separately, the Court held that police did not conduct a search when they observed
    the beeper on the premises of Knotts’s cabin. Knotts, 460 U.S. at 284–85. “[T]here is no
    indication,” the Court explained, “that the beeper was used in any way to reveal
    information as to the movement of the drum within the cabin, or in any way that would not
    have been visible to the naked eye from outside the cabin.” 
    Id. at 285
    . So the government
    did not invade Knott’s reasonable expectation of privacy in his home when it observed the
    beeper on his property.
    Yet the Court reached the opposite result one year later in United States v. Karo,
    
    468 U.S. 705
     (1984). Karo, like Knotts, involved police use of a beeper to monitor the
    movement of a container; only this time, officers used it to determine whether the container
    remained inside a home rented by several of the defendants. 
    Id.
     at 709–10. The Court held
    that this use of the beeper “violate[d] the Fourth Amendment rights of those who ha[d] a
    justifiable interest in the privacy of the residence.” 
    Id. at 714
    . The beeper allowed the
    government to obtain information that it otherwise could not have obtained—that the item
    was still inside the house—without entering the home itself, which would have required a
    (Continued)
    13
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 14 of 103
    This issue later resurfaced in United States v. Jones, 
    565 U.S. 400
    . There, the
    government attached a GPS device to Jones’s automobile and used it to track his
    movements for twenty-eight days. 
    Id.
     at 402–04. Applying the original property-based
    approach, the Court decided that the government’s physical trespass on Jones’s vehicle
    amounted to a search. 
    Id.
     at 404–05. But in separate opinions, five Justices would have
    held that “longer term GPS monitoring in investigations of most offenses impinges on
    expectations of privacy”—even though a person’s movements are seemingly shared with
    third parties. 
    Id. at 430
     (Alito, J., concurring in the judgment); 
    id. at 415
     (opinion of
    Sotomayor, J.). Such long-term monitoring violates reasonable expectations of privacy
    because “society’s expectation has been that law enforcement agents and others would
    not—and indeed, in the main, simply could not—secretly monitor and catalogue every
    single movement of an individual’s car for a very long period.” 
    Id. at 430
     (opinion of Alito,
    J.).
    After Jones, it was unclear how the Court would decide a case involving long-term
    monitoring without a physical trespass. The Court eventually considered this issue in
    Carpenter v. United States, 
    585 U.S. 296
    . Carpenter involved government access to
    warrant. 
    Id. at 715
    . It therefore intruded on the reasonable expectation of privacy of all
    who had a Fourth Amendment interest in that home. 
    Id. at 719
     (ruling that the evidence
    was inadmissible against “those with privacy interests in the house”); see also Kyllo v.
    United States, 
    533 U.S. 27
    , 40 (2001) (“Where, as here, the Government uses a device that
    is not in general public use, to explore details of the home that would previously have been
    unknowable without physical intrusion, the surveillance is a ‘search’ and is presumptively
    unreasonable without a warrant.”); but see Karo, 
    468 U.S. at
    716 n.4 (distinguishing
    Rawlings v. Kentucky, 
    448 U.S. 98
     (1980), since the defendant in that case did not have a
    reasonable expectation of privacy in the place searched).
    14
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 15 of 103
    historical cell-site location information (“CSLI”)—a time-stamped record that is
    automatically generated every time any cell phone connects to a cell site. 
    Id.
     at 300–01.
    The government requested—without a warrant—7 days’ worth of Carpenter’s historical
    CSLI from one wireless carrier and 152 days’ worth from another. Id. at 302.12 It then
    used this information to tie him to the scene of several robberies. Id. Carpenter moved to
    suppress the evidence, arguing that the government had conducted a search without a
    warrant. Id.
    The Court began by noting that government access to CSLI “does not fit neatly
    under existing precedents” but “lie[s] at the intersection of two lines of cases, both of which
    inform our understanding of the privacy interests at stake.” Id. at 306. Starting with the
    location-tracking cases, the Court found that CSLI “partakes of many of the qualities”—
    and in some ways, exceeds them—“of the GPS monitoring we considered in Jones.” Id.
    at 309–13. The unprecedented surveillance capabilities afforded by CSLI, retrospective
    over days, reveal—directly and by deduction—a broad array of private information. Id. at
    310–12.     The Court thus explained that CSLI provides law enforcement “an all-
    encompassing record of the holder’s whereabouts” over that period, id. at 311, allowing it
    to peer into a person’s “privacies of life,” including “familial, political, professional,
    religious, and sexual associations.” Id. (first quoting Riley v. California, 
    573 U.S. 373
    , 403
    (2014); and then quoting Jones, 
    565 U.S. at 415
     (opinion of Sotomayor, J.)). Such access—
    12
    Although the government requested 7 days’ worth of CSLI from one wireless
    carrier and 152 days’ worth from the other, it received only 2 days’ worth from the former
    and 127 days’ worth from the latter. Carpenter, 585 U.S. at 302.
    15
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 16 of 103
    at least, to 7 days’ worth of CSLI—invades the reasonable expectation of privacy
    individuals have “in the whole of their physical movements.” Id. at 310 & n.3.
    That Carpenter “shared” his CSLI with his wireless carriers didn’t change the
    Court’s conclusion. Id. at 314. Rejecting the government’s invocation of the third-party
    doctrine, the Court found that the rationales that historically supported the doctrine did not
    apply to CSLI. Id. It first considered “‘the nature of the particular documents sought’ to
    determine whether ‘there is a legitimate “expectation of privacy” concerning their
    contents.’” Id. (quoting Miller, 
    425 U.S. at 442
    ). And it found that, unlike the bank records
    in Miller or the pen register in Smith, CSLI is extremely revealing of a person’s private
    life. 
    Id.
     at 314–15 (noting that CSLI is a “detailed chronicle of a person’s physical presence
    compiled every day, every moment, over several years”). The government’s access of this
    information therefore “implicates privacy concerns far beyond those considered in Smith
    and Miller.” Id. at 315.
    The Court then found that Carpenter did not voluntarily expose this “comprehensive
    dossier of his physical movements” to his wireless carriers. Id. Rather, “a cell phone logs
    a cell-site record by dint of its operation, without any affirmative act on the part of the user
    beyond powering up.” Id. Put differently, having and operating a cell phone automatically
    and necessarily requires the transmission of one’s CSLI to the wireless carrier. And cell
    phones “are ‘such a pervasive and insistent part of daily life,’” the Court explained, “that
    carrying one is indispensable to participation in modern society.” Id. (quoting Riley, 573
    U.S. at 385). So “in no meaningful sense does the user voluntarily ‘assume[] the risk’ of
    turning over” this information. Id. (second alteration in original) (quoting Smith, 
    442 U.S. 16
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 17 of 103
    at 745). The Court thus declined to extend the third-party doctrine to overcome Carpenter’s
    Fourth Amendment protection. 
    Id.
    The Court emphasized that its holding was “a narrow one.” 
    Id. at 316
    . It did not
    decide how the Fourth Amendment applies to other forms of data collection, like real-time
    (as opposed to historical) CSLI or “tower dumps” (i.e., records of phones connected to a
    particular cell tower over a given period). 
    Id.
     Nor did it jettison the third-party doctrine’s
    application in other contexts. 
    Id.
     All it held was that the government’s acquisition of at
    least 7 days’ worth of historical CSLI is a search within the meaning of the Fourth
    Amendment. 
    Id. at 316
    , 310 n.3.13
    Three years later, we clarified the scope of Carpenter’s holding in Leaders of a
    Beautiful Struggle v. Balt. Police Dep’t, 
    2 F.4th 330
     (4th Cir. 2021) (en banc). Beautiful
    Struggle involved a Fourth Amendment challenge to the City of Baltimore’s aerial-
    surveillance program. 
    Id. at 333
    . The program captured aerial photos of thirty-two square
    city miles every second for “at least 40 hours a week, obtaining an estimated twelve hours
    of coverage of around 90% of the city each day.” 
    Id. at 334
    . We interpreted Carpenter to
    “solidif[y] the line between short-term tracking of public movements—akin to what law
    enforcement could do ‘[p]rior to the digital age’—and prolonged tracking that can reveal
    intimate details through habits and patterns.” 
    Id. at 341
     (second alteration in original)
    13
    The dissent reads Carpenter to hold that access to just 2 days’ worth of CSLI is a
    search. Diss. Op. at 65. But even though one of the wireless carriers produced only 2 days’
    worth of CSLI in response to the government’s request for 7 days’ worth, Carpenter only
    held that “accessing seven days of CSLI constitutes a Fourth Amendment search.”
    Carpenter, 585 U.S. at 310 n.3 (emphasis added).
    17
    USCA4 Appeal: 22-4489        Doc: 63         Filed: 07/09/2024     Pg: 18 of 103
    (quoting Carpenter, 585 U.S. at 310). And we held that Baltimore’s program crossed that
    line because it afforded the government retroactive access to a “detailed, encyclopedic”
    record of every person’s movement in the city across days and weeks. Id. (quoting
    Carpenter, 585 U.S. at 309). The sheer breadth of this information “enable[d] deductions
    about ‘what a person does repeatedly, what he does not do, and what he does ensemble,’
    which ‘reveal[s] more about a person than does any individual trip viewed in isolation.’”
    Id. at 342 (second alteration in original) (quoting United States v. Maynard, 
    615 F.3d 544
    ,
    562–63 (D.C. Cir. 2010)). So we held that, when it accessed this information, the
    government intruded on reasonable expectations of privacy and thereby conducted a
    search. Id. at 346.14
    B.       Application
    Relying on Carpenter, Chatrie argues that the government conducted a search when
    it obtained his Location History data from Google.15 We disagree. Carpenter identified
    two rationales that justify applying the third-party doctrine: the limited degree to which
    the information sought implicates privacy concerns and the voluntary exposure of that
    information to third parties. Both rationales apply here. Accordingly, we find that Chatrie
    14
    The government did not invoke the third-party doctrine in Beautiful Struggle.
    15
    Chatrie does not argue that the government conducted a search when it obtained
    his subscriber information from Google at Step Three of the geofence warrant process.
    This is probably because we have already held that individuals do not have a reasonable
    expectation of privacy in subscriber information they provide to an internet provider. See
    United States v. Bynum, 
    604 F.3d 161
    , 164 (4th Cir. 2010). Chatrie does not ask us to
    revisit this holding in light of Carpenter, so here we consider only whether the
    government’s access of his Location History data was a search.
    18
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 19 of 103
    did not have a reasonable expectation of privacy in the two hours’ worth of Location
    History data that law enforcement obtained from Google. So the government did not
    conduct a search by obtaining it.
    Start with the nature of the information sought. Carpenter, 585 U.S. at 314. The
    government requested and obtained only two hours’ worth of Chatrie’s Location History
    data.16 By no means was this an “all-encompassing record of [Chatrie’s] whereabouts . . .
    provid[ing] an intimate window into [his] person[al] life.” Carpenter, 585 U.S. at 311. All
    the government had was an “individual trip viewed in isolation,” which, standing alone,
    was not enough to “enable[] deductions about ‘what [Chatrie] does repeatedly, what he
    does not do, and what he does ensemble.’”17 Beautiful Struggle, 2 F.4th at 342 (quoting
    Maynard, 615 F.3d at 562–63). The information obtained was therefore far less revealing
    16
    At argument, Chatrie suggested that the search occurred when Google looked
    through its entire Location History database at the government’s behest. But Carpenter
    and Beautiful Struggle both held that a search only occurs once the government accesses
    the requested information. See Beautiful Struggle, 4 F.4th at 344 (“Carpenter was clear on
    that issue: a search took place ‘when the Government accessed CSLI from the wireless
    carriers.’” (quoting Carpenter, 585 U.S. at 313)). So the proper focus of our inquiry is
    whether the government’s access to two hours’ worth of Chatrie’s Location History data
    was a search.
    17
    Chatrie raises the possibility that a geofence warrant could reveal a person’s
    movements within a constitutionally protected space, like his home. See Karo, 468 U.S.
    at 716–17; Kyllo, 
    533 U.S. at 40
    . The district court expressed similar concerns and noted
    that the instant geofence warrant included potentially sensitive locations within its radius.
    But this is an issue for future cases, not the one before us. Chatrie does not contend that
    the warrant revealed his own movements within his own constitutionally protected space.
    And to the extent that it might have captured his or others’ movements in another person’s
    protected space, Chatrie lacks standing to assert their potential Fourth Amendment claims.
    See Rakas v. Illinois, 
    439 U.S. 128
    , 133–34 (1978); Brown v. United States, 
    411 U.S. 223
    ,
    230 (1973).
    19
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 20 of 103
    than that obtained in Jones, Carpenter, or Beautiful Struggle and more like the short-term
    public movements in Knotts, which the Court found were “voluntarily conveyed to anyone
    who wanted to look.” Carpenter, 585 U.S. at 314 (quoting Knotts, 460 U.S. at 281).18 A
    record of a person’s single, brief trip is no more revealing than his bank records or
    telephone call logs. See Miller, 
    425 U.S. at 442
    ; Smith, 
    442 U.S. at 742
    . Chatrie thus did
    not have a “legitimate ‘expectation of privacy,’” in the information obtained by the
    government, so the first rationale for the third-party doctrine applies here. Carpenter, 585
    U.S. at 314 (quoting Miller, 
    425 U.S. at 442
    ).
    Furthermore, Chatrie voluntarily exposed his location information to Google by
    opting in to Location History. Id. at 315. Consider again how Location History works.
    Location History is an optional setting that adds extra features, like traffic updates and
    targeted advertisements, to a user’s experience. But it is “off by default” and must be
    affirmatively activated by a user before Google begins tracking and storing his location
    data. J.A. 1333–34. Of course, once Google secures this consent, it monitors his location
    at all times and across all devices. Yet even then, Google still affords the user ultimate
    control over how his data is used: If he changes his mind, he can review, edit, or delete the
    collected information and stop Google from collecting more. Whether Google tracks a
    18
    Chatrie argues that the amount of information obtained shouldn’t matter, given
    the accuracy with which Location History can estimate a user’s location. Yet the question
    is not whether the government knew with exact precision what Chatrie did on an
    “individual trip viewed in isolation,” Beautiful Struggle, 2 F.4th at 342 (quoting Maynard,
    
    615 F.3d at 562
    ), but whether it gathered enough information from many trips to “reveal
    intimate details through habits and patterns,” id. at 341. That was not the case here.
    20
    USCA4 Appeal: 22-4489         Doc: 63         Filed: 07/09/2024     Pg: 21 of 103
    user’s location, therefore, is entirely up to the user himself. If Google compiles a record
    of his whereabouts, it is only because he has authorized Google to do so.
    Nor is a user’s consent secured in ignorance, either. See Carpenter, 585 U.S. at 314
    (explaining that the third-party doctrine applies to information “knowingly shared with
    another”). To the contrary, the record shows that Google provides users with ample notice
    about the nature of this setting. Before Google allows a user to enable Location History, it
    first displays text that explains the basics of the service. The text states that enabling
    Location History “[s]aves where you go with your devices,” meaning “[t]his data may be
    saved and used in any Google service where you were signed in to give you more
    personalized experiences.” It also informs a user about his ability to view, delete, or change
    his location data.19 A user cannot opt in to Location History without seeing this text.
    So unlike with CSLI, a user knowingly and voluntarily exposes his Location History
    data to Google. First, Location History is not “‘such a pervasive and insistent part of daily
    life’ that [activating it] is indispensable to participation in modern society.” Carpenter,
    585 U.S. at 315 (quoting Riley, 573 U.S. at 385). Carpenter found that it is impossible to
    participate in modern life without a cell phone. Id. But the same cannot be said of Location
    History. While Location History offers a few useful features to a user’s experience, its
    activation is unnecessary to use a phone or even to use apps like Google Maps. Chatrie
    gives us no reason to think that these added features are somehow indispensable to
    participation in modern society and that his decision to opt in was therefore involuntary.
    19
    Google provides additional notice of this setting in its Privacy Policy.
    21
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024     Pg: 22 of 103
    That two-thirds of active Google users have not enabled Location History is strong
    evidence to the contrary. Cf. Riley, 573 U.S. at 385 (noting that, as of 2014, “a significant
    majority of American adults” owned smartphones). Thus, a user can decline to use
    Location History and still participate meaningfully in modern society.
    Second, unlike CSLI, Location History data is obtained by a user’s affirmative act.
    Carpenter noted that “a cell phone logs a cell-site record by dint of its operation, without
    any affirmative act on the part of the user beyond powering up.” 585 U.S. at 315. But
    Location History is off by default and can be enabled only by a user’s affirmative act. A
    person need not go off the grid by “disconnecting [his] phone from the network . . . to
    avoid” generating Location History data; instead, he can simply decline to opt in and
    continue using his phone as before. See id. Thus, “in [every] meaningful sense,” a user
    who enables Location History “voluntarily ‘assume[s] the risk’” of turning over his
    location information. Id. (quoting Smith, 
    442 U.S. at 745
    ). So the second rationale for the
    third-party doctrine applies here, too.
    The third-party doctrine therefore squarely governs this case. The government
    obtained only two hours’ worth of Chatrie’s location information, which could not reveal
    the privacies of his life. And Chatrie opted in to Location History on July 9, 2018. This
    means that he knowingly and voluntarily chose to allow Google to collect and store his
    location information. In so doing, he “t[ook] the risk, in revealing his affairs to [Google],
    that the information [would] be conveyed by [Google] to the Government.” Miller, 
    425 U.S. at 443
    . He cannot now claim to have had a reasonable expectation of privacy in this
    22
    USCA4 Appeal: 22-4489       Doc: 63           Filed: 07/09/2024      Pg: 23 of 103
    information. See Smith, 442 U.S. at 743–44. The government therefore did not conduct a
    search when it obtained the data.20
    C.      Responding to the Dissent
    In our view, this case involves a straightforward application of the third-party
    doctrine. But the dissent disagrees. Unlike us, the dissent reads Carpenter to have
    abandoned both strands of doctrine that preceded it, at least when the government uses new
    technology to monitor a person’s movements. In their place, the dissent explains, the Court
    20
    At argument, Chatrie’s counsel argued that this was a search because Chatrie has
    a property interest in his Location History data. Oral Arg. at 0:30–0:45. But Chatrie
    forfeited his right to raise this issue on appeal. “It is a well settled rule that contentions not
    raised in the argument section of the opening brief are abandoned.” United States v. Boyd,
    
    55 F.4th 272
    , 279 (4th Cir. 2022) (quoting United States v. Al-Hamdi, 
    356 F.3d 564
    , 571
    n.8 (4th Cir. 2004) (emphasis added)); see also Fed. R. App. P. 28(a)(8). Chatrie did not
    advance this claim in the argument section of his opening brief. Instead, he merely alluded
    to it in a two-sentence footnote that appeared in the facts section. See Opening Br. at 14–
    15 n.3. Not until his reply brief did Chatrie raise this issue. So Chatrie has forfeited it on
    appeal.
    Even if we found that Chatrie did not forfeit this issue, we would still reject it on
    the merits. Chatrie does not cite any positive law (state or federal) that gives him an
    ownership interest in his Location History data. See Carpenter, 585 U.S. at 331 (Kennedy,
    J., dissenting); id. at 353–54 (Thomas, J., dissenting); id. at 402 (Gorsuch, J., dissenting).
    Nor does he claim that he could bring a tort suit if this information were stolen. See id. at
    353 (Thomas, J., dissenting). Instead, he relies largely on the fact that Google describes
    Location History as “your information,” J.A. 39 (emphasis added), and as a user’s “virtual
    journal,” J.A. 128. But this is an incredibly thin reed on which to hang such a bold
    pronouncement. Though we issue no opinion on whether Google can create a property
    interest merely by saying one exists, Google at least knows how to recognize preexisting
    property rights when it wants to. At the time Chatrie opted in to Location History, Google
    explicitly labelled digital cloud content as user property. See J.A. 2083 (“You retain
    ownership of any intellectual property rights that you hold in that content. In short, what
    belongs to you stays yours.”). But Google used no such language to describe its location
    services. See J.A. 2051 (describing location information as content Google “collect[s]”
    and omitting mention of property rights); J.A. 1339–40 (omitting mention of property
    rights at the initial opt-in). We therefore cannot hold, based on the record before us, that
    Chatrie had a property interest in his Location History data.
    23
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 24 of 103
    concocted anew a four (or five?) factor balancing test that considers whether police
    obtained information that was comprehensive, retrospective, intimate, easy to access, and
    (perhaps?) voluntarily exposed. Diss. Op. at 49–51. The dissent then puts a pot on the
    fire, combines these ingredients, and voila!—finds that the police conducted a search here.
    For all its bold pronouncements, the dissent’s novel framework only works if you
    interpret Carpenter to have jettisoned both lines of cases that preceded it and created a new
    inquiry from scratch. Indeed, this thesis seems to undergird the dissent’s entire argument,
    as it repeats it over and over.21 Contrary to the dissent’s claims, however, Carpenter did
    not cast away the decisions that preceded it. Rather, the Court explicitly stated that both
    the Knotts-Jones and the Smith-Miller lines of cases “inform our understanding of the
    privacy interests at stake.” 585 U.S. at 306. It then went on to apply the principles
    announced in the location-tracking cases, id. at 310, and to distinguish—based on the
    unique features of CSLI—the third-party cases, id. at 313–16.
    21
    See, e.g., Diss. Op. at 47 (“Both lines of cases would seemingly ‘inform our
    understanding of the privacy interests at stake,’ . . . but neither squarely applies because
    this kind of data constitutes a ‘qualitatively different category’ of information . . . .” (first
    quoting Carpenter, 585 U.S. at 306; then quoting id. at 309)); id. at 48 (“After concluding
    that no existing Fourth Amendment doctrine applied neatly to such a digital innovation,
    the Carpenter Court applied a new framework based on the historical understandings of
    privacy protections that it had described and concluded that the CSLI obtained ‘was the
    product of a search’ that required a warrant.” (quoting Carpenter, 585 U.S. at 310)); id. at
    51 (“Put simply, the Court declined to extend existing doctrines to exempt CSLI from
    Fourth Amendment protections based on the principle that it first recognized decades
    earlier: previously unimaginable technology that reveals unprecedented amounts of
    personal information requires new rules.”); id. at 52 (“To sum up, the Court concluded that
    ‘personal location information maintained by a third party’ lies at the intersection of the
    public-surveillance and third-party cases, but that neither theory ‘neatly’ applies.” (quoting
    Carpenter, 585 U.S. at 306)).
    24
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024       Pg: 25 of 103
    Start with Carpenter’s treatment of Jones. Carpenter explained that CLSI “partakes
    of many of the same qualities of the GPS monitoring that we considered in Jones,” since it
    is “detailed, encyclopedic, and effortlessly compiled.” Id. at 309. Therefore, the Court
    held that, as in Jones, the government’s access to large quantities of this information
    implicates the reasonable expectation of privacy individuals have in the “whole of their
    physical movements.” Id. at 310.
    Seen in this light, the “factors” identified by the dissent here were not factors at all.
    They were instead attributes of the large quantity of CSLI obtained by the government that
    implicated the privacy interest recognized by the concurring Justices in Jones. The Court
    found that access to at least 7 days’ worth of Carpenter’s CSLI provided a “comprehensive
    record” of his movements, which revealed intimate details of his life that would not have
    been knowable if the government only pursued him for a “brief stretch.” Carpenter, 585
    U.S. at 310–11. And the retrospective nature of CSLI and the ease by which it could be
    accessed only augmented these privacy concerns, for no comparable record of a person’s
    movements was available to law enforcement in a pre-digital age. Id. at 311–12. In sum,
    the quantity of CSLI obtained by the government, combined with its immense capabilities,
    made it akin to the long-term GPS information obtained in Jones. So the Court applied
    established principles and found that Carpenter’s CSLI warranted Fourth Amendment
    protection.
    But you don’t have to take our word for it. Rather look to our en banc opinion in
    Beautiful Struggle. 
    2 F.4th 330
    . Beautiful Struggle was our first application of Carpenter
    to novel location-tracking technology. Yet nowhere in that opinion did we suggest that
    25
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 26 of 103
    Carpenter departed from cases like Knotts and Jones and created a new, factor-based
    inquiry. On the contrary, we recognized that “[t]he touchstone in Carpenter was the line
    of cases addressing ‘a person’s expectation of privacy in [their] physical location and
    movements,’” i.e., Knotts and Jones. 2 F.4th at 340 (alteration in original) (quoting
    Carpenter, 585 U.S. at 306–07)). We then explained that
    Carpenter solidified the line between short-term tracking of public
    movements—akin to what law enforcement could do ‘[p]rior to the digital
    age’—and prolonged tracking that can reveal intimate details through habits
    and patterns. . . . The latter form of surveillance invades the reasonable
    expectation of privacy that individuals have in the whole of their movements
    and therefore requires a warrant.
    Id. at 341 (alteration in original). Far from recognizing any sort of factor-based inquiry,
    therefore, Beautiful Struggle announced the exact line we draw here—that police invade
    an individual’s reasonable expectation of privacy in the whole of his physical movements
    when they use technology to monitor his long-term movements, but not when they glimpse
    only his short-term movements. See also id. at 345 (“People understand that they may be
    filmed by security cameras on city streets, or a police officer could stake out their house
    and tail them for a time. . . . But capturing everyone’s movements outside during the
    daytime for 45 days goes beyond that ordinary capacity.”).
    Although not couched under this label, Beautiful Struggle articulated a version of
    what one scholar calls the “Mosaic Theory” of the Fourth Amendment. See Orin S. Kerr,
    The Mosaic Theory of the Fourth Amendment, 
    111 Mich. L. Rev. 311
     (2012). The Mosaic
    Theory asks whether the government has observed enough of a person’s physical
    movements to deduce intimate details about his private life that could not be learned from
    26
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 27 of 103
    simply observing his isolated trips or activities. Under this theory, access to a person’s
    short-term movements does not invade his reasonable expectation of privacy. Such
    information reveals only the locations he visits and nothing more, which is something that
    law enforcement could learn from traditional means of surveillance anyway. Beautiful
    Struggle, 2 F.4th at 341; Jones, 
    565 U.S. at 429
     (opinion of Alito, J.). But much more is
    revealed when the government accesses a larger swath of a person’s movements, as this
    “enables deductions about ‘what a person does repeatedly, what he does not do, and what
    he does ensemble,’ which ‘reveal[s] more about a person than does any individual trip
    viewed in isolation.’” Beautiful Struggle, 2 F.4th at 342 (alteration in original) (quoting
    Maynard, 615 F.3d at 562–63)). In other words, it exposes “not only his particular
    movements, but through them his ‘familial, political, professional, religious, and sexual
    associations.’” Carpenter, 585 U.S. at 311 (quoting Jones, 
    565 U.S. at 415
     (opinion of
    Sotomayor, J.)). Society does not expect that law enforcement would or could gather such
    a wealth of intimate details about an individual’s personal life from his physical
    movements. Jones, 
    565 U.S. at 430
     (opinion of Alito, J.). So when the government crosses
    that line, it invades a person’s reasonable expectation of privacy and conducts a search.22
    22
    The classic explanation of the Mosaic Theory comes from the D.C. Circuit’s
    decision in United States v. Maynard, which we quoted extensively when explaining this
    idea in Beautiful Struggle:
    The difference is not one of degree but of kind, for no single journey reveals
    the habits and patterns that mark the distinction between a day in the life and
    a way of life, nor the departure from a routine that, like the dog that did not
    bark in the Sherlock Holmes story, may reveal even more. . . . Repeated visits
    to a church, a gym, a bar, or a bookie tell a story not told by any single visit,
    (Continued)
    27
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 28 of 103
    The dissent misses Beautiful Struggle’s distinction when it catalogues the kind of
    private details that could be learned from two hours’ worth of Location History. According
    to the dissent, a two-hour snippet of Location History could reveal a wealth of otherwise
    unknowable and intimate information, like a person’s “romantic rendezvous,” “medical
    appointments,” or “afternoon and early-evening routines.” Diss. Op. at 63. But the theory
    adopted in Beautiful Struggle rejects this exact proposition. To be sure, a two-hour snippet
    might show that someone visited an apartment, swung by a doctor’s office, and then
    popped into a gym. Yet glimpsing this single trip in isolation could not itself enable sound
    deductions about that person’s habits, routines, and associations. For example, he may
    have visited the apartment because he is having an affair, but he equally could have been
    seeing a friend for coffee, touring a housing upgrade, or buying a couch off of Facebook
    marketplace. Similarly, he might have visited the doctor’s office for his appointment, yet
    he also could have been dropping off his spouse or collecting information about the
    doctor’s services or needs. And observing someone enter a gym once certainly cannot
    confirm whether he is a gym rat or simply riding a New Years high. Only by observing
    as does one’s not visiting any of these places over the course of a month. The
    sequence of a person’s movements can reveal still more; a single trip to a
    gynecologist’s office tells little about a woman, but that trip followed a few
    weeks later by a visit to a baby supply store tells a different story. A person
    who knows all of another’s travels can deduce whether he is a weekly church
    goer, a heavy drinker, a regular at the gym, an unfaithful husband, an
    outpatient receiving medical treatment, an associate of particular individuals
    or political groups—and not just one such fact about a person, but all such
    facts.
    Maynard, 
    615 F.3d at 562
    ; see Beautiful Struggle, 2 F.4th at 342 n.8.
    28
    USCA4 Appeal: 22-4489       Doc: 63        Filed: 07/09/2024      Pg: 29 of 103
    that person’s movements over a longer period could the police reliably deduce his habits,
    routines, and associations. No such deductions could accurately be made from a mere two-
    hour glimpse.23
    Applying this theory here leads to a straightforward conclusion. As the dissent
    correctly observes, Location History has capabilities much like GPS data and CSLI. But
    unlike in Carpenter or Jones, the government in this case obtained only two hours’ worth
    of Chatrie’s Location History data. Although this brief glimpse into his whereabouts may
    have revealed the locations he visited, it was plainly insufficient to offer insight into his
    habits, routines, and associations. So the government did not invade his “legitimate
    ‘expectation of privacy’” by obtaining it.24 Carpenter, 585 U.S. at 314 (quoting Miller,
    
    425 U.S. at 442
    ).
    23
    The dissent also stresses that law enforcement could deduce the identity of
    individuals caught within the geofence. Diss. Op. at 63–64. But we fail to see how this is
    relevant. If law enforcement only observed the short-term movements of everyone caught
    within the geofence, then it does not matter whether it learned the identity of those people
    or not—it still did not invade anyone’s privacy interest in the whole of their physical
    movements.
    24
    We recognize that the theory we apply could lead to hard line-drawing problems
    in other cases. Some scholars have criticized the Mosaic Theory on precisely these
    grounds. See, e.g., Kerr, The Mosaic Theory of the Fourth Amendment, at 343–53. Indeed,
    both members of today’s majority disagreed with the application of this theory in Beautiful
    Struggle itself. See 2 F.4th at 359–62 (Wilkinson, J., dissenting). But regardless of any
    flaws inherent in this approach, it is the established doctrine of our Circuit. We must apply
    it as faithfully as we can. And if this theory is to have any meaning, then at the very least
    it must entail that police observation of a person’s two-hour public foray cannot be a search
    under the Fourth Amendment. Any other result would render the principle announced in
    Beautiful Struggle meaningless.
    29
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 30 of 103
    Unable to refute this point, the dissent tries a different tack. The dissent argues that
    Beautiful Struggle and Knotts are distinguishable because they involved observation of
    “strictly . . . public movements.” Diss. Op. at 94. According to the dissent, the duration
    of the government surveillance is only relevant in cases involving a person’s public
    movements. But this case, unlike Beautiful Struggle and Knotts, involves technology with
    the capacity to surveil a person’s private movements, too. So the dissent would apply a
    different set of principles here and treat the duration of the intrusion as basically irrelevant.
    The dissent is correct that the government conducts a search when it uses sense-
    enhancing technology to learn information from inside a private space that it could not
    have learned without physically intruding on that space. See Kyllo, 
    533 U.S. at 34
    ; Karo,
    468 U.S. at 713–18. But the dissent fails to mention that those cases involved challenges
    brought by people who had a reasonable expectation of privacy in the place searched.
    Kyllo, 533 U.S. at 29–31; Karo, 
    468 U.S. at 714
     (“This case thus presents the question
    whether the monitoring of a beeper in a private residence, a location not open to visual
    surveillance, violates the Fourth Amendment rights of those who have a justifiable interest
    in the privacy of the residence. . . . [W]e think that it does.” (emphasis added)). By
    contrast, the Supreme Court has long held that someone who does not have a Fourth
    Amendment interest in the place or thing searched lacks standing to challenge that search.
    Rawlings, 448 U.S. at 104–06; see Karo, 
    468 U.S. at
    716 n.4, 719 (distinguishing Rawlings
    because several defendants had a privacy interest in the place searched, unlike in
    Rawlings). So to challenge the government’s use of technology to invade a protected
    space, a defendant must prove that the government violated his reasonable expectation of
    30
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 31 of 103
    privacy in that space. The mere fact that the government observed him behind closed doors
    is insufficient to confer Fourth Amendment standing.
    Chatrie does not allege that the Location History data obtained by the government
    invaded his constitutionally protected space, like his home.25 And to the extent that it may
    have showed him or others in someone else’s protected space, Chatrie lacks standing to
    assert that person’s potential Fourth Amendment rights. The dissent may be willing
    looking past these basic Fourth Amendment standing principles, but we are not.26
    Now to the dissent’s treatment of the third-party doctrine. The dissent thinks that
    the Supreme Court abandoned Smith and Miller, just like it abandoned Knotts and Jones.
    After Carpenter, on the dissent’s view, voluntary exposure either doesn’t matter or, if it
    does, is just another factor in the overall balancing inquiry.
    25
    Again, we take no position on whether this would be a search, since this issue is
    not properly presented here. But we do note that the answer isn’t as obvious as the dissent
    represents that it would be. Compare Karo, 486 U.S. at 713–18, with California v. Ciraolo,
    
    476 U.S. 207
    , 213 (1986) (holding that no search occurs when officers use technology to
    peer into a person’s curtilage if the person knowingly exposes his curtilage’s contents to
    others), and Lewis v. United States, 
    385 U.S. 206
    , 211 (1966) (holding that no search occurs
    when a person invites someone into his home who turns out to be a law enforcement
    informant).
    26
    Adopting the dissent’s sweeping approach would create a bizarre incongruity with
    other areas of Fourth Amendment doctrine. Under traditional Fourth Amendment
    principles, if the police physically entered Journey Christian Church without a warrant in
    search of Chatrie, he would not have standing to challenge that search (assuming he had
    no privacy interest in the church). But under the dissent’s view, if police digitally “entered”
    that same church via Location History, Chatrie could challenge this as an invasion of his
    rights. For a view that claims to champion “historical understandings” of the Fourth
    Amendment, Diss. Op. at 46 (quoting Carpenter, 585 U.S. at 305), the dissent’s approach
    actually eviscerates basic and longstanding Fourth Amendment principles.
    31
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 32 of 103
    But Carpenter did no such thing. As we have already explained, Carpenter did not
    cast aside everything that came before it and create a new framework for assessing Fourth
    Amendment violations. Rather, the Court concluded that access to at least 7 days’ worth
    of CSLI invaded Carpenter’s reasonable expectation of privacy in the whole of his physical
    movements. Carpenter, 585 U.S. at 310–13. It then considered whether the third-party
    doctrine applied to CSLI and ultimately “decline[d] to extend” it, given the sensitive nature
    of that information and the fact that it is not voluntarily exposed to wireless carriers. Id. at
    313–16. Yet Court did not overturn the third-party doctrine, nor did it rule out the
    possibility of it applying to other types of information or technology that fit more
    comfortably within its domain. Id. at 316. And it certainly did not reduce the doctrine to
    one factor in a totality-of-the-circumstances balancing inquiry.27
    Here, we find that Chatrie—unlike Carpenter—did voluntarily expose his Location
    History to Google. So we conclude that the third-party doctrine applies to this case. But
    the dissent disagrees and identifies three facts that supposedly make Chatrie’s disclosure
    of his Location History information not “meaningfully voluntary.” Diss. Op. at 69. First,
    Location History, once enabled, always generates and collects information, so its collection
    27
    The dissent’s reading is only plausible because it creatively rearranges Carpenter
    to say something it never did. According to the dissent, Carpenter first “declin[ed] to
    extend the third-party doctrine,” Diss. Op. at 48, then applied its “new framework” to
    recognize Carpenter’s privacy interest, id. at 48–49, and finally considered voluntariness
    as a sort of independent factor, id. at 49. But this is not at all how the Court proceeded.
    Rather, it first recognized that access to 7 days’ worth of CSLI invaded Carpenter’s
    reasonable expectation of privacy in the whole of his physical movements, 585 U.S. at
    310–13, and then declined to extend the third party doctrine, partly because Carpenter’s
    conveyance of CSLI was not meaningfully voluntary, id. at 313–16.
    32
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 33 of 103
    is even more automatic and less voluntary than the CSLI collected in Carpenter. Second,
    many individuals generate Location History data, so they must do so involuntarily. Third,
    Google does not “meaningfully inform” users of how it collects data or how much data it
    collects at the opt-in stage. Id. at 74. We address each argument in turn, finding none
    convincing.
    First, the dissent confuses the extent to which technology conveys information with
    whether such conveyance is done voluntarily. Carpenter found that CSLI is conveyed
    “without any affirmative act on the part of the user beyond powering up” his cell phone.
    585 U.S. at 315. Thus, a cell phone conveys such information “automatically” without
    action on the user’s part beyond activating his phone. Id. By contrast, a user who merely
    activates and uses his cell phone will not generate Location History data. He only does so
    once he takes the affirmative step of opting in to the program and consenting to the
    collection of such data. So even though Location History, once enabled, is constantly
    collected, it is only constantly collected because it has first been enabled.28
    Second, the fact that a large number of active Google users have enabled Location
    History does not prove that they use this service involuntarily. We agree with the dissent
    that “the use of technology is not per se voluntary just because the adoption of that
    technology is not as ubiquitous as the cell phone.” Diss. Op. at 72. But the flip-side is also
    28
    Nor is the absence of a “physical conveyance,” like those in Smith and Miller, a
    meaningful distinction. Diss. Op. at 71. Someone who invites another to follow him
    around and record his movements has conveyed his location information just as voluntarily
    as someone who records every movement himself and gives the record to another.
    33
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024       Pg: 34 of 103
    true: The ubiquitous use of a particular technology does not necessarily mean that it is
    used involuntarily. And absent some explanation for why Location History is “‘such a
    pervasive and insistent part of daily life’ that [activating it] is indispensable to participation
    in modern society,” Carpenter, 585 U.S. at 315 (quoting Riley, 573 U.S., at 385), we see
    no reason to treat it as such.29
    Finally, Google provides adequate information at the opt-in stage to enable a user
    to knowingly consent to the collection of his data. Before a user can activate Location
    History, Google explains that “Location History saves where you go with your devices,”
    that “Google regularly obtains location data from your devices,” and that “[t]his data is
    saved even when you aren’t using a specific Google service, like Google Maps or Google
    search.” J.A. 1565. By choosing to opt in, then, a reasonable user would understand that
    he gave Google broad authorization to track and save Location History data whenever he
    goes anywhere with his device, even while he is not using it. A user who accepts those
    terms cannot later claim he did not knowingly expose his information simply because
    Google didn’t explain exactly how accurately it would save where he went or exactly how
    regularly it would obtain location data. Cf. Smith, 
    442 U.S. at 745
     (“The fortuity of whether
    or not the phone company in fact elects to make a quasi-permanent record of a particular
    number dialed does not[,] in our view, make any constitutional difference.”); Florida v.
    29
    The dissent misunderstands why we emphasize that two-third of active Google
    users have not enabled Location History. We do not invoke this number because we think
    there is some numeric threshold of users that a service must surpass to become involuntary.
    Rather, we only think it shows that if Location History were really essential to participation
    in modern society, it would be odd that most Google users have not activated this service.
    34
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 35 of 103
    Jimeno, 
    500 U.S. 248
    , 251 (1991) (holding that officers didn’t exceed the scope of consent
    when suspect told them they could search the entire car and they searched containers within
    the car).30
    The dissent warns that courts must exercise “humility” when adapting the Fourth
    Amendment to modern innovations. Diss. Op. at 103. But it is the dissent that fails to heed
    its own warning. Instead of faithfully apply established principles to the case before us,
    the dissent would have us depart from binding case law and apply a novel, unwieldy
    multifactor balancing test to reach the dissent’s preferred policy outcome. We decline the
    invitation. Our Fourth Amendment doctrine compels a clear result here. If one thinks that
    this result is undesirable on policy grounds, those concerns should be taken to Congress.
    *             *              *
    The Fourth Amendment is an important safeguard to individual liberty. But its
    protections are not endless. To transgress its command, the government must first conduct
    a search. We hold that the government did not conduct a Fourth Amendment search when
    it accessed two hours’ worth of Chatrie’s location information that he voluntarily exposed
    to Google. Thus, the district court’s decision must be
    AFFIRMED.
    30
    The dissent also laments that pausing and deleting Location History is “easier said
    than done,” Diss. Op. at 76, but its evidence for this proposition is basically nonexistent.
    Other than alluding to generalized grievances about Location History by members of
    Congress, the media, and Norway’s Consumer Protection Committee, the dissent relies on
    a single email from a Google employee, who suggested that deleting Location History data
    might be difficult. But the district court made no finding about “[w]hether the substance
    of this remark is true or not,” J.A. 1342, and, absent any further evidence, there is no way
    to know whether this remark accurately reflects the difficulty of deleting Location History
    data.
    35
    USCA4 Appeal: 22-4489         Doc: 63       Filed: 07/09/2024      Pg: 36 of 103
    WYNN, Circuit Judge, dissenting:
    This appeal presents this Court’s latest opportunity to consider how the Fourth
    Amendment applies to police use of new surveillance technologies, particularly in light of
    the Supreme Court’s 2018 decision in Carpenter v. United States.
    The analysis that follows (1) addresses how the Court’s understanding of privacy
    protections evolved alongside technological developments and how Carpenter marked the
    culmination of that evolution; (2) provides a detailed overview of Carpenter to explain the
    new multifactor test it set forward; (3) applies that test to the Location History intrusion at
    bar; and (4) concludes that the intrusion was a search that triggered the Fourth
    Amendment’s protections.
    Finally, in an attempt to address this dissent, the majority provides a lengthy
    separate part to its opinion, relying on unsupported policy premises to support extrajudicial
    conclusions rather than addressing the serious substantive issues presented by this appeal.
    To redirect our focus to the merits of this matter, I have added a final section to this
    dissenting opinion.
    I.
    At the heart of this appeal, the majority opinion concludes that the government has
    a virtually unrestricted right to obtain the Location Data History of every citizen. But I
    believe the government needs a warrant to obtain such Location History data. And that’s
    36
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 37 of 103
    something the government itself apparently believed at the time it conducted the respective
    intrusion, since it sought and obtained a warrant in this matter.1
    A.
    Ratified in 1791, the Fourth Amendment safeguards the “right of the people to be
    secure in their persons, houses, papers, and effects, against unreasonable searches and
    seizures,” by generally requiring the government to first obtain a warrant from a neutral
    judge or magistrate before conducting a search. U.S. Const. amend. IV. Historically, the
    Supreme Court interpreted the Fourth Amendment with an eye toward its origin as the
    embodiment of the Framers’ desire to protect citizens from the arbitrary searches they
    endured under British rule. See Carpenter v. United States, 
    585 U.S. 296
    , 303–04 (2018).
    Consistent with this historical view, early decisions employed the “trespass doctrine,”
    under which only physical intrusions by the government into private spaces constituted
    Fourth Amendment searches that required a warrant. Katz v. United States, 
    389 U.S. 347
    ,
    353 (1967) (internal quotation marks omitted); see Carpenter, 585 U.S. at 304; Olmstead
    v. United States, 
    277 U.S. 438
    , 457 (1928) (applying trespass doctrine), overruled by Katz,
    
    389 U.S. at 347
    .
    Justice Harlan’s concurring opinion in Katz v. United States signaled a transition
    1
    The district court only resolved whether the warrant that the government had
    obtained was valid. The question of whether an unconstitutional search occurred was not
    decided by the district court.
    37
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 38 of 103
    from these early principles to modern Fourth Amendment jurisprudence.2 His opinion
    articulated a “reasonable expectation of privacy” standard for what type of surveillance
    constitutes a Fourth Amendment search. Katz, 389 U.S. at 361–62 (Harlan, J., concurring).
    Under this standard, a Fourth Amendment search occurs if (1) an individual has an actual
    (subjective) expectation of privacy in some activity, and (2) that expectation is one that
    society recognizes as objectively reasonable. 
    Id. at 361
     (Harlan, J., concurring). Hence, any
    government surveillance that infringes upon a person’s reasonable privacy expectation
    necessitates a warrant. Katz thereby expanded the recognized Fourth Amendment
    protections beyond mere physical intrusions. 
    Id. at 353
    ; accord Desist v. United States, 
    394 U.S. 244
    , 250 (1969) (“Katz for the first time explicitly overruled the ‘physical penetration’
    and ‘trespass’ tests enunciated in earlier decisions of this Court.”), abrogated on other
    grounds by Griffith v. Kentucky, 
    479 U.S. 314
     (1987).
    In the 1970s and 1980s—before the internet age—the Supreme Court placed two
    key limitations on Katz’s expansion of recognized Fourth Amendment protections: the
    third-party and public-surveillance doctrines. See Carpenter, 585 U.S. at 306–09. Because
    understanding the nuances of those limitations is essential to understanding the Court’s
    recent decision in Carpenter, the Court in Carpenter reviewed both lines of cases in some
    detail, and I do the same here.
    2
    Though a concurrence is not binding, the reasonable-expectation-of-privacy test
    articulated in Justice Harlan’s concurrence was adopted by a majority of the Court the
    following year. See Terry v. Ohio, 
    392 U.S. 1
    , 9 (1968).
    38
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 39 of 103
    The seminal third-party-doctrine cases are Smith v. Maryland, 
    442 U.S. 735
     (1979),
    and United States v. Miller, 
    425 U.S. 435
     (1976). In Smith, police used a pen-register device
    to collect the phone numbers the suspect dialed on his home phone. Smith, 442 U.S. at 737–
    38. And in Miller, police accessed the suspect’s bank records, such as checks and deposit
    slips. Miller, 425 U.S. at 437–38. In those cases, the Supreme Court held that the suspects
    had no reasonable privacy expectations in the records in question because the documents
    were unrevealing business records that the suspects had voluntarily conveyed to third
    parties. See Smith, 
    442 U.S. at 737
    , 740–42; Miller, 425 U.S. at 442–43.
    The analysis in those cases was twofold and found its roots in Justice Harlan’s Katz
    concurrence. First, Smith and Miller reasoned that individuals have no subjective privacy
    expectation in the phone numbers they dial or in their bank records because the “nature of
    those records” is that they are “business records” that reveal little personal information.
    Carpenter 585 U.S. at 308–09 (first citing Smith, 442 U.S. at 742–43; and then citing
    Miller, 425 U.S. at 440–43). The Court in Smith, for instance, stressed the pen registers’
    “limited capabilities”: the pen registers did “not acquire the contents of communications,”
    nor reveal the caller and call recipient’s “identities, nor whether the call was even
    completed.” Smith, 442 U.S. at 741–42 (emphasis omitted); accord Miller, 
    425 U.S. at 440, 442
     (stating that the records were “not confidential communications but negotiable
    instruments . . . in commercial transactions”).
    Second, and relatedly, the Court held in both cases that society did not recognize a
    “reasonable” (or objective) privacy expectation in such unrevealing business records that
    individuals voluntarily provide to third parties. See Carpenter, 585 U.S. at 309 (“When
    39
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 40 of 103
    Smith placed a call, he voluntarily conveyed the dialed numbers . . . by exposing that
    information . . . in the ordinary course of business.” (quoting Smith, 
    442 U.S. at 744
    (cleaned up))); Miller, 
    425 U.S. at 443
    .
    Nevertheless, Smith qualified its analysis with an eye toward the future. It specified
    that, if a day should come when our subjective expectations of privacy change due to
    “influences alien to well-recognized Fourth Amendment freedoms,” then the subjective-
    expectation requirement would have “no meaningful role” in ascertaining the bounds of
    the Fourth Amendment. Smith, 
    442 U.S. at
    740 n.5. Instead, “a normative inquiry would
    be proper.” 
    Id.
     Likewise, Justice Marshall’s dissent in Smith voiced an argument that
    Carpenter would later echo: disclosure to a phone company or bank is not meaningfully
    voluntary in modern society. See 
    id.
     at 749–51 (Marshall, J., dissenting).
    In two decisions from the 1980s, the Supreme Court placed a second limitation on
    Katz. This second limitation centers upon differences in how Katz applies in public versus
    private spaces. In United States v. Knotts, the Court held that police did not conduct a
    search for Fourth Amendment purposes when they used a beeper—that is, a radio
    transmitter . . . which emits periodic signals that can be picked up by a radio receiver”—to
    keep a vehicle in view while they followed behind it “on public thoroughfares” during one
    trip. United States v. Knotts, 
    460 U.S. 276
    , 277, 281 (1983). The Court reasoned that
    because the suspect’s movements were visible to anyone who wanted to look, police could
    have obtained the same information without the beeper—by physically following him—so
    the suspect had no reasonable privacy expectation in those public movements. 
    Id.
     at 281–
    82.
    40
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 41 of 103
    In so holding, the Court stressed that the beeper was a rudimentary technology that
    merely “augment[ed]” the visual “sensory faculties” that officers had at “birth.” 
    Id. at 282, 285
    . Thus, Knotts “was careful to distinguish between the rudimentary tracking facilitated
    by the beeper and more sweeping modes of surveillance.” Carpenter, 585 U.S. at 306.
    Knotts, like Smith, also turned an eye to the future: the Court presciently qualified that
    should “twenty-four hour surveillance of any citizen” become “possible,” then “different
    constitutional principles may be applicable.” Id. at 306–07 (quoting Knotts, 460 U.S. at
    283–84 (cleaned up)).
    The Court distinguished Knotts in its subsequent decision in United States v. Karo,
    
    468 U.S. 705
     (1984). In that case, police used a beeper to track a container as it moved
    between private residences and commercial lockers. 
    Id.
     at 708–10, 714. The Court held
    that, unlike the public surveillance at issue in Knotts, the use of a beeper to surveil activity
    within a private residence—a location closed to public view—constituted a Fourth
    Amendment search. 
    Id.
     at 714–16.
    The upshot of cases like Smith, Miller, Knotts, and Karo was that individuals had
    Fourth Amendment rights where they had a reasonable expectation of privacy, but that they
    could forfeit those reasonable privacy expectations by voluntarily conveying a business
    record to a third party, or by traveling in public where police could use rudimentary tools
    to surveil them.
    However, as technology quickly advanced in the ensuing decades and enabled
    police to surreptitiously collect unprecedented levels of information, the Supreme Court
    began curtailing the third-party and public-surveillance doctrines to ensure that the
    41
    USCA4 Appeal: 22-4489       Doc: 63        Filed: 07/09/2024      Pg: 42 of 103
    exceptions to the Fourth Amendment’s protections did not swallow the whole. In doing so,
    the Supreme Court ensured that the Fourth Amendment remained a firm bulwark against
    government overreach.
    In Kyllo v. United States, the Court held that police use of a thermal-imaging device
    to monitor heat waves emanating from inside a home is a Fourth Amendment search, even
    though police deployed the device from a public street outside the home. Kyllo v. United
    States, 
    533 U.S. 27
    , 32 (2001). The Court rested its holding on its recognition that, even
    though the device was deployed in a public space, it nonetheless allowed police to “explore
    details of the home that would previously have been unknowable without physical
    intrusion.” 
    Id. at 40
    .
    Next, in United States v. Jones, the Court grappled with “more sophisticated
    surveillance of the sort envisioned in Knotts and found that different principles did indeed
    apply.” Carpenter, 585 U.S. at 307 (citing United States v. Jones, 
    565 U.S. 400
    , 404–05
    (2012)). The Jones Court held that the police’s installation and use of a Global Positioning
    System (“GPS”) tracking device to monitor the location of a suspect’s vehicle for 28 days
    constituted a search. Jones, 
    565 U.S. at 404
    . Although Justice Scalia’s opinion for the five-
    justice majority rested only on traditional trespass principles, five other justices authored
    or joined concurrences concluding that the GPS monitoring was a search under the Katz
    reasonable-expectation-of-privacy test—even though the intrusion only captured public
    movements. See 
    id.
     at 413–18 (Sotomayor, J., concurring); 
    id.
     at 419–26 (Alito, J.,
    concurring in the judgment). The concurring justices noted that, as compared to the one-
    trip beeper intrusion in Knotts, the GPS intrusion in Jones was longer in duration and
    42
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024      Pg: 43 of 103
    conducted with more precise and comprehensive technology. See 
    id.
     at 415–16
    (Sotomayor, J., concurring); 
    id.
     at 427–30 (Alito, J., concurring in the judgment).
    Four concurring justices believed the longer duration of the GPS tracking rendered
    it a search because it constituted “a degree of intrusion that a reasonable person would not
    have anticipated” and thus violated reasonable expectations of privacy. 
    Id. at 430
     (Alito,
    J., concurring in the judgment). That is, because police employing traditional investigative
    methods could not typically tail a suspect in public for a month straight like they did using
    GPS in Jones, such investigations violate societal expectations and therefore constitute
    Fourth Amendment searches. 
    Id.
     at 429–30 (“In the pre-computer age, the greatest
    protections of privacy were neither constitutional nor statutory, but practical.”).
    For the fifth concurring justice, Justice Sotomayor, even a short-term GPS search
    violated a reasonable privacy expectation because the technology’s “unique attributes” set
    it apart from the rudimentary beeper in Knotts. 
    Id. at 415
     (Sotomayor, J., concurring). Most
    famously, she reasoned that because GPS technology “generates a precise, comprehensive
    record” of a person’s public movements, it “reflects a wealth of detail about her familial,
    political, professional, religious, and sexual associations,” which violates our deepest
    privacy expectations. 
    Id.
     Justice Sotomayor further pointed out that a short GPS search is
    cheaper, easier to use, and more concealable than conventional surveillance methods—
    attributes that allow technologies like GPS to “evade[] the ordinary checks that constrain
    abusive law enforcement practices.” 
    Id. at 416
    . Additionally, she noted, GPS technology
    permits the government to “store” and “efficiently mine” records of an individual’s
    movements “years into the future.” 
    Id. at 415
    . For these reasons, she warned, even a short
    43
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 44 of 103
    GPS search could chill First Amendment freedoms and “alter the relationship between
    citizen and government in a way that is inimical to democratic society.” 
    Id. at 416
    (quotation omitted). Finally, she lamented that the third-party doctrine is “ill suited to the
    digital age,” in which people reveal intimate information during “mundane tasks” without
    expecting their devices to enable “covert surveillance of their movements.” 
    Id.
     at 417 &
    n.*.
    Two years later, the Court again demonstrated its awareness that modern technology
    calls for a more nuanced Fourth Amendment analysis. In Riley v. California, it held that
    police must obtain a warrant to look through the contents of an arrestee’s cell phone during
    an arrest, even though police may generally conduct brief searches of an arrestee’s person
    without a warrant. Riley v. California, 
    573 U.S. 373
    , 385–86 (2014). The Court recognized
    that a cell phone contains a much greater wealth of sensitive information than would be
    revealed by a traditional physical search, signaling that privacy rights in digital information
    must be thought of differently. 
    Id.
     at 395–96.
    Thus, in each of these seminal cases, the Supreme Court grappled with how to
    maintain constitutional privacy protections against police use of or access to encroaching
    technologies. And, in the majority opinions in most of these cases and in the Jones
    concurrences, the Court recognized that traditional Fourth Amendment principles were ill-
    suited to combating the realities of modern technology.
    B.
    All this case law, demonstrating the Court’s growing recognition of the profound
    impact of technological advancements on Fourth Amendment rights, led up to the Court’s
    44
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024     Pg: 45 of 103
    2018 decision in Carpenter v. United States. While building on all that came before it,
    Carpenter marked a “[s]ea [c]hange” in Fourth Amendment jurisprudence as it pertains to
    “a person’s digital information.” Matthew Tokson, The Aftermath of Carpenter: An
    Empirical Study of Fourth Amendment Law, 2018–2021, 
    135 Harv. L. Rev. 1790
    , 1799–
    1800 (2022) [hereinafter Tokson, The Aftermath of Carpenter].
    In Carpenter, the Court held that a police intrusion into seven days of the
    defendant’s historical cell-site-location-information (“CSLI”) records, which produced
    two days’ worth of data, constituted a Fourth Amendment search. Carpenter, 585 U.S. at
    302, 313. CSLI records are created when cell phones connect to nearby cell towers, which,
    in Carpenter, occurred at the start and end of the defendant’s incoming and outgoing calls.
    Id. at 302. The cell-site records were maintained by wireless companies, id. at 306, which
    raised the possibility that the third-party doctrine would apply. And indeed, below, the
    Sixth Circuit had “held that [the defendant] lacked a reasonable expectation of privacy in
    the location information collected by the FBI because he had shared that information with
    his wireless carriers.” Id. at 303. In other words, the Sixth Circuit took a view very similar
    to that of the majority here, asking only whether the information in question had been
    voluntarily conveyed in some manner to a third party.
    But the Supreme Court reversed. In so doing, it acknowledged that the third-party
    doctrine is an increasingly tenuous barometer for measuring an individual’s privacy
    expectations in the digital era. Instead, the Court laid the foundation for a new, multifactor
    test to be used to determine whether a government intrusion using digital technologies
    constitutes a search.
    45
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 46 of 103
    The Carpenter Court began by reiterating the Katz test: the Fourth Amendment
    protects against intrusion into the sphere in which an individual has a reasonable
    expectation of privacy. Id. at 304. It then explained that, while “no single rubric” defines
    what constitutes a reasonable privacy expectation, the Court’s analysis must always be
    “informed by historical understandings of what was deemed an unreasonable search when
    the Fourth Amendment was adopted.” Id. at 304–05 (cleaned up). These historical
    understandings, according to the Court, have a few “guideposts”: “the [Fourth]
    Amendment seeks to secure the privacies of life against arbitrary power,” “to place
    obstacles in the way of a too permeating police surveillance,” and, most importantly, to
    “assure preservation of that degree of privacy against government that existed when the
    Fourth Amendment was adopted.” Id. at 305 (cleaned up).
    The Court emphasized that it has kept those “Founding-era understandings in mind”
    when considering “innovations in surveillance tools.” Id. Pointing to the examples of Kyllo
    and Riley, detailed above, the Court explained that its Fourth Amendment jurisprudence
    has evolved in step with technological developments: “As technology has enhanced the
    Government’s capacity to encroach upon areas normally guarded from inquisitive eyes,
    this Court has sought to [preserve historical privacy protections].” Id. (quoting Kyllo, 
    533 U.S. at 34
    ) (cleaned up); see 
    id.
     (noting that the Court “rejected in Kyllo a ‘mechanical
    interpretation’ of the Fourth Amendment” to protect individuals from advancing
    technology (quoting Kyllo, 
    533 U.S. at 35
    )); 
    id.
     (pointing to its “recogni[tion]” in Riley that
    “the ‘immense storage capacity’ of modern cell phones” rendered a cell phone search
    46
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 47 of 103
    fundamentally different from a traditional, physical search of an arrestee’s person (quoting
    Riley, 573 U.S. at 393)).
    With that background, the Court turned to consider the CSLI intrusion at bar. It
    quickly concluded that the sort of digital data at issue—“personal location information
    maintained by a third party”—“does not fit neatly” into any existing line of Fourth
    Amendment jurisprudence. Id. at 306. Instead, this data “lie[s] at the intersection” of the
    third-party doctrine (Smith and Miller) and public-surveillance cases (Knotts and Jones).
    Id. Both lines of cases would seemingly “inform our understanding of the privacy interests
    at stake,” id., but neither squarely applies because this kind of data constitutes a
    “qualitatively different category” of information, id. at 309.
    The Court next summarized those two lines of inapplicable cases, id. at 306–09, and
    then explicitly “decline[d] to extend” the third-party doctrine to CSLI—even though CSLI
    data is maintained by third-party companies—because CSLI records are “qualitatively
    different” from the types of information that had been at issue in its earlier third-party cases
    (such as phone numbers and bank records). Id. at 309 (emphasis added); see also id. (noting
    that police surveillance using CSLI is a “new phenomenon”); id. (emphasizing the “unique
    nature” of CSLI and the “novel circumstances” of the case); id. at 313 (noting “seismic
    shifts in digital technology”); id. at 314 (calling CSLI a “distinct category of information”);
    id. (stressing that “[t]here is a world of difference” between the Smith and Miller records
    and CSLI records); id. at 318 (“CSLI is an entirely different species of business record.”).
    “After all,” the Court expounded, “when Smith was decided in 1979, few could have
    imagined a society in which a phone goes wherever its owner goes, conveying . . . not just
    47
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 48 of 103
    dialed digits, but a detailed and comprehensive record of the person’s movements.” Id. at
    309.
    In so declining to extend the third-party doctrine, the Court rejected the notion that
    there is “a straightforward application of [that] doctrine” to police use of data like CSLI.
    Id. at 314. To the contrary, the Court held that applying the third-party doctrine to the CSLI
    in Carpenter would have constituted “a significant extension of [the doctrine] to a distinct
    category of information.” Id. Accordingly, it warned that courts would be remiss to
    “mechanically” apply old theories like the third-party doctrine to novel records like CSLI.
    Id. (“In mechanically applying the third-party doctrine to this case, the Government fails
    to appreciate that there are no comparable limitations on the revealing nature of CSLI.”).
    After concluding that no existing Fourth Amendment doctrine applied neatly to such
    a digital innovation, the Carpenter Court applied a new framework based on the historical
    understandings of privacy protections that it had described and concluded that the CSLI
    obtained “was the product of a search” that required a warrant. Id. at 310; see id. at 309–
    13. Though the Court did not state explicitly, “here is the applicable test,” it clearly
    delineated the considerations that compelled its decision. Specifically, the Court identified
    four primary aspects of CSLI that rendered it “qualitatively different” from the traditional
    sorts of records sought, and forms of surveillance used, by police—its comprehensiveness,
    its retrospective capabilities that allowed for historical tracking, the intimacy of the
    information it reveals, and its ease of access (i.e., the cost and efficiency) for police. Id. at
    309–13. Because those four considerations rendered CSLI unique and violated historical
    understandings of Fourth Amendment protections, the Court concluded that the suspect
    48
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 49 of 103
    maintained a reasonable privacy expectation in his CSLI data, and so the intrusion
    constituted a Fourth Amendment search. Id. at 313.
    In so holding, the Court’s analysis followed the reasoning of the concurrences in
    Jones, which likewise argued that the GPS intrusion in that case was a search not due to
    trespass, but because it violated historical privacy expectations. E.g., id. at 310–11 (first
    citing Jones, 
    565 U.S. at 430
     (Alito, J., concurring in judgment); and then citing Jones, 
    565 U.S. at 415
     (Sotomayor, J., concurring)). The Carpenter Court adopted the same
    considerations that the Jones concurrences, and particularly that of Justice Sotomayor,
    proposed: the intrusion was comprehensive, intimate, retrospective, and efficient. Compare
    
    id.
     at 309–13, with Jones, 565 U.S. at 415–16 (Sotomayor, J., concurring) (discussing same
    qualities), and 
    id.
     at 429–30 (Alito, J., concurring in judgment) (discussing efficiency).
    Based on those considerations, the Court concluded that the CSLI intrusion violated
    the defendant’s reasonable-privacy expectation. Carpenter, 585 U.S. at 313. Then, in a
    separate section of the opinion, the Carpenter Court further distinguished Smith and Miller
    by explaining that the conveyance of CSLI is also not voluntary. Id. at 313–16.
    Leading scholars agree that Carpenter created a factor-based test derived from those
    considerations, though they disagree on which factors are the most important or mandatory.
    E.g., Paul Ohm, The Many Revolutions of Carpenter, 
    32 Harv. J.L. & Tech. 357
    , 363, 369
    (2019) (recognizing Carpenter created “new, multi-factor test” to analyze an individual’s
    reasonable privacy expectation against intruding technology and “herald[ed] a new mode
    of Constitutional analysis”); Susan Freiwald & Stephen W. Smith, The Carpenter
    Chronicle: A Near-Perfect Surveillance, 
    132 Harv. L. Rev. 205
    , 219 (2018) (multifactor
    49
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 50 of 103
    analysis was “clearly central” to the Court’s holding); Tokson, The Aftermath of Carpenter,
    supra, at 1830 (describing the “Carpenter factors” and concluding from a survey of cases
    that “[a] multifactor Carpenter test has begun to emerge from the lower court[s]”). In
    reaching this conclusion, scholars rely on the Court’s analysis and its concluding sentence,
    which reads: “In light of the deeply revealing nature of CSLI, its depth, breadth, and
    comprehensive reach, and the inescapable and automatic nature of its collection, the fact
    that such information is gathered by a third party does not make it any less deserving of
    Fourth Amendment protection.” Carpenter, 585 U.S. at 320. In my view, such a factor-
    based examination is the correct interpretation of the Court’s opinion.
    Again, central to the Court’s analysis was one overarching principle: the need to
    maintain historical Fourth Amendment protections against expanding police surveillance
    capabilities. Throughout its analysis, Carpenter extensively emphasized that the
    government historically could not conduct intrusions as comprehensive, retrospective,
    intimate, and efficient as those made possible by technological advancements like CSLI.
    See, e.g., id. at 304–05 (stating the Fourth Amendment analysis with respect to digital data
    must be “informed by historical understandings” of reasonable searches (quotations
    omitted)); id. at 305 (discussing historical expectations); id. at 312 (retrospective
    information was traditionally “unknowable”); id. at 320 (stating that the police’s use of
    CSLI infringed upon the Framers’ intent in enacting the Fourth Amendment).
    This rationale reflects the Court’s understanding that rapid technological advances
    have created shifts “in kind and not merely in degree from the technology of the past.”
    Ohm, supra, at 399. These shifts required the Court to adjust its analysis of the Fourth
    50
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 51 of 103
    Amendment to “preserv[e the] degree of privacy . . . that existed when the Fourth
    Amendment was adopted,” as it has with technological changes in the past. Carpenter, 585
    U.S. at 305 (quoting Kyllo, 
    533 U.S. at 34
    ); see 
    id.
     at 305–06 (describing this philosophy
    in the Court’s Fourth Amendment jurisprudence and citing cases); id. at 318 (“When
    confronting new concerns wrought by digital technology, this Court has been careful not
    to uncritically extend existing precedents.”); see also Orin S. Kerr, The Digital Fourth
    Amendment: Implementing Carpenter 10, 16–19 (USC Law Legal Studies Paper No. 18-
    29) (describing this phenomenon in the Court’s jurisprudence as an “equilibrium-
    adjustment”); Denae Kassotis, The Fourth Amendment and Technological Exceptionalism
    After Carpenter: A Case Study on Hash-Value Matching, 
    29 Fordham Intell. Prop. Media & Ent. L.J. 1243
    , 1302 (2019) (explaining that Riley and Carpenter reflect the Court’s
    understanding of the exceptional nature of technology and adaptation of the law to protect
    privacy).
    Put simply, the Court declined to extend existing doctrines to exempt CSLI from
    Fourth Amendment protections based on the principle that it first recognized decades
    earlier: previously unimaginable technology that reveals unprecedented amounts of
    personal information requires new rules. Carpenter, 585 U.S. at 310–14 (citing the Jones
    concurrences and rejecting the “mechanical” application of old doctrines); accord Riley,
    573 U.S. at 393 (stating that comparing a physical search to a cell phone search is like
    “saying a ride on horseback is materially indistinguishable from a flight to the moon”).
    Thus, “[t]he beating heart” of Carpenter “is its deep and abiding belief in the exceptional
    nature of the modern technological era.” Ohm, supra, at 399.
    51
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 52 of 103
    To sum up, the Court concluded that “personal location information maintained by
    a third party” lies at the intersection of the public-surveillance and third-party cases, but
    that neither theory “neatly” applies. Carpenter, 585 U.S. at 306. Because the nature of such
    data is “unique,” “an entirely different species,” “qualitatively different,” and represents a
    “seismic shift[]” in technology, the Court squarely declined to apply the third-party
    doctrine to it. Id. at 309, 313, 318. Instead, the Court adopted a new test: it identified four
    qualities (comprehensiveness, retrospectivity, intimacy, and ease of access) that render
    CSLI fundamentally different from the records that police could traditionally obtain
    without a warrant, and it also noted that the act of sharing CSLI with the third-party
    wireless company departed drastically from that of sharing older forms of records. And
    because of those fundamental differences, the Court held that the defendant maintained a
    reasonable expectation of privacy in his CSLI records, notwithstanding that they were
    shared with a third party.
    To that end, the Court also employed a normative analysis of each factor. That
    analysis did not rest solely on the facts of the intrusion in that specific case nor assess
    society’s empirical expectations of privacy. Rather, the Court focused on the inherent
    nature of the data collected, its potential as technology advances, and whether such
    capabilities should be constrained by the Fourth Amendment. E.g., id. at 313 (in analyzing
    comprehensiveness, disregarding the actual precision of the CSLI intrusion at bar and
    stating that “the rule the Court adopts must take account of more sophisticated systems that
    are already in use or in development” (cleaned up)); see also id. at 311 (concluding that
    CSLI revealed intimate information, without assessing what information the data actually
    52
    USCA4 Appeal: 22-4489       Doc: 63        Filed: 07/09/2024     Pg: 53 of 103
    revealed about the defendant); Ohm, supra, at 386 (explaining that Carpenter adopted a
    normative analysis of each factor that focused on the capabilities of CSLI as a category of
    information).
    Consequently, a faithful application of Carpenter requires lower courts to adapt
    traditional Fourth Amendment principles to safeguard historical constitutional rights
    against steadily infringing technologies. To be sure, Carpenter provided factors that are
    relevant to that analysis without resolving which of those factors are mandatory and which
    should enjoy greater weight. But the Court clearly considered the factors in their totality,
    with an eye toward maintaining historical expectations of privacy.
    II.
    A.
    A faithful reading of Carpenter—not to mention common sense—compels the
    conclusion that when the police obtained Chatrie’s Location History data, they engaged in
    a Fourth Amendment search. That conclusion is evident upon evaluating how the
    Carpenter factors apply to the Location History intrusion in this case.
    1.
    The first factor that Carpenter identified was the comprehensiveness of the
    intrusion, focusing on CSLI’s near-perfect surveillance capabilities. Carpenter, 585 U.S.
    at 311–12. The Court looked at this factor from two dimensions: the depth and the breadth
    of the intrusion.
    Regarding depth, the data collected in this case and in Carpenter was extremely
    comprehensive, involving a deep intrusion into each user’s privacy rights. But the intrusion
    53
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024    Pg: 54 of 103
    into Chatrie’s Location History was even more comprehensive than the intrusion in
    Carpenter because Location History is collected more often and is more precise than CSLI
    as described in Carpenter.
    In Carpenter, the Court was concerned that CSLI provided “near perfect
    surveillance” of its owner and created a “detailed, encyclopedic, and effortlessly compiled”
    record. Id. at 309. The Carpenter Court concluded that the CSLI intrusion provided nearly
    perfect surveillance because, unlike police tracking of a vehicle—which a person exits and
    which remains parked outside—a cell phone remains permanently attached to its owner
    and “faithfully follows” them into private areas. Id. at 311–12 (“A cell phone—almost a
    ‘feature of human anatomy’—tracks nearly exactly the movements of its owner.” (citation
    omitted) (quoting Riley, 573 U.S. at 385)); see id. at 311 (noting many people even use
    their cell phones in the shower).
    So too here. As with CSLI, Location History tracks a smartphone’s location, so it
    likewise provides “near perfect surveillance” of its user. Id. at 311–12. And like CSLI,
    Location History is collected with sufficient frequency to be able to faithfully track the
    user’s movements.
    Location History, however, provides even more detailed surveillance than CSLI
    because it is collected much more often. In Carpenter, CSLI only captured Carpenter’s
    location when he affirmatively placed or received a call—no call, no data. Id. at 302. But
    the Court also recognized that in recent years, companies had begun collecting CSLI from
    other “routine data connections.” Id. at 301. In line with its normative approach, the Court
    considered those advancements in its analysis, stating that with CSLI, the suspect has
    54
    USCA4 Appeal: 22-4489        Doc: 63          Filed: 07/09/2024   Pg: 55 of 103
    “effectively been tailed every moment of every day for” as long as the company maintained
    its records (in that case, five years). Id. at 312.
    While the “every moment” description was not accurate to Carpenter’s own CSLI
    data—and was likely at least a slight exaggeration even considering the advancements in
    CSLI technology by the time of the Carpenter decision3—it does essentially capture what
    we know of Location History data because that technology automatically tracks users
    every two minutes. United States v. Chatrie, 
    590 F. Supp. 3d 901
    , 908 (E.D. Va. 2022). So
    with Location History, police can reconstruct a user’s movements with startling precision.
    The numbers in this case bear this out: through Location History, the police were able to
    collect an average of about 76 data points on each person surveilled in just two hours.
    Compare that to CSLI, which collected only about 101 data points on Carpenter in a full
    day. Carpenter, 585 U.S. at 302. Thus, Location History data is even more “detailed,
    encyclopedic, and effortlessly compiled” than CSLI. Id. at 309.
    Additionally, Location History implicates even deeper privacy concerns than the
    CSLI in Carpenter because not only does it collect far more data points about each user,
    but also it is markedly more precise. In Carpenter, the data placed the defendant within a
    “wedge-shaped sector,” id. at 312, that ranged from “a dozen” to “several hundred” city
    3
    According to Carpenter, “[w]hile carriers have long retained CSLI for the start
    and end of incoming calls, in recent years phone companies have also collected location
    information from the transmission of text messages and routine data connections.”
    Carpenter, 585 U.S. at 301. The opinion does not clarify how frequently the collection of
    data from “routine data connections” occurs.
    55
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024       Pg: 56 of 103
    blocks and was “up to 40 times more imprecise” in rural areas, id. at 324 (Kennedy, J.,
    dissenting) (noting CSLI is even less precise than GPS).
    Here, by contrast, the district court found that “Location History appears to be the
    most sweeping, granular, and comprehensive tool—to a significant degree—when it comes
    to collecting and storing location data.” Chatrie, 590 F. Supp. 3d at 907. In fact, Location
    History can hunt down a user’s whereabouts within meters, and even discern elevation,
    locating the specific floor in a building where a person might be. Id. at 908–09.
    Most critically, it is a fundamental legal principle that any intrusion into a
    constitutionally protected space receives Fourth Amendment protection. E.g., Karo, 468
    U.S. at 714–15 (search occurred where government monitored a beeper inside “a private
    residence, a location not open to visual surveillance”); Kyllo, 533 U.S. at 33–35 (search
    occurred where government used device to monitor radiation through home’s walls). And
    Location History data is so granular that it can pinpoint and continuously follow a device
    inside protected spaces. For example, the geofence in this case covered over 17 acres and
    encompassed a nearby church. Chatrie, 590 F. Supp. 3d at 918. The district court found
    that the geofence could have also captured a hotel, “several units of [an] apartment
    complex,” “a senior living facility,” and “what appear to be several residences” for one
    hour at Step One, and it had no geographic limits for an additional hour in Step Two.4 Id.
    4
    As a reminder, Step One of the geofence warrant “‘compel[led] Google to disclose
    a de-identified list of all Google users’ whose Location History data indicates were within
    the geofence during a specified timeframe.” Chatrie, 590 F. Supp. 3d at 914–15 (cleaned
    up). At Step Two, law enforcement could compel Google to provide additional location
    information for a narrowed list of users “beyond the time and geographic scope of the
    (Continued)
    56
    USCA4 Appeal: 22-4489          Doc: 63        Filed: 07/09/2024    Pg: 57 of 103
    at 923. It appears nearly impossible to limit geofences to public spaces because Location
    History can inaccurately sweep more ground than police requested,5 and Google does not
    set geographic limits on Step Two in standard geofence warrants. Id. at 916, 922–23.
    Consequently, every geofence in a developed area could potentially reveal
    information “that could not otherwise have been obtained without physical intrusion into a
    constitutionally protected area.” Kyllo, 
    533 U.S. at 34
     (internal quotation marks omitted);
    see, e.g., Jake Snow, Cops Blanketed San Francisco In Geofence Warrants. Google Was
    Right       to   Protect   People’s   Privacy,    ACLU    of   N.   Cal.   (Jan.   7,   2024),
    https://www.aclunc.org/blog/cops-blanketed-san-francisco-geofence-warrants-google-
    was-right-protect-peoples-privacy [https://perma.cc/2Y7S-DRBG] (analyzing all geofence
    warrants from January 2018 to August 2021 in San Francisco and finding that—in that area
    alone—the geofences covered hundreds of residences, twelve places of worship, seven
    medical sites of care, and other private spaces). That crosses a “bright” line: police need a
    warrant. Kyllo, 
    533 U.S. at 40
    .
    original request.” Id. at 916. Google “imposes no geographical limits on this Step 2 data.”
    Id. (quotation marks omitted).
    Additionally, Google has no “firm policy as to precisely when a Step 2 request [has]
    sufficiently narrow[ed]” the list of users captured in Step One for whom police could
    request more data at Step Two. Id.
    While Location History is more precise than CSLI, it is not infallible. The district
    5
    court found that the “largest confidence interval” for a user located within the geofence
    had a radius of roughly 387 meters—more than twice as large as the geofence. Chatrie,
    590 F. Supp. 3d at 922–23. Thus, the court found that the “Geofence Warrant could have
    captured the location of someone who was hundreds of feet outside the geofence.” Id. at
    922. The court found that the government did not craft the geofence to account for these
    inaccuracies. Id. at 930–31.
    57
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 58 of 103
    The majority opinion dismisses this concern, concluding that even though the
    instant geofence intrusion did surreptitiously enter several constitutionally protected
    spaces—including residences—this issue must be saved for future cases because the
    intrusion did not actually enter Chatrie’s home, and he therefore lacks Fourth Amendment
    standing to challenge it on that ground.6 Maj. Op. at 19 n.17, 30–31, 31 n.26. But that
    analysis is incorrect. The rules are simple: a person has Fourth Amendment standing if they
    have a reasonable expectation of privacy in the thing searched. Whether a person has a
    reasonable expectation of privacy in certain data is inextricable from the data’s
    capabilities.
    Citizens have a fundamental privacy expectation in non-public spaces, particularly
    their homes. E.g., Kyllo, 
    533 U.S. at 34
    ; Karo, 468 U.S. at 714–15. Accordingly, all citizens
    would reasonably expect privacy in data that continuously and retrospectively tracked their
    movements in these protected spaces with remarkable precision, even locating the specific
    room they occupy within a secure area.
    It follows then that Chatrie would have a reasonable expectation of privacy from
    such an intrusion that could capture a church and residences at Step One and was boundless
    at Step Two. Chatrie, 590 F. Supp. 3d at 914–16. Indeed, police executed a search that
    would have captured Chatrie’s home or other constitutionally protected space if it was in
    the Step One boundary, or if he happened to travel there during Step Two. It does not matter
    6
    I note that it is unclear from the record whether the geofence intrusion indeed
    reached inside Chatrie’s home or his constitutionally protected spaces.
    58
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 59 of 103
    that Chatrie happened to stay outside of constitutionally protected spaces during a search
    that would have otherwise captured those spaces. See Arizona v. Hicks, 
    480 U.S. 321
    , 325
    (1987) (“A search is a search, even if it happens to disclose nothing but the bottom of a
    turntable.”).
    The Kyllo majority rejected the similar argument that the search of heat waves
    emanating from the home did not implicate the Fourth Amendment if the search did not
    catch more intimate information. That argument, Justice Scalia explained, was not only
    “wrong in principle,” but also “impractical” because “no police officer would be able to
    know in advance” whether his surveillance will “pick[] up ‘intimate’ details—and thus
    would be unable to know in advance whether it is constitutional.” Kyllo, 533 U.S. at 38–
    39. Likewise, here, when police executed an intrusion that would capture private spaces,
    they had no crystal ball to predict whether Chatrie would enter those spaces during the
    intrusion.
    It was also the case in Carpenter that no facts showed that the CSLI intrusion
    entered the defendant’s own protected spaces. But that did not affect his standing. The
    Court simply held that because the CSLI intrusion had the capability to follow the
    defendant into any of numerous sorts of sensitive spaces, the intrusion was unlawfully
    intimate. Carpenter, 585 U.S. at 311 (“A cell phone faithfully follows its owner beyond
    public thoroughfares and into private residences, doctor’s offices, political headquarters,
    and other potentially revealing locales.” (emphasis added)). That is, the Court focused on
    the surveillance tool’s capabilities during the intrusion as opposed to the specific facts of
    each intrusion. Because an intrusion into two days’ worth of Carpenter’s CSLI data met
    59
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 60 of 103
    the Carpenter factors, Carpenter had a reasonable privacy expectation in that data and thus
    had standing. In so holding, the Carpenter Court affirmatively instructed lower courts to
    consider the potential reach of each intrusion, without regard to whether the intrusion
    indeed invaded the defendant’s own private space under traditional Fourth Amendment
    standing principles. Id. The government thus cannot circumvent the Constitution merely
    because, by sheer luck, its target did not stray from the safe zone.
    In short, the intrusion into Chatrie’s Location History satisfies the depth portion of
    Carpenter’s first factor because it provides nearly perfect surveillance of its owner and
    creates a “detailed, encyclopedic, and effortlessly compiled” record of the owner’s
    movements. Id. at 309. And the intrusion was so broad that it did in fact enter private areas.
    This factor weighs strongly in favor of holding that the police conducted a Fourth
    Amendment search.
    2.
    Next is the intrusion’s breadth (the second part of factor 1), which should be
    considered alongside its retrospective capabilities (factor 2) because the two are related.
    Regarding breadth, the Carpenter Court was particularly concerned that wireless
    companies retained CSLI data for five years and stored that information for millions of
    people. This consideration was intertwined with the retrospective quality of the data: that
    is, because the wireless companies retained CSLI data for five years, police could
    “reconstruct a person’s [past] movements,” such that the person “has effectively been tailed
    every moment of every day for five years.” Id. at 312; see id. at 313 (“[S]eismic shifts in
    60
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 61 of 103
    digital technology . . . made possible the tracking of not only Carpenter’s location but also
    everyone else’s . . . for years and years.” (emphasis added)); id. at 315 (same).
    This breadth deviated from historical privacy expectations, leading the Court to
    conclude the data was therefore qualitatively different from data the Court had previously
    concluded did not implicate the Fourth Amendment. Carpenter highlighted that police
    historically could not “reconstruct a person’s [past] movements” without facing “a dearth
    of records and the frailties of recollection.” Id. at 312. But with CSLI, police could “travel
    back in time to retrace a person’s whereabouts” with precision, not only in the recent past,
    but going back years. Id. Not only that, but CSLI data was also available for “400 million
    devices in the United States”—not just those of suspects—so “this newfound tracking
    capacity runs against everyone.” Id. Unlike with the trackers in Knotts or Jones, “police
    need not even know in advance whether they want to follow a particular individual [using
    CSLI], or when.” Id.
    Location History raises the same breadth and retrospectivity concerns: at the time
    of the geofence intrusion at issue here, Google collected and retained Location History
    records from the time Location History was enabled, which could have taken place years
    prior. This means that the data obtained in a geofence intrusion is pulled from a preexisting
    database of users’ past movements, empowering police to time travel for each intrusion.
    Thus, each user has “effectively been tailed” since they activated Location History. Id.; see
    also Chatrie, 590 F. Supp. 3d at 909. Plus, like CSLI, Location History data is available
    for “numerous tens of millions” of unsuspecting Google users. Chatrie, 590 F. Supp. 3d at
    907.
    61
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 62 of 103
    Yet, geofence intrusions are even broader than the intrusion in Carpenter because
    there is no limit on the number of users police can include in a geofence. With CSLI, police
    at least had to provide a specific phone number to search, so they had to identify a criminal
    suspect before they could pry into his or her historical CSLI data. By stark contrast,
    geofence intrusions permit police to rummage through the historical data of an unlimited
    number of individuals, none of whom the police previously identified nor suspected of any
    wrongdoing. Indeed, the very point of the geofence intrusion is to identify persons whose
    existence was unknown to police before the search.
    Geofence intrusions are accordingly low-value fishing expeditions. So, even when
    police do obtain a warrant for a geofence, such a warrant is uncomfortably akin to the sort
    of “reviled” general warrants used by English authorities that the Framers intended the
    Fourth Amendment to forbid. Carpenter, 585 U.S. at 303 (quoting Riley, 573 U.S. at 403)
    (describing roots of the Fourth Amendment); see also Steagald v. United States, 
    451 U.S. 204
    , 220 (1981) (“The general warrant specified only an offense . . . and left to the
    discretion of the executing officials the decision as to which persons should be arrested and
    which places should be searched.” (citations omitted)). Now that the majority has
    eliminated the warrant requirement in cases like this one, police do not even need to
    “specif[y] . . . an offense” before they can conduct a geofence intrusion. 
    Id.
    It follows that the breadth portion of the first factor (comprehensiveness) and the
    second factor (retrospectivity) weigh in favor of concluding that the geofence intrusion in
    this case was a search under Carpenter.
    62
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 63 of 103
    3.
    Turning to the third factor, intimacy, Carpenter concluded that because CSLI
    captured “near perfect surveillance,” it uncovered information that was personally
    revealing and thus intimate. Carpenter, 585 U.S. at 312. As a result, this factor also favored
    the conclusion that the Fourth Amendment applied. Id. at 311–12. The same is true here.
    Just like CSLI, Location History provides near-perfect surveillance, enabling the
    government to reconstruct a “detailed and comprehensive record of [Chatrie’s]
    movements” for two hours. Id. at 309. The government could learn a great deal about
    Chatrie in those two hours: the geofence intrusion occurred in “a busy part of the Richmond
    metro area” between 3:50 pm and 5:50 pm. Chatrie, 590 F. Supp. 3d at 919, 925. That is
    when most people leave work or school and travel to their next destinations, carrying their
    phones into intimate spaces and engagements. A two-hour search could tour a person’s
    home, capture their romantic rendezvous, accompany them to any number of medical
    appointments, political meetings, strikes, or social engagements, or otherwise begin
    constructing their afternoon and early-evening routines. See J.A. 145 (Google LLC’s
    amicus brief filed in the district court, arguing that its users maintain a reasonable
    expectation of privacy in their Location History against a geofence intrusion, for there is
    “nothing limited” about a 2-hour geofence intrusion).
    This is not a mere supposition. At the suppression hearing, Chatrie’s defense
    counsel demonstrated that the identities of innocent users caught up in the geofence were
    easily deduced from the anonymized data that Google provided in Step 2. Chatrie, 590 F.
    Supp. 3d at 923–24. To make this showing, the defense took three users who were caught
    63
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 64 of 103
    in the geofence—that is, innocent individuals who just happened to be near the site of the
    robbery—and demonstrated that the data the police received from Google pursuant to its
    warrant retroactively tailed those individuals into private spaces: all three traveled to or
    from residences, one traveled to a school, and one traveled to a hospital. Id. at 923.
    Chatrie’s expert also showed how deductions from this information allowed him to easily
    uncover those individuals’ identities. Id. at 923–24.
    And, as noted above, it does not matter whether the intrusion here revealed intimate
    information about Chatrie personally. Carpenter did not mention any facts that the CSLI
    search revealed about the defendant in that case—rather, the Court assessed only whether
    the search could reveal intimate information unrelated to legitimate police needs.
    Carpenter, 585 U.S. at 311. The search here certainly could—and did.
    Simply put, there can be no doubt that “[a]s with [the] GPS information” in Jones,
    or the CSLI in Carpenter, “the time-stamped data” from a geofence intrusion “provides an
    intimate window into a person’s life, revealing not only his particular movements, but
    through them his ‘familial, political, professional, religious and sexual associations.’” Id.
    at 311 (quoting Jones, 
    565 U.S. at 415
     (Sotomayor, J., concurring)); accord Smith, 
    442 U.S. at 751
     (Marshall, J., dissenting) (recognizing that because people “value” privacy in
    basic activities, “the prospect of unregulated governmental monitoring [related to which
    phone numbers they dial] will undoubtedly prove disturbing even to those with nothing
    illicit to hide”). Additionally, because the geofence intrusion could enter constitutionally
    protected spaces, it by default could reveal intimate information. Kyllo, 
    533 U.S. at 37
    .
    64
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024       Pg: 65 of 103
    It is also of little importance that the intrusion here was of a shorter duration than in
    Carpenter. The government in Carpenter conducted two intrusions: it requested records of
    Carpenter’s movements over both a seven- and 152-day period, which respectively
    revealed two and 127 days of data. Carpenter, 585 U.S. at 302. The Court stated that the
    127 days of data provided an “intimate window into a person’s life” that revealed the litany
    of associations that Justice Sotomayor identified in her Jones concurrence. Id. at 311 (citing
    Jones, 
    565 U.S. at 415
     (Sotomayor, J., concurring)). But the 127-day figure was nowhere
    near outcome-determinative: Carpenter ultimately held that only two days of CSLI data
    was intimate enough to constitute a search. 
    Id.
     at 310 n.3. Even the two-day figure is not
    dispositive because the Court expressly limited its holding to the facts before it, and thus
    did not address whether a shorter search would invoke constitutional scrutiny. 
    Id.
    Moreover, the Court’s intimacy analysis relied on Justice Sotomayor’s concurrence in
    Jones, which argued that short-term searches are no less intimate by virtue of their limited
    duration. See 
    id.
     at 311 (citing Jones, 
    565 U.S. at 415
     (Sotomayor, J., concurring)).
    Indeed, Carpenter only mentioned two temporal periods in the main text of the
    opinion—it stressed repeatedly that CSLI records and stores data for “years,” id. at 312,
    313, 315, 319, and concluded that tracking over “127 days” creates a comprehensive
    record, id. at 311—while holding in a footnote that the much shorter duration of two days
    of data collection still constituted a search, id. at 310 n.3. So, the Court clearly focused on
    the character of the search, rather than its length. Location History operates the same way:
    like CSLI, Location History records and stores data for years, and it likewise provides
    nearly perfect, comprehensive surveillance. Thus, the fact that the intrusion here lasted
    65
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 66 of 103
    only two hours does not preclude a finding that it revealed intimate information or
    constituted a search.
    Finally, the majority opinion cites Knotts and this Court’s en banc holding in
    Leaders of a Beautiful Struggle v. Baltimore Police Department, in which this Court held
    that Baltimore’s weeks-long aerial-surveillance program constituted a Fourth Amendment
    search. The majority relies on these cases for the principle that only prolonged tracking
    like that in Beautiful Struggle—as opposed to “short-term tracking of public movements”
    like in Knotts—implicates the Fourth Amendment. Maj. Op. at 26 (quoting Leaders of a
    Beautiful Struggle v. Balt. Police Dep’t, 
    2 F.4th 330
    , 341 (4th Cir. 2021)). In the majority
    opinion’s view, the geofence intrusion at bar is like the one-trip beeper intrusion in Knotts,
    and hence not a search. 
    Id.
     at 19–20.
    But the majority opinion’s simplistic comparison to Knotts is inapt because it
    ignores the glaring differences between the beeper surveillance in Knotts and the vastly
    more sophisticated Location History technology here. Specifically, Knotts involved brief
    real-time public surveillance with a “rudimentary” technology that only augmented
    officers’ natural-born senses. Carpenter, 585 U.S. at 306 (describing Knotts). By contrast,
    a geofence intrusion involves a retrospective (for years), continuous, nearly perfect
    surveillance technology, which enters private areas and captures information historically
    unavailable to uninvited human senses.
    As elaborated on further below, infra at 93–97, Knotts and Beautiful Struggle
    involved the tracking of only public movements. Yet, as Carpenter held, intrusions into
    CSLI are categorically different from intrusions that only capture public movements. See
    66
    USCA4 Appeal: 22-4489         Doc: 63         Filed: 07/09/2024     Pg: 67 of 103
    Carpenter, 585 U.S. at 311–12. For all the reasons I’ve explained, the same is true of the
    Location History data in this case. The geofence intrusion here was so broad that it could
    have followed users through dozens of non-public spaces, including residences, religious
    spaces, and senior living facilities. Thus, the intrusion did not merely constitute a “short-
    term tracking of public movements.” Beautiful Struggle, 2 F.4th at 341 (emphasis added).
    In sum, Location History can reveal intimate information about an individual, so the
    third Carpenter factor favors a finding that police obtaining Location History data must
    obtain a warrant.
    4.
    The fourth Carpenter factor, ease of access, also favors this conclusion. Geofences,
    like CSLI searches, are “easy, cheap, and efficient compared to traditional investigative
    tools.” Carpenter, 585 U.S. at 311. As with CSLI, police conduct a geofence intrusion
    “[w]ith just the click of a button” that enables them to scour the continuous locations of
    numerous people in any area at any time—“at practically no expense.” Id.; see also Ohm,
    supra, at 369 (noting that cell phone location tracking is almost twice as cheap as GPS
    tracking, while GPS tracking is 28 times cheaper for police than covert pursuits). In fact,
    geofence intrusions are remarkably “easy” because Google does most of the work for the
    police.
    In considering this factor, Carpenter heeded the concerns raised in the Jones
    concurrences, which cautioned against enabling powerful leaps in police surveillance
    capabilities through practical advances. See Jones, 565 U.S. at 429–30 (Alito, J.,
    concurring in the judgment) (“In the precomputer age, the greatest protections of privacy
    67
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 68 of 103
    were . . . practical.”); id. at 416 (Sotomayor, J., concurring) (warning that government
    abuse would ensue from the unrestrained police power to use advanced and efficient,
    relatively low-cost technology). In his Jones concurrence, Justice Alito emphasized that if
    a digital search would have been exceptionally demanding and costly for police to replicate
    in the pre-digital age, then society does not reasonably expect that search to occur. Id. at
    429–30 (Alito, J., concurring in the judgment). A geofence intrusion certainly would have
    been impossible to replicate in the pre-internet age. So, it violates society’s privacy
    expectations.
    The fourth factor therefore favors the conclusion that police engage in a search when
    they obtain geofence data.
    5.
    The final factor to consider is voluntariness. To be sure, it is unclear whether
    Carpenter requires us to consider voluntariness at all. That’s because the Court expressly
    concluded that the defendant had a reasonable expectation of privacy in his CSLI records
    and that the third-party doctrine did not apply before it ever addressed voluntariness. See
    Carpenter, 585 U.S. at 313. However, in its summation at the end of the opinion, the Court
    stated that “[i]n light of the deeply revealing nature of CSLI, its depth, breadth, and
    comprehensive reach, and the inescapable and automatic nature of its collection, the fact
    that such information is gathered by a third party does not make it any less deserving of
    Fourth Amendment protection.” Id. at 320 (emphasis added). The reference to the
    “automatic nature of [the] collection” seemingly refers to voluntariness. This ambiguity is
    68
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 69 of 103
    expected: Carpenter deliberately left open to interpretation the precise contours of its
    analysis. See, e.g., Tokson, The Aftermath of Carpenter, supra, at 1798, 1800.
    At minimum, the Carpenter Court’s discussion of voluntariness in a separate
    rebuttal section—after the Court had already concluded the intrusion was a search—
    establishes that it is the least important factor in the overall analysis. See Matthew Tokson,
    Smart Meters as a Catalyst for Privacy Law, 72 Fla. L. Rev. F. 104, 112 (2022) (“Most
    scholars view involuntariness not as a requirement but as merely one factor among many
    examined in Carpenter. The Court’s discussion of the voluntariness issue . . . was mostly
    confined to a single paragraph in a lengthy opinion that largely focused on [other]
    factors[.]” (footnote omitted) (collecting scholarship)); Freiwald & Smith, supra, at 219
    (observing that Carpenter established a multiprong test made up of only the four primary
    factors already discussed).
    Assuming arguendo that voluntariness is a mandatory factor to be considered in the
    analysis of whether a police intrusion into digital records constitutes a search, it is clear for
    reasons explained below that Chatrie’s sharing of Location History was not meaningfully
    voluntary. Additionally, even if this factor slightly leans in the government’s favor, this
    factor’s contribution is marginal and insufficient to sway the balance of the factor-based
    test.
    Carpenter rejected an extension of the third-party doctrine to CSLI intrusions,
    noting that CSLI differs from the records in Smith and Miller in part because the
    conveyance of CSLI is involuntary. Carpenter, 585 U.S. at 315. That is, while Smith and
    Miller held that individuals had no reasonable privacy expectations in their bank records
    69
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 70 of 103
    and phone numbers dialed because they voluntarily (and often physically) conveyed those
    records to third-party companies, Carpenter reasoned that individuals do not “voluntarily”
    convey their CSLI data to third parties merely by using their cell phones—at least not in
    any “meaningful sense.” Id.
    In so concluding, the Court reasoned that cell phones are a ubiquitous part of modern
    life. And the Court reasoned that individuals convey CSLI to wireless companies by simply
    turning on their cell phones and connecting to the wireless network. After that, any cell
    phone activity generates CSLI.7 Id. So, because cell phones are prevalent in modern
    society, and cell phone use necessarily creates CSLI without much action or awareness by
    the user, the Court concluded the conveyance of CSLI data is not “meaningful[ly]”
    voluntary. Id.
    The sharing of Location History is likewise not “meaningful[ly]” voluntary. Id.
    First, like CSLI, once Location History is enabled, it is always generated and collected. In
    fact, Location History is even less voluntarily conveyed because it is conveyed
    automatically every two minutes, while CSLI is only conveyed when there is phone activity
    like an incoming text. And users are even less likely to be aware of the conveyance of
    Location History than they are CSLI because once users enable Location History, it is
    7
    Again, the government in Carpenter only collected the defendant’s CSLI data at
    the start and end of calls, and wireless companies likewise had long only collected CSLI
    data in those increments. Carpenter, 585 U.S. at 301, 302. But the Court recognized that
    “in recent years,” companies had also begun collecting CSLI from the transmission of text
    messages and routine data connections. Id. at 301. Although those advancements did not
    apply to Carpenter himself, the Court considered them in its analysis of voluntariness.
    70
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 71 of 103
    automatically conveyed across all devices on which a user is logged into Google, even
    when the user has deleted the Google app through which they opted into Location History.
    Thus, the ongoing conveyance of Location History is more automatic and less voluntary
    than CSLI.
    Compare that to the conveyances in Smith and Miller, in which individuals were
    much more aware that they were conveying information to third parties. In Smith, the
    individuals physically dialed each number they conveyed, and the phone company sent
    monthly bills listing some of the calls that the companies had collected. Smith, 
    442 U.S. at 742
     (noting users “see a list of their long-distance (toll) calls on their monthly bills”). And
    of course, in Miller, individuals had to physically convey checks and deposit slips to the
    bank. Miller, 
    425 U.S. at 442
    ; e.g., Alyssa Bentz, First in Online Banking, Wells Fargo
    History (last visited Apr. 1, 2024), https://history.wf.com/first-in-online-banking/
    [https://perma.cc/FRT2-XHRR] (noting that in 1984—eight years after Miller was
    decided—internet banking software had not been developed so customers “still had to input
    their [bank] transactions by hand”). The nature of such a physical conveyance differs
    drastically from a cell phone’s automatic conveyance every two minutes.
    Second, a substantial number of individuals generate Location History, just like
    CSLI. To be sure, Google’s Location History service tracks fewer Americans than does
    CSLI. Compare Chatrie, 590 F. Supp. 3d at 907 (Google did not provide specific numbers
    but revealed it tracks “numerous tens of millions” of users), with Carpenter, 585 U.S. at
    300 (noting that “[t]here are 396 million cell phone service accounts in the United States,”
    which is greater than the number of people). And the majority contends that the fact “[t]hat
    71
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 72 of 103
    two-thirds of active Google users have not enabled Location History is strong evidence”
    that opting in is voluntary. Maj. Op. at 22.
    But the use of technology is not per se voluntary just because the adoption of that
    technology is not as ubiquitous as the cell phone. Tens of millions of citizens opt into using
    technologies like Fitbit and Apple watches, health apps, journal apps (such as iPhone’s
    built-in Notes App), apps for tracking menstrual cycles, ChatGPT, and smart cars, and
    those technologies record the most intimate, retrospective information about them. See,
    e.g., William Gallagher, Apple Watch Sets New US Record, now Owned by 30% of iPhone
    Users, Apple Insider (Oct. 14, 2022), https://appleinsider.com/articles/22/10/14/apple-
    watch-sets-new-us-record-now-owned-by-30-of-iphone-users             [https://perma.cc/DJ2P-
    LR7B] (100 million active users of Apple Watch in 2022); Flo Health Inc. Company
    Update, March 2022, Flo Health (Mar. 16, 2022), https://flo.health/newsroom/flo-
    company-update [https://perma.cc/N7Q6-V3UF] (220 million downloads of popular
    menstrual-cycle app); Krystal Hu, ChatGPT sets record for fastest-growing user base -
    analyst note, Reuters (Feb. 2, 2023), https://www.reuters.com/technology/chatgpt-sets-
    record-fastest-growing-user-base-analyst-note-2023-02-01/           [https://perma.cc/R63F-
    EAPC] (100 million monthly users of ChatGPT within two months of launching).
    Google alone has 1.5 billion users worldwide. See NYU Technology Law & Policy
    Clinic Amicus Brief at 5 n.4. Even if only one-third opt into Location History, that is a
    whopping 500 million people, many of whom are Americans. And millions more opt into
    72
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 73 of 103
    substantially identical location tracking through other technologies.8 Far be it from me to
    tell hundreds of millions of Americans that they have waived their privacy rights with the
    State just because these invasive technologies are not fully automatic or because not every
    single user utilizes them.
    Third, the gloss of an opt-in checkbox does not render the enabling of Location
    History collection “meaningful[ly]” voluntary.9 Carpenter, 585 U.S. at 315. This one click
    8
    While Location History is Google-specific, millions of Americans use
    substantially similar technologies offered by other companies. In Carpenter, the Court
    referred to the total number of cell phone service accounts in the United States, as opposed
    to the number of accounts with the specific wireless company that the defendant used.
    Carpenter, 585 U.S. at 300, 302. Thus, the correct analysis in assessing whether a
    technology is widely adopted and hence “indispensable to participation in modern society,”
    id. at 315 (quotation omitted), is to consider the total number of users of substantially
    similar technologies.
    9
    According to the majority, a user must (1) enable location sharing on their device;
    (2) enable the “Location Reporting” feature; (3) sign into Google; and (4) opt into the
    Location History setting. But the district court made no mention of, nor any findings of
    fact regarding, the enabling of location sharing or Location Reporting (the majority’s
    requirements 1 and 2). See Chatrie, 590 F. Supp. 3d at 907–12. Rather, the district court
    concluded that users enable the Location History feature solely by opting into Location
    History and logging into their Google accounts.
    Even if all four steps were required to enable Location History, the record indicates
    that these steps may be accomplished in the first few moments of setting up and using an
    Android device. Chatrie used a standard Android cell phone with Google’s operating
    system. That type of phone comes out of the box with the location-sharing setting enabled
    by default, thus automatically satisfying requirement (1). Next, the record indicates that by
    enabling Location History, users can also automatically opt-in to Location Reporting. So,
    requirements (2) and (4) are not necessarily two separate steps; they can be completed with
    one click.
    Likewise, one of the first steps in setting up an Android is to log into or create a
    Google account. Indeed, if users choose not to log into Google, they cannot use most of
    the Android’s features such as downloading apps, music, and games; accessing Google
    (Continued)
    73
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 74 of 103
    does not meaningfully inform users that they are surrendering “a comprehensive dossier of
    [their] physical movements.” Id.
    Instead, the pop-up text that appears when Google prompts users to opt in explains
    only that Location History “[s]aves where you go with your devices,” and that “[t]his data
    may be saved and used in any Google service where you were signed in to give you more
    personalized experiences. You can see your data, delete it and change your settings at
    account.google.com.” Chatrie, 590 F. Supp. 3d at 911–12. Below that, the screen provides
    the options: “NO, THANKS” or a brightly highlighted “TURN ON.” Id. at 912. It also
    presents a small expansion arrow, which, if tapped by the user, displays more information
    about Location History.10 But a user does not need to click the expansion arrow to opt into
    Location History. They can just click “TURN ON.” Through that click, Location History
    is enabled.
    Maps; or syncing services like Calendar and Contacts. The district court found that Google
    repeatedly prompts its millions of Android users to opt-in to Location History both upon
    initial set-up and then “multiple times across multiple apps.” Id. at 908–09 (cleaned up).
    For example, “Google may prompt the user to enable Location History first in Google
    Maps, then again when he or she opens Google Photos and Google Assistant for the first
    time.” Id. at 909 (emphasis added). Thus, requirement (3) is also satisfied quickly and
    without reference to Location History.
    10
    The expansion arrow reveals the following additional information: “Location
    History saves where you go with your devices. To save this data, Google regularly obtains
    location data from your devices. This data is saved even when you aren’t using a specific
    Google service, like Google Maps or Search. . . . This data may be saved and used in any
    Google service where you were signed in to give you more personalized experiences.”
    Chatrie, 590 F. Supp. 3d at 912.
    74
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 75 of 103
    The district court noted that this pop-up “did not detail . . . how frequently Google
    would record [a user’s] location . . . ; the amount of data Location History collects
    (essentially all location information); that even if he ‘stopped’ location tracking it was only
    ‘paused’ . . . ; or, how precise Location History can be (i.e., down to twenty or so meters).”
    Id. at 936 (cleaned up). Nor did it inform users that Google would automatically and
    precisely track their location even when they were not doing anything on their phones, or
    that this tracking would occur across all devices on which they were logged in—not just
    those on which they opted in—even when they have deleted the respective Google app. Id.
    at 909–12 (quoting terms); see id. at 909 n.11, 913–14 & n.16 (discussing wide criticism
    of Google because its Location History opt-in and opt-out procedures were unclear to
    users); cf. Jones, 
    565 U.S. at
    417 n.* (Sotomayor, J., concurring) (“[S]mart phone[]
    [owners] do not contemplate that these devices will be used to enable covert surveillance
    of their movements.”).
    I agree with the district court’s conclusion that the warnings provided by Google are
    “limited and partially hidden” and that it is “plain that these ‘descriptive texts’ are less than
    pellucid.” Chatrie, 590 F. Supp. 3d at 936. Simply put, the pop-up box lacked sufficient
    information for users to knowingly opt into Location History. Smartphone users are
    bombarded with opt-in buttons and terms of service in their daily phone use. Few actually
    read the terms, and, without reasonably clear descriptions, most users do not understand
    what they are approving. See Jones, 
    565 U.S. at 417
     (Sotomayor, J., concurring) (pointing
    out that Americans are revealing intimate information during “mundane” tasks); Research
    Shows Mobile Phone Users Do Not Understand What Data They Might Be Sharing, Sci.
    75
    USCA4 Appeal: 22-4489      Doc: 63           Filed: 07/09/2024    Pg: 76 of 103
    Daily                         (May                          9,                         2023),
    https://www.sciencedaily.com/releases/2023/05/230509122057.htm [https://perma.cc/54
    V5-Y49P] (discussing study that showed a substantial portion of users do not understand
    how phone and app tracking works).
    Further, while the majority opinion argues that users can delete information, see
    Maj. Op. at 20, that is easier said than done. To delete their Location History, a user has
    “only one option”: they must visit the proper website, locate their timeline, and delete their
    data. Chatrie, 590 F. Supp. 3d at 913. And the deletion of past Location History data will
    not turn off the collection of additional Location History data. As the district court
    indicated, the process of enabling, pausing, and deleting Location History is not transparent
    to users. See id. at 913–14, 936; see also id. at 913 (finding that Google falsely told users
    that pausing Location History will limit the functionality of Google services).
    For instance, the district court quoted an internal email by a Google staffer who
    expressed their frustration that the Location History interface is “difficult enough that
    people won’t figure . . . out” how to turn off the feature. Id. at 913. The district court
    determined that the sentiment in that email is “certainly not inconsistent with the record
    before the Court.” Id. What’s more, around the time Chatrie enabled the feature, Google
    faced criticism from members of Congress, the media, and Norway’s Consumer Protection
    76
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 77 of 103
    Committee for the lack of transparency in how users enable or disable Location History.
    See id. at 909 n.11; id. at 913–14; id. at 913 n.16.11
    The explosive growth of the usage of new technologies, such as smartphones,
    illustrates a certain level of comfort among the American populace in entrusting personal
    information to technology companies like Google. But that does not mean such trust
    extends to the State or that the American populace has ceded its reasonable expectation of
    privacy in that information. Americans might expect that companies provided with their
    information will, at most, barrage them with advertisements. The State, by contrast, holds
    a monopoly on licit violence and detainment. It is a grave misjudgment to conflate an
    individual’s limited disclosure to Google with an open invitation to the State. See Jones,
    
    565 U.S. at 418
     (Sotomayor, J., concurring) (“I would not assume that all information
    voluntarily disclosed to some member of the public for a limited purpose is, for that reason
    alone, disentitled to Fourth Amendment protection.”); Smith, 
    442 U.S. at 749
     (Marshall, J.,
    dissenting) (“Privacy is not a discrete commodity, possessed absolutely or not at all. Those
    11
    The majority opinion argues that the evidence is “nonexistent” that pausing or
    deleting Location History is easier said than done. Maj. Op. at 35 n.30. But the majority
    provides no evidence of its own that pausing and deleting Location History is a reasonable
    process for users, beyond stating conclusively that users can figure it out. 
    Id.
     at 20–21, 35
    n.30. And to the contrary, criticism from the news media, congressional members, a
    consumer-protection group, and Google staffers themselves regarding the difficulty of
    pausing or deleting Location History certainly constitutes evidence of the same. Moreover,
    though the district court did not conduct fact-finding on this issue, it did conclude that such
    criticisms appeared consistent with the record and that Google’s warnings were “less than
    pellucid.” Chatrie, 590 F. Supp. 3d at 936, 913.
    77
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 78 of 103
    who disclose certain facts to a bank or phone company for a limited business purpose need
    not assume that this information will be released to other persons for other purposes.”).
    As noted, Carpenter endorses a normative understanding of modern technology and
    with it a normative understanding of voluntariness. See Carpenter, 585 U.S. at 315
    (concluding that “in no meaningful sense does the [cell phone] user voluntarily assume the
    risk of turning over a comprehensive dossier of his physical movements” (emphasis added)
    (cleaned up)). Although bank records and the dialing of phone numbers are similarly
    central to participation in modern society, the Court in Carpenter opted to treat the
    conveyance of CSLI as uniquely involuntary. This demonstrates a recognition that modern
    technology, particularly that which tracks an individual’s location, warrants heightened
    privacy requirements.
    In sum, even if voluntariness might be considered as a factor in the Carpenter test,
    the conveyance of Location History data to third parties is not meaningfully voluntary. And
    even assuming arguendo that it is marginally more voluntary than the conveyance of CSLI
    was in Carpenter, the balance of the Carpenter factors nonetheless strongly supports the
    conclusion that the geofence intrusion constituted a search.
    ***
    Because the balance of the Carpenter factors shows that Location History is
    qualitatively different from the records that police could traditionally obtain without a
    warrant, Chatrie had a reasonable expectation of privacy in his Location History data, and
    the government conducted a search by accessing it. In the context of this novel technology,
    78
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 79 of 103
    the third-party doctrine is wholly inadequate to defeat that reasonable expectation. While
    geofence intrusions may be a boon to law enforcement, they still require a warrant.
    B.
    My friends in the majority rest their contrary holding on Section III(B) of Carpenter,
    in which the Court rebutted the government’s insistence that Smith and Miller should
    resolve the case. In so doing, the majority decision holds that the proper analysis under
    Carpenter is a direct analogy to the third-party doctrine established by Smith and Miller.
    See Maj. Op. at 22 (“The third-party doctrine . . . squarely governs this case.”).
    But Carpenter affirmatively rejected a “straightforward application” of Smith and
    Miller, establishing that analogizing the third-party cases to “qualitatively different”
    records like CSLI and Location History is misguided. Carpenter, 585 U.S. at 309, 314; see
    id. at 314 (“The Government . . . is not asking for a straightforward application of the third-
    party doctrine, but instead a significant extension of it to a distinct category of
    information. . . . In mechanically applying the third-party doctrine to this case, the
    Government fails to appreciate that there are no comparable limitations on the revealing
    nature of CSLI.” (emphasis added)); see also id. at 313 (rejecting Government’s argument
    that “cell-site records are fair game because they are ‘business records’ created and
    maintained by the wireless carriers”).
    Thus, Smith and Miller do not control here because the Carpenter Court rejected a
    simplistic analogy to those cases when dealing with advanced digital surveillance. Further,
    even if such an analogy were proper, the nature of the records collected here is
    incomparable to those in third-party cases like Smith and Miller so the application of the
    79
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 80 of 103
    third-party doctrine fails. Indeed, the third-party doctrine has two requirements: first, the
    nature of the documents sought by police must be unrevealing business records like those
    in Smith and Miller, and second, the conveyance to the third-party company must be
    meaningfully voluntary. As Carpenter emphasized, “Smith and Miller . . . did not rely
    solely on the act of sharing. Instead, [those decisions] considered ‘the nature of the
    particular documents sought’ to determine whether ‘there is a legitimate “expectation of
    privacy” concerning their contents.’” Id. at 314 (quoting Miller, 
    425 U.S. at 442
    ). So even
    if the conveyance of Location History was voluntary, the Carpenter Court repeatedly
    stressed that the nature of location data derived from a smart phone—such as the CSLI data
    in Carpenter, or the Location History data here—is simply incomparable to that sought in
    Smith and Miller.
    In analyzing the “nature of the particular documents sought” in this case, the
    majority decision instead concludes that the geofence intrusion here was “far less revealing
    than that obtained in Jones, Carpenter, or Beautiful Struggle and more like the short-term
    public movements in Knotts.” Maj. Op. at 19–20.
    But that’s an improper comparison. Instead, the proper comparison in applying the
    third-party doctrine would be to the bank documents and pen register in the third-party
    cases, Smith and Miller—not to the public-surveillance cases cited in the majority decision.
    E.g., Carpenter, 585 U.S. at 313–14 (comparing CSLI to the documents in Smith and
    Miller); id. at 306 (distinguishing public surveillance and third-party doctrine cases); Smith,
    442 U.S. at 741–43 (addressing nature of records); Miller, 425 U.S. at 440–43 (same). The
    80
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 81 of 103
    majority opinion’s failure to grapple with Smith and Miller, while insisting that “[t]he third-
    party doctrine . . . squarely governs this case,” Maj. Op. at 22, is telling.
    As discussed above, the Carpenter Court took great pains to emphasize that the
    nature of technology like CSLI is “unique,” “an entirely different species,” “a qualitatively
    different category” of information, and data that represents a “seismic shift[]” in
    technology as compared to the phone numbers dialed and bank records in Smith and Miller.
    Carpenter, 585 U.S. at 309, 313, 318. And as my analysis has shown, the first four
    Carpenter factors demonstrate that the “nature” of Location History, like CSLI, differs by
    orders of magnitude from the records at issue in the third-party cases.
    Beyond that, Carpenter rejected the application of the third-party doctrine by
    explaining that the third-party cases relied on the unrevealing nature of the documents
    sought. Id. at 313–14. For instance, Carpenter explained, the Smith Court stressed that the
    phone numbers lacked any content or “identifying information” in holding there was no
    reasonable expectation of privacy. Id. at 314 (cleaned up); see also Smith, 
    442 U.S. at 741
    .
    By contrast, Location History, like the CSLI in Carpenter, reveals that information.
    Thus, “[s]uch a chronicle implicates privacy concerns far beyond those considered in Smith
    and Miller.” Carpenter, 585 U.S. at 315. Carpenter emphasized that unless courts
    recognize this difference, they will “fail[] to appreciate that there are no comparable
    limitations on the revealing nature of CSLI.” Id. at 314. So too here. Carpenter hence
    rejected the view that the nature of personal-location data matches that of traditional bank
    or phone records, urging courts to consider the context of Smith and Miller’s analyses.
    81
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 82 of 103
    Thus, even if the conveyance of Location History was voluntary, the first prong of
    the third-party-doctrine test—the nature of the records conveyed—is nowhere near
    satisfied and the application of the doctrine here fails. Accordingly, Carpenter compels the
    conclusion that the police intrusion into Chatrie’s Location History data constituted a
    Fourth Amendment search.12
    III.
    Before concluding, I respond to what the majority opinion structures as a lengthy
    separate opinion that responds to my dissent, Maj. Op. at 23–35.
    Extrajudicially, the majority’s separate opinion claims that Carpenter’s factor-
    based test was “concocted” from thin air. Id. at 24. Instead, the majority opinion believes
    that (1) Carpenter should be read narrowly to apply only the “established” privacy
    principles pronounced in Jones, id. at 25; (2) employing a factor-based test would
    “abandon[]” all pre-Carpenter case law, id. at 23, 31; and (3) despite the Carpenter Court’s
    warnings about applying old tests to new technologies, the third-party doctrine can
    nonetheless definitively settle this case, id. at 31–35. All three beliefs are unsound.
    12
    The government did obtain a warrant in this case. But I agree with the lower court
    that the warrant here was so lacking in particularity and probable cause that it was invalid.
    Chatrie, 590 F. Supp. 3d at 927. And the good-faith exception to the warrant requirement
    does not apply because the warrant lacked any indicia of probable cause. The government’s
    proposed justification—that the robber used a cell phone and a cell phone could have
    Google Location History turned on—is extremely broad. Also, the government did not
    limit the scope of the warrant to an area reasonably related to the bank robbery.
    Accordingly, a reasonable officer could not have relied on the warrant in good faith. I
    would thus grant Chatrie’s Motion to Suppress the evidence that resulted from the geofence
    search.
    82
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024     Pg: 83 of 103
    A. Carpenter Established a Multifactor Analysis
    In an attempt to restructure the Supreme Court’s holding in Carpenter, the majority
    folds that decision into Jones, saying that Jones had established certain rules regarding the
    privacy implications of digital technology and first identified the relevant factors, and that
    Carpenter merely applied those rules and factors. See id. at 24 (claiming that Carpenter
    simply “appl[ied] the principles announced in the location-tracking cases”); id. at 25
    (asserting that Jones considered unique qualities of GPS technology like that it is “detailed,
    encyclopedic, and effortlessly compiled,” and Carpenter merely “applied” those
    “established principles” to CSLI). So, with that, the majority declares that Carpenter
    accomplished nothing new.
    But that’s wrong. As we acknowledged in Beautiful Struggle, Jones “was ultimately
    decided on trespass principles.” Beautiful Struggle, 2 F.4th at 341. Indeed, the Jones
    majority analyzed only the trespass doctrine, expressly declining to consider the privacy
    implications of a GPS intrusion under Katz. Jones, 565 U.S. at 406–07. Significantly, it
    was the concurring justices in Jones who pointed out the unique attributes of GPS
    technology and argued that the Katz reasonable-expectation-of-privacy test could have
    decided the case.
    Specifically, in his concurring opinion, Justice Alito, joined by three other Justices,
    argued that the long-term GPS intrusion in Jones violated Katz because society did not
    historically expect police to conduct such prolonged surveillance on public streets due to
    practical limitations like cost. Id. at 429–30 (Alito, J., concurring in judgment). And it was
    Justice Sotomayor who, writing alone, discussed several unique attributes of GPS—that it
    83
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024       Pg: 84 of 103
    is precise, comprehensive, intimate, retrospective, and cheap—and argued that those
    attributes implicate the Katz analysis for even short-term GPS surveillance. Id. at 415–16
    (Sotomayor, J., concurring). So, it was the concurrences in Jones—and particularly that of
    Justice Sotomayor, writing alone—that recognized the unprecedented power of modern
    location-tracking technology and argued for the need to adjust Fourth Amendment
    protections to maintain traditional privacy expectations against such technologies. But,
    prior to Carpenter, that view was not binding precedent.
    Carpenter hence broke new ground: it placed the principles proposed in the Jones
    concurrences (the four-justice opinion of Justice Alito coupled with the concurring opinion
    of Justice Sotomayor) into a majority opinion and articulated how location data obtained
    from a cell phone is different from traditional modes of surveillance. As explained, the
    Carpenter majority derived most of its factor-based test from Justice Sotomayor’s lone
    concurrence in Jones. In addition, Carpenter marked the first time that the Court in a
    majority opinion recognized a privacy interest in the “whole of [a person’s] physical
    movements,” and it weighed those factors to analyze that interest. Carpenter, 585 U.S. at
    310. So, Carpenter marked a new era of Fourth Amendment jurisprudence even as it built
    on the cases that came before it, setting forth how we must think about the Fourth
    Amendment in the context of modern technology.
    Thus, the majority opinion’s claim that Carpenter merely “applied established
    principles” is wrong. Maj. Op. at 25. And to confirm that, we need to look no further than
    the Carpenter opinion itself, which explicitly stated that its decision “d[id] not fit neatly
    under existing precedents.” Carpenter, 585 U.S. at 306. That statement alone should end
    84
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024       Pg: 85 of 103
    this discussion but in the interest of completeness, I will respectfully address the remainder
    of the majority opinion’s complaints about Carpenter’s multifactor analysis.
    The majority opinion scoffs that the factor-based test does not exist. Maj. Op. at 23–
    26. But this dissent’s analysis of the test comes directly from Carpenter’s text, in which
    the Supreme Court took great pains to make clear that the third-party doctrine cannot
    extend to novel technologies like CSLI that have the qualities the Court identified. The
    Court’s efforts were apparently in vain, however, because the majority opinion continues
    to “mechanically apply[] the third-party doctrine” in defiance of the Supreme Court’s
    repeated and express commands not to do so. Carpenter, 585 U.S. at 314.
    Remarkably, while alleging that this dissenting opinion’s analysis lacks any basis
    in Carpenter, the majority opinion simultaneously complains that this dissent quotes
    Carpenter too much—particularly the Court’s language stressing the distinct nature of
    CSLI and directing courts to move away from past doctrine when analyzing such
    technology. See Maj. Op. at 24 & n.21. That’s just poppycock. Instead of engaging with
    the substance of the Supreme Court’s quoted language that forms most of Carpenter’s
    analysis, the majority answers by essentially saying we should ignore that language.
    Still further, the majority opinion posits that the “‘factors’ identified by [this] dissent
    . . . were not factors at all” but were instead “attributes” of CSLI that “implicated the
    privacy interest recognized by the concurring Justices in Jones.” Id. at 25. That is a
    distinction without a difference. In other words, although the majority quibbles about how
    to characterize the Court’s analysis (factors vs. attributes), it recognizes that those factors
    (or attributes) are derived directly from Carpenter’s text. For example, the majority agrees
    85
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 86 of 103
    that the CSLI in Carpenter implicated the reasonable-expectation-of-privacy test because
    the CSLI had “immense capabilities”: that is, it “provided a ‘comprehensive record’ of [the
    defendant’s] movements, which revealed intimate details of his life . . . . And the
    retrospective nature of CSLI and the ease by which it could be accessed only augmented
    these privacy concerns, for no comparable record of a person’s movements was available
    to law enforcement in a pre-digital age.” Id. (emphases added) (quoting Carpenter, 585
    U.S. at 309). Because CSLI had each of those qualities, the majority opinion concedes,
    “CSLI warranted Fourth Amendment protection.” Id.
    In so conceding, the majority opinion applies the exact factors I recognize in this
    dissent, pointing out that, post-Carpenter, we consider comprehensiveness, intimacy,
    retrospectivity, and ease when determining whether a digital intrusion violates the Fourth
    Amendment. So, whether we call the qualities that we weigh “attributes” or “factors” is
    immaterial. As explained, supra at 48–49, the Carpenter Court did not expressly state that
    it created a factor-based test; it identified the qualities of CSLI that informed its holding.
    The legal community—including three of the dissenting Justices on the Carpenter Court,
    see Carpenter, 585 U.S. at 340 (Kennedy, J., joined by Thomas and Alito, JJ., dissenting)—
    has concluded that those qualities created a factor-based test.
    So the factor-based test is certainly not the “creative[]” project of this dissenting
    opinion, as the majority suggests. Maj. Op. at 32 n.27; accord id. at 24 (characterizing this
    dissent’s “pronouncements” as “bold” and its “framework” as “novel”); id. (criticizing this
    dissent for “combin[ing] . . . ingredients” from Carpenter to “create[] a new inquiry from
    scratch” in order to—“voila!”—find that a search occurred); id. at 35 (arguing that this
    86
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 87 of 103
    dissent’s test is “novel” and “unwieldy”). Instead, it represents the scholarly consensus that
    Carpenter diverged from existing precedent and created a new, multifactor analysis. In
    addition to the leading authorities this dissenting opinion has already cited, see supra at
    49–50 (first citing Ohm, supra, at 363, 369; then citing Freiwald & Smith, supra, at 219;
    and then citing Tokson, The Aftermath of Carpenter, supra, at 1830), numerous other
    scholars and authorities to have considered the issue have concluded the same, see, e.g.,
    Sherwin Nam, Bend and Snap: Adding Flexibility to the Carpenter Inquiry, 
    54 Colum. J.L. & Soc. Probs. 131
    , 132 (2020) (stating that Carpenter “broke new ground in the
    constitutional right to privacy in electronic data” and employed a “five-factor” test); Helen
    Winters, An (Un)reasonable Expectation of Privacy? Analysis of the Fourth Amendment
    When Applied to Keyword Search Warrants, 
    107 Minn. L. Rev. 1369
    , 1381, 1390 (2023)
    (stating Carpenter “marked a new period of Fourth Amendment jurisprudence” and
    described “several factors relevant to its decision”); Antony Barone Kolenc, “23 and
    Plea”: Limiting Police Use of Genealogy Sites After Carpenter v. United States, 
    122 W. Va. L. Rev. 53
    , 71–72 (2019) (concluding that Carpenter “alter[ed] Fourth Amendment
    law” by recognizing a privacy interest in the “whole of a person’s physical movements,”
    and “balanced five factors” to analyze that interest); Allie Schiele, Learning from Leaders:
    Using Carpenter to Prohibit Law Enforcement Use of Mass Aerial Surveillance, 91 Geo.
    Wash. L. Rev. Arguendo 14, 17–18 (2023) (pointing out “Carpenter’s focus on five central
    factors”); Nicole Mo, If Wheels Could Talk: Fourth Amendment Protections Against Police
    Access to Automobile Data, 
    98 N.Y.U. L. Rev. 2232
    , 2251 (2023) (recognizing factors);
    Luiza M. Leão, A Unified Theory of Knowing Exposure: Reconciling Katz and Carpenter,
    87
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 88 of 103
    
    97 N.Y.U. L. Rev. 1669
    , 1684 (2022) (same); Matthew E. Cavanaugh, Somebody’s
    Tracking Me: Applying Use Restrictions to Facial Recognition Tracking, 
    105 Minn. L. Rev. 2443
    , 2468 (2021) (same).
    Finally, the majority opinion laments that the multifactor analysis only works if
    Carpenter created a test “from scratch.” 
    Id. at 24
    . But that is far from the case.
    Rather, Carpenter articulated the factors as a way to analyze whether an individual
    has a reasonable privacy expectation in their digital location data. So, the Court applied the
    long-standing Katz standard, but it adapted the Katz analysis for digital data like CSLI to
    preserve privacy protections against encroaching technologies—which, as Carpenter
    explained, the Court has done throughout its Fourth Amendment jurisprudence. Carpenter,
    585 U.S. at 304–05 (noting that the Court “ha[s] kept . . . Founding-era understandings [of
    privacy] in mind when applying the Fourth Amendment to innovations in surveillance
    tools” and citing cases in which the Court “rejected . . . a ‘mechanical interpretation’ of the
    Fourth Amendment” for novel surveillance tools (citations omitted)).
    Thus, Carpenter’s analysis began by providing this context and explaining the
    Court’s enduring understanding that expansive technologies require heightened
    protections. 
    Id.
     at 304–05. In so doing, the Court situated the remainder of its analysis
    within that context. And the Court repeated those sentiments throughout the opinion. The
    majority opinion ignores these critical aspects of Carpenter.
    Carpenter also acknowledged the Court’s existing third-party-doctrine precedent
    but explained that the Carpenter factors render the “nature” of CSLI markedly different
    from the nature of the documents in the third-party cases. 
    Id.
     at 308–10. In addition, the
    88
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024     Pg: 89 of 103
    Court’s opinion incorporated ideas about technology and privacy from past cases like
    Kyllo, Riley, and the Jones concurrences. E.g., 
    id.
     at 310–13. For these reasons,
    Carpenter’s multifactor analysis was “informed” by case law and adapted for a new era.
    
    Id. at 305
    .
    But not to be deterred even in a world ever transfigured by technology, the majority
    opinion apparently wants to scold the Carpenter Court for stepping beyond the shadows of
    Knotts, Smith, and Miller when faced with surveillance technology that is not only different
    in degree, but different in kind. I must disagree, because the Supreme Court’s analysis in
    Carpenter aptly reflects the traditional evolution of law. That is, the Supreme Court wisely
    moved beyond its decades-old precedent to reiterate that it is not required to robotically
    copy and paste precedent when dealing with novel issues arising from changing
    technology.
    Nonetheless, the majority opinion contends that the Supreme Court could not have
    possibly “abandoned” Knotts, Jones, Smith, and Miller in the face of new technology. Maj.
    Op. at 23, 31. I agree that the Supreme Court did no such thing. That’s because Jones was
    resolved under trespass principles; Knotts involved surveillance of a suspect during one
    trip on public roads using what Carpenter called a “rudimentary” beeper, Carpenter, 585
    U.S. at 306; and Smith and Miller involved police obtaining bank records and dialed phone
    numbers, which Carpenter emphasized were “a world” apart from data like CSLI and
    Location History, id. at 314.
    Thus, Carpenter did not “abandon” Knotts, Smith, and Miller—instead, it explained
    that they do not neatly apply to technologies like CSLI and Location History. In so holding,
    89
    USCA4 Appeal: 22-4489       Doc: 63        Filed: 07/09/2024       Pg: 90 of 103
    Carpenter acknowledged a simple truth: the digital age does not strip us of our
    Constitutional protections.
    And this principle is not what the majority calls a radical departure because it is no
    more revolutionary than the novel acknowledgments in Katz that the “Fourth Amendment
    protects people, not places,” or in Riley that our cell phones are not merely external
    attachments, but intimate extensions of our private lives. Id. at 304–05 (first quoting Katz,
    
    389 U.S. at 351
    ; and then citing Riley, 573 U.S. at 393). At bottom, Carpenter binds this
    Court and we must follow it.
    B. The Complete Third-Party Analysis, Intimacy, and Standing
    The majority opinion also complains that the Location History intrusion at bar did
    not reveal information as intimate as that in Carpenter and Beautiful Struggle, and that the
    use of Location History is voluntary. Maj. Op. at 26–35. Relatedly, the majority opinion
    reiterates that even if the intrusion entered private spaces, Chatrie lacked Fourth
    Amendment standing to challenge it because, as far as we know, it did not enter his
    protected spaces.
    In other words, the majority opinion emphasizes two of Carpenter’s five factors
    (intimacy   and     voluntariness)—but     it    ignores   the   remaining   three    factors
    (comprehensiveness, in terms of both depth and breadth; retrospectivity; and efficiency),
    likely because they weigh indisputably in Chatrie’s favor. It likewise ignores the other
    prong of the third-party doctrine, the nature of the documents sought, which similarly
    forecloses the use of that doctrine. I address the third-party doctrine before discussing
    intimacy.
    90
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 91 of 103
    1.
    First, take the third-party doctrine. As the majority makes clear, it believes that the
    use of Location History is meaningfully voluntary because the average user should know
    from Google’s popups, which the district court called “limited and partially hidden” and
    “less than pellucid,” that Google will infinitely track the user’s Location History data.
    Chatrie, 590 F. Supp. 3d at 936. But nothing in the majority opinion’s lengthy response to
    my dissent addresses the first requirement of the third-party doctrine—the nature of the
    documents collected. The third-party doctrine has two requirements. First, the “nature of
    the particular documents sought” must be akin to the unrevealing business records (the
    phone numbers dialed and bank records) at issue in Smith and Miller. Carpenter, 585 U.S.
    at 314 (quoting Miller, 
    425 U.S. at 442
    ). Second, those records must be voluntarily
    conveyed to the third-party business. 
    Id.
    As discussed above, the majority opinion’s third-party-doctrine analysis is flawed
    because it wrongly compares the “nature of the documents” at issue here to the nature of
    the surveillance in Knotts (outdoor beeper surveillance), Jones (outdoor GPS-tracker
    surveillance), and Beautiful Struggle (outdoor aerial surveillance), even though those cases
    did not involve the conveyance of records to third parties. Rather, to properly apply the
    third-party doctrine, we must compare the nature of the documents in this case to those in
    the third-party doctrine cases, i.e., Smith and Miller. By instead selecting inapt
    comparators, the majority opinion crafts a Frankensteinian analysis that lacks a basis in
    precedent or logic. And while it insists that the third-party doctrine “squarely” applies here,
    91
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 92 of 103
    Maj. Op. at 22, the majority opinion ignores comparisons to the documents in the third-
    party doctrine’s seminal cases.
    As Carpenter stressed, the nature of CSLI and Location History data today is miles
    apart from that of phone and bank records in the 1980s. Because the first prong of the third-
    party doctrine fails, so too does the application of the doctrine to this case. So, a
    straightforward application of the doctrine mandates the conclusion that a Fourth
    Amendment search occurred here.
    2.
    The majority opinion next relies on Beautiful Struggle, in which this Court held that
    Baltimore’s weeks-long public aerial surveillance constituted a Fourth Amendment search,
    to conclude that the two-hour intrusion at bar could not gather data that was sufficiently
    intimate so as to implicate the Fourth Amendment. Thus, the majority opinion argues that,
    unlike the longer intrusion in Beautiful Struggle, the intrusion here was too short to reveal
    intimate information and thus was not a search. Maj. Op. at 26–29. In so arguing, the
    majority opinion expounds on its assertion that Chatrie lacked standing to challenge the
    intrusion if it did not enter his private spaces. 
    Id.
     at 30–31. These arguments relate to the
    majority opinion’s final objection that Beautiful Struggle did not recognize any factor-
    based inquiry from Carpenter, and thus, the majority opinion reasons, one does not exist.
    
    Id.
     at 25–26.
    These arguments fall flat. As I explain, the intimacy discussion in Beautiful Struggle
    does not foreclose a finding of intimacy here because that case involved technology that
    was only capable of surveillance of public movements. And the majority opinion
    92
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 93 of 103
    misrepresents that Beautiful Struggle did not recognize any factor-based test from
    Carpenter because that opinion expressly applied the Carpenter factors.
    As a threshold matter, however, the majority opinion’s argument is unclear. It
    claims that Carpenter did not apply any multifactor analysis, and that Beautiful Struggle
    instead established its own test: a search occurs when police “use technology to monitor
    [an individual’s] long-term movements, but not when they glimpse only his short-term
    movements.” Id. at 26. In other words, the majority opinion remarkably proposes that the
    Fourth Amendment only considers whether an intrusion using modern technology was long
    or short. But then the majority opinion informs us that “Location History has capabilities
    much like GPS data and CSLI,” id. at 29, seemingly referring to the Carpenter factors,
    which should be irrelevant to the supposedly sole question of an intrusion’s length. And,
    as noted, in another portion of its response to my dissent, the majority opinion tellingly
    applies the Carpenter factors itself. Id. at 25. In essence, the majority opinion flip-flops to
    reach a desired outcome. I nonetheless respond to its arguments.
    a.
    The majority opinion’s argument that Beautiful Struggle forecloses a finding of
    intimacy for all relatively short intrusions misconstrues the opinion and stretches it further
    than the opinion can bear. To explain why Beautiful Struggle is not on point, I begin with
    some background.
    In Beautiful Struggle, the Court considered Baltimore’s aerial-surveillance program,
    which monitored only public spaces and stored that data for forty-five days. The aerial
    surveillance generally gathered hours-long chunks of surveillance during the day, and only
    93
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 94 of 103
    showed individuals as anonymous, blurry pixels. Beautiful Struggle, 2 F.4th at 334, 340.
    As a result, the government had to decipher individuals’ identities from several pieces of
    captured data. Id. at 334.
    The key distinction between Baltimore’s program and CSLI or Location History is
    that it strictly captured public movements. The Supreme Court has long held that
    individuals have a diminished privacy expectation in public spaces. See Katz, 
    389 U.S. at 351
    . As part of this diminished privacy expectation, the Court recognized in Knotts that
    beeper surveillance of one public trip did not implicate the Fourth Amendment. Knotts,
    
    460 U.S. at 285
    . Crucial to the Knotts Court’s holding, however, was the beeper’s
    rudimentary capabilities that merely augmented human senses, such that the surveillance
    mirrored that of a passerby watching the defendant on the street. See Carpenter, 585 U.S.
    at 306–07.
    So, in analyzing the public surveillance in Beautiful Struggle, this Court had to begin
    with the tenet that one has a diminished privacy expectation in public, then to ask whether
    the surveillance was so invasive as to breach that diminished privacy expectation. And, if
    the intrusion was to be considered a Fourth Amendment search, it would have to be more
    invasive than that in Knotts. This is where the duration of the intrusion becomes relevant.
    The district court in Beautiful Struggle had determined that Baltimore’s aerial intrusion
    was not a search because the program captured only chunks of public movements. Leaders
    of A Beautiful Struggle v. Balt. Police Dep’t, 
    456 F. Supp. 3d 699
    , 713–14 (D. Md. 2020)
    (reasoning that the intrusion could not reveal details inside of private spaces).
    94
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 95 of 103
    But this Court reversed, holding that the forty-five-day length of the public aerial
    surveillance implicated the Carpenter factors. That is, we held that because the government
    gathered chunks of public aerial footage daily for weeks, the cumulative data was “detailed,
    encyclopedic,” “intimate,” and “retrospective,” and broadly comprehensive because it
    “recorded everyone’s movements.” Beautiful Struggle, 2 F.4th at 341–42 (cleaned up); see
    
    id. at 345
     (explaining that people reasonably expect to be seen for a short period in public,
    but they do not expect longer public intrusions). And we emphasized that the weeks-long
    duration of the intrusion permitted deductions by police that revealed “intimate”
    information about those surveilled. 
    Id. at 342
    . For all those reasons, we determined that
    Baltimore’s relatively lengthy public surveillance “transcends mere augmentation of
    ordinary police capabilities” and hence triggered Fourth Amendment protections. 
    Id. at 345
    .
    So, while this Court in Beautiful Struggle did distinguish between a short- and long-
    term search, that was because the search at issue in that case covered strictly public areas.
    
    Id. at 341
    . Contrary to the majority opinion’s assertions, the distinction that we drew in
    Beautiful Struggle regarding the length of the search was rooted in the factors that
    Carpenter identified. Its solely public sweep notwithstanding, the longer aerial intrusion
    was a search because it satisfied the Carpenter factors and thus violated the surveilled
    individuals’ reasonable privacy expectations. 
    Id.
     at 341–42, 346 (applying factors and
    concluding the intrusion was a search). If in Beautiful Struggle we believed those factors
    were irrelevant, as the majority opinion now presses, then we would have simply
    distinguished Knotts without saying more.
    95
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 96 of 103
    Technology that allows only for augmented public surveillance, however, is
    fundamentally different from technology that has the capacity to surveil private spaces,
    like CSLI and Location History.13 This is nothing new: the Supreme Court has long drawn
    a line between public and private spaces—concluding that using a beeper to track a vehicle
    for one trip on a public road is not a search, but monitoring a device within a
    constitutionally protected space is subject to Fourth Amendment constraints, even if the
    monitoring was brief or revealed nothing of value. Compare Karo, 468 U.S. at 714–15,
    with Kyllo, 
    533 U.S. at 34
    . Unlike in public, individuals do not have a diminished privacy
    expectation in private spaces. Accordingly, where a police intrusion can enter private
    spaces, the short-versus-long-term distinction holds much less weight.
    Relatedly, the fact that Location History can perfectly surveil private spaces
    implicates one’s reasonable privacy expectation because it exceeds historical expectations
    of police capabilities. In Beautiful Struggle, the Court reasoned that a short aerial intrusion
    only augmented what police could traditionally capture by tailing suspects. Only public
    surveillance for a longer duration amounted to “attaching an ankle monitor” to those
    surveilled, Beautiful Struggle, 2 F.4th at 341 (cleaned up), capturing information that police
    traditionally could not gather “without technology,” id. So there, only the longer intrusion
    violated privacy expectations and became a search. But here, even two hours of a boundless
    13
    The majority opinion claims that we cannot even consider the differences in the
    capacities of the technologies at issue in Beautiful Struggle and the present case because
    the Location History data here only captured public movements. Maj. Op. at 31. But, as
    explained above, whether a person has a reasonable expectation of privacy in certain forms
    of data depends on the capabilities of that data. Supra, at 58–60.
    96
    USCA4 Appeal: 22-4489       Doc: 63          Filed: 07/09/2024      Pg: 97 of 103
    Location History intrusion is akin to “attaching an ankle monitor” on the surveilled,
    capturing information inside private spaces that were historically closed to prying police
    eyes. That intrusion thus exceeds mere augmentation of human capabilities and becomes a
    search, even when the duration is short. See id. at 341, 343, 345 (emphasizing that the
    analysis turns on historical police capabilities).
    Similarly, we also reasoned in Beautiful Struggle that it would take longer for police
    to deduce intimate information about individuals whom they only follow on discrete public
    trips like that in Knotts, meaning that the duration of surveillance in the public sphere is a
    key component of the intimacy factor. Id. at 342–43. But an intrusion that provides near-
    perfect surveillance in private spaces, like with Location History data, much more quickly
    reveals one’s “familial, political, professional, religious, and sexual associations.” Jones,
    
    565 U.S. at 415
     (Sotomayor, J., concurring). So, again, the short-term and long-term
    distinction is less relevant outside of the public-surveillance context.
    In sum, the majority opinion errs in contending that, following Beautiful Struggle,
    the only Fourth Amendment question before us is whether an intrusion was long or short.
    As our analysis in Beautiful Struggle demonstrated, we must ask whether an intrusion
    satisfied the Carpenter factors. While the length of the intrusion in Beautiful Struggle made
    clear that it did, a shorter intrusion into nonpublic spaces could satisfy the Carpenter factors
    as well—as it did here.
    Next, the majority opinion argues that the geofence intrusion did not reveal intimate
    information because the two-hour window could have only revealed innocuous activities
    in private spaces, as opposed to scandalous or particularly sensitive activities. Maj. Op. at
    97
    USCA4 Appeal: 22-4489      Doc: 63          Filed: 07/09/2024     Pg: 98 of 103
    28–29. It acknowledges that the geofence indeed could have captured users “seeing a friend
    for coffee, touring a housing upgrade, . . . buying a couch off of Facebook marketplace,”
    or inquiring into medical services. Id. at 28. But because such innocuous activities would
    not reveal individuals’ “habits, routines, and associations,” the majority opinion argues, the
    intrusion was not sufficiently intimate to become a search. Id. at 28–29.
    The majority opinion wrongly defines intimacy. Beautiful Struggle indeed held that
    surveillance that reveals one’s “habits and patterns” is intimate. Beautiful Struggle, 2 F.4th
    at 343. But, contrary to the majority opinion’s assertion, that is not the only information
    that is intimate for purposes of the Fourth Amendment reasonable-expectation-of-privacy
    test. Indeed, Carpenter made no mention of personal habits or patterns in its intimacy
    analysis. Carpenter instead held that an “intimate window” into a person’s life is one that
    reveals “his ‘familial, political, professional, religious, and sexual associations.’”
    Carpenter, 585 U.S. at 311 (quoting Jones, 
    565 U.S. at 415
     (Sotomayor, J., concurring)).
    The sheer breadth of that list of associations—which the Court held contains the sacred
    “privacies of life” in which one maintains a reasonable privacy expectation, 
    id.
     (quoting
    Riley, 573 U.S. at 403)—is telling. Of course, this Court’s decision in Beautiful Struggle
    could not limit the reach of Carpenter; nor did it claim to do so. Instead, while habits and
    patterns relevant in Beautiful Struggle are indeed a form of intimacy, the litany of
    associations that Carpenter recognized are likewise intimate.
    Because people have a reduced privacy expectation in public, it made sense that the
    public surveillance in Beautiful Struggle would only violate their privacy expectation when
    the surveillance was so invasive that it permitted deductions about their “habits and
    98
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024      Pg: 99 of 103
    patterns,” from which police could decipher personal associations, which often manifest in
    non-public spaces. Habits and patterns are intimate precisely because they reveal the
    associations recognized in Carpenter. But when police can monitor individuals’ precise
    movements in private spaces, the information revealed is much more intimate and likely to
    reveal one’s familial, political, professional, religious, and sexual associations without the
    need for pattern-based deductions. Under the Fourth Amendment, Americans have a
    heightened privacy expectation from such intrusions.
    The majority opinion’s argument that innocuous information is not intimate is
    likewise unavailing. Two hours of innocuous activities in a busy urban area could certainly
    reveal the targets’ associations. The Fourth Amendment has never incorporated a scandal
    barometer for information that constitutes the “privacies of life.” Id. at 311.
    Simply put, the majority opinion enacts a sweeping new rule: when it comes to data
    like Location History, police are only required to obtain warrants for longer intrusions—
    without any regard for the advancing capabilities of the surveillance technologies that
    police may use or the revealing nature of the data that the police may access. This blanket
    rule has no basis in Carpenter, which expressly declined to address whether a specific
    duration was necessary to implicate Fourth Amendment protections. Nor could this blanket
    rule find a basis in Beautiful Struggle, which addressed only police surveillance that
    captured blurry public movements.
    b.
    In the majority opinion’s final attempt to argue that the intrusion here was not a
    search, the majority reiterates its argument that Chatrie had no standing to challenge the
    99
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024     Pg: 100 of 103
    intrusion if it did not enter his own private spaces. See Maj. Op. at 19 n.17, 30–31, 31 n.26.
    Because the majority opinion merely repeats itself without engaging with my response,
    supra at 58–60, I will not rehash this issue.
    c.
    Of note, the majority opinion focuses on intimacy and voluntariness in its lengthy
    response to this dissent. But intimacy is only one of the factors to which the Court looked
    in Carpenter. And even if the shorter duration of the intrusion in this case leads the
    intimacy factor to weigh less strongly in favor of deciding that the Fourth Amendment
    applies, it far from tips the scale given the immense weight of the comprehensiveness (in
    breadth and depth), efficiency, and retrospectivity of Location History. The majority
    opinion does not dispute that these factors apply to Location History.
    As a self-provided example of “eviscerat[ing] basic and longstanding Fourth
    Amendment principles,” Maj. Op. at 31 n.26, the majority opinion utterly fails to address
    the geofence’s stark similarities to the reviled general warrants that the Fourth Amendment
    was intended to bar—similarities that will only increase given the majority opinion’s
    elimination of the warrant requirement altogether. See supra at 62. At the very least, these
    historical similarities demand heightened caution here, not the majority opinion’s rigid
    application of the third-party doctrine.
    3.
    Our Supreme Court decided Carpenter on the principle that applications of the
    Fourth Amendment must evolve in step with technology to ensure that our constitutional
    protections are not rendered meaningless by new means of government intrusion. Rather
    100
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024    Pg: 101 of 103
    than clinging to policy preferences for pre-Carpenter precedent, the Supreme Court in
    Carpenter directed courts to move past such basic analyses when considering
    unprecedented surveillance technology like CSLI.
    It is our duty to apply Carpenter honestly and diligently. We should not and cannot
    sidestep the primary impact of a Supreme Court opinion to apply earlier decisions that are
    inapplicable, and simply put, more to our own liking. To do so would undercut Carpenter
    and thus, undermine our duty to faithfully guard Constitutional protections.
    IV.
    As a consequence of today’s majority decision, significant concerns arise regarding
    the privacy rights of all Americans. That’s why Justice Sotomayor’s warning in Jones
    applies here with equal relevance—rejecting the warrant requirement for technology as
    cheap, readily accessible, and unprecedentedly powerful as a geofence intrusion is akin to
    inviting governmental abuse. See Jones, 
    565 U.S. at 416
     (Sotomayor, J., concurring).
    Ironically, court decisions like this one could also hinder legitimate law
    enforcement efforts. Shortly after oral arguments in this case, Google—apparently
    predicting the majority opinion’s flawed reading of Carpenter—shut down the technology
    that permits geofence intrusions,14 thereby reducing the potential for legitimate
    investigatory uses of this innovative technology, even with a warrant.
    14
    E.g., Cyrus Farivar & Thomas Brewster, Google Just Killed Warrants That Give
    Police     Access      to    Location       Data,    Forbes    (Dec.      14,     2023),
    https://www.forbes.com/sites/cyrusfarivar/2023/12/14/google-just-killed-geofence-
    warrants-police-location-data/ [https://perma.cc/27JX-ANVC].
    101
    USCA4 Appeal: 22-4489      Doc: 63         Filed: 07/09/2024      Pg: 102 of 103
    Another consequence of today’s decision is that it could “alter the relationship
    between citizen and government in a way that is inimical to democratic society.” Jones,
    
    565 U.S. at 416
     (Sotomayor, J., concurring) (cleaned up). This is because citizens may feel
    inhibited from exercising their associational and expressive freedoms, such as the right to
    peacefully protest and the ability of journalists to gather information confidentially and
    effectively, knowing “that the Government may be watching” them. Id.; see Reporters
    Committee for Freedom of the Press Amicus Brief at 7–8 (noting the CIA’s track record
    of “follow[ing] newsmen . . . in order to identify their sources” (citation omitted)); Smith,
    
    442 U.S. at 751
     (Marshall, J., dissenting) (“The prospect of unregulated governmental
    monitoring will undoubtedly prove disturbing even to those with nothing illicit to hide.”);
    see NYU Technology Law & Policy Clinic Amicus Brief at 25 (noting that “[f]orced
    disclosure of membership can chill association, even if there is no disclosure to the general
    public”); Ams. for Prosperity Found. v. Bonta, 
    141 S. Ct. 2373
    , 2388 (2021) (holding that
    disclosure requirements risk chilling association). As a result of today’s majority opinion,
    the government may surreptitiously surveil places of worship, protests, gun ranges,
    abortion or drug-rehabilitation clinics, union meetings, marital counseling or AA sessions,
    and celebrations of cultural heritage or LGBTQ+ pride, among numerous other types of
    sensitive places or gatherings—with no judicial oversight or accountability. Without
    warrants, the government is free to surveil anyone exercising their First Amendment (or
    other) rights at the government’s whim—using a technology that can identify each
    individual retrospectively, without any suspicion of criminal activity—and those surveilled
    will be none the wiser. All of that offends the Supreme Court’s instruction that Fourth
    102
    USCA4 Appeal: 22-4489       Doc: 63         Filed: 07/09/2024    Pg: 103 of 103
    Amendment review must be particularly rigorous when First Amendment protections are
    at risk. See Zurcher v. Stanford Daily, 
    436 U.S. 547
    , 564 (1978).
    ***
    For the first time since the ratification of the Fourth Amendment, the government is
    permitted to retroactively surveil American citizens anywhere they go—no warrant
    needed—so long as it keeps its snooping to a few hours or perhaps a few days. New
    technologies that collect ever-more-intimate data are becoming integral to daily life in
    ways we could not have imagined even a short time ago. This fact of modern life—that we
    cannot know what developments, and what risks posed by those developments, lie just
    around the corner—should counsel courts to exercise humility. The Supreme Court has
    guided us to safeguard against novel technologies that may enable government
    infringement on constitutional rights.
    That’s what we should do. At the end of the day, upholding the precious freedoms
    guaranteed by our Constitution is our duty. Because the majority decision fails to honor
    that duty today, I must, with great respect, dissent.
    103
    

Document Info

Docket Number: 22-4489

Filed Date: 11/4/2024

Precedential Status: Precedential

Modified Date: 11/5/2024