Get a Warrant: The Government's Unconstitutional Practice of Subpoenaing Private Text Messages Directly from Personal Cell Phones | Alerts and Articles | Insights | Ballard Spahr (2024)

Reprinted with permission from the February 9, 2024, issue of the New York Law Journal.

By Michael P. Robotti and Lauren Engelmyer

With the rise in government subpoenas directly to individuals demanding that they turn over their private text messages on their personal cell phones, lawyers should be on the lookout for potential Fourth Amendment violations. The U.S. Department of Justice (DOJ) and U.S. Securities and Exchange Commission (SEC) practice of subpoenaing private text messages directly from individuals has become so commonplace that individuals often turn over their text messages as readily as they would any other document requested. In many circ*mstances, though, the government needs to get a warrant to obtain text messages stored on a personal cell phone. A subpoena is not sufficient.

This article examines Supreme Court precedent requiring a warrant to search a cell phone, and what lawyers should consider when counseling clients on whether they should turn over text messages in response to a government subpoena.

Note: This article does not consider government subpoenas served on companies, which in turn require their employees to provide information on their cell phones to the companies as a condition of their employment. That scenario involves separate considerations not discussed herein. See, e.g., United States v. Ferguson, No. 3:06CR137 (CFD), 2007 U.S. Dist. LEXIS 87842, at *15-16 (D. Conn. Nov. 30, 2007).

Subpoenas Versus Search Warrants

Subpoenas are a powerful government tool because they do not require a showing of probable cause. The DOJ has broad authority to issue subpoenas for relevant information in connection with a grand jury investigation, and it can issue them for no reason other than "official curiosity." United States v. Morton Salt Co., 338 U.S. 632, 652 (1950). The SEC likewise has broad authority to issue subpoenas for relevant information in connection with an authorized administrative investigation. See United States v. Powell, 379 U.S. 48, 57-58 (1964); NLRB v. American Medical Response, 438 F.3d 188, 193 (2d Cir. 2006). This broad subpoena power accords with the "ancient proposition of law" that "the public has a right to every man's evidence." United States v. Nixon, 418 U.S. 683, 709 (1974).

The recipient of a DOJ or an SEC subpoena typically has limited means to challenge the subpoena. The recipient may challenge the subpoena as overbroad, unduly burdensome or that it seeks irrelevant information. RNR Enterprises, 122 F.3d 93, 97 (2d Cir. 1997); SEC v. Brigadoon Scotch Distributing, 480 F.2d 1047, 1056 (2d Cir. 1973). Such objections are often negotiated and resolved informally between the government and counsel for the recipient. Subpoenas are also subject to constitutional constraints. For instance, a court may quash a subpoena where a recipient invokes the Fifth Amendment act-of-production privilege. See e.g., United States v. Hubbell, 530 U.S. 27, 31-32 (2000); In re Grand Jury Subpoena Duces Tecum Dated Oct. 29,1992, 1 F.3d 87, 93 (2d Cir. 1993); SEC v. Forster, 147 F. Supp. 3d 223, 227 (S.D.N.Y. 2015).

Though less frequently invoked to challenge a subpoena, the Fourth Amendment warrant requirement also presents a constitutional limitation to subpoena enforcement. If the Constitution requires a search warrant to obtain certain information, the government cannot use a subpoena to get that information instead. See Carpenter v. United States, 138 S. Ct. 2206, 2221-23 (2018). While a federal prosecutor or an SEC attorney can easily issue a subpoena pursuant to an ongoing investigation—they simply need to fill out the PDF forms and serve it on the recipient—a search warrant involves far more procedural and constitutional hurdles.

A search warrant requires the government to prepare a detailed search warrant application, including an affidavit from a law enforcement agent, to convince a magistrate judge that there is "probable cause to believe that the legitimate object of a search is located in a particular place." Steagald v. United States, 451 U.S. 204, 213 (1981); see Fed. R. Crim.P.41. Further, the warrant must be narrowly tailored anddescribe with particularity the objects that will be searched and seized under the Fourth Amendment. See Mary/and v. Garrison, 480 U.S. 79, 84 (1987). "The purpose behind the warrant requirement is to insure that the judgment of a neutral...magistrate is imposed against the unbridled discretion of an official caught up in the heat of an investigation." United States v. Hermiz, 42 F. Supp. 3d 856, 866 (E.D. Mich. 2014) (quoting United States V. Blue Diamond Coal, 667 F.2d 510, 518 (6th Cir. 1981)); see United States v. Amerson, 483 F.3d 73, 82 (2d Cir. 2007) ("[A] significant reason for warrants [is] to provide a check on the arbitrary use of government power").

Given the substantive and procedural gauntlet the government must run to obtain a warrant, where it can avoid those hurdles and instead obtain information from a cell phone by subpoena, it will do so. Indeed, especially at the early stages of an investigation, the government may not be able to establish probable cause and meet the other requirements of a search warrant for a phone.

Moreover, the government may face a practical limitation on its ability to obtain information via a search warrant from a phone: in many cases, the government cannot access a password-protected phone, if the defendant refuses to provide the password. See, e.g., United States v. Rogozin, No. 09-CR-379(S)(M), 2010 U.S. Dist. LEXIS 121162, at *15 (W.D.N.Y. Nov. 16, 2010); United States v. Krischner, 823 F. Supp. 2d 665, 669 (E.D. Mich. 2010).

Where the government lacks probable cause or suspects it will not be able to access a password-protected phone through a search warrant, its only option may be to seek information from the phone via subpoena. These realities likely explain why, in recent years, the government has begun regularly using subpoenas to seek private text messages from personal phones, rather than enduring the more rigorous process required to obtain a warrant.

In some cases, there may be good reasons that a subpoena recipient does not wish to challenge a government subpoena for private text messages, such as to maintain a cooperative posture with the government or to limit the information that may need to be turned over from a phone to the text messages called for in the subpoena. Thus, the recipient and his or her counsel will not raise a Fourth Amendment objection.

But that does not mean that the Fourth Amendment does not apply and limit the government's subpoena power. It simply means that a particular recipient of a particular subpoena has chosen not to assert his or her Fourth Amendment rights. The government, though, should not take such acquiescence as license to end-run the Fourth Amendment. But based on current government practice, it appears to be doing just that.

Recent Supreme Court precedent, however, makes it clear that the Fourth Amendment fully protects text messaging—which has become one of the predominant forms of communication in our society and often contains a person's most private correspondence with friends, family, and co-workers. If the government wants to read those messages, a subpoena is not sufficient; it must get a warrant.

Supreme Court Precedent: A Reasonable Expectation of Privacy in Text Messages Requires a Warrant

The Supreme Court has long held that a "Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable." Kyllo v. United States, 533 U.S. 27, 33 (2001). Decades ago, the Supreme Court established that a government invasion of private communications is a search that requires a warrant. Katz v. United States, 389 U.S. 347, 351 (1967). The court in Katz reaffirmed that the Fourth Amendment protects "people, not places," and it held that people have a reasonable expectation of privacy in their private telephone conversations. See 389 U.S. at 351.

Since then, as communication methods and preferences have evolved with technology, the federal courts have steadily expanded fundamental Fourth Amendment protections to other types of private correspondence. See Kyllo, 533 U.S. at 34 (evolving technology must not be permitted to "erode the privacy guaranteed by the Fourth Amendment"). For example, in United States v. Jacobsen, the Supreme Court held that "[I]etters and other sealed packages are in the general class of effects in which the public at large has a legitimate expectation of privacy; warrantless searches of such effects are presumptively unreasonable." 466 U.S. 109, 114 (1984).

More recently, the U.S. Court of Appeals for the Sixth Circuit in United States v. Warshak extended the Fourth Amendment's warrant requirement to email. 631 F.3d 266, 288 (6th Cir. 2010) ("Given the fundamental similarities between email and traditional forms of communication, it would defy common sense to afford email lesser Fourth Amendment protection."). Private communication done by text message—rather than by phone call, letter, or email—is not any less protected.

Indeed, that is the logical and straightforward extension of two relatively recent Supreme Court cases:Riley v. California and Carpenter v.United States. In Riley, the court addressed the constitutionality of a warrantless search of a cell phone incident to arrest. 573 U.S. 373, 402 (2014). It held that, absent an applicable exception, a warrant is required to search a cell phone because an individual has a reasonable expectation of privacy in its contents. As the Supreme Court wrote, "[a] cell phone" is "an important feature of human anatomy" and "[t]he sum of an individual's private life can be reconstructed" through a search of a person's phone.

The court further held:

Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans 'the privacies of life[.]' The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant.

573 U.S. at 403 (citation omitted). In explaining the scope of its holding, the court stated: "Our holding, of course, is not that the information on a cell phone is immune from search; it is instead that a warrant is generally required before such a search, even when a cell phone is seized incident to arrest." See Carpenter, 138 S. Ct. at 2214 ("Likewise in Riley, the court recognized the 'immense storage capacity' of modern cell phones in holding that police officers must generally obtain a warrant before searching the contents of a phone").

Four years later, in Carpenter, the Supreme Court squarely rejected an argument that the government has the power to subpoena data in which an individual has a reasonable expectation of privacy under the Fourth Amendment. 138 S. Ct. at 2214. There, the government obtained an order under the Stored Communications Act for cell site location information from wireless carriers to track a defendant's location. Carpenter, 138 S. Ct. at 2212. Noting that such an order was akin to a subpoena, the court held that it was a violation of the defendant's Fourth Amendment rights, because the defendant had a reasonable expectation of privacy in his cumulative location data.

As relevant here, in response to an argument from Justice Samuel Alito (Alito, J., dissenting), the majority concluded that this type of data cannot be subpoenaed under existing Supreme Court precedent. It stated: "[T]his court has never held that the Government may subpoena third parties for records in which the suspect has a reasonable expectation of privacy." 138 S. Ct. at 2221 (citation omitted). The court further noted that, "[i]f the choice to proceed by subpoena provided a categorical limitation on Fourth Amendment protection, no type of record would ever be protected by the warrant requirement."

The court dismissed the contention that "private letters, digital contents of a cell phone—any personal information reduced to document form, in fact—may be collected by subpoena for no reason other than 'official curiosity,'" and it stated that the "subpoena doctrine" should not be used to "overcom[e] any reasonable expectation of privacy."

Taken together, Riley and Carpenter stand for the proposition that the government is required to obtain a warrant to search a cell phone because an individual has a reasonable expectation of privacy in the contents thereof and the government may not use a subpoena to circumvent that warrant requirement. Accordingly, applying Riley and Carpenter to private text messages located on a personal cell phone, the government is required to obtain a warrant to read them. It cannot compel an individual to turn over private text messages by issuing a subpoena.

Given that evolving technology has led to a significant shift in private correspondence from the telephone and letter to email and text message, this extension of basic Fourth Amendment guarantees to these new technologies should not be controversial. Just as the words one speaks into a phone are private, Katz, 389 U.S. at 352, so too are the words one types into a phone.

Considerations When Responding to a Subpoena Seeking Private Text Messages from a Personal Phone

Despite the precedent cited above, the government has become accustomed to obtaining key evidence in its investigations through subpoenas for private texts on personal phones. Counsel for the recipient of a subpoena for such messages should not be surprised if the government demands compliance over their Fourth Amendment objections. So, who wins when the government pushes for a subpoena response over such objections from a recipient?

There is little precedent testing the limits of Riley and Carpenter in the subpoena context because the issue is rarely litigated, and the recipient often negotiates a resolution with the government short of having to file a motion to quash or the government filing a motion to compel. While every case is unique, counsel advising clients responding to a subpoena should consider the strong basis under the Fourth Amendment to refuse to produce text messages in response to a subpoena, and how the government might react.

Depending on the specific circ*mstances, the arguments discussed above may be appropriate to raise in negotiations with the government or during motions practice. In response, the government may seek to raise a variety of arguments defending its practice of subpoenaing private text messages from personal cell phones. But these arguments are unlikely to persuade a court. We address some potential arguments below.

The Third-Party Doctrine

The government might seek refuge in the third-party doctrine, arguing that an individual relinquishes his right to privacy by voluntarily communicating with a third party. This argument, though, contradicts an unbroken line of federal court cases protecting private correspondence under the Fourth Amendment. The Fourth Amendment protects a telephone conversation with a third party (Katz), as well as letters (Jacobsen) and emails (Warshak) sent to third parties, so there is no reason text messages to third parties would be any different. See Kyllo, 533 U.S. at 34.

The court in Carpenter rejected the government's attempt to "mechanically apply []" the third-party doctrine to cell site data, concluding that such data was "qualitatively different" than "telephone numbers and bank records," to which the third-party doctrine applies. 138 S. Ct. at 2219. It explained that the third-party doctrine originally applied to records that were "not confidential communications but negotiable instruments to be used in commercial transactions," and it emphasized that "the fact that the information is held by a third party does not by itself overcome the user's claim to Fourth Amendment protection" (emphasis added).

The third-party doctrine is a particularly poor fit for text messages, because many text messaging applications are end-to-end encrypted. For example, in their privacy policies, Apple explains that only the sender and receiver(s) can access content of encrypted iMessage conversations, and WhatsApp states that "end-to-end encryption ensures only you and the person you're communicating with can read or listen to what is sent, and nobody in between, not even WhatsApp" (Apple; "About End-to-End Encryption", WhatsApp). That means that, unlike bank records and telephone numbers, end-to-end encrypted text messages are not shared with third-party service providers; such messages are only shared with the intended recipient(s).

In that regard, there is an even stronger expectation of privacy in such text messages than the phone calls at issue in Katz, where the telephone company had the ability to access the calls routed through the company. See Warshak, 631 F.3d at 42 (citing Katz). Similarly, there is a stronger expectation of privacy in such text messages than in the emails at issue in Warshak, where the court rejected the third-party doctrine despite the service provider's ability to access the emails sent through its servers. 631 F.3d at 42-43.

`SEC v. Covington & Burling'

The government might seek to rely on SEC v. Covington & Burling, No. 23-MC-00002 (APM), 2023 U.S. Dist. LEXIS 127205 (D.D.C. July 24, 2023), seemingly the only reported case that addresses the adequacy of a subpoena underCarpenter'sFourth Amendment analysis. In that case, Covington & Burling LLP (Covington) refused to produce a list of the law firm's clients in response to an SEC subpoena, relying on Carpenter to argue that the clients had a reasonable expectation of privacy in their attorney-client relationships and thus the government needed a warrant to obtain the list. 2023 U.S. Dist. LEXIS 127205, at *16.

The district court rejected Covington's argument, highlighting the "diminished expectation of privacy in the mere fact of [the clients'] attorney-client relationship," which is "often in the public domain." 2023 U.S. Dist. LEXIS 127205, at *21.

For this reason, Covington is inapplicable to a subpoena seeking private text messages stored on a personal cell phone. Unlike in Covington, the Supreme Court has already established that an individual has a reasonable expectation of privacy in the contents of his or her personal cell phone. Riley, 573 U.S. at 402. Thus, in most cases, there is no "diminished expectation of privacy" in private text messages on a personal cell phone, especially in end-to-end encrypted text messages stored on a password-protected device.

Moreover, Covington further emphasized the diminished expectation of privacy at issue in that case, by highlighting that the law firm was seeking to shield the identity of public companies, which have much less of an expectation of privacy than individuals. As the court stated, corporations "can claim no equality with individuals in the enjoyment of a right to privacy." 2023 U.S. Dist. LEXIS 127205, at *20.

Further, the court specifically noted that identifying the client names at issue "would not divulge any protected communications," in effect distinguishing that case from a case involving private correspondence on a personal cell phone. Accordingly, any attempt by the government to rely on Covington in this situation is misplaced.

Subpoena Is Not a Search

The government also might respond to a Fourth Amendment objection by arguing that it is only requesting production of text messages via subpoena and not taking possession of the individual's phone; therefore, it is not conducting a search of the phone. But "a Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable." Kyllo, 533 U.S. at 33.

Whether the government takes possession of the cell phone is irrelevant under the Fourth Amendment analysis. If a subpoena invades a reasonable expectation of privacy, such as by compelling an individual to turn over his or her private text messages, the government has conducted a search.

The Carpenter court rejected the argument that a subpoena did "not involve the direct taking of evidence," and hence did not implicate the Fourth Amendment's warrant requirement. 138 S. Ct. at 2221. The court declined to adopt the view that subpoenas are "subject[] to lenient scrutiny without regard to the suspect's expectation of privacy."

It specifically distinguished cases in which the Court had previously concluded that certain subpoenas for certain documents were not searches that required a warrant, because those cases involved "requests for evidence implicating diminished privacy interests or for a corporation's own books" (distinguishing Oklahoma Press Publishing v. Walling, 327 U.S. 186, 189 204-08 (1946), and others cases). Those cases have no bearing on private text messages in which an individual has a reasonable expectation of privacy.

Conclusion

Because text messaging has become one of the primary ways that we communicate privately with family, friends, and co-workers, the government will continue to attempt to mine those messages for valuable evidence in its cases. In an appropriate case, the government may be able to obtain private text messages on a personal cell phone in connection with its investigation. But the lesson from the Supreme Court is clear: the government must get a warrant to do so.

Now more than ever it is important to consider the benefits of asserting a Fourth Amendment objection in response to a subpoena for private text messages. Given this legal precedent, attorneys should be cautious about reflexively agreeing to turn over a client's private text messages from a personal phone.

Michael P. Robotti is a partner in the New York office of Ballard Spahr, where he serves as co-leader of the firm's Anti-Money Laundering team and advises financial institutions and businesses on compliance requirements. Lauren Engelmyer is an associate in the firm's litigation department, where she focuses her practice on complex business litigation and arbitration.

Get a Warrant: The Government's Unconstitutional Practice of Subpoenaing Private Text Messages Directly from Personal Cell Phones | Alerts and Articles | Insights | Ballard Spahr (2024)

FAQs

Can you subpoena private text messages? ›

You can subpoena text messages in various legal proceedings, such as personal injury lawsuits, divorce cases, contract disputes, employment disputes, employment discrimination cases, regulatory investigations, etc., as long as they are relevant to the litigation.

Are text messages protected under the 4th Amendment? ›

2010) ("Given the fundamental similarities between email and traditional forms of communication, it would defy common sense to afford email lesser Fourth Amendment protection."). Private communication done by text message—rather than by phone call, letter, or email—is not any less protected.

Are subpoenas unconstitutional? ›

Validity of Congressional Subpoenas

The congressional subpoena you received is most likely valid. Though such power is not listed in the United States Constitution, the Supreme Court has upheld the power.

What is the 4th Amendment case about cell phones? ›

Riley v. California, 573 U.S. 373 (2014), is a landmark United States Supreme Court case in which the court ruled that the warrantless search and seizure of the digital contents of a cell phone during an arrest is unconstitutional under the Fourth Amendment.

Is it illegal for someone to read my text messages without my permission? ›

The Electronic Communications Privacy Act (ECPA) is a federal law that makes it a crime to access someone else's private communications without permission. It covers cell phones, computer use, email, social media accounts, and other types of electronic communications.

Can deleted text messages be subpoenaed? ›

Deleted text messages can potentially be subpoenaed, but the success of retrieving them depends on various factors.

Do subpoenas violate the 5th Amendment? ›

Can I plead the Fifth if subpoenaed to testify or produce documents to a congressional committee? Yes. The Supreme Court has held that the Fifth Amendment right against self-incrimination is available to recipients of congressional subpoenas.

What makes a subpoena invalid? ›

A subpoena issued by someone without the proper authority is invalid. Non-compliance with court rules: Subpoenas must comply with specific court rules and procedures. Any deviation from these rules can render the subpoena invalid.

Do subpoenas violate the First Amendment? ›

When Does the First Amendment Protect Against Subpoenas? In some cases, complying with a federal subpoena would violate free speech rights under the Constitution. Some key examples include: Confidential Sources – The Supreme Court ruled that reporters have a First Amendment right to keep sources confidential.

How does the exclusionary rule protect you? ›

The exclusionary rule prevents the government from using most evidence gathered in violation of the United States Constitution. The decision in Mapp v. Ohio established that the exclusionary rule applies to evidence gained from an unreasonable search or seizure in violation of the Fourth Amendment.

What would be illegal under the Fourth Amendment? ›

The Constitution, through the Fourth Amendment, protects people from unreasonable searches and seizures by the government. The Fourth Amendment, however, is not a guarantee against all searches and seizures, but only those that are deemed unreasonable under the law.

What does the 4th Amendment not protect? ›

The Fourth Amendment doesn't apply to every governmental search. If the person searched did not have a reasonable expectation of privacy in the place the government searches (or the item the government seizes), there is no Fourth Amendment violation. The Fourth Amendment only protects against unreasonable searches.

Can private text messages be used in court? ›

Yes, text messages are admissible in court, but only if they were legally obtained. This means a person must voluntarily provide the court with the text messages.

Can you sue someone for reading private messages? ›

In California, there are laws protecting individuals from the unauthorized disclosure of private communications, such as text messages. Your former friend may have violated your privacy rights by sharing screenshots of your private conversations without your consent.

Can I get a copy of my spouse's text messages? ›

Generally, texts and emails are private. Thus, you don't have a right to look at them without your spouse's consent. Doing so is viewed as an invasion of privacy. It doesn't matter whether you are married, separated or divorced.

Can private texts be used in defamation? ›

The short answer is yes. Defamation, a false statement of fact that damages the reputation of someone else, can come in myriad forms of communication.

Top Articles
Georgia FHA Loan | New American Funding
What’s The Best Day And Time To Book Flights
Play FETCH GAMES for Free!
Jackerman Mothers Warmth Part 3
Regal Amc Near Me
Pieology Nutrition Calculator Mobile
CLI Book 3: Cisco Secure Firewall ASA VPN CLI Configuration Guide, 9.22 - General VPN Parameters [Cisco Secure Firewall ASA]
Erskine Plus Portal
Weather In Moon Township 10 Days
Boat Jumping Female Otezla Commercial Actress
13 The Musical Common Sense Media
How to watch free movies online
A Guide to Common New England Home Styles
Betonnen afdekplaten (schoorsteenplaten) ter voorkoming van lekkage schoorsteen. - HeBlad
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Chastity Brainwash
Vermont Craigs List
Ups Access Point Lockers
Zalog Forum
Axe Throwing Milford Nh
Aris Rachevsky Harvard
Aaa Saugus Ma Appointment
Juicy Deal D-Art
Pecos Valley Sunland Park Menu
Www Craigslist Madison Wi
Doki The Banker
Gina Wilson Angle Addition Postulate
Crossword Help - Find Missing Letters & Solve Clues
Gilchrist Verband - Lumedis - Ihre Schulterspezialisten
Plost Dental
The Boogeyman (Film, 2023) - MovieMeter.nl
Cinema | Düsseldorfer Filmkunstkinos
Imagetrend Elite Delaware
Otis Inmate Locator
Ancestors The Humankind Odyssey Wikia
Warn Notice Va
Culver's Hartland Flavor Of The Day
In Branch Chase Atm Near Me
Luciipurrrr_
10 Most Ridiculously Expensive Haircuts Of All Time in 2024 - Financesonline.com
Bridger Park Community Garden
Planet Fitness Santa Clarita Photos
Dinar Detectives Cracking the Code of the Iraqi Dinar Market
Homeloanserv Account Login
Weekly Math Review Q2 7 Answer Key
Windshield Repair & Auto Glass Replacement in Texas| Safelite
Vérificateur De Billet Loto-Québec
Pixel Gun 3D Unblocked Games
St Anthony Hospital Crown Point Visiting Hours
Syrie Funeral Home Obituary
60 Second Burger Run Unblocked
Prologistix Ein Number
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5613

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.