United States v. Patrick

Decision Date23 November 2016
Docket NumberNo. 15-2443,15-2443
Citation842 F.3d 540
Parties United States of America, Plaintiff–Appellee, v. Damian Patrick, Defendant–Appellant.
CourtU.S. Court of Appeals — Seventh Circuit

Bridget J. Domaszek, Attorney, Office of the United States Attorney, Milwaukee, WI, Nathan Paul Judish, Attorney, Department of Justice, Criminal Division, Washington, DC, for PlaintiffAppellee.

Christopher D. Donovan, Attorney, Pruhs & Donovan, S.C., Milwaukee, WI, for DefendantAppellant.

Before Wood, Chief Judge, and Easterbrook and Kanne, Circuit Judges.

Easterbrook, Circuit Judge.

Police in Wisconsin arrested Damian Patrick while he was in a car on a public street and found him armed. That led to this federal prosecution, because Patrick's criminal record made it unlawful for him to possess firearms. 18 U.S.C. § 922(g)(1). The district court denied his motion to keep the gun out of evidence. 2015 WL 106158, 2015 U.S. Dist. LEXIS 1421 (E.D. Wis. Jan. 7, 2015), approving a magistrate judge's recommendation, 2014 U.S. Dist. LEXIS 179522 (E.D. Wis. Sept. 30, 2014). Patrick pleaded guilty but reserved the opportunity to contest the validity of his arrest, and thus the validity of the gun's seizure. He now appeals from the 57–month sentence he received.

Patrick was serving a term of parole that followed his release from state prison. He did not comply with the conditions of his release, and a warrant was issued for his arrest. (He does not contest that warrant's validity.) In an effort to find Patrick, Milwaukee's police obtained a second warrant, which authorized them to locate Patrick using cell-phone data. Patrick's cell phone revealed his location, which enabled the police to find him.

Patrick attempts to undermine the validity of the location-tracking warrant by contending that his person was not contraband or the proceeds of a crime, and that it therefore was off limits to investigation. That sounds like an attempt to resurrect the "mere evidence" doctrine that the Supreme Court disapproved in Warden v. Hayden , 387 U.S. 294, 87 S.Ct. 1642, 18 L.Ed.2d 782 (1967). Hayden authorized the use of warrants to get evidence to locate a wanted person. See also Steagald v. United States , 451 U.S. 204, 101 S.Ct. 1642, 68 L.Ed.2d 38 (1981) (search warrant to enter house to look for person to arrest). Police were entitled to use a warrant to obtain data that would help them track down Patrick's location.

Indeed, they were entitled to arrest him without a warrant of any kind, let alone the two warrants they had. United States v. Watson , 423 U.S. 411, 96 S.Ct. 820, 46 L.Ed.2d 598 (1976), holds that probable cause alone is enough for an arrest in a public place. A warrant is necessary only when the police need to enter a private area to capture the wanted person. See Payton v. New York , 445 U.S. 573, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980). Because Patrick was visible to the general public, he did not have any privacy interest in his location at the time.

More: the Supreme Court recently held that a valid arrest warrant precludes the suppression of evidence seized in an arrest, even if the arrest was set in motion by officers who had neither probable cause nor knowledge of the warrant. Utah v. Strieff , ––– U.S. ––––, 136 S.Ct. 2056, 195 L.Ed.2d 400 (2016). Strieff tells us that, if the police had stopped Patrick's car for no reason at all and learned only later that he was a wanted man, the gun would have been admissible in evidence. The officers who nabbed Patrick, by contrast, had both probable cause to believe that he was a fugitive from justice and knowledge of the arrest warrant. The gun cannot be less admissible than in Strieff , even if we knock out the means used to track his location.

Because Patrick was arrested in a public place, and the arrest was supported by both probable cause and a valid arrest warrant that had been issued before any effort to learn his location (an effort that therefore could not "taint" the arrest in the parlance of the exclusionary rule), we need not resolve some difficult issues posed by a fact that came to light while the case was in this court. After Patrick filed his opening brief, the prosecutor revealed that Patrick's location had been pinned down using data from a cell-site simulator. That device (often called a Stingray, the trademark of one brand) pretends to be a cell-phone access point and, by emitting an especially strong signal, induces nearby cell phones to connect and reveal their direction relative to the device. Here is a description from the Department of Justice:

Cell-site simulators ... function by transmitting as a cell tower. In response to the signals emitted by the simulator, cellular devices in the proximity of the device identify the simulator as the most attractive cell tower in the area and thus transmit signals to the simulator that identify the device in the same way that they would with a networked tower.
A cell-site simulator receives and uses an industry standard unique identifying number assigned by a device manufacturer or cellular network provider. When used to locate a known cellular device, a cell-site simulator initially receives the unique identifying number from multiple devices in the vicinity of the simulator. Once the cell-site simulator identifies the specific cellular device for which it is looking, it will obtain the signaling information relating only to that particular phone. When used to identify an unknown device, the cell-site simulator obtains signaling information from non-target devices in the target's vicinity for the limited purpose of distinguishing the target device.
By transmitting as a cell tower, cell-site simulators acquire the identifying information from cellular devices. This identifying information is limited, however. Cell-site simulators provide only the relative signal strength and general direction of a subject cellular telephone; they do not function as a GPS locator, as they do not obtain or download any location information from the device or its applications. Moreover, cell-site simulators used by the Department must be configured as pen registers, and may not be used to collect the contents of any communication, in accordance with 18 U.S.C. § 3127(3). This includes any data contained on the phone itself: the simulator does not remotely capture emails, texts, contact lists, images or any other data from the phone. In addition, Department cell-site simulators do not provide subscriber account information (for example, an account holder's name, address, or telephone number).

Department of Justice Policy Guidance: Use of Cell–Site Simulator Technology (Sept. 3, 2015) at 2. See also the Wikipedia entry at .

If the Department's description is accurate (a question not explored in this litigation) law-enforcement officials get the same sort of information that a phone company could provide using its own facilities, and they get it in real time rather than waiting for the phone company to turn over data. But instead of collecting information on just one person, as the warrant in this proceeding entitled the police to learn Patrick's location, a cell-site simulator collects the relative location of everyone whose phone is induced to connect to the simulator—though it may discard that information before alerting officials to the presence of the sought-after person (just as the phone company, which has location data about all of its customers, would disclose only one person's location).

One potential question posed by use of a cell-site simulator would be whether it is a "search" at all, or instead is covered by Smith v. Maryland , 442 U.S. 735, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979), and United States v. Knotts , 460 U.S. 276, 103 S.Ct. 1081, 75 L.Ed.2d 55 (1983). The former holds that a pen register is not a search because it reveals the making of a call, and the number called, but not the call's communicative content. The latter holds that the use of a beeper is not a search, because it reveals a suspect's location but nothing else. Recent decisions such as United States v. Graham , 824 F.3d 421 (4th Cir. 2016) (en banc), and United States v. Carpenter , 819 F.3d 880 (6th Cir. 2016), apply these principles to hold that tracking a person via data from phone companies is not a search within the scope of the Fourth Amendment. (Graham involved historical cell-tower location information and Carpenter involved "transactional records" from phone companies, so both cases dealt with the sort of information covered by the location warrant in this proceeding.) Police freely use databases, containing information such as the addresses associated with automobile license plates and persons licensed to drive, to track down suspects; they search trash for credit card receipts showing where he made purchases; they consult a suspect's relatives and friends (and sometimes his enemies) to learn his whereabouts; no one thinks that those methods require a search warrant.

A contrary line of argument analogizes cell-site simulators to GPS locators, which are treated as searches when police enter private property to install them, see United States v. Jones , ––– U.S. ––––, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012), and may be searches when used for extended durations even if installed with a vehicle owner's consent, id . at 954–64 (concurring opinions of Sotomayor and Alito, JJ.). If a cell-site simulator is like a GPS tracker, and if the approach of the concurring opinions in Jones is adopted, then it would be necessary to know how long the police used a simulator while searching for Patrick and just how accurate is the location information it provides. (Is it information that leaves uncertainty about where in several city blocks a suspect may be, such as the beeper in Knotts , or is it closer to the precise location supplied by a GPS tracker?) Cf. Kyllo v. United States , 533 U.S. 27, 121 S.Ct. 2038, 150 L.Ed.2d 94 (2001) (thermal image of the inside of a...

To continue reading

Request your trial
37 cases
  • United States v. Thorne
    • United States
    • U.S. District Court — District of Columbia
    • 30 d3 Junho d3 2021
    ...cell tower and thus "induces nearby cell phones to connect and reveal their direction relative to the device." United States v. Patrick , 842 F.3d 540, 542 (7th Cir. 2016). Essentially, the signals emitted by the simulator are so powerful that cell phones in its proximity will "identify the......
  • United States v. Ellis
    • United States
    • U.S. District Court — Northern District of California
    • 24 d4 Agosto d4 2017
    ...CSS, which the cell phones identify as the most attractive cell tower in the area. Doc. no. 304 at 3–5 (citing United States v. Patrick , 842 F.3d 540, 542–43 (7th Cir. 2016) (quoting DOJ Policy, Sept. 3, 2015), reh'g and reh'g en banc denied (May 9, 2017)). "When used to locate a known cel......
  • In re Info. Stored at Premises Controlled by Google
    • United States
    • U.S. District Court — Northern District of Illinois
    • 24 d1 Agosto d1 2020
    ...are a "search" for Fourth Amendment purposes is enough to allow the Court to avoid deciding that question. See United States v. Patrick , 842 F.3d 540, 544 (7th Cir. 2016) (declining to reach question of whether use of cell-site simulator was a search where government had conceded that it w......
  • United States v. Hammond, 19-2357
    • United States
    • U.S. Court of Appeals — Seventh Circuit
    • 26 d1 Abril d1 2021
    ...privacy from law enforcement's prying eyes. See Carpenter , 138 S. Ct. at 2217.Our conclusion here is buttressed by our decision in United States v. Patrick , where we held that the government did not violate the Fourth Amendment when officers used a cell-site simulator7 to locate a suspect......
  • Request a trial to view additional results
6 books & journal articles
  • SOCIAL NORMS IN FOURTH AMENDMENT LAW.
    • United States
    • Michigan Law Review Vol. 120 No. 2, November 2021
    • 1 d1 Novembro d1 2021
    ...(simulated cell towers capable of capturing nearby cell phone signals); Patrick v. United States, 138 S. Ct. 2706 (2018), denying cert, to 842 F.3d 540, 545 (7th Cir. 2016) (88.) E.g., Adkinson v. United States, 139 S. Ct. 2762 (2019), denying cert, to 916 F.3d 605, 608,610 (7th Cir. 2019).......
  • STINGRAY STUNG? ANALYZING CELLPHONES AS EFFECTS PROVIDES FOURTH AMENDMENT TREATMENT.
    • United States
    • Harvard Journal of Law & Technology Vol. 34 No. 2, March 2021
    • 22 d1 Março d1 2021
    ...[https://perma.cc/7TFR-DXEC]. (42.) United States v. Patrick, 842 F.3d 540, 542-43 (7th Cir. 2016) (quoting U.S. DEP'T OF JUST., USE OF CELL SITE SIMULATOR TECHNOLOGY 2 (43.) A. Ghayas, What is the Difference Between IMEI and IMSI Numbers?, COMMSBRIEF (Sept. 20, 2019), https://commsbrief.co......
  • Rethinking Police Expertise.
    • United States
    • Yale Law Journal Vol. 131 No. 2, November 2021
    • 1 d1 Novembro d1 2021
    ...Right to Notice, 54 SANTA CLARA L. REV. 843, 888-95 (2015) (cataloguing some such technologies). (407.) E.g., United States v. Patrick, 842 F.3d 540, 544 (7th Cir. 2016). (408.) See Natasha Babazadeh, Concealing Evidence: "Parallel Construction," Federal Investigations, and the Constitution......
  • Bringing defendant before the court
    • United States
    • James Publishing Practical Law Books Federal Criminal Practice
    • 30 d6 Abril d6 2022
    ...a legitimate expectation of privacy in the area. See United States v. Gooch , 6 F.3d 673, 677 (9th Cir. 1993); United States v. Patrick , 842 F.3d 540, 545 (7th Cir. 2016) (“[a] person wanted on probable cause who is taken into custody in a public place, where he had no legitimate expectati......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT