“What’s left of the Fourth Amendment?” That is the question asked by Associate Justice Neil Gorsuch in his dissent in the 2018 case of Carpenter v. United States.REF The majority held that police may not collect historical cell-site location information (CSLI) from a mobile phone provider without a search warrant, at least when the police seek seven days or more of that information.REF But the holding has broader implications well beyond CSLI. It marks a key inflection point in Fourth Amendment jurisprudence, protection of privacy, and the ever-changing role of technology in our everyday lives.REF
The decision in Carpenter may require the police to get a warrant for a host of information that are in the hands of third parties.REF However, there are limits to its reach, and certain items, voluntarily and knowingly provided to third parties, fall outside the warrant requirement of Carpenter. The focus of this paper is one of those areas: third-party private websites that post forensic genetic genealogy (FGG) information available to the public including law enforcement agencies.
The consumer genetics industry has exploded in recent years, in large part because the cost of conducting genetic testing has fallen dramatically and consumers are yearning to find out more about their lineage.REF According to a 2019 MIT Technology Review article, more than 29 million consumers had added their DNA to four leading commercial ancestry and health databases.REF The two leading direct-to-consumer (DTC) genetic testing companies, Ancestry.com and 23andMe, account for the largest portion of the marketplace.REF
A majority of consumers who voluntarily use and receive reports from DTC genetic testing companies take the additional step of posting that information to a third-party website, like GEDMatch, to get additional information about their distant relatives. GEDMatch, Parabon Nanolabs, and other third-party websites allow anyone (including law enforcement officials) to access the non-identifying information on and post DNA profiles to those websites as long as they register. In return, the customer gets a list of distant relatives and a family tree associated with the sample.
Law enforcement agencies increasingly have posted crime-scene DNA from perpetrators of crime to these public websites in the hopes that they can find a distant relative of the criminal, and this has yielded results. That is how, for example, authorities recently cracked the Golden State Killer case.REF
Privacy advocates and legal scholars have called into question the constitutionality of this method, called long-range familial searching. They have also suggested that Carpenter requires law enforcement officials to get a warrant or subpoena to access such third-party public websites. For the reasons explained in this paper, those constitutional concerns lack merit, and the police should not need a warrant to access third-party, private genetics websites.
The Fourth Amendment Before Carpenter
The Fourth Amendment contains two clauses, one that prohibits “unreasonable searches and seizures” and another specifying the requirements for a search warrant. The text does not prohibit warrantless searches and seizures, but the Supreme Court of the United States has construed it to make such conduct presumptively unlawful.
The amendment, however, protects against searches and seizures conducted by the government, so it does not violate the Fourth Amendment if your neighbor rummages through your garage and borrows your lawn mower without a warrant or your permission. Accordingly, there is a line distinguishing between conduct attributable to the government and conduct that is attributable to private parties, and it is only the former that raises a potential Fourth Amendment issue.
The answer to the question of whether the government has conducted a “search” often depends on whether a court believes, pursuant to a two-part test derived from a concurring opinion by Justice John Marshall Harlan II in the 1967 Supreme Court case of Katz v. United States, that the government has intruded on an individual’s reasonable expectation of privacy.REF In Katz, the majority held that the Fourth Amendment “protects people, not places,”REF and is not dependent on intrusion into physical spaces, overturning the trespass doctrine the Court had previously established in Olmstead v. United States.REF The two-part test, which has become the touchstone since Katz, is (1) did the affected individual have an actual (subjective) expectation of privacy, and (2) is that expectation one that society is prepared to recognize as reasonable.REF
Two developments that largely began in the 19th century but accelerated in the 20th—specifically, the transition from what was principally an agricultural economy to a commercial one and sense-improving advances in technology—have complicated Fourth Amendment law. We now give third parties (e.g., banks and credit card companies) an enormous amount of information about ourselves in order to engage in commerce, and we have enhanced our senses’ ability to see and hear at a distance utilizing emerging technologies (e.g., spotlights, microphones, and mobile phones). One result is that the government and private parties now have the ability to intrude on our privacy with information we voluntarily turn over to them or at a distance in ways that the Framers could not have contemplated.
Some of these ways create no problem.REF Others do.REF The question is: How do we draw the line between them?
As technology has become more advanced, giving consumers (and the government) tools that can measure, track, and record the most intimate aspects of our private lives, the Court has had to grapple with how to square rights guaranteed under the Fourth Amendment with traditional notions of privacy. The Court has taken an incremental approach, solving each case by trying to apply the Fourth Amendment to the newest technology.
In 2001, the Court found in Kyllo v. United StatesREF that the police violated the Fourth Amendment when they used a thermal imaging device to detect heat from private areas of a suspect’s home that was generated by heating lights designed to help grow marijuana indoors. Authored by Justice Antonin Scalia, the nub of the Court’s majority decision was this:
We think that obtaining by sense enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical “intrusion into a constitutionally protected area,” constitutes a search—at least where (as here) the technology in question is not in general public use.REF
In 2012, the Court delved back into the Fourth Amendment and yet another technological advance, global positioning systems (GPS), in United States v. Jones.REF
GPS technology made tracking someone’s vehicle far easier than it had been. Previously, the police had to follow an individual who was “on the move” in an automobile in one or more cars by conducting what is known in the vernacular as a “tail.” That was constitutionally permissible. As the Court wrote in 1983 in United States v. Knotts, “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.”REF
In Jones, the government obtained a search warrant to attach an electronic tracking device within 10 days to a Jeep registered to Antoine Jones’s wife in the District of Columbia. The police, however, did not attach the device within those 10 days. Then, on the 11th day, after the warrant had expired, they attached a GPS tracking device to the undercarriage of the Jeep located in Maryland, and over the next 28 days, the government used the device to track the vehicle’s (and Antoine Jones’s) movements. The tracking device provided the government with data about the vehicle’s location within 50 to 100 feet. It relayed more than 2,000 pages of data over the four-week period.
Writing for the majority, Scalia stated that “the Government physically occupied private property for the purpose of obtaining information. We have no doubt that such a physical intrusion would have been considered a ‘search’ within the meaning of the Fourth Amendment when it was adopted,” citing the 18th century case of Entick v. Carrington.REF
According to Professor Orin Kerr, a noted Fourth Amendment scholar, the Court’s decision was a surprise both because the Court was unanimous as to the result and because the Justices split almost evenly along two equally underdeveloped rationales. Scalia’s majority opinion, joined by four other Justices, decided the case by purporting to rediscover a lost trespass test in Fourth Amendment law. Because installing a GPS device on the car would have been a trespass under 18th century property law, Scalia asserted, the installation was a search.REF
According to Kerr, the two concurring opinions in Jones suggested even more dramatic and far-reaching changes. Joined by a total of five Justices, the two concurring opinions—one by Justice Sonia Sotomayor, who also joined Scalia’s decision, and one by Justice Samuel Alito, joined by three other Justices—offer a reconceptualization of the basic building block of Fourth Amendment analysis: Instead of asking whether individual government intrusions are searches, they suggest, the Court should look to whether aggregated acts of evidence collection and evidence are searches.REF
In her concurrence, Sotomayor noted the deeply revealing nature of the information that detailed location data can disclose, such as one’s “familial, political, professional, religious, and sexual associations.”REF As discussed below, the “deeply revealing nature” of the collected information would later become the first factor in the three-part test announced in Carpenter, and the two concurring opinions in Jones later formed the basis for the majority opinion in Carpenter.
At least one scholar noted that the decision in Jones marked the beginning of the erosion of the third-party doctrine: [E]even though the Court based its ruling on a government trespass…certain Justices were clearly troubled by the constancy of surveillance enabled by the device.”REF
Then, in 2014, the Court ruled unanimously in Riley v. CaliforniaREF that the police generally may not without a warrant search digital information on a cell phone seized from an individual who has been arrested. The decision was a “major endorsement of treating computer searches differently than physical searches.”REF Chief Justice John Roberts, who wrote the majority opinion in Riley, presented the challenge for the Court: the need to decide “how the search incident to arrest doctrine applies to modern cell phones, which are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.”REF
Prior to Riley, the search incident to arrest exception to the warrant requirement had been cemented into Supreme Court precedent since 1914REF and was adopted, as were many other principles, from English common law. For example, the Court upheld the search of a house incident to arrest in Chimel,REF a cigarette package found in the coat of the person arrested in Robinson,REF and a person’s vehicle (when the arrestee is unsecured and within reaching distance of the passenger compartment at the time of the search) in Gant.REF
To the Chief Justice and the other Justices, however, cell phones are just different. As the Chief said in Riley, cell phones are “minicomputers” that contain “vast quantities of personal information.” They are “not just another technological convenience,” because they can also be called “cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers.”REF Searching a cell phone can reveal a person’s Internet browsing history, a medical prescription, and bank statements as well as where a person has been. In short, Roberts warned, smart phones “hold for many Americans the privacies of life,” and their contents are therefore protected by the Fourth Amendment.REF Thus, reasoned the Court, “a search of the information on a cell phone bears little resemblance to the type of brief physical search considered in Robinson.”REF
The opinion in Riley was “just the tip of the iceberg,” according to Kerr. “Computers have now generated a very different rule for searches incident to arrest: The police have to follow one rule for physical evidence and a different rule for digital evidence.”REF
But not all information contained on a computer about a person, even deeply revealing data, is subject to the protection of the Fourth Amendment, even under an expansive reading of Carpenter.
The New Carpenter Rule
The facts in Carpenter were not in dispute. In 2011, police officers arrested four men suspected of robbing a series of Radio Shack and T-Mobile stores in Detroit. One of the men confessed that the group had robbed nine different stores in Michigan and Ohio. He identified 15 accomplices who had participated in the heists and gave the Federal Bureau of Investigation (FBI) some of their cell phone numbers. One of those numbers belonged to Timothy Carpenter. Based on that information, the government applied for court orders under the Stored Communications Act (SCA)REF to obtain cell phone records for Carpenter and others.
A judge issued two orders directing Carpenter’s wireless carriers—MetroPCS and Sprint—to disclose “cell/site sector [information] for [Carpenter’s] telephone[ ] at call origination and at call termination for incoming and outgoing calls” during the four-month period when the string of robberies occurred.REF
The government did not seek search warrants for the cell-site location information, but rather sought court orders pursuant to the SCA, which are subject to a lower standard than the “probable cause” standard that is necessary to obtain a search warrant. Furthermore, the government was not seeking the contents of the calls; it was seeking only the CSLI for the beginning and end of each call and the date and time of each transaction.
This information is often quite helpful to and commonly requested by prosecutors, who then try to match the cell site location of a person’s calls on select days to see whether that phone was at or near the scene of a crime or crimes. If the CSLI of a person’s phone puts the phone at or near the scene of a crime on the day and time a crime happened, that is strong circumstantial evidence that the owner of the phone was there at that date and time.
MetroPCS produced records spanning 127 days, and Sprint produced two days of CSLI covering the period when Carpenter’s phone was “roaming” in northeastern Ohio. In all, the government obtained 12,898 location points cataloging Carpenter’s movements—an average of 101 data points per day.REF
At his trial on charges of robbery and gun possession, Carpenter moved to suppress the cell-site data provided by the wireless carriers, arguing that the government’s seizure of the records violated his Fourth Amendment rights because they were obtained without a warrant supported by probable cause. The District Court denied the motion, and the Court of Appeals for the Sixth Circuit affirmed.REF
Relying on Smith v. Maryland, the Court of Appeals held that Carpenter lacked a reasonable expectation of privacy in the location information collected by the FBI because he had shared that information with his wireless carriers.REF Quoting from Smith, the court noted that cell phone users voluntarily convey cell-site data to their carriers as “a means of establishing communication.”REF Therefore, the business records, “voluntarily” provided to and held by a third party, were not entitled to Fourth Amendment protection. The opinion by the appeals court was not surprising, as courts across the land, relying on the third-party doctrine and the holding in Smith, had issued similar rulings in similar cases.
In a 5–4 decision, the U.S. Supreme Court held that Carpenter’s rights had been violated and that police may not collect historical cell-site location information from a cell phone provider without a warrant, at least when the police seek seven days or more of that information.REF The majority opinion, written by Chief Justice John Roberts, relied in large part on the concurring opinions in Jones.
The majority reasoned that “requests for cell-site records lie at the intersection of two lines of cases, both of which inform our understanding of the privacy interests at stake.”REF Those two lines of cases are (1) those that address a “person’s expectation of privacy in his physical location and movements,”REF otherwise known as the reasonable expectation of privacy (REP) test, and (2) those where the “Court has drawn a line between what a person keeps to himself and what he shares with others,”REF otherwise known as the third-party doctrine.
The third-party doctrine says that information a person voluntarily discloses to a third party is not protected by a reasonable expectation of privacy.REF The doctrine traces its roots to two Supreme Court cases: United States v. MillerREF and Smith v. Maryland.REF
In Miller, the government was investigating an individual named Mitch Miller for tax evasion and subpoenaed his banks for canceled checks, deposit slips, and monthly statements. The Court rejected a Fourth Amendment challenge to the records collection on two grounds: (1) Miller could “assert neither ownership nor possession”REF of the documents because they were “business records of the banks,” and (2) the checks were “not confidential communications but negotiable instruments to be used in commercial transactions,” and the bank statements contained information “exposed to [bank] employees in the ordinary course of business.”REF
In Smith, the Court ruled that the government’s use of a pen register—a device that recorded the outgoing phone numbers dialed on a landline telephone—was not a search. The Court “doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial.”REF Furthermore, as the Court explained, such an expectation “is not one that society is prepared to recognize as reasonable.”REF Those numbers dialed were, like the bank records in Miller, business records and not subject to Fourth Amendment protection. Every time Smith made a phone call, he “voluntarily conveyed” the dialed numbers to the phone company by “expos[ing] that information to its equipment in the ordinary course of business.”REF
Even before the Court issued its decision in Carpenter, it was clear that the Justices were wrestling with how to square traditional notions of the Fourth Amendment, tied at first to property rights, with advances in modern technology. As the Court acknowledged in Carpenter, quoting its decision in Kyllo: “As technology has enhanced the Government’s capacity to encroach upon areas normally guarded from inquisitive eyes, this Court has sought to ‘assure[ ] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.’”REF
As one might expect, however, rather than make wholesale, sweeping pronouncements about the application of the Fourth Amendment to whole new classes of technology, the Court has taken an incremental approach based on the facts in particular cases that dealt with distinct technologies.REF Kerr describes the Court’s approach to technology and the Fourth Amendment as “the theory of equilibrium-adjustment.”REF He posits that the “Supreme Court adjusts the scope of Fourth Amendment protection in response to new facts in order to restore the status quo level of protection.” Whether or not the Court is consciously engaged in equilibrium adjustment with respect to the Fourth Amendment and emerging technologies, it is clear that the “Chief Justice has declared in successive landmark decisions that the information age has produced technological changes that are different in kind not merely in degree from the technology of the past,” which another prominent scholar, Paul Ohm, calls Roberts’s “tech exceptionalism.”REF
The fact of the matter is that the Court’s decision in Carpenter “takes the Fourth Amendment in a new direction, adding new protections for non-content third-party business records.”REF After Carpenter, Professor Ohm wrote, “the third-party doctrine appears to be nearly dead.”REF However, rumors of the third-party doctrine’s death may be greatly exaggeratedREF and would certainly come as a surprise to the five Justices in the majority who claimed otherwise. Describing their opinion as “narrow,” the Justices in the majority in Carpenter went out of their way to say that the third-party doctrine is alive and well. Chief Justice Roberts wrote:
We do not disturb the application of Smith and Miller or call into question conventional surveillance techniques and tools, such as security cameras. Nor do we address other business records that might incidentally reveal location information. Further, our opinion does not consider other collection techniques involving foreign affairs or national security.REF
Time will tell whether the third-party doctrine is alive or dead after Carpenter, but one thing will certainly be alive and well: Fourth Amendment legal challenges, based on an expansive reading of Carpenter, to things held in the hands of third parties that are not tied to CSLI. Before Carpenter, Fourth Amendment protections were tied to “places and thingsREF and focused more on the “nature of the police intrusion required to obtain information than [they did on] the nature of the information obtained.”REF The Court in Carpenter set out on a “new path”REF and added “protection to information because of what it may reveal.”REF But there are limits to even the most revealing pieces of information, depending on how it is revealed and who reveals it.
In the penultimate paragraph of the opinion, the Court summarized the characteristics of CSLI that led the Court to extend Fourth Amendment protections to it: (1) its deeply revealing nature; (2) its depth, breadth, and comprehensive reach; and (3) the inescapable and automatic nature of its collection. The fact that the information was collected by a third party made no difference to the majority. Moreover, although the majority did not announce a multi-part test per se, those three factors for all intents and purposes are clearly going to be integral to any test.
Factor One: The Deeply Revealing Nature of the Information. Is the information sought by the government, whether held by a third party or not, deeply revealing? If so, under the first prong of the Carpenter test, the information more likely than not is protected by the Fourth Amendment. This factor is concerned with the intrinsic nature of the information itself.
The “deeply revealing” language came from Justice Sotomayor’s concurring opinion in Jones, in which she expressed concern about information that could possibly suggest “familial, political, professional, religious, and sexual associations.” Such information could be, and likely would be, deeply revealing.
Arguably, to fall under the ambit of the Carpenter holding, the information must be digital and not the type that could have been collected in the pre-digital age. It is rather like a constitutional grandfather clause: Pre-digital records and their modern equivalents are exempt.REF
Factor Two: Depth, Breadth, and Comprehensive Reach. All three factors speak primarily to the quantity of information stored.REF Depth refers to the detail and precision of the information sought.REF
It is one thing for the police to tail a suspect in his car around the city for two or three days, hoping to find out more about his whereabouts and travel habits. It is an entirely different matter when the police, because of technology, have the ability to find out where a suspect (or at least his cell phone) has been for 28 days with the degree of precision that CSLI provides. CSLI gave the government the location of the defendant’s phone, within 50 feet, in an uninterrupted stream of data. Even the most qualified police officer who has mastered the technique of tailing suspects without being spotted could not get that sort of detailed and precise information 24 hours a day for 28 straight days. But for the technology, the government just would not have been able to know that much private information about a person.
In contrast, breadth refers to time in two ways: how frequently the data are collected and for how long the data have been recorded.REF
Using the police-tailing-the-suspect example, one would assume that the officer would record periodically where and when the suspect drove from one location to another. Even if he had a partner in the car with him who could write down every turn, when it happened, and where the suspect went, the frequency of the note scribbling is far less than the automatic, computer-driven recordation of the suspect’s movements using CSLI.
A computer does not get tired. It does not eat, drink, or go to the bathroom. It does not work in shifts, does not have a boss to report to, and does not have a spouse or children to go home to or time sheets to fill out. But police officers get tired, must eat and drink, and have bosses and personal lives. There are physical limits to what a human can do and how long he can do it.
Technology is exceptional in that regard and one of the driving concerns in the cases from Kyllo to Jones to Riley and now to Carpenter. The ever-increasing power and scope of technology allows the government, through various government actors, to do things that it could not do before, and some of those things pierce the veil of privacy that we enjoyed prior to those technological advancements. They make possible that which it was previously impossible for humans to do on their own.
Finally, comprehensive reach refers to the number of people tracked in the database.REF
In the context of CSLI, the cell phone provider is, for business-related purposes, collecting on a constant basis cell-site information for each individual phone, even if that phone signal is from another carrier.REF Considering that there are approximately 396 million mobile device accounts in the United States (out of a population of around 326 million), that is a lot of digital data available to the government on a lot of people.REF It is by definition comprehensive, especially when you consider that at least 95 percent of adults in the United States have a cell phone and carry it with them everywhere they go.REF
The ubiquity of cell phones and how inextricably they are intertwined with the lives of virtually every adult American (and many non-adult Americans), was front and center in the majority opinion in Carpenter.
Factor Three: The Inescapable and Automatic Nature of Its Collection. Rather than focusing on the information’s intrinsic nature, the third factor operates in a much more traditional mode, focusing on what the database owner and data subject have done—or could have done—with the information.REF
In the context of using cell phones, it is impossible to use one without the phone sending a signal to a cell tower and then sending that signal along to the wireless provider, which in turn directs the call to the intended recipient.REF In other words, like it or not, you cannot use a cell phone without triggering the creation of CSLI.
According to the Electronic Freedom Foundation, which filed an amicus brief in Carpenter, for a phone to receive and share much of that information—in other words, to be usable at all—it must connect with a cell tower. Every time the cell phone connects with the cell tower, that connection generates information, stored by the phone company, about the location of the tower to which the phone is connected—which would indicate, more or less, where the phone was—on a given date and time. These small bits of data constitute the CSLI that is aggregated and preserved by cell phone providers.REF Cell phones automatically try to connect to the nearest or strongest base station, and as users move farther away from one base station and closer to another, their phones automatically transfer the connection to the new base station.REF
Kerr suggests that, with respect to Carpenter, “we need a theory of Fourth Amendment sensitive information that explains when an information transfer to the government has crossed the line from nonsearch to a search.”REF He suggests three steps for analyzing when a Carpenter search would occur, thereby requiring a warrant: (1) the records collected were available because of digital technology; (2) the records were created without the subject’s meaningful voluntary choice; and (3) the records sought tend to reveal the “privacies of life.”REF
The key word in Kerr’s second step, “meaningful,” comes directly from Carpenter. The government argued that since Carpenter knowingly used his phone, he had to know that he was sharing his location information with a company in order to make the phone work. Therefore, since the location information was in the hands of a third party (his cell phone provider), the third-party doctrine applied, and the government did not need a warrant to access the CSLI.
Chief Justice Roberts was not buying it. He had been wary of the power of technology and its increasing penetration into our private lives for some time. In his view, and in that of the Justices who joined his opinion, Carpenter was not voluntarily disclosing his CSLI in a “meaningful sense.”REF Cell-site location tracking was inescapable. The records were created automatically whenever the phone was used,REF and cell phones had become “such a pervasive and insistent part of daily life that carrying one is indispensable to participation in modern society.”REF “Apart from disconnecting the phone from the network,” the Chief Justice explained, “there is no way to avoid leaving behind a trail of location data.”REF
Criminals Have No Reasonable Expectation of Privacy in Evidence They Abandon at a Crime Scene
In California v. Greenwood, the Supreme Court held that garbage placed at the curbside is unprotected by the Fourth Amendment.REF The Court held that the defendant had no reasonable expectation of privacy for trash deposited on public streets that was “readily accessible to animals, children, scavengers, snoops, and other members of the public.” Police cannot be expected to ignore criminal activity that can be observed by “any member of the public.”
In the context of discarded DNA,REF state courts have used the holding in Greenwood to permit the collection of genetic material not only from crime scenes,REF but also from other items, such as discarded water bottles, gum, sealed envelopes, cigarette butts,REF saliva from the mouthpiece of a passive alcohol screening device,REF a cell phone dropped during a robbery attempt,REF and more. Similarly, someone who leaves his blood at a murder scene may reasonably expect police to analyze it in order to ascertain the identity of the killer using all tools and technological techniques available to law enforcement agencies.
The case of Raynor v. MarylandREF is an instructive illustration of how courts have treated DNA abandoned at a crime scene. In April 2006, in the early morning, an unknown male cut the victim’s telephone line after chiseling open the basement door. After entering the victim’s bedroom, he pressed a pillow against her face and threatened to kill her if she moved. Then, tying a shirt over the victim’s face as a blindfold, he raped her and fled. During the attack, the victim noticed that her attacker had a wedding band on his hand and had a “metallicky odor.”
The case was unsolved for two years. Eventually, the victim pieced together that the defendant, who used to live in the victim’s home before she did, might be her attacker. She told the police, who in turn contacted Raynor, who agreed to come into the police station to be interviewed about the rape.
The police asked Raynor to consent voluntarily to providing his DNA to see whether it matched the DNA collected from the crime scene. He refused. Raynor, who wore a short-sleeved shirt during the interview, was scratching himself throughout the ordeal. After he left the police station, the police swabbed the armrests of the chair on which he had been sitting. Raynor’s DNA profile was found to match the DNA profile developed from the evidence taken from the pillow case and patio at the scene of the crime.
The Maryland Court of Appeals (the state’s highest court) held that the “analysis of the 13 identifying loci within Raynor’s DNA left behind on the chair at the police station, in order to determine a match with the DNA the police collected from the scene of the rape, was not a search” under the Fourth Amendment. Because there is no reasonable expectation of privacy in the DNA abandoned by a criminal at a crime scene, the government’s action in collecting and testing those abandoned samples was not a search within the meaning of the Fourth Amendment.
Fourth Amendment Rights Are Personal Rights
Fourth Amendment rights are personal rights that may be asserted only by a defendant who has a legitimate expectation of privacy in the invaded space or the thing searched.REF “The established principle,” according to the Supreme Court, “is that the suppression of the product of a Fourth Amendment violation can be successfully urged only by those whose rights were violated by the search itself, not by those who are aggrieved solely by the introduction of damaging evidence.”REF
Thus, to succeed on a motion to exclude evidence based on a claim of unreasonable search and seizure, a defendant must first establish a personal, reasonable, and legitimate expectation of privacy in the particular area searched or thing seized.REF In Kyllo, Jones, Riley, and Carpenter, each defendant claimed that the government violated his Fourth Amendment rights by searching his home, car, cell phone, and CSLI, respectively.
Simply being a target of an investigation does not create a legitimate expectation of privacy for a defendant.REF Even grossly unreasonable police conduct cannot alter the defendant’s need to show that the alleged misconduct violated his personal, reasonable, and legitimate expectation of privacy.REF Thus, for example, if a police officer were secretly to intercept a briefcase belonging to a third party and copy its contents, the defendant could not claim that his Fourth Amendment rights had been violated even if the information that was copied implicated him in a crime. In other words, there are no vicarious rights under the Fourth Amendment.REF
Government DNA Databases
The DNA Identification Act of 1994REF established the National DNA Index System (NDIS), which stores DNA profiles.REF NDIS is one part of the Combined DNA Index System (CODIS)—the national part—and is the generic term used to describe the FBI’s program of support for criminal justice DNA databases, as well as the software used to run these databases.REF All 50 states, the District of Columbia, the federal government, the U.S. Army Criminal Investigative Laboratory, and Puerto Rico contribute samples to the database.REF
The DNA Identification Act specifies the categories of data that may be maintained in the NDIS, including convicted offenders, arrestees, legal detainees, forensic casework, unidentified human remains, missing persons, and relatives of missing persons, as well as requirements for participating forensics laboratories relating to quality assurance, privacy, and expungement.REF Once a match is identified by the CODIS system, the laboratories involved in the match share information to verify the match and identify the individual.REF The only information contained in the CODIS database is an identifier of the contributing agency, a unique specimen identification number, the laboratory associated with analysis, and the DNA profile.REF
Several basic steps are performed during DNA testing regardless of the type of test being done.REF There are several different types of forensic DNA analyses,REF but the CODIS system uses the short tandem repeat (STR) technology to identify individuals. STR is a forensic analysis that evaluates specific regions (loci) that are found on nuclear DNA.REF The variable (polymorphic) nature of the STR regions that are analyzed for forensic testing is used to further differentiate one DNA profile from another.REF For example, the likelihood that any two individuals (except identical twins) will have the same 13-loci DNA profile can be as high as one in one billion or greater.REF
The FBI initially used 13 specific STR loci to serve as the standard for CODIS. The purpose of establishing a core set of STR loci is to ensure that all forensic laboratories can establish uniform DNA databases and, more important, share valuable forensic information. If the forensic or convicted offender CODIS index is to be used in the investigative stages of unsolved cases, DNA profiles must be generated by using STR technology and the specific 13 core STR loci selected by the FBI.REF As of January 1, 2017, however, the FBI added seven additional core loci to CODIS.REF
The CODIS loci come from noncoding parts of the DNA that do not reveal the genetic traits of the arrestee.REF Even if non-coding alleles could provide some information in that regard, they are not in fact tested with that objective in mind.REF
Private Consumer Genetics Databases
In contrast, finding out more about your genetic roots is the whole point of the consumer genetics industry, which has exploded in recent years in large part because the cost of conducting genetic testing has fallen dramatically and consumers are yearning to find out more about their lineage.REF According to an article in MIT Technology Review, by the start of 2019, more than 29 million consumers had added their DNA to four leading commercial ancestry and health databases.REF The two leading direct-to-consumer (DTC) genetic testing companies, Ancestry.com and 23andMe, account for the majority of the marketplace.REF
As a practical matter, a forensic DNA profile is usually generated by testing material left at a crime scene or on an object of interest to see whether scientists can find abandoned DNA and, if so, match that DNA profile to a known person.
In consumer genetics, a distant relative of a criminal purchases a genetics kit, submits a sample (such as saliva) to the company, and in time receives a profile of possible relatives and other information, depending on the company she selects. Eager to find out more about possible distant relatives or other information about her past, she voluntarily posts the non-identifying information to a third-party website, which in some cases is accessible to anyone, including law enforcement officials.
The majority of DTC ancestry genetic testing services rely on single nucleotide polymorphisms (SNPs, pronounced “snips”). SNPs are the most common type of genetic variation among people.REF Each SNP represents a difference in a single DNA building block, called a nucleotide.REF
SNP data can also reveal whether users share segments of their genomes with other users, predicting relatedness through a common ancestor.REF This works by analyzing the percentage of overlapping bits of genetic code called “identical by descent” sections that one shares with relatives.REF According to 23andMe, one likely shares roughly 12 percent of his genome with first cousins, about 3 percent with second cousins, and less than 1 percent with third cousins.REF The probability of detecting cousins is 100 percent for first cousins; more than 99 percent for second cousins; around 90 percent for third cousins; around 45 percent for fourth cousins; about 15 percent for fifth cousins; and less than 5 percent for sixth cousins and beyond.REF
23andMe offers consumers three services for a fee.REF Their reports are quite detailed and give the consumer more information about her past than she had to begin with.REF Ancestry.com offers similar services to inquisitive customers.REF
Both 23andMe and Ancestry.com allow customers to download their raw genetic data in a plain text format.REF Raw genetic information contains sensitive personal information, and DTC companies advise customers to protect such information. That is why most DTC companies require law enforcement to obtain a warrant to access these reports, as those reports—like government DNA databases—contain highly discriminatory information that identifies an individual via the genetic profile. What customers do with that report and how they use the information are up to them.
In addition, 23andMe’s and Ancestry.com’s terms of service state that they will not disclose a user’s genetic data without a legal subpoena or warrant and that users cannot submit samples under an alias.REF
Up to 62 percent of DTC customers upload their genetic data to third-party websites for free or for a small fee.REF One of the more well-known such companies is GEDMatch. GEDMatch’s purpose is to provide DNA and genealogy tools for comparison and research purposes.REF Customers can upload raw SNP data to GEDMatch, and after the data are analyzed, the site produces a list of likely relatives automatically without the need to share any underlying genetic information with that supposed relative.
GEDMatch’s terms of service require that the customer register before using its service. Users can provide a real name for registration and data upload or (unlike 23andMe and Ancestry.com) provide an alias for either login or data.REF
Taking advantage of this ability to enter data using an alias, law enforcement officials have entered DNA from crime scenes or objects associated with a “violent crime,” defined as murder, non-negligent manslaughter, aggravated rape, robbery, or aggravated assault.REF Sometimes their efforts pay off, but not in the same way that forensic DNA matching happens where there is a “match” between the unknown DNA sample from the crime scene and a known profile. Rather, law enforcement agencies receive the same information that anyone else would receive when they use a third-party website: a list of possible relatives.
In this manner, a relative’s genetic data can act as a silent witness, or “genetic informant,” against the person who left the DNA at the crime scene.REF This genetic informant wordlessly guides law enforcement officers to a handful of potential suspects simply by informing them that a suspect is very likely a third cousin, nephew, or grandson of the person in the DTC database or perhaps the perpetrator himself.REF
Police then engage in a process of elimination by, among other things, combing through public records such as birth records, death records, driver’s licenses, newspaper clippings, and the like to try to put a known name (from the handful of potential suspects) at or near the scene of the crime at the date and time of the crime. Once they narrow the list down to one or two potential suspects, police can decide how best to establish affirmatively that one of them is the person who left DNA at the crime scene. This methodology, called long-range familial searching (LRFS), has produced significant results, including helping to catch Joseph James DeAngelo Jr. (aka the Golden State Killer) and assisting in resolving scores of other previously unsolved crimes.
DeAngelo was one of the most prolific serial killers in the United States. He was responsible for murdering 13 women and raping dozens more in California in the 1970s and 1980s. Known by various names, including the “Visalia Ransacker,” the “East Area Rapist,” and the “Original Night Stalker,” DeAngelo eluded capture, as he was deliberate, calculating, and careful not to leave a trace.REF Over the years, law enforcement agencies entered unknown DNA, ostensibly left by the murderer/rapist, into CODIS but came up empty-handed.
Then the consumer genetics industry sprang to life, and law enforcement officials decided to use LRFS, which cracked the decades-old case wide open. Through familial searching on GEDMatch, investigators identified relatives of DeAngelo, including family members directly related to his great-great-great-great grandfather dating back to the 1800s.REF From there, investigators built about 25 different family trees.REF The tree that eventually linked to DeAngelo alone contained approximately 1,000 people.REF Over the next few months, investigators used other clues like age, sex, and place of residence to rule out suspects populating those trees, eliminating suspects one by one until only DeAngelo remained.REF
From there, they narrowed it down to the Sacramento-area grandfather using DNA obtained from material he had discarded. When questioned by authorities in April 2018, DeAngelo said that “Jerry,” an inner personality, made him do the crimes, which ended abruptly in 1986.REF But during the same interview, while he was alone in the interrogation room, he also uttered the words “I did all that,” referring to 13 murders and multiple rapes about which the police had questioned him.REF In June of 2020, DeAngelo, 74, pleaded guilty to all of the murders, closing the case.
Why Carpenter Does Not Apply to Third-Party Websites
Legal scholars and privacy experts have raised alarm bells over this practice and since the decision in Carpenter have claimed that genetic information disclosed to third-party DTC providers is subject to the Fourth Amendment.REF They assert, among other things, that genetic information is “precisely the sort of data in which individuals may ordinarily maintain an expectation of privacy”REF and that allowing law enforcement officers warrantless access to third-party DTC genetic databases, which they claim is currently “unfettered,”REF circumvents their customers’ reasonable expectation of privacy.REF
As noted previously, however, the genealogical information provided by DTC companies is far different from the DNA profile analyzed by and collected in government databases. That difference has been lost on some, including at least one state representative.
Maryland State Delegate Charles Sydnor, a Democrat who represents Baltimore County, sponsored a bill to prevent “a person from performing a search of a certain DNA or genealogical data base for the purpose of identification of an offender in connection with a crime for which the offender may be a biological relative of the individual from whom the DNA sample was acquired; and generally relating to DNA analysis.”REF Fortunately, Delegate Sydnor’s bill, which would have prevented searches of public third-party genealogical websites by anyone, including law enforcement, failed.
When Sydnor introduced his bill, he said that consumers who were uploading their profiles to third-party websites were unknowingly subjecting themselves to “genetic dragnets” in providing the samples to public websites. That concern, however, has more to do with whether the consumer was able to read and understand the terms of service of the DTC company, not the privacy rights of a distant criminal relative of the consumer who might be identified by police using LRFS. One scholar put it this way: “law enforcement’s use of LRFS to solve cold cases is a bogeyman…. [M]any aspects of the methodology implicate nothing new, legally or ethically, and might even better protect privacy while exonerating the innocent.”REF
There are, to be sure, many consumer genetics companies, and the list is growing, but the two with the largest market share, 23andMe and Ancestry.com, state in plain English to potential customers that they will not disclose a user’s genetic data without a legal subpoena or warrant. They also do not allow users to submit samples under an alias.
Justice Neil Gorsuch, asked in his dissent in Carpenter, “Can [the government] secure your DNA from 23andMe without a warrant or probable cause? Smith and Miller say yes it can—at least without running afoul of Katz. But that result strikes most lawyers and judges today—me included—as pretty unlikely.”REF His question is revealing.
First, both 23andMe and Ancestry.com require a warrant or subpoena to get a user’s genetic data. The concern that the Court may have to choose between allowing the government access to those DTC websites without a warrant under a Smith–Miller third-party doctrine theory, or require it under a Carpenter approach, is therefore speculative at best. The websites require a warrant or some other form of legal process such as a subpoena.
Second, Justice Gorsuch’s question evinces a fundamental misunderstanding of how consumer genetics companies actually work, who uses their services, and how and when law enforcement officials engage in LRFS. Consumers pay money to DTC companies to find out more about themselves. Consumers give DTC companies their saliva and in exchange get a report related to their ancestry (or more if they buy additional services). That information is held by the company and the consumer, and no one else. No one required the consumer to purchase the service. The record is produced at the request of the consumer, unlike CSLI, which is aggregated automatically as a result of using a cell phone.
Consumers can choose to do nothing with that information. Or they can voluntarily post the raw data to a third-party vendor, like GEDMatch, in the hope that they can learn about even more distant relatives. For those companies that allow law enforcement agencies access to their websites, law enforcement officials are not “securing your DNA without a warrant or probable cause.” Rather, they are taking DNA abandoned by a criminal at a crime scene and posting it to the website in the hope that the sample might possibly be connected genetically to another customer’s sample.
As to the argument that genetic information is the sort of data in which individuals maintain an expectation of privacy and that any attempt to obtain such information is therefore subject to the warrant requirement of the Fourth Amendment, it fails on a number of levels.
First, there are two categories of people involved here. The first person is the criminal who abandoned his DNA at a crime scene. Once he abandoned his DNA, whether he knew he was aware that he did so or not, he lost any Fourth Amendment protections.
The second category is the consumer, who for whatever reason decides to find out more about her genealogy. The consumer willingly provides her saliva to the DTC and in exchange receives what she contracted to receive: a report that details her genealogy. If she used 23andMe or Ancestry.com and decides to take no further action with the report, her information is protected from everyone, including law enforcement agencies, as neither company posts the information to the public. Her privacy is protected, and the government, if it somehow found out about it, would need a warrant to get that information.
If, on the other hand, she decides she wants more information about her family tree, she can contract with a third-party vendor like GEDMatch. Those vendors’ terms and conditions are clear; the information generated from their analysis is open to the public (minus identifying information), and anyone, including a law enforcement officer, that is a registered user can access the information even if he or she registered using an alias. The consumer, by her own choice, has shared her genealogy with the public.
Unlike the situation in Carpenter, where a cell phone user has no choice but to “allow” cell towers to collect massive amounts of information about the location of the phone 24/7, the consumer has a choice about whether to contract with a DTC and whether to keep that information hidden from the public. Furthermore, law enforcement’s use of LRFS falls well outside the three-part test in Carpenter, as well as Professor Kerr’s three-step framework for a Carpenter search.
Read narrowly, the Carpenter decision is about a trail of location data related to CSLI. Any time the police obtain information from massive databases assembled by private parties that reveal an accused’s location information, either directly or by inference, a criminal defendant will claim that the holding in Carpenter requires a warrant to get that information.REF
Genetic information can be deeply revealing (part one of the three-part Carpenter test). Our DNA is the essence of who we are as humans, and while the information in a DTC website has been made possible only because of technology, it reveals much about the person who voluntarily submitted the sample to the company. The fact that the consumer’s distant relative, who happens to have abandoned his DNA at a crime scene, may appear in her family tree does not give the criminal suspect any standing to assert a constitutional violation. Fourth Amendment rights are personal rights, and one cannot assert them vicariously on behalf of someone else. The genealogy report is deeply revealing to the consumer who purchased the program from the DTC, not to a defendant.
Similarly, the information arguably has depth, breadth, and a comprehensive reach (part two of the three-part Carpenter test). But the right of privacy belongs to the consumer, not to a defendant who abandoned his DNA at a crime scene.
Finally, there is nothing inescapable or automatic about the nature of the collection of the information involved (part three of the three-part Carpenter test). Here, a consumer has entered into a contract requesting that a company generate a genetics report and then has taken the additional step of posting the results to a third-party website. Both acts are completely voluntary. The person using the DTC website chose to submit a DNA sample for analysis; it was not automatically collected while the individual was engaging in some other indispensable or inextricably intertwined activity such as using a cell phone in today’s modern age.
Conclusion
Whether analyzed under a Katz reasonable expectation of privacy prism, or by applying the third-party doctrine or even stretching the boundaries of the Carpenter decision, law enforcement officials should not be required to obtain a warrant to search third-party genetics websites that allow for public access.
The consumer genetics industry, enabled by technology, has given consumers the opportunity to explore their lineage. When consumers voluntarily contract with DTC consumer genetics companies, receive a genetics report, and voluntarily post that report to a third-party website that gives the public and law enforcement agencies access to the non-identifying information, they expose private information to the public. That information, including the consumer’s family tree, does not give vicarious Fourth Amendment rights to distant relatives.
Law enforcement officers should not be required to get a warrant to query a public database on the off chance that they may find a distant relative of a person who abandoned his or her DNA at a crime scene.
Charles D. Stimson is a Senior Legal Fellow and Manager of the National Security Law Program in the Edwin Meese III Center for Legal and Judicial Studies, of the Institute for Constitutional Government, at The Heritage Foundation.