A bank robbery case with national consequences

A Supreme Court case that began with a 2019 bank robbery outside Richmond, Virginia, could reshape digital privacy law for millions of Americans. In Chatrie v. United States, the justices are weighing whether police use of a “geofence warrant” violated the Fourth Amendment when investigators asked Google to identify devices located near the crime scene.

The legal issue is narrow on paper but broad in practice. Geofence warrants work by drawing a virtual boundary around a place and a time, then compelling a technology company to provide information about users whose devices were inside it. In this case, police sought data from Google for anyone who had been within 300 meters of the Call Federal Credit Union when the robbery occurred.

The investigation relied on Google Maps Location History, which, according to the reporting around the case, can identify location within roughly three meters and refresh at short intervals. Police used the company’s records in stages, narrowing the pool of users until Okello Chatrie emerged as the prime suspect.

Why the case matters beyond one suspect

The question before the Court is not simply whether the police found the right person. It is whether the government can search a large population’s location data first and sort out suspicion later. That model is what makes geofence warrants especially controversial. Instead of targeting a known suspect, investigators begin by collecting data on everyone nearby, including people with no evident connection to a crime.

That is a sharp departure from traditional warrant practice, which generally requires particularized probable cause. In physical terms, it is closer to asking who happened to be on the block and only afterward deciding which person deserves closer scrutiny.

For civil liberties advocates, the risk is obvious: owning a smartphone can place an ordinary person inside an investigation without any individualized suspicion. For law enforcement, geofence requests have been an efficient way to generate leads in cases where witness statements, surveillance footage, and other evidence are limited.

The legal fault line

Chatrie’s attorney argues that this use of geofence data amounted to an unreasonable search and seizure under the Fourth Amendment. A federal district court agreed that the warrant lacked probable cause, but still allowed the evidence under the “good faith exception,” meaning police had relied on the warrant process even if the underlying search was constitutionally defective.

A federal appeals court went further, ruling that the Fourth Amendment had not been violated at all because Chatrie had voluntarily shared his location data with Google. That reasoning leans on the long-running “third-party doctrine,” under which information disclosed to a company can lose some constitutional protection.

That doctrine, however, has become increasingly strained in the smartphone era. Modern phones continuously generate sensitive data about where people live, work, travel, worship, shop, seek medical care, and meet others. Location records can be intensely revealing even when users do not actively think of themselves as “sharing” them in the ordinary sense.

Why timing matters now

There is an additional twist in the case: Google reportedly stopped storing Maps users’ location history in the cloud in 2024, citing privacy concerns. That does not make the case irrelevant. It highlights how quickly platform design, corporate data retention, and law enforcement practices can interact.

The Court’s ruling will still matter because the core principle reaches beyond one Google feature. The same logic could affect other forms of data stored by major technology companies, including information that reveals movement, presence, or proximity. A ruling that blesses geofence-style searches could encourage broader use of bulk digital demands. A ruling that restricts them could force police and prosecutors to rethink how they pursue location-based evidence.

The privacy stakes for ordinary users

Most people do not experience digital surveillance as a dramatic event. It is embedded in everyday life through maps, ride-hailing, weather apps, photo metadata, and app permissions that seem routine. The geofence debate exposes how quickly convenience data can become investigative evidence.

The case also reflects a deeper shift in criminal procedure. Historically, police had to observe, follow, or physically search in order to assemble evidence about someone’s movements. Now, technology companies may already hold a detailed historical map of where people have been. The constitutional question is whether the government can tap that archive in bulk without crossing a line the Fourth Amendment was designed to prevent.

That is why the case resonates far beyond criminal law specialists. It sits at the intersection of surveillance, platform governance, and civil liberties. If the Court sides with the government’s broadest theory, the practical effect could be to normalize suspicion by proximity. If it narrows the practice, it may establish one of the clearest limits yet on dragnet-style digital searches.

What comes next

The Supreme Court heard arguments on April 27 and is expected to issue a decision in the coming months. Whatever the outcome, the ruling will likely become a landmark reference point in the law of digital privacy.

The Court is being asked to answer a question that did not exist in anything like its current form a generation ago: when our devices constantly report back to the companies that power modern life, how much of that record remains private from the government? The answer in Chatrie may determine whether the constitutional shield around location data remains meaningful, or whether mere presence near a crime scene can be enough to pull innocent people into a police search.

This article is based on reporting by The Verge. Read the original article.

Originally published on theverge.com