4 What is a search? 4 What is a search?

4.1 KATZ v. UNITED STATES 4.1 KATZ v. UNITED STATES

Justice Harlan's 2-part test for a "reasonable expectation of privacy"

1. Individual (subjective) expectation of privacy

2. that Society is prepared to recognize as (objectively) reasonable.

KATZ v. UNITED STATES.

No. 35.

Argued October 17, 1967.

Decided December 18, 1967.

Burton Marks and Harvey A. Schneider argued the cause and filed briefs for petitioner.

*348 John S. Martin, Jr., argued the cause for the United States. With him on the brief were Acting Solicitor General Spritzer, Assistant Attorney General Vinson and Beatrice Rosenberg.

Mr. Justice Stewart

delivered the opinion of the Court.

The petitioner was convicted in the District Court for the Southern District of California under an eight-count indictment charging him with transmitting wagering information by telephone from Los Angeles to Miami and Boston, in violation of a federal statute.1 At trial the Government was permitted, over the petitioner’s objection, to introduce evidence of the petitioner’s end of telephone conversations, overheard by FBI agents who had attached an electronic listening and recording device to the outside of the public telephone booth from which he had placed his calls. In affirming his conviction, the Court of Appeals rejected the contention that the recordings had been obtained in violation of the Fourth Amend*349ment, because “[tjhere was no physical entrance into the area occupied by [the petitioner].”2 We granted certiorari in order to consider the constitutional questions thus presented.3

The petitioner has phrased those questions as follows:

“A. Whether a public telephone booth is a constitutionally protected area so that evidence obtained by attaching an electronic listening recording device to the top of such a booth is obtained in violation of the right to privacy of the user of the booth.
*350“B. Whether physical penetration of a constitutionally protected area is necessary before a search and seizure can be said to be violative of the Fourth Amendment to the United States Constitution.”

We decline to adopt this formulation of the issues. In the first place, the correct solution of Fourth Amendment problems is not necessarily promoted by incantation of the phrase “constitutionally protected area.” Secondly, the Fourth Amendment cannot be translated into a general constitutional “right to privacy.” That Amendment protects individual privacy against certain kinds of governmental intrusion, but its protections go further, and often have nothing to do with privacy at all.4 Other provisions of the Constitution protect personal privacy from other forms of governmental invasion.5 But the protection of a person’s general right to privacy— his right to be let alone by other people6 — is, like the *351protection of his property and of his very life, left largely to the law of the individual States.7

Because of the misleading way the issues have been formulated, the parties have attached great significance to the characterization of the telephone booth from which the petitioner placed his calls. The petitioner has strenuously argued that the booth was a “constitutionally protected area.” The Government has maintained with equal vigor that it was not.8 But this effort to decide whether or not a given “area,” viewed in the abstract, is “constitutionally protected” deflects attention from the problem presented by this case.9 For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. See Lewis v. United States, 385 U. S. 206, 210; United States v. Lee, 274 U. S. 559, 563. But what he seeks-to preserve as private, even in an area accessible to the public, may be constitutionally pro*352tected. See Rios v. United States, 364 U. S. 253; Ex parte Jackson, 96 U. S. 727, 733.

The Government stresses the fact that the telephone booth from which the petitioner made his calls was constructed partly of glass, so that he was as visible after he entered it as he would have been if he had remained outside. But what he sought to exclude when he entered the booth was not the intruding eye — it was the uninvited ear. He did not shed his right to do so simply because he made his calls from a place where he might be seen. No less than an individual in a business office,10 in a friend’s apartment,11 or in a taxicab,12 a person in a telephone booth may rely upon the protection of the Fourth Amendment. One who occupies it, shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world. To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communication.

The Government contends, however, that the activities of its agents in this case should not be tested by Fourth Amendment requirements, for the surveillance technique they employed involved no physical penetration of the telephone booth from which the petitioner placed his calls. It is true that the absence of such penetration was at one time thought to foreclose further Fourth Amendment inquiry, Olmstead v. United States, 277 U. S. 438, 457, 464, 466; Goldman v. United States, 316 U. S. 129, 134-136, for that Amendment was thought to limit only searches and seizures of tangible *353property.13 But “[t]he premise that property interests control the right of the Government to search and seize has been discredited.” Warden v. Hayden, 387 U. S. 294, 304. Thus, although a closely divided Court supposed in Olmstead that surveillance without any trespass and without the seizure of any material object fell outside the ambit of the Constitution, we have since departed from the narrow view on which that decision rested. Indeed, we have expressly held that the Fourth Amendment governs not only the seizure of tangible items, but extends as well to the recording of oral statements, overheard without any “technical trespass under . . . local property law.” Silverman v. United States, 365 U. S. 505, 511. Once this much is acknowledged, and once it is recognized that the Fourth Amendment protects people— and not simply “areas” — against unreasonable searches and seizures, it becomes clear that the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure.

We conclude that the underpinnings of Olmstead and Goldman have been so eroded by our subsequent decisions that the “trespass” doctrine there enunciated can no longer be regarded as controlling. The Government’s activities in electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a “search and seizure” within the meaning of the Fourth Amendment. The fact that the electronic device employed to achieve that end did not happen to penetrate the wall of the booth can have no constitutional significance.

*354The question remaining for decision, then, is whether the search and seizure conducted in this case complied with constitutional standards. In that regard, the Government’s position is that its agents acted in an entirely defensible manner: They did not begin their electronic surveillance until investigation of the petitioner’s activities had established a strong probability that he was using the telephone in question to transmit gambling information to persons in other States, in violation of federal law. Moreover, the surveillance was limited, both in scope and in duration, to the specific purpose of establishing the contents of the petitioner’s unlawful telephonic communications. The agents confined their surveillance to the brief periods during which he used the telephone booth,14 and they took great care to overhear only the conversations of the petitioner himself.15

Accepting this account of the Government’s actions as accurate, it is clear that this surveillance was so narrowly circumscribed that a duly authorized magistrate, properly notified of the need for such investigation, specifically informed of the basis on which it was to proceed, and clearly apprised of the precise intrusion it would entail, could constitutionally have authorized, with appropriate safeguards, the very limited search and seizure that the Government asserts in fact took place. Only last Term we sustained the validity of *355such an authorization, holding that, under sufficiently “precise and discriminate circumstances,” a federal court may empower government agents to employ a concealed electronic device “for the narrow and particularized purpose of ascertaining the truth of the . . . allegations” of a “detailed factual affidavit alleging the commission of a specific criminal offense.” Osborn v. United States, 385 U. S. 323, 329-330. Discussing that holding, the Court in Berger v. New York, 388 U. S. 41, said that “the order authorizing the use of the electronic device” in Osborn “afforded similar protections to those ... of conventional warrants authorizing the seizure of tangible evidence.” Through those protections, “no greater invasion of privacy was permitted than was necessary under the circumstances.” Id., at 57.16 Here, too, a similar *356judicial order could have accommodated “the legitimate needs of law enforcement” 17 by authorizing the carefully limited use of electronic surveillance.

The Government urges that, because its agents relied upon the decisions in Olmstead and Goldman, and because they did no more here than they might properly have done with prior judicial sanction, we should retroactively validate their conduct. That we cannot do. It is apparent that the agents in this case acted with restraint. Yet the inescapable fact is that this restraint was imposed by the agents themselves, not by a judicial officer. They were not required, before commencing the search, to present their estimate of probable cause for detached scrutiny by a neutral magistrate. They were not compelled, during the conduct of the search itself, to observe precise limits established in advance by a specific court order. Nor were they directed, after the search had been completed, to notify the authorizing magistrate in detail of all that had been seized. In the absence of such safeguards, this Court has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive *357means consistent with that end. Searches conducted without warrants have been held unlawful “notwithstanding facts unquestionably showing probable cause,” Agnello v. United States, 269 U. S. 20, 33, for the Constitution requires “that the deliberate, impartial judgment of a judicial officer ... be interposed between the citizen and the police . . ..” Wong Sun v. United States, 371 U. S. 471, 481-82. “Over and again this Court has emphasized that the mandate of the [Fourth] Amendment requires adherence to judicial processes,” United States v. Jeffers, 342 U. S. 48, 51, and that searches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment18 — subject only to a few specifically established and well-delineated exceptions.19

It is difficult to imagine how any of those exceptions could ever apply to the sort of search and seizure involved in this case. Even electronic surveillance substantially contemporaneous with an individual’s arrest could hardly be deemed an “incident” of that arrest.20 *358Nor could the use of electronic surveillance without prior authorization be justified on grounds of “hot pursuit.” 21 And, of course, the very nature of electronic surveillance precludes its use pursuant to the suspect’s consent.22

The Government does not question these basic principles. Rather, it urges the creation of a new exception to cover this case.23 It argues that surveillance of a telephone booth should be exempted from the usual requirement of advance authorization by a magistrate upon a showing of probable cause. We cannot agree. Omission of such authorization

“bypasses the safeguards provided by an objective predetermination of probable cause, and substitutes instead the far less reliable procedure of an after-the-event justification for the . . . search, too likely to be subtly influenced by the familiar shortcomings of hindsight judgment.” Beck v. Ohio, 379 U. S. 89, 96.

And bypassing a neutral predetermination of the scope of a search leaves individuals secure from Fourth Amend*359ment violations “only in the discretion of the police.” Id., at 97.

These considerations do not vanish when the search in question is transferred from the setting of a home, an office, or a hotel room to that of a telephone booth. Wherever a man may be, he is entitled to know that he will remain free from unreasonable searches and seizures. The government agents here ignored “the procedure of antecedent justification . . . that is central to the Fourth Amendment,” 24 a procedure that we hold to be a constitutional precondition of the kind of electronic surveillance involved in this case. Because the surveillance here failed to meet that condition, and because it led to the petitioner’s conviction, the judgment must be reversed.

It is so ordered.

Mr. Justice Marshall took no part in the consideration or decision of this case.

Mr. Justice Douglas,

with whom Mr. Justice Brennan joins,

concurring.

While I join the opinion of the Court, I feel compelled to reply to the separate concurring opinion of my Brother White, which I view as a wholly unwarranted green light for the Executive Branch to resort to electronic eavesdropping without a warrant in cases which the Executive Branch itself labels “national security” matters.

Neither the President nor the Attorney General is a magistrate. In matters where they believe national security may be involved they are not detached, disinterested, and neutral as a court or magistrate must be. Under the separation of powers created by the Constitution, the Executive Branch is not supposed to be neutral and disinterested. Rather it should vigorously inves*360tigate and prevent breaches of national security and prosecute those who violate the pertinent federal laws. The President and Attorney General are properly interested parties, cast in the role of adversary, in national security cases. They may even be the intended victims of subversive action. Since spies and saboteurs are as entitled to the protection of the Fourth Amendment as suspected gamblers like petitioner, I cannot agree that where spies and saboteurs are involved adequate protection of Fourth Amendment rights is assured when the President and Attorney General assume both the position of adversary- and-prosecutor and disinterested, neutral magistrate.

There is, so far as I understand constitutional history, no distinction under the Fourth Amendment between types of crimes. Article III, § 3, gives “treason” a very narrow definition and puts restrictions on its proof. But the Fourth Amendment draws no lines between various substantive offenses. The arrests in cases of “hot pursuit” and the arrests on visible or other evidence of probable cause cut across the board and are not peculiar to any kind of crime.

I would respect the present lines of distinction and not improvise because a particular crime seems particularly heinous. When the Framers took that step, as they did with treason, the worst crime of all, they made their purpose manifest.

Mr. Justice Harlan,

concurring.

I join the opinion of the Court, which I read to hold only (a) that an enclosed telephone booth is an area where, like a home, Weeks v. United States, 232 U. S. 383, and unlike a field, Hester v. United States, 265 U. S. 57, a person has a constitutionally protected reasonable expectation of privacy; (b) that electronic as well as physical intrusion into a place that is in this sense private may constitute a violation of the Fourth Amend*361ment; and (c) that the invasion of a constitutionally protected area by federal authorities is, as the Court has long held, presumptively unreasonable in the absence of a search warrant.

As the Court's opinion states, “the Fourth Amendment protects people, not places.” The question, however, is what protection it affords to those people. Generally, as here, the answer to that question requires reference to a “place.” My understanding of the rule that has emerged from prior decisions is that there is a twofold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as “reasonable.” Thus a man's home is, for most purposes, a place where he expects privacy, but objects, activities, or statements that he exposes to the “plain view” of outsiders are not “protected” because no intention to keep them to himself has been exhibited. On the other hand, conversations in the open would not be protected against being overheard, for the expectation of privacy under the circumstances would be unreasonable. Cf. Hester v. United States, supra.

The critical fact in this case is that “[o]ne who occupies it, [a telephone booth] shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume” that his conversation is not being intercepted. Ante, at 352. The point is not that the booth is “accessible to the public” at other times, ante, at 351, but that it is a temporarily private place whose momentary occupants' expectations of freedom from intrusion are recognized as reasonable. Cf. Rios v. United States, 364 U. S. 253.

In Silverman v. United States, 365 U. S. 505, we held that eavesdropping accomplished by means of an electronic device that penetrated the premises occupied by petitioner was a violation of the Fourth Amendment. *362That case established that interception of conversations reasonably intended to be private could constitute a “search and seizure,” and that the examination or taking of physical property was not required. This view of the Fourth Amendment was followed in Wong Sun v. United States, 371 U. S. 471, at 485, and Berger v. New York, 388 U. S. 41, at 51. Also compare Osborn v. United States, 385 U. S. 323, at 327. In Silverman we found it unnecessary to re-examine Goldman v. United States, 316 U. S. 129, which had held that electronic surveillance accomplished without the physical penetration of petitioner’s premises by a tangible object did not violate the Fourth Amendment. This case requires us to reconsider Goldman, and I agree that it should now be overruled.* Its limitation on Fourth Amendment protection is, in the present day, bad physics as well as bad law, for reasonable expectations of privacy may be defeated by electronic as well as physical invasion.

Finally, I do not read the Court’s opinion to declare that no interception of a conversation one-half of which occurs in a public telephone booth can be reasonable in the absence of a warrant. As elsewhere under the Fourth Amendment, warrants are the general rule, to which the legitimate needs of law enforcement may demand specific exceptions. It will be time enough to consider any such exceptions when an appropriate occasion presents itself, and I agree with the Court that this is not one.

Mr. Justice White,

concurring.

I agree that the official surveillance of petitioner’s telephone conversations in a public booth must be sub*363jected to the test of reasonableness under the Fourth Amendment and that on the record now before us the particular surveillance undertaken was unreasonable absent a warrant properly authorizing it. This application of the Fourth Amendment need not interfere with legitimate needs of law enforcement.*

In joining the Court’s opinion, I note the Court’s acknowledgment that there are circumstances in which it is reasonable to search without a warrant. In this connection, in footnote 23 the Court points out that today’s decision does not reach national security cases. Wiretapping to protect the security of the Nation has been authorized by successive Presidents. The present Administration would apparently save national security cases from restrictions against wiretapping. See Berger v. New York, 388 U. S. 41, 112-118 (1967) (White, J., *364dissenting). We should not require the warrant procedure and the magistrate’s judgment if the President of the United States or his chief legal officer, the Attorney General, has considered the requirements of national security and authorized electronic surveillance as reasonable.

Mr. Justice Black,

dissenting.

If I could agree with the Court that eavesdropping carried on by electronic means (equivalent to wiretapping) constitutes a “search” or “seizure,” I would be happy to join the Court’s opinion. For on that premise my Brother Stewart sets out methods in accord with the Fourth Amendment to guide States in the enactment and enforcement of laws passed to regulate wiretapping by government. In this respect today’s opinion differs sharply from Berger v. New York, 388 U. S. 41, decided last Term, which held void on its face a New York statute authorizing wiretapping on warrants issued by magistrates on showings of probable cause. The Berger case also set up what appeared to be insuperable obstacles to the valid passage of such wiretapping laws by States. The Court’s opinion in this case, however, removes the doubts about state power in this field and abates to a large extent the confusion and near-paralyzing effect of the Berger holding. Notwithstanding these good efforts of the Court, I am still unable to agree with its interpretation of the Fourth Amendment.

My basic objection is twofold: (1) I do not believe that the words of the Amendment will bear the meaning given them by today’s decision, and (2) I do not believe that it is the proper role of this Court to rewrite the Amendment in order “to bring it into harmony with the times” and thus reach a result that many people believe to be desirable.

*365While I realize that an argument based on the meaning of words lacks the scope, and no doubt the appeal, of broad policy discussions and philosophical discourses on such nebulous subjects as privacy, for me the language of the Amendment is the crucial place to look in construing a written document such as our Constitution. The Fourth Amendment says that

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The first clause protects “persons, houses, papers, and effects, against unreasonable searches and seizures . . . .” These words connote the idea of tangible things with size, form, and weight, things capable of being searched, seized, or both. The second clause of the Amendment still further establishes its Framers’ purpose to limit its protection to tangible things by providing that no warrants shall issue but those “particularly describing the place to be searched, and the persons or things to be seized.” A conversation overheard by eavesdropping, whether by plain snooping or wiretapping, is not tangible and, under the normally accepted meanings of the words, can neither be searched nor seized. In addition the language of the second clause indicates that the Amendment refers not only to something tangible so it can be seized but to something already in existence so it can be described. Yet the Court’s interpretation would have the Amendment apply to overhearing future conversations which by their very nature are nonexistent until they take place. How can one “describe” a future conversation, and, if one cannot, how can a magistrate issue a warrant to eavesdrop one in the future? It is argued that information showing what *366is expected to be said is sufficient to limit the boundaries of what later can be admitted into evidence; but does such general information really meet the specific language of the Amendment which says “particularly describing” ? Rather than using language in a completely artificial way, I must conclude that the Fourth Amendment simply does not apply to eavesdropping.

Tapping telephone wires, of course, was an unknown possibility at the time the Fourth Amendment was adopted. But eavesdropping (and wiretapping is nothing more than eavesdropping by telephone) was, as even the majority opinion in Berger, supra, recognized, “an ancient practice which at common law was condemned as a nuisance. 4 Blackstone, Commentaries 168. In those days the eavesdropper listened by naked ear under the eaves of houses or their windows, or beyond their walls seeking out private discourse.” 388 U. S., at 45. There can be no doubt that the Framers were aware of this practice, and if they had desired to outlaw or restrict the use of evidence obtained by eavesdropping, I believe that they would have used the appropriate language to do so in the Fourth Amendment. They certainly would not have left such a task to the ingenuity of language-stretching judges. No one, it seems to me, can read the debates on the Bill of Rights without reaching the conclusion that its Framers and critics well knew the meaning of the words they used, what they would be understood to mean by others, their scope and their limitations. Under these circumstances it strikes me as a charge against their scholarship, their common sense and their candor to give to the Fourth Amendment’s language the eavesdropping meaning the Court imputes to it today.

I do not deny that common sense requires and that this Court often has said that the Bill of Rights’ safeguards should be given a liberal construction. This *367principle, however, does not justify construing the search and seizure amendment as applying to eavesdropping or the “seizure” of conversations. The Fourth Amendment was aimed directly at the abhorred practice of breaking in, ransacking and searching homes and other buildings and seizing people’s personal belongings without warrants'issued by magistrates. The Amendment deserves, and this Court has given it, a liberal construction in order to protect against warrantless searches of buildings and seizures of tangible personal effects. But until today this Court has refused to say that eavesdropping comes within the ambit of Fourth Amendment restrictions. See, e. g., Olmstead v. United States, 277 U. S. 438 (1928), and Goldman v. United States, 316 U. S. 129 (1942).

So far I have attempted to state why I think the words of the Fourth Amendment prevent its application to eavesdropping. It is important now to show that this has been the traditional view of the Amendment’s scope since its adoption and that the Court’s decision in this case, along with its amorphous holding in Berger last Term, marks the first real departure from that view.

The first case to reach this Court which actually involved a clear-cut test of the Fourth Amendment’s applicability to eavesdropping through a wiretap was, of course, Olmstead, su-pra. In holding that the interception of private telephone conversations by means of wiretapping was not a violation of the Fourth Amendment, this Court, speaking through Mr. Chief Justice Taft, examined the language of the Amendment and found, just as I do now, that the words could not be stretched to encompass overheard conversations:

“The Amendment itself shows that the search is to be of material things — the person, the house, his papers or his effects. The description of the warrant necessary to make the proceeding lawful, is *368that it must specify the place to be searched and the person or things to be seized. . . .
“Justice Bradley in the Boyd case [Boyd v. United States, 116 U. S. 616], and Justice Clark[e] in the Gouled case [Gouled v. United States, 255 U. S. 298], said that the Fifth Amendment and the Fourth Amendment were to be liberally construed to effect the purpose of the framers of the Constitution in the interest of liberty. But that can not justify enlargement of the language employed beyond the possible practical meaning of houses, persons, papers, and effects, or so to apply the words search and seizure as to forbid hearing or sight.” 277 U. S., at 464-465.

Goldman v. United States, 316 U. S. 129, is an even clearer example of this Court’s traditional refusal to consider eavesdropping as being covered by the Fourth Amendment. There federal agents used a detectaphone, which was placed on the wall of an adjoining room, to listen to the conversation of a defendant carried on in his private office and intended to be confined within the four walls of the room. This Court, referring to Olmstead, found no Fourth Amendment violation.

It should be noted that the Court in Olmstead based its decision squarely on the fact that wiretapping or eavesdropping does not violate the Fourth Amendment. As shown, supra, in the cited quotation from the case, the Court went to great pains to examine the actual language of the Amendment and found that the words used simply could not be stretched to cover eavesdropping. That there was no trespass was not the determinative factor, and indeed the Court in citing Hester v. United States, 265 U. S. 57, indicated that even where there was a trespass the Fourth Amendment does not automatically apply to evidence obtained by “hearing or *369sight.” The Olmstead majority characterized Hester as holding “that the testimony of two officers of the law who trespassed on the defendant’s land, concealed themselves one hundred yards away from his house and saw him come out and hand a bottle of whiskey to another, was not inadmissible. While there was a trespass, there was no search of person, house, papers or effects.” 277 U. S., at 465. Thus the clear holding of the Olmstead and Goldman cases, undiluted by any question of trespass, is that eavesdropping, in both its original and modern forms, is not violative of the Fourth Amendment.

While my reading of the Olmstead and Goldman cases convinces me that they were decided on the basis of the inapplicability of the wording of the Fourth Amendment to eavesdropping, and not on any trespass basis, this is not to say that unauthorized intrusion has not played an important role in search and seizure cases. This Court has adopted an exclusionary rule to bar evidence obtained by means of such intrusions. As I made clear in my dissenting opinion in Berger v. New York, 388 U. S. 41, 76, I continue to believe that this exclusionary rule formulated in Weeks v. United States, 232 U. S. 383, rests on the “supervisory power” of this Court over other federal courts and is not rooted in the Fourth Amendment. See Wolf v. Colorado, concurring opinion, 338 U. S. 25, 39, at 40. See also Mapp v. Ohio, concurring opinion, 367 U. S. 643, 661-666. This rule has caused the Court to refuse to accept evidence where there has been such an intrusion regardless of whether there has been a search or seizure in violation of the Fourth Amendment. As this Court said in Lopez v. United States, 373 U. S. 427, 438-439, “The Court has in the past sustained instances of 'electronic eavesdropping’ against constitutional challenge, when devices have been used to enable government agents to overhear conversations which would have been beyond the reach of the human ear [citing *370 Olmstead and Goldman]. It has been insisted only that the electronic device not be planted by an unlawful physical invasion of a constitutionally protected area. Silverman v. United States.”

To support its new interpretation of the Fourth Amendment, which in effect amounts to a rewriting of the language, the Court's opinion concludes that “the underpinnings of Olmstead and Goldman have been . . . eroded by our subsequent decisions . . . .” But the only cases cited as accomplishing this “eroding” are Silverman v. United States, 365 U. S. 505, and Warden v. Hayden, 337 U. S. 294. Neither of these cases “eroded” Olmstead or Goldman. Silverman is an interesting choice since there the Court expressly refused to re-examine the rationale of Olmstead or Goldman although such a reexamination was strenuously urged upon the Court by the petitioners’ counsel. Also it is significant that in Silverman, as the Court described it, “the eavesdropping was accomplished by means of an unauthorized physical penetration into the premises occupied by the petitioners,” 365 U. S., at 509, thus calling into play the supervisory exclusionary rule of evidence. As I have pointed out above, where there is an unauthorized intrusion, this Court has rejected admission of evidence obtained regardless of whether there has been an unconstitutional search and seizure. The majority’s decision here relies heavily on the statement in the opinion that the Court “need not pause to consider whether or not there was a technical trespass under the local property law relating to party walls.” (At 511.) Yet this statement should not becloud the fact that time and again the opinion emphasizes that there has been an unauthorized intrusion: “For a fair reading of the record in this case shows that the eavesdropping was accomplished by means of an unauthorized physical penetration into the premises occupied by the petitioners.” (At 509, emphasis added.) “Eavesdropping *371accomplished by means of such a physical intrusion is beyond the pale of even those decisions . . . (At 509, emphasis added.) “Here . . . the officers overheard the petitioners’ conversations only by usurping part of the petitioners’ house or office (At 511, emphasis added.) “[DJecision here ... is based upon the reality of an actual intrusion . . . .” (At 512, emphasis added.) “We find no occasion to re-examine Goldman here, but we decline to go beyond it, by even a fraction of an inch.” (At 512, emphasis added.) As if this were not enough, Justices Clark and Whittaker concurred with the following statement: “In view of the determination by the majority that the unauthorized physical penetration into petitioners’ premises constituted sufficient trespass to remove this case from the coverage of earlier decisions, we feel obliged to join in the Court’s opinion.” (At 513, emphasis added.) As I made clear in my dissent in Berger, the Court in Silverman held the evidence should be excluded by virtue of the exclusionary rule and “I would not have agreed with the Court’s opinion in Silverman . . . had I thought that the result depended on finding a violation of the Fourth Amendment . . . .” 383 U. S., at 79-80. In light of this and the fact that the Court expressly refused to reexamine Olmstead and Goldman, I cannot read Silver-man as overturning the interpretation stated very plainly in Olmstead and followed in Goldman that eavesdropping is not covered by the Fourth Amendment.

The other “eroding” case cited in the Court’s opinion is Warden v. Hayden, 387 U. S. 294. It appears that this case is cited for the proposition that the Fourth Amendment applies to “intangibles,” such as conversation, and the following ambiguous statement is quoted from the opinion: “The premise that property interests control the right of the Government to search and seize has been discredited.” 387 U. S., at 304. But far from being con*372cerned with eavesdropping, Warden v. Hayden upholds the seizure of clothes, certainly tangibles by any definition. The discussion of property interests was involved only with the common-law rule that the right to seize property depended upon proof of a superior property interest.

Thus, I think that although the Court attempts to convey the impression that for some reason today Olmstead and Goldman are no longer good law, it must face up to the fact that these cases have never been overruled or even “eroded.” It is the Court’s opinions in this case and Berger which for the first time since 1791, when the Fourth Amendment was adopted, have declared that eavesdropping is subject to Fourth Amendment restrictions and that conversations can be “seized.”* I must align myself with all those judges who up to this year have never been able to impute such a meaning to the words of the Amendment.

*373Since I see no way in which the words of the Fourth Amendment can be construed to apply to eavesdropping, that closes the matter for me. In interpreting the Bill of Rights, I willingly go as far as a liberal construction of the language takes me, but I simply cannot in good conscience give a meaning to words which they have never before been thought to have and which they certainly do not have in common ordinary usage. I will not distort the words of the Amendment in order to “keep the Constitution up to date” or “to bring it into harmony with the times.” It was never meant that this Court have such power, which in effect would make us a continuously functioning constitutional convention.

With this decision the Court has completed, I hope, its rewriting of the Fourth Amendment, which started only recently when the Court began referring incessantly to the Fourth Amendment not so much as a law against unreasonable searches and seizures as one to protect an individual’s privacy. By clever word juggling the Court finds it plausible to argue that language aimed specifically at searches and seizures of things that can be searched and seized may, to protect privacy, be applied to eavesdropped evidence of conversations that can neither be searched nor seized. Few things happen to an individual that do not affect his privacy in one way or another. Thus, by arbitrarily substituting the Court’s language, designed to protect privacy, for the Constitution’s language, designed to protect against unreasonable searches and seizures, the Court has made the Fourth Amendment its vehicle for holding all laws violative of the Constitution which offend the Court’s broadest concept of privacy. As I said in Griswold v. Connecticut, 381 U. S. 479, “The Court talks about a constitutional ‘right of privacy’ as though there is some constitutional provision or provisions forbidding any law ever to be passed which might abridge the ‘privacy’ *374of individuals. But there is not.” (Dissenting opinion, at 508.) I made clear in that dissent my fear of the dangers involved when this Court uses the “broad, abstract and ambiguous concept” of “privacy” as a “comprehensive substitute for the Fourth Amendment’s guarantee against 'unreasonable searches and seizures.’ ” (See generally dissenting opinion, at 507-527.)

The Fourth Amendment protects privacy only to the extent that it prohibits unreasonable searches and seizures of “persons, houses, papers, and effects.” No general right is created by the Amendment so as to give this Court the unlimited power to hold unconstitutional everything which affects privacy. Certainly the Framers, well acquainted as they were with the excesses of governmental power, did not intend to grant this Court such omnipotent lawmaking authority as that. The history of governments proves that it is dangerous to freedom to repose such powers in courts.

For these reasons I respectfully dissent.

4.2 United States v. Karo 4.2 United States v. Karo

UNITED STATES v. KARO et al.

No. 83-850.

Argued April 25, 1984

Decided July 3, 1984

*706White, J., delivered the opinion of the Court, in which Burger, C. J., and Blackmun and Powell, JJ., joined, in Parts I, II, and IV of which Rehnquist and O’Connor, JJ., joined, and in Part III of which Brennan, Marshall, and Stevens, JJ., joined. O’Connor, J., filed an opinion concurring in part and concurring in the judgment, in which *707Rehnquist, J., joined, post, p. 721. Stevens, J., filed an opinion concurring in part and dissenting in part, in which Brennan and Marshall, JJ., joined, post, p. 728.

Deputy Solicitor General Frey argued the cause for the United States. With him on the briefs were Solicitor General Lee, Assistant Attorney General Trott, Elliott Schulder, and Vincent L. Gambale.

Charles Louis Roberts argued the cause for respondents. With him on the brief for respondents Harley et al. were Joseph (Sib) Abraham, Jr., and Michael Vigil. Reber Boult, Nancy Hollander, and James Beam filed a brief for respondents Karo et al. Roger Bargas, by appointment of the Court, 465 U. S. 1064, filed a brief for respondent Rhodes.*

Justice White

delivered the opinion of the Court.

In United States v. Knotts, 460 U. S. 276 (1983), we held that the warrantless monitoring of an electronic tracking device (“beeper”)1 inside a container of chemicals did not violate the Fourth Amendment when it revealed no information that could not have been obtained through visual surveillance. In this case, we are called upon to address two questions left unresolved in Knotts: (1) whether installation of a beeper in a container of chemicals with the consent of the original owner constitutes a search or seizure within the meaning of the Fourth Amendment when the container is delivered to a buyer having no knowledge of the presence of the beeper, and (2) whether monitoring of a beeper falls within the ambit of the Fourth Amendment when it reveals information that could not have been obtained through visual surveillance.

*708I

In August 1980 Agent Rottinger of the Drug Enforcement Administration (DEA) learned that respondents James Karo, Richard Horton, and William Harley had ordered 50 gallons of ether from Government informant Carl Muehlenweg of Graphic Photo Design in Albuquerque, N. M. Muehlenweg told Rottinger that the ether was to be used to extract cocaine from clothing that had been imported into the United States. The Government obtained a court order authorizing the installation and monitoring of a beeper in one of the cans of ether. With Muehlenweg’s consent, agents substituted their own can containing a beeper for one of the cans in the shipment and then had all 10 cans painted to give them a uniform appearance.

On September 20, 1980, agents saw Karo pick up the ether from Muehlenweg. They then followed Karo to his house using visual and beeper surveillance. At one point later that day, agents determined by using the beeper that the ether was still inside the house, but they later determined that it had been moved undetected to Horton’s house, where they located it using the beeper. Agent Rottinger could smell the ether from the public sidewalk near Horton’s residence. Two days later, agents discovered that the ether had once again been moved, and, using the beeper, they located it at the residence of Horton’s father. The next day, the beeper was no longer transmitting from Horton’s father’s house, and agents traced the beeper to a commercial storage facility.

Because the beeper equipment was not sensitive enough to allow agents to learn precisely which locker the ether was in, agents obtained a subpoena for the records of the storage company and learned that locker 143 had been rented by Horton. Using the beeper, agents confirmed that the ether was indeed in one of the lockers in the row containing locker 143, and using their noses they detected the odor of ether emanating from locker 143. On October 8 agents obtained an order authorizing installation of an entry tone alarm into the door *709jamb of the locker so they would be able to tell when the door was opened. While installing the alarm, agents observed that the cans containing ether were still inside. Agents ceased visual and beeper surveillance, relying instead on the entry tone alarm. However, on October 16 Horton retrieved the contents from the locker without sounding the alarm. Agents did not learn of the entry until the manager of the storage facility notified them that Horton had been there.

Using the beeper, agents traced the beeper can to another self-storage facility three days later. Agents detected the smell of ether coming from locker 15 and learned from the manager that Horton and Harley had rented that locker using an alias the same day that the ether had been removed from the first storage facility. The agents obtained an order authorizing the installation of an entry tone alarm in locker 15, but instead of installing that alarm, they obtained consent from the manager of the facility to install a closed-circuit video camera in a locker that had a view of locker 15. On February 6, 1981, agents observed, by means of the video camera, Gene Rhodes and an unidentified woman removing the cans from the locker and loading them onto the rear bed of Horton’s pickup truck. Using both visual and beeper surveillance agents tracked the truck to Rhodes’ residence where it was parked in the driveway. Agents then observed Rhodes and a woman bringing boxes and other items from inside the house and loading the items into the trunk of an automobile. Agents did not see any cans being transferred from the pickup.

At about 6 p. m. on February 6, the car and the pickup left the driveway and traveled along public highways to Taos. During the trip, the two vehicles were under both physical and electronic surveillance. When the vehicles arrived at a house in Taos rented by Horton, Harley, and Michael Steele, the agents did not maintain tight surveillance for fear of detection. When the vehicles left the Taos residence, agents *710determined, using the beeper monitor, that the beeper can was still inside the house. Again on February 7, the beeper revealed that the ether can was still on the premises. At one point, agents noticed that the windows of the house were wide open on a cold windy day, leading them to suspect that the ether was being used. On February 8, the agents applied for and obtained a warrant to search the Taos residence based in part on information derived through use of the beeper. The warrant was executed on February 10, 1981, and Horton, Harley, Steele, and Evan Roth were arrested, and cocaine and laboratory equipment were seized.

Respondents Karo, Horton, Harley, Steele, and Roth were indicted for conspiring to possess cocaine with intent to distribute it and with the underlying offense. 21 U. S. C. §§ 841(a)(1) and 846. Respondent Rhodes was indicted only for conspiracy to possess. The District Court granted respondents’ pretrial motion to suppress the evidence seized from the Taos residence on the grounds that the initial warrant to install the beeper was invalid and that the Taos seizure was the tainted fruit of an unauthorized installation and monitoring of that beeper. The United States appealed but did not challenge the invalidation of the initial warrant. The Court of Appeals affirmed, except with respect to Rhodes, holding that a warrant was required to install the beeper in one of the 10 cans of ether and to monitor it in private dwellings and storage lockers. 710 F. 2d 1433 (CA10 1983). The warrant for the search in Taos and the resulting seizure were tainted by the prior illegal conduct of the Government. The evidence was therefore properly suppressed with respect to respondents Horton, Harley, Steele, and Roth, who were held to have protectible interests in the privacy of the Taos dwelling, and with respect to respondent Karo because the beeper had been installed without a warrant and had been monitored while its ether-can host was in his house.2 We *711granted the Government’s petition for certiorari, 464 U. S. 1068 (1984), which raised the question whether a warrant was required to authorize either the installation of the beeper or its subsequent monitoring. We deal with each contention in turn.

II

Because the judgment below in favor of Karo rested in major part on the conclusion that the installation violated his Fourth Amendment rights and that any information obtained from monitoring the beeper was tainted by the initial illegality, we must deal with the legality of the warrantless installation. It is clear that the actual placement of the beeper into the can violated no one’s Fourth Amendment rights. The can into which the beeper was placed belonged at the time to the DEA, and by no stretch of the imagination could it be said that respondents then had any legitimate expectation of privacy in it. The ether and the original 10 cans, on the other hand, belonged to, and were in the possession of, Muehlenweg, who had given his consent to any invasion of those items that occurred. Thus, even if there had been no substitution of cans and the agents had placed the beeper into one of the original 10 cans, Muehlenweg’s consent was sufficient to validate the placement of the beeper in the can. See United States v. Matlock, 415 U. S. 164 (1974); Frazier v. Cupp, 394 U. S. 731 (1969).

The Court of Appeals acknowledged that before Karo took control of the ether “the DEA and Muehlenweg presumably could do with the can and ether whatever they liked without violating Karo’s rights.” 710 F. 2d, at 1438. It did not hold that the actual placement of the beeper into the ether can violated the Fourth Amendment. Instead, it held that the violation occurred at the time the beeper-laden can was transferred to Karo. The court stated:

*712“All individuals have a legitimate expectation of privacy that objects coming into their rightful ownership do not have electronic devices attached to them, devices that would give law enforcement agents the opportunity to monitor the location of the objects at all times and in every place that the objects are taken, including inside private residences and other areas where the right to be free from warrantless governmental intrusion is unquestioned.” Ibid.

Not surprisingly, the Court of Appeals did not describe the transfer as either a “search” or a “seizure,” for plainly it is neither. A “search” occurs “when an expectation of privacy that society is prepared to consider reasonable is infringed.” United States v. Jacobsen, 466 U. S. 109, 113 (1984). The mere transfer to Karo of a can containing an unmonitored beeper infringed no privacy interest. It conveyed no information that Karo wished to keep private, for it conveyed no information at all. To be sure, it created a potential for an invasion of privacy, but we have never held that potential, as opposed to actual, invasions of privacy constitute searches for purposes of the Fourth Amendment. A holding to that effect would mean that a policeman walking down the street carrying a parabolic microphone capable of picking up conversations in nearby homes would be engaging in a search even if the microphone were not turned on. It is the exploitation of technological advances that implicates the Fourth Amendment, not their mere existence.

We likewise do not believe that the transfer of the container constituted a seizure. A “seizure” of property occurs when “there is some meaningful interference with an individual's possessory interests in that property.” Ibid. Although the can may have contained an unknown and unwanted foreign object, it cannot be said that anyone’s possessory interest was interfered with in a meaningful way. At most, there was a technical trespass on the space occupied by the beeper. The existence of a physical trespass is only *713marginally relevant to the question of whether the Fourth Amendment has been violated, however, for an actual trespass is neither necessary nor sufficient to establish a constitutional violation. Compare Katz v. United States, 389 U. S. 347 (1967) (no trespass, but Fourth Amendment violation), with Oliver v. United States, 466 U. S. 170 (1984) (trespass, but no Fourth Amendment violation). Of course, if the presence of a beeper in the can constituted a seizure merely because of its occupation of space, it would follow that the presence of any object, regardless of its nature, would violate the Fourth Amendment.

We conclude that no Fourth Amendment interest of Karo or of any other respondent was infringed by the installation of the beeper. Rather, any impairment of their privacy interests that may have occurred was occasioned by the monitoring of the beeper.3

rH f-H Y — (

In United States v. Knotts, 460 U. S. 276 (1983), law enforcement officials, with the consent of the seller, installed a beeper in a 5-gallon can of chloroform and monitored the beeper after delivery of the can to the buyer in Minneapolis, Minn. Although there was partial visual surveillance as the automobile containing the can moved along the public highways, the beeper enabled the officers to locate the can in the area of a cabin near Shell Lake, Wis., and it was this information that provided the basis for the issuance of a search warrant. As the case came to us, the installation of the beeper was not challenged; only the monitoring was at issue. The Court held that since the movements of the automobile and the arrival of the can containing the beeper in the area of the *714cabin could have been observed by the naked eye, no Fourth Amendment violation was committed by monitoring the beeper during the trip to the cabin. In Knotts, the record did not show that the beeper was monitored while the can containing it was inside the cabin, and we therefore had no occasion to consider whether a constitutional violation would have occurred had the fact been otherwise.

Here, there is no gainsaying that the beeper was used to locate the ether in a specific house in Taos, N. M., and that that information was in turn used to secure a warrant for the search of the house. The affidavit supporting the application for a search warrant recited that the ether arrived at the residence in a motor vehicle that later departed and that:

“For fear of detection, we did not maintain tight surveillance of the residence. . . . Using the ‘beeper’ locator, I positively determined that the ‘beeper’ can (5-gallon can of ether, described earlier in this affidavit) was now inside the above-described premises to be searched because the ‘beeper’ locator (direction finder) pinpointed the beeper signal as emanating from the above-described premises. . . . Again, later on Saturday (now in the daytime), 7 February 1981, my ‘beeper’ locator still shows a strong ‘beeper’ signal emanating from inside the above-described residence.” App. 57-58.

This case thus presents the question whether the monitoring of a beeper in a private residence, a location not open to visual surveillance, violates the Fourth Amendment rights of those who have a justifiable interest in the privacy of the residence. Contrary to the submission of the United States, we think that it does.

At the risk of belaboring the obvious, private residences are places in which the individual normally expects privacy free of governmental intrusion not authorized by a warrant, and that expectation is plainly one that society is prepared to recognize as justifiable. Our cases have not deviated from this basic Fourth Amendment principle. Searches and *715seizures inside a home without a warrant are presumptively unreasonable absent exigent circumstances. Welsh v. Wisconsin, 466 U. S. 740, 748-749 (1984); Steagald v. United States, 451 U. S. 204, 211-212 (1981); Payton v. New York, 445 U. S. 573, 586 (1980). In this case, had a DEA agent thought it useful to enter the Taos residence to verify that the ether was actually in the house and had he done so surreptitiously and without a warrant, there is little doubt that he would have engaged in an unreasonable search within the meaning of the Fourth Amendment. For purposes of the Amendment, the result is the same where, without a warrant, the Government surreptitiously employs an electronic device to obtain information that it could not have obtained by observation from outside the curtilage of the house. The beeper tells the agent that' a particular article is actually located at a particular time in the private residence and is in the possession of the person or persons whose residence is being watched. Even if visual surveillance has revealed that the article to which the beeper is attached has entered the house, the later monitoring not only verifies the officers’ observations but also establishes that the article remains on the premises. Here, for example, the beeper was monitored for a significant period after the arrival of the ether in Taos and before the application for a warrant to search.

The monitoring of an electronic device such as a beeper is, of course, less intrusive than a full-scale search, but it does reveal a critical fact about the interior of the premises that the Government is extremely interested in knowing and that it could not have otherwise obtained without a warrant. The case is thus not like Knotts, for there the beeper told the authorities nothing about the interior of Knotts’ cabin. The information obtained in Knotts was “voluntarily conveyed to anyone who wanted to look . . . ,” 460 U. S., at 281; here, as we have said, the monitoring indicated that the beeper was inside the house, a fact that could not have been visually verified.

*716We cannot accept the Government’s contention that it should be completely free from the constraints of the Fourth Amendment to determine by means of an electronic device, without a warrant and without probable cause or reasonable suspicion, whether a particular article — or a person, for that matter — is in an individual’s home at a particular time. Indiscriminate monitoring of property that has been withdrawn from public view would present far too serious a threat to privacy interests in the home to escape entirely some sort of Fourth Amendment oversight.4

*717We also reject the Government’s contention that it should be able to monitor beepers in private residences without a warrant if there is the requisite justification in the facts for believing that a crime is being or will be committed and that monitoring the beeper wherever it goes is likely to produce evidence of criminal activity. Warrantless searches are presumptively unreasonable, though the Court has recognized a few limited exceptions to this general rule. See, e. g., United States v. Ross, 456 U. S. 798 (1982) (automobiles); Schneckloth v. Bustamonte, 412 U. S. 218 (1973) (consent); Warden v. Hayden, 387 U. S. 294 (1967) (exigent circumstances). The Government’s contention that warrantless beeper searches should be deemed reasonable is based upon its deprecation of the benefits and exaggeration of the difficulties associated with procurement of a warrant. The Government argues that the traditional justifications for the warrant requirement are inapplicable in beeper cases, but to a large extent that argument is based upon the contention, rejected above, that the beeper constitutes only a minuscule intrusion on protected privacy interests. The primary reason for the warrant requirement is to interpose a “neutral and detached magistrate” between the citizen and “the officer engaged in the often competitive enterprise of ferreting out crime.” Johnson v. United States, 333 U. S. 10, 14 (1948). Those suspected of drug offenses are no less entitled to that protection than those suspected of nondrug offenses. Requiring a warrant will have the salutary effect of ensuring that use of beepers is not abused, by imposing upon agents the requirement that they demonstrate in advance their justification for the desired search. This is not to say that there *718are no exceptions to the warrant rule, because if truly exigent circumstances exist no warrant is required under general Fourth Amendment principles.

If agents are required to obtain warrants prior to monitoring a beeper when it has been withdrawn from public view, the Government argues, for all practical purposes they will be forced to obtain warrants in every case in which they seek to use a beeper, because they have no way of knowing in advance whether the beeper will be transmitting its signals from inside private premises. The argument that a warrant requirement would oblige the Government to obtain warrants in a large number of cases is hardly a compelling argument against the requirement. It is worthy of note that, in any event, this is not a particularly attractive case in which to argue that it is impractical to obtain a warrant, since a warrant was in fact obtained in this case, seemingly on probable cause.

We are also unpersuaded by the argument that a warrant should not be required because of the difficulty in satisfying the particularity requirement of the Fourth Amendment. The Government contends that it would be impossible to describe the “place” to be searched, because the location of the place is precisely what is sought to be discovered through the search. Brief for United States 42. However true that may be, it will still be possible to describe the object into which the beeper is to be placed, the circumstances that led agents to wish to install the beeper, and the length of time for which beeper surveillance is requested. In our view, this information will suffice to permit issuance of a warrant authorizing beeper installation and surveillance.

In sum, we discern no reason for deviating from the general rule that a search of a house should be conducted pursuant to a warrant.5

*719t — I <1

As we have said, by maintaining the beeper the agents verified that the ether was actually located in the Taos house and that it remained there while the warrant was sought. This information was obtained without a warrant and would therefore be inadmissible at trial against those with privacy interests in the house — Horton, Harley, Steele, and Roth. That information, which was included in the warrant affidavit, would also invalidate the warrant for the search of the house if it proved to be critical to establishing probable cause for the issuance of the warrant. However, if sufficient untainted evidence was presented in the warrant affidavit to establish probable cause, the warrant was nevertheless valid. Franks v. Delaware, 438 U. S. 154, 172 (1978).

It requires only a casual examination of the warrant affidavit, which in relevant respects consists of undisputed factual assertions, to conclude that the officers could have secured the warrant without relying on the beeper to locate the ether in the house sought to be searched. The affidavit recounted the months-long tracking of the evidence, including the visual and beeper surveillance of Horton’s pickup on its trip from Albuquerque to the immediate vicinity of the Taos residence; its departure a short time later without the ether; its later return to the residence; and the visual observation of the residence with its windows open on a cold night.

That leaves the question whether any part of this additional information contained in the warrant affidavit was itself the fruit of a Fourth Amendment violation to which any of the occupants of the house could object. As far as the *720present record reveals, two of the four respondents who had standing to object to the search of the residence — Steele and Roth — had no interest in any of the arguably private places in which the beeper was monitored prior to its arrival in Taos. The evidence seized in the house would be admissible against them.

The question as to Horton and Harley is somewhat more complicated. On the initial leg of its journey, the ether came to rest in Karo’s house where it was monitored; it then moved in succession to two other houses, including Horton’s, before it was moved first to a locker in one public warehouse and then to a locker in another. Both lockers were rented jointly by Horton and Harley. On September 6, the ether was removed from the second storage facility and transported to Taos.

Assuming for present purposes that prior to its arrival at the second warehouse the beeper was illegally used to locate the ether in a house or other place in which Horton or Harley had a justifiable claim to privacy, we are confident that such use of the beeper does not taint its later use in locating the ether and tracking it to Taos. The movement of the ether from the first warehouse was undetected, but by monitoring the beeper the agents discovered that it had been moved to the second storage facility. No prior monitoring of the beeper contributed to this discovery; using the beeper for this purpose was thus untainted by any possible prior illegality. Furthermore, the beeper informed the agents only that the ether was somewhere in the warehouse; it did not identify the specific locker in which the ether was located. Monitoring the beeper revealed nothing about the contents of the locker that Horton and Harley had rented and hence was not a search of that locker.6 The locker was identified only *721when agents traversing the public parts of the facility found that the smell of ether was coming from a specific locker.

The agents set up visual surveillance of that locker, and on September 6, they observed Rhodes and a female remove the ether and load it into Horton’s pickup truck. The truck moved over the public streets and was tracked by beeper to Rhodes’ house, where it was temporarily parked. At about 6 p. m. the truck was observed departing and was tracked visually and by beeper to the vicinity of the house in Taos. Because locating the ether in the warehouse was not an illegal search — and because the ether was seen being loaded into Horton’s truck, which then traveled the public highways — it is evident that under Knotts there was no violation of the Fourth Amendment as to anyone with or without standing to complain about monitoring the beeper while it was located in Horton’s truck. Under these circumstances, it is clear that the warrant affidavit, after striking the facts about monitoring the beeper while it was in the Taos residence, contained sufficient untainted information to furnish probable cause for the issuance of the search warrant. The evidence seized in the house should not have been suppressed with respect to any of the respondents.7

The judgment of the Court of Appeals is accordingly

Reversed.

Justice O’Connor,

with whom Justice Rehnquist joins, concurring in part and concurring in the judgment.

I join Parts I, II, and IV of the Court’s opinion, and agree with substantial portions of Part III as well.

I agree with the Court that the installation of a beeper in a container with the consent of the container’s present owner *722implicates no Fourth Amendment concerns. The subsequent transfer of the container, with the unactivated beeper, to one who is unaware of the beeper’s presence is also unobjectionable. It is when the beeper is activated to track the movements of the container that privacy interests are implicated.

In my view, however, these privacy interests are unusually narrow — narrower than is suggested by the Court in Part III of its opinion. If the container is moved on the public highways, or in other places where the container’s owner has no reasonable expectation that its movements will not be tracked without his consent, activation of the beeper infringes on no reasonable expectation of privacy. United States v. Knotts, 460 U. S. 276 (1983). In this situation the location of the container defeats any expectation that its movements will not be tracked.

In addition, one who lacks ownership of the container itself or the power to move the container at will, can have no reasonable expectation that the movements of the container will not be tracked by a beeper within the container, regardless of where the container is moved. In this situation the absence of an appropriate interest in the container itself defeats any expectation of privacy in the movements of the container, even when the container is brought into places where others may have a privacy interest. Cf. Rawlings v. Kentucky, 448 U. S. 98 (1980); United States v. White, 401 U. S. 745 (1971); Lopez v. United States, 373 U. S. 427 (1963).

H-t

As a threshold matter it is clear that the mere presence of electronic equipment inside a home, transmitting information to government agents outside, does not, in and of itself, infringe on legitimate expectations of privacy of all who have an expectation of privacy in the home itself. For example, United States v. White, supra, permitted the use of information obtained from within a home by means of a microphone secreted on a Government agent. We must therefore look *723for something more before concluding that monitoring of a beeper in a closed container that is brought into a home violates the homeowner’s reasonable expectations of privacy.

The Court holds that the crucial additional factor is the container owner’s consent, or lack of consent, to the installation of the beeper. If consent is given, movement of the container into the home violates no reasonable expectation of privacy of the homeowner. If the container owner’s consent is not obtained, the Court holds that the homeowner’s expectations of privacy in the home are violated when the beeper enters and is monitored from inside the home, even if the homeowner has no interest or expectation of privacy in the container itself. In my view this analysis is somewhat flawed.

First, the test proposed by the Court seems squarely inconsistent with Rawlings v. Kentucky, supra. In Rawlings this Court approved the admission of drugs seized from a woman’s purse because her male companion did not prove that he had a legitimate expectation of privacy in the purse. Indeed, the male companion lacked standing to challenge the search even though he claimed ownership of the drugs found in the purse. Had the purse contained a beeper that for some reason was itself evidence of a crime, only the owner of the purse, not her companion, could have objected to the admission of the beeper itself as evidence. A search of a closed container that occurs without the consent of the container’s owner does not give to every defendant a right to suppress incriminating evidence found in the container.

The Court’s test for when monitoring a beeper inside a guest’s closed and private container violates a homeowner’s expectations of privacy is, moreover, difficult to reconcile with United States v. Matlock, 415 U. S. 164 (1974), and many other similar decisions that address expectations of privacy in closed containers. A homeowner who entirely lacks access to or control over a guest’s closed container would presumably lack the power to consent to its search under the standards articulated by this Court in United States v. *724 Matlock, supra. But surely a homeowner cannot simultaneously have so little interest in a container that his consent to its search is constitutionally ineffective, and have so great an interest in the container that its search violates his constitutional rights. Standing to object to the search of a container, and power to give effective consent to the search, should go hand in hand.

Finally, and most fundamentally, it is difficult to see how a homeowner’s expectations of privacy can depend in any way on an invitee’s actual status as a government informant. Expectations are formed on the basis of objective appearances, not on the basis of facts known only to others. Stated another way, the homeowner’s expectation that a container does not contain a beeper cannot depend on the container owner’s belief that the container is beeper-free. The homeowner’s expectation of privacy is either inherently reasonable or it is inherently unreasonable. A guest’s undisclosed status as a government informant cannot alter the reasonableness of that expectation.

II

I would, therefore, use a different and generally narrower test than the one proposed by the Court for determining when an activated beeper in a closed container violates the privacy of a homeowner into whose home the container is moved. I would use as the touchstone the defendant’s interest in the container in which the beeper is placed. When a closed container is moved by permission into a home, the homeowner and others with an expectation of privacy in the home itself surrender any expectation of privacy they might otherwise retain in the movements of the container—unless it is their container or under their dominion and control.1

*725My reasons for preferring this approach require some elaboration. The principles for assessing a single person’s privacy interests in a particular place, location, or transmission system such as a telephone line, are reasonably well settled. The Court relies on these principles — particularly on the strong presumption of privacy in the home — to analyze the beeper case presented here. But the movement of a guest’s closed container into another’s home involves overlapping privacy interests. When privacy interests in particular locations are shared by several persons, assessing expectations of privacy requires a more probing analysis.

A privacy interest in a home itself need not be coextensive with a privacy interest in the contents or movements of everything situated inside the home. This has been recognized before in connection with third-party consent to searches. A homeowner’s consent to a search of the home may not be effective consent to a search of a closed object inside the home. Consent to search a container or a place is effective only when given by one with “common authority over or other sufficient relationship to the premises or effects sought to be inspected.” United States v. Matlock, 415 U. S., at 171. “Common authority . . . rests ... on mutual use of the property by persons generally having joint access or control for most purposes . . . .” Id., at 171, n. 7.

When a person has no privacy interest whatsoever in a particular container, place, or conversation, as in Rawlings v. Kentucky, 448 U. S. 98 (1980), Fourth Amendment analysis is straightforward — the person lacks standing to suppress the evidence obtained pursuant to an unlawful search of the place, or unlawful monitoring of the conversation. Thus, a third person, who never used a particular telephone line, could not suppress, at least on Fourth Amendment grounds, *726evidence obtained by an unlawful wiretap of conversations between two other persons.2

Another relatively easy case arises when two persons share identical, overlapping privacy interests in a particular place, container, or conversation. Here both share the power to surrender each other’s privacy to a third party. Persons who share access to closed containers also share the power to consent to a search; only if neither consents do both retain the right to object to the fruits of an unlawful search. Similarly, two people who speak face to face in a private place or on a private telephone line both may share an expectation that the conversation will remain private, Katz v. United States, 389 U. S. 347 (1967), but either may give effective consent to a wiretap or other electronic surveillance, United States v. White, 401 U. S. 745 (1971). One might say that the telephone line, or simply the space that separates two persons in conversation, is their jointly owned “container.” Each has standing to challenge the use as evidence of the fruits of an unauthorized search of that “container,” but either may also give effective consent to the search.

A more difficult case arises when one person’s privacy interests fall within another’s, as when a guest in a private home has a private container to which the homeowner has no right of access. The homeowner who permits entry into his home of such a container effectively surrenders a segment of the privacy of his home to the privacy of the owner of the container. Insofar as it may be possible to search the container without searching the home, the homeowner suffers no invasion of his privacy when such a search occurs; the homeowner also lacks the power to give effective consent to the search of the closed container. For example, evidence obtained from an electronic device in the container that transmitted information only about the contents of the container could not be suppressed by the homeowner unless he also had a privacy *727interest in the container, even if the information were transmitted from inside the home.

The beeper in this case, however, transmitted information about the location, not the contents, of the container. Conceivably, location in a home is an attribute partly of the home and partly of the container itself. But the primary privacy interest is not the homeowner’s. By giving consent to another to move a closed container into and out of the home the homeowner has effectively surrendered his privacy insofar as the location of the container may be concerned, or so we should assume absent evidence to the contrary. In other words, one who lacks dominion and control over the object’s location has no privacy interest invaded when that information is disclosed. It is simply not his secret that the beeper is disclosing, just as it is not his privacy that would be invaded by a search of the container whose contents he did not control.

Ill

In sum, a privacy interest in the location of a closed container that enters a home with the homeowner’s permission cannot be inferred mechanically by reference to the more general privacy interests in the home itself. The homeowner’s privacy interests are often narrower than those of the owner of the container. A defendant should be allowed to challenge evidence obtained by monitoring a beeper installed in a closed container only if (1) the beeper was monitored when visual tracking of the container was not possible, so that the defendant had a reasonable expectation that the container’s movements would remain private, and (2) the defendant had an interest in the container itself sufficient to empower him to give effective consent to a search of the container. A person’s right not to have a container tracked by means of a beeper depends both on his power to prevent visual observation of the container and on his power to control its location, a power that can usually be inferred from a privacy interest in the container itself. One who lacks either *728power has no legitimate expectation of privacy in the movements of the container.

For the reasons stated in Part IV of Justice White’s opinion, I agree that the decision below must be reversed.

Justice Stevens,

with whom Justice Brennan and Justice Marshall join, concurring in part and dissenting in part.

The beeper is a species of radio transmitter. Mounted inside a container, it has much in common with a microphone mounted on a person. It reveals the location of the item to which it is attached — the functional equivalent of a radio transmission saying “Now I am at-.”

The threshold question in this case is whether the beeper invaded any interest protected by the Fourth Amendment. As we wrote earlier this Term, the Fourth Amendment

“protects two kinds of expectations, one involving ‘searches,’ the other ‘seizures.’ A ‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed. A ‘seizure’ of property occurs when there is some meaningful interference with an individual’s possessory interests in that property.” United States v. Jacobsen, 466 U. S. 109, 113 (1984) (footnotes omitted).

In my opinion the surreptitious use of a radio transmitter— whether it contains a microphone or merely a signalling device — on an individual’s personal property is both a seizure and a search within the meaning of the Fourth Amendment. Part III of the opinion of the Court correctly concludes that when beeper surveillance reveals the location of property that has been concealed from public view, it constitutes a “search” within the meaning of the Fourth Amendment. I join Part III on that understanding. However, I find it necessary to write separately because I believe the Fourth Amendment’s reach is somewhat broader than that which is explicitly acknowledged by the Court, and in particular *729because my understanding of the Fourth Amendment, as well as my understanding of the issues that have been framed for us by the parties to this case, leads me to a different result than that reached by the Court.

HH

The attachment of the beeper, in my judgment, constituted a “seizure.”1 The owner of property, of course, has a right to exclude from it all the world, including the Government, and a concomitant right to use it exclusively for his own purposes. When the Government attaches an electronic monitoring device to that property, it infringes that exclusionary right; in a fundamental sense it has converted the property to its own use. Surely such an invasion is an “interference” with possessory rights; the right to exclude, which attached as soon as the can respondents purchased was delivered, had been infringed.2 That interference is also “meaningful”; the character of the property is profoundly different when infected "with an electronic bug than when it is entirely germ free.

The impact on possessory rights of this type of governmental conduct is illustrated by Silverman v. United States, 365 U. S. 505 (1961). There the Court held that the attachment of a microphone to the heating duct of an apartment building in order to eavesdrop on conversations in a nearby apartment implicated the Fourth Amendment:

*730“[T]he officers overheard the petitioners’ conversations only by usurping part of the petitioners’ house or office— a heating system which was an integral part of the premises occupied by the petitioners, a usurpation that was effected without their knowledge and without their consent. In these circumstances we need not pause to consider whether or not there was a technical trespass under the local property law relating to party walls. Inherent Fourth Amendment rights are not inevitably measurable in terms of ancient niceties of tort or real property law.” Id., at 511 (footnote omitted).

Here too, by attaching a monitoring device to respondents’ property, the agents usurped a part of a citizen’s property— in this case a part of respondents’ exclusionary rights in their tangible personal property. By attaching the beeper and using the container to conceal it, the Government in the most fundamental sense was asserting “dominion and control” over the property — the power to use the property for its own purposes. And “asserting] dominion and control” is a “seizure” in the most basic sense of the term. See Jacobsen, 466 U. S., at 120.3

II

The Court has developed a relatively straightforward test for determining what expectations of privacy are protected by the Fourth Amendment with respect to the possession of personal property. If personal property is in the plain view of the public, the possession of the property is in no sense “private” and hence is unprotected: “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.” Katz v. *731 United States, 389 U. S. 347, 351 (1967).4 When a person’s property is concealed from public view, however, then the fact of his possession is private and the subject of Fourth Amendment protection.

“One point on which the Court was in virtually unanimous agreement in Robbins [v. California, 453 U. S. 420 (1981)] was that a constitutional distinction between ‘worthy’ and ‘unworthy’ containers would be improper. . . . [T]he central purpose of the Fourth Amendment forecloses such a distinction. For just as the most frail cottage in the kingdom is absolutely entitled to the same guarantees of privacy as the most majestic mansion, so also may a traveler who carries a toothbrush and a few articles of clothing in a paper bag or knotted scarf claim an equal right to conceal his possessions from official inspection as the sophisticated executive with the locked attaché case.” United States v. Ross, 456 U. S. 798, 822 (1982).

Thus, “the Fourth Amendment provides protection to the owner of every container that conceals its contents from plain view.” Id., at 822-823.5

United States v. Knotts, 460 U. S. 276 (1983), illustrates this approach. There, agents watched as a container of chloroform in which they had placed a beeper was delivered to Knotts’ codefendant and placed in his car. They then used the beeper to track the car’s movements on a single trip *732through a public place. Used in this way the beeper did not disclose that the codefendant was in possession of the property; the agents already knew that. It revealed only the route of a trip through areas open to the public, something that was hardly concealed from public view. The Court held: “A person traveling in an automobile on public throroughfares has no reasonable expectation of privacy in his movements from one place to another.” Id., at 281.6

It is certainly true that a homeowner has a reasonable expectation of privacy in the contents of his home, including items owned by others. Alderman v. United States, 394 U. S. 165, 176-177 (1969).7 But focusing on the interest of *733the homeowner should not obscure the independent interest of those in possession of property that is monitored through the use of a beeper while the property is in a home or in any other location in which it is concealed from public view.

In this case, the beeper enabled the agents to learn facts that were not exposed to public view. In Knotts the agents already saw the codefendant take possession of chloroform, and therefore the beeper accomplished no more than following the codefendant without the aid of the beeper would have. Here, once the container went into Karo’s house, the agents thereafter learned who had the container and where it was only through use of the beeper. The beeper alone told them when the container was taken into private residences and storage areas, and when it was transported from one place to another.

The Court recognizes that concealment of personal property from public view gives rise to Fourth Amendment protection when it writes: “Indiscriminate monitoring of property that has been withdrawn from public view would present far too serious a threat to privacy interests in the home to escape entirely some sort of Fourth Amendment oversight.” Ante, at 716 (footnote omitted). This protection is not limited to times when the beeper was in a home.8 *734The beeper also revealed when the can of ether had been moved. When a person drives down a public thoroughfare in a car with a can of ether concealed in the trunk, he is not exposing to public view the fact that he is in possession of a can of ether; the can is still “withdrawn from public view” and hence its location is entitled to constitutional protection. If a footlocker, see United States v. Chadwick, 433 U. S. 1 (1977), or even a “knotted scarf,” entitles the owner of property to conceal its location from official inspection, then surely placing it in a car suffices as well.9 In this case it was only the beeper that enabled the agents to discover where the can was once it had been concealed in Karo’s house. At no point thereafter did the District Court find or does the Government contend that the location of the can was exposed to public view; the agents did not know when it was moved and hence would not have been able to follow its route without the aid of the beeper. Moreover, here the agents could not have employed visual surveillance to determine when the can was moved for fear of detection. Ante, at 714. Because the beeper enabled them to learn the location of personal *735property not exposed to public view, it invaded an interest embraced in the Fourth Amendment’s conception of a “search.”

This “search” began at the moment Karo brought the can into his house and hence concealed it from public view. As a general matter, the private citizen is entitled to assume, and in fact does assume, that his possessions are not infected with concealed electronic devices. The concealment of such items on personal property significantly compromises the owner’s interest in privacy, by making it impossible to conceal that item’s possession and location from the Government, despite the fact that the Fourth Amendment protects the privacy interest in the location of personal property not exposed to public view. I find little comfort in the Court’s notion that no invasion of privacy occurs until a listener obtains some significant information by use of the device. Ante, at 712. The expectation of privacy should be measured from the standpoint of the citizen whose privacy is at stake, not of the Government. It is compromised the moment the invasion occurs. A bathtub is a less private area when the plumber is present even if his back is turned.10

The agents did not know who was in possession of the property or where it was once it entered Karo’s house. From that moment on it was concealed from view. Because the beeper enabled the agents to learn the location of property otherwise concealed from public view, it infringed a privacy interest protected by the Fourth Amendment.11

*736III

The impact of beeper surveillance upon interests protected by the Fourth Amendment leads me to what I regard as the perfectly sensible conclusion that absent exigent circumstances Government agents have a constitutional duty to obtain a warrant before they install an electronic device on a private citizen’s property.

Because the Government does not challenge the conclusion that the warrant purporting to authorize the installation of the beeper was obtained improperly, I would affirm the judgment of the Court of Appeals. I would not engage in a de novo examination of the record in an effort to determine whether there is sufficient information independent of that obtained by means of the beeper to support the issuance of the warrant to search the Taos house. That question was not raised in the petition for certiorari and has not been briefed by the parties.12 Surely this is an inquiry that should be made in the first instance by the trial court after the parties have had an opportunity to argue the issue.

Accordingly, I respectfully dissent.

4.3 UNITED STATES v. JONES 4.3 UNITED STATES v. JONES

[GPS device on Jones' car]

A search occurs where

  • The government obtains information
  • by physically intruding on
  • a constitutionally protected area

(What are constitutionally protected areas?  Persons, Houses, Papers, Effects.)

UNITED STATES v. JONES

No. 10-1259.

Argued November 8, 2011

Decided January 23, 2012

*401 Deputy Solicitor General Dreeben argued the cause for the United States. With him on the briefs were Solicitor General Verrilli, Assistant Attorney General Breuer, Ann O’Connell, and J. Campbell Barker.

Stephen C. Lechar argued the cause for respondent. With him on the brief were Walter Dellinger and Jonathan D. Hacker. *

*402Justice Scalia

delivered the opinion of the Court.

We decide whether the attachment of a Global-Positioning-System (GPS) tracking device to an individual’s vehicle, and subsequent use of that device to monitor the vehicle’s movements on public streets, constitutes a search or seizure within the meaning of the Fourth Amendment.

HH

In 2004 respondent Antoine Jones, owner and operator of a nightclub in the District of Columbia, came under suspicion of trafficking in narcotics and was made the target of an investigation by a joint Federal Bureau of Investigation and Metropolitan Police Department task force. Officers employed various investigative techniques, including visual surveillance of the nightclub, installation of a camera focused on the front door of the club, and a pen register and wiretap covering Jones’s cellular phone.

Based in part on information gathered from these sources, in 2005 the Government applied to the United States District Court for the District of Columbia for a warrant authorizing the use of an electronic tracking device on the Jeep Grand Cherokee registered to Jones’s wife. A warrant issued, au*403thorizing installation of the device in the District of Columbia and within 10 days.

On the 11th day, and not in the District of Columbia but in Maryland,1 agents installed a GPS tracking device on the undercarriage of the Jeep while it was parked in a public parking lot. Over the next 28 days, the Government used the device to track the vehicle’s movements, and once had to replace the device’s battery when the vehicle was parked in a different public lot in Maryland. By means of signals from multiple satellites, the device established the vehicle’s location within 50 to 100 feet, and communicated that location by cellular phone to a Government computer. It relayed more than 2,000 pages of data over the 4-week period.

The Government ultimately obtained a multiple-count indictment charging Jones and several alleged co-conspirators with, as relevant here, conspiracy to distribute and possess with intent to distribute five kilograms or more of cocaine and 50 grams or more of cocaine base, in violation of 21 U. S. C. §§ 841 and 846. Before trial, Jones filed a motion to suppress evidence obtained through the GPS device. The District Court granted the motion only in part, suppressing the data obtained while the vehicle was parked in the garage adjoining Jones’s residence. 451 F. Supp. 2d 71, 88 (2006). It held the remaining data admissible, because “ ‘[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.’ ” Ibid, (quoting United States v. Knotts, 460 U. S. 276, 281 (1983)). Jones’s trial in October 2006 produced a hung jury on the conspiracy count.

In March 2007, a grand jury returned another indictment, charging Jones and others with the same conspiracy. The Government introduced at trial the same GPS-derived locational data admitted in the first trial, which connected Jones *404to the alleged conspirators’ stash house that contained $850,000 in cash, 97 kilograms of cocaine, and 1 kilogram of cocaine base. The jury returned a guilty verdict, and the District Court sentenced Jones to life imprisonment. The United States Court of Appeals for the District of Columbia Circuit reversed the conviction because of admission of the evidence obtained by warrantless use of the GPS device which, it said, violated the Fourth Amendment. United States v. Maynard, 615 F. 3d 544 (2010). The D. C. Circuit denied the Government’s petition for rehearing en banc, with four judges dissenting. 625 F. 3d 766 (2010). We granted certiorari, 564 U. S. 1036 (2011).

1 — 1 1 — I

A

The Fourth Amendment provides in relevant part that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” It is beyond dispute that a vehicle is an “effect” as that term is used in the Amendment. United States v. Chadwick, 433 U. S. 1, 12 (1977). We hold that the Government’s installation of a GPS device on a target’s vehicle,2 and its use of that device to monitor the vehicle’s movements, constitutes a “search.”

It is important to be clear about what occurred in this case: The Government physically occupied private property for the purpose of obtaining information. We have no doubt that such a physical intrusion would have been considered a *405“search” within the meaning of the Fourth Amendment when it was adopted. Entick v. Carrington, 95 Eng. Rep. 807 (C. P. 1765), is a “case we have described as a ‘monument of English freedom’ ‘undoubtedly familiar’ to ‘every American statesman’ at the time the Constitution was adopted, and considered to be ‘the true and ultimate expression of constitutional law’ ” with regard to search and seizure. Brower v. County of Inyo, 489 U. S. 593, 596 (1989) (quoting Boyd v. United States, 116 U. S. 616, 626 (1886)). In that case, Lord Camden expressed in plain terms the significance of property rights in search-and-seizure analysis:

“[O]ur law holds the property of every man so sacred, that no man can set his foot upon his neighbour’s close without his leave; if he does he is a trespasser, though he does no damage at all; if he will tread upon his neigh-bour’s ground, he must justify it by law.” Entick, swpra, at 817.

The text of the Fourth Amendment reflects its close connection to property, since otherwise it would have referred simply to “the right of the people to be secure against unreasonable searches and seizures”; the phrase “in their persons, houses, papers, and effects” would have been superfluous.

Consistent with this understanding, our Fourth Amendment jurisprudence was tied to common-law trespass, at least until the latter half of the 20th century. Kyllo v. United States, 533 U. S. 27, 31 (2001); Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L. Rev. 801, 816 (2004). Thus, in Olmstead v. United States, 277 U. S. 438 (1928), we held that wiretaps attached to telephone wires on the public streets did not constitute a Fourth Amendment search because “ft]here was no entry of the houses or offices of the defendants,” id., at 464.

Our later cases, of course, have deviated from that exclusively property-based approach. In Katz v. United States, *406389 U. S. 347, 351 (1967), we said that “the Fourth Amendment protects people, not places,” and found a violation in attachment of an eavesdropping device to a public telephone booth. Our later cases have applied the analysis of Justice Harlan’s concurrence in that case, which said that a violation occurs when government officers violate a person’s “reasonable expectation of privacy,” id., at 360. See, e. g., Bond v. United States, 529 U. S. 334 (2000); California v. Ciraolo, 476 U. S. 207 (1986); Smith v. Maryland, 442 U. S. 735 (1979).

The Government contends that the Harlan standard shows that no search occurred here, since Jones had no “reasonable expectation of privacy” in the area of the Jeep accessed by Government agents (its underbody) and in the locations of the Jeep on the public roads, which were visible to all. But we need not address the Government’s contentions, because Jones’s Fourth Amendment rights do not rise or fall with the Katz formulation. At bottom, we must “assur[e] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.” Kyllo, supra, at 34. As explained, for most of our history the Fourth Amendment was understood to embody a particular concern for government trespass upon the areas (“persons, houses, papers, and effects”) it enumerates.3 Katz did not *407repudiate that understanding. Less than two years later the Court upheld defendants’ contention that the Government could not introduce against them conversations between other people obtained by warrantless placement of electronic surveillance devices in their homes. The opinion rejected the dissent’s contention that there was no Fourth Amendment violation “unless the conversational privacy of the homeowner himself is invaded.”4 Alderman v. United States, 394 U. S. 165, 176 (1969). “[W]e [do not] believe that Katz, by holding that the Fourth Amendment protects persons and their private conversations, was intended to withdraw any of the protection which the Amendment extends to the home .. . .” Id., at 180.

More recently, in Soldal v. Cook County, 506 U. S. 56 (1992), the Court unanimously rejected the argument that although a “seizure” had occurred “in a ‘technical’ sense” when a trailer home was forcibly removed, id., at 62, no Fourth Amendment violation occurred because law enforcement had not “invade[d] the [individuals’] privacy,” id., at 60. Katz, the Court explained, established that “property rights are not the sole measure of Fourth Amendment violations,” but did not “snuf[f] out the previously recognized protection for property.” 506 U. S., at 64. As Justice Brennan explained in his concurrence in Knotts, Katz did not erode the principle “that, when the Government does engage in physical intrusion of a constitutionally protected area in order to obtain information, that intrusion may constitute a violation of the Fourth Amendment.” 460 U. S., at 286 (opinion concurring in judgment). We have embodied that preservation *408of past rights in our very definition of “reasonable expectation of privacy” which we have said to be an expectation “that has a source outside of the Fourth Amendment, either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society.” Minnesota v. Carter, 525 U. S. 83, 88 (1998) (internal quotation marks omitted). Katz did not narrow the Fourth Amendment’s scope.5

The Government contends that several of our post-Aate cases foreclose the conclusion that what occurred here constituted a search. It relies principally on two cases in which we rejected Fourth Amendment challenges to “beepers,” electronic tracking devices that represent another form of electronic monitoring. The first ease, Knotts, upheld against Fourth Amendment challenge the use of a “beeper” that had been placed in a container of chloroform, allowing law enforcement to monitor the location of the container. 460 U. S., at 278. We said that there had been no infringement of Knotts’ reasonable expectation of privacy since the information obtained — the location of the automobile carry*409ing the container on public roads, and the location of the offloaded container in open fields near Knotts’ cabin — had been voluntarily conveyed to the public.6 Id., at 281-282. But as we have discussed, the Katz reasonable-expeetation-of-privacy test has been added to, not substituted for, the common-law trespassory test. The holding in Knotts addressed only the former, since the latter was not at issue. The beeper had been placed in the container before it came into Knotts’ possession, with the consent of the then-owner. 460 U. S., at 278. Knotts did not challenge that installation, and we specifically declined to consider its effect on the Fourth Amendment analysis. Id., at 279, n. Knotts would be relevant, perhaps, if the Government were making the argument that what would otherwise be an unconstitutional search is not such where it produces only public information. The Government does not make that argument, and we know of no case that would support it.

The second “beeper” case, United States v. Karo, 468 U. S.-705 (1984), does not suggest a different conclusion. There we addressed the question left open by Knotts, whether the installation of a beeper in a container amounted to a search or seizure. 468 U. S., at 713. As in Knotts, at the time the beeper was installed the container belonged to a third party, and it did not come into possession of the defendant until later. 468 U. S., at 708. Thus, the specific question we considered was whether the installation “with the consent of the original owner constitute^] a search or seizure . . . when the container is delivered to a buyer having no knowledge of the presence of the beeper.” Id., at 707 (emphasis added). We held not. The Government, we said, came into physical contact with the container only before it belonged to the de*410fendant Karo; and the transfer of the container with the unmonitored beeper inside did not convey any information and thus did not invade Karo’s privacy. See id., at 712. That conclusion is perfectly consistent with the one we reach here. Karo accepted the container as it came to him, beeper and all, and was therefore not entitled to object to the beeper’s presence, even though it was used to monitor the container’s location. Cf. On Lee v. United States, 343 U. S. 747, 751-752 (1952) (no search or seizure where an informant, who was wearing a concealed microphone, was invited into the defendant’s business). Jones, who possessed the Jeep at the time the Government trespassorily inserted the information-gathering device, is on much different footing.

The Government also points to our exposition in New York v. Class, 475 U. S. 106 (1986), that “[t]he exterior of a car . .. is thrust into the public eye, and thus to examine it does not constitute a ‘search.’ ” Id., at 114. That statement is of marginal relevance here since, as the Government acknowledges, “the officers in this ease did more than conduct a visual inspection of respondent’s vehicle,” Brief for United States 41 (emphasis added). By attaching the device to the Jeep, officers encroached on a protected area. In Class itself we suggested that this would make a difference, for we concluded that an officer’s momentary reaching into the interior of a vehicle did constitute a search.7 475 U. S., at 114-115.

Finally, the Government’s position gains little support from our conclusion in Oliver v. United States, 466 U. S. 170 *411(1984), that officers’ information-gathering intrusion on an “open field” did not constitute a Fourth Amendment search even though it was a trespass at common law, id., at 183. Quite simply, an open field, unlike the curtilage of a home, see United States v. Dunn, 480 U. S. 294, 300 (1987), is not one of those protected areas enumerated in the Fourth Amendment. Oliver, supra, at 176-177. See also Hester v. United States, 265 U. S. 57, 59 (1924). The Government’s physical intrusion on such an area — unlike its intrusion on the “effect” at issue here — is of no Fourth Amendment significance.8

B

The concurrence begins by accusing us of applying “18th-century tort law.” Post, at 418. That is a distortion. What we apply is an 18th-century guarantee against unreasonable searches, which we believe must provide at a minimum the degree of protection it afforded when it was adopted. The concurrence does not share that belief. It would apply exclusively Katz’s reasonable-expectation-of-privacy test, even when that eliminates rights that previously existed.

The concurrence faults our approach for “presenting] particularly vexing problems” in cases that do not involve physical contact, such as those that involve the transmission of electronic signals. Post, at 426. We entirely fail to understand that point. For unlike the concurrence, which would make Katz the exclusive test, we do not make trespass the exclusive test. Situations involving merely the transmission of electronic signals without trespass would remain subject to Katz analysis.

*412In fact, it is the concurrence’s insistence on the exclusivity of the Katz test that needlessly leads us into “particularly vexing problems” in the present case. This Court has to date not deviated from the understanding that mere visual observation does not constitute a search. See Kyllo, 533 U. S., at 31-32. We accordingly held in Knotts that “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.” 460 U. S., at 281. Thus, even assuming that the concurrence is correct to say that “[tjraditional surveillance” of Jones for a 4-week period “would have required a large team of agents, multiple vehicles, and perhaps aerial assistance,” post, at 429, our cases suggest that such visual observation is constitutionally permissible. It may be that achieving the same result through electronic means, without an accompanying trespass, is an unconstitutional invasion of privacy, but the present case does not require us to answer that question.

And answering it affirmatively leads us needlessly into additional thorny problems. The concurrence posits that “relatively short-term monitoring of a person’s movements on public streets” is okay, but that “the use of longer term GPS monitoring in investigations of most offenses” is no good. Post, at 430 (emphasis added). That introduces yet another novelty into our jurisprudence. There is no precedent for the proposition that whether a search has occurred depends on the nature of the crime being investigated. And even accepting that novelty, it remains unexplained why a 4-week investigation is “surely” too long and why a drug-trafficking conspiracy involving substantial amounts of cash and narcotics is not an “extraordinary offens[e]” which may permit longer observation. See post, at 430-431. What of a 2-day monitoring of a suspected purveyor of stolen electronics? Or of a 6-month monitoring of a suspected terrorist? We may have to grapple with these “vexing problems” in some future case where a classic trespassory search is not involved *413and resort must be had to Katz analysis; but there is no reason for rushing forward to resolve them here.

III

The Government argues in the alternative that even if the attachment and use of the device was a search, it was reasonable — and thus lawful — under the Fourth Amendment because “officers had reasonable suspicion, and indeed probable cause, to believe that [Jones] was a leader in a large-scale cocaine distribution conspiracy.” Brief for United States 50-51. We have no occasion to consider this argument. The Government did not raise it below, and the D. C. Circuit therefore did not address it. See 625 F. 3d, at 767 (Ginsburg, Tatel, and Griffith, JJ., concurring in denial of rehearing en banc). We consider the argument forfeited. See Sprietsma v. Mercury Marine, 537 U. S. 51, 56, n. 4 (2002).

* * *

The judgment of the Court of Appeals for the D. C. Circuit is affirmed.

It is so ordered.

Justice Sotomayor,

concurring.

I join the Court’s opinion because I agree that a search within the meaning of the Fourth Amendment occurs, at a minimum, “[w]here, as here, the Government obtains information by physically intruding on a constitutionally protected area.” Ante, at 406-407, n. 3. In this case, the Government installed a Global Positioning System (GPS) tracking device on respondent Antoine Jones’ Jeep without a valid warrant and without Jones’ consent, then used that device to monitor the Jeep’s movements over the course of four weeks. The Government usurped Jones’ property for the purpose of conducting surveillance on him, thereby invading privacy interests long afforded, and undoubtedly entitled to, Fourth *414Amendment protection. See, e. g., Silverman v. United States, 365 U. S. 505, 511-512 (1961).

Of course, the Fourth Amendment is not concerned only with trespassory intrusions on property. See, e. g., Kyllo v. United States, 533 U. S. 27, 31-33 (2001). Rather, even in the absence of a trespass, “a Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable.” Id., at 33; see also Smith v. Maryland, 442 U. S. 735, 740-741 (1979); Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring). In Katz, this Court enlarged its then-prevailing focus on property rights by announcing that the reach of the Fourth Amendment does not “turn upon the presence or absence of a physical intrusion.” Id., at 353. As the majority’s opinion makes clear, however, Katz’s reasonable-expectation-of-privacy test augmented, but did not displace or diminish, the common-law trespassory test that preceded it. Ante, at 409. Thus, “when the Government does engage in physical intrusion of a constitutionally protected area in order to obtain information, that intrusion may constitute a violation of the Fourth Amendment.” United States v. Knotts, 460 U. S. 276, 286 (1983) (Brennan, J., concurring in judgment); see also, e. g., Rakas v. Illinois, 439 U. S. 128, 144, n. 12 (1978). Justice Alito’s approach, which discounts altogether the constitutional relevance of the Government’s physical intrusion on Jones’ Jeep, erodes that longstanding protection for privacy expectations inherent in items of property that people possess or control. See post, at 422-424 (opinion concurring in judgment). By contrast, the trespassory test applied in the majority’s opinion reflects an irreducible constitutional minimum: When the government physically invades personal property to gather information, a search occurs. The reaffirmation of that principle suffices to decide this case.

Nonetheless, as Justice Alito notes, physical intrusion is now unnecessary to many forms of surveillance. Post, at *415426-429. With increasing regularity, the government will be capable of duplicating the monitoring undertaken in this case by enlisting factory- or owner-installed vehicle tracking devices or GPS-enabled smartphones. See United States v. Pineda-Moreno, 617 F. 3d 1120, 1125 (CA9 2010) (Kozinski, C. J., dissenting from denial of rehearing en banc). In cases of electronic or other novel modes of surveillance that do not depend upon a physical invasion on property, the majority opinion’s trespassory test may provide little guidance. But “[situations involving merely the transmission of electronic signals without trespass would remain subject to Katz analysis.” Ante, at 411. As Justice Alito incisively observes, the same technological advances that have made possible nontrespassory surveillance techniques will also affect the Katz test by shaping the evolution of societal privacy expectations. Post, at 428. Under that rubric, I agree with Justice Alito that, at the very least, “longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.” Post, at 430.

In cases involving even short-term monitoring, some unique attributes of GPS surveillance relevant to the Katz analysis will require particular attention. GPS monitoring generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. See, e. g., People v. Weaver, 12 N. Y. 3d 433, 441-442, 909 N. E. 2d 1195, 1199 (2009) (“Disclosed in [GPS] data . . . will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on”). The government can store such records and efficiently mine them for information years into the future. Pineda-Moreno, 617 F. 3d, at 1124 (opinion of Kozinski, C. J.). And because GPS monitoring is *416cheap in comparison to conventional surveillance techniques and, by design, proceeds surreptitiously, it evades the ordinary checks that constrain abusive law enforcement practices: “limited police resources and community hostility.” Illinois v. Lidster, 540 U. S. 419, 426 (2004)..

Awareness that the government may be watching chills associational and expressive freedoms. And the government’s unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse. The net result is that GPS monitoring — by making available at a relatively low cost such a substantial quantum of intimate information about any person whom the government, in its unfettered discretion, chooses to track — may “alter the relationship between citizen and government in a way that is inimical to democratic society.” United States v. Cuevas-Perez, 640 F. 3d 272, 285 (CA7 2011) (Flaum, J., concurring).

I would take these attributes of GPS monitoring into account when considering the existence of a reasonable societal expectation of privacy in the sum of one’s public movements. I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on. I do not regard as dispositive the fact that the government might obtain the fruits of GPS monitoring through lawful conventional surveillance techniques. See Kyllo, 533 U. S., at 35, n. 2; ante, at 412 (leaving open the possibility that duplicating traditional surveillance “through electronic means, without an accompanying trespass, is an unconstitutional invasion of privacy”). I would also consider the appropriateness of entrusting to the Executive, in the absence of any oversight from a coordinate branch, a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb arbitrary exercises of police power and prevent “a *417too permeating police surveillance,” United States v. Di Re, 332 U. S. 581, 595 (1948).*

More fundamentally, it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. E. g., Smith, 442 U. S., at 742; United States v. Miller, 425 U. S. 435, 443 (1976). This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. People disclose the phone numbers that they dial or text to their cellular providers; the URLs that they visit and the e-mail addresses with which they correspond to their Internet service providers; and the books, groceries, and medications they purchase to online retailers. Perhaps, as Justice Alito notes, some people may find the “tradeoff” of privacy for convenience “worthwhile,” or come to accept this “diminution of privacy” as “inevitable,” post, *418at 427, and perhaps not. I for one doubt that people would accept without complaint the warrantless disclosure to the government of a list of every Web site they had visited in the last week, or month, or year. But whatever the societal expectations, they can attain constitutionally protected status only if our Fourth Amendment jurisprudence ceases to treat secrecy as a prerequisite for privacy. I would not assume that all information voluntarily disclosed to some member of the public for a limited purpose is, for that reason alone, disentitled to Fourth Amendment protection. See Smith, 442 U. S., at 749 (Marshall, J., dissenting) (“Privacy is not a discrete commodity, possessed absolutely or not at all. Those who disclose certain facts to a bank or phone company for a limited business purpose need not assume that this information will be released to other persons for other purposes”); see also Katz, 389 U. S., at 351-352 (“[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected”).

Resolution of these difficult questions in this case is unnecessary, however, because the Government’s physical intrusion on Jones’ Jeep supplies a narrower basis for decision. I therefore join the majority’s opinion.

Justice Alito,

with whom Justice Ginsburg, Justice Breyer, and Justice Kagan join,

concurring in the judgment.

This case requires us to apply the Fourth Amendment’s prohibition of unreasonable searches and seizures to a 21st-century surveillance technique, the use of a Global Positioning System (GPS) device to monitor a vehicle’s movements for an extended period of time. Ironically, the Court has chosen to decide this case based on 18th-century tort law. By attaching a small GPS device1 to the underside of the *419vehicle that respondent drove, the law enforcement officers in this case engaged in conduct that might have provided grounds in 1791 for a suit for trespass to chattels.2 And for this reason, the Court concludes, the installation and use of the GPS device constituted a search. Ante, at 404-405.

This holding, in my judgment, is unwise. It strains the language of the Fourth Amendment; it has little if any support in current Fourth Amendment case law; and it is highly artificial.

I would analyze the question presented in this case by asking whether respondent’s reasonable expectations of privacy were violated by the long-term monitoring of the movements of the vehicle he drove.

I — l

A

The Fourth Amendment prohibits “unreasonable searches and seizures,” and the Court makes very little effort to explain how the attachment or use of the GPS device fits within these terms. The Court does not contend that there was a seizure. A seizure of property occurs when there is “some meaningful interference with an individual’s possessory interests in that property,” United States v. Jacobsen, 466 U. S. 109, 113 (1984), and here there was none. Indeed, the success of the surveillance technique that the officers employed was dependent on the fact that the GPS did not interfere in any way with the operation of the vehicle, for if any such interference had been detected, the device might have been discovered.

*420The Court does claim that the installation and use of the GPS constituted a search, see ante, at 404-405, but this conclusion is dependent on the questionable proposition that these two procedures cannot be separated for purposes of Fourth Amendment analysis. If these two procedures are analyzed separately, it is not at all clear from the Court’s opinion why either should be regarded as a search. It is clear that the attachment of the GPS device was not itself a search; if the device had not functioned or if the officers had not used it, no information would have been obtained. And the Court does not contend that the use of the device constituted a search either. On the contrary, the Court accepts the holding in United States v. Knotts, 460 U. S. 276 (1983), that the use of a surreptitiously planted electronic device to monitor a vehicle’s movements on public roads did not amount to a search. See ante, at 408-409.

The Court argues — and I agree — that “we must ‘assur[e] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.’” Ante, at 406 (quoting Kyllo v. United States, 533 U. S. 27, 34 (2001)). But it is almost impossible to think of late-18thcentury situations that are analogous to what took place in this case. (Is it possible to imagine a case in which a constable secreted himself somewhere in a coach and remained there for a period of time in order to monitor the movements of the coach’s owner?3) The Court’s theory seems to be that the concept of a search, as originally understood, comprehended any technical trespass that led to the gathering of evidence, but we know that this is incorrect. At common law, any unauthorized intrusion on private property was actionable, see Prosser & Keeton 75, but a trespass on open fields, as opposed to the “curtilage” of a home, does not fall *421within the scope of the Fourth Amendment because private property outside the curtilage is not part of a “hous[e]” within the meaning of the Fourth Amendment. See Oliver v. United States, 466 U. S. 170 (1984); Hester v. United States, 265 U. S. 57 (1924).

B

The Court’s reasoning in this case is very similar to that in the Court’s early decisions involving wiretapping and electronic eavesdropping, namely, that a technical trespass followed by the gathering of evidence constitutes a search. In the early electronic surveillance cases, the Court concluded that a Fourth Amendment search occurred when private conversations were monitored as a result of an “unauthorized physical penetration into the premises occupied” by the defendant. Silverman v. United States, 365 U. S. 505, 509 (1961). In Silverman, police officers listened to conversations in an attached home by inserting a “spike mike” through the wall that this house shared with the vacant house next door. Id., at 506. This procedure was held to be a search because the mike made contact with a heating duct on the other side of the wall and thus “usurpfed] ... an integral part of the premises.” Id., at 511.

By contrast, in cases in which there was no trespass, it was held that there was no search. Thus, in Olmstead v. United States, 277 U. S. 438 (1928), the Court found that the Fourth Amendment did not apply because “[t]he taps from house lines were made in the streets near the houses.” Id., at 457. Similarly, the Court concluded that no search occurred in Goldman v. United States, 316 U. S. 129,135 (1942), where a “detectaphone” was placed on the outer wall of defendant’s office for the purpose of overhearing conversations held within the room.

This trespass-based rule was repeatedly criticized. In Olmstead, Justice Brandéis wrote that it was “immaterial where the physical connection with the telephone wires . . . was made.” 277 U. S., at 479 (dissenting opinion). Al*422though a private conversation transmitted by wire did not fall within the literal words of the Fourth Amendment, he argued, the Amendment should be understood as prohibiting “every unjustifiable intrusion by the Government upon the privacy of the individual.” Id., at 478. See also, e. g., Sil-verman, supra, at 513 (Douglas, J., concurring) (“The concept of ‘an unauthorized physical penetration into the premises/ on which the present decision rests, seems to me beside the point. Was not the wrong ... done when the intimacies of the home were tapped, recorded, or revealed? The depth of the penetration of the electronic device — even the degree of its remoteness from the inside of the house — is not the measure of the injury”); Goldman, supra, at 139 (Murphy, J., dissenting) (“[Tjhe search of one’s home or office no longer requires physical entry, for science has brought forth far more effective devices for the invasion of a person’s privacy than the direct and obvious methods of oppression which were detested by our forebears and which inspired the Fourth Amendment”).

Katz v. United States, 389 U. S. 347 (1967), finally did away with the old approach, holding that a trespass was not required for a Fourth Amendment violation. Katz involved the use of a listening device that was attached to the outside of a public telephone booth and that allowed police officers to eavesdrop on one end of the target’s phone conversation. This procedure did not physically intrude on the area occupied by the target, but the Katz Court “repudiate[ed]” the old doctrine, Rakas v. Illinois, 439 U. S. 128, 143 (1978), and held that “[t]he fact that the electronic device employed . . . did not happen to penetrate the wall of the booth can have no constitutional significance,” 389 U. S., at 353; ibid. (“[T]he reach of th[e] [Fourth] Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure”); see Rakas, supra, at 143 (describing Katz as holding that the “capacity to claim the protection for the Fourth Amendment depends not upon a property right in *423the invaded place but upon whether the person who claims the protection of the Amendment has a legitimate expectation of privacy in the invaded place”); Kyllo, 533 U. S., at 32 (“We have since decoupled violation of a person’s Fourth Amendment rights from trespassory violation of his property”). What mattered, the Court now held, was whether the conduct at issue “violated the privacy upon which [the defendant] justifiably relied while using the telephone booth.” Katz, supra, at 353.

Under this approach, as the Court later put it when addressing the relevance of a technical trespass, “an actual trespass is neither necessary nor sufficient to establish a constitutional violation.” United States v. Karo, 468 U. S. 705, 713 (1984) (emphasis added). Ibid. (“[e]ompar[ing] Katz v. United States, 389 U. S. 347 (1967) (no trespass, but Fourth Amendment violation), with Oliver v. United States, 466 U. S. 170 (1984) (trespass, but no Fourth Amendment violation)”). In Oliver, the Court wrote:

“The existence of a property right is but one element in determining whether expectations of privacy are legitimate. ‘The premise that property interests control the right of the Government to search and seize has been discredited.’ Katz, 389 U. S., at 353 (quoting Warden v. Hayden, 387 U. S. 294, 304 (1967).” 466 U. S., at 183 (some internal quotation marks omitted).

FH FH

The majority suggests that two post-Katz decisions— Soldal v. Cook County, 506 U. S. 56 (1992), and Alderman v. United States, 394 U. S. 165 (1969) — show that a technical trespass is sufficient to establish the existence of a search, but they provide little support.

In Soldal, the Court held that towing away a trailer home without the owner’s consent constituted a seizure even if this did not invade the occupants’ personal privacy. But in the *424present case, the Court does not find that there was a seizure, and it is clear that none occurred.

In Alderman, the Court held that the Fourth Amendment rights of homeowners were implicated by the use of a surreptitiously planted listening device to monitor third-party conversations that occurred within their home. See 394 U. S., at 176-180. Alderman is best understood to mean that the homeowners had a legitimate expectation of privacy in all conversations that took place under their roof. See Rakas, supra, at 144, n. 12 (citing Alderman for the proposition that “the Court has not altogether abandoned use of property concepts in determining the presence or absence of the privacy interests protected by that Amendment”); 439 U. S., at 153 (Powell, J., concurring) (citing Alderman for the proposition that “property rights reflect society’s explicit recognition of a person’s authority to act as he wishes in certain areas, and therefore should be considered in determining whether an individual’s expectations of privacy are reasonable); Karo, supra, at 732 (Stevens, J., concurring in part and dissenting in part) (citing Alderman in support of the proposition that “a homeowner has a reasonable expectation of privacy in the contents of his home, including items owned by others”).

In sum, the majority is hard pressed to find support in post-Katz cases for its trespass-based theory.

1 — I HH HH

Disharmony with a substantial body of existing ease law is only one of the problems with the Court’s approach in this case.

I will briefly note four others. First, the Court’s reasoning largely disregards what is really important (the use of a GPS for the purpose of long-term tracking) and instead attaches great significance to something that most would view as relatively minor (attaching to the bottom of a car a small, light object that does not interfere in any way with the car’s *425operation). Attaching such an object is generally regarded as so trivial that it does not provide a basis for recovery under modern tort law. See Prosser & Keeton § 14, at 87 (harmless or trivial contact with personal property not actionable); D. Dobbs, Law of Torts 124 (2000) (same). But under the Court’s reasoning, this conduct may violate the Fourth Amendment. By contrast, if long-term monitoring can be accomplished without committing a technical trespass — suppose, for example, that the Federal Government required or persuaded auto manufacturers to include a GPS tracking device in every car — the Court’s theory would provide no protection.

Second, the Court’s approach leads to incongruous results. If the police attach a GPS device to a car and use the device to follow the car for even a brief time, under the Court’s theory, the Fourth Amendment applies. But if the police follow the same car for a much longer period using unmarked cars and aerial assistance, this tracking is not subject to any Fourth Amendment constraints.

In the present case, the Fourth Amendment applies, the Court concludes, because the officers installed the GPS device after respondent’s wife, to whom the car was registered, turned it over to respondent for his exclusive use. See ante, at 404-405. But if the GPS had been attached prior to that time, the Court’s theory would lead to a different result. The Court proceeds on the assumption that respondent “had at least the property rights of a bailee,” ante, at 404, n. 2, but a bailee may sue for a trespass to chattel only if the injury occurs during the term of the bailment. See 8A Am. Jur. 2d, Bailment § 166, pp. 685-686 (2009). So if the GPS device had been installed before respondent’s wife gave him the keys, respondent would have no claim for trespass — and, presumably, no Fourth Amendment claim either.

Third, under the Court’s theory, the coverage of the Fourth Amendment may vary from State to State. If the events at issue here had occurred in a community-property *426State4 or a State that has adopted the Uniform Marital Property Act,5 respondent would likely be an owner of the vehicle, and it would not matter whether the GPS was installed before or after his wife turned over the keys. In non-community-property States, on the other hand, the registration of the vehicle in the name of respondent’s wife would generally be regarded as presumptive evidence that she was the sole owner. See 60 C. J. S., Motor Vehicles § 231, pp. 398-399 (2002); 8 Am. Jur. 2d, Automobiles § 1208, pp. 859-860 (2007).

Fourth, the Court’s reliance on the law of trespass will present particularly vexing problems in cases involving surveillance that is carried out by making electronic, as opposed to physical, contact with the item to be tracked. For example, suppose that the officers in the present case had followed respondent by surreptitiously activating a stolen vehicle detection system that came with the car when it was purchased. Would the sending of a radio signal to activate this system constitute a trespass to chattels? Trespass to chattels has traditionally required a physical touching of the property. See Restatement (Second) of Torts §217 and Comment e (1963 and 1964); Dobbs, supra, at 123. In recent years, courts have wrestled with the application of this old tort in cases involving unwanted electronic contact with computer systems, and some have held that even the transmission of electrons that occurs when a communication is sent from one computer to another is enough. See, e. g., CompuServe, Inc. v. Cyber Promotions, Inc. 962 F. Supp. 1015, 1021 (SD Ohio 1997); Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559,1566, n. 6, 54 Cal. Rptr. 2d 468, 473, n. 6 (1996). But may such decisions be followed in applying the Court’s trespass theory? Assuming that what matters under the Court’s theory is the law of trespass as it existed at the time of the adoption of the Fourth Amendment, do these recent *427decisions represent a change in the law or simply the application of the old tort to new situations?

IV

A

The Katz expectation-of-privacy test avoids the problems and complications noted above,- but it is not without its own difficulties. It involves a degree of circularity, see Kyllo, 533 U. S., at 34, and judges are apt to confuse their own expectations of privacy with those of the hypothetical reasonable person to which the Katz test looks. See Minnesota v. Carter, 525 U. S. 83, 97 (1998) (Scalia, J., concurring). In addition, the Katz test rests on the assumption that this hypothetical reasonable person has a well-developed and stable set of privacy expectations. But technology can change those expectations. Dramatic technological change may lead to periods in which popular expectations are in flux and may ultimately produce significant changes in popular attitudes. New technology may provide increased convenience or security at the expense of privacy, and many people may find the tradeoff worthwhile. And even if the public does not welcome the diminution of privacy that new technology entails, they may eventually reconcile themselves to this development as inevitable.6

On the other hand, concern about new intrusions on privacy may spur the enactment of legislation to protect against these intrusions. This is what ultimately happened with respect to wiretapping. After Katz, Congress did not leave it to the courts to develop a body of Fourth Amendment case law governing that complex subject. Instead, Congress promptly enacted a comprehensive statute, see 18 U. S. C. *428§§2510-2522 (2006 ed. and Supp. IV), and since that time, the regulation of wiretapping has been governed primarily by statute and not by case law.7 In an ironic sense, although Katz overruled Olmstead, Chief Justice Taft’s suggestion in the latter case that the regulation of wiretapping was a matter better left for Congress, see 277 U. S., at 465-466, has been borne out.

B

Recent years have seen the emergence of many new devices that permit the monitoring of a person’s movements. In some locales, closed-circuit television video monitoring is becoming ubiquitous. On toll roads, automatic toll collection systems create a precise record of the movements of motorists who choose to make use of that convenience. Many motorists purchase cars that are equipped with devices that permit a central station to ascertain the car’s location at any time so that roadside assistance may be provided if needed and the car may be found if it is stolen.

Perhaps most significant, cell phones and other wireless devices now permit wireless carriers to track and record the location of users — and as of June 2011, it has been reported, there were more than 322 million wireless devices in use in the United States.8 For older phones, the accuracy of the location information depends on the density of the tower network, but new “smart phones,” which are equipped with a GPS device, permit more precise tracking. For example, when a user activates the GPS on such a phone, a provider is able to monitor the phone’s location and speed of movement and can then report back real-time traffic conditions after combining (“crowdsourcing”) the speed of all such *429phones on any particular road.9 Similarly, phone-location-tracking services are offered as “social” tools, allowing consumers to find (or to avoid) others who enroll in these services. The availability and use of these and other new devices will continue to shape the average person’s expectations about the privacy of his or her daily movements.

V

In the precomputer age, the greatest protections of privacy were neither constitutional nor statutory, but practical. Traditional surveillance for any extended period of time was difficult and costly and therefore rarely undertaken. The surveillance at issue in this case — constant monitoring of the location of a vehicle for four weeks — would have required a large team of agents, multiple vehicles, and perhaps aerial assistance.10 Only an investigation of unusual importance could have justified such an expenditure of law enforcement resources. Devices like the one used in the present case, however, make long-term monitoring relatively easy and cheap. In circumstances involving dramatic technological change, the best solution to privacy concerns may be legislative. See, e.g., Kerr 805-806. A legislative body is well situated to gauge changing public attitudes, to draw detailed *430lines, and to balance privacy and public safety in a comprehensive way.

To date, however, Congress and most States have not enacted statutes regulating the use of GPS tracking technology for law enforcement purposes. The best that we can do in this case is to apply existing Fourth Amendment doctrine and to ask whether the use of GPS tracking in a particular case involved a degree of intrusion that a reasonable person would not have anticipated.

Under this approach, relatively short-term monitoring of a person’s movements on public streets accords with expectations of privacy that our society has recognized as reasonable. See Knotts, 460 U. S., at 281-282. But the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy. For such offenses, society’s expectation has been that law enforcement agents and others would not — and indeed, in the main, simply could not — secretly monitor and catalogue every single movement of an individual’s car for a very long period. In this case, for four weeks, law enforcement agents tracked every movement that respondent made in the vehicle he was driving. We need not identify with precision the point at which the tracking of this vehicle became a search, for the line was surely crossed before the 4-week mark. Other cases may present more difficult questions. But where uncertainty exists with respect to whether a certain period of GPS surveillance is long enough to constitute a Fourth Amendment search, the police may always seek a warrant.11 *431We also need not consider whether prolonged GPS monitoring in the context of investigations involving extraordinary offenses would similarly intrude on a constitutionally protected sphere of privacy. In such cases, long-term tracking might have been mounted using previously available techniques.

* * *

For these reasons, I conclude that the lengthy monitoring that occurred in this case constituted a search under the Fourth Amendment. I therefore agree with the majority that the decision of the Court of Appeals must be affirmed.

4.4 KYLLO v. UNITED STATES 4.4 KYLLO v. UNITED STATES

Scalia's "new technology" test:

It is a search where the government uses

  • sense-enhancing technology
  • not in use by the general public
  • to obtain details about the home
  • not knowable without physical intrusion.

KYLLO v. UNITED STATES

No. 99-8508.

Argued February 20, 2001

Decided June 11, 2001

*29Scaua, J., delivered the opinion of the Court, in which Souter, Thomas, Ginsburg, and Breyer, JJ., joined. Stevens, J., filed a dissenting opinion, in which Rehnquist, C. J., and O’Connor and Kennedy, JJ., joined, post, p. 41.

Kenneth Lerner, by appointment of the Court, 531 U. S. 955, argued the cause and filed briefs for petitioner.

Deputy Solicitor General Dreeben argued the cause for the United States. With him on the brief were former Solicitor General Waxman, Assistant Attorney General Robinson, Irving L. Gornstein, and Deborah Watson *

Justice Scalia

This case presents the question whether the use of a thermal-imaging device aimed at a private home from a public street to detect relative amounts of heat within the home constitutes a “search” within the meaning of the Fourth Amendment.

I

In 1991 Agent William Elliott of the United States Department of the Interior came to suspect that marijuana was being grown in the home belonging to petitioner Danny Kyllo, part of a triplex on Rhododendron Drive in Florence, Oregon. Indoor marijuana growth typically requires high-intensity lamps. In order to determine whether an amount of heat was emanating from petitioner’s home consistent with the use of such lamps, at 3:20 a.m. on January 16,1992, Agent Elliott and Dan Haas used an Agema Thermovision 210 thermal imager to scan the triplex. Thermal imagers detect infrared radiation, which virtually all objects emit but which is not visible to the naked eye. The imager converts radiation into images based on relative warmth — black *30is cool, white is hot, shades of gray connote relative differences; in that respect, it operates somewhat like a video camera showing heat images. The scan of Kyllo’s home took only a few minutes and was performed from the passenger seat of Agent Elliott’s vehicle across the street from the front of the house and also from the street in back of the house. The scan showed that the roof over the garage and a. side wall of petitioner’s home were relatively hot compared to the rest of the home and substantially warmer than neighboring homes in the triplex. Agent Elliott concluded that petitioner was using halide lights to grow marijuana in his house, which indeed he was. Based on tips from informants, utility bills, and the thermal imaging, a Federal Magistrate Judge issued a warrant authorizing a search of petitioner’s home, and the agents found an indoor growing operation involving more than 100 plants. Petitioner was indicted on one count of manufacturing marijuana, in violation of 21 U. S. C. § 841(a)(1). He unsuccessfully moved to suppress the evidence seized from his home and then entered a conditional guilty plea.

The Court of Appeals for the Ninth Circuit remanded the case for an evidentiary hearing regarding the intrusiveness of thermal imaging. On remand the District Court found that the Agema 210 “is a non-intrusive device which emits no rays or beams and shows a crude visual image of the heat being radiated from the outside of the house”; it “did not show any people or activity within the walls of the structure”; “[t]he device used cannot penetrate walls or windows to reveal conversations or human activities”; and “[n]o intimate details of the home were observed.” Supp. App. to Pet. for Cert. 89-40. Based on these findings, the District Court upheld the validity of the warrant that relied in part upon the thermal imaging, and reaffirmed its denial of the motion to suppress. A divided Court of Appeals initially reversed, 140 F. 3d 1249 (1998), but that *31opinion was withdrawn and the panel (after a change in composition) affirmed, 190 F. 3d 1041 (1999), with Judge Noonan dissenting. The court held that petitioner had shown no subjective expectation of privacy because he had made no attempt to conceal the heat escaping from his home, id., at 1046, and even if he had, there was no objectively reasonable expectation of privacy because the imager “did not expose any intimate details of Kyllo’s life,” only “amorphous ‘hot spots’ on the roof and exterior wall,” id., at 1047. We granted certiorari. 530 U. S. 1305 (2000).

II

The Fourth Amendment provides that [t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” “At the very core” of the Fourth Amendment “stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion.” Silverman v. United States, 365 U. S. 505, 511 (1961). With few exceptions, the question whether a warrantless search of a home is reasonable and hence constitutional must be answered no. See Illinois v. Rodriguez, 497 U. S. 177, 181 (1990); Payton v. New York, 445 U. S. 573, 586 (1980).

On the other hand, the antecedent question whether or not a Fourth Amendment “search” has occurred is not so simple under our precedent. The permissibility of ordinary visual surveillance of a home used to be clear because, well into the 20th century, our Fourth Amendment jurisprudence was tied to common-law trespass. See, e.g., Goldman v. United States, 316 U. S. 129, 134-136 (1942); Olmstead v. United States, 277 U. S. 438, 464-466 (1928). Cf. Silverman v. United States, supra, at 510-512 (technical trespass not necessary for Fourth Amendment violation; it suffices if there is “actual intrusion into a constitutionally protected area”). Visual surveillance was unquestionably lawful because “‘the *32eye cannot by the laws of England be guilty of a trespass.’ ” Boyd v. United States, 116 U. S. 616, 628 (1886) (quoting Entick v. Carrington, 19 How. St. Tr. 1029, 95 Eng. Rep. 807 (K. B. 1765)). We have since decoupled violation of a person’s Fourth Amendment rights from trespassory violation of his property, see Rakas v. Illinois, 439 U. S. 128, 143 (1978), but the lawfulness of warrantless visual surveillance of a home has still been preserved. As we observed in California v. Ciraolo, 476 U. S. 207, 213 (1986), “[t]he Fourth Amendment protection of the home has never been extended to require law enforcement officers to shield their eyes when passing by a home on public thoroughfares.”

One might think that the new validating rationale would be that examining the portion of a house that is in plain public view, while it is a “search”1 despite the absence of trespass, is not an “unreasonable” one under the Fourth Amendment. See Minnesota v. Carter, 525 U. S. 83, 104 (1998) (Breyer, J., concurring in judgment). But in fact we have held that visual observation is no “search” at all— perhaps in order to preserve somewhat more intact our doctrine that warrantless searches are presumptively unconstitutional. See Dow Chemical Co. v. United States, 476 U. S. 227, 234-235, 239 (1986). In assessing when a search is not a search, we have applied somewhat in reverse the principle first enunciated in Katz v. United States, 389 U. S. 347 (1967). Katz involved eavesdropping by means of an electronic listening device placed on the outside of a telephone booth — a location not within the catalog (“persons, houses, papers, and effects”) that the Fourth Amendment protects against unreasonable searches. We held that the *33Fourth Amendment nonetheless protected Katz from the warrantless eavesdropping because he “justifiably relied” upon the privacy of the telephone booth. Id., at 353. As Justice Harlan’s oft-quoted concurrence described it, a Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable. See id., at 361. We have subsequently applied this principle to hold that a Fourth Amendment search does not occur — even when the explicitly protected location of a house is concerned — unless “the individual manifested a subjective expectation of privacy in the object of the challenged search,” and “society [is] willing to recognize that expectation as reasonable.” Ciraolo, supra, at 211. We have applied this test in holding that it is not a search for the police to use a pen register at the phone company to determine what numbers were dialed in a private home, Smith v. Maryland, 442 U. S. 735, 743-744 (1979), and we have applied the test on two different occasions in holding that aerial surveillance of private homes and surrounding areas does not constitute a search, Ciraolo, supra; Florida, v. Riley, 488 U. S. 445 (1989).

The present case involves officers on a public street engaged in more than naked-eye surveillance of a home. We have previously reserved judgment as to how much technological enhancement of ordinary perception from such a vantage point, if any, is too much. While we upheld enhanced aerial photography of an industrial complex in Dow Chemical, we noted that we found “it important that this is not an area immediately adjacent to a private home, where privacy expectations are most heightened,” 476 U. S., at 237, n. 4 (emphasis in original).

III

It would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been *34entirely unaffected by the advance of technology. For example, as the cases discussed above make clear, the technology enabling human flight has exposed to public view (and hence, we have said, to official observation) uncovered portions of the house and its curtilage that once were private. See Ciraolo, supra, at 215. The question we confront today is what limits there are upon this power of technology to shrink the realm of guaranteed privacy.

The Katz test — whether the individual has an expectation of privacy that society is prepared to recognize as reasonable — has often been criticized as circular, and hence subjective and unpredictable. See 1 W. LaFave, Search and Seizure § 2.1(d), pp. 393-394 (3d ed. 1996); Posner, The Uncertain Protection of Privacy by the Supreme Court, 1979 S. Ct. Rev. 173, 188; Carter, supra, at 97 (Scalia, J., concurring). But see Rakas, supra, at 143-144, n. 12. While it may be difficult to refine Katz when the search of areas such as telephone booths, automobiles, or even the eurtilage and uncovered portions of residences is at issue, in the case of the search of the interior of homes — the prototypical and hence most commonly litigated area of protected privacy— there is a ready criterion, with roots deep in the common law, of the minimal expectation of privacy that exists, and that is acknowledged to be reasonable. To withdraw protection of this minimum expectation would be to permit police technology to erode the privacy guaranteed by the Fourth Amendment. We think that obtaining by sense-enhancing technology any information regarding the interior of the home that could not otherwise have been obtained without physical “intrusion into a constitutionally protected area,” Silverman, 365 U. S., at 512, constitutes a search— at least where (as here) the technology in question is not in general public use. This assures preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted. On the basis of this criterion, the *35information obtained by the thermal imager in this ease was the product of a search.2

The Government maintains, however, that the thermal imaging must be upheld because it detected “only heat radiating from the external surface of the house,” Brief for United States 26. The dissent makes this its leading point, see post, at 41, contending that there is a fundamental difference between what it calls “off-the-wall” observations and “through-the-wall surveillance.” But just as a thermal imager captures only heat emanating from a house, so also a powerful directional microphone picks up only sound emanating from a house — and a satellite capable of scanning from many miles away would pick up only visible light emanating from a house. We rejected such a mechanical interpretation of the Fourth Amendment in Katz, where the eavesdropping device picked up only sound waves that reached the exterior of the phone booth. Reversing that approach would leave the homeowner at the mercy of advancing technology— including imaging technology that could discern all human *36activity in the home. While the technology used in the present case was relatively crude, the rule we adopt must take account of more sophisticated systems that are already in use or in development.3 The dissent’s reliance on the distinction between “off-the-wall” and “through-the-wall” observation is entirely incompatible with the dissent’s belief, which we discuss below, that thermal-imaging observations of the intimate details of a home are impermissible. The most sophisticated thermal-imaging devices continue to measure heat “off-the-wall” rather than “through-the-wall”; the dissent’s disapproval of those more sophisticated thermal-imaging devices, see post, at 49, is an acknowledgment that there is no substance to this distinction. As for the dissent’s extraordinary assertion that anything learned through “an inference” cannot be a search, see post, at 44, that would validate even the “through-the-wall” technologies that the dissent purports to disapprove. Surely the dissent does not believe that the through-the-wall radar or ultrasound technology produces an 8-by-10 Kodak glossy that needs no analysis (i. e., the making of inferences). And, of course, the novel proposition that inference insulates a search is blatantly contrary to United States v. Karo, 468 U. S. 705 (1984), where the police “inferred” from the activation of a beeper that a certain can of ether was in the home. The police ac*37tivity was held to be a search, and the search was held unlawful.4

The Government also contends that the thermal imaging was constitutional because it did not “detect private activities occurring in private areas,” Brief for United States 22. It points out that in Dow Chemical we observed that the enhanced aerial photography did not reveal any “intimate details.” 476 U. S., at 238. Dow Chemical, however, involved enhanced aerial photography of an industrial complex, which does not share the Fourth Amendment sanctity of the home. The Fourth Amendment’s protection of the home has never been tied to measurement of the quality or quantity of information obtained. In Silverman, for example, we made clear that any physical invasion of the structure of the home, “by even a fraction of an inch,” was too much, 365 U. S., at 512, and there is certainly no exception to the warrant requirement for the officer who barely cracks open the front door and sees nothing but the non-intimate rug on the vestibule floor. In the home, our cases show, all details are intimate details, because the entire area is held safe from prying government eyes. Thus, in Karo, supra, the only thing detected was a can of ether in the *38home; and in Arizona v. Hicks, 480 U. S. 321 (1987), the only thing detected by a physical search that went beyond what officers lawfully present could observe in “plain view” was; the registration number of a phonograph turntable. These were intimate details because they were details of the home, just as was the detail of how warm — or even how relatively warm — Kyllo was heating his residence.5

Limiting the prohibition of thermal imaging to “intimate details” would not only be wrong in principle; it would be impractical in application, failing to provide “a workable accommodation between the needs of law enforcement and the interests protected by the Fourth Amendment,” Oliver v. United States, 466 U. S. 170, 181 (1984). To begin with, there is no necessary connection between the sophistication of the surveillance equipment and the “intimacy” of the details that it observes — which means that one cannot say (and the police cannot be assured) that use of the relatively crude equipment at issue here will always be lawful. The Agema Thermovision 210 might disclose, for example, at what hour each night the lady of the house takes her daily sauna and bath — a detáil that many would consider “intimate”; and a much more sophisticated system might detect nothing more intimate than the fact that someone left a closet light on. We could not, in other words, develop a rule approving only that through-the-wall surveillance which identifies objects no smaller than 36 by 36 inches, but would have to develop a jurisprudence specifying which *39home activities are “intimate” and which are not. And even when (if ever) that jurisprudence were fully developed, no police officer would be able to know in advance whether his through-the-wall surveillance picks up “intimate” details— and thus would be unable to know in advance whether it is constitutional.

The dissent’s proposed standard — whether the technology offers the “functional equivalent of actual presence in the area being searched,” post, at 47 — would seem quite similar to our own at first blush. The dissent concludes that Katz was such a case, but then inexplicably asserts that if the same listening device only revealed the volume of the conversation, the surveillance would be permissible, post, at 49-50. Yet if, without technology, the police could not discern volume without being actually present in the phone booth, Justice Stevens should conclude a search has occurred. Cf. Karo, 468 U. S., at 735 (Stevens, J., concurring in part and dissenting in part) (“I find little comfort in the Court’s notion that no invasion of privacy occurs until a listener obtains some significant information by use of the device. ... A bathtub is a less private area when the plumber is present even if his back is turned”). The same should hold for the interior heat of the home if only a person present in the home could discern the heat. Thus the driving force of the dissent, despite its recitation of the above standard, appears to be a distinction among different types of information — whether the “homeowner would even care if anybody noticed,” post, at 50. The dissent offers no practical guidance for the application of this standard, and for reasons already discussed, we believe there can be none. The people in their houses, as well as the police, deserve more precision.6

*40We have said that the Fourth Amendment draws “a firm line at the entrance to the house,” Payton, 445 U. S., at 590. That line, we think, must be not only firm but also bright— which requires clear specification of those methods of surveillance that require a warrant. While it is certainly possible to conclude from the videotape of the thermal imaging that occurred in this case that no “significant” compromise of the homeowner’s privacy has occurred, we must take the long view, from the original meaning of the Fourth Amendment forward.

“The Fourth Amendment is to be construed in the light of what was deemed an unreasonable search and seizure when it was adopted, and in a manner which will conserve public interests as well as the interests and rights of individual citizens.” Carroll v. United States, 267 U. S. 132, 149 (1925).

Where, as here, the Government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a “search” and is presumptively unreasonable without a warrant.

Since we hold the Thermovision imaging to have been an unlawful search, it will remain for the District Court to determine whether, without the evidence it provided, the search warrant issued in this case was supported by probable cause — and if not, whether there is any other basis for supporting admission of the evidence that the search pursuant to the warrant produced.

*41* * *

The judgment of the Court of Appeals is reversed; the case is remanded for further proceedings consistent with this opinion.

It is so ordered.

Justice Stevens,

with whom The Chief Justice, Justice O’Connor, and Justice Kennedy join, dissenting.

There is, in my judgment, a distinction of constitutional magnitude between “ through-the-wall surveillance” that gives the observer or listener direct access to information in a private area, on the one hand, and the thought processes used to draw inferences from information in the public domain, on the other hand. The Court has crafted a rule that purports to deal with direct observations of the inside of the home, but the case before us merely involves indirect deductions from “off-the-wall” surveillance, that is, observations of the exterior of the home. Those observations were made with a fairly primitive thermal imager that gathered data exposed on the outside of petitioner’s home but did not invade any constitutionally protected interest in privacy.1 Moreover, I believe that the supposedly “bright-line” rule the Court has created in response to its concerns about future technological developments is unnecessary, unwise, and inconsistent with the Fourth Amendment.

There is no need for the Court to craft a new rule to decide this case, as it is controlled by established principles from *42our Fourth Amendment jurisprudence. One of those core principles, of course, is that “searches and seizures inside a home without a warrant are presumptively unreasonable.”1 Payton v. New York, 445 U. S. 573, 586 (1980) (emphasis added). But it is equally well settled that searches and seizures of property in plain view are presumptively reasonable. See id., at 586-587.2 Whether that property is residential or commercial, the basic principle is the same: ‘“What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.’ ” California v. Ciraolo, 476 U. S. 207, 213 (1986) (quoting Katz v. United States, 389 U. S. 347, 351 (1967)); see Florida v. Riley, 488 U. S. 445, 449-450 (1989); California v. Greenwood, 486 U. S. 35, 40-41 (1988); Dow Chemical Co. v. United States, 476 U. S. 227, 235-236 (1986); Air Pollution Variance Bd. of Colo. v. Western Alfalfa Cory., 416 U. S. 861, 865 (1974). That is the principle implicated here.

While the Court “take[s] the long view” and decides this case based largely on the potential of yet-to-be-developed technology that might allow “through-the-wall surveillance,” ante, at 38-40; see ante, at 36, n. 3, this case involves nothing more than off-the-wall surveillance by law enforcement officers to gather information exposed to the general public from the outside of petitioner’s home. All that the infrared camera did in this case was passively measure heat emitted *43from the exterior surfaces of petitioner’s home; all that those measurements showed were relative differences in emission levels, vaguely indicating that some areas of the roof and outside walls were warmer than others. As still images from the infrared scans show, see Appendix, infra, no details regarding the interior of petitioner’s home were revealed. Unlike an x-ray scan, or other possible “through-the-wall” techniques, the detection of infrared radiation emanating from the home did not accomplish “an unauthorized physical penetration into the premises,” Silverman v. United States, 365 U. S. 505, 509 (1961), nor did it “obtain information that it could not have obtained by observation from outside the curtilage of the house,” United States v. Karo, 468 U. S. 705, 715 (1984).

Indeed, the ordinary use of the senses might enable a neighbor or passerby to notice the heat emanating from a building, particularly if it is vented, as was the case here. Additionally, any member of the public might notice that one part of a house is warmer than another part or a nearby building if, for example, rainwater evaporates or snow melts at different rates across its surfaces. Such use of the senses would not convert into an unreasonable search if, instead, an adjoining neighbor allowed an officer onto her property to verify her perceptions with a sensitive thermometer. Nor, in my view, does such observation become an unreasonable search if made from a distance with the aid of a device that merely discloses that the exterior of one house, or one area of the house, is much warmer than another. Nothing more occurred in this case.

Thus, the notion that heat emissions from the outside of a dwelling are a private matter implicating the protections of the Fourth Amendment (the text of which guarantees the right of people “to be secure in their ... houses” against unreasonable searches and seizures (emphasis added)) is not only unprecedented but also quite difficult to take seriously. Heat waves, like aromas that are generated in a kitchen, or *44in a laboratory or opium den, enter the public domain if and when they leave a building. A subjective expectation that they would remain private is not only implausible but also surely not “one that society is prepared to recognize as ‘reasonable.’ ” Katz, 389 U. S., at 361 (Harlan, J., concurring).

To be sure, the homeowner has a reasonable expectation of privacy concerning what takes place within the home, and the Fourth Amendment’s protection against physical invasions of the home should apply to their functional equivalent. But the equipment in this case did not penetrate the walls of petitioner’s home, and while it did pick up “details of the home” that were exposed to the public, ante, at 38, it did not obtain “any information regarding the interior of the home,” ante, at 34 (emphasis added). In the Court’s own words, based on what the thermal imager “showed” regarding the outside of petitioner’s home, the officers “concluded” that petitioner was engaging in illegal activity inside the home. Ante, at 30. It would be quite absurd to characterize their thought processes as “searches,” regardless of whether they inferred (rightly) that petitioner was growing marijuana in his house, or (wrongly) that “the lady of the house [was taking] her daily sauna and bath.” Ante, at 38. In either case, the only conclusions the officers reached concerning the interior of the home were at least as indirect as those that might have been inferred from the contents of discarded garbage, see California v. Greenwood, 486 U. S. 35 (1988), or pen register data, see Smith v. Maryland, 442 U. S. 735 (1979), or, as in this case, subpoenaed utility records, see 190 F. 3d 1041, 1043 (CA9 1999). For the first time in its history, the Court assumes that an inference can amount to a Fourth Amendment violation. See ante, at 36-37.3

*45Notwithstanding the implications of today’s decision, there is a strong public interest in avoiding constitutional litigation over the monitoring of emissions from homes, and over the inferences drawn from such monitoring. Just as “the police cannot reasonably be expected to avert their eyes from evidence of criminal activity that could have been observed by any member of the public,” Greenwood, 486 U. S., at 41, so too public officials should not have to avert their senses or their equipment from detecting emissions in the public domain such as excessive heat, traces of smoke, suspicious odors, odorless gases, airborne particulates, or radioactive emissions, any of which could identify hazards to the community. In my judgment, monitoring such emissions with “sense-enhancing technology,” ante, at 34, and drawing useful conclusions from such monitoring, is an entirely reasonable public service.

On the other hand, the countervailing privacy interest is at best trivial. After all, homes generally are insulated to keep heát in, rather than to prevent the detection of heat going out, and it does not seem to me that society will suffer from a rule requiring the rare homeowner who both intends to engage in uncommon activities that produce extraordinary amounts of heat, and wishes to conceal that production from outsiders, to make sure that the surrounding area is well insulated. Cf. United States v. Jacobsen, 466 U. S. 109, 122 (1984) (“The concept of an interest in privacy that society is prepared to recognize as reasonable is, by its very nature, critically different from the mere expectation, however well *46justified, that certain facts will not come to the attention of the authorities”). The interest in concealing the heat escaping from one’s house pales in significance to “the chief evil against which the wording of the Fourth Amendment is directed,” the “physical entry of the home,” United States v. United States Dist. Court for Eastern Dist. of Mich., 407 U. S. 297, 313 (1972), and it is hard to believe that it is an interest the Framers sought to protect in our Constitution.

Since what was involved in this case was nothing more than drawing inferences from off-the-wall surveillance, rather than any “through-the-wall” surveillance, the officers’ conduct did not amount to a search and was perfectly reasonable.4

II

Instead of trying to answer the question whether the use of the thermal imager in this case was even arguably unreasonable, the Court has fashioned a rule that is intended to provide essential guidance for the day when “more sophisticated systems” gain the “ability to 'see’ through walls and other opaque barriers.” Ante, at 36, and n. 3. The newly minted rule encompasses “obtaining [1] by sense-enhancing technology [2] any information regarding the interior of the home [3] that could not otherwise have been obtained without physical intrusion into a constitutionally protected area ... [4] at least where (as here) the technology in question is not in general public use.” Ante, at 34 (internal quotation marks omitted). In my judgment, the *47Court’s new rule is at once too broad and too narrow, and is not justified by the Court’s explanation for its adoption. As I have suggested, I would not erect a constitutional impediment to the use of sense-enhancing technology unless it provides its user with the functional equivalent of actual presence in the area being searched.

Despite the Court’s attempt to draw a line that is “not only firm but also bright,” ante, at 40, the contours of its new rule are uncertain because its protection apparently dissipates as soon as the relevant technology is “in general public use,” ante, at 34. Yet how much use is general public use is not even hinted at by the Court’s opinion, which makes the somewhat doubtful assumption that the thermal imager used in this .case does not satisfy that criterion.5 In any event, putting aside its lack of clarity, this criterion is somewhat perverse because it seems likely that the threat to privacy will grow, rather than recede, as the use of intrusive equipment becomes more readily available.

It is clear, however, that the category of “sense-enhancing technology” covered by the new rule, ibid., is far too broad. It would, for example, embrace potential mechanical substitutes for dogs trained to react when they sniff narcotics. But in United States v. Place, 462 U. S. 696, 707 (1983), we held that a dog sniff that “discloses only the presence or absence of narcotics” does “not constitute a ‘search’ within the meaning of the Fourth Amendment,” and it must follow that sense-enhancing equipment that identifies nothing but illegal *48activity is not a search either. Nevertheless, the use of such a device would be unconstitutional under the Court’s rule, as would the use of other new devices that might detect the odor of deadly bacteria or chemicals for making a new type of high explosive, even if the devices (like the dog sniffs) are “so limited both in the manner in which” they obtain information and “in the content of the information” they reveal. Ibid. If nothing more than that sort of information could be obtained by using the devices in a public place to monitor emissions from a house, then their use would be no more objectionable than the use of the thermal imager in this case.

The application of the Court’s new rule to “any information regarding the interior of the home,” ante, at 34, is also unnecessarily broad. If it takes sensitive equipment to detect an odor that identifies criminal conduct and nothing else, the fact that the odor emanates from the interior of a home should not provide it with constitutional protection. See supra, at 47 and this page. The criterion, moreover, is too sweeping in that information “regarding” the interior of a home apparently is not just information obtained through its walls, but also information concerning the outside of the building that could lead to (however many) inferences “regarding” what might be inside. Under that expansive view, I suppose, an officer using an infrared camera to observe a man silently entering the side door of a house at night carrying a pizza might conclude that its interior is now occupied by someone who likes pizza, and by doing so the officer would be guilty of conducting an unconstitutional “search” of the home.

Because the new rule applies to information regarding the “interior” of the home, it is too narrow as well as too broad. Clearly, a rule that is designed to protect individuals from the overly intrusive use of sense-enhancing equipment should not be limited to a home. If such equipment *49did provide its user with the functional equivalent of access to a private place — such as, for example, the telephone booth involved in Katz, or an office building — then the rule should apply to such an area as well as to a home. See Katz, 389 U. S., at 351 (“[T]he Fourth Amendment protects people, not places”).

The final requirement of the Court’s new, rule, that the information “could not otherwise have been obtained without physical intrusion into a constitutionally protected area,” ante, at 34 (internal quotation marks omitted), also extends too far as the Court applies it. As noted, the Court effectively treats the mental process of analyzing data obtained from external sources as the equivalent of a physical intrusion into the home. See supra, at 44. As I have explained, however, the process of drawing inferences from data in the public domain should not be characterized as a search.

The two reasons advanced by the Court as justifications for the adoption of its new rule are both unpersuasive. First, the Court suggests that its rule is compelled by our holding in Katz, because in that case, as in this, the surveillance consisted of nothing more than the monitoring of waves emanating from a private area into the public domain. See ante, at 35. Yet there are critical differences between the cases. In Katz, the electronic listening device attached to the outside of the phone booth allowed the officers to pick up the content of the conversation inside the booth, making them the functional equivalent of intruders because they gathered information that was otherwise available only to someone inside the private area; it would be as if, in this case, the thermal imager presented a view of the heat-generating activity inside petitioner’s home. By contrast, the thermal imager here disclosed only the relative amounts of heat radiating from the house; it would be as if, in Katz, the listening device disclosed only the rela*50tive volume of sound leaving the booth, which presumably was discernible in the public domain.6 Surely, there is a significant difference between the general and well-settled expectation that strangers will not have direct access to the contents of private communications, on the one hand, and the rather theoretical expectation that an occasional homeowner would even care if anybody noticed the relative amounts of heat emanating from the walls of his house, on the other. It is pure hyperbole for the Court to suggest that refusing to extend the holding of Katz to this case would leave the homeowner at the mercy of “technology that could discern all human activity in the home.” Ante, at 35-36.

Second, the Court argues that the permissibility of “through-the-wall surveillance” cannot depend on a distinction between observing “intimate details” such as “the lady of the house [taking] her daily sauna and bath,” and noticing only “the nonintimate rug on the vestibule floor” or “objects no smaller than 36 by 36 inches.” Ante, at 37, 38-39. This entire argument assumes, of course, that the thermal imager in this case could or did perform “through-the-wall surveillance” that could identify any detail “that would previously have been unknowable without physical intrusion.” Ante, at 39-40. In fact, the device could not, see n. 1, supra, and did not, see Appendix, infra, enable its user to identify either the lady of the house, the rug on the vestibule floor, or anything else inside the house, whether smaller or larger than 36 by 36 inches. Indeed, the vague thermal images of petitioner’s home that are reproduced in the Appendix were submitted by him to the District Court as part of an expert report raising the question whether the device could even take “accurate, consistent infrared images” of the *51 outside of his house. Defendant’s Exh. 107, p. 4. But even if the device could reliably show extraordinary differences in the amounts of heat leaving his home, drawing the inference that there was something suspicious occurring inside the residence — a conclusion that officers far less gifted than Sherlock Holmes would readily draw — does not qualify as “through-the-wall surveillance,” much less a Fourth Amendment violation.

Ill

Although the Court is properly and commendably concerned about the threats to privacy that may flow from advances in the technology available to the law enforcement profession, it has unfortunately failed to heed the tried and true counsel of judicial restraint. Instead of concentrating on the rather mundane issue that is actually presented by the case before it, the Court has endeavored to craft an all-encompassing rule for the future. It would be far wiser to give legislators an unimpeded opportunity to grapple with these emerging issues rather than to shackle them with prematurely devised constitutional constraints.

I respectfully dissent.

[Appendix to opinion of Stevens, J., follows this page.]

*52APPENDIX TO OPINION OF STEVENS, J.

(Images and text reproduced from defendant’s exhibit 107)

Top left: Infrared image of a video frame from the videotape submitted as evidence in this case. The thermogram indicates the suspect house as it appeared with the Gain and contrast in its default setting. Only the outline of the house is visible. The camera used was the Thermovision 210.

•Top Right: Infrared image of a subsequent videoframe taken from the videotape. The gain and contrast settings have been increased in order to make the walls and roof of the structure appear hotter than what it actually is.

Bottom Left: Infrared image of the opposite side of the suspects house. The thermogram is also taken from the same videotape. The camera settings are in the default mode and the outline of the house is barely visible. Only the hot electrical transformer and the street light are identifiable. Bottom Right: The same image, but with the gain and contrast increased. This change in camera settings cause any object to appear hotter than what it actually is. The arrow indicates the overloading of an area immediately around a hot object in this case the electrical transformer and the streetlight. This overloading of the image is an inherent design flaw in the camera itself.

4.5 Third-Party Doctrine 4.5 Third-Party Doctrine

4.5.1 Smith v. Maryland 4.5.1 Smith v. Maryland

442 U.S. 735 (1979)

SMITH
v.
MARYLAND.

No. 78-5374.

Supreme Court of United States.

Argued March 28, 1979.
Decided June 20, 1979.

CERTIORARI TO THE COURT OF APPEALS OF MARYLAND.

[736] Howard L. Cardin argued the cause for petitioner. With him on the brief was James J. Gitomer.

Stephen H. Sachs, Attorney General of Maryland, argued the cause for respondent. With him on the brief were George A. Nilson, Deputy Attorney General, and Deborah K. Handel and Stephen B. Caplis, Assistant Attorneys General.

MR. JUSTICE BLACKMUN delivered the opinion of the Court.

This case presents the question whether the installation and use of a pen register[1] constitutes a "search" within the meaning of the Fourth Amendment,[2] made applicable to the States through the Fourteenth Amendment. Mapp v. Ohio, 367 U. S. 643 (1961).

[737] I

On March 5, 1976, in Baltimore, Md., Patricia McDonough was robbed. She gave the police a description of the robber and of a 1975 Monte Carlo automobile she had observed near the scene of the crime. Tr. 66-68. After the robbery, McDonough began receiving threatening and obscene phone calls from a man identifying himself as the robber. On one occasion, the caller asked that she step out on her front porch; she did so, and saw the 1975 Monte Carlo she had earlier described to police moving slowly past her home. Id., at 70. On March 16, police spotted a man who met McDonough's description driving a 1975 Monte Carlo in her neighborhood. Id., at 71-72. By tracing the license plate number, police learned that the car was registered in the name of petitioner, Michael Lee Smith. Id., at 72.

The next day, the telephone company, at police request, installed a pen register at its central offices to record the numbers dialed from the telephone at petitioner's home. Id., at 73, 75. The police did not get a warrant or court order before having the pen register installed. The register revealed that on March 17 a call was placed from petitioner's home to McDonough's phone. Id., at 74. On the basis of this and other evidence, the police obtained a warrant to search petitioner's residence. Id., at 75. The search revealed that a page in petitioner's phone book was turned down to the name and number of Patricia McDonough; the phone book was seized. Ibid. Petitioner was arrested, and a six-man lineup was held on March 19. McDonough identified petitioner as the man who had robbed her. Id., at 70-71.

Petitioner was indicted in the Criminal Court of Baltimore for robbery. By pretrial motion, he sought to suppress "all fruits derived from the pen register" on the ground that the police had failed to secure a warrant prior to its installation. Record 14; Tr. 54-56. The trial court denied the suppression motion, holding that the warrantless installation of the pen [738] register did not violate the Fourth Amendment. Id., at 63. Petitioner then waived a jury, and the case was submitted to the court on an agreed statement of facts. Id., at 65-66. The pen register tape (evidencing the fact that a phone call had been made from petitioner's phone to McDonough's phone) and the phone book seized in the search of petitioner's residence were admitted into evidence against him. Id., at 74-76. Petitioner was convicted, id., at 78, and was sentenced to six years. He appealed to the Maryland Court of Special Appeals, but the Court of Appeals of Maryland issued a writ of certiorari to the intermediate court in advance of its decision in order to consider whether the pen register evidence had been properly admitted at petitioner's trial. 283 Md. 156, 160, 389 A. 2d 858, 860 (1978).

The Court of Appeals affirmed the judgment of conviction, holding that "there is no constitutionally protected reasonable expectation of privacy in the numbers dialed into a telephone system and hence no search within the fourth amendment is implicated by the use of a pen register installed at the central offices of the telephone company." Id., at 173, 389 A. 2d, at 867. Because there was no "search," the court concluded, no warrant was needed. Three judges dissented, expressing the view that individuals do have a legitimate expectation of privacy regarding the phone numbers they dial from their homes; that the installation of a pen register thus constitutes a "search"; and that, in the absence of exigent circumstances, the failure of police to secure a warrant mandated that the pen register evidence here be excluded. Id., at 174, 178, 389 A. 2d, at 868, 870. Certiorari was granted in order to resolve indications of conflict in the decided cases as to the restrictions imposed by the Fourth Amendment on the use of pen registers.[3] 439 U. S. 1001 (1978).

[739] II

A

The Fourth Amendment guarantees "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." In determining whether a particular form of government-initiated electronic surveillance is a "search" within the meaning of the Fourth Amendment,[4] our lodestar is Katz v. United States, 389 U. S. 347 (1967). In Katz, Government agents had intercepted the contents of a telephone conversation by attaching an electronic listening device to the outside of a public phone booth. The Court rejected the argument that a "search" can occur only when there has been a "physical intrusion" into a "constitutionally protected area," noting that the Fourth Amendment "protects people, not places." Id., at 351-353. Because the Government's monitoring of Katz' conversation "violated the privacy upon which he justifiably relied while using the telephone booth," the Court held that [740] it "constituted a `search and seizure' within the meaning of the Fourth Amendment." Id., at 353.

Consistently with Katz, this Court uniformly has held that the application of the Fourth Amendment depends on whether the person invoking its protection can claim a "justifiable," a "reasonable," or a "legitimate expectation of privacy" that has been invaded by government action. E. g., Rakas v. Illinois, 439 U. S. 128, 143, and n. 12 (1978); id., at 150, 151 (concurring opinion); id., at 164 (dissenting opinion); United States v. Chadwick, 433 U. S. 1, 7 (1977); United States v. Miller, 425 U. S. 435, 442 (1976); United States v. Dionisio, 410 U. S. 1, 14 (1973); Couch v. United States, 409 U. S. 322, 335-336 (1973); United States v. White, 401 U. S. 745, 752 (1971) (plurality opinion); Mancusi v. DeForte, 392 U. S. 364, 368 (1968); Terry v. Ohio, 392 U. S. 1, 9 (1968). This inquiry, as Mr. Justice Harlan aptly noted in his Katz concurrence, normally embraces two discrete questions. The first is whether the individual, by his conduct, has "exhibited an actual (subjective) expectation of privacy," 389 U. S., at 361—whether, in the words of the Katz majority, the individual has shown that "he seeks to preserve [something] as private." Id., at 351. The second question is whether the individual's subjective expectation of privacy is "one that society is prepared to recognize as 'reasonable,'" id., at 361— whether, in the words of the Katz majority, the individual's expectation, viewed objectively, is "justifiable" under the circumstances. Id., at 353.[5] See Rakas v. Illinois, 439 U. S., [741] at 143-144, n. 12; id., at 151 (concurring opinion); United States v. White, 401 U. S., at 752 (plurality opinion).

B

In applying the Katz analysis to this case, it is important to begin by specifying precisely the nature of the state activity that is challenged. The activity here took the form of installing and using a pen register. Since the pen register was installed on telephone company property at the telephone company's central offices, petitioner obviously cannot claim that his "property"' was invaded or that police intruded into a "constitutionally protected area." Petitioner's claim, rather, is that, notwithstanding the absence of a trespass, the State, as did the Government in Katz, infringed a "legitimate expectation of privacy" that petitioner held. Yet a pen register differs significantly from the listening device employed in Katz, for pen registers do not acquire the contents of communications. This Court recently noted:

"Indeed, a law enforcement official could not even determine from the use of a pen register whether a communication existed. These devices do not hear sound. They disclose only the telephone numbers that have been dialed—a means of establishing communication. Neither the purport of any communication between the caller and the recipient of the call, their identities, nor whether the call was even completed is disclosed by pen registers." United States v. New York Tel. Co., 434 U. S. 159, 167 (1977).

[742] Given a pen register's limited capabilities, therefore, petitioner's argument that its installation and use constituted a "search" necessarily rests upon a claim that he had a "legitimate expectation of privacy" regarding the numbers he dialed on his phone.

This claim must be rejected. First, we doubt that people in general entertain any actual expectation of privacy in the numbers they dial. All telephone users realize that they must "convey" phone numbers to the telephone company, since it is through telephone company switching equipment that their calls are completed. All subscribers realize, moreover, that the phone company has facilities for making permanent records of the numbers they dial, for they see a list of their long-distance (toll) calls on their monthly bills. In fact, pen registers and similar devices are routinely used by telephone companies "for the purposes of checking billing operations, detecting fraud, and preventing violations of law." United States v. New York Tel. Co., 434 U. S., at 174-175. Electronic equipment is used not only to keep billing records of toll calls, but also "to keep a record of all calls dialed from a telephone which is subject to a special rate structure." Hodge v. Mountain States Tel. & Tel. Co., 555 F. 2d 254, 266 (CA9 1977) (concurring opinion). Pen registers are regularly employed "to determine whether a home phone is being used to conduct a business, to check for a defective dial, or to check for overbilling." Note, The Legal Constraints upon the Use of the Pen Register as a Law Enforcement Tool, 60 Cornell L. Rev. 1028, 1029 (1975) (footnotes omitted). Although most people may be oblivious to a pen register's esoteric functions, they presumably have some awareness of one common use: to aid in the identification of persons making annoying or obscene calls. See, e. g., Von Lusch v. C & P Telephone Co., 457 F. Supp. 814, 816 (Md. 1978); Note, 60 Cornell L. Rev., at 1029-1030, n. 11; Claerhout, The Pen Register, 20 Drake L. Rev. 108, 110-111 (1970). Most phone books tell [743] subscribers, on a page entitled "Consumer Information," that the company "can frequently help in identifying to the authorities the origin of unwelcome and troublesome calls." E. g., Baltimore Telephone Directory 21 (1978); District of Columbia Telephone Directory 13 (1978). Telephone users, in sum, typically know that they must convey numerical information to the phone company; that the phone company has facilities for recording this information; and that the phone company does in fact record this information for a variety of legitimate business purposes. Although subjective expectations cannot be scientifically gauged, it is too much to believe that telephone subscribers, under these circumstances, harbor any general expectation that the numbers they dial will remain secret.

Petitioner argues, however, that, whatever the expectations of telephone users in general, he demonstrated an expectation of privacy by his own conduct here, since he "us[ed] the telephone in his house to the exclusion of all others." Brief for Petitioner 6 (emphasis added). But the site of the call is immaterial for purposes of analysis in this case. Although petitioner's conduct may have been calculated to keep the contents of his conversation private, his conduct was not and could not have been calculated to preserve the privacy of the number he dialed. Regardless of his location, petitioner had to convey that number to the telephone company in precisely the same way if he wished to complete his call. The fact that he dialed the number on his home phone rather than on some other phone could make no conceivable difference, nor could any subscriber rationally think that it would.

Second, even if petitioner did harbor some subjective expectation that the phone numbers he dialed would remain private, this expectation is not "one that society is prepared to recognize as 'reasonable.'" Katz v. United States, 389 U. S., at 361. This Court consistently has held that a person has no legitimate expectation of privacy in information he [744] voluntarily turns over to third parties. E. g., United States v. Miller, 425 U. S., at 442-444; Couch v. United States, 409 U. S., at 335-336; United States v. White, 401 U. S., at 752 (plurality opinion); Hoffa v. United States, 385 U. S. 293, 302 (1966); Lopez v. United States, 373 U. S. 427 (1963). In Miller, for example, the Court held that a bank depositor has no "legitimate `expectation of privacy'" in financial information "voluntarily conveyed to . . . banks and exposed to their employees in the ordinary course of business." 425 U. S., at 442. The Court explained:

"The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government. . . . This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed." Id., at 443.

Because the depositor "assumed the risk" of disclosure, the Court held that it would be unreasonable for him to expect his financial records to remain private.

This analysis dictates that petitioner can claim no legitimate expectation of privacy here. When he used his phone, petitioner voluntarily conveyed numerical information to the telephone company and "exposed" that information to its equipment in the ordinary course of business. In so doing, petitioner assumed the risk that the company would reveal to police the numbers he dialed. The switching equipment that processed those numbers is merely the modern counterpart of the operator who, in an earlier day, personally completed calls for the subscriber. Petitioner concedes that if he had placed his calls through an operator, he could claim no legitimate expectation of privacy. Tr. of Oral Arg. 3-5, 11-12, 32. We [745] are not inclined to hold that a different constitutional result is required because the telephone company has decided to automate.

Petitioner argues, however, that automatic switching equipment differs from a live operator in one pertinent respect. An operator, in theory at least, is capable of remembering every number that is conveyed to him by callers. Electronic equipment, by contrast, can "remember" only those numbers it is programmed to record, and telephone companies, in view of their present billing practices, usually do not record local calls. Since petitioner, in calling McDonough, was making a local call, his expectation of privacy as to her number, on this theory, would be "legitimate."

This argument does not withstand scrutiny. The fortuity of whether or not the phone company in fact elects to make a quasi-permanent record of a particular number dialed does not, in our view, make any constitutional difference. Regardless of the phone company's election, petitioner voluntarily conveyed to it information that it had facilities for recording and that it was free to record. In these circumstances, petitioner assumed the risk that the information would be divulged to police. Under petitioner's theory, Fourth Amendment protection would exist, or not, depending on how the telephone company chose to define local-dialing zones, and depending on how it chose to bill its customers for local calls. Calls placed across town, or dialed directly, would be protected; calls placed across the river, or dialed with operator assistance, might not be. We are not inclined to make a crazy quilt of the Fourth Amendment, especially in circumstances where (as here) the pattern of protection would be dictated by billing practices of a private corporation.

We therefore conclude that petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not "legitimate." The installation and use of a pen register, [746] consequently, was not a "search," and no warrant was required. The judgment of the Maryland Court of Appeals is affirmed.

It is so ordered.

Mr. JUSTICE POWELL took no part in the consideration or decision of this case.

Mr. JUSTICE STEWART, with whom MR. JUSTICE BRENNAN joins, dissenting.

I am not persuaded that the numbers dialed from a private telephone fall outside the constitutional protection of the Fourth and Fourteenth Amendments.

In Katz v. United States, 389 U. S. 347, 352, the Court acknowledged the "vital role that the public telephone has come to play in private communication[s]." The role played by a private telephone is even more vital, and since Katz it has been abundantly clear that telephone conversations carried on by people in their homes or offices are fully protected by the Fourth and Fourteenth Amendments. As the Court said in United States v. United States District Court, 407 U. S. 297, 313, "the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails necessitate the application of Fourth Amendment safeguards." (Footnote omitted.)

Nevertheless, the Court today says that those safeguards do not extend to the numbers dialed from a private telephone, apparently because when a caller dials a number the digits may be recorded by the telephone company for billing purposes. But that observation no more than describes the basic nature of telephone calls. A telephone call simply cannot be made without the use of telephone company property and without payment to the company for the service. The telephone conversation itself must be electronically transmitted by telephone company equipment, and may be recorded or overheard by the use of other company equipment. Yet we [747] have squarely held that the user of even a public telephone is entitled "to assume that the words he utters into the mouthpiece will not be broadcast to the world." Katz v. United States, supra, at 352.

The central question in this case is whether a person who makes telephone calls from his home is entitled to make a similar assumption about the numbers he dials. What the telephone company does or might do with those numbers is no more relevant to this inquiry than it would be in a case involving the conversation itself. It is simply not enough to say, after Katz, that there is no legitimate expectation of privacy in the numbers dialed because the caller assumes the risk that the telephone company will disclose them to the police.

I think that the numbers dialed from a private telephone— like the conversations that occur during a call—are within the constitutional protection recognized in Katz.[1] It seems clear to me that information obtained by pen register surveillance of a private telephone is information in which the telephone subscriber has a legitimate expectation of privacy.[2] The information captured by such surveillance emanates from private conduct within a person's home or office—locations that without question are entitled to Fourth and Fourteenth Amendment protection. Further, that information is an integral part of the telephonic communication that under Katz [748] is entitled to constitutional protection, whether or not it is captured by a trespass into such an area.

The numbers dialed from a private telephone—although certainly more prosaic than the conversation itself—are not without "content." Most private telephone subscribers may have their own numbers listed in a publicly distributed directory, but I doubt there are any who would be happy to have broadcast to the world a list of the local or long distance numbers they have called. This is not because such a list might in some sense be incriminating, but because it easily could reveal the identities of the persons and the places called, and thus reveal the most intimate details of a person's life.

I respectfully dissent.

Mr. JUSTICE MARSHALL, with whom Mr. JUSTICE BRENNAN joins, dissenting.

The Court concludes that because individuals have no actual or legitimate expectation of privacy in information they voluntarily relinquish to telephone companies, the use of pen registers by government agents is immune from Fourth Amendment scrutiny. Since I remain convinced that constitutional protections are not abrogated whenever a person apprises another of facts valuable in criminal investigations, see, e. g., United States v. White, 401 U. S. 745, 786-790 (1971) (Harlan, J., dissenting); id., at 795-796 (MARSHALL, J., dissenting); California Bankers Assn. v. Shultz, 416 U. S. 21, 95-96 (1974) (MARSHALL, J., dissenting); United States v. Miller, 425 U. S. 435, 455-456 (1976) (MARSHALL, J., dissenting), I respectfully dissent.

Applying the standards set forth in Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring), the Court first determines that telephone subscribers have no subjective expectations of privacy concerning the numbers they dial. To reach this conclusion, the Court posits that individuals somehow infer from the long-distance listings on their phone bills, and from the cryptic assurances of "help" in tracing obscene [749] calls included in "most" phone books, that pen registers are regularly used for recording local calls. See ante, at 742-743. But even assuming, as I do not, that individuals "typically know" that a phone company monitors calls for internal reasons, ante, at 743,[1] it does not follow that they expect this information to be made available to the public in general or the government in particular. Privacy is not a discrete commodity, possessed absolutely or not at all. Those who disclose certain facts to a bank or phone company for a limited business purpose need not assume that this information will be released to other persons for other purposes. See California Bankers Assn. v. Shultz, supra, at 95-96 (MARSHALL, J., dissenting).

The crux of the Court's holding, however, is that whatever expectation of privacy petitioner may in fact have entertained regarding his calls, it is not one "society is prepared to recognize as `reasonable.'" Ante, at 743. In so ruling, the Court determines that individuals who convey information to third parties have "assumed the risk" of disclosure to the government. Ante, at 744, 745. This analysis is misconceived in two critical respects.

Implicit in the concept of assumption of risk is some notion of choice. At least in the third-party consensual surveillance cases, which first incorporated risk analysis into Fourth Amendment doctrine, the defendant presumably had exercised some discretion in deciding who should enjoy his confidential communications. See, e. g., Lopez v. United States, 373 U. S. 427, 439 (1963); Hoffa v. United States, 385 U. S. 293, 302-303 (1966); United States v. White, supra, at 751-752 [750] (plurality opinion). By contrast here, unless a person is prepared to forgo use of what for many has become a personal or professional necessity, he cannot help but accept the risk of surveillance. Cf. Lopez v. United States, supra, at 465-466 (BRENNAN, J., dissenting). It is idle to speak of "assuming" risks in contexts where, as a practical mater, individuals have no realistic alternative.

More fundamentally, to make risk analysis dispositive in assessing the reasonableness of privacy expectations would allow the government to define the scope of Fourth Amendment protections. For example, law enforcement officials, simply by announcing their intent to monitor the content of random samples of first-class mail or private phone conversations, could put the public on notice of the risks they would thereafter assume in such communications. See Amsterdam, Perspectives on the Fourth Amendment, 58 Minn. L. Rev. 349, 384, 407 (1974). Yet, although acknowledging this implication of its analysis, the Court is willing to concede only that, in some circumstances, a further "normative inquiry would be proper." Ante, at 740-741, n. 5. No meaningful effort is made to explain what those circumstances might be, or why this case is not among them.

In my view, whether privacy expectations are legitimate within the meaning of Katz depends not on the risks an individual can be presumed to accept when imparting information to third parties, but on the risks he should be forced to assume in a free and open society. By its terms, the constitutional prohibition of unreasonable searches and seizures assigns to the judiciary some prescriptive responsibility. As Mr. Justice Harlan, who formulated the standard the Court applies today, himself recognized: "[s]ince it is the task of the law to form and project, as well as mirror and reflect, we should not . . . merely recite . . . risks without examining the desirability of saddling them upon society." United States v. White, supra, at 786 (dissenting opinion). In making this [751] assessment, courts must evaluate the "intrinsic character" of investigative practices with reference to the basic values underlying the Fourth Amendment. California Bankers Assn. v. Shultz, 416 U. S., at 95 (MARSHALL, J., dissenting). And for those "extensive intrusions that significantly jeopardize [individuals'] sense of security . . . , more than self-restraint by law enforcement officials is required." United States v. White, 401 U. S., at 786 (Harlan, J., dissenting).

The use of pen registers, I believe, constitutes such an extensive intrusion. To hold otherwise ignores the vital role telephonic communication plays in our personal and professional relationships, see Katz v. United States, 389 U. S., at 352, as well as the First and Fourth Amendment interests implicated by unfettered official surveillance. Privacy in placing calls is of value not only to those engaged in criminal activity. The prospect of unregulated governmental monitoring will undoubtedly prove disturbing even to those with nothing illicit to hide. Many individuals, including members of unpopular political organizations or journalists with confidential sources, may legitimately wish to avoid disclosure of their personal contacts. See NAACP v. Alabama, 357 U. S. 449, 463 (1958); Branzburg v. Hayes, 408 U. S. 665, 695 (1972); id., at 728-734 (STEWART, J., dissenting). Permitting governmental access to telephone records on less than probable cause may thus impede certain forms of political affiliation and journalistic endeavor that are the hallmark of a truly free society. Particularly given the Government's previous reliance on warrantless telephonic surveillance to trace reporters' sources and monitor protected political activity,[2] I am unwilling to insulate use of pen registers from independent judicial review.

[752] Just as one who enters a public telephone booth is "entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world," Katz v. United States, supra, at 352, so too, he should be entitled to assume that the numbers he dials in the privacy of his home will be recorded, if at all, solely for the phone company's business purposes. Accordingly, I would require law enforcement officials to obtain a warrant before they enlist telephone companies to secure information otherwise beyond the government's reach.

[1] "A pen register is a mechanical device that records the numbers dialed on a telephone by monitoring the electrical impulses caused when the dial on the telephone is released. It does not overhear oral communications and does not indicate whether calls are actually completed." United States v. New York Tel. Co., 434 U. S. 159, 161 n. 1 (1977). A pen register is "usually installed at a central telephone facility [and] records on a paper tape all numbers dialed from [the] line" to which it is attached. United States v. Giordano, 416 U. S. 505, 549 n. 1 (1974) (opinion concurring in part and dissenting in part). See also United States v. New York Tel. Co., 434 U. S., at 162.

[2] "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." U. S. Const., Amdt. 4.

[3] See Application of United States for Order, 546 F. 2d 243, 245 (CA8 1976), cert. denied sub nom. Southwestern Bell Tel. Co. v. United States, 434 U. S. 1008 (1978); Application of United States in Matter of Order, 538 F. 2d 956, 959-960 (CA2 1976), rev'd on other grounds sub nom. United States v. New York Tel. Co., 434 U. S. 159 (1977); United States v. Falcone, 505 F. 2d 478, 482, and n. 21 (CA3 1974), cert. denied, 420 U. S. 955 (1975); Hodge v. Mountain States Tel. & Tel. Co., 555 F. 2d 254, 256 (CA9 1977); id., at 266 (concurring opinion); and United States v. Clegg, 509 F. 2d 605, 610 (CA5 1975). In previous decisions, this Court has not found it necessary to consider whether "pen register surveillance [is] subject to the requirements of the Fourth Amendment." United States v. New York Tel. Co., 434 U. S., at 165 n. 7. See United States v. Giordano, 416 U. S., at 554 n. 4 (opinion concurring in part and dissenting in part).

[4] In this case, the pen register was installed, and the numbers dialed were recorded, by the telephone company. Tr. 73-74. The telephone company, however, acted at police request. Id., at 73, 75. In view of this, respondent appears to concede that the company is to be deemed an "agent" of the police for purposes of this case, so as to render the installation and use of the pen register "state action" under the Fourth and Fourteenth Amendments. We may assume that "state action" was present here.

[5] Situations can be imagined, of course, in which Katz' two-pronged inquiry would provide an inadequate index of Fourth Amendment protection. For example, if the Government were suddenly to announce on nationwide television that all homes henceforth would be subject to warrantless entry, individuals thereafter might not in fact entertain any actual expectation of privacy regarding their homes, papers, and effects. Similarly, if a refugee from a totalitarian country, unaware of this Nation's traditions, erroneously assumed that police were continuously monitoring his telephone conversations, a subjective expectation of privacy regarding the contents of his calls might be lacking as well. In such circumstances, where an individual's subjective expectations had been "conditioned" by influences alien to well-recognized Fourth Amendment freedoms, those subjective expectations obviously could play no meaningful role in ascertaining what the scope of Fourth Amendment protection was. In determining whether a "legitimate expectation of privacy" existed in such cases, a normative inquiry would be proper.

[1] It is true, as the Court pointed out in United States v. New York Tel. Co., 434 U. S. 159, 166-167, that under Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U. S. C. §§ 2510-2520, pen registers are not considered "interceptions" because "they do not acquire the `contents' of communications," as that term is defined by Congress. We are concerned in this case, however, not with the technical definitions of a statute, but with the requirements of the Constitution.

[2] The question whether a defendant who is not a member of the subscriber's household has "standing" to object to pen register surveillance of a private telephone is, of course, distinct. Cf. Rakas v. Illinois, 439 U. S. 128.

[1] Lacking the Court's apparently exhaustive knowledge of this Nation's telephone books and the reading habits of telephone subscribers, see ante, at 742-743, I decline to assume general public awareness of how obscene phone calls are traced. Nor am I persuaded that the scope of Fourth Amendment protection should turn on the concededly "esoteric functions" of pen registers in corporate billing, ante, at 742, functions with which subscribers are unlikely to have intimate familiarity.

[2] See, e. g., Reporters Committee For Freedom of Press v. American Tel. & Tel. Co., 192 U. S. App. D. C. 376, 593 F. 2d 1030 (1978), cert. denied, 440 U. S. 949 (1979); Halperin v. Kissinger, 434 F. Supp. 1193 (DC 1977); Socialist Workers Party v. Attorney General, 463 F. Supp. 515 (SDNY 1978).

4.5.2 Carpenter v. United States, 138 S.Ct.2206 (2018) 4.5.2 Carpenter v. United States, 138 S.Ct.2206 (2018)

SUPREME COURT OF THE UNITED STATES

_________________

No. 16–402

_________________

TIMOTHY IVORY CARPENTER, PETITIONER v.   

UNITED STATES   

ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF  APPEALS FOR THE SIXTH CIRCUIT   

[June 22, 2018]  

CHIEF JUSTICE ROBERTS delivered the opinion of the Court.

 This case presents the question whether the Government conducts a search under the Fourth Amendment when it accesses historical cell phone records that provide a comprehensive chronicle of the user’s past movements.

I  

A  

 There are 396 million cell phone service accounts in the United States—for a Nation of 326 million people.  Cell phones perform their wide and growing variety of functions by connecting to a set of radio antennas called “cell sites.” Although cell sites are usually mounted on a tower, they can also be found on light posts, flagpoles, church steeples, or the sides of buildings. Cell sites typically have several directional antennas that divide the covered area into sectors.

 Cell phones continuously scan their environment looking for the best signal, which generally comes from the closest cell site. Most modern devices, such as smartphones, tap into the wireless network several times a minute whenever their signal is on, even if the owner is not using one of the phone’s features.  Each time the phone connects to a cell site, it generates a time-stamped record known as cell-site location information (CSLI).  The precision of this information depends on the size of the geographic area covered by the cell site.  The greater the concentration of cell sites, the smaller the coverage area.  As data usage from cell phones has increased, wireless carriers have installed more cell sites to handle the traffic.  That has led to increasingly compact coverage areas, especially in urban areas.

 Wireless carriers collect and store CSLI for their own business purposes, including finding weak spots in their network and applying “roaming” charges when another carrier routes data through their cell sites.  In addition, wireless carriers often sell aggregated location records to data brokers, without individual identifying information of the sort at issue here.  While carriers have long retained CSLI for the start and end of incoming calls, in recent years phone companies have also collected location information from the transmission of text messages and routine data connections.  Accordingly, modern cell phones generate increasingly vast amounts of increasingly precise CSLI.

B

 In 2011, police officers arrested four men suspected of robbing a series of Radio Shack and (ironically enough) TMobile stores in Detroit.  One of the men confessed that, over the previous four months, the group (along with a rotating cast of getaway drivers and lookouts) had robbed nine different stores in Michigan and Ohio. The suspect identified 15 accomplices who had participated in the heists and gave the FBI some of their cell phone numbers; the FBI then reviewed his call records to identify additional numbers that he had called around the time of the robberies.

 Based on that information, the prosecutors applied for court orders under the Stored Communications Act to obtain cell phone records for petitioner Timothy Carpenter and several other suspects. That statute, as amended in 1994, permits the Government to compel the disclosure of certain telecommunications records when it “offers specific and articulable facts showing that there are reasonable grounds to believe” that the records sought “are relevant and material to an ongoing criminal investigation.”  18 U. S. C. §2703(d).  Federal Magistrate Judges issued two orders directing Carpenter’s wireless carriers—MetroPCS and Sprint—to disclose “cell/site sector [information] for [Carpenter’s] telephone[ ] at call origination and at call                           termination for incoming and outgoing calls” during the four-month period when the string of robberies occurred.  App. to Pet. for Cert. 60a, 72a.  The first order sought 152 days of cell-site records from MetroPCS, which produced records spanning 127 days.  The second order requested seven days of CSLI from Sprint, which produced two days of records covering the period when Carpenter’s phone was “roaming” in northeastern Ohio.  Altogether the Government obtained 12,898 location points cataloging Carpenter’s movements—an average of 101 data points per day.

 Carpenter was charged with six counts of robbery and an additional six counts of carrying a firearm during a federal crime of violence.  See 18 U. S. C. §§924(c), 1951(a). Prior to trial, Carpenter moved to suppress the cell-site data provided by the wireless carriers.  He argued that the Government’s seizure of the records violated the Fourth Amendment because they had been obtained without a warrant supported by probable cause.  The District Court denied the motion.  App. to Pet. for Cert. 38a–39a.  At trial, seven of Carpenter’s confederates pegged him as the leader of the operation. In addition, FBI agent Christopher Hess offered expert testimony about the cellsite data. Hess explained that each time a cell phone taps into the wireless network, the carrier logs a time-stamped record of the cell site and particular sector that were used.  With this information, Hess produced maps that placed Carpenter’s phone near four of the charged robberies.  In the Government’s view, the location records clinched the case: They confirmed that Carpenter was “right where the . . . robbery was at the exact time of the robbery.”  App. 131 (closing argument).  Carpenter was convicted on all but one of the firearm counts and sentenced to more than 100 years in prison.

 The Court of Appeals for the Sixth Circuit affirmed.  819 F. 3d 880 (2016). The court held that Carpenter lacked a reasonable expectation of privacy in the location information collected by the FBI because he had shared that information with his wireless carriers. Given that cell phone users voluntarily convey cell-site data to their carriers as “a means of establishing communication,” the court concluded that the resulting business records are not entitled to Fourth Amendment protection.  Id., at 888 (quoting Smith v. Maryland, 442 U. S. 735, 741 (1979)).  We granted certiorari. 582 U. S. ___ (2017).

II   

A  

 The Fourth Amendment protects “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” The “basic purpose of this Amendment,” our cases have recognized, “is to safeguard the privacy and security of individuals against arbitrary invasions by governmental officials.” Camara v. Municipal Court of City and County of San Francisco, 387 U. S. 523, 528 (1967).  The Founding generation crafted the Fourth Amendment as a “response to the reviled ‘general warrants’ and ‘writs of assistance’ of the colonial era, which allowed British officers to rummage through homes in an unrestrained search for evidence of criminal activity.” Riley v. California, 573 U. S. ___, ___ (2014) (slip op., at 27).  In fact, as John Adams recalled, the patriot James Otis’s 1761 speech condemning writs of assistance was “the first act of opposition to the arbitrary claims of Great Britain” and helped spark the Revolution itself.  Id., at ___–___ (slip op., at 27–28) (quoting 10 Works of John Adams 248 (C. Adams ed. 1856)).  For much of our history, Fourth Amendment search doctrine was “tied to common-law trespass” and focused on whether the Government “obtains information by physically intruding on a constitutionally protected area.”  United States v. Jones, 565 U. S. 400, 405, 406, n. 3 (2012).  More recently, the Court has recognized that “property rights are not the sole measure of Fourth Amendment violations.”  Soldal v. Cook County, 506 U. S. 56, 64 (1992). In Katz v. United States, 389 U. S. 347, 351 (1967), we established that “the Fourth Amendment protects people, not places,” and expanded our conception of the Amendment to protect certain expectations of privacy as well. When an individual “seeks to preserve something as private,” and his expectation of privacy is “one that society is prepared to recognize as reasonable,” we have held that official intrusion into that private sphere generally qualifies as a search and requires a warrant supported by probable cause. Smith, 442 U. S., at 740 (internal quotation marks and alterations omitted).

 Although no single rubric definitively resolves which expectations of privacy are entitled to protection,[1] the

——————

analysis is informed by historical understandings “of what was deemed an unreasonable search and seizure when [the Fourth Amendment] was adopted.” Carroll v. United States, 267 U. S. 132, 149 (1925).  On this score, our cases have recognized some basic guideposts. First, that the Amendment seeks to secure “the privacies of life” against “arbitrary power.”  Boyd v. United States, 116 U. S. 616, 630 (1886). Second, and relatedly, that a central aim of the Framers was “to place obstacles in the way of a too permeating police surveillance.”  United States v. Di Re, 332 U. S. 581, 595 (1948).

 We have kept this attention to Founding-era understandings in mind when applying the Fourth Amendment to innovations in surveillance tools. As technology has enhanced the Government’s capacity to encroach upon areas normally guarded from inquisitive eyes, this Court has sought to “assure[ ] preservation of that degree of  privacy against government that existed when the Fourth Amendment was adopted.” Kyllo v. United States, 533 U. S. 27, 34 (2001).  For that reason, we rejected in Kyllo a “mechanical interpretation” of the Fourth Amendment and held that use of a thermal imager to detect heat radiating from the side of the defendant’s home was a search.  Id., at 35. Because any other conclusion would leave homeowners “at the mercy of advancing technology,” we determined that the Government—absent a warrant—could not capitalize on such new sense-enhancing technology to explore

——————

exclusively property-based approach.  Post, at 1–2, 17–21 (THOMAS J., dissenting); post, at 6–9 (GORSUCH, J., dissenting).  Katz of course “discredited” the “premise that property interests control,” 389 U. S., at 353, and we have repeatedly emphasized that privacy interests do not rise or fall with property rights, see, e.g., United States v. Jones, 565 U. S. 400, 411 (2012) (refusing to “make trespass the exclusive test”); Kyllo v. United States, 533 U. S. 27, 32 (2001) (“We have since decoupled violation of a person’s Fourth Amendment rights from trespassory violation of his property.”).  Neither party has asked the Court to reconsider Katz in this case.

what was happening within the home.  Ibid.

 Likewise in Riley, the Court recognized the “immense storage capacity” of modern cell phones in holding that police officers must generally obtain a warrant before searching the contents of a phone. 573 U. S., at ___ (slip op., at 17). We explained that while the general rule allowing warrantless searches incident to arrest “strikes the appropriate balance in the context of physical objects, neither of its rationales has much force with respect to” the vast store of sensitive information on a cell phone. Id., at ___ (slip op., at 9).

B

 The case before us involves the Government’s acquisition of wireless carrier cell-site records revealing the location of Carpenter’s cell phone whenever it made or received calls.  This sort of digital data—personal location information maintained by a third party—does not fit neatly under existing precedents.  Instead, requests for cell-site records lie at the intersection of two lines of cases, both of which inform our understanding of the privacy interests at stake.

 The first set of cases addresses a person’s expectation of privacy in his physical location and movements. In United States v. Knotts, 460 U. S. 276 (1983), we considered the Government’s use of a “beeper” to aid in tracking a vehicle through traffic.  Police officers in that case planted a beeper in a container of chloroform before it was purchased by one of Knotts’s co-conspirators.  The officers (with intermittent aerial assistance) then followed the automobile carrying the container from Minneapolis to Knotts’s cabin in Wisconsin, relying on the beeper’s signal to help keep the vehicle in view.  The Court concluded that the “augment[ed]” visual surveillance did not constitute a search because “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.”  Id., at 281, 282.  Since the movements of the vehicle and its final destination had been “voluntarily conveyed to anyone who wanted to look,” Knotts could not assert a privacy interest in the information obtained. Id., at 281.  This Court in Knotts, however, was careful to distinguish between the rudimentary tracking facilitated by the beeper and more sweeping modes of surveillance. The Court emphasized the “limited use which the government made of the signals from this particular beeper” during a discrete “automotive journey.” Id., at 284, 285.  Significantly, the Court reserved the question whether “different constitutional principles may be applicable” if “twenty-four hour surveillance of any citizen of this country [were] possible.” Id., at 283–284.

 Three decades later, the Court considered more sophisticated surveillance of the sort envisioned in Knotts and found that different principles did indeed apply.  In United States v. Jones, FBI agents installed a GPS tracking device on Jones’s vehicle and remotely monitored the vehicle’s movements for 28 days.  The Court decided the case based on the Government’s physical trespass of the vehicle. 565 U. S., at 404–405.  At the same time, five Justices agreed that related privacy concerns would be raised by, for example, “surreptitiously activating a stolen vehicle detection system” in Jones’s car to track Jones himself, or conducting GPS tracking of his cell phone.  Id., at 426, 428 (ALITO, J., concurring in judgment); id., at 415 (SOTOMAYOR, J., concurring).  Since GPS monitoring of a vehicle tracks “every movement” a person makes in that vehicle, the concurring Justices concluded that “longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy”—regardless whether those movements were disclosed to the public at large.  Id., at 430 (opinion of ALITO, J.); id., at 415 (opinion of SOTOMAYOR, J.).[2]  

 In a second set of decisions, the Court has drawn a line between what a person keeps to himself and what he shares with others. We have previously held that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.”  Smith, 442 U. S., at 743–744.  That remains true “even if the information is revealed on the assumption that it will be used only for a limited purpose.” United States v. Miller, 425 U. S. 435, 443 (1976). As a result, the Government is typically free to obtain such information from the recipient without triggering Fourth Amendment protections.  This third-party doctrine largely traces its roots to Miller.  While investigating Miller for tax evasion, the Government subpoenaed his banks, seeking several months of canceled checks, deposit slips, and monthly statements. The Court rejected a Fourth Amendment challenge to the records collection. For one, Miller could “assert neither ownership nor possession” of the documents; they were “business records of the banks.” Id., at 440. For another, the nature of those records confirmed Miller’s limited expectation of privacy, because the checks were “not confidential communications but negotiable instruments to be used in commercial transactions,” and the bank statements contained information “exposed to

——————

[bank] employees in the ordinary course of business.”  Id., at 442. The Court thus concluded that Miller had “take[n] the risk, in revealing his affairs to another, that the information [would] be conveyed by that person to the Government.” Id., at 443.

 Three years later, Smith applied the same principles in the context of information conveyed to a telephone com- pany. The Court ruled that the Government’s use of a pen register—a device that recorded the outgoing phone numbers dialed on a landline telephone—was not a search.  Noting the pen register’s “limited capabilities,” the Court “doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial.”  442 U. S., at 742. Telephone subscribers know, after all, that the numbers are used by the telephone company “for a variety of legitimate business purposes,” including routing calls. Id., at 743. And at any rate, the Court explained, such an expectation “is not one that society is prepared to recognize as reasonable.” Ibid. (internal quotation marks omitted). When Smith placed a call, he “voluntarily conveyed” the dialed numbers to the phone company by “expos[ing] that information to its equipment in the ordinary course of business.” Id., at 744 (internal quotation marks omitted). Once again, we held that the defendant “assumed the risk” that the company’s records “would be divulged to police.” Id., at 745.

III

 The question we confront today is how to apply the Fourth Amendment to a new phenomenon: the ability to chronicle a person’s past movements through the record of his cell phone signals.  Such tracking partakes of many of the qualities of the GPS monitoring we considered in Jones. Much like GPS tracking of a vehicle, cell phone location information is detailed, encyclopedic, and effortlessly compiled.

 At the same time, the fact that the individual continuously reveals his location to his wireless carrier implicates the third-party principle of Smith and Miller. But while the third-party doctrine applies to telephone numbers and bank records, it is not clear whether its logic extends to the qualitatively different category of cell-site records.  After all, when Smith was decided in 1979, few could have imagined a society in which a phone goes wherever its owner goes, conveying to the wireless carrier not just dialed digits, but a detailed and comprehensive record of the person’s movements.

 We decline to extend Smith and Miller to cover these novel circumstances.  Given the unique nature of cell phone location records, the fact that the information is held by a third party does not by itself overcome the user’s claim to Fourth Amendment protection.  Whether the Government employs its own surveillance technology as in Jones or leverages the technology of a wireless carrier, we hold that an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI.  The location information obtained from Carpenter’s wireless carriers was the product of a search.[3]  

——————

A

 A person does not surrender all Fourth Amendment protection by venturing into the public sphere.  To the contrary, “what [one] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Katz, 389 U. S., at 351–352.  A majority of this Court has already recognized that individuals have a reasonable expectation of privacy in the whole of their physical movements. Jones, 565 U. S., at 430 (ALITO, J., concurring in judgment); id., at 415 (SOTOMAYOR, J., concurring).  Prior to the digital age, law enforcement might have pursued a suspect for a brief stretch, but doing so “for any extended period of time was difficult and costly and therefore rarely undertaken.”  Id., at 429 (opinion of ALITO, J.). For that reason, “society’s expectation has been that law enforcement agents and others would not— and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual’s car for a very long period.”  Id., at 430.

 Allowing government access to cell-site records contravenes that expectation.  Although such records are generated for commercial purposes, that distinction does not negate Carpenter’s anticipation of privacy in his physical location. Mapping a cell phone’s location over the course of 127 days provides an all-encompassing record of the holder’s whereabouts.  As with GPS information, the timestamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his “familial, political, professional, religious, and sexual associations.”  Id., at 415 (opinion of SOTOMAYOR, J.). These location records “hold for many Americans the ‘privacies of life.’”   Riley, 573 U. S., at ___ (slip op., at 28) (quoting Boyd, 116 U. S., at 630).  And like GPS monitoring, cell phone tracking is remarkably easy, cheap, and efficient compared to traditional investigative tools. With just the click of a button, the Government can access each carrier’s deep repository of historical location information at practically no expense.

 In fact, historical cell-site records present even greater privacy concerns than the GPS monitoring of a vehicle we considered in Jones. Unlike the bugged container in Knotts or the car in Jones, a cell phone—almost a “feature of human anatomy,” Riley, 573 U. S., at ___ (slip op., at 9)—tracks nearly exactly the movements of its owner.  While individuals regularly leave their vehicles, they compulsively carry cell phones with them all the time.  A cell phone faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales. See id., at ___ (slip op., at 19) (noting that “nearly three-quarters of smart phone users report being within five feet of their phones most of the time, with 12% admitting that they even use their phones in the shower”); contrast Cardwell v. Lewis, 417 U. S. 583, 590 (1974) (plurality opinion) (“A car has little capacity for escaping public scrutiny.”).  Accordingly, when the Government tracks the location of a cell phone it achieves near perfect surveillance, as if it had attached an ankle monitor to the phone’s user.

 Moreover, the retrospective quality of the data here gives police access to a category of information otherwise unknowable.  In the past, attempts to reconstruct a person’s movements were limited by a dearth of records and the frailties of recollection. With access to CSLI, the Government can now travel back in time to retrace a person’s whereabouts, subject only to the retention polices of the wireless carriers, which currently maintain records for up to five years.  Critically, because location information is continually logged for all of the 400 million devices in the United States—not just those belonging to persons who might happen to come under investigation— this newfound tracking capacity runs against everyone.  

Unlike with the GPS device in Jones, police need not even know in advance whether they want to follow a particular individual, or when.

 Whoever the suspect turns out to be, he has effectively been tailed every moment of every day for five years, and the police may—in the Government’s view—call upon the results of that surveillance without regard to the constraints of the Fourth Amendment.  Only the few with- out cell phones could escape this tireless and absolute surveillance.  

 The Government and JUSTICE KENNEDY contend, however, that the collection of CSLI should be permitted because the data is less precise than GPS information. Not to worry, they maintain, because the location records did “not on their own suffice to place [Carpenter] at the crime scene”; they placed him within a wedge-shaped sector ranging from one-eighth to four square miles. Brief for United States 24; see post, at 18–19.  Yet the Court has already rejected the proposition that “inference insulates a search.” Kyllo, 533 U. S., at 36.  From the 127 days of location data it received, the Government could, in combination with other information, deduce a detailed log of Carpenter’s movements, including when he was at the site of the robberies. And the Government thought the CSLI accurate enough to highlight it during the closing argument of his trial.  App. 131.

 At any rate, the rule the Court adopts “must take account of more sophisticated systems that are already in use or in development.”  Kyllo, 533 U. S., at 36.  While the records in this case reflect the state of technology at the start of the decade, the accuracy of CSLI is rapidly approaching GPS-level precision.  As the number of cell sites has proliferated, the geographic area covered by each cell sector has shrunk, particularly in urban areas.  In addition, with new technology measuring the time and angle of signals hitting their towers, wireless carriers already have the capability to pinpoint a phone’s location within 50 meters. Brief for Electronic Frontier Foundation et al. as Amici Curiae 12 (describing triangulation methods that estimate a device’s location inside a given cell sector).

 Accordingly, when the Government accessed CSLI from the wireless carriers, it invaded Carpenter’s reason- able expectation of privacy in the whole of his physical movements.

B

 The Government’s primary contention to the contrary is that the third-party doctrine governs this case.  In its view, cell-site records are fair game because they are “business records” created and maintained by the wireless carriers.  The Government (along with JUSTICE KENNEDY) recognizes that this case features new technology, but asserts that the legal question nonetheless turns on a garden-variety request for information from a third-party witness. Brief for United States 32–34; post, at 12–14.  The Government’s position fails to contend with the seismic shifts in digital technology that made possible the tracking of not only Carpenter’s location but also everyone else’s, not for a short period but for years and years.  Sprint Corporation and its competitors are not your typical witnesses. Unlike the nosy neighbor who keeps an eye on comings and goings, they are ever alert, and their memory is nearly infallible.  There is a world of difference between the limited types of personal information addressed in Smith and Miller and the exhaustive chronicle of location information casually collected by wireless carriers today.  The Government thus is not asking for a straightforward application of the third-party doctrine, but instead a significant extension of it to a distinct category of information.

 The third-party doctrine partly stems from the notion that an individual has a reduced expectation of privacy in information knowingly shared with another.  But the fact of “diminished privacy interests does not mean that the Fourth Amendment falls out of the picture entirely.”  Riley, 573 U. S., at ___ (slip op., at 16).  Smith and Miller, after all, did not rely solely on the act of sharing. Instead, they considered “the nature of the particular documents sought” to determine whether “there is a legitimate ‘expectation of privacy’ concerning their contents.”  Miller, 425 U. S., at 442. Smith pointed out the limited capabilities of a pen register; as explained in Riley, telephone call logs reveal little in the way of “identifying information.”  Smith, 442 U. S., at 742; Riley, 573 U. S., at ___ (slip op., at 24). Miller likewise noted that checks were “not confidential communications but negotiable instruments to be used in commercial transactions.” 425 U. S., at 442. In mechanically applying the third-party doctrine to this case, the Government fails to appreciate that there are no comparable limitations on the revealing nature of CSLI.    The Court has in fact already shown special solicitude for location information in the third-party context. In Knotts, the Court relied on Smith to hold that an individual has no reasonable expectation of privacy in public movements that he “voluntarily conveyed to anyone who wanted to look.”  Knotts, 460 U. S., at 281; see id., at 283 (discussing Smith). But when confronted with more pervasive tracking, five Justices agreed that longer term GPS monitoring of even a vehicle traveling on public streets constitutes a search. Jones, 565 U. S., at 430 (ALITO, J., concurring in judgment); id., at 415 (SOTOMAYOR, J., concurring). JUSTICE GORSUCH  wonders why “someone’s location when using a phone” is sensitive, post, at 3, and JUSTICE KENNEDY assumes that a person’s discrete movements “are not particularly private,” post, at 17. Yet this case is not about “using a phone” or a person’s movement at a particular time.  It is about a detailed chronicle of a person’s physical presence compiled every day, every moment, over several years.  Such a chronicle implicates privacy concerns far beyond those considered in Smith and Miller.

 Neither does the second rationale underlying the thirdparty doctrine—voluntary exposure—hold up when it comes to CSLI. Cell phone location information is not truly “shared” as one normally understands the term.  In the first place, cell phones and the services they provide are “such a pervasive and insistent part of daily life” that carrying one is indispensable to participation in modern society. Riley, 573 U. S., at ___ (slip op., at 9).  Second, a cell phone logs a cell-site record by dint of its operation, without any affirmative act on the part of the user beyond powering up.  Virtually any activity on the phone generates CSLI, including incoming calls, texts, or e-mails and countless other data connections that a phone automatically makes when checking for news, weather, or social media updates. Apart from disconnecting the phone from the network, there is no way to avoid leaving behind a trail of location data. As a result, in no meaningful sense does the user voluntarily “assume[] the risk” of turning  over a comprehensive dossier of his physical movements.  

Smith, 442 U. S., at 745.

 We therefore decline to extend Smith and Miller to the collection of CSLI.  Given the unique nature of cell phone location information, the fact that the Government obtained the information from a third party does not overcome Carpenter’s claim to Fourth Amendment protection.  The Government’s acquisition of the cell-site records was a search within the meaning of the Fourth Amendment.

*  *  *

 Our decision today is a narrow one. We do not express a view on matters not before us: real-time CSLI or “tower dumps” (a download of information on all the devices that connected to a particular cell site during a particular interval). We do not disturb the application of Smith and Miller or call into question conventional surveillance techniques and tools, such as security cameras.  Nor do we address other business records that might incidentally reveal location information. Further, our opinion does not consider other collection techniques involving foreign affairs or national security.  As Justice Frankfurter noted when considering new innovations in airplanes and radios, the Court must tread carefully in such cases, to ensure that we do not “embarrass the future.”  Northwest Airlines, Inc. v. Minnesota, 322 U. S. 292, 300 (1944).[4]  

IV

 Having found that the acquisition of Carpenter’s CSLI was a search, we also conclude that the Government must generally obtain a warrant supported by probable cause before acquiring such records. Although the “ultimate measure of the constitutionality of a governmental search is ‘reasonableness,’” our cases establish that warrantless  searches are typically unreasonable where “a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing.” Vernonia School Dist. 47J v. Acton, 515 U. S. 646, 652–653 (1995).  Thus, “[i]n the absence of a warrant, a search is reasonable only if it falls within a specific exception to the warrant requirement.”  Riley, 573 U. S., at ___ (slip op., at 5).

 The Government acquired the cell-site records pursuant to a court order issued under the Stored Communications Act, which required the Government to show “reasonable grounds” for believing that the records were “relevant and

material to an ongoing investigation.”  18 U. S. C. §2703(d). That showing falls well short of the probable cause required for a warrant. The Court usually requires “some quantum of individualized suspicion” before a search or seizure may take place.  United States v. Martinez-Fuerte, 428 U. S. 543, 560–561 (1976).  Under the standard in the Stored Communications Act, however, law enforcement need only show that the cell-site evidence might be pertinent to an ongoing investigation—a “gigantic” departure from the probable cause rule, as the Government explained below. App. 34.  Consequently, an order issued under Section 2703(d) of the Act is not a permissible mechanism for accessing historical cell-site records. Before compelling a wireless carrier to turn over a subscriber’s CSLI, the Government’s obligation is a familiar one—get a warrant.

JUSTICE ALITO contends that the warrant requirement simply does not apply when the Government acquires records using compulsory process.  Unlike an actual search, he says, subpoenas for documents do not involve the direct taking of evidence; they are at most a “constructive search” conducted by the target of the subpoena.  Post, at 12. Given this lesser intrusion on personal privacy, JUSTICE ALITO argues that the compulsory production of records is not held to the same probable cause standard.  In his view, this Court’s precedents set forth a categorical rule—separate and distinct from the third-party doctrine—subjecting subpoenas to lenient scrutiny without regard to the suspect’s expectation of privacy in the records. Post, at 8–19.

 But this Court has never held that the Government may subpoena third parties for records in which the suspect has a reasonable expectation of privacy.  Almost all of the examples JUSTICE ALITO cites, see post, at 14–15, contemplated requests for evidence implicating diminished pri- vacy interests or for a corporation’s own books.[5]  The lone  exception, of course, is Miller, where the Court’s analysis of the third-party subpoena merged with the application of the third-party doctrine.  425 U. S., at 444 (concluding that Miller lacked the necessary privacy interest to contest the issuance of a subpoena to his bank).  

JUSTICE ALITO overlooks the critical issue. At some  point, the dissent should recognize that CSLI is an entirely different species of business record—something that implicates basic Fourth Amendment concerns about arbitrary government power much more directly than corporate tax or payroll ledgers.  When confronting new concerns wrought by digital technology, this Court has been careful not to uncritically extend existing precedents.  See Riley, 573 U. S., at ___ (slip op., at 10) (“A search of the information on a cell phone bears little resemblance to the type of brief physical search considered [in prior precedents].”).

 If the choice to proceed by subpoena provided a categorical limitation on Fourth Amendment protection, no type of record would ever be protected by the warrant requirement. Under JUSTICE ALITO’s view, private letters, digital contents of a cell phone—any personal information reduced to document form, in fact—may be collected by

——————

subpoena for no reason other than “official curiosity.” United States v. Morton Salt Co., 338 U. S. 632, 652

(1950). JUSTICE KENNEDY declines to adopt the radical implications of this theory, leaving open the question whether the warrant requirement applies “when the Government obtains the modern-day equivalents of an individual’s own ‘papers’ or ‘effects,’ even when those papers or effects are held by a third party.”  Post, at 13 (citing United States v. Warshak, 631 F. 3d 266, 283–288 (CA6 2010)). That would be a sensible exception, because it would prevent the subpoena doctrine from overcoming any reasonable expectation of privacy.  If the third-party doctrine does not apply to the “modern-day equivalents of an individual’s own ‘papers’ or ‘effects,’” then the clear impli- cation is that the documents should receive full Fourth Amendment protection. We simply think that such protection should extend as well to a detailed log of a person’s movements over several years.

 This is certainly not to say that all orders compelling the production of documents will require a showing of probable cause. The Government will be able to use subpoenas       to acquire records in the overwhelming majority of investigations. We hold only that a warrant is required in the rare case where the suspect has a legitimate privacy interest in records held by a third party.

 Further, even though the Government will generally need a warrant to access CSLI, case-specific exceptions may support a warrantless search of an individual’s cellsite records under certain circumstances.  “One wellrecognized exception applies when ‘“the exigencies of the  situation” make the needs of law enforcement so compelling that [a] warrantless search is objectively reasonable under the Fourth Amendment.’”   Kentucky v. King, 563 U. S. 452, 460 (2011) (quoting Mincey v. Arizona, 437 U. S. 385, 394 (1978)). Such exigencies include the need to pursue a fleeing suspect, protect individuals who are threatened with imminent harm, or prevent the imminent destruction of evidence. 563 U. S., at 460, and n. 3.

 As a result, if law enforcement is confronted with an urgent situation, such fact-specific threats will likely justify the warrantless collection of CSLI.  Lower courts, for instance, have approved warrantless searches related to bomb threats, active shootings, and child abductions.  Our decision today does not call into doubt warrantless access to CSLI in such circumstances.  While police must get a warrant when collecting CSLI to assist in the minerun criminal investigation, the rule we set forth does not limit their ability to respond to an ongoing emergency.

*  *  *

 As Justice Brandeis explained in his famous dissent, the Court is obligated—as “[s]ubtler and more far-reaching means of invading privacy have become available to the Government”—to ensure that the “progress of science” does not erode Fourth Amendment protections.  Olmstead v. United States, 277 U. S. 438, 473–474 (1928).  Here the progress of science has afforded law enforcement a powerful new tool to carry out its important responsibilities. At  the same time, this tool risks Government encroachment of the sort the Framers, “after consulting the lessons of history,” drafted the Fourth Amendment to prevent.  Di Re, 332 U. S., at 595.

 We decline to grant the state unrestricted access to a wireless carrier’s database of physical location information. In light of the deeply revealing nature of CSLI, its depth, breadth, and comprehensive reach, and the inescapable and automatic nature of its collection, the fact that such information is gathered by a third party does not make it any less deserving of Fourth Amendment protection. The Government’s acquisition of the cell-site records here was a search under that Amendment.

 The judgment of the Court of Appeals is reversed, and the case is remanded for further proceedings consistent with this opinion.

It is so ordered.

 

SUPREME COURT OF THE UNITED STATES

_________________

No. 16–402

_________________

TIMOTHY IVORY CARPENTER, PETITIONER v.   UNITED STATES   

ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF  APPEALS FOR THE SIXTH CIRCUIT   

[June 22, 2018]  

JUSTICE KENNEDY, with whom JUSTICE THOMAS and

JUSTICE ALITO join, dissenting.

 This case involves new technology, but the Court’s stark departure from relevant Fourth Amendment precedents and principles is, in my submission, unnecessary and incorrect, requiring this respectful dissent.

 The new rule the Court seems to formulate puts needed, reasonable, accepted, lawful, and congressionally authorized criminal investigations at serious risk in serious cases, often when law enforcement seeks to prevent the threat of violent crimes.  And it places undue restrictions on the lawful and necessary enforcement powers exercised not only by the Federal Government, but also by law enforcement in every State and locality throughout the Nation. Adherence to this Court’s longstanding precedents and analytic framework would have been the proper and prudent way to resolve this case.

 The Court has twice held that individuals have no Fourth Amendment interests in business records which are possessed, owned, and controlled by a third party.  United States v. Miller, 425 U. S. 435 (1976); Smith v. Maryland, 442 U. S. 735 (1979).  This is true even when the records contain personal and sensitive information.  So when the Government uses a subpoena to obtain, for example, bank records, telephone records, and credit card statements from the businesses that create and keep these records, the Government does not engage in a search of the business’s customers within the meaning of the Fourth Amendment.

 In this case petitioner challenges the Government’s right to use compulsory process to obtain a now-common kind of business record: cell-site records held by cell phone service providers.  The Government acquired the records through an investigative process enacted by Congress. Upon approval by a neutral magistrate, and based on the Government’s duty to show reasonable necessity, it authorizes the disclosure of records and information that are under the control and ownership of the cell phone service provider, not its customer. Petitioner acknowledges that the Government may obtain a wide variety of business records using compulsory process, and he does not ask the Court to revisit its precedents.  Yet he argues that, under those same precedents, the Government searched his records when it used court-approved compulsory process to obtain the cell-site information at issue here.  Cell-site records, however, are no different from the many other kinds of business records the Government has a lawful right to obtain by compulsory process. Customers like petitioner do not own, possess, control, or use the records, and for that reason have no reasonable expectation that they cannot be disclosed pursuant to lawful compulsory process.

 The Court today disagrees.  It holds for the first time that by using compulsory process to obtain records of a business entity, the Government has not just engaged in an impermissible action, but has conducted a search of the business’s customer.  The Court further concludes that the search in this case was unreasonable and the Government needed to get a warrant to obtain more than six days of cell-site records.

 In concluding that the Government engaged in a search, the Court unhinges Fourth Amendment doctrine from the property-based concepts that have long grounded the analytic framework that pertains in these cases.  In doing so it draws an unprincipled and unworkable line between cell-site records on the one hand and financial and telephonic records on the other. According to today’s majority opinion, the Government can acquire a record of every credit card purchase and phone call a person makes over months or years without upsetting a legitimate expectation of privacy.  But, in the Court’s view, the Government crosses a constitutional line when it obtains a court’s approval to issue a subpoena for more than six days of cell-site records in order to determine whether a person was within several hundred city blocks of a crime scene.  That distinction is illogical and will frustrate principled application of the Fourth Amendment in many routine yet vital law enforcement operations.

 It is true that the Cyber Age has vast potential both to expand and restrict individual freedoms in dimensions not contemplated in earlier times.  See Packingham v. North Carolina, 582 U. S. ___, ___–___ (2017) (slip op., at 46).  For the reasons that follow, however, there is simply no basis here for concluding that the Government interfered with information that the cell phone customer, either from a legal or commonsense standpoint, should have thought the law would deem owned or controlled by him.

I

 Before evaluating the question presented it is helpful to understand the nature of cell-site records, how they are commonly used by cell phone service providers, and their proper use by law enforcement.

 When a cell phone user makes a call, sends a text message or e-mail, or gains access to the Internet, the cell phone establishes a radio connection to an antenna at a nearby cell site. The typical cell site covers a more-or-less circular geographic area around the site.  It has three (or sometimes six) separate antennas pointing in different directions. Each provides cell service for a different 120degree (or 60-degree) sector of the cell site’s circular coverage area. So a cell phone activated on the north side of a cell site will connect to a different antenna than a cell phone on the south side.

 Cell phone service providers create records each time a cell phone connects to an antenna at a cell site.  For a

phone call, for example, the provider records the date, time, and duration of the call; the phone numbers making and receiving the call; and, most relevant here, the cell site used to make the call, as well as the specific antenna that made the connection. The cell-site and antenna data points, together with the date and time of connection, are known as cell-site location information, or cell-site records.  By linking an individual’s cell phone to a particular 120- or 60-degree sector of a cell site’s coverage area at a particular time, cell-site records reveal the general location of the cell phone user.

 The location information revealed by cell-site records is imprecise, because an individual cell-site sector usually covers a large geographic area.  The FBI agent who offered expert testimony about the cell-site records at issue here testified that a cell site in a city reaches between a half mile and two miles in all directions. That means a 60degree sector covers between approximately one-eighth and two square miles (and a 120-degree sector twice that area). To put that in perspective, in urban areas cell-site records often would reveal the location of a cell phone user within an area covering between around a dozen and several hundred city blocks.  In rural areas cell-site records can be up to 40 times more imprecise.  By contrast, a Global Positioning System (GPS) can reveal an individ- ual’s location within around 15 feet.

 Major cell phone service providers keep cell-site records for long periods of time. There is no law requiring them to do so. Instead, providers contract with their customers to collect and keep these records because they are valuable to the providers. Among other things, providers aggregate the records and sell them to third parties along with other information gleaned from cell phone usage.  This data can be used, for example, to help a department store determine which of various prospective store locations is likely to get more foot traffic from middle-aged women who live in affluent zip codes. The market for cell phone data is now estimated to be in the billions of dollars. See Brief for  Technology Experts as Amici Curiae 23.

 Cell-site records also can serve an important investigative function, as the facts of this case demonstrate.  Petitioner, Timothy Carpenter, along with a rotating group of accomplices, robbed at least six RadioShack and T-Mobile stores at gunpoint over a 2-year period. Five of those robberies occurred in the Detroit area, each crime at least four miles from the last. The sixth took place in Warren, Ohio, over 200 miles from Detroit.

 The Government, of course, did not know all of these details in 2011 when it began investigating Carpenter.  In April of that year police arrested four of Carpenter’s coconspirators.  One of them confessed to committing nine robberies in Michigan and Ohio between December 2010 and March 2011.  He identified 15 accomplices who had participated in at least one of those robberies; named Carpenter as one of the accomplices; and provided Carpenter’s cell phone number to the authorities.  The suspect also warned that the other members of the conspiracy planned to commit more armed robberies in the immediate future.

 The Government at this point faced a daunting task.  Even if it could identify and apprehend the suspects, still it had to link each suspect in this changing criminal gang to specific robberies in order to bring charges and convict.  

And, of course, it was urgent that the Government take all necessary steps to stop the ongoing and dangerous crime spree.

 Cell-site records were uniquely suited to this task.  The geographic dispersion of the robberies meant that, if Carpenter’s cell phone were within even a dozen to several hundred city blocks of one or more of the stores when the different robberies occurred, there would be powerful circumstantial evidence of his participation; and this would be especially so if his cell phone usually was not located in the sectors near the stores except during the robbery times.

 To obtain these records, the Government applied to federal magistrate judges for disclosure orders pursuant to §2703(d) of the Stored Communications Act.  That Act authorizes a magistrate judge to issue an order requiring disclosure of cell-site records if the Government demonstrates “specific and articulable facts showing that there are reasonable grounds to believe” the records “are relevant and material to an ongoing criminal investigation.”  18 U. S. C. §§2703(d), 2711(3).  The full statutory provision is set out in the Appendix, infra.

 From Carpenter’s primary service provider, MetroPCS, the Government obtained records from between December 2010 and April 2011, based on its understanding that nine robberies had occurred in that timeframe.  The Government also requested seven days of cell-site records from Sprint, spanning the time around the robbery in Warren, Ohio. It obtained two days of records.

 These records confirmed that Carpenter’s cell phone was in the general vicinity of four of the nine robberies, including the one in Ohio, at the times those robberies occurred.

II

 The first Clause of the Fourth Amendment provides that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.”  The customary beginning point in any Fourth Amendment search case is whether the Government’s actions constitute a “search” of the defendant’s person, house, papers, or effects, within the meaning of the constitutional provision.  If so, the next question is whether that search was reasonable.

 Here the only question necessary to decide is whether the Government searched anything of Carpenter’s when it used compulsory process to obtain cell-site records from Carpenter’s cell phone service providers.  This Court’s decisions in Miller and Smith dictate that the answer is no, as every Court of Appeals to have considered the question has recognized. See United States v. Thompson, 866 F. 3d 1149 (CA10 2017); United States v. Graham, 824 F. 3d 421 (CA4 2016) (en banc); Carpenter v. United States, 819 F. 3d 880 (CA6 2016); United States v. Davis, 785 F. 3d 498 (CA11 2015) (en banc); In re Application  of U. S. for Historical Cell Site Data, 724 F. 3d 600  (CA5 2013).

A

Miller and Smith hold that individuals lack any protected Fourth Amendment interests in records that are possessed, owned, and controlled only by a third party.  In Miller federal law enforcement officers obtained four months of the defendant’s banking records.  425 U. S., at 437438. And in Smith state police obtained records of the phone numbers dialed from the defendant’s home phone. 442 U. S., at 737.  The Court held in both cases that the officers did not search anything belonging to the defendants within the meaning of the Fourth Amendment.  The defendants could “assert neither ownership nor possession” of the records because the records were created, owned, and controlled by the companies.  Miller, supra, at 440; see Smith, supra, at 741. And the defendants had no reasonable expectation of privacy in information they “voluntarily conveyed to the [companies] and exposed to their employees in the ordinary course of business.”  Miller, supra, at 442; see Smith, 442 U. S., at 744.  Rather, the defendants “assumed the risk that the information would be divulged to police.” Id., at 745.

Miller and Smith have been criticized as being based on too narrow a view of reasonable expectations of privacy.  See, e.g., Ashdown, The Fourth Amendment and the “Legitimate Expectation of Privacy,” 34 Vand. L. Rev. 1289, 13131316 (1981). Those criticisms, however, are unwarranted. The principle established in Miller and Smith is correct for two reasons, the first relating to a defendant’s attenuated interest in property owned by another, and the second relating to the safeguards inherent in the use of compulsory process.

First, Miller and Smith placed necessary limits on the ability of individuals to assert Fourth Amendment interests in property to which they lack a “requisite connection.” Minnesota v. Carter, 525 U. S. 83, 99 (1998) (KENNEDY,  J., concurring).  Fourth Amendment rights, after all, are personal.  The Amendment protects “[t]he right of the people to be secure in their . . . persons, houses, papers, and effects”—not the persons, houses, papers, and effects of others. (Emphasis added.)

 The concept of reasonable expectations of privacy, first announced in Katz v. United States, 389 U. S. 347 (1967), sought to look beyond the “arcane distinctions developed in property and tort law” in evaluating whether a person has a sufficient connection to the thing or place searched to assert Fourth Amendment interests in it.  Rakas v. Illinois, 439 U. S. 128, 143 (1978).  Yet “property concepts” are, nonetheless, fundamental “in determining the presence or absence of the privacy interests protected by that Amendment.” Id., at 143144, n. 12.  This is so for at least two reasons. First, as a matter of settled expectations from the law of property, individuals often have greater expectations of privacy in things and places that belong to them, not to others. And second, the Fourth Amendment’s protections must remain tethered to the text of that

Amendment, which, again, protects only a person’s own “persons, houses, papers, and effects.”

Katz did not abandon reliance on property-based concepts.  The Court in Katz analogized the phone booth used in that case to a friend’s apartment, a taxicab, and a hotel room. 389 U. S., at 352, 359.  So when the defendant “shu[t] the door behind him” and “pa[id] the toll,” id., at 352, he had a temporary interest in the space and a legitimate expectation that others would not intrude, much like the interest a hotel guest has in a hotel room, Stoner v. California, 376 U. S. 483 (1964), or an overnight guest has in a host’s home, Minnesota v. Olson, 495 U. S. 91 (1990). The Government intruded on that space when it attached a listening device to the phone booth.  Katz, 389 U. S., at 348. (And even so, the Court made it clear that the Government’s search could have been reasonable had there been judicial approval on a case-specific basis, which, of course, did occur here. Id., at 357359.)

Miller and Smith set forth an important and necessary limitation on the Katz framework.  They rest upon the commonsense principle that the absence of property law analogues can be dispositive of privacy expectations.  The defendants in those cases could expect that the third-party businesses could use the records the companies collected, stored, and classified as their own for any number of business and commercial purposes.  The businesses were not bailees or custodians of the records, with a duty to hold the records for the defendants’ use.  The defendants could make no argument that the records were their own papers or effects. See Miller, supra, at 440 (“the documents subpoenaed here are not respondent’s ‘private papers’”);  Smith, supra, at 741 (“petitioner obviously cannot claim that his ‘property’ was invaded”).  The records were the business entities’ records, plain and simple.  The defendants had no reason to believe the records were owned or controlled by them and so could not assert a reasonable expectation of privacy in the records.  The second principle supporting Miller and Smith is the longstanding rule that the Government may use compulsory process to compel persons to disclose documents and other evidence within their possession and control.  See United States v. Nixon, 418 U. S. 683, 709 (1974) (it is an “ancient proposition of law” that “the public has a right to every man’s evidence” (internal quotation marks and alterations omitted)). A subpoena is different from a warrant in its force and intrusive power.  While a warrant allows the Government to enter and seize and make the examination itself, a subpoena simply requires the person to whom it is directed to make the disclosure.  A subpoena, moreover, provides the recipient the “opportunity to present objections” before complying, which further mitigates the intrusion. Oklahoma Press Publishing Co. v. Walling, 327 U. S. 186, 195 (1946).

 For those reasons this Court has held that a subpoena for records, although a “constructive” search subject to Fourth Amendment constraints, need not comply with the procedures applicable to warrants—even when challenged by the person to whom the records belong.  Id., at 202, 208. Rather, a subpoena complies with the Fourth Amendment’s reasonableness requirement so long as it is “‘sufficiently limited in scope, relevant in purpose, and  specific in directive so that compliance will not be unreasonably burdensome.’”   Donovan v. Lone Steer, Inc., 464 U. S. 408, 415 (1984).  Persons with no meaningful interests in the records sought by a subpoena, like the defendants in Miller and Smith, have no rights to object to the records’ disclosure—much less to assert that the Government must obtain a warrant to compel disclosure of the records. See Miller, 425 U. S., at 444446; SEC v. Jerry T.

O’Brien, Inc., 467 U. S. 735, 742743 (1984).  Based on Miller and Smith and the principles underlying those cases, it is well established that subpoenas may be used to obtain a wide variety of records held by businesses, even when the records contain private information.  See 2 W. LaFave, Search and Seizure §4.13 (5th ed. 2012).  Credit cards are a prime example.  State and federal law enforcement, for instance, often subpoena credit card statements to develop probable cause to prosecute crimes ranging from drug trafficking and distribution to healthcare fraud to tax evasion.  See United States v. Phibbs, 999 F. 2d 1053 (CA6 1993) (drug distribution); McCune v. DOJ, 592 Fed. Appx. 287 (CA5 2014)

(healthcare fraud); United States v. Green, 305 F. 3d 422 (CA6 2002) (drug trafficking and tax evasion); see also 12 U. S. C. §§3402(4), 3407 (allowing the Government to subpoena financial records if “there is reason to believe that the records sought are relevant to a legitimate law enforcement inquiry”).  Subpoenas also may be used to obtain vehicle registration records, hotel records, employment records, and records of utility usage, to name just a few other examples. See 1 LaFave, supra, §2.7(c).  And law enforcement officers are not alone in their reliance on subpoenas to obtain business records for legitimate investigations.  Subpoenas also are used for investigatory purposes by state and federal grand juries, see United States v. Dionisio, 410 U. S. 1 (1973), state and federal administrative agencies, see Oklahoma Press, supra, and state and federal legislative bodies, see McPhaul v. United States, 364 U. S. 372 (1960).

B

 Carpenter does not question these traditional investigative practices. And he does not ask the Court to reconsider Miller and Smith. Carpenter argues only that, under Miller and Smith, the Government may not use compulsory process to acquire cell-site records from cell phone service providers.

 There is no merit in this argument.  Cell-site records, like all the examples just discussed, are created, kept, classified, owned, and controlled by cell phone service providers, which aggregate and sell this information to third parties.  As in Miller, Carpenter can “assert neither ownership nor possession” of the records and has no control over them. 425 U. S., at 440.

 Carpenter argues that he has Fourth Amendment interests in the cell-site records because they are in essence his personal papers by operation of 47 U. S. C. §222. That statute imposes certain restrictions on how providers may use “customer proprietary network information”—a term that encompasses cell-site records.  §§222(c), (h)(1)(A).  The statute in general prohibits providers from disclosing personally identifiable cell-site records to private third parties. §222(c)(1). And it allows customers to request cell-site records from the provider.  §222(c)(2).

 Carpenter’s argument is unpersuasive, however, for  §222 does not grant cell phone customers any meaningful interest in cell-site records. The statute’s confidentiality protections may be overridden by the interests of the providers or the Government.  The providers may disclose the records “to protect the[ir] rights or property” or to “initiate, render, bill, and collect for telecommunications services.” §§222(d)(1), (2). They also may disclose the records “as required by law”—which, of course, is how they were disclosed in this case.  §222(c)(1).  Nor does the statute provide customers any practical control over the records. Customers do not create the records; they have no say in whether or for how long the records are stored; and they cannot require the records to be modified or destroyed. Even their right to request access to the records is limited, for the statute “does not preclude a carrier from being reimbursed by the customers . . . for the costs associated with making such disclosures.”  H. R. Rep. No. 104– 204, pt. 1, p. 90 (1995). So in every legal and practical sense the “network information” regulated by §222 is, under that statute, “proprietary” to the service providers, not Carpenter.  The Court does not argue otherwise.  Because Carpenter lacks a requisite connection to the cell-site records, he also may not claim a reasonable expectation of privacy in them. He could expect that a third party—the cell phone service provider—could use the information it collected, stored, and classified as its own for a variety of business and commercial purposes.  All this is not to say that Miller and Smith are without limits. Miller and Smith may not apply when the Government obtains the modern-day equivalents of an individual’s own “papers” or “effects,” even when those papers or effects are held by a third party. See Ex parte Jackson, 96 U. S. 727, 733 (1878) (letters held by mail carrier); United States v. Warshak, 631 F. 3d 266, 283288 (CA6 2010) (e-mails held by Internet service provider).  As already discussed, however, this case does not involve property or a bailment of that sort.  Here the Government’s acquisition of cell-site records falls within the heartland of Miller and Smith.

 In fact, Carpenter’s Fourth Amendment objection is even weaker than those of the defendants in Miller and Smith. Here the Government did not use a mere sub- poena to obtain the cell-site records.  It acquired the records only after it proved to a Magistrate Judge reasonable grounds to believe that the records were relevant and material to an ongoing criminal investigation.  See 18 U. S. C. §2703(d). So even if §222 gave Carpenter some  attenuated interest in the records, the Government’s conduct here would be reasonable under the standards governing subpoenas.  See Donovan, 464 U. S., at 415.

Under Miller and Smith, then, a search of the sort that requires a warrant simply did not occur when the Government used court-approved compulsory process, based on a finding of reasonable necessity, to compel a cell phone service provider, as owner, to disclose cell-site records.

III

 The Court rejects a straightforward application of Miller and Smith. It concludes instead that applying those cases to cell-site records would work a “significant extension” of the principles underlying them, ante, at 15, and holds that the acquisition of more than six days of cell-site records constitutes a search, ante, at 11, n. 3.

 In my respectful view the majority opinion misreads this Court’s precedents, old and recent, and transforms Miller and Smith into an unprincipled and unworkable doctrine. The Court’s newly conceived constitutional standard will cause confusion; will undermine traditional and important law enforcement practices; and will allow the cell phone to become a protected medium that dangerous persons will use to commit serious crimes.

A

 The Court errs at the outset by attempting to sidestep Miller and Smith. The Court frames this case as following instead from United States v. Knotts, 460 U. S. 276 (1983), and United States v. Jones, 565 U. S. 400 (2012).  Those cases, the Court suggests, establish that “individuals have a reasonable expectation of privacy in the whole of their physical movements.” Ante, at 79, 12.

Knotts held just the opposite: “A person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.” 460 U. S., at 281.  True, the Court in Knotts also suggested that “different constitutional principles may be applicable” to “dragnet-type law enforcement practices.”  Id., at 284.  But by dragnet practices the Court was referring to “‘twenty-four hour surveillance of any citizen of  this country . . . without judicial knowledge or supervision.’”  Id., at 283.

 Those “different constitutional principles” mentioned in Knotts, whatever they may be, do not apply in this case.  Here the Stored Communications Act requires a neutral judicial officer to confirm in each case that the Government has “reasonable grounds to believe” the cell-site records “are relevant and material to an ongoing criminal investigation.” 18 U. S. C. §2703(d).  This judicial check mitigates the Court’s concerns about “‘a too permeating  police surveillance.’”  Ante, at 6 (quoting United States v. Di Re, 332 U. S. 581, 595 (1948)).  Here, even more so  than in Knotts, “reality hardly suggests abuse.”  460 U. S., at 284.

 The Court’s reliance on Jones fares no better. In Jones the Government installed a GPS tracking device on the defendant’s automobile. The Court held the Government searched the automobile because it “physically occupied private property [of the defendant] for the purpose of obtaining information.” 565 U. S., at 404.  So in Jones it was “not necessary to inquire about the target’s expectation of privacy in his vehicle’s movements.”  Grady v. North Carolina, 575 U. S. ___, ___ (2015) (per curiam) (slip op., at 3).

 Despite that clear delineation of the Court’s holding in

Jones, the Court today declares that Jones applied the “‘different constitutional principles’” alluded to in                 Knotts to establish that an individual has an expectation of pri- vacy in the sum of his whereabouts.  Ante, at 8, 12.  For that proposition the majority relies on the two concurring opinions in Jones, one of which stated that “longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.”  565 U. S., at 430 (ALITO, J.,  concurring). But Jones involved direct governmental surveillance of a defendant’s automobile without judicial authorization—specifically, GPS surveillance accurate within 50 to 100 feet.  Id., at 402403. Even assuming that the different constitutional principles mentioned in Knotts would apply in a case like Jones—a proposition the Court was careful not to announce in Jones, supra, at 412413—those principles are inapplicable here. Cases like this one, where the Government uses court-approved compulsory process to obtain records owned and controlled by a third party, are governed by the two majority opinions in Miller and Smith.

B

 The Court continues its analysis by misinterpreting Miller and Smith, and then it reaches the wrong outcome on these facts even under its flawed standard.  The Court appears, in my respectful view, to read Miller and Smith to establish a balancing test.  For each “qualitatively different category” of information, the Court suggests, the privacy interests at stake must be weighed against the fact that the information has been disclosed to a third party.  See ante, at 11, 1517. When the privacy interests are weighty enough to “overcome” the third-party disclosure, the Fourth Amendment’s protections apply. See ante, at 17.

 That is an untenable reading of Miller and Smith. As already discussed, the fact that information was relinquished to a third party was the entire basis for concluding that the defendants in those cases lacked a reasonable expectation of privacy. Miller and Smith do not establish the kind of category-by-category balancing the Court today prescribes.

 But suppose the Court were correct to say that Miller and Smith rest on so imprecise a foundation. Still the Court errs, in my submission, when it concludes that cellsite records implicate greater privacy interests—and thus deserve greater Fourth Amendment protection—than financial records and telephone records.

 Indeed, the opposite is true. A person’s movements are not particularly private.  As the Court recognized in Knotts, when the defendant there “traveled over the public streets he voluntarily conveyed to anyone who wanted to look the fact that he was traveling over particular roads in a particular direction, the fact of whatever stops he made, and the fact of his final destination.”  460 U. S., at 281282. Today expectations of privacy in one’s location are, if anything, even less reasonable than when the Court decided Knotts over 30 years ago. Millions of Americans choose to share their location on a daily basis, whether by using a variety of location-based services on their phones, or by sharing their location with friends and the public at large via social media.

 And cell-site records, as already discussed, disclose a person’s location only in a general area.  The records at issue here, for example, revealed Carpenter’s location within an area covering between around a dozen and several hundred city blocks.  “Areas of this scale might encompass bridal stores and Bass Pro Shops, gay bars and straight ones, a Methodist church and the local mosque.”  819 F. 3d 880, 889 (CA6 2016).  These records could not reveal where Carpenter lives and works, much less his “‘familial, political, professional, religious, and sexual  associations.’”   Ante, at 12 (quoting Jones, supra, at 415 (SOTOMAYOR, J., concurring)).

 By contrast, financial records and telephone records do “‘revea[l] . . . personal affairs, opinions, habits and associ- ations.’”   Miller, 425 U. S., at 451 (Brennan, J., dissenting); see Smith, 442 U. S., at 751 (Marshall, J., dissenting). What persons purchase and to whom they talk might disclose how much money they make; the political and religious organizations to which they donate; whether they have visited a psychiatrist, plastic surgeon, abortion clinic, or AIDS treatment center; whether they go to gay bars or straight ones; and who are their closest friends and family members. The troves of intimate information the Government can and does obtain using financial records and telephone records dwarfs what can be gathered from cellsite records.

 Still, the Court maintains, cell-site records are “unique” because they are “comprehensive” in their reach; allow for retrospective collection; are “easy, cheap, and efficient compared to traditional investigative tools”; and are not exposed to cell phone service providers in a meaningfully voluntary manner.  Ante, at 1113, 17, 22.  But many other kinds of business records can be so described.  Financial records are of vast scope.  Banks and credit card companies keep a comprehensive account of almost every transaction an individual makes on a daily basis.  “With just the click of a button, the Government can access each [company’s] deep repository of historical [financial] information at practically no expense.”  Ante, at 1213. And the decision whether to transact with banks and credit card companies is no more or less voluntary than the decision whether to use a cell phone. Today, just as when Miller was decided, “‘it is impossible to participate in the  economic life of contemporary society without maintaining a bank account.’”  425 U. S., at 451 (Brennan, J., dissent- ing). But this Court, nevertheless, has held that individ- uals do not have a reasonable expectation of privacy in financial records.

 Perhaps recognizing the difficulty of drawing the constitutional line between cell-site records and financial and telephonic records, the Court posits that the accuracy of cell-site records “is rapidly approaching GPS-level precision.” Ante, at 14. That is certainly plausible in the era of cyber technology, yet the privacy interests associated with location information, which is often disclosed to the public at large, still would not outweigh the privacy interests implicated by financial and telephonic records.

 Perhaps more important, those future developments are no basis upon which to resolve this case.  In general, the Court “risks error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear.”  Ontario v. Quon, 560 U. S. 746, 759 (2010).  That judicial caution, prudent in most cases, is imperative in this one.

 Technological changes involving cell phones have complex effects on crime and law enforcement.  Cell phones make crimes easier to coordinate and conceal, while also providing the Government with new investigative tools that may have the potential to upset traditional privacy expectations. See Kerr, An Equilibrium-Adjustment Theory of the Fourth Amendment, 125 Harv. L. Rev 476, 512517 (2011). How those competing effects balance against each other, and how property norms and expectations of privacy form around new technology, often will be difficult to determine during periods of rapid technological change. In those instances, and where the governing legal standard is one of reasonableness, it is wise to defer to legislative judgments like the one embodied in §2703(d) of the Stored Communications Act.  See Jones, 565 U. S., at 430 (ALITO, J., concurring).  In §2703(d) Congress weighed the privacy interests at stake and imposed a judicial check to prevent executive overreach. The Court should be wary of upsetting that legislative balance and erecting constitutional barriers that foreclose further legislative instructions. See Quon, supra, at 759. The last thing the Court should do is incorporate an arbitrary and outside limit—in this case six days’ worth of cell-site records—and use it as the foundation for a new constitutional framework. The  Court’s decision runs roughshod over the mechanism Congress put in place to govern the acquisition of cell-site records and closes off further legislative debate on these issues.

C

 The Court says its decision is a “narrow one.”  Ante, at 17. But its reinterpretation of Miller and Smith will have dramatic consequences for law enforcement, courts, and society as a whole.

 Most immediately, the Court’s holding that the Government must get a warrant to obtain more than six days of cell-site records limits the effectiveness of an important investigative tool for solving serious crimes. As this case demonstrates, cell-site records are uniquely suited to help the Government develop probable cause to apprehend some of the Nation’s most dangerous criminals: serial killers, rapists, arsonists, robbers, and so forth. See also, e.g., Davis, 785 F. 3d, at 500501 (armed robbers); Brief for Alabama et al. as Amici Curiae 2122 (serial killer).  These records often are indispensable at the initial stages of investigations when the Government lacks the evidence necessary to obtain a warrant.  See United States v. Pembrook, 876 F. 3d 812, 816819 (CA6 2017). And the longterm nature of many serious crimes, including serial crimes and terrorism offenses, can necessitate the use of significantly more than six days of cell-site records.  The Court’s arbitrary 6-day cutoff has the perverse effect  of nullifying Congress’ reasonable framework for obtain- ing cell-site records in some of the most serious criminal investigations.

 The Court’s decision also will have ramifications that extend beyond cell-site records to other kinds of information held by third parties, yet the Court fails “to provide clear guidance to law enforcement” and courts on key issues raised by its reinterpretation of Miller and Smith. Riley v. California, 573 U. S. ___, ___ (2014) (slip op.,  at 22).

 First, the Court’s holding is premised on cell-site records being a “distinct category of information” from other business records. Ante, at 15.  But the Court does not explain what makes something a distinct category of information.  Whether credit card records are distinct from bank records; whether payment records from digital wallet applications are distinct from either; whether the electronic bank records available today are distinct from the paper and microfilm records at issue in Miller; or whether cell-phone call records are distinct from the home-phone call records at issue in Smith, are just a few of the difficult questions that require answers under the Court’s novel conception of Miller and Smith.

 Second, the majority opinion gives courts and law enforcement officers no indication how to determine whether any particular category of information falls on the financial-records side or the cell-site-records side of its newly conceived constitutional line.  The Court’s multifactor analysis—considering intimacy, comprehensiveness, expense, retrospectivity, and voluntariness—puts the law on a new and unstable foundation.

 Third, even if a distinct category of information is deemed to be more like cell-site records than financial records, courts and law enforcement officers will have to guess how much of that information can be requested before a warrant is required.  The Court suggests that less than seven days of location information may not require a warrant.  See ante, at 11, n. 3; see also ante, at 1718 (expressing no opinion on “real-time CSLI,” tower dumps, and security-camera footage).  But the Court does not explain why that is so, and nothing in its opinion even alludes to the considerations that should determine whether greater or lesser thresholds should apply to information like IP addresses or website browsing history.  Fourth, by invalidating the Government’s use of courtapproved compulsory process in this case, the Court calls into question the subpoena practices of federal and state grand juries, legislatures, and other investigative bodies, as JUSTICE ALITO’s opinion explains.  See post, at 219 (dissenting opinion). Yet the Court fails even to mention the serious consequences this will have for the proper administration of justice.

 In short, the Court’s new and uncharted course will inhibit law enforcement and “keep defendants and judges guessing for years to come.”  Riley, 573 U. S., at ___ (slip op., at 25) (internal quotation marks omitted).

*  *  *

 This case should be resolved by interpreting accepted property principles as the baseline for reasonable expectations of privacy. Here the Government did not search anything over which Carpenter could assert ownership or control. Instead, it issued a court-authorized subpoena to a third party to disclose information it alone owned and controlled. That should suffice to resolve this case.

Having concluded, however, that the Government searched Carpenter when it obtained cell-site records from his cell phone service providers, the proper resolution of this case should have been to remand for the Court of Appeals to determine in the first instance whether the search was reasonable.  Most courts of appeals, believing themselves bound by Miller and Smith, have not grappled with this question.  And the Court’s reflexive imposition of the warrant requirement obscures important and difficult issues, such as the scope of Congress’ power to authorize the Government to collect new forms of information using processes that deviate from traditional warrant procedures, and how the Fourth Amendment’s reasonableness requirement should apply when the Government uses compulsory process instead of engaging in an actual, physical search.

 These reasons all lead to this respectful dissent.

             

 

Appendix to opinion of KKENNEDY, J., dissenting ENNEDY, J.  

APPENDIX

 

§2703. Required disclosure of customer communications or records

 

 “(d) R EQUIREMENTS FOR COURT ORDER.—A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider.”

 

 

SUPREME COURT OF THE UNITED STATES

_________________

No. 16–402

_________________

TIMOTHY IVORY CARPENTER, PETITIONER v.   UNITED STATES   

ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF  APPEALS FOR THE SIXTH CIRCUIT   

[June 22, 2018]  

JUSTICE THOMAS, dissenting.

 This case should not turn on “whether” a search occurred. Ante, at 1.  It should turn, instead, on   whose property was searched.  The Fourth Amendment guarantees individuals the right to be secure from unreasonable searches of “their persons, houses, papers, and effects.” (Emphasis added.) In other words, “each person has the right to be secure against unreasonable searches . . . in his own person, house, papers, and effects.”  Minnesota v. Carter, 525 U. S. 83, 92 (1998) (Scalia, J., concurring).  By obtaining the cell-site records of MetroPCS and Sprint, the Government did not search Carpenter’s property.  He did not create the records, he does not maintain them, he cannot control them, and he cannot destroy them.  Neither the terms of his contracts nor any provision of law makes the records his. The records belong to MetroPCS and Sprint.

 The Court concludes that, although the records are not Carpenter’s, the Government must get a warrant because Carpenter had a reasonable “expectation of privacy” in the location information that they reveal.  Ante, at 11. I agree with JUSTICE KENNEDY, JUSTICE ALITO, JUSTICE GORSUCH, and every Court of Appeals to consider the question that this is not the best reading of our  precedents.

 The more fundamental problem with the Court’s opinion, however, is its use of the “reasonable expectation of privacy” test, which was first articulated by Justice Harlan in Katz v. United States, 389 U. S. 347, 360–361 (1967) (concurring opinion). The  Katz test has no basis in the text or history of the Fourth Amendment.  And, it invites courts to make judgments about policy, not law.  Until we confront the problems with this test, Katz will continue to distort Fourth Amendment jurisprudence.  I respectfully dissent.

I

 Katz was the culmination of a series of decisions applying the Fourth Amendment to electronic eavesdropping.  The first such decision was Olmstead v. United States, 277 U. S. 438 (1928), where federal officers had intercepted the defendants’ conversations by tapping telephone lines near their homes. Id., at 456–457.  In an opinion by Chief Justice Taft, the Court concluded that this wiretap did not violate the Fourth Amendment.  No “search” occurred, according to the Court, because the officers did not physically enter the defendants’ homes. Id., at 464–466.  And neither the telephone lines nor the defendants’ intangible conversations qualified as “persons, houses, papers, [or] effects” within the meaning of the Fourth Amendment.  Ibid.[6]  In the ensuing decades, this Court adhered to  

 

Olmstead and rejected Fourth Amendment challenges to various methods of electronic surveillance.  See On Lee v. United States, 343 U. S. 747, 749–753 (1952) (use of microphone to overhear conversations with confidential informant); Goldman v. United States, 316 U. S. 129, 131– 132, 135–136 (1942) (use of detectaphone to hear conversations in office next door).

 In the 1960s, however, the Court began to retreat from Olmstead.  In Silverman v. United States, 365 U. S. 505 (1961), for example, federal officers had eavesdropped on the defendants by driving a “spike mike” several inches into the house they were occupying.  Id., at 506–507.  This was a “search,” the Court held, because the “unauthorized physical penetration into the premises” was an “actual intrusion into a constitutionally protected area.”  Id., at 509, 512.  The Court did not mention Olmstead’s other holding that intangible conversations are not “persons, houses, papers, [or] effects.”  That omission was significant.  The Court confirmed two years later that “[i]t follows from [Silverman] that the Fourth Amendment may protect against the overhearing of verbal statements as well as against the more traditional seizure of ‘papers and effects.’ ”  Wong Sun v. United States, 371 U. S. 471, 485 (1963); accord, Berger v. New York, 388 U. S. 41, 51 (1967).  In Katz, the Court rejected Olmstead’s remaining holding—that eavesdropping is not a search absent a physical intrusion into a constitutionally protected area.  The federal officers in Katz had intercepted the defendant’s conversations by attaching an electronic device to the outside of a public telephone booth.  389 U. S., at 348.  The Court concluded that this was a “search” because the officers “violated the privacy upon which [the defendant] justifiably relied while using the telephone booth.”  Id., at 353.  Although the device did not physically penetrate the booth, the Court overruled Olmstead and held that “the reach of [the Fourth] Amendment cannot turn upon the presence or absence of a physical intrusion.”  389 U. S., at 353. The Court did not explain what should replace Olmstead’s physical-intrusion requirement.  It simply asserted that “the Fourth Amendment protects people, not places” and “what [a person] seeks to preserve as private . . . may be constitutionally protected.” 389 U. S., at 351.  Justice Harlan’s concurrence in Katz attempted to articulate the standard that was missing from the majority opinion. While Justice Harlan agreed that “‘the Fourth  Amendment protects people, not places,’” he stressed that  “[t]he question . . . is what protection it affords to those people,” and “the answer . . . requires reference to a ‘place.’”  Id., at 361. Justice Harlan identified a “twofold requirement” to determine when the protections of the Fourth Amendment apply: “first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as ‘reasonable.’”   Ibid.

 Justice Harlan did not cite anything for this “expectation of privacy” test, and the parties did not discuss it in their briefs.  The test appears to have been presented for the first time at oral argument by one of the defendant’s lawyers. See Winn, Katz and the Origins of the “Reason- able Expectation of Privacy” Test, 40 McGeorge L. Rev. 1, 9–10 (2009). The lawyer, a recent law-school graduate, apparently had an “[e]piphany” while preparing for oral argument. Schneider, Katz v. United States: The Untold Story, 40 McGeorge L. Rev. 13, 18 (2009).  He conjectured that, like the “reasonable person” test from his Torts class, the Fourth Amendment should turn on “whether a reasonable person . . . could have expected his communication to be private.” Id., at 19. The lawyer presented his new theory to the Court at oral argument. See, e.g., Tr. of Oral Arg. in Katz v. United States, O. T. 1967, No. 35, p. 5 (proposing a test of “whether or not, objectively speaking, the communication was intended to be private”); id., at 11

 

(“We propose a test using a way that’s not too dissimilar from the tort ‘reasonable man’ test”).  After some questioning from the Justices, the lawyer conceded that his test should also require individuals to subjectively expect privacy. See id., at 12. With that modification, Justice Harlan seemed to accept the lawyer’s test almost verbatim in his concurrence.

 Although the majority opinion in Katz had little practical significance after Congress enacted the Omnibus Crime Control and Safe Streets Act of 1968, Justice Harlan’s concurrence profoundly changed our Fourth Amendment jurisprudence. It took only one year for the full Court to adopt his two-pronged test.  See Terry v. Ohio, 392 U. S. 1, 10 (1968). And by 1979, the Court was describing Justice Harlan’s test as the “lodestar” for determining whether a “search” had occurred.  Smith v. Maryland, 442 U. S. 735, 739 (1979).  Over time, the Court minimized the subjective prong of Justice Harlan’s test.  See Kerr, Katz Has Only One Step: The Irrelevance of Subjective Expectations, 82 U. Chi. L. Rev. 113 (2015).  That left the objective prong—the “reasonable expectation of privacy” test that the Court still applies today.  See ante, at 5; United States v. Jones, 565 U. S. 400, 406 (2012).

II

 Under the Katz test, a “search” occurs whenever “government officers violate a person’s ‘reasonable expectation of privacy.’”   Jones, supra, at 406. The most glaring problem with this test is that it has “no plausible foundation in the text of the Fourth Amendment.”  Carter, 525 U. S., at 97 (opinion of Scalia, J.).  The Fourth Amendment, as relevant here, protects “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches.”  By defining “search” to mean “any violation of a reasonable expectation of privacy,” the Katz test misconstrues virtually every one of these words.

A

The Katz test distorts the original meaning of “searc[h]”—the word in the Fourth Amendment that it purports to define, see ante, at 5; Smith, supra. Under the Katz test, the government conducts a search anytime it violates someone’s “reasonable expectation of privacy.”  That is not a normal definition of the word “search.”

 At the founding, “search” did not mean a violation of someone’s reasonable expectation of privacy. The word was probably not a term of art, as it does not appear in legal dictionaries from the era. And its ordinary meaning was the same as it is today: “‘[t]o look over or through for  the purpose of finding something; to explore; to examine by inspection; as, to search the house for a book; to search the wood for a thief.’”  Kyllo v. United States, 533 U. S. 27, 32, n. 1 (2001) (quoting N. Webster, An American Dictionary of the English Language 66 (1828) (reprint 6th ed. 1989)); accord, 2 S. Johnson, A Dictionary of the English Language (5th ed. 1773) (“Inquiry by looking into every suspected place”); N. Bailey, An Universal Etymological English Dictionary (22d ed. 1770) (“a seeking after, a looking for, &c.”); 2 J. Ash, The New and Complete Dictionary of the English Language (2d ed. 1795) (“An enquiry, an examination, the act of seeking, an enquiry by looking into every suspected place; a quest; a pursuit”); T. Sheridan, A Complete Dictionary of the English Language (6th ed. 1796) (similar).  The word “search” was not associated with “reasonable expectation of privacy” until Justice Harlan coined that phrase in 1967.  The phrase “expectation(s) of privacy” does not appear in the pre-Katz federal or state case reporters, the papers of prominent Founders,[7] early congressional documents and debates,[8]  collections of early American English texts,[9] or early American newspapers.[10]  

B

The Katz test strays even further from the text by focusing on the concept of “privacy.”  The word “privacy” does not appear in the Fourth Amendment (or anywhere else in the Constitution for that matter).  Instead, the Fourth Amendment references “[t]he right of the people to be secure.” It then qualifies that right by limiting it to “persons” and three specific types of property: “houses, papers, and effects.” By connecting the right to be secure to these four specific objects, “[t]he text of the Fourth Amendment reflects its close connection to property.”  Jones, supra, at 405. “[P]rivacy,” by contrast, “was not part of the political vocabulary of the [founding].  Instead, liberty and privacy rights were understood largely in terms of property rights.” Cloud, Property Is Privacy: Locke and Brandeis in the Twenty-First Century, 55 Am. Crim. L. Rev. 37, 42 (2018).

 Those who ratified the Fourth Amendment were quite familiar with the notion of security in property.  Security in property was a prominent concept in English law. See, e.g., 3 W. Blackstone, Commentaries on the Laws of England 288 (1768) (“[E]very man’s house is looked upon by the law to be his castle”); 3 E. Coke, Institutes of Laws of England 162 (6th ed. 1680) (“[F]or a man[’]s house is his Castle, & domus sua cuique est tutissimum refugium [each man’s home is his safest refuge]”). The political philosophy of John Locke, moreover, “permeated the 18thcentury political scene in America.”  Obergefell v. Hodges, 576 U. S. ___, ___ (2015) (THOMAS, J., dissenting) (slip op.,  at 8). For Locke, every individual had a property right “in his own person” and in anything he “removed from the common state [of] Nature” and “mixed his labour with.”  Second Treatise of Civil Government §27 (1690).  Because property is “very unsecure” in the state of nature, §123, individuals form governments to obtain “a secure enjoyment of their properties.”  §95. Once a government is formed, however, it cannot be given “a power to destroy that which every one designs to secure”; it cannot legitimately “endeavour to take away, and destroy the property of the people,” or exercise “an absolute power over [their] lives, liberties, and estates.”  §222.

 The concept of security in property recognized by Locke and the English legal tradition appeared throughout the materials that inspired the Fourth Amendment. In Entick v. Carrington, 19 How. St. Tr. 1029 (C. P. 1765)—a heralded decision that the founding generation considered “the true and ultimate expression of constitutional law,” Boyd v. United States, 116 U. S. 616, 626 (1886)—Lord Camden explained that “[t]he great end, for which men entered into society, was to secure their property.” 19  How. St. Tr., at 1066. The American colonists echoed this reasoning in their “widespread hostility” to the Crown’s writs of assistance[11]—a practice that inspired the Revolution and became “[t]he driving force behind the adoption of the [Fourth] Amendment.”  United States v. Verdugo-

Urquidez, 494 U. S. 259, 266 (1990).  Prominent colonists decried the writs as destroying “ ‘domestic security’ ” by permitting broad searches of homes.  M. Smith, The Writs of Assistance Case 475 (1978) (quoting a 1772 Boston town meeting); see also id., at 562 (complaining that “ ‘every householder in this province, will necessarily become less secure than he was before this writ’ ” (quoting a 1762 article in the Boston Gazette)); id., at 493 (complaining that the writs were “ ‘expressly contrary to the common law, which ever regarded a man’s house as his castle, or a place of perfect security’ ” (quoting a 1768 letter from John Dickinson)).  James Otis, who argued the famous Writs of Assistance case, contended that the writs violated “ ‘the fundamental Principl[e] of Law’ ” that “ ‘[a] Man who is quiet, is as secure in his House, as a Prince in his Castle.’ ”  Id., at 339 (quoting John Adam’s notes).

 

  John Adams attended Otis’ argument and later drafted Article XIV of the Massachusetts Constitution,[12] which served as a model for the Fourth Amendment.  See Clancy, The Framers’ Intent: John Adams, His Era, and the Fourth Amendment, 86 Ind. L. J. 979, 982 (2011); Donohue, The Original

Fourth Amendment, 83 U. Chi. L. Rev. 1181, 1269 (2016)  (Donohue).  Adams agreed that “[p]roperty must be secured, or liberty cannot exist.”  Discourse on Davila, in 6 The Works of John Adams 280 (C. Adams ed. 1851).  Of course, the founding generation understood that, by securing their property, the Fourth Amendment would often protect their privacy as well.  See, e.g., Boyd, supra, at 630 (explaining that searches of houses invade “the privacies of life”); Wilkes v. Wood, 19 How. St. Tr. 1153, 1154 (C. P. 1763) (argument of counsel contending that seizures of papers implicate “our most private concerns”).  But the Fourth Amendment’s attendant protection of privacy does not justify Katz’s elevation of privacy as the sine qua non of the Amendment.  See T. Clancy, The Fourth Amendment: Its History and Interpretation §3.4.4, p. 78 (2008) (“[The Katz test] confuse[s] the reasons for exercising the protected right with the right itself.  A purpose of exercising one’s Fourth Amendment rights might be the desire for privacy, but the individual’s motivation is not the right protected”); cf. United States v. Gonzalez- Lopez, 548 U. S. 140, 145 (2006) (rejecting “a line of  reasoning that ‘abstracts from the right to its purposes, and then eliminates the right’ ”).  As the majority opinion in Katz recognized, the Fourth Amendment “cannot be translated into a general constitutional ‘right to privacy,’ ” as its protections “often have nothing to do with privacy at all.”  389 U. S., at 350.  Justice Harlan’s focus on privacy in his concurrence—an opinion that was issued between Griswold v. Connecticut, 381 U. S. 479 (1965), and Roe v. Wade, 410 U. S. 113 (1973)—reflects privacy’s status as the organizing constitutional idea of the 1960s and 1970s.  The organizing constitutional idea of the founding era, by contrast, was property.

C

 In shifting the focus of the Fourth Amendment from property to privacy, the Katz test also reads the words

THOMAS, J., dissenting  

“persons, houses, papers, and effects” out of the text.  At its broadest formulation, the Katz test would find a search “wherever an individual may harbor a reasonable ‘expectation of privacy.’”   Terry, 392 U. S., at 9 (emphasis added).  The Court today, for example, does not ask whether cellsite location records are “persons, houses, papers, [or] effects” within the meaning of the Fourth Amendment.[13]   Yet “persons, houses, papers, and effects” cannot mean “anywhere” or “anything.” Katz’s catchphrase that “the Fourth Amendment protects people, not places,” is not a serious attempt to reconcile the constitutional text.  See Carter, 525 U. S., at 98, n. 3 (opinion of Scalia, J.).  The Fourth Amendment obviously protects people; “[t]he question . . . is what protection it affords to those people.”  Katz, 389 U. S., at 361 (Harlan, J., concurring).  The Founders decided to protect the people from unreasonable searches and seizures of four specific things—persons, houses, papers, and effects.  They identified those four categories as “the objects of privacy protection to which the Constitution would extend, leaving further expansion to the good judgment . . . of the people through their representatives in the legislature.” Carter, supra, at 97–98 (opinion of Scalia, J.).

 This limiting language was important to the founders.  Madison’s first draft of the Fourth Amendment used a different phrase: “their persons, their houses, their papers,

and their other property.” 1 Annals of Cong. 452 (1789)  (emphasis added).  In one of the few changes made to Madison’s draft, the House Committee of Eleven changed “other property” to “effects.”  See House Committee of Eleven Report (July 28, 1789), in N. Cogan, The Complete Bill of Rights 334 (2d ed. 2015).  This change might have narrowed the Fourth Amendment by clarifying that it does not protect real property (other than houses).  See Oliver v. United States, 466 U. S. 170, 177, and n. 7 (1984); Davies, Recovering the Original Fourth Amendment, 98 Mich. L. Rev. 547, 709–714 (1999) (Davies).  Or the change might have broadened the Fourth Amendment by clarifying that it protects commercial goods, not just personal possessions.  See Donohue 1301.  Or it might have done both.  Whatever its ultimate effect, the change reveals that the Founders understood the phrase “persons, houses, papers, and effects” to be an important measure of the Fourth Amendment’s overall scope.  See Davies 710.  The Katz test, however, displaces and renders that phrase entirely “superfluous.”  Jones, 565 U. S., at 405.

D

 “[P]ersons, houses, papers, and effects” are not the only words that the Katz test reads out of the Fourth Amendment.  The Fourth Amendment specifies that the people have a right to be secure from unreasonable searches of “their” persons, houses, papers, and effects.  Although phrased in the plural, “[t]he obvious meaning of [‘their’] is that each person has the right to be secure against unreasonable searches and seizures in his own person, house, papers, and effects.”  Carter, supra, at 92 (opinion of Sca- lia, J.); see also District of Columbia v. Heller, 554 U. S. 570, 579 (2008) (explaining that the Constitution uses the plural phrase “the people” to “refer to individual rights, not ‘collective’ rights”).  Stated differently, the word “their” means, at the very least, that individuals do not have Fourth Amendment rights in someone else’s property.  See

Carter, supra, at 92–94 (opinion of Scalia, J.). Yet, under the Katz test, individuals can have a reasonable expectation of privacy in another person’s property. See, e.g., Carter, 525 U. S., at 89 (majority opinion) (“[A] person may have a legitimate expectation of privacy in the house of someone else”).  Until today, our precedents have not acknowledged that individuals can claim a reasonable expectation of privacy in someone else’s business records.  See ante, at 2 (KENNEDY, J., dissenting). But the Court erases that line in this case, at least for cell-site location records. In doing so, it confirms that the Katz test does not necessarily require an individual to prove that the government searched his person, house, paper, or effect.  Carpenter attempts to argue that the cell-site records are, in fact, his “papers,” see Brief for Petitioner 32–35; Reply Brief 14–15, but his arguments are unpersuasive, see ante, at 12–13 (opinion of KENNEDY, J.); post, at 20–23 (ALITO, J., dissenting).  Carpenter stipulated below that  the cell-site records are the business records of Sprint and MetroPCS. See App. 51. He cites no property law in his briefs to this Court, and he does not explain how he has a property right in the companies’ records under the law of any jurisdiction at any point in American history. If someone stole these records from Sprint or MetroPCS, Carpenter does not argue that he could recover in a traditional tort action. Nor do his contracts with Sprint and MetroPCS make the records his, even though such provisions could exist in the marketplace.  Cf., e.g., Google Terms of Service, https://policies.google.com/terms (“Some of our Services allow you to upload, submit, store, send or receive content. You retain ownership of any intellectual property rights that you hold in that content.  In short, what belongs to you stays yours”).

 Instead of property, tort, or contract law, Carpenter relies on the federal Telecommunications Act of 1996 to demonstrate that the cell site records are his papers.  The

Telecommunications Act generally bars cell-phone companies from disclosing customers’ cell site location information to the public.  See 47 U. S. C. §222(c).  This is sufficient to make the records his, Carpenter argues, because the Fourth Amendment merely requires him to identify a source of “positive law” that “protects against access by the public without consent.”  Brief for Petitioner 32–33 (citing Baude & Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821, 1825– 1826 (2016); emphasis deleted).

 Carpenter is mistaken.  To come within the text of the Fourth Amendment, Carpenter must prove that the cellsite records are his; positive law is potentially relevant only insofar as it answers that question.  The text of the Fourth Amendment cannot plausibly be read to mean “any violation of positive law” any more than it can plausibly be read to mean “any violation of a reasonable expectation of privacy.”

 Thus, the Telecommunications Act is insufficient because it does not give Carpenter a property right in the cell-site records. Section 222, titled “Privacy of customer information,” protects customers’ privacy by preventing cell-phone companies from disclosing sensitive information about them. The statute creates a “duty to protect the confidentiality” of information relating to customers, §222(a), and creates “[p]rivacy requirements” that limit the disclosure of that information, §222(c)(1).  Nothing in the text pre-empts state property law or gives customers a property interest in the companies’ business records (assuming Congress even has that authority).[14]  Although  

  • 222 “protects the interests of individuals against wrongful uses or disclosures of personal data, the rationale for these legal protections has not historically been grounded on a perception that people have property rights in personal data as such.” Samuelson, Privacy as Intellectual Property? 52 Stan. L. Rev. 1125, 1130–1131 (2000) (footnote omitted). Any property rights remain with the  companies.

E

 The Katz test comes closer to the text of the Fourth Amendment when it asks whether an expectation of pri- vacy is “reasonable,” but it ultimately distorts that term as well.  The Fourth Amendment forbids “unreasonable searches.”  In other words, reasonableness determines the legality of a search, not “whether a search . . . within the meaning of the Constitution has occurred.”  Carter, 525 U. S., at 97 (opinion of Scalia, J.) (internal quotation marks omitted).

 Moreover, the Katz test invokes the concept of reasonableness in a way that would be foreign to the ratifiers of the Fourth Amendment.  Originally, the word “unreasonable” in the Fourth Amendment likely meant “against reason”—as in “against the reason of the common law.”  See Donohue 1270–1275; Davies 686–693; California v. Acevedo, 500 U. S. 565, 583 (1991) (Scalia, J., concurring

in judgment).  At the founding, searches and seizures were 

 regulated by a robust body of common-law rules.  See generally W. Cuddihy, The Fourth Amendment: Origins and Original Meaning 602–1791 (2009); e.g., Wilson v. Arkansas, 514 U. S. 927, 931–936 (1995) (discussing the common-law knock-and-announce rule).  The search-andseizure practices that the Founders feared most—such as general warrants—were already illegal under the common law, and jurists such as Lord Coke described violations of the common law as “against reason.”  See Donohue 1270– 1271, and n. 513.  Locke, Blackstone, Adams, and other influential figures shortened the phrase “against reason” to “unreasonable.”  See id., at 1270–1275.  Thus, by prohibiting “unreasonable” searches and seizures in the Fourth Amendment, the Founders ensured that the newly created Congress could not use legislation to abolish the established common-law rules of search and seizure.  See T. Cooley, Constitutional Limitations *303 (2d ed. 1871); 3 J. Story, Commentaries on the Constitution of the United States §1895, p. 748 (1833).

 Although the Court today maintains that its decision is based on “Founding-era understandings,” ante, at 6, the Founders would be puzzled by the Court’s conclusion as well as its reasoning.  The Court holds that the Government unreasonably searched Carpenter by subpoenaing the cell-site records of Sprint and MetroPCS without a warrant.  But the Founders would not recognize the Court’s “warrant requirement.”  Ante, at 21.  The common law required warrants for some types of searches and seizures, but not for many others.  The relevant rule depended on context.  See Acevedo, supra, at 583–584 (opinion of Scalia, J.); Amar, Fourth Amendment First Principles, 107 Harv. L. Rev. 757, 763–770 (1994); Davies 738– 739.  In cases like this one, a subpoena for third-party documents was not a “search” to begin with, and the common law did not limit the government’s authority to subpoena third parties.  See post, at 2–12 (ALITO, J., dissenting). Suffice it to say, the Founders would be confused by this Court’s transformation of their common-law protection of property into a “warrant requirement” and a vague inquiry into “reasonable expectations of privacy.”

 

III

 That the Katz test departs so far from the text of the

Fourth Amendment is reason enough to reject it.  But the Katz test also has proved unworkable in practice.  Jurists and commentators tasked with deciphering our jurisprudence have described the Katz regime as “an unpredictable jumble,” “a mass of contradictions and obscurities,” “all over the map,” “riddled with inconsistency and incoherence,” “a series of inconsistent and bizarre results that [the Court] has left entirely undefended,” “unstable,” “chameleon-like,” “‘notoriously unhelpful,’” “a conclusion   rather than a starting point for analysis,” “distressingly unmanageable,” “a dismal failure,” “flawed to the core,” “unadorned fiat,” and “inspired by the kind of logic that produced Rube Goldberg’s bizarre contraptions.”10 

——————

10 Kugler & Strahilevitz, Actual Expectations of Privacy, Fourth Amendment Doctrine, and the Mosaic Theory, 2015 S. Ct. Rev. 205, 261; Bradley, Two Models of the Fourth Amendment, 83 Mich. L. Rev. 1468 (1985); Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 505 (2007); Solove, Fourth Amendment Pragmatism, 51 Boston College L. Rev. 1511 (2010); Wasserstom & Seidman, The Fourth Amendment as Constitutional Theory, 77 Geo. L. J. 19, 29 (1988); Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 Stan. L. Rev. 119, 122 (2002); Clancy, The Fourth Amendment: Its History and Interpretation §3.3.4, p. 65 (2008); Minnesota v. Carter, 525 U. S. 83, 97 (1998) (Scalia, J., dissenting); State v. Campbell, 306 Ore. 157, 164, 759 P. 2d 1040, 1044 (1988); Wilkins, Defining the “Reasonable Expectation of Privacy”: an Emerging Tripartite Analysis, 40 Vand. L. Rev. 1077, 1107 (1987); Yeager, Search, Seizure and the Positive Law: Expectations of Privacy Outside the Fourth Amendment, 84 J. Crim. L. & C. 249, 251 (1993); Thomas, Time Travel, Hovercrafts, and the Framers:  James Madison Sees the Future and Rewrites the Fourth Amendment,  80 Notre Dame L. Rev. 1451, 1500 (2005); Rakas v. Illinois, 439 U. S.  128, 165 (1978) (White, J., dissenting); Cloud, Rube Goldberg Meets the  Constitution: The Supreme Court, Technology, and the Fourth   Amendment, 72 Miss. L. J. 5, 7 (2002).

 

 Even Justice Harlan, four years after penning his concurrence in Katz, confessed that the test encouraged “the substitution of words for analysis.” United States v. White, 401 U. S. 745, 786 (1971) (dissenting opinion).

 

After 50 years, it is still unclear what question the Katz test is even asking. This Court has steadfastly declined to elaborate the relevant considerations or identify any meaningful constraints. See, e.g., ante, at 5 (“[N]o single rubric definitively resolves which expectations of privacy are entitled to protection”); O’Connor v. Ortega, 480 U. S. 709, 715 (1987) (plurality opinion) (“We have no talisman that determines in all cases those privacy expectations that society is prepared to accept as reasonable”); Oliver, 466 U. S., at 177 (“No single factor determines whether an individual legitimately may claim under the Fourth Amendment that a place should be free of government intrusion”).

 Justice Harlan’s original formulation of the Katz test appears to ask a descriptive question: Whether a given expectation of privacy is “one that society is prepared to recognize as ‘reasonable.’” 389 U. S., at 361.  As written,  the Katz test turns on society’s actual, current views about the reasonableness of various expectations of privacy.

 But this descriptive understanding presents several problems. For starters, it is easily circumvented.  If, for  example, “the Government were suddenly to announce on nationwide television that all homes henceforth would be subject to warrantless entry,” individuals could not realistically expect privacy in their homes.  Smith, 442 U. S., at 740, n. 5; see also Chemerinsky, Rediscovering Brandeis’s  Right to Privacy, 45 Brandeis L. J. 643, 650 (2007) (“[Under Katz, t]he government seemingly can deny privacy just by letting people know in advance not to expect any”). A  purely descriptive understanding of the Katz test also risks “circular[ity].”  Kyllo, 533 U. S., at 34. While this Court is supposed to base its decisions on society’s expectations of privacy, society’s expectations of privacy are, in turn, shaped by this Court’s decisions.  See Posner, The Uncertain Protection of Privacy by the Supreme Court, 1979 S. Ct. Rev. 173, 188 (“[W]hether [a person] will or will not have [a reasonable] expectation [of privacy] will depend on what the legal rule is”).

 To address this circularity problem, the Court has insisted that expectations of privacy must come from outside its Fourth Amendment precedents, “either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society.”  Rakas v. Illinois, 439 U. S. 128, 144, n. 12 (1978).  But the Court’s supposed reliance on “real or personal property law” rings hollow. The whole point of Katz was to “ ‘discredi[t]’” the relationship between the Fourth Amendment       and property law, 389 U. S., at 353, and this Court has repeatedly downplayed the importance of property law under the Katz test, see, e.g., United States v. Salvucci, 448 U. S. 83, 91 (1980) (“[P]roperty rights are neither the beginning nor the end of this Court’s inquiry [under Katz]”); Rawlings v. Kentucky, 448 U. S. 98, 105 (1980) (“[This Court has] emphatically rejected the notion that ‘arcane’ concepts of property law ought to control the ability to claim the protections of the Fourth Amendment”). Today, for example, the Court makes no mention of property law, except to reject its relevance.  See ante, at 5, and n. 1.

 As for “understandings that are recognized or permitted in society,” this Court has never answered even the most basic questions about what this means.  See Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 504–505 (2007).  For example, our precedents do not explain who is included in “society,” how we know what they “recogniz[e] or permi[t],” and how much of society must  agree before something constitutes an “understanding.”  Here, for example, society might prefer a balanced regime that prohibits the Government from obtaining cellsite location information unless it can persuade a neutral magistrate that the information bears on an ongoing criminal investigation.  That is precisely the regime Congress created under the Stored Communications Act and Telecommunications Act.  See 47 U. S. C. §222(c)(1); 18 U. S. C. §§2703(c)(1)(B), (d).  With no sense of irony, the Court invalidates this regime today—the one that society actually created “in the form of its elected representatives in Congress.” 819 F. 3d 880, 890 (2016).

 Truth be told, this Court does not treat the Katz test as a descriptive inquiry. Although the Katz test is phrased in descriptive terms about society’s views, this Court treats it like a normative question—whether a particular practice should be considered a search under the Fourth Amendment. Justice Harlan thought this was the best way to understand his test. See White, 401 U. S., at 786 (dissenting opinion) (explaining that courts must assess the “desirability” of privacy expectations and ask whether courts “should” recognize them by “balanc[ing]” the “impact on the individual’s sense of security . . . against the utility of the conduct as a technique of law enforcement”).  And a normative understanding is the only way to make sense of this Court’s precedents, which bear the hallmarks of subjective policymaking instead of neutral legal decisionmaking. “[T]he only thing the past three decades have established about the Katz test” is that society’s expectations of privacy “bear an uncanny resemblance to those expectations of privacy that this Court considers reasonable.”   Carter, 525 U. S., at 97 (opinion of Scalia, J.). Yet, “[t]hough we know ourselves to be eminently reasonable, self-awareness of eminent reasonableness is not really a substitute for democratic election.” Sosa v. AlvarezMachain, 542 U. S. 692, 750 (2004) (Scalia, J., concurring in part and concurring in judgment).

*  *  *

 In several recent decisions, this Court has declined to apply the Katz test because it threatened to narrow the original scope of the Fourth Amendment.  See Grady v. North Carolina, 575 U. S. ___, ___ (2015) (per curiam) (slip op., at 3); Florida v. Jardines, 569 U. S. 1, 5 (2013); Jones, 565 U. S., at 406–407.  But as today’s decision demonstrates, Katz can also be invoked to expand the Fourth Amendment beyond its original scope.  This Court should not tolerate errors in either direction.  “The People, through ratification, have already weighed the policy tradeoffs that constitutional rights entail.”  Luis v. United States, 578 U. S. ___, ___ (2016) (THOMAS, J., concurring in judgment) (slip op., at 10).  Whether the rights they ratified are too broad or too narrow by modern lights, this Court has no authority to unilaterally alter the document they approved.

 Because the Katz test is a failed experiment, this Court is dutybound to reconsider it.  Until it does, I agree with my dissenting colleagues’ reading of our precedents. Accordingly, I respectfully dissent.

 

SUPREME COURT OF THE UNITED STATES

_________________

No. 16–402

_________________

TIMOTHY IVORY CARPENTER, PETITIONER v.   UNITED STATES   

ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF  APPEALS FOR THE SIXTH CIRCUIT   

[June 22, 2018]  

JUSTICE ALITO, with whom JUSTICE THOMAS joins, dissenting.

 I share the Court’s concern about the effect of new technology on personal privacy, but I fear that today’s decision will do far more harm than good.  The Court’s reasoning fractures two fundamental pillars of Fourth Amendment law, and in doing so, it guarantees a blizzard of litigation while threatening many legitimate and valuable investigative practices upon which law enforcement has rightfully come to rely.

 First, the Court ignores the basic distinction between an actual search (dispatching law enforcement officers to enter private premises and root through private papers and effects) and an order merely requiring a party to look through its own records and produce specified documents.  The former, which intrudes on personal privacy far more deeply, requires probable cause; the latter does not.  Treating an order to produce like an actual search, as today’s decision does, is revolutionary.  It violates both the original understanding of the Fourth Amendment and more than a century of Supreme Court precedent.  Unless it is somehow restricted to the particular situation in the present case, the Court’s move will cause upheaval.  Must every grand jury subpoena duces tecum be supported by probable cause? If so, investigations of terrorism, political corruption, white-collar crime, and many other offenses will be stymied. And what about subpoenas and other document-production orders issued by administrative agencies? See, e.g., 15 U. S. C. §57b–1(c) (Federal Trade Commission); §§77s(c), 78u(a)–(b) (Securities and Exchange Commission); 29 U. S. C. §657(b) (Occupational Safety and Health Administration); 29 CFR §1601.16(a)(2) (2017) (Equal Employment Opportunity Commission).  Second, the Court allows a defendant to object to the search of a third party’s property.  This also is revolutionary. The Fourth Amendment protects “[t]he right of the people to be secure in their persons, houses, papers, and effects” (emphasis added), not the persons, houses, papers, and effects of others. Until today, we have been careful to heed this fundamental feature of the Amendment’s text.  This was true when the Fourth Amendment was tied to property law, and it remained true after Katz v. United States, 389 U. S. 347 (1967), broadened the Amendment’s reach.

 By departing dramatically from these fundamental principles, the Court destabilizes long-established Fourth Amendment doctrine. We will be making repairs—or picking up the pieces—for a long time to come.

I

 Today the majority holds that a court order requiring the production of cell-site records may be issued only after the Government demonstrates probable cause.  See ante, at 18. That is a serious and consequential mistake.  The Court’s holding is based on the premise that the order issued in this case was an actual “search” within the meaning of the Fourth Amendment, but that premise is inconsistent with the original meaning of the Fourth Amendment and with more than a century of precedent.

 

A  

 The order in this case was the functional equivalent of a subpoena for documents, and there is no evidence that these writs were regarded as “searches” at the time of the founding. Subpoenas duces tecum and other forms of compulsory document production were well known to the founding generation.  Blackstone dated the first writ of subpoena to the reign of King Richard II in the late 14th century, and by the end of the 15th century, the use of such writs had “become the daily practice of the [Chancery] court.”  3 W. Blackstone, Commentaries on the Laws of England 53 (G. Tucker ed. 1803) (Blackstone).  Over the next 200 years, subpoenas would grow in prominence and power in tandem with the Court of Chancery, and by the end of Charles II’s reign in 1685, two important innovations had occurred.

 First, the Court of Chancery developed a new species of subpoena. Until this point, subpoenas had been used largely to compel attendance and oral testimony from witnesses; these subpoenas correspond to today’s subpoenas ad testificandum.  But the Court of Chancery also improvised a new version of the writ that tacked onto a regular subpoena an order compelling the witness to bring certain items with him. By issuing these so-called subpoenas duces tecum, the Court of Chancery could compel the production of papers, books, and other forms of physical evidence, whether from the parties to the case or from third parties.  Such subpoenas were sufficiently commonplace by 1623 that a leading treatise on the practice of law could refer in passing to the fee for a “Sub pœna of Ducas tecum” (seven shillings and two pence) without needing to elaborate further.  T. Powell, The Attourneys Academy 79 (1623). Subpoenas duces tecum would swell in use over the next century as the rules for their application became ever more developed and definite.  See, e.g., 1 G. Jacob, The Compleat Chancery-Practiser 290 (1730) (“The Subpoena duces tecum is awarded when the Defendant has confessed by his Answer that he hath such Writings in his Hands as are prayed by the Bill to be discovered or brought into Court”).

 Second, although this new species of subpoena had its origins in the Court of Chancery, it soon made an appearance in the work of the common-law courts as well.  One court later reported that “[t]he Courts of Common law . . . employed the same or similar means . . . from the time of Charles the Second at least.”  Amey v. Long, 9 East. 473, 484, 103 Eng. Rep. 653, 658 (K. B. 1808).

 By the time Blackstone published his Commentaries on the Laws of England in the 1760’s, the use of subpoenas duces tecum had bled over substantially from the courts of equity to the common-law courts.  Admittedly, the transition was still incomplete: In the context of jury trials, for example, Blackstone complained about “the want of a compulsive power for the production of books and papers belonging to the parties.” Blackstone 381; see also, e.g., Entick v. Carrington, 19 State Trials 1029, 1073 (K. B. 1765) (“I wish some cases had been shewn, where the law forceth evidence out of the owner’s custody by process.  [But] where the adversary has by force or fraud got possession of your own proper evidence, there is no way to get it back but by action”).  But Blackstone found some comfort in the fact that at least those documents “[i]n the hands of third persons . . . can generally be obtained by rule of court, or by adding a clause of requisition to the writ of subpoena, which is then called a subpoena duces tecum.”  Blackstone 381; see also, e.g., Leeds v. Cook, 4 Esp. 256, 257, 170 Eng. Rep. 711 (N. P. 1803) (third-party subpoena duces tecum); Rex v. Babb, 3 T. R. 579, 580, 100 Eng. Rep. 743, 744 (K. B. 1790) (third-party document production). One of the primary questions outstanding, then, was whether common-law courts would remedy the “defect[s]” identified by the Commentaries, and allow

 

parties to use subpoenas duces tecum not only with respect to third parties but also with respect to each other.  Blackstone 381.

 That question soon found an affirmative answer on both sides of the Atlantic. In the United States, the First Congress established the federal court system in the Judiciary Act of 1789. As part of that Act, Congress authorized “all the said courts of the United States . . . in the trial of actions at law, on motion and due notice thereof being given, to require the parties to produce books or writings in their possession or power, which contain evidence pertinent to the issue, in cases and under circumstances where they might be compelled to produce the same by the ordinary rules of proceeding in chancery.”  §15, 1 Stat. 82.  From that point forward, federal courts in the United States could compel the production of documents regardless of whether those documents were held by parties to the case or by third parties.

 In Great Britain, too, it was soon definitively established that common-law courts, like their counterparts in equity, could subpoena documents held either by parties to the case or by third parties.  After proceeding in fits and starts, the King’s Bench eventually held in Amey v. Long that the “writ of subpœna duces tecum [is] a writ of compulsory obligation and effect in the law.” 9 East., at 486, 103 Eng. Rep., at 658. Writing for a unanimous court, Lord Chief Justice Ellenborough explained that “[t]he right to resort to means competent to compel the production of written, as well as oral, testimony seems essential to the very existence and constitution of a Court of Common Law.” Id., at 484, 103 Eng. Rep., at 658. Without the power to issue subpoenas duces tecum, the Lord Chief Justice observed, common-law courts “could not possibly proceed with due effect.” Ibid.

 The prevalence of subpoenas duces tecum at the time of the founding was not limited to the civil context. In criminal cases, courts and prosecutors were also using the writ to compel the production of necessary documents.  In Rex v. Dixon, 3 Burr. 1687, 97 Eng. Rep. 1047 (K. B. 1765), for example, the King’s Bench considered the propriety of a subpoena duces tecum served on an attorney named Samuel Dixon. Dixon had been called “to give evidence before the grand jury of the county of Northampton” and specifically “to produce three vouchers . . . in order to found a prosecution by way of indictment against [his client] Peach . . . for forgery.”  Id., at 1687, 97 Eng. Rep., at 1047– 1048. Although the court ultimately held that Dixon had not needed to produce the vouchers on account of attorneyclient privilege, none of the justices expressed the slightest doubt about the general propriety of subpoenas duces tecum in the criminal context.  See id., at 1688, 97 Eng. Rep., at 1048. As Lord Chief Justice Ellenborough later explained, “[i]n that case no objection was taken to the writ, but to the special circumstances under which the party possessed the papers; so that the Court may be considered as recognizing the general obligation to obey writs of that description in other cases.”  Amey, supra, at 485, 103 Eng. Rep., at 658; see also 4 J. Chitty, Practical Treatise on the Criminal Law 185 (1816) (template for criminal subpoena duces tecum).

As Dixon shows, subpoenas duces tecum were routine in part because of their close association with grand juries.  Early American colonists imported the grand jury, like so many other common-law traditions, and they quickly flourished. See United States v. Calandra, 414 U. S. 338, 342–343 (1974).  Grand juries were empaneled by the federal courts almost as soon as the latter were established, and both they and their state counterparts actively exercised their wide-ranging common-law authority. See R. Younger, The People’s Panel 47–55 (1963).  Indeed, “the Founders thought the grand jury so essential . . . that they provided in the Fifth Amendment that federal prosecution for serious crimes can only be instituted by ‘a presentment or indictment of a Grand Jury.’”  Calandra, supra, at 343.  Given the popularity and prevalence of grand juries at the time, the Founders must have been intimately familiar with the tools they used—including compulsory process— to accomplish their work. As a matter of tradition, grand juries were “accorded wide latitude to inquire into violations of criminal law,” including the power to “compel the production of evidence or the testimony of witnesses as [they] conside[r] appropriate.” Ibid.  Long before national independence was achieved, grand juries were already using their broad inquisitorial powers not only to present and indict criminal suspects but also to inspect public buildings, to levy taxes, to supervise the administration of the laws, to advance municipal reforms such as street repair and bridge maintenance, and in some cases even to propose legislation.  Younger, supra, at 5–26. Of course, such work depended entirely on grand juries’ ability to access any relevant documents.

 Grand juries continued to exercise these broad inquisitorial powers up through the time of the founding.  See Blair v. United States, 250 U. S. 273, 280 (1919) (“At the foundation of our Federal Government the inquisitorial function of the grand jury and the compulsion of witnesses were recognized as incidents of the judicial power”).  In a series of lectures delivered in the early 1790’s, Justice James Wilson crowed that grand juries were “the peculiar boast of the common law” thanks in part to their wideranging authority: “All the operations of government, and of its ministers and officers, are within the compass of their view and research.” 2 J. Wilson, The Works of James Wilson 534, 537 (R. McCloskey ed. 1967).  That reflected the broader insight that “[t]he grand jury’s investigative power must be broad if its public responsibility is adequately to be discharged.” Calandra, supra, at 344.  Compulsory process was also familiar to the founding generation in part because it reflected “the ancient proposition of law” that “‘“the public . . . has a right to every   man’s evidence.”’”   United States v. Nixon, 418 U. S. 683, 709 (1974); see also ante, at 10 (KENNEDY, J., dissenting).   As early as 1612, “Lord Bacon is reported to have declared that ‘all subjects, without distinction of degrees, owe to the King tribute and service, not only of their deed and hand, but of their knowledge and discovery.’”  Blair, supra, at 279–280. That duty could be “onerous at times,” yet the Founders considered it “necessary to the administration of justice according to the forms and modes established in our system of government.” Id., at 281; see also Calandra, supra, at 345.

B

 Talk of kings and common-law writs may seem out of place in a case about cell-site records and the protections afforded by the Fourth Amendment in the modern age.  But this history matters, not least because it tells us what was on the minds of those who ratified the Fourth Amendment and how they understood its scope.  That history makes it abundantly clear that the Fourth Amendment, as originally understood, did not apply to the compulsory production of documents at all.

 The Fourth Amendment does not regulate all methods by which the Government obtains documents. Rather, it prohibits only those “searches and seizures” of “persons, houses, papers, and effects” that are “unreasonable.”  Consistent with that language, “at least until the latter half of the 20th century” “our Fourth Amendment jurisprudence was tied to common-law trespass.”  United States v. Jones, 565 U. S. 400, 405 (2012).  So by its terms, the Fourth Amendment does not apply to the compulsory production of documents, a practice that involves neither any physical intrusion into private space nor any taking of property by agents of the state.  Even Justice Brandeis—a stalwart proponent of construing the Fourth Amendment liberally—acknowledged that “under any ordinary construction of language,” “there is no ‘search’ or ‘seizure’ when a defendant is required to produce a document in the orderly process of a court’s procedure.”  Olmstead v. United States, 277 U. S. 438, 476 (1928) (dissenting opinion).1  

 Nor is there any reason to believe that the Founders intended the Fourth Amendment to regulate courts’ use of compulsory process. American colonists rebelled against the Crown’s physical invasions of their persons and their property, not against its acquisition of information by any and all means. As Justice Black once put it, “[t]he Fourth Amendment was aimed directly at the abhorred practice of breaking in, ransacking and searching homes and other buildings and seizing people’s personal belongings without warrants issued by magistrates.”  Katz, 389 U. S., at 367 (dissenting opinion). More recently, we have acknowledged that “the Fourth Amendment was the founding generation’s response to the reviled ‘general warrants’ and ‘writs of assistance’ of the colonial era, which allowed

——————

1 Any other interpretation of the Fourth Amendment’s text would run into insuperable problems because it would apply not only to subpoenas duces tecum but to all other forms of compulsory process as well.  If the Fourth Amendment applies to the compelled production of documents, then it must also apply to the compelled production of testimony—an outcome that we have repeatedly rejected and which, if accepted, would send much of the field of criminal procedure into a tailspin.  See, e.g., United States v. Dionisio, 410 U. S. 1, 9 (1973) (“It is clear that a subpoena to appear before a grand jury is not a ‘seizure’ in the Fourth Amendment sense, even though that summons may be inconvenient or burdensome”); United States v. Calandra, 414 U. S. 338, 354 (1974) (“Grand jury questions . . . involve no independent governmental invasion of one’s person, house, papers, or effects”).  As a matter of original understanding, a subpoena duces tecum no more effects a “search” or “seizure” of papers within the meaning of the Fourth Amendment than a subpoena ad testificandum effects a “search” or “seizure” of a person.

British officers to rummage through homes in an unrestrained search for evidence of criminal activity.”  Riley v. California, 573 U. S. ___, ___ (2014) (slip op., at 27).

 General warrants and writs of assistance were noxious not because they allowed the Government to acquire evidence in criminal investigations, but because of the means by which they permitted the Government to acquire that evidence. Then, as today, searches could be quite invasive. Searches generally begin with officers “mak[ing] nonconsensual entries into areas not open to the public.”  Donovan v. Lone Steer, Inc., 464 U. S. 408, 414 (1984).  Once there, officers are necessarily in a position to observe private spaces generally shielded from the public and discernible only with the owner’s consent.  Private area after private area becomes exposed to the officers’ eyes as they rummage through the owner’s property in their hunt for the object or objects of the search.  If they are searching for documents, officers may additionally have to rifle through many other papers—potentially filled with the most intimate details of a person’s thoughts and life— before they find the specific information they are seeking.  See Andresen v. Maryland, 427 U. S. 463, 482, n. 11 (1976). If anything sufficiently incriminating comes into view, officers seize it. Horton v. California, 496 U. S. 128, 136–137 (1990). Physical destruction always lurks as an underlying possibility; “officers executing search warrants on occasion must damage property in order to perform their duty.”  Dalia v. United States, 441 U. S. 238, 258 (1979); see, e.g., United States v. Ramirez, 523 U. S. 65, 71–72 (1998) (breaking garage window); United States v. Ross, 456 U. S. 798, 817–818 (1982) (ripping open car upholstery); Brown v. Battle Creek Police Dept., 844 F. 3d 556, 572 (CA6 2016) (shooting and killing two pet dogs); Lawmaster v. Ward, 125 F. 3d 1341, 1350, n. 3 (CA10 1997) (breaking locks).

 Compliance with a subpoena duces tecum requires none of that. A subpoena duces tecum permits a subpoenaed individual to conduct the search for the relevant documents himself, without law enforcement officers entering his home or rooting through his papers and effects.  As a result, subpoenas avoid the many incidental invasions of privacy that necessarily accompany any actual search.  And it was those invasions of privacy—which, although incidental, could often be extremely intrusive and damaging—that led to the adoption of the Fourth Amendment.  Neither this Court nor any of the parties have offered the slightest bit of historical evidence to support the idea that the Fourth Amendment originally applied to subpoenas duces tecum and other forms of compulsory process.  That is telling, for as I have explained, these forms of compulsory process were a feature of criminal (and civil) procedure well known to the Founders.  The Founders would thus have understood that holding the compulsory production of documents to the same standard as actual searches and seizures would cripple the work of courts in civil and criminal cases alike. It would be remarkable to think that, despite that knowledge, the Founders would have gone ahead and sought to impose such a requirement. It would be even more incredible to believe that the Founders would have imposed that requirement through the inapt vehicle of an amendment directed at different concerns. But it would blink reality entirely to argue that this entire process happened without anyone saying the least thing about it—not during the drafting of the Bill of Rights, not during any of the subsequent ratification debates, and not for most of the century that followed.  If the Founders thought the Fourth Amendment applied to the compulsory production of documents, one would imagine that there would be some founding-era evidence of the Fourth Amendment being applied to the compulsory production of documents. Cf. Free Enterprise Fund v. Public Company Accounting Oversight Bd., 561 U. S. 477, 505 (2010); Printz v. United States, 521 U. S. 898, 905 (1997).  Yet none has been brought to our attention.

C

 Of course, our jurisprudence has not stood still since 1791. We now evaluate subpoenas duces tecum and other forms of compulsory document production under the Fourth Amendment, although we employ a reasonableness standard that is less demanding than the requirements for a warrant.  But the road to that doctrinal destination was anything but smooth, and our initial missteps—and the subsequent struggle to extricate ourselves from their consequences—should provide an object lesson for today’s majority about the dangers of holding compulsory process to the same standard as actual searches and seizures.  For almost a century after the Fourth Amendment was enacted, this Court said and did nothing to indicate that it might regulate the compulsory production of documents.  But that changed temporarily when the Court decided Boyd v. United States, 116 U. S. 616 (1886), the first—and, until today, the only—case in which this Court has ever held the compulsory production of documents to the same standard as actual searches and seizures.

The Boyd Court held that a court order compelling a company to produce potentially incriminating business records violated both the Fourth and the Fifth Amendments. The Court acknowledged that “certain aggravating incidents of actual search and seizure, such as forcible entry into a man’s house and searching amongst his papers, are wanting” when the Government relies on compulsory process.  Id., at 622. But it nevertheless asserted that the Fourth Amendment ought to “be liberally construed,” id., at 635, and further reasoned that compulsory process “effects the sole object and purpose of search and seizure” by “forcing from a party evidence against himself,” id., at 622.  “In this regard,” the Court concluded, “the Fourth and Fifth Amendments run almost into each other.” Id., at 630.  Having equated compulsory process with actual searches and seizures and having melded the Fourth Amendment with the Fifth, the Court then found the order at issue unconstitutional because it compelled the production of property to which the Government did not have superior title. See id., at 622–630.  In a concurrence joined by Chief Justice Waite, Justice Miller agreed that the order violated the Fifth Amendment, id., at 639, but he strongly protested the majority’s invocation of the Fourth Amendment.  He explained: “[T]here is no reason why this court should assume that the action of the court below, in requiring a party to produce certain papers . . . , authorizes an unreasonable search or seizure of the house, papers, or effects of that party. There is in fact no search and no seizure.”  Ibid.  “If the mere service of a notice to produce a paper . . . is a search,” Justice Miller concluded, “then a change has taken place in the meaning of words, which has not come within my reading, and which I think was unknown at the time the Constitution was made.” Id., at 641.

 Although Boyd was replete with stirring rhetoric, its reasoning was confused from start to finish in a way that ultimately made the decision unworkable.  See 3 W. LaFave, J. Israel, N. King, & O. Kerr, Criminal Procedure §8.7(a) (4th ed. 2015). Over the next 50 years, the Court would gradually roll back Boyd’s erroneous conflation of compulsory process with actual searches and seizures.  That effort took its first significant stride in Hale v. Henkel, 201 U. S. 43 (1906), where the Court found it “quite clear” and “conclusive” that “the search and seizure clause of the Fourth Amendment was not intended to interfere with the power of courts to compel, through a subpœna duces tecum, the production, upon a trial in court, of documentary evidence.”  Id., at 73. Without that writ, the Court recognized, “it would be ‘utterly impossible to carry on the administration of justice.’”    Ibid.

  Hale, however, did not entirely liberate subpoenas duces tecum from Fourth Amendment constraints.  While refusing to treat such subpoenas as the equivalent of actual searches, Hale concluded that they must not be unreasonable.  And it held that the subpoena duces tecum at issue was “far too sweeping in its terms to be regarded as reasonable.”  Id., at 76. The Hale Court thus left two critical questions unanswered: Under the Fourth Amendment, what makes the compulsory production of documents “reasonable,” and how does that standard differ from the one that governs actual searches and seizures?  The Court answered both of those questions definitively in Oklahoma Press Publishing Co. v. Walling, 327 U. S. 186 (1946), where we held that the Fourth Amendment regulates the compelled production of documents, but less stringently than it does full-blown searches and seizures.  Oklahoma Press began by admitting that the Court’s opinions on the subject had “perhaps too often . . . been generative of heat rather than light,” “mov[ing] with variant direction” and sometimes having “highly contrasting” “emphasis and tone.”  Id., at 202. “The primary source of  misconception concerning the Fourth Amendment’s function” in this context, the Court explained, “lies perhaps in the identification of cases involving so-called ‘figurative’ or ‘constructive’ search with cases of actual search and seizure.” Ibid.  But the Court held that “the basic distinction” between the compulsory production of documents on the one hand, and actual searches and seizures on the other, meant that two different standards had to be applied. Id., at 204.

Having reversed Boyd’s conflation of the compelled production of documents with actual searches and seizures, the Court then set forth the relevant Fourth Amendment standard for the former.  When it comes to “the production of corporate or other business records,” the Court held that the Fourth Amendment “at the most guards against abuse only by way of too much indefiniteness or breadth in the things required to be ‘particularly described,’ if also the inquiry is one the demanding agency is authorized by law to make and the materials specified are relevant.”  Oklahoma Press, supra, at 208. Notably, the Court held that a showing of probable cause was not necessary so long as “the investigation is authorized by Congress, is for a purpose Congress can order, and the documents sought are relevant to the inquiry.” Id., at 209.

Since Oklahoma Press, we have consistently hewed to that standard. See, e.g., Lone Steer, Inc., 464 U. S., at 414–415; United States v. Miller, 425 U. S. 435, 445–446 (1976); California Bankers Assn. v. Shultz, 416 U. S. 21,

67 (1974); United States v. Dionisio, 410 U. S. 1, 11–12 (1973); See v. Seattle, 387 U. S. 541, 544 (1967); United States v. Powell, 379 U. S. 48, 57–58 (1964); McPhaul v. United States, 364 U. S. 372, 382–383 (1960); United States v. Morton Salt Co., 338 U. S. 632, 652–653 (1950); cf. McLane Co. v. EEOC, 581 U. S. ___, ___ (2017) (slip op., at 11). By applying Oklahoma Press and thereby respecting “the traditional distinction between a search warrant and a subpoena,” Miller, supra, at 446, this Court has reinforced “the basic compromise” between “the public interest” in every man’s evidence and the private interest “of men to be free from officious meddling.”  Oklahoma Press, supra, at 213.

D

 Today, however, the majority inexplicably ignores the settled rule of Oklahoma Press in favor of a resurrected version of Boyd. That is mystifying. This should have been an easy case regardless of whether the Court looked to the original understanding of the Fourth Amendment or to our modern doctrine.

 As a matter of original understanding, the Fourth Amendment does not regulate the compelled production of documents at all. Here the Government received the relevant cell-site records pursuant to a court order compelling Carpenter’s cell service provider to turn them over.  That process is thus immune from challenge under the original understanding of the Fourth Amendment.

 As a matter of modern doctrine, this case is equally straightforward. As JUSTICE KENNEDY explains, no

search or seizure of Carpenter or his property occurred in this case. Ante, at 6–22; see also Part II, infra. But even if the majority were right that the Government “searched” Carpenter, it would at most be a “figurative or constructive search” governed by the Oklahoma Press standard, not an “actual search” controlled by the Fourth Amendment’s warrant requirement.

 And there is no doubt that the Government met the Oklahoma Press standard here. Under Oklahoma Press, a court order must “‘be sufficiently limited in scope, relevant  in purpose, and specific in directive so that compliance will not be unreasonably burdensome.’”   Lone Steer, Inc., supra, at 415.  Here, the type of order obtained by the Government almost necessarily satisfies that standard.  The Stored Communications Act allows a court to issue the relevant type of order “only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that . . . the records . . . sough[t] are relevant and material to an ongoing criminal investigation.” 18 U. S. C. §2703(d).  And the court “may quash or modify such order” if the provider objects that the “records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider.”  Ibid.  No such objection was made in this case, and Carpenter does not suggest that the orders contravened the Oklahoma Press standard in any other way.

 That is what makes the majority’s opinion so puzzling.  

It decides that a “search” of Carpenter occurred within the meaning of the Fourth Amendment, but then it leaps straight to imposing requirements that—until this point— have governed only actual searches and seizures.  See ante, at 18–19.  Lost in its race to the finish is any real recognition of the century’s worth of precedent it jeopardizes. For the majority, this case is apparently no different from one in which Government agents raided Carpenter’s home and removed records associated with his cell phone.  Against centuries of precedent and practice, all that the Court can muster is the observation that “this Court has never held that the Government may subpoena third parties for records in which the suspect has a reasonable expectation of privacy.”  Ante, at 19. Frankly, I cannot imagine a concession more damning to the Court’s argument than that.  As the Court well knows, the reason that we have never seen such a case is because—until today— defendants categorically had no “reasonable expectation of privacy” and no property interest in records belonging to third parties.  See Part II, infra.  By implying otherwise, the Court tries the nice trick of seeking shelter under the cover of precedents that it simultaneously perforates.  Not only that, but even if the Fourth Amendment permitted someone to object to the subpoena of a third party’s records, the Court cannot explain why that individual should be entitled to greater Fourth Amendment protection than the party actually being subpoenaed.  When parties are subpoenaed to turn over their records, after all, they will at most receive the protection afforded by Oklahoma Press even though they will own and have a reasonable expectation of privacy in the records at issue.  Under the Court’s decision, however, the Fourth Amendment will extend greater protections to someone else who is not being subpoenaed and does not own the records.  That outcome makes no sense, and the Court does not even attempt to defend it.

 We have set forth the relevant Fourth Amendment standard for subpoenaing business records many times over. Out of those dozens of cases, the majority cannot find even one that so much as suggests an exception to the Oklahoma Press standard for sufficiently personal information. Instead, we have always “described the constitutional requirements” for compulsory process as being

“‘settled’” and as applying categorically to all “‘subpoenas                               [of] corporate books or records.’”   Lone Steer, Inc., 464 U. S., at 415 (internal quotation marks omitted).  That standard, we have held, is “the most” protection the Fourth Amendment gives “to the production of corporate records and papers.”  Oklahoma Press, 327 U. S., at 208 (emphasis added).[15]  

 Although the majority announces its holding in the context of the Stored Communications Act, nothing stops its logic from sweeping much further.  The Court has offered no meaningful limiting principle, and none is apparent. Cf. Tr. of Oral Arg. 31 (Carpenter’s counsel admitting that “a grand jury subpoena . . . would be held to the same standard as any other subpoena or subpoenalike request for [cell-site] records”).

 Holding that subpoenas must meet the same standard as conventional searches will seriously damage, if not destroy, their utility. Even more so than at the founding, today the Government regularly uses subpoenas duces tecum and other forms of compulsory process to carry out its essential functions.  See, e.g., Dionisio, 410 U. S., at 11–12 (grand jury subpoenas); McPhaul, 364 U. S., at 382–383 (legislative subpoenas); Oklahoma Press, supra, at 208–209 (administrative subpoenas). Grand juries, for

——————

example, have long “compel[led] the production of evidence” in order to determine “whether there is probable cause to believe a crime has been committed.”  Calandra, 414 U. S., at 343 (emphasis added).  Almost by definition, then, grand juries will be unable at first to demonstrate “the probable cause required for a warrant.”  Ante, at 19 (majority opinion); see also Oklahoma Press, supra, at 213.  If they are required to do so, the effects are as predictable as they are alarming: Many investigations will sputter out at the start, and a host of criminals will be able to evade law enforcement’s reach.

 “To ensure that justice is done, it is imperative to the function of courts that compulsory process be available for the production of evidence.”  Nixon, 418 U. S., at 709.  For over a hundred years, we have understood that holding subpoenas to the same standard as actual searches and seizures “would stop much if not all of investigation in the public interest at the threshold of inquiry.”  Oklahoma Press, supra, at 213. Today a skeptical majority decides to  put that understanding to the test.

II

 Compounding its initial error, the Court also holds that a defendant has the right under the Fourth Amendment to object to the search of a third party’s property.  This holding flouts the clear text of the Fourth Amendment, and it cannot be defended under either a property-based interpretation of that Amendment or our decisions applying the reasonable-expectations-of-privacy test adopted in Katz, 389 U. S. 347.  By allowing Carpenter to object to the search of a third party’s property, the Court threatens to revolutionize a second and independent line of Fourth Amendment doctrine.

A

 It bears repeating that the Fourth Amendment guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects.”  (Emphasis added.) The Fourth Amendment does not confer rights with respect to the persons, houses, papers, and effects of others.  Its language makes clear that “Fourth Amendment rights are personal,” Rakas v. Illinois, 439 U. S. 128, 140 (1978), and as a result, this Court has long insisted that they “may not be asserted vicariously,” id., at 133.  It follows that a “person who is aggrieved . . . only through the introduction of damaging evidence secured by a search of a third person’s premises or property has not had any of his Fourth Amendment rights infringed.”  Id., at 134.

 In this case, as JUSTICE KENNEDY cogently explains, the cell-site records obtained by the Government belong to Carpenter’s cell service providers, not to Carpenter.  See ante, at 12–13. Carpenter did not create the cell-site records. Nor did he have possession of them; at all relevant times, they were kept by the providers.  Once Carpenter subscribed to his provider’s service, he had no right to prevent the company from creating or keeping the information in its records.  Carpenter also had no right to demand that the providers destroy the records, no right to prevent the providers from destroying the records, and, indeed, no right to modify the records in any way whatsoever (or to prevent the providers from modifying the records). Carpenter, in short, has no meaningful control over the cell-site records, which are created, maintained, altered, used, and eventually destroyed by his cell service providers.

 Carpenter responds by pointing to a provision of the Telecommunications Act that requires a provider to disclose cell-site records when a customer so requests.  See 47 U. S. C. §222(c)(2).  But a statutory disclosure requirement is hardly sufficient to give someone an ownership interest in the documents that must be copied and disclosed.  Many statutes confer a right to obtain copies of documents without creating any property right.3  

  Carpenter’s argument is particularly hard to swallow because nothing in the Telecommunications Act precludes cell service providers from charging customers a fee for accessing cell-site records.  See ante, at 12–13 (KENNEDY,  J., dissenting). It would be very strange if the owner of records were required to pay in order to inspect his own

——————

3 See, e.g., Freedom of Information Act, 5 U. S. C. §552(a) (“Each agency shall make available to the public information as follows . . .”); Privacy Act, 5 U. S. C. §552a(d)(1) (“Each agency that maintains a system of records shall . . . upon request by any individual to gain access to his record or to any information pertaining to him which is contained in the system, permit him and upon his request, a person of his own choosing to accompany him, to review the record and have a copy made of all or any portion thereof . . .”); Fair Credit Reporting Act, 15 U. S. C. §1681j(a)(1)(A) (“All consumer reporting agencies . . . shall make all disclosures pursuant to section 1681g of this title once during any 12-month period upon request of the consumer and without charge to the consumer”); Right to Financial Privacy Act of 1978, 12 U. S. C. §3404(c) (“The customer has the right . . . to obtain a copy of the record which the financial institution shall keep of all instances in which the customer’s record is disclosed to a Government authority pursuant to this section, including the identity of the Government authority to which such disclosure is made”); Government in the Sunshine Act, 5 U. S. C. §552b(f)(2) (“Copies of such transcript, or minutes, or a tran- scription of such recording disclosing the identity of each speaker, shall be furnished to any person at the actual cost of duplication or transcription”); Cable Act, 47 U. S. C. §551(d) (“A cable subscriber shall be provided access to all personally identifiable information regarding that subscriber which is collected and maintained by a cable operator”); Family Educational Rights and Privacy Act of 1974, 20 U. S. C. §1232g(a)(1)(A) (“No funds shall be made available under any applicable program to any educational agency or institution which has a policy of denying, or which effectively prevents, the parents of students who are or have been in attendance at a school of such agency or at such institution, as the case may be, the right to inspect and review the education records of their children. . . . Each educational agency or institution shall establish appropriate procedures for the granting of a request by parents for access to the education records of their children within a reasonable period of time, but in no case more than forty-five days after the request has been made”).

property.

 Nor does the Telecommunications Act give Carpenter a property right in the cell-site records simply because they are subject to confidentiality restrictions.  See 47 U. S. C. §222(c)(1) (without a customer’s permission, a cell service provider may generally “use, disclose, or permit access to individually identifiable [cell-site records]” only with respect to “its provision” of telecommunications services).  Many federal statutes impose similar restrictions on private entities’ use or dissemination of information in

their own records without conferring a property right on third parties.4  

——————

  • See, g., Family Educational Rights and Privacy Act, 20 U. S. C. §1232g(b)(1) (“No funds shall be made available under any applicable program to any educational agency or institution which has a policy or practice of permitting the release of education records (or personally identifiable information contained therein other than directory information . . . ) of students without the written consent of their parents to any individual, agency, or organization . . .”); Video Privacy Protection Act, 18 U. S. C. §2710(b)(1) (“A video tape service provider who knowingly discloses, to any person, personally identifiable information concerning any consumer of such provider shall be liable to the aggrieved person for the relief provided in subsection (d)”); Driver Privacy Protection Act, 18 U. S. C. §2721(a)(1) (“A State department of motor vehicles, and any officer, employee, or contractor thereof, shall not knowingly disclose or otherwise make available to any person or entity . . . personal information . . .”); Fair Credit Reporting Act, 15 U. S. C. §1681b(a) (“[A]ny consumer reporting agency may furnish a consumer report under the following circumstances and no other . . .”); Right to Financial Privacy Act, 12 U. S. C. §3403(a) (“No financial institution, or officer, employees, or agent of a financial institution, may provide to any Government authority access to or copies of, or the information contained in, the financial records of any customer except in accordance with the provisions of this chapter”); Patient Safety and Quality Improvement Act, 42 U. S. C. §299b–22(b) (“Notwithstanding any other provision of Federal, State, or local law, and subject to subsection (c) of this section, patient safety work product shall be confidential and shall not be disclosed”); Cable Act, 47 U. S. C. §551(c)(1) (“[A] cable operator shall not disclose personally identifiable information concerning any subscriber without the prior written or electronic consent of the sub-

 It would be especially strange to hold that the Telecommunication Act’s confidentiality provision confers a property right when the Act creates an express exception for any disclosure of records that is “required by law.” 47 U. S. C. §222(c)(1).  So not only does Carpenter lack “‘the  most essential and beneficial’” of the “‘constituent elements’” of property,  Dickman v. Commissioner, 465 U. S. 330, 336 (1984)—i.e., the right to use the property to the exclusion of others—but he cannot even exclude the party he would most like to keep out, namely, the Government.5   For all these reasons, there is no plausible ground for maintaining that the information at issue here represents Carpenter’s “papers” or “effects.”[16]  

——————

scriber concerned and shall take such actions as are necessary to prevent unauthorized access to such information by a person other than the subscriber or cable operator”).

  • Carpenter also cannot argue that he owns the cell-site records merely because they fall into the category of records referred to as “customer proprietary network information.” 47 U. S. C. §222(c).  Even assuming labels alone can confer property rights, nothing in this particular label indicates whether the “information” is “proprietary” to the “customer” or to the provider of the “network.”  At best, the phrase “customer proprietary network information” is ambiguous, and context makes clear that it refers to the provider’s information. The Telecommunications Act defines the term to include all “information that relates to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier, and that is made available to the carrier by the customer solely by virtue of the carrier-customer relationship.”  47 U. S. C. §222(h)(1)(A).  For Carpenter to be right, he must own not only the cell-site records in this case, but also records relating to, for example, the “technical configuration” of his subscribed service—records that presumably include such intensely personal and private information as transmission wavelengths, transport protocols, and link layer system configurations.

B

 In the days when this Court followed an exclusively property-based approach to the Fourth Amendment, the distinction between an individual’s Fourth Amendment rights and those of a third party was clear cut.  We first asked whether the object of the search—say, a house, papers, or effects—belonged to the defendant, and, if it did, whether the Government had committed a “trespass” in acquiring the evidence at issue. Jones, 565 U. S., at 411, n. 8.

 When the Court held in Katz that “property rights are not the sole measure of Fourth Amendment violations,” Soldal v. Cook County, 506 U. S. 56, 64 (1992), the sharp boundary between personal and third-party rights was tested. Under Katz, a party may invoke the Fourth Amendment whenever law enforcement officers violate the party’s “justifiable” or “reasonable” expectation of privacy.  See 389 U. S., at 353; see also id., at 361 (Harlan, J., concurring) (applying the Fourth Amendment where “a person [has] exhibited an actual (subjective) expectation of privacy” and where that “expectation [is] one that society is prepared to recognize as ‘reasonable’”). Thus freed from  the limitations imposed by property law, parties began to argue that they had a reasonable expectation of privacy in items owned by others. After all, if a trusted third party took care not to disclose information about the person in question, that person might well have a reasonable expectation that the information would not be revealed.

 Efforts to claim Fourth Amendment protection against searches of the papers and effects of others came to a head in Miller, 425 U. S. 435, where the defendant sought the suppression of two banks’ microfilm copies of his checks, deposit slips, and other records. The defendant did not  claim that he owned these documents, but he nonetheless argued that “analysis of ownership, property rights and possessory interests in the determination of Fourth Amendment rights ha[d] been severely impeached” by Katz and other recent cases.  See Brief for Respondent in United States v. Miller, O. T. 1975, No. 74–1179, p. 6.  Turning to Katz, he then argued that he had a reasonable expectation of privacy in the banks’ records regarding his accounts. Brief for Respondent in No. 74–1179, at 6; see also Miller, supra, at 442–443.

 Acceptance of this argument would have flown in the face of the Fourth Amendment’s text, and the Court rejected that development.  Because Miller gave up “dominion and control” of the relevant information to his bank, Rakas, 439 U. S., at 149, the Court ruled that he lost any protected Fourth Amendment interest in that information.  See Miller, supra, at 442–443.  Later, in Smith v. Maryland, 442 U. S. 735, 745 (1979), the Court reached a similar conclusion regarding a telephone company’s records of a customer’s calls.  As JUSTICE KENNEDY concludes, Miller and Smith are thus best understood as placing “necessary limits on the ability of individuals to assert Fourth Amendment interests in property to which they lack a ‘requisite connection.’”  Ante, at 8.

 The same is true here, where Carpenter indisputably lacks any meaningful property-based connection to the cell-site records owned by his provider.  Because the records are not Carpenter’s in any sense, Carpenter may not seek to use the Fourth Amendment to exclude them.  By holding otherwise, the Court effectively allows Carpenter to object to the “search” of a third party’s property, not recognizing the revolutionary nature of this change.  The Court seems to think that Miller and Smith invented a new “doctrine”—“the third-party doctrine”—and the Court refuses to “extend” this product of the 1970’s to a new age of digital communications. Ante, at 11, 17. But the Court fundamentally misunderstands the role of Miller and Smith. Those decisions did not forge a new doctrine; instead, they rejected an argument that would have disregarded the clear text of the Fourth Amendment and a formidable body of precedent.

 In the end, the Court never explains how its decision can be squared with the fact that the Fourth Amendment protects only “[t]he right of the people to be secure in their persons, houses, papers, and effects.” (Emphasis added.)

*  *  *

 Although the majority professes a desire not to “‘embar- rass the future,’”  ante, at 18, we can guess where today’s decision will lead.

 One possibility is that the broad principles that the Court seems to embrace will be applied across the board. All subpoenas duces tecum and all other orders compelling the production of documents will require a demonstration of probable cause, and individuals will be able to claim a protected Fourth Amendment interest in any sensitive personal information about them that is collected and owned by third parties. Those would be revolutionary developments indeed.

 The other possibility is that this Court will face the embarrassment of explaining in case after case that the principles on which today’s decision rests are subject to all sorts of qualifications and limitations that have not yet been discovered.  If we take this latter course, we will inevitably end up “mak[ing] a crazy quilt of the Fourth Amendment.” Smith, supra, at 745.

 All of this is unnecessary.  In the Stored Communications Act, Congress addressed the specific problem at issue in this case. The Act restricts the misuse of cell-site records by cell service providers, something that the Fourth Amendment cannot do.  The Act also goes beyond current Fourth Amendment case law in restricting access by law enforcement. It permits law enforcement officers to acquire cell-site records only if they meet a heightened standard and obtain a court order.  If the American people now think that the Act is inadequate or needs updating, they can turn to their elected representatives to adopt more protective provisions.  Because the collection and storage of cell-site records affects nearly every American, it is unlikely that the question whether the current law requires strengthening will escape Congress’s notice.    Legislation is much preferable to the development of an entirely new body of Fourth Amendment caselaw for many reasons, including the enormous complexity of the subject, the need to respond to rapidly changing technology, and the Fourth Amendment’s limited scope.  The Fourth Amendment restricts the conduct of the Federal Government and the States; it does not apply to private actors.  But today, some of the greatest threats to individual privacy may come from powerful private companies that collect and sometimes misuse vast quantities of data about the lives of ordinary Americans.  If today’s decision encourages the public to think that this Court can protect them from this looming threat to their privacy, the decision will mislead as well as disrupt. And if holding a provision of the Stored Communications Act to be unconstitutional dissuades Congress from further legislation in this field, the goal of protecting privacy will be greatly disserved.

 The desire to make a statement about privacy in the digital age does not justify the consequences that today’s decision is likely to produce.

 

SUPREME COURT OF THE UNITED STATES

_________________

No. 16–402

_________________

TIMOTHY IVORY CARPENTER, PETITIONER v.   UNITED STATES   

ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF  APPEALS FOR THE SIXTH CIRCUIT   

[June 22, 2018]  

JUSTICE GORSUCH, dissenting.

 In the late 1960s this Court suggested for the first time that a search triggering the Fourth Amendment occurs when the government violates an “expectation of privacy” that “society is prepared to recognize as ‘reasonable.’”   Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring).  Then, in a pair of decisions in the 1970s applying the Katz test, the Court held that a “reasonable expectation of privacy” doesn’t attach to information shared with “third parties.” See Smith v. Maryland, 442 U. S. 735, 743–744 (1979); United States v. Miller, 425 U. S. 435, 443 (1976).  By these steps, the Court came to conclude, the Constitution does nothing to limit investigators from searching records you’ve entrusted to your bank, accountant, and maybe even your doctor.

 What’s left of the Fourth Amendment?  Today we use the Internet to do most everything.  Smartphones make it easy to keep a calendar, correspond with friends, make calls, conduct banking, and even watch the game.  Countless Internet companies maintain records about us and, increasingly, for us. Even our most private documents— those that, in other eras, we would have locked safely in a desk drawer or destroyed—now reside on third party servers. Smith and Miller teach that the police can review all of this material, on the theory that no one reasonably expects any of it will be kept private.  But no one believes that, if they ever did.

 What to do?  It seems to me we could respond in at least three ways.  The first is to ignore the problem, maintain Smith and Miller, and live with the consequences.  If the confluence of these decisions and modern technology means our Fourth Amendment rights are reduced to nearly nothing, so be it.  The second choice is to set Smith and Miller aside and try again using the Katz “reasonable expectation of privacy” jurisprudence that produced them.  The third is to look for answers elsewhere.

*

 Start with the first option.  Smith held that the government’s use of a pen register to record the numbers people dial on their phones doesn’t infringe a reasonable expectation of privacy because that information is freely disclosed to the third party phone company.  442 U. S., at 743–744.  Miller held that a bank account holder enjoys no reason- able expectation of privacy in the bank’s records of his account activity.  That’s true, the Court reasoned, “even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.” 425 U. S., at 443. Today the Court suggests that Smith and Miller distinguish between kinds of information disclosed to third parties and require courts to decide whether to “extend” those decisions to particular classes of information, depending on their sensitivity. See ante, at 10–18.  But as the Sixth Circuit recognized and JUSTICE KENNEDY explains, no balancing test of this kind can be found in Smith and Miller. See ante, at 16 (dissenting opinion).  Those cases announced a categorical rule: Once you disclose information to third parties, you forfeit any reason- able expectation of privacy you might have had in it.  And even if Smith and Miller did permit courts to conduct a balancing contest of the kind the Court now suggests, it’s still hard to see how that would help the petitioner in this case. Why is someone’s location when using a phone so much more sensitive than who he was talking to (Smith) or what financial transactions he engaged in (Miller)? I do not know and the Court does not say.

 The problem isn’t with the Sixth Circuit’s application of Smith and Miller but with the cases themselves.  Can the government demand a copy of all your e-mails from Google or Microsoft without implicating your Fourth Amendment rights?  Can it secure your DNA from 23andMe without a warrant or probable cause?  Smith and Miller say yes it can—at least without running afoul of Katz. But that result strikes most lawyers and judges today—me in- cluded—as pretty unlikely.  In the years since its adoption, countless scholars, too, have come to conclude that the “third-party doctrine is not only wrong, but horribly wrong.” Kerr, The Case for the Third-Party Doctrine, 107 Mich. L. Rev. 561, 563, n. 5, 564 (2009) (collecting criticisms but defending the doctrine (footnotes omitted)).  The reasons are obvious. “As an empirical statement about  subjective expectations of privacy,” the doctrine is “quite dubious.” Baude & Stern, The Positive Law Model of the Fourth Amendment, 129 Harv. L. Rev. 1821, 1872 (2016).  People often do reasonably expect that information they entrust to third parties, especially information subject to confidentiality agreements, will be kept private.  Meanwhile, if the third party doctrine is supposed to represent a normative assessment of when a person should expect privacy, the notion that the answer might be “never” seems a pretty unattractive societal prescription.  Ibid.  What, then, is the explanation for our third party doctrine? The truth is, the Court has never offered a persuasive justification. The Court has said that by conveying information to a third party you “‘assum[e] the risk’” it   will be revealed to the police and therefore lack a reason- able expectation of privacy in it.  Smith, supra, at 744. But  assumption of risk doctrine developed in tort law.  It generally applies when “by contract or otherwise [one] expressly agrees to accept a risk of harm” or impliedly does so by “manifest[ing] his willingness to accept” that risk and thereby “take[s] his chances as to harm which may result from it.” Restatement (Second) of Torts §§496B, 496C(1), and Comment b (1965); see also 1 D. Dobbs, P. Hayden, & E. Bublick, Law of Torts §§235–236, pp. 841–850 (2d ed. 2017).  That rationale has little play in this context. Suppose I entrust a friend with a letter and he promises to keep it secret until he delivers it to an intended recipient. In what sense have I agreed to bear the risk that he will turn around, break his promise, and spill its contents to someone else?  More confusing still, what have I done to “manifest my willingness to accept” the risk that the government will pry the document from my friend and read it without his consent?

 One possible answer concerns knowledge.  I know that my friend might break his promise, or that the government might have some reason to search the papers in his possession.  But knowing about a risk doesn’t mean you assume responsibility for it.  Whenever you walk down the sidewalk you know a car may negligently or recklessly veer off and hit you, but that hardly means you accept the consequences and absolve the driver of any damage he may do to you.  Epstein, Privacy and the Third Hand: Lessons From the Common Law of Reasonable Expectations, 24 Berkeley Tech. L. J. 1199, 1204 (2009); see W. Keeton, D. Dobbs, R. Keeton, & D. Owen, Prosser & Keeton on Law of Torts 490 (5th ed. 1984).

 Some have suggested the third party doctrine is better understood to rest on consent than assumption of risk.  “So long as a person knows that they are disclosing information to a third party,” the argument goes, “their choice to do so is voluntary and the consent valid.”  Kerr, supra, at 588. I confess I still don’t see it.  Consenting to give a third party access to private papers that remain my property is not the same thing as consenting to a search of those papers by the government. Perhaps there are exceptions, like when the third party is an undercover government agent. See Murphy, The Case Against the Case Against the Third-Party Doctrine: A Response to Epstein and Kerr, 24 Berkeley Tech. L. J. 1239, 1252 (2009); cf. Hoffa v. United States, 385 U. S. 293 (1966).  But otherwise this conception of consent appears to be just assumption of risk relabeled—you’ve “consented” to whatever risks are foreseeable.

 Another justification sometimes offered for third party doctrine is clarity. You (and the police) know exactly how much protection you have in information confided to others: none. As rules go, “the king always wins” is admi- rably clear.  But the opposite rule would be clear too: Third party disclosures never diminish Fourth Amendment protection (call it “the king always loses”).  So clarity alone cannot justify the third party doctrine.

 In the end, what do Smith and Miller add up to?  A doubtful application of Katz that lets the government search almost whatever it wants whenever it wants.  The Sixth Circuit had to follow that rule and faithfully did just that, but it’s not clear why we should.

*

 There’s a second option. What if we dropped Smith and Miller’s third party doctrine and retreated to the root Katz question whether there is a “reasonable expectation of privacy” in data held by third parties?  Rather than solve the problem with the third party doctrine, I worry this option only risks returning us to its source: After all, it was Katz that produced Smith and Miller in the first place.

 Katz’s problems start with the text and original understanding of the Fourth Amendment, as JUSTICE THOMAS  thoughtfully explains today.  Ante, at 5–17 (dissenting opinion). The Amendment’s protections do not depend on the breach of some abstract “expectation of privacy” whose contours are left to the judicial imagination.  Much more concretely, it protects your “person,” and your “houses, papers, and effects.” Nor does your right to bring a Fourth Amendment claim depend on whether a judge happens to agree that your subjective expectation to privacy is a “reasonable” one. Under its plain terms, the Amendment grants you the right to invoke its guarantees whenever one of your protected things (your person, your house, your papers, or your effects) is unreasonably searched or seized.  Period.

 History too holds problems for Katz. Little like it can be found in the law that led to the adoption of the Fourth Amendment or in this Court’s jurisprudence until the late 1960s. The Fourth Amendment came about in response to a trio of 18th century cases “well known to the men who wrote and ratified the Bill of Rights, [and] famous throughout the colonial population.”  Stuntz, The Substantive Origins of Criminal Procedure, 105 Yale L. J. 393, 397 (1995). The first two were English cases invalidating the Crown’s use of general warrants to enter homes and search papers. Entick v. Carrington, 19 How. St. Tr. 1029 (K. B. 1765); Wilkes v. Wood, 19 How. St. Tr. 1153 (K. B. 1763); see W. Cuddihy, The Fourth Amendment: Origins and Original Meaning 439–487 (2009); Boyd v. United States, 116 U. S. 616, 625–630 (1886).  The third was American: the Boston Writs of Assistance Case, which sparked colonial outrage at the use of writs permitting government agents to enter houses and business, breaking open doors and chests along the way, to conduct searches and seizures—and to force third parties to help them.  Stuntz, supra, at 404–409; M. Smith, The Writs of Assistance Case (1978). No doubt the colonial outrage engendered by these cases rested in part on the government’s intrusion upon privacy.  But the framers chose not to protect privacy in some ethereal way dependent on judicial intuitions.  They chose instead to protect privacy in particular places and things—“persons, houses, papers, and effects”—and against particular threats—“unreasonable” governmental “searches and seizures.”  See Entick, supra, at 1066 (“Papers are the owner’s goods and chattels; they are his dearest property; and so far from enduring a seizure, that they will hardly bear an inspection”); see also ante, at 1–21 (THOMAS, J., dissenting).   

 Even taken on its own terms, Katz has never been sufficiently justified. In fact, we still don’t even know what its “reasonable expectation of privacy” test is. Is it supposed  to pose an empirical question (what privacy expectations do people actually have) or a normative one (what expectations should they have)? Either way brings problems.  If the test is supposed to be an empirical one, it’s unclear why judges rather than legislators should conduct it.  Legislators are responsive to their constituents and have institutional resources designed to help them discern and enact majoritarian preferences.  Politically insulated judges come armed with only the attorneys’ briefs, a few law clerks, and their own idiosyncratic experiences.  They are hardly the representative group you’d expect (or want) to be making empirical judgments for hundreds of millions of people. Unsurprisingly, too, judicial judgments often fail to reflect public views.  See Slobogin & Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at “Understandings Recognized and Permitted by Society,” 42 Duke L. J. 727, 732, 740–742 (1993). Consider just one example.  Our cases insist that the seriousness of the offense being investigated does not reduce Fourth Amendment protection. Mincey v. Arizona, 437 U. S. 385, 393–394 (1978).  Yet scholars suggest that most people are more tolerant of police intrusions when they investigate more serious crimes. See Blumenthal, Adya, & Mogle, The Multiple Dimensions of Privacy: Testing Lay “Expectations of Privacy,” 11 U. Pa. J. Const. L. 331, 352–353 (2009).  And I very much doubt that this Court would be willing to adjust its Katz cases to reflect these findings even if it believed them.

 Maybe, then, the Katz test should be conceived as a normative question.  But if that’s the case, why (again) do judges, rather than legislators, get to determine whether society should be prepared to recognize an expectation of privacy as legitimate?  Deciding what privacy interests should be recognized often calls for a pure policy choice, many times between incommensurable goods—between the value of privacy in a particular setting and society’s interest in combating crime.  Answering questions like that calls for the exercise of raw political will belonging to legislatures, not the legal judgment proper to courts.  See The Federalist No. 78, p. 465 (C. Rossiter ed. 1961) (A. Hamilton). When judges abandon legal judgment for political will we not only risk decisions where “reasonable expectations of privacy” come to bear “an uncanny resemblance to those expectations of privacy” shared by Members of this Court. Minnesota v. Carter, 525 U. S. 83, 97 (1998) (Scalia, J., concurring).  We also risk undermining public confidence in the courts themselves.

 My concerns about Katz come with a caveat. Sometimes, I accept, judges may be able to discern and describe existing societal norms. See, e.g., Florida v. Jardines, 569 U. S. 1, 8 (2013) (inferring a license to enter on private property from the “‘habits of the country’” (quoting   McKee v. Gratz, 260 U. S. 127, 136 (1922))); Sachs, Finding Law, 107 Cal. L. Rev. (forthcoming 2019), online at https://ssrn.com/ abstract=3064443 (as last visited June 19, 2018).  That is particularly true when the judge looks to positive law rather than intuition for guidance on social norms.  See Byrd v. United States, 584 U. S. ___, ___–___ (2018) (slip op., at 7–9) (“general property-based concept[s] guid[e] the resolution of this case”). So there may be some occasions where Katz is capable of principled application—though it may simply wind up approximating the more traditional option I will discuss in a moment. Sometimes it may also be possible to apply Katz by analogizing from precedent when the line between an existing case and a new fact pattern is short and direct. But so far this Court has declined to tie itself to any significant restraints like these. See ante, at 5, n. 1 (“[W]hile property rights are often informative, our cases by no means suggest that such an interest is ‘fundamental’ or ‘dispositive’ in determining which expectations of privacy are legitimate”).  As a result, Katz has yielded an often unpredictable— and sometimes unbelievable—jurisprudence. Smith and Miller are only two examples; there are many others.  Take Florida v. Riley, 488 U. S. 445 (1989), which says that a police helicopter hovering 400 feet above a person’s property invades no reasonable expectation of privacy.  Try that one out on your neighbors.  Or California v. Greenwood, 486 U. S. 35 (1988), which holds that a person has no reasonable expectation of privacy in the garbage he puts out for collection.  In that case, the Court said that the homeowners forfeited their privacy interests because “[i]t is common knowledge that plastic garbage bags left on or at the side of a public street are readily accessible to animals, children, scavengers, snoops, and other members of the public.”  Id., at 40 (footnotes omitted). But the habits of raccoons don’t prove much about the habits of the country. I doubt, too, that most people spotting a neighbor rummaging through their garbage would think they lacked reasonable grounds to confront the rummager.  Making the decision all the stranger, California state law expressly protected a homeowner’s property rights in discarded trash. Id., at 43.  Yet rather than defer to that as evidence of the people’s habits and reasonable expectations of privacy, the Court substituted its own curious judgment.

 Resorting to Katz in data privacy cases threatens more of the same. Just consider. The Court today says that judges should use Katz’s reasonable expectation of privacy test to decide what Fourth Amendment rights people have in cell-site location information, explaining that “no single rubric definitively resolves which expectations of privacy are entitled to protection.”  Ante, at 5. But then it offers a twist. Lower courts should be sure to add two special principles to their Katz calculus: the need to avoid “arbitrary power” and the importance of “plac[ing] obstacles in the way of a too permeating police surveillance.”  Ante, at 6 (internal quotation marks omitted).  While surely laudable, these principles don’t offer lower courts much guidance. The Court does not tell us, for example, how far to carry either principle or how to weigh them against the legitimate needs of law enforcement.  At what point does access to electronic data amount to “arbitrary” authority?  When does police surveillance become “too permeating”?  And what sort of “obstacles” should judges “place” in law enforcement’s path when it does?  We simply do not know.  The Court’s application of these principles supplies little more direction.  The Court declines to say whether there is any sufficiently limited period of time “for which the Government may obtain an individual’s historical [location information] free from Fourth Amendment scrutiny.”  Ante, at 11, n. 3; see ante, at 11–15.  But then it tells us that access to seven days’ worth of information does trigger Fourth Amendment scrutiny—even though here the carrier “produced only two days of records.”  Ante, at 11, n. 3.  Why is the relevant fact the seven days of information the government asked for instead of the two days of information the government actually saw?  Why seven days instead of ten or three or one?  And in what possible sense did the government “search” five days’ worth of location information it was never even sent?  We do not know.  Later still, the Court adds that it can’t say whether the Fourth Amendment is triggered when the government collects “real-time CSLI or ‘tower dumps’ (a download of information on all the devices that connected to a particular cell site during a particular interval).”  Ante, at 17–18.  But what distinguishes historical data from real-time data, or seven days of a single person’s data from a download of everyone’s data over some indefinite period of time? Why isn’t a tower dump the paradigmatic example of “too permeating police surveillance” and a dangerous tool of “arbitrary” authority—the touchstones of the majority’s modified Katz analysis? On what possible basis could such mass data collection survive the Court’s test while collecting a single person’s data does not?  Here again we are left to guess. At the same time, though, the Court offers some firm assurances. It tells us its decision does not “call into question conventional surveillance techniques and tools, such as security cameras.”  Ibid.  That, however, just raises more questions for lower courts to sort out about what techniques qualify as “conventional” and why those techniques would be okay even if they lead to “permeating police surveillance” or “arbitrary police power.”  Nor is this the end of it.  After finding a reasonable expectation of privacy, the Court says there’s still more work to do. Courts must determine whether to “extend” Smith and Miller to the circumstances before them.  Ante, at 11, 15–17.  So apparently Smith and Miller aren’t quite left for dead; they just no longer have the clear reach they once did. How do we measure their new reach?  The Court says courts now must conduct a second Katz-like balancing inquiry, asking whether the fact of disclosure to a third party outweighs privacy interests in the “category of information” so disclosed.  Ante, at 13, 15–16.  But how are lower courts supposed to weigh these radically different interests? Or assign values to different categories of information?  All we know is that historical cell-site location information (for seven days, anyway) escapes Smith and Miller’s shorn grasp, while a lifetime of bank or phone records does not.  As to any other kind of information, lower courts will have to stay tuned.

 In the end, our lower court colleagues are left with two amorphous balancing tests, a series of weighty and incommensurable principles to consider in them, and a few illustrative examples that seem little more than the product of judicial intuition.  In the Court’s defense, though, we have arrived at this strange place not because the Court has misunderstood Katz. Far from it. We have arrived here because this is where Katz inevitably leads.

*

 There is another way.  From the founding until the 1960s, the right to assert a Fourth Amendment claim didn’t depend on your ability to appeal to a judge’s per- sonal sensibilities about the “reasonableness” of your expectations or privacy.  It was tied to the law.   Jardines, 569 U. S., at 11; United States v. Jones, 565 U. S. 400, 405 (2012). The Fourth Amendment protects “the right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures.” True to those words and their original understanding, the traditional approach asked if a house, paper or effect was yours under law.  No more was needed to trigger the Fourth Amendment. Though now often lost in Katz’s shadow, this traditional understanding persists. Katz only “supplements, rather than displaces the traditional propertybased understanding of the Fourth Amendment.”  Byrd, 584 U. S., at ___ (slip op., at 7) (internal quotation marks omitted); Jardines, supra, at 11 (same); Soldal v. Cook County, 506 U. S. 56, 64 (1992) (Katz did not “snuf[f] out  the previously recognized protection for property under the Fourth Amendment”).

 Beyond its provenance in the text and original understanding of the Amendment, this traditional approach comes with other advantages. Judges are supposed to decide cases based on “democratically legitimate sources of law”—like positive law or analogies to items protected by the enacted Constitution—rather than “their own biases or personal policy preferences.” Pettys, Judicial Discretion in Constitutional Cases, 26 J. L. & Pol. 123, 127 (2011). A Fourth Amendment model based on positive legal rights “carves out significant room for legislative participation in the Fourth Amendment context,” too, by asking judges to consult what the people’s representatives have to say about their rights.  Baude & Stern, 129 Harv. L. Rev., at 1852. Nor is this approach hobbled by Smith and Miller, for those cases are just limitations on Katz, addressing only the question whether individuals have a reasonable expectation of privacy in materials they share with third parties. Under this more traditional approach, Fourth Amendment protections for your papers and effects do not automatically disappear just because you share them with third parties.

 Given the prominence Katz has claimed in our doctrine, American courts are pretty rusty at applying the traditional approach to the Fourth Amendment.  We know that if a house, paper, or effect is yours, you have a Fourth Amendment interest in its protection. But what kind of legal interest is sufficient to make something yours? And what source of law determines that?  Current positive law? The common law at 1791, extended by analogy to modern times? Both? See Byrd, supra, at ___–___ (slip op., at 1–2) (THOMAS, J., concurring); cf. Re, The Positive  Law Floor, 129 Harv. L. Rev. Forum 313 (2016).  Much work is needed to revitalize this area and answer these questions. I do not begin to claim all the answers today,  but (unlike with Katz) at least I have a pretty good idea what the questions are.  And it seems to me a few things  can be said.

 First, the fact that a third party has access to or possession of your papers and effects does not necessarily eliminate your interest in them. Ever hand a private document to a friend to be returned?  Toss your keys to a valet at a restaurant? Ask your neighbor to look after your dog while you travel? You would not expect the friend to share the document with others; the valet to lend your car to his buddy; or the neighbor to put Fido up for adoption.  Entrusting your stuff to others is a bailment. A bailment is the “delivery of personal property by one person (the bailor) to another (the bailee) who holds the property for a  certain purpose.” Black’s Law Dictionary 169 (10th ed. 2014); J. Story, Commentaries on the Law of Bailments §2, p. 2 (1832) (“a bailment is a delivery of a thing in trust for some special object or purpose, and upon a contract, expressed or implied, to conform to the object or purpose of the trust”).  A bailee normally owes a legal duty to keep the item safe, according to the terms of the parties’ contract if they have one, and according to the “implication[s] from their conduct” if they don’t. 8 C. J. S., Bailments §36, pp. 468–469 (2017). A bailee who uses the item in a different way than he’s supposed to, or against the bailor’s instructions, is liable for conversion. Id., §43, at 481; see Goad v. Harris, 207 Ala. 357, 92 So. 546, (1922); Knight v. Seney, 290 Ill. 11, 17, 124 N. E. 813, 815–816 (1919); Baxter v. Woodward, 191 Mich. 379, 385, 158 N. W. 137, 139 (1916). This approach is quite different from Smith and Miller’s (counter)-intuitive approach to reasonable expectations of privacy; where those cases extinguish Fourth Amendment interests once records are given to a third party, property law may preserve them.

 Our Fourth Amendment jurisprudence already reflects this truth. In Ex parte Jackson, 96 U. S. 727 (1878), this Court held that sealed letters placed in the mail are “as fully guarded from examination and inspection, except as to their outward form and weight, as if they were retained by the parties forwarding them in their own domiciles.”  Id., at 733. The reason, drawn from the Fourth Amendment’s text, was that “[t]he constitutional guaranty of the right of the people to be secure in their papers against unreasonable searches and seizures extends to their papers, thus closed against inspection, wherever they may be.” Ibid. (emphasis added). It did not matter that letters were bailed to a third party (the government, no less).  The sender enjoyed the same Fourth Amendment protection as he does “when papers are subjected to search in one’s own household.” Ibid.

 These ancient principles may help us address modern data cases too. Just because you entrust your data—in some cases, your modern-day papers and effects—to a third party may not mean you lose any Fourth Amendment interest in its contents. Whatever may be left of Smith and Miller, few doubt that e-mail should be treated much like the traditional mail it has largely supplanted— as a bailment in which the owner retains a vital and protected legal interest. See ante, at 13 (KENNEDY, J., dissenting) (noting that enhanced Fourth Amendment protection may apply when the “modern-day equivalents of an individual’s own ‘papers’ or ‘effects’ . . . are held by a third party” through “bailment”); ante, at 23, n. 6 (ALITO,  J., dissenting) (reserving the question whether Fourth Amendment protection may apply in the case of “bailment” or when “someone has entrusted papers he or she owns . . . to the safekeeping of another”); United States v. Warshak, 631 F. 3d 266, 285–286 (CA6 2010) (relying on an analogy to Jackson to extend Fourth Amendment protection to e-mail held by a third party service provider).  Second, I doubt that complete ownership or exclusive control of property is always a necessary condition to the assertion of a Fourth Amendment right.  Where houses are concerned, for example, individuals can enjoy Fourth Amendment protection without fee simple title.  Both the text of the Amendment and the common law rule support that conclusion. “People call a house ‘their’ home when legal title is in the bank, when they rent it, and even when they merely occupy it rent free.”  Carter, 525 U. S., at 95– 96 (Scalia, J., concurring). That rule derives from the common law. Oystead v. Shed, 13 Mass. 520, 523 (1816) (explaining, citing “[t]he very learned judges, Foster, Hale, and Coke,” that the law “would be as much disturbed by a forcible entry to arrest a boarder or a servant, who had acquired, by contract, express or implied, a right to enter the house at all times, and to remain in it as long as they please, as if the object were to arrest the master of the house or his children”).  That is why tenants and resident family members—though they have no legal title—have standing to complain about searches of the houses in which they live.  Chapman v. United States, 365 U. S. 610, 616–617 (1961), Bumper v. North Carolina, 391 U. S. 543, 548, n. 11 (1968).

 Another point seems equally true: just because you have to entrust a third party with your data doesn’t necessarily mean you should lose all Fourth Amendment protections in it. Not infrequently one person comes into possession of someone else’s property without the owner’s consent.  Think of the finder of lost goods or the policeman who impounds a car. The law recognizes that the goods and the car still belong to their true owners, for “where a person comes into lawful possession of the personal property of another, even though there is no formal agreement between the property’s owner and its possessor, the possessor will become a constructive bailee when justice so requires.” Christensen v. Hoover, 643 P. 2d 525, 529 (Colo. 1982) (en banc); Laidlaw, Principles of Bailment, 16 Cornell L. Q. 286 (1931). At least some of this Court’s decisions have already suggested that use of technology is functionally compelled by the demands of modern life, and in that way the fact that we store data with third parties may amount to a sort of involuntary bailment too.  See ante, at 12–13 (majority opinion); Riley v. California, 573 U. S. ___, ___ (2014) (slip op., at 9).

 Third, positive law may help provide detailed guidance on evolving technologies without resort to judicial intuition. State (or sometimes federal) law often creates rights in both tangible and intangible things.  See Ruckelshaus v. Monsanto Co., 467 U. S. 986, 1001 (1984). In the context of the Takings Clause we often ask whether those statecreated rights are sufficient to make something someone’s property for constitutional purposes.  See id., at 1001– 1003; Louisville Joint Stock Land Bank v. Radford, 295 U. S. 555, 590–595 (1935). A similar inquiry may be appropriate for the Fourth Amendment.  Both the States and federal government are actively legislating in the area of third party data storage and the rights users enjoy.  See, e.g., Stored Communications Act, 18 U. S. C. §2701 et seq.; Tex. Prop. Code Ann. §111.004(12) (West 2017) (defining “[p]roperty” to include “property held in any digital or electronic medium”).  State courts are busy expounding common law property principles in this area as well. E.g., Ajemian v. Yahoo!, Inc., 478 Mass. 169, 170, 84 N. E. 3d 766, 768 (2017) (e-mail account is a “form of property often referred to as a ‘digital asset’ ”);  Eysoldt v. ProScan Imaging, 194 Ohio App. 3d 630, 638, 2011–Ohio– 2359, 957 N. E. 2d 780, 786 (2011) (permitting action for conversion of web account as intangible property). If state legislators or state courts say that a digital record has the attributes that normally make something property, that may supply a sounder basis for judicial decisionmaking than judicial guesswork about societal expectations.  Fourth, while positive law may help establish a person’s Fourth Amendment interest there may be some circumstances where positive law cannot be used to defeat it.  

Ex parte Jackson reflects that understanding. There this Court said that “[n]o law of Congress” could authorize letter carriers “to invade the secrecy of letters.”  96 U. S., at 733. So the post office couldn’t impose a regulation dictating that those mailing letters surrender all legal interests in them once they’re deposited in a mailbox.  If that is right, Jackson suggests the existence of a constitutional floor below which Fourth Amendment rights may not descend. Legislatures cannot pass laws declaring your house or papers to be your property except to the extent the police wish to search them without cause.  As the Court has previously explained, “we must ‘assur[e] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.’”  Jones, 565 U. S., at 406 (quoting Kyllo v. United States, 533 U. S. 27, 34 (2001)).  Nor does this mean protecting only the specific rights known at the founding; it means protecting their modern analogues too. So, for example, while thermal imaging was unknown in 1791, this Court has recognized that using that technology to look inside a home constitutes a Fourth Amendment “search” of that “home” no less than a physical inspection might.  Id.,  at 40.

 Fifth, this constitutional floor may, in some instances, bar efforts to circumvent the Fourth Amendment’s protection through the use of subpoenas.  No one thinks the government can evade Jackson’s prohibition on opening sealed letters without a warrant simply by issuing a subpoena to a postmaster for “all letters sent by John Smith” or, worse, “all letters sent by John Smith concerning a particular transaction.” So the question courts will confront will be this: What other kinds of records are sufficiently similar to letters in the mail that the same rule should apply?

 It may be that, as an original matter, a subpoena requiring the recipient to produce records wasn’t thought of as a “search or seizure” by the government implicating the

Fourth Amendment, see ante, at 2–12 (opinion of ALITO, J.), but instead as an act of compelled self-incrimination implicating the Fifth Amendment, see United States v. Hubbell, 530 U. S. 27, 49–55 (2000) (THOMAS, J., dissent- ing); Nagareda, Compulsion “To Be a Witness” and the Resurrection of Boyd, 74 N. Y. U. L. Rev. 1575, 1619, and n. 172 (1999).  But the common law of searches and seizures does not appear to have confronted a case where private documents equivalent to a mailed letter were entrusted to a bailee and then subpoenaed.  As a result, “[t]he common-law rule regarding subpoenas for documents held by third parties entrusted with information from the target is . . . unknown and perhaps unknowable.”  Dripps, Perspectives on The Fourth Amendment Forty Years Later: Toward the Realization of an Inclusive Regulatory Model, 100 Minn. L. Rev. 1885, 1922 (2016).  Given that (perhaps insoluble) uncertainty, I am content to adhere to Jackson and its implications for now.

 To be sure, we must be wary of returning to the doctrine of Boyd v. United States, 116 U. S. 616.  Boyd invoked the Fourth Amendment to restrict the use of subpoenas even for ordinary business records and, as JUSTICE ALITO notes, eventually proved unworkable.  See ante, at 13 (dissenting opinion); 3 W. LaFave, J. Israel, N. King, & O. Kerr, Criminal Procedure §8.7(a), pp. 185–187 (4th ed. 2015).  But if we were to overthrow Jackson too and deny Fourth Amendment protection to any subpoenaed materials, we would do well to reconsider the scope of the Fifth Amendment while we’re at it. Our precedents treat the right against self-incrimination as applicable only to testimony, not the production of incriminating evidence. See Fisher v. United States, 425 U. S. 391, 401 (1976).  But there is substantial evidence that the privilege against selfincrimination was also originally understood to protect a person from being forced to turn over potentially incriminating evidence. Nagareda, supra, at 1605–1623; Rex v. Purnell, 96 Eng. Rep. 20 (K. B. 1748); Slobogin, Privacy at Risk 145 (2007).

*

 What does all this mean for the case before us?  To start, I cannot fault the Sixth Circuit for holding that Smith and Miller extinguish any Katz-based Fourth Amendment interest in third party cell-site data.  That is the plain effect of their categorical holdings. Nor can I fault the Court today for its implicit but unmistakable conclusion that the rationale of Smith and Miller is wrong; indeed, I agree with that.  The Sixth Circuit was powerless to say so, but this Court can and should.  At the same time, I do not agree with the Court’s decision today to keep Smith and Miller on life support and supplement them with a new and multilayered inquiry that seems to be only Katzsquared. Returning there, I worry, promises more trouble than help.  Instead, I would look to a more traditional Fourth Amendment approach. Even if Katz may still supply one way to prove a Fourth Amendment interest, it has never been the only way.  Neglecting more traditional approaches may mean failing to vindicate the full protections of the Fourth Amendment.

 Our case offers a cautionary example. It seems to me entirely possible a person’s cell-site data could qualify as his papers or effects under existing law. Yes, the telephone carrier holds the information. But 47 U. S. C. §222 designates a customer’s cell-site location information as “customer proprietary network information” (CPNI), §222(h)(1)(A), and gives customers certain rights to control use of and access to CPNI about themselves.  The statute generally forbids a carrier to “use, disclose, or permit access to individually identifiable” CPNI without the customer’s consent, except as needed to provide the customer’s telecommunications services. §222(c)(1).  It also requires the carrier to disclose CPNI “upon affirmative written request by the customer, to any person designated by the customer.” §222(c)(2). Congress even afforded customers a private cause of action for damages against carriers who violate the Act’s terms.  §207. Plainly, customers have substantial legal interests in this information, including at least some right to include, exclude, and control its use.  Those interests might even rise to the level of a property right.

 The problem is that we do not know anything more.  Before the district court and court of appeals, Mr. Carpenter pursued only a Katz “reasonable expectations” argument. He did not invoke the law of property or any analogies to the common law, either there or in his petition for certiorari. Even in his merits brief before this Court, Mr. Carpenter’s discussion of his positive law rights in cell-site data was cursory. He offered no analysis, for example, of what rights state law might provide him in addition to those supplied by §222. In these circumstances, I cannot help but conclude—reluctantly—that Mr. Carpenter forfeited perhaps his most promising line of argument.  Unfortunately, too, this case marks the second time this Term that individuals have forfeited Fourth Amendment arguments based on positive law by failing to preserve them. See Byrd, 584 U. S., at ___ (slip op., at 7).  Litigants have had fair notice since at least United States v. Jones (2012) and Florida v. Jardines (2013) that arguments like these may vindicate Fourth Amendment interests even where Katz arguments do not. Yet the arguments have gone unmade, leaving courts to the usual Katz hand- waving. These omissions do not serve the development  of a sound or fully protective Fourth Amendment  jurisprudence.

 

[1] JUSTICE KENNEDY believes that there is such a rubric—the “property-based concepts” that Katz purported to move beyond.  Post, at 3 (dissenting opinion).  But while property rights are often informative, our cases by no means suggest that such an interest is “fundamental” or “dispositive” in determining which expectations of privacy are legitimate.  Post, at 8–9. JUSTICE THOMAS (and to a large extent JUSTICE GORSUCH) would have us abandon Katz and return to an

[2] JUSTICE KENNEDY argues that this case is in a different category  from Jones and the dragnet-type practices posited in Knotts because the disclosure of the cell-site records was subject to “judicial authorization.”  Post, at 14–16.  That line of argument conflates the threshold question whether a “search” has occurred with the separate matter of whether the search was reasonable.  The subpoena process set forth in the Stored Communications Act does not determine a target’s expectation of privacy. And in any event, neither Jones nor Knotts purported to resolve the question of what authorization may be required to conduct such electronic surveillance techniques.  But see Jones, 565 U. S., at 430 (ALITO, J., concurring in judgment) (indicating that longer term GPS tracking may require a warrant).   

[3] The parties suggest as an alternative to their primary submissions that the acquisition of CSLI becomes a search only if it extends beyond a limited period. See Reply Brief 12 (proposing a 24-hour cutoff); Brief for United States 55–56 (suggesting a seven-day cutoff).  As part of its argument, the Government treats the seven days of CSLI requested from Sprint as the pertinent period, even though Sprint produced only two days of records. Brief for United States 56.  Contrary to J      USTICE KENNEDY’s assertion, post, at 19, we need not decide whether there is a limited period for which the Government may obtain an individual’s historical CSLI free from Fourth Amendment scrutiny, and if so, how long that period might be.  It is sufficient for our purposes today to hold that accessing seven days of CSLI constitutes a Fourth Amendment search.   

[4] JUSTICE GORSUCH faults us for not promulgating a complete code addressing the manifold situations that may be presented by this new technology—under a constitutional provision turning on what is “reasonable,” no less.  Post, at 10–12.  Like JUSTICE GORSUCH, we “do not begin to claim all the answers today,” post, at 13, and therefore decide no more than the case before us.

[5] See United States v. Dionisio, 410 U. S. 1, 14 (1973) (“No person can have a reasonable expectation that others will not know the sound of his voice”); Donovan v. Lone Steer, Inc., 464 U. S. 408, 411, 415 (1984) (payroll and sales records); California Bankers Assn. v. Shultz, 416 U. S. 21, 67 (1974) (Bank Secrecy Act reporting requirements); See v. Seattle, 387 U. S. 541, 544 (1967) (financial books and records); United States v. Powell, 379 U. S. 48, 49, 57 (1964) (corporate tax records); McPhaul v. United States, 364 U. S. 372, 374, 382 (1960) (books and records of an organization); United States v. Morton Salt Co., 338 U. S. 632, 634, 651–653 (1950) (Federal Trade Commission reporting requirement); Oklahoma Press Publishing Co. v. Walling, 327 U. S. 186, 189, 204–208 (1946) (payroll records); Hale v. Henkel, 201 U. S. 43, 45, 75 (1906) (corporate books and papers).

[6] Justice Brandeis authored the principal dissent in Olmstead. He consulted the “underlying purpose,” rather than “the words of the [Fourth] Amendment,” to conclude that the wiretap was a search.  277 U. S., at 476.  In Justice Brandeis’ view, the Framers “recognized the significance of man’s spiritual nature, of his feelings and of his intellect” and “sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations.”  Id., at 478.  Thus, “every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed,” should constitute an unreasonable search under the Fourth Amendment.  Ibid.

[7] National Archives, Library of Congress, Founders Online, https:// founders.archives.gov (all Internet materials as last visited June  18, 2018).

[8] A Century of Lawmaking For A New Nation, U. S. Congressional Documents and Debates, 1774–1875 (May 1, 2003), https://memory.loc .gov/ammem/amlaw/lawhome.html.

[9] Corpus of Historical American English, https://corpus.byu.edu/coha; Google Books (American), https://googlebooks.byu.edu/x.asp; Corpus of Founding Era American English, https://lawncl.byu.edu/cofea.

[10] Readex,         America’s             Historical             Newspapers         (2018),   https:// www.readex.com/content/americas-historical-newspapers.

[11] Writs of assistance were “general warrants” that gave “customs officials blanket authority to search where they pleased for goods imported in violation of the British tax laws.”  Stanford v. Texas, 379 U. S. 476, 481 (1965).

 

[12] “Every subject has a right to be secure from all unreasonable searches and seizures of his person, his house, his papers, and all his possessions.  All warrants, therefore, are contrary to right, if the cause or foundation of them be not previously supported by oath or affirmation, and if the order in the warrant to a civil officer, to make search in suspected places, or to arrest one or more suspected persons, or to seize their property, be not accompanied with a special designation of the person or objects of search, arrest, or seizure; and no warrant ought to be issued but in cases, and with the formalities prescribed by the laws.”  Mass. Const., pt. I, Art. XIV (1780).

[13] The answer to that question is not obvious.  Cell-site location records are business records that mechanically collect the interactions between a person’s cell phone and the company’s towers; they are not private papers and do not reveal the contents of any communications.  Cf. Schnapper, Unreasonable Searches and Seizures of Papers, 71 Va. L. Rev. 869, 923–924 (1985) (explaining that business records that do not reveal “personal or speech-related confidences” might not satisfy the original meaning of “papers”).

[14] Carpenter relies on an order from the Federal Communications Commission (FCC), which weakly states that “ ‘ [t]o the extent [a customer’s location information] is property, . . . it is better understood as belonging to the customer, not the carrier.’ ”  Brief for Petitioner 34, and  n. 23 (quoting 13 FCC Rcd. 8061, 8093 ¶43 (1998); emphasis added).   But this order was vacated by the Court of Appeals for the Tenth Circuit.  U. S. West, Inc. v. FCC, 182 F. 3d 1224, 1240 (1999).  Notably, the carrier in that case argued that the FCC’s regulation of customer information was a taking of its property.  See id., at 1230.  Although the panel majority had no occasion to address this argument, see id., at 1239, n. 14, the dissent concluded that the carrier had failed to prove the information was “property” at all, see id., at 1247–1248 (opinion of Briscoe, J.).

 

 

[15] All that the Court can say in response is that we have “been careful not to uncritically extend existing precedents” when confronting new technologies.  Ante, at 20.  But applying a categorical rule categorically does not “extend” precedent, so the Court’s statement ends up sounding a lot like a tacit admission that it is overruling our precedents.

[16] Thus, this is not a case in which someone has entrusted papers that he or she owns to the safekeeping of another, and it does not involve a bailment. Cf. post, at 14 (GORSUCH, J., dissenting).

4.6 United States v. Miller 4.6 United States v. Miller

BANK RECORDS

UNITED STATES v. MILLER

No. 74-1179.

Argued January 12, 1976

Decided April 21, 1976

*436Powell, J., delivered the opinion of the Court, in which Burger, C. J., and Stewart, White, Blackmun, Rehnquist, and Stevens, JJ., joined. Brennan, J., post, p. 447, and Marshall, J., post, p. 455, filed dissenting opinions.

Deputy Solicitor General Wallace argued the cause for the United States. With him on the brief were Solicitor General Bork, Assistant Attorney General Thornburgh, Sidney M. Glazer, and Ivan Michael Schaeffer.

D. L. Bampey, Jr., by appointment of the Court, 422 U. S. 1054, argued the cause and filed a brief for respondent.

Mr. Justice Powell

delivered the opinion of the Court.

Respondent was convicted of possessing an unregistered still, carrying on the business of a distiller without giving bond and with intent to defraud the Government of whiskey tax, possessing 175 gallons of whiskey upon which no taxes had been paid, and conspiring to defraud the United States of tax revenues. 26 U. S. C. §§ 5179, 5205, 5601 et seq.; 18 U. S. C. § 371. Prior to trial respondent moved to suppress copies of checks and other bank records obtained by means of allegedly defective subpoenas duces tecum served upon two banks at which he had accounts. The records had been maintained by the banks in compliance with the requirements of the Bank Secrecy Act of 1970, 84 Stat. 1114, 12 U. S. C. § 1829b (d).

*437The District Court overruled respondent’s motion to suppress, and the evidence was admitted. The Court of Appeals for the Fifth Circuit reversed on the ground that a depositor’s Fourth Amendment rights are violated when bank records maintained pursuant to the Bank Secrecy Act are obtained by means of a defective subpoena. It held that any evidence so obtained must be suppressed. Since we find that respondent had no pro-tectable Fourth Amendment interest in the subpoenaed documents, we reverse the decision below.

I

On December 18, 1972, in response to an informant’s tip, a deputy sheriff from Houston County, Ga., stopped a van-type truck occupied by two of respondent’s alleged co-conspirators. The truck contained distillery apparatus and raw material. On January 9, 1973, a fire broke out in a Kathleen, Ga., warehouse rented to respondent. During the blaze firemen and sheriff department officials discovered a 7,500-gallon-eapacity distillery, 175 gallons of non-tax-paid whiskey, and related paraphernalia.

Two weeks later agents from the Treasury Department’s Alcohol, Tobacco and Firearms Bureau presented grand jury subpoenas issued in blank by the clerk of the District Court, and completed by the United States Attorney’s office, to the presidents of the Citizens & Southern National Bank of Warner Robins and the Bank of Byron, where respondent maintained accounts. The subpoenas required the two presidents to appear on January 24, 1973, and to produce

“all records of accounts, i. e., savings, checking, loan or otherwise, in the name of Mr. Mitch Miller [respondent], 3859 Mathis Street, Macon, Ga. and/or Mitch Miller Associates, 100 Executive *438Terrace, Warner Robins, Ga., from October 1, 1972, through the present date [January 22, 1973, in the case of the Bank of Byron, and January 23, 1973, in the case of the Citizens & Southern National Bank of Warner Robins]

The banks did not advise respondent that the subpoenas had been served but ordered their employees to make the records available and to provide copies .of any documents the agents desired. At the Bank of Byron, an agent was shown microfilm records of the relevant account and provided with copies of one deposit slip and one or two checks. At the Citizens & Southern National Bank microfilm records also were shown to the agent, and he was given copies-of the records of respondent's account during the applicable period. These included all checks, deposit slips, two financial statements, and three monthly statements. The bank presidents were then told that it would not be necessary to appear in person before the grand jury.

The grand jury met on February 12, 1973, 19 days after the return date on the subpoenas. Respondent and four others were indicted. The overt acts alleged to have been committed in furtherance of the conspiracy included three financial transactions — the rental by respondent of the van-type truck, the purchase by respondent of radio equipment, and the purchase by respondent of a quantity of sheet metal and metal pipe. The record does not indicate whether any of the bank records were in fact presented to the grand jury. They were used in the investigation and provided “one or two" investigatory leads. Copies of the checks also were introduced at trial to establish the overt acts described above.

In his motion to suppress, denied by the District Court, respondent contended that the bank documents were illegally seized. It was urged that the subpoenas were *439defective because they were issued by the United States Attorney rather than a court, no return was made to a court, and the subpoenas were returnable on a date when the grand jury was not in session. The Court of Appeals reversed. 500 F. 2d 751 (1974). Citing the prohibition in Boyd v. United States, 116 U. S. 616, 622 (1886), against “compulsory production of a man’s private papers to establish a criminal charge against him,” the court held that the Government had improperly circumvented Boyd’s protections of respondent’s Fourth Amendment right against “unreasonable searches and seizures” by “first requiring a third party bank to copy all of its depositors’ personal checks and then, with an improper invocation of legal process, calling upon the bank to allow inspection and reproduction of those copies.” 500 F. 2d, at 757. The court acknowledged that the recordkeeping requirements of the Bank Secrecy Act had been held to be constitutional on their face in California Bankers Assn. v. Shultz, 416 U. S. 21 (1974), but noted that access to the records was to be controlled by “existing legal process.” See id., at 52. The subpoenas issued here were found not to constitute adequate “legal process.” The fact that the bank officers cooperated voluntarily was found to be irrelevant, for “he whose rights are threatened by the improper disclosure here was a bank depositor, not a bank official.” 500 F. 2d, at 758.

The Government contends that the Court of Appeals erred in three respects: (i) in finding that respondent had the Fourth Amendment interest necessary to entitle him to challenge the validity of the subpoenas duces tecum through his motion to suppress; (ii) in holding that the subpoenas were defective; and (iii) in determining that suppression of the evidence obtained was the appropriate remedy if a constitutional violation did take place.

*440We find that there was no intrusion into any area in which respondent had a protected Fourth Amendment interest and that the District Court therefore correctly denied respondent’s motion to suppress. Because we reverse the decision of the Court of Appeals on that ground alone, we do not reach the Government’s latter two contentions.

II

In Hoffa v. United States, 385 U. S. 293, 301-302 (1966), the Court said that “no interest legitimately protected by the Fourth Amendment” is implicated by governmental investigative activities unless there is an intrusion into a zone of privacy, into “the security a man relies upon when he places himself or his property within a constitutionally protected area.” The Court of Appeals, as noted above, assumed that respondent had the necessary Fourth Amendment interest, pointing to the language in Boyd v. United States, supra, at 622, which describes that Amendment’s protection against the “compulsory production of a man’s private papers.”1 We think that the Court of Appeals erred in finding the subpoenaed documents to fall within a protected zone of privacy.

On their face, the documents subpoenaed here are not respondent’s “private papers.” Unlike the claimant in Boyd, respondent can assert neither ownership nor possession. Instead, these are the business records of the banks. As we said in California Bankers Assn. v. Shultz, supra, at 48-49, “[blanks are . . . not . . . neutrals in transactions involving negotiable instruments, but parties to the instruments with a substantial stake in their continued availability and acceptance.” The records of re*441spondent’s accounts, like “all of the records [which are required to be kept pursuant to the Bank Secrecy Act,] pertain to transactions to which the bank was itself a party.” Id., at 52.

Respondent argues, however, that the Bank Secrecy Act introduces a factor that makes the subpoena in this case the functional equivalent of a search and seizure of the depositor’s “private papers.” We have held, in California Bankers Assn. v. Shultz, supra, at 54, that the mere maintenance of records pursuant to the requirements of the Act “invade [s] no Fourth Amendment right of any depositor.” But respondent contends that the combination of the recordkeeping requirements of the Act and the issuance of a subpoena2 to obtain those records permits the Government to circumvent the requirements of the Fourth Amendment by allowing it to obtain a depositor’s private records without complying with the legal requirements that would be applicable had it proceeded against him directly.3 Therefore, we must address the question whether the compulsion embodied in the Bank Secrecy Act as exercised in this case creates a Fourth Amendment interest in the depositor where none existed before. This question was expressly re*442served in California Bankers Assn., supra, at 53-54, and n. 24.

Respondent urges that he has a Fourth Amendment interest in the records kept by the banks because they are merely copies of personal records that were made available to the banks for a limited purpose and in which he has a reasonable expectation of privacy. He relies on this Court’s statement in Katz v. United States, 389 U. S. 347, 353 (1967), quoting Warden v. Hayden, 387 U. S. 294, 304 (1967), that “we have . . . departed from the narrow view” that “ 'property interests control the right of the Government to search and seize,’ ” and that a “search and seizure” become unreasonable when the Government’s activities violate “the privacy upon which [a person] justifiably reliefs].” But in Katz the Court also stressed that “[w]hat a person knowingly exposes to the public ... is not a subject of Fourth Amendment protection.” 389 U. S., at 351. We must examine the nature of the particular documents sought to be protected in order to determine whether there is a legitimate “expectation of privacy” concerning their contents. Cf. Couch v. United States, 409 U. S. 322, 335 (1973).

Even if we direct our attention to the original checks and deposit slips, rather than to the microfilm copies actually viewed and obtained by means of the subpoena, we perceive no legitimate “expectation of privacy” in their contents. The checks are not confidential communications but negotiable instruments to be used in commercial transactions. All of the documents obtained, including financial statements and deposit slips, contain only information voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business. The lack of any legitimate expectation of privacy concerning the information kept in bank records was assumed by Congress in enacting the Bank Secrecy Act, the expressed purpose of which is to require records *443to be maintained because they “have a high degree of usefulness in criminal, tax, and regulatory investigations and proceedings.” 12 U. S. C. § 1829b (a) (1). Cf. Couch v. United States, supra, at 335.

The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government. United States v. White, 401 U. S. 745, 751-752 (1971). This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed. Id., at 752; Hoffa v. United States, 385 U. S., at 302; Lopez v. United States, 373 U. S. 427 (1963).4

This analysis is not changed by the mandate of the Bank Secrecy Act that records of depositors' transactions be maintained by banks. In California Bankers Assn. v. Shultz, 416 U. S., at 52-53, we rejected the contention that banks, when keeping records of their depositors' transactions pursuant to the Act, are acting solely as agents of the Government. But, even if the banks could be said to have been acting solely as Government agents in transcribing the necessary information and complying without protest5 with the requirements of the subpoenas, there would be no intrusion upon the depositors' Fourth Amendment rights. See Osborn v. United States, 385 U. S. 323 (1966); Lewis v. United States, 385 U. S. 206 (1966).

*444Ill

Since no Fourth Amendment interests of the depositor are implicated here, this case is governed by the general rule that the issuance of a subpoena to a third party to obtain the records of that party does not violate the rights of a defendant, even if a criminal prosecution is contemplated at the time the subpoena is issued. California Bankers Assn. v. Shultz, supra, at 53; Donaldson v. United States, 400 U. S. 517, 537 (1971) (Douglas, J., concurring). Under these principles, it was firmly settled, before the passage of the Bank Secrecy Act, that an Internal Revenue Service summons directed to a third-party bank does not violate the Fourth Amendment rights of a depositor under investigation. See First National Bank of Mobile v. United States, 267 U. S. 576 (1925), aff’g 295 F. 142 (SD Ala. 1924). See also California Bankers Assn. v. Shultz, supra, at 53; Donaldson v. United States, supra, at 522.

Many banks traditionally kept permanent records of their depositors’ accounts, although not all banks did so and the practice was declining in recent years. By requiring that such records be kept by all banks, the Bank Secrecy Act is not a novel means designed to circumvent established Fourth Amendment rights. It is merely an attempt to facilitate the use of a proper and longstanding law enforcement technique by insuring that records are available when they are needed.6

*445We hold that the District Court correctly denied respondent’s motion to suppress, since he possessed no Fourth Amendment interest that could be vindicated by a challenge to the subpoenas.

IV

Respondent contends not only that the subpoenas duces tecum directed against the banks infringed his Fourth Amendment rights, but that a subpoena issued to a bank to obtain records maintained pursuant to the Act is subject to more stringent Fourth Amendment requirements than is the ordinary subpoena. In making this assertion he relies on our statement in California Bankers Assn., supra, at 52, that access to the records maintained by banks under the Act is to be controlled by "existing legal process.” 7

In Oklahoma Press Pub. Co. v. Walling, 327 U. S. 186, 208 (1946), the Court said that “the Fourth [Amendment], if applicable [to subpoenas for the production of business records and papers], at the most guards against abuse only by way of too much indefiniteness or breadth in the things required to be 'particularly described,’ if also the inquiry is one the demanding *446agency is authorized by law to make and the materials specified are relevant.” See also United States v. Dionisio, 410 U. S. 1, 11-12 (1973). Respondent, citing United States v. United States District Court, 407 U. S. 297 (1972), in which we discussed the application of the warrant requirements of the Fourth Amendment to domestic security surveillance through electronic eavesdropping, suggests that greater judicial scrutiny, equivalent to that required for a search warrant, is necessary when a subpoena is to be used to obtain bank records of a depositor’s account. But in California Bankers Assn., 416 U. S., at 52, we emphasized only that access to the records was to be in accordance with “existing legal process.” There was no indication that a new rule was to be devised, or that the traditional distinction between a search warrant and a subpoena would not be recognized.8

In any event, for the reasons stated above, we hold that respondent lacks the requisite Fourth Amendment interest to challenge the validity of the subpoenas.9

V

The judgment of the Court of Appeals is reversed. The court deferred decision on whether the trial court had improperly overruled respondent’s motion to suppress *447distillery apparatus and raw material seized from a rented truck. We remand for disposition of that issue.

So ordered.

Mr. Justice Brennan,

dissenting.

The pertinent phrasing of the Fourth Amendment— “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” — is virtually in haec verba as Art. I, § 19, of the California Constitution— “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable seizures and searches, shall not be violated.” The California Supreme Court has reached a conclusion under Art. I, § 19, in the same factual situation, contrary to that reached by the Court today under the Fourth Amendment.1 I dissent because in my view the California Supreme Court correctly interpreted the relevant constitutional language.

In Burrows v. Superior Court, 13 Cal. 3d 238, 529 P. 2d 590 (1974), the .question was whether bank statements or copies thereof relating to an accused’s bank accounts obtained by the sheriff and prosecutor without *448benefit of legal process,2 but with the consent of the bank, were acquired as a result of an illegal search and seizure. The California Supreme Court held that the accused had a reasonable expectation of privacy in his bank statements and records, that the voluntary relinquishment of such records by the bank at the request of the sheriff and prosecutor did not constitute a valid consent by the accused, and that the acquisition by the officers of the records therefore was the result of an illegal search and seizure. In my view the same conclusion, for the reasons stated by the California Supreme Court, is compelled in this case under the practically identical phrasing of the Fourth Amendment. Addressing the threshold question whether the accused's right of privacy was invaded, and relying in part on the decision of the Court of Appeals in this case, Mr. Justice Mosk stated in his excellent opinion for a unanimous court:

“It cannot be gainsaid that the customer of a bank expects that the documents, such as checks, which he transmits to the bank in the course of his business operations, will remain private, and that such an expectation is reasonable. The prosecution concedes as much, although it asserts that this expecta*449tion. is not constitutionally cognizable. Representatives of several banks testified at the suppression hearing that information in their possession regarding a customer’s account is deemed by them to be confidential.
“In the present case, although the record establishes that copies of petitioner’s bank statements rather than of his checks were provided to the officer, the distinction is not significant with relation to petitioner’s expectation of privacy. That the bank alters the form in which it records the information transmitted to it by the depositor to show the receipt and disbursement of money on a bank statement does not diminish the depositor’s anticipation of privacy in the matters which he confides to the bank. A bank customer’s reasonable expectation is that, absent compulsion by legal process, the matters he reveals to the bank will be utilized by the bank only for internal banking purposes. Thus, we hold petitioner had a reasonable expectation that the bank would maintain the confidentiality of those papers which originated with him in check form and of the bank statements into which a record of those same checks had been transformed pursuant to internal bank practice.
“The People assert that no illegal search and seizure occurred here because the bank voluntarily provided the statements to the police, and the bank rather than the police conducted the search of its records for papers relating to petitioner’s accounts. If, as we conclude above, petitioner has a reasonable expectation of privacy in the bank statements, the voluntary relinquishment of such records by the bank at the request of the police does not constitute *450a valid consent by this petitioner. ... It is not the right of privacy of the bank but of the petitioner which is at issue, and thus it would be untenable to conclude that the bank, a neutral entity with no significant interest in the matter, may validly consent to an invasion of its depositors’ rights. However, if the bank is not neutral, as for example where it is itself a victim of the defendant’s suspected wrongdoing, the depositor’s right of privacy will not prevail.
“Our rationale is consistent with the recent decision of United States v. Miller (5th Cir. 1974) 500 F. 2d 751. In Miller, the United States Attorney, without the defendant’s knowledge, issued subpoenas to two banks in which the defendant maintained accounts, ordering the production of 'all records of accounts’ in the name of the defendant. The banks voluntarily provided the government with copies of the defendant’s checks and a deposit slip; these items were introduced into evidence at the trial which led to his conviction. The circuit court reversed the conviction. It held that the defendant’s rights under the Fourth Amendment were violated by the search because the subpoena was issued by the United States Attorney rather than by a court or grand jury, and the bank's voluntary compliance with the subpoena was irrelevant since it was the depositor’s right to privacy which was threatened by the disclosure.
“We hold that any bank statements or copies thereof obtained by the sheriff and prosecutor without the benefit of legal process were acquired as the result of an illegal search and seizure (Cal. Const., art. I, § 13), and that the trial court should have granted the motion to suppress such documents.
*451“The underlying dilemma in this and related cases is that the bank, a detached and disinterested entity, relinquished the records voluntarily. But that circumstance should not be crucial. For all practical purposes, the disclosure by individuals or business firms of their financial affairs to a bank is not entirely volitional, since it is impossible to participate in the economic life of contemporary society without maintaining a bank account. In the course of such dealings, a depositor reveals many aspects of his personal affairs, opinions, habits and associations. Indeed, the totality of bank records provides a virtual current biography. While we are concerned in the present case only with bank statements, the logical extension of the contention that the bank’s ownership of records permits free access to them by any police officer extends far beyond such statements to checks, savings, bonds, loan applications, loan guarantees, and all papers which the customer has supplied to the bank to facilitate the conduct of his financial affairs upon the reasonable assumption that the information would remain confidential. To permit a police officer access to these records merely upon his request, without any judicial control as to relevancy or other traditional requirements of legal process, and to allow the evidence to be used in any subsequent criminal prosecution against a defendant, opens the door to a vast and unlimited range of very real abuses of police power.
“Cases are legion that condemn violent searches and invasions of an individual’s right to the privacy of his dwelling. The imposition upon privacy, although perhaps not so dramatic, may be equally devastating when other methods are employed. Development of photocopying machines, electronic computers and other sophisticated instruments have *452accelerated the ability of government to intrude into areas which a person normally chooses to exclude from prying eyes and inquisitive minds. Consequently judicial interpretations of the reach of the constitutional protection of individual privacy must keep pace with the perils created by these new devices.” 13 Cal. 3d, at 243-248, 529 P. 2d, at 593-596 (footnote omitted).

The California Supreme Court also addressed the question of the relevance of California Bankers Assn. v. Shultz, 416 U. S. 21 (1974). In my view, for the reasons stated in Burrows, the decision of the Court of Appeals under review today, is in no way inconsistent with California Bankers.3 The California Supreme Court said:

“[California Bankers] held, in a six-three decision, that the bank’s rights under the Fourth Amendment were not abridged by the regulation, and that the depositor plaintiffs lacked standing to challenge the reporting requirement because there was no showing that they engaged in the type of transaction to which the regulation referred.
“The concurring views of two justices who provided the necessary votes to create a majority are of particular interest. Justice Powell’s opinion, joined by Justice Blackmun [416 U. S., at 78] makes clear that a significant extension of the reporting requirement would pose substantial constitutional questions, and that concurrence with the *453majority was based upon the provisions of the act as narrowed by the regulations. He wrote, 'In their full reach, the reports apparently authorized by the open-ended language of the Act touch upon intimate areas of an individual’s personal affairs. Financial transactions can reveal much about a person’s activities, associations, and beliefs. At some point, governmental intrusion upon these areas would implicate legitimate expectations of privacy. Moreover, the potential for abuse is particularly acute where, as here, the legislative scheme permits access to this information without invocation of the judicial process. In such instances, the important responsibility for balancing societal and individual interests is left to unreviewed executive discretion, rather than the scrutiny of a neutral magistrate. United States v. United States District Court, 407 U. S. 297, 316— 317.’ [416 U. S., at 78-79.]
“Justices Douglas and Marshall dissented on the ground that the act violated the Fourth Amendment. Justice Brennan also filed a dissent, stating that the recordkeeping and reporting requirements of the act constituted an impermissibly broad grant of power to the Secretary.
“. . . [T]he only federal case decided after Shultz and directly confronting the issue of the depositor’s rights is entirely consistent with the views we have set forth above. . . . Miller holds that Shultz may not be interpreted as 'proclaiming open season on personal bank records’ or as permitting the government to circumvent the Fourth Amendment by first requiring banks to copy their depositors’ checks and then calling upon the banks to allow inspection of those copies without appropriate legal process.” 13 Cal. 3d, at 246-247, 529 P. 2d, at 595-596 (footnote omitted).

*454I would therefore affirm the judgment of the Court of Appeals. I add only that Burrows strikingly illustrates the emerging trend among high state courts of relying upon state constitutional protections of individual liberties4 — protections pervading counterpart provisions of *455the United States Constitution, but increasingly being ignored by decisions of this Court. For the most recent examples in this Court, but only in the privacy and Fourth Amendment areas, see, e. g., Kelley v. Johnson, ante, p. 238; Doe v. Commonwealth’s Atty., post, p. 901; Paul v. Davis, 424 U. S. 693 (1976); United States v. Watson, 423 U. S. 411 (1976).

Mr. Justice Marshall,

dissenting.

In California Bankers Assn. v. Shultz, 416 U. S. 21 (1974), the Court upheld the constitutionality of the recordkeeping requirements of the Bank Secrecy Act. 12 U. S. C. § 1829b (d). I dissented, finding the required maintenance of bank customers’ records to be a seizure within the meaning of the Fourth Amendment and unlawful in the absence of a warrant and probable cause. While the Court in California Bankers Assn. did not then purport to decide whether a customer could later challenge the bank’s delivery of his records to the Government pursuant to subpoena, I warned:

“[I]t is ironic that although the majority deems the bank customers’ Fourth Amendment claims premature, it also intimates that once the bank has made copies of a customer’s checks, the customer no longer has standing to invoke his Fourth Amendment rights when a demand is made on the bank by the Government for the records. ... By accepting the Government’s bifurcated approach to the recordkeeping requirement and the acquisition of the records, the majority engages in a hollow charade whereby Fourth Amendment claims are to be labeled premature until such time as they can be deemed too late.” 416 U. S., at 97.

Today, not surprisingly, the Court finds respondent’s claims to be made too late. Since the Court in Califor *456 nia Bankers Assn. held that a bank, in complying with the requirement that it keep copies of the checks written by its customers, “neither searches nor seizes records in which the depositor has a Fourth Amendment right/' id., at 54, there is nothing new in today’s holding that respondent has no protected Fourth Amendment interest in such records. A fortiori, he does not have standing to contest the Government’s subpoena to the bank. Alderman v. United States, 394 U. S. 165 (1969).

I wash my hands of today’s extended redundancy by the Court. Because the recordkeeping requirements of the Act order the seizure of customers’ bank records without a warrant and probable cause, I believe the Act is unconstitutional and that respondent has standing to raise that claim. Since the Act is unconstitutional, the Government cannot rely on records kept pursuant to it in prosecuting bank customers. The Government relied on such records in this case and, because of that, I would affirm the Court of Appeals’ reversal of respondent's conviction. I respectfully dissent.

4.7 Trash 4.7 Trash

4.7.1 California v. Greenwood 4.7.1 California v. Greenwood

TRASH

CALIFORNIA v. GREENWOOD et al.

No. 86-684.

Argued January 11, 1988

Decided May 16, 1988

*36White, J., delivered the opinion of the Court, in which Rehnquist, C. J., and Blackmun, Stevens, O’ConnoR, and Scalia, JJ., joined. BRENNAN, J., filed a dissenting opinion, in which MARSHALL, J., joined, post, p. 45. Kennedy, J., took no part in the consideration or decision of the case.

Michael J. Pear argued the cause for petitioner. With him on the briefs were Cecil Hicks and Michael R. Capizzi.

Michael Ian Garey, by appointment of the Court, 484 U. S. 808, argued the cause for respondents and filed a brief for respondent Greenwood. Richard L. Schwartzberg filed a brief for respondent Van Houten.*

*37Justice White

delivered the opinion of the Court.

The issue here is whether the Fourth Amendment prohibits the warrantless search and seizure of garbage left for collection outside the curtilage of a home. We conclude, in accordance with the vast majority of lower courts that have addressed the issue, that it does not.

h — 1

In early 1984, Investigator Jenny Stracner of the Laguna Beach Police Department received information indicating that respondent Greenwood might be engaged in narcotics trafficking. Stracner learned that a criminal suspect had informed a federal drug enforcement agent in February 1984 that a truck filled with illegal drugs was en route to the Laguna Beach address at which Greenwood resided. In addition, a neighbor complained of heavy vehicular traffic late at night in front of Greenwood’s single-family home. The neighbor reported that the vehicles remained at Greenwood’s house for only a few minutes.

Stracner sought to investigate this information by conducting a surveillance of Greenwood’s home. She observed several vehicles make brief stops at the house during the late-night and early morning hours, and she followed a truck from the house to a residence that had previously been under investigation as a narcotics-trafficking location.

On April 6, 1984, Stracner asked the neighborhood’s regular trash collector to pick up the plastic garbage bags that Greenwood had left on the curb in front of his house and to turn the bags over to her without mixing their contents with garbage from other houses. The trash collector cleaned his truck bin of other refuse, collected the garbage bags from the street in front of Greenwood’s house, and turned the bags over to Stracner. The officer searched through the rubbish *38and found items indicative of narcotics use. She recited the information that she had gleaned from the trash search in an affidavit in support of a warrant to search Greenwood’s home.

Police officers encountered both respondents at the house later that day when they arrived to execute the warrant. The police discovered quantities of cocaine and hashish during their search of the house. Respondents were arrested on felony narcotics charges. They subsequently posted bail.

The police continued to receive reports of many late-night visitors to the Greenwood house. On May 4, Investigator Robert Rahaeuser obtained Greenwood’s garbage from the regular trash collector in the same manner as had Stracner. The garbage again contained evidence of narcotics use.

Rahaeuser secured another search warrant for Greenwood’s home based on the information from the second trash search. The police found more narcotics and evidence of narcotics trafficking when they executed the warrant. Greenwood was again arrested.

The Superior Court dismissed the charges against respondents on the authority of People v. Krivda, 5 Cal. 3d 357, 486 P. 2d 1262 (1971), which held that warrantless trash searches violate the Fourth Amendment and the California Constitution. The court found that the police would not have had probable cause to search the Greenwood home without the evidence obtained from the trash searches.

The Court of Appeal affirmed. 182 Cal. App. 3d 729, 227 Cal. Rptr. 539 (1986). The court noted at the outset that the fruits of warrantless trash searches could no longer be suppressed if Krivda were based only on the California Constitution, because since 1982 the State has barred the suppression of evidence seized in violation of California law but not federal law. See Cal. Const., Art. I, § 28(d); In re Lance W., 37 Cal. 3d 873, 694 P. 2d 744 (1985). But Krivda, a decision binding on the Court of Appeal, also held that the fruits of warrantless trash searches were to be excluded under federal *39law. Hence, the Superior Court was correct in dismissing the charges against respondents. 182 Cal. App. 3d, at 735, 227 Cal. Rptr, at 542.1

The California Supreme Court denied the State’s petition for review of the Court of Appeal’s decision. We granted certiorari, 483 U. S. 1019, and now reverse.

) — I I — C

The warrantless search and seizure of the garbage bags left at the curb outside the Greenwood house would violate the Fourth Amendment only if respondents manifested a subjective expectation of privacy in their garbage that society accepts as objectively reasonable. O’Connor v. Ortega, 480 U. S. 709, 715 (1987); California v. Ciraolo, 476 U. S. 207, 211 (1986); Oliver v. United States, 466 U. S. 170, 177 (1984); Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring). Respondents do not disagree with this standard.

They assert, however, that they had, and exhibited, an expectation of privacy with respect to the trash that was searched by the police: The trash, which was placed on the street for collection at a fixed time, was contained in opaque plastic bags, which the garbage collector was expected to pick up, mingle with the trash of others, and deposit at the garbage dump. The trash was only temporarily on the street, and there was little likelihood that it would be inspected by anyone.

It may well be that respondents did not expect that the contents of their garbage bags would become known to the police or other members of the public. An expectation of privacy does not give rise to Fourth Amendment protection, *40however, unless society is prepared to accept that expectation as objectively reasonable.

Here, we conclude that respondents exposed their garbage to the public sufficiently to defeat their claim to Fourth Amendment protection. It is common knowledge that plastic garbage bags left on or at the side of a public street are readily accessible to animals,2 children, scavengers,3 snoops,4 and other members of the public. See Krivda, supra, at 367, 486 P. 2d, at 1269. Moreover, respondents placed their refuse at the curb for the express purpose of conveying it to a third party, the trash collector, who might himself have sorted through respondents’ trash or permitted others, such as the police, to do so. Accordingly, having deposited their garbage “in an area particularly suited for *41public inspection and, in a manner of speaking, public consumption, for the express purpose of having strangers take it,” United States v. Reicherter, 647 F. 2d 397, 399 (CA3 1981), respondents could have had no reasonable expectation of privacy in the inculpatory items that they discarded.

Furthermore, as we have held, the police cannot reasonably be expected to avert their eyes from evidence of criminal activity that could have been observed by any member of the public. Hence, “[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.” Katz v. United States, supra, at 351. We held in Smith v. Maryland, 442 U. S. 735 (1979), for example, that the police did not violate the Fourth Amendment by causing a pen register to be installed at the telephone company’s offices to record the telephone numbers dialed by a criminal suspect. An individual has no legitimate expectation of privacy in the numbers dialed on his telephone, we reasoned, because he voluntarily conveys those numbers to the telephone company when he uses the telephone. Again, we observed that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Id., at 743-744.

Similarly, we held in California v. Ciraolo, supra, that the police were not required by the Fourth Amendment to obtain a warrant before conducting surveillance of the respondent’s fenced backyard from a private plane flying at an altitude of 1,000 feet. We concluded that the respondent’s expectation that his yard was protected from such surveillance was unreasonable because “[a]ny member of the public flying in this airspace who glanced down could have seen everything that these officers observed.” Id., at 213-214.

Our conclusion that society would not accept as reasonable respondents’ claim to an expectation of privacy in trash left for collection in an area accessible to the public is reinforced by the unanimous rejection of similar claims by the Federal Courts of Appeals. See United States v. Dela Espriella, *42781 F. 2d 1432, 1437 (CA9 1986); United States v. O’Bryant, 775 F. 2d 1528, 1533-1534 (CA11 1985); United States v. Michaels, 726 F. 2d 1307, 1312-1313 (CA8), cert. denied, 469 U. S. 820 (1984); United States v. Kramer, 711 F. 2d 789, 791-794 (CA7), cert. denied, 464 U. S. 962 (1983); United States v. Terry, 702 F. 2d 299, 308-309 (CA2), cert. denied sub nom. Williams v. United States, 461 U. S. 931 (1983); United States v. Reicherter, supra, at 399; United States v. Vahalik, 606 F. 2d 99, 100-101 (CA5 1979) (per curiam), cert. denied, 444 U. S. 1081 (1980); United States v. Crowell, 586 F. 2d 1020, 1025 (CA4 1978), cert. denied, 440 U. S. 959 (1979); Magda v. Benson, 536 F. 2d 111, 112-113 (CA6 1976) (per curiam); United States v. Mustone, 469 F. 2d 970, 972-974 (CA1 1972). In United States v. Thornton, 241 U. S. App. D. C. 46, 56, and n. 11, 746 F. 2d 39, 49, and n. 11 (1984), the court observed that “the overwhelming weight of authority rejects the proposition that a reasonable expectation of privacy exists with respect to trash discarded outside the home and the curtilege [sic] thereof.” In addition, of those state appellate courts that have considered the issue, the vast majority have held that the police may conduct war-rantless searches and seizures of garbage discarded in public areas. See Commonwealth v. Chappee, 397 Mass. 508, 512-513, 492 N. E. 2d 719, 721-722 (1986); Cooks v. State, 699 P. 2d 653, 656 (Okla. Crim.), cert, denied, 474 U. S. 935 (1985); State v. Stevens, 123 Wis. 2d 303, 314-317, 367 N. W. 2d 788, 794-797, cert. denied, 474 U. S. 852 (1985); State v. Ronngren, 361 N. W. 2d 224, 228-230 (N. D. 1985); State v. Brown, 20 Ohio App. 3d 36, 37-38, 484 N. E. 2d 215, 217-218 (1984); State v. Oquist, 327 N. W. 2d 587 (Minn. 1982); People v. Whotte, 113 Mich. App. 12, 317 N. W. 2d 266 (1982); Commonwealth v. Minton, 288 Pa. Super. 381, 391, 432 A. 2d 212, 217 (1981); State v. Schultz, 388 So. 2d 1326 (Fla. App. 1980); People v. Huddleston, 38 Ill. App. 3d 277, 347 N. E. 2d 76 (1976); Willis v. State, 518 S. W. 2d 247, 249 (Tex. Crim. App. 1975); Smith v. State, 510 P. 2d 793 (Alaska), cert. denied, *43414 U. S. 1086 (1973); State v. Fassler, 108 Ariz. 586, 592-593, 503 P. 2d 807, 813-814 (1972); Croker v. State, 477 P. 2d 122, 125-126 (Wyo. 1970); State v. Purvis, 249 Ore. 404, 411, 438 P. 2d 1002, 1005 (1968). But see State v. Tanaka, 67 Haw. 658, 701 P. 2d 1274 (1985); People v. Krivda, 5 Cal. 3d 357, 486 P. 2d 1262 (1971).5

Ill

We reject respondent Greenwood’s alternative argument for affirmance: that his expectation of privacy in his garbage should be deemed reasonable as a matter of federal constitutional law because the warrantless search and seizure of his garbage was impermissible as a matter of California law. He urges that the state-law right of Californians to privacy in their garbage, announced by the California Supreme Court in Krivda, supra, survived the subsequent state constitutional amendment eliminating the suppression remedy as a means of enforcing that right. See In re Lance W., 37 Cal. 3d, at 886-887, 694 P. 2d, at 752-753. Hence, he argues that the Fourth Amendment should itself vindicate that right.

Individual States may surely construe their own constitutions as imposing more stringent constraints on police conduct than does the Federal Constitution. We have never intimated, however, that whether or not a search is reasonable within the meaning of the Fourth Amendment depends on the law of the particular State in which the search occurs. We have emphasized instead that the Fourth Amendment analysis must turn on such factors as “our societal understanding that certain areas deserve the most scrupulous protection from government invasion.” Oliver v. United States, 466 U. S., at 178 (emphasis added). See also Rakas v. Illinois, 439 U. S. 128, 143-144, n. 12 (1978). We have already concluded that society as a whole possesses no such under*44standing with regard to garbage left for collection at the side of a public street. Respondent’s argument is no less than a suggestion that concepts of privacy under the laws of each State are to determine the reach of the Fourth Amendment. We do not accept this submission.

> h — I

Greenwood finally urges as an additional ground for affirmance that the California constitutional amendment eliminating the exclusionary rule for evidence seized in violation of state but not federal law violates the Due Process Clause of the Fourteenth Amendment. In his view, having recognized a state-law right to be free from warrantless searches of garbage, California may not under the Due Process Clause deprive its citizens of what he describes as “the only effective deterrent” to violations of this right. Greenwood concedes that no direct support for his position can be found in the decisions of this Court. He relies instead on cases holding that individuals are entitled to certain procedural protections before they can be deprived of a liberty or property interest created by state law. See Hewitt v. Helms, 459 U. S. 460 (1983); Vitek v. Jones, 445 U. S. 480 (1980).

We see no merit in Greenwood’s position. California could amend its Constitution to negate the holding in Krivda that state law forbids warrantless searches of trash. We are convinced that the State may likewise eliminate the exclusionary rule as a remedy for violations of that right. At the federal level, we have not required that evidence obtained in violation of the Fourth Amendment be suppressed in all circumstances. See, e. g., United States v. Leon, 468 U. S. 897 (1984); United States v. Janis, 428 U. S. 433 (1976); United States v. Calandra, 414 U. S. 338 (1974). Rather, our decisions concerning the scope of the Fourth Amendment exclusionary rule have balanced the benefits of détérring police misconduct against the costs of excluding reliable evidence of criminal activity. See Leon, 468 U. S., at 908-913. We *45have declined to apply the exclusionary rule indiscriminately “when law enforcement officers have acted in objective good faith or their transgressions have been minor,” because “the magnitude of the benefit conferred on . . . guilty defendants [in such circumstances] offends basic concepts of the criminal justice system.” Id., at 908 (citing Stone v. Powell, 428 U. S. 465, 490 (1976)).

The States are not foreclosed by the Due Process Clause from using a similar balancing approach to delineate the scope of their own exclusionary rules. Hence, the people of California could permissibly conclude that the benefits of excluding relevant evidence of criminal activity do not outweigh the costs when the police conduct at issue does not violate federal law.

V

The judgment of the California Court of Appeal is therefore reversed, and this case is remanded for further proceedings not inconsistent with this opinion.

It is so ordered.

Justice Kennedy took no part in the consideration or decision of this case.

Justice Brennan,

with whom Justice Marshall joins, dissenting.

Every week for two months, and at least once more a month later, the Laguna Beach police clawed through the trash that respondent Greenwood left in opaque, sealed bags on the curb outside his home. Record 113. Complete strangers minutely scrutinized their bounty, undoubtedly dredging up intimate details of Greenwood’s private life and habits. The intrusions proceeded without a warrant, and no court before or since has concluded that the police acted on probable cause to believe Greenwood was engaged in any criminal activity.

Scrutiny of another’s trash is contrary to commonly accepted notions of civilized behavior. I suspect, therefore, *46that members of our society will be shocked to learn that the Court, the ultimate guarantor of liberty, deems unreasonable our expectation that the aspects of our private lives that are concealed safely in a trash bag will not become public.

I

"A container which can support a reasonable expectation of privacy may not be searched, even on probable cause, without a. warrant.” United States v. Jacobsen, 466 U. S. 109, 120, n. 17 (1984) (citations omitted). Thus, as the Court observes, if Greenwood had a reasonable expectation that the contents of the bags that he placed on the curb would remain private, the warrantless search of those bags violated the Fourth Amendment. Ante, at 39.

The Framers of the Fourth Amendment understood that “unreasonable searches” of “paper[s] and effects” — no less than “unreasonable searches” of “person[s] and houses” — infringe privacy. As early as 1878, this Court acknowledged that the contents of “[l]etters and sealed packages ... in the mail are as fully guarded from examination and inspection . . . as if they were retained by the parties forwarding them in their own domiciles.” Ex parte Jackson, 96 U. S. 727, 733. In short, so long as a package is “closed against inspection,” the Fourth Amendment protects its contents, “wherever they may be,” and the police must obtain a warrant to search it just “as is required when papers are subjected to search in one’s own household.” Jbid. Accord, United States v. Van Leeuwen, 397 U. S. 249 (1970).

With the emergence of the reasonable-expectation-of-privacy analysis, see Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring); Smith v. Maryland, 442 U. S. 735, 740 (1979), we have reaffirmed this fundamental principle. In Robbins v. California, 453 U. S. 420 (1981), for example, Justice Stewart, writing for a plurality of four, pronounced that “unless the container is such that its contents may be said to be in plain view, those contents are fully *47protected by the Fourth Amendment,” id., at 427, and soundly rejected any distinction for Fourth Amendment purposes among various opaque, sealed containers:

“[E]ven if one wished to import such a distinction into the Fourth Amendment, it is difficult if not impossible to perceive any objective criteria by which that task might be accomplished. What one person may put into a suitcase, another may put into a paper bag. . . . And ... no court, no constable, no citizen, can sensibly be asked to distinguish the relative ‘privacy interests’ in a closed suitcase, briefcase, portfolio, duffelbag, or box.” Id., at 426-427.

See also id., at 428 (expectation of privacy attaches to any container unless it “so clearly announced] its contents, whether by its distinctive configuration, its transparency,' or otherwise, that its contents are obvious to an observer”). With only one exception, every Justice who wrote in that case eschewed any attempt to distinguish “worthy” from “unworthy” containers.1

More recently, in United States v. Ross, 456 U. S. 798 (1982), the Court, relying on the “virtually unanimous agree*48ment in Robbins . . . that a constitutional distinction between ‘worthy’ and ‘unworthy’ containers would be improper,” held that a distinction among “paper bags, locked trunks, lunch buckets, and orange crates” would be inconsistent with

“the central purpose of the Fourth Amendment. . . . [A] traveler who carries a toothbrush and a few articles of clothing in a paper bag or knotted scarf [may] claim an equal right to conceal his possessions from official inspection as the sophisticated executive with the locked atta-ché case.
“As Justice Stewart stated in Robbins, the Fourth Amendment provides protection to the owner of every container that conceals its contents from plain view.” Id., at 822-823 (emphasis added; footnote and citation omitted).

See also Jacobsen, supra, at 129 (opinion of White, J.).

Accordingly, we have found a reasonable expectation of privacy in the contents of a 200-pound “double-locked footlocker,” United States v. Chadwick, 433 U. S. 1, 11 (1977); a “comparatively small, unlocked suitcase,” Arkansas v. Sanders, 442 U. S. 753, 762, n. 9 (1979); a “totebag,” Robbins, 453 U. S., at 422; and “packages wrapped in green opaque plastic,” ibid. See also Ross, supra, at 801, 822-823 (suggesting that a warrant would have been required to search a “ ‘lunch-type’ brown paper bag” and a “zippered red leather pouch” had they not been found in an automobile); Jacobsen, supra, at 111, 114-115 (suggesting that a warrantless search of an “ordinary cardboard box wrapped in brown paper” would have violated the Fourth Amendment had a private party not already opened it).

Our precedent, therefore, leaves no room to doubt that had respondents been carrying their personal effects in opaque, sealed plastic bags — identical to the ones they placed on the curb — their privacy would have been protected from war-rantless police intrusion. So far as Fourth Amendment protection is concerned, opaque plastic bags are every bit as *49worthy as “packages wrapped in green opaque plastic” and “double-locked footlocker[s].” Cf. Robbins, supra, at 441 (Rehnquist, J., dissenting) (objecting to Court’s discovery of reasonable expectation of privacy in contents of “two plastic garbage bags”).

II

Respondents deserve no less protection just because Greenwood used the bags to discard rather than to transport his personal effects. Their contents are not inherently any less private, and Greenwood’s decision to discard them, at least in the manner in which he did, does not diminish his expectation of privacy.2

*50A trash bag, like any of the above-mentioned containers, “is a common repository for one’s personal effects” and, even more than many of them, is “therefore . . . inevitably associated with the expectation of privacy.” Sanders, supra, at 762 (citing Chadwick, supra, at 13). “[AJlmost every human activity ultimately manifests itself in waste products . . . .” Smith v. State, 510 P. 2d 793, 798 (Alaska), cert. denied, 414 U. S. 1086 (1973). See California v. Rooney, 483 U. S. 307, 320-321, n. 3 (1987) (White, J., dissenting) (renowned archaeologist Emil Haury once said, “[i]f you want to know what is really going on in a community, look at its garbage”) (quoted by W. Rathje, Archaeological Ethnography . . . Because Sometimes It Is Better to Give Than to Receive, in Explorations in Ethnoarchaeology 49, 54 (R. Gould ed. 1978)); Weberman, The Art of Garbage Analysis: You Are What You Throw Away, 76 Esquire 113 (1971) (analyzing trash of various celebrities and drawing conclusions about their private lives). A single bag of trash testifies eloquently to the eating, reading, and recreational habits of the person who produced it. A search of trash, like a search of the bedroom, can relate intimate details about sexual practices, health, and personal hygiene. Like rifling through desk drawers or intercepting phone calls, rummaging through trash can divulge the target’s financial and professional status, political affiliations and inclinations, private thoughts, personal relationships, and romantic interests. It cannot be doubted that a sealed trash bag harbors telling evidence of the “intimate activity associated with the ‘sanctity of a man’s home and the privacies of life,’” which the Fourth Amendment is designed *51to protect. Oliver v. United States, 466 U. S. 170, 180 (1984) (quoting Boyd v. United States, 116 U. S. 616, 630 (1886)). See also United States v. Dunn, 480 U. S. 294, 300 (1987).

The Court properly rejects the Státe’s attempt to distinguish trash searches from other searches on the theory that trash is abandoned and therefore not entitled to an expectation of privacy. As the author of the Court’s opinion observed last Term, a defendant’s “property interest [in trash] does not settle the matter for Fourth Amendment purposes, for the reach of the Fourth Amendment is not determined by state property law.” Rooney, supra, at 320 (White, J., dissenting). In evaluating the reasonableness of Greenwood’s expectation that his sealed trash bags would not be invaded, the Court has held that we must look to “understandings that are recognized and permitted by society.”3 Most of us, I believe, would be incensed to discover a meddler — whether a neighbor, a reporter, or a detective — scrutinizing our sealed trash containers to discover some detail of our personal lives. See State v. Schultz, 388 So. 2d 1326, 1331 (Fla. App. 1980) (Anstead, J., dissenting). That was, quite naturally, the reaction to the sole incident on which the Court bases its conclusion that “snoops” and the like defeat the expectation of privacy in trash. Ante, at 40, and n. 4. When a tabloid reporter examined then-Secretary of State *52Henry Kissinger’s trash and published his findings, Kissinger was “really revolted” by the intrusion and his wife suffered “grave anguish.” N. Y. Times, July 9, 1975, p. Al, col. 8. The public response roundly condemning the reporter demonstrates that society not only recognized those reactions as reasonable, but shared them as well. Commentators variously characterized his conduct as “a disgusting invasion of personal privacy,” Flieger, Investigative Trash, U. S. News & World Report, July 28, 1975, p. 72 (editor’s page); “indefensible ... as civilized behavior,” Washington Post, July 10, 1975, p. A18, col. 1 (editorial); and contrary to “the way decent people behave in relation to each other,” ibid.

Beyond a generalized expectation of privacy, many municipalities, whether for reasons of privacy, sanitation, or both, reinforce confidence in the integrity of sealed trash containers by “prohibiting] anyone, except authorized employees of the Town ... , to rummage into, pick up, collect, move or otherwise interfere with articles or materials placed on . . . any public street for collection.” United States v. Dzialak, 441 F. 2d 212, 215 (CA2 1971) (paraphrasing ordinance for town of Cheektowaga, New York). See also United States v. Vahalik, 606 F. 2d 99, 100 (CA5 1979) (per curiam); Magda v. Benson, 536 F. 2d 111, 112 (CA6 1976) (per curiam); People v. Rooney, 175 Cal. App. 3d 634, 645, 221 Cal. Rptr. 49, 56 (1985), cert. dism’d, 483 U. S. 307 (1987); People v. Krivda, 5 Cal. 3d 357, 366, 486 P. 2d 1262, 1268 (1971), vacated and remanded, 409 U. S. 33 (1972); State v. Brown, 20 Ohio App. 3d 36, 38, n. 3, 484 N. E. 2d 215, 218, n. 3 (1984). In fact, the California Constitution, as interpreted by the State’s highest court, guarantees a right of privacy in trash vis-a-vis government officials. See Krivda, supra (recognizing right); In re Lance W., 37 Cal. 3d 873, 886-887, 694 P. 2d 744, 752-753 (1985) (later constitutional amendment abolished exclusionary remedy but left intact the substance of the right).

*53That is not to deny that isolated intrusions into opaque, sealed trash containers occur. When, acting on their own, “animals, children, scavengers, snoops, [or] other members of the public,” ante, at 40 (footnotes omitted), actually rummage through a bag of trash and expose its contents to plain view, “police cannot reasonably be expected to avert their eyes from evidence of criminal activity that could have been observed by any member of the public,” ante, at 41. That much follows from cases like Jacobsen, 466 U. S., at 117, 120, n. 17 (emphasis added), which held that police may constitutionally inspect a package whose “integrity” a private carrier has already “compromised,” because “[t]he Fourth Amendment is implicated only if the authorities use information with respect to which the expectation of privacy has not already been frustrated”; and California v. Ciraolo, 476 U. S. 207, 213-214 (1986) (emphasis added), which held that the Fourth Amendment does not prohibit police from observing what “[a]ny member of the public flying in this airspace who glanced down could have seen.”

Had Greenwood flaunted his intimate activity by strewing his trash all over the curb for all to see, or had some nongovernmental intruder invaded his privacy and done the same, I could accept the Court’s conclusion that an expectation of privacy would have been unreasonable. Similarly, had police searching the city dump run across incriminating evidence that, despite commingling with the trash of others, still retained its identity as Greenwood’s, we would have a different case. But all that Greenwood “exposed ... to the public,” ante, at 40, were the exteriors of several opaque, sealed containers. Until the bags were opened by police, they hid their contents from the public’s view every bit as much as did Chadwick’s double-locked footlocker and Robbins’ green, plastic wrapping. Faithful application of the warrant requirement does not require police to “avert their eyes from evidence of criminal activity that could have been observed by any member of the public.” Rather, it only requires them *54to adhere to norms of privacy that members of the public plainly acknowledge.

The mere 'possibility that unwelcome meddlers might open and rummage through the containers does not negate the expectation of privacy in their contents any more than the possibility of a burglary negates an expectation of privacy in the home; or the possibility of a private intrusion negates an expectation of privacy in an unopened package; or the possibility that an operator will listen in on a telephone conversation negates an expectation of privacy in the words spoken on the telephone. “What a person. . . seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Katz, 389 U. S., at 351-352. We have therefore repeatedly rejected attempts to justify a State’s invasion of privacy on the ground that the privacy is not absolute. See Chapman v. United States, 365 U. S. 610, 616-617 (1961) (search of a house invaded tenant’s Fourth Amendment rights even though landlord had authority to enter house for some purposes); Stoner v. California, 376 U. S. 483, 487-490 (1964) (implicit consent to janitorial personnel to enter motel room does not amount to consent to police search of room); O’Connor v. Ortega, 480 U. S. 709, 717 (1987) (a government employee has a reasonable expectation of privacy in his office, even though “it is the nature of government offices that others — such as fellow employees, supervisors, consensual visitors, and the general public — may have frequent access to an individual’s office”). As Justice Sc alia aptly put it, the Fourth Amendment protects “privacy . . . not solitude.” O’Connor, supra, at 730 (opinion concurring in judgment).

Nor is it dispositive that “respondents placed their refuse at the curb for the express purpose of conveying it to a third party, . . . who might himself have sorted through respondents’ trash or permitted others, such as the police, to do so.” Ante, at 40. In the first place, Greenwood can hardly be faulted for leaving trash on his curb when a county ordinance *55commanded him to do so, Orange County Code §4-3-45(a) (1986) (must “remov[e] from the premises at least once each week” all “solid waste created, produced or accumulated in or about [his] dwelling house”), and prohibited him from disposing of it in any other way, see Orange County Code § 3-3-85 (1988) (burning trash is unlawful). Unlike in other circumstances where privacy is compromised, Greenwood could not “avoid exposing personal belongings ... by simply leaving them at home.” O’Connor, supra, at 725. More importantly, even the voluntary relinquishment of possession or control over an effect does not necessarily amount to a relinquishment of a privacy expectation in it. Were it otherwise, a letter or package would lose all Fourth Amendment protection when placed in a mailbox or other depository with the “express purpose” of entrusting it to the postal officer or a private carrier; those bailees are just as likely as trash collectors (and certainly have greater incentive) to “sor[t] through” the personal effects entrusted to them, “or permi[t] others, such as police to do so.” Yet, it has been clear for at least 110 years that the possibility of such an intrusion does not justify a warrantless search by police in the first instance. See Ex parte Jackson, 96 U. S. 727 (1878); United States v. Van Leeuwen, 397 U. S. 249 (1970); United States v. Jacobsen, supra. 4

Ill

In holding that the warrantless search of Greenwood’s trash was consistent with the Fourth Amendment, the'Court paints a grim picture of our society. It depicts a society in which local authorities may command their citizens to dispose of their personal effects in the manner least protective of the *56“sanctity of [the] home and the privacies of life,” Boyd v. United States, 116 U. S., at 630, and then monitor them arbitrarily and without judicial oversight — a society that is not prepared to recognize as reasonable an individual’s expectation of privacy in the most private of personal effects sealed in an opaque container and disposed of in a manner designed to commingle it imminently and inextricably with the trash of others. Ante, at 39. The American society with which I am familiar “chooses to dwell in reasonable security and freedom from surveillance,” Johnson v. United States, 333 U. S. 10, 14 (1948), and is more dedicated to individual liberty and more sensitive to intrusions on the sanctity of the home than the Court is willing to acknowledge.

I dissent.

4.8 Planes 4.8 Planes

4.8.1 Florida v. Riley 4.8.1 Florida v. Riley

PLANES

488 U.S. 445 (1989)

FLORIDA
v.
RILEY

No. 87-764.

Supreme Court of United States.

Argued October 3, 1988
Decided January 23, 1989

CERTIORARI TO THE SUPREME COURT OF FLORIDA

[446] Parker D. Thomson, Special Assistant Attorney General of Florida, argued the cause for petitioner. With him on the briefs were Robert A. Butterworth, Attorney General, [447] Candace M. Sunderland and Peggy A. Quince, Assistant Attorneys General, and Cloyce L. Mangas, Jr., Special Assistant Attorney General.

Marc H. Salton argued the cause and filed a brief for respondent.[*]

Ronald M. Sinoway filed a brief for the California Attorneys for Criminal Justice et al. as amici curiae.

JUSTICE WHITE announced the judgment of the Court and delivered an opinion, in which THE CHIEF JUSTICE, JUSTICE SCALIA, and JUSTICE KENNEDY join.

On certification to it by a lower state court, the Florida Supreme Court addressed the following question: "Whether surveillance of the interior of a partially covered greenhouse [448] in a residential backyard from the vantage point of a helicopter located 400 feet above the greenhouse constitutes a `search' for which a warrant is required under the Fourth Amendment and Article I, § 12 of the Florida Constitution." 511 So. 2d 282 (1987). The court answered the question in the affirmative, and we granted the State's petition for certiorari challenging that conclusion. 484 U. S. 1058 (1988).[1]

Respondent Riley lived in a mobile home located on five acres of rural property. A greenhouse was located 10 to 20 feet behind the mobile home. Two sides of the greenhouse were enclosed. The other two sides were not enclosed but the contents of the greenhouse were obscured from view from surrounding property by trees, shrubs, and the mobile home. The greenhouse was covered by corrugated roofing panels, some translucent and some opaque. At the time relevant to this case, two of the panels, amounting to approximately 10% of the roof area, were missing. A wire fence surrounded the mobile home and the greenhouse, and the property was posted with a "DO NOT ENTER" sign.

This case originated with an anonymous tip to the Pasco County Sheriff's office that marijuana was being grown on respondent's property. When an investigating officer discovered that he could not see the contents of the greenhouse from the road, he circled twice over respondent's property in a helicopter at the height of 400 feet. With his naked eye, he was able to see through the openings in the roof and one or more of the open sides of the greenhouse and to identify what he thought was marijuana growing in the structure. A warrant [449] was obtained based on these observations, and the ensuing search revealed marijuana growing in the greenhouse. Respondent was charged with possession of marijuana under Florida law. The trial court granted his motion to suppress; the Florida Court of Appeals reversed but certified the case to the Florida Supreme Court, which quashed the decision of the Court of Appeals and reinstated the trial court's suppression order.

We agree with the State's submission that our decision in California v. Ciraolo, 476 U. S. 207 (1986), controls this case. There, acting on a tip, the police inspected the backyard of a particular house while flying in a fixed-wing aircraft at 1,000 feet. With the naked eye the officers saw what they concluded was marijuana growing in the yard. A search warrant was obtained on the strength of this airborne inspection, and marijuana plants were found. The trial court refused to suppress this evidence, but a state appellate court held that the inspection violated the Fourth and Fourteenth Amendments to the United States Constitution, and that the warrant was therefore invalid. We in turn reversed, holding that the inspection was not a search subject to the Fourth Amendment. We recognized that the yard was within the curtilage of the house, that a fence shielded the yard from observation from the street, and that the occupant had a subjective expectation of privacy. We held, however, that such an expectation was not reasonable and not one "that society is prepared to honor." Id., at 214. Our reasoning was that the home and its curtilage are not necessarily protected from inspection that involves no physical invasion. " `What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.' " Id., at 213, quoting Katz v. United States, 389 U. S. 347, 351 (1967). As a general proposition, the police may see what may be seen "from a public vantage point where [they have] a right to be," 476 U. S., at 213. Thus the police, like the public, would have been free to inspect the backyard garden from [450] the street if their view had been unobstructed. They were likewise free to inspect the yard from the vantage point of an aircraft flying in the navigable airspace as this plane was. "In an age where private and commercial flight in the public airways is routine, it is unreasonable for respondent to expect that his marijuana plants were constitutionally protected from being observed with the naked eye from an altitude of 1,000 feet. The Fourth Amendment simply does not require the police traveling in the public airways at this altitude to obtain a warrant in order to observe what is visible to the naked eye." Id., at 215.

We arrive at the same conclusion in the present case. In this case, as in Ciraolo, the property surveyed was within the curtilage of respondent's home. Riley no doubt intended and expected that his greenhouse would not be open to public inspection, and the precautions he took protected against ground-level observation. Because the sides and roof of his greenhouse were left partially open, however, what was growing in the greenhouse was subject to viewing from the air. Under the holding in Ciraolo, Riley could not reasonably have expected the contents of his greenhouse to be immune from examination by an officer seated in a fixed-wing aircraft flying in navigable airspace at an altitude of 1,000 feet or, as the Florida Supreme Court seemed to recognize, at an altitude of 500 feet, the lower limit of the navigable airspace for such an aircraft. 511 So. 2d, at 288. Here, the inspection was made from a helicopter, but as is the case with fixed-wing planes, "private and commercial flight [by helicopter] in the public airways is routine" in this country, Ciraolo, supra, at 215, and there is no indication that such flights are unheard of in Pasco County, Florida.[2] Riley could not reasonably [451] have expected that his greenhouse was protected from public or official observation from a helicopter had it been flying within the navigable airspace for fixed-wing aircraft.

Nor on the facts before us, does it make a difference for Fourth Amendment purposes that the helicopter was flying at 400 feet when the officer saw what was growing in the greenhouse through the partially open roof and sides of the structure. We would have a different case if flying at that altitude had been contrary to law or regulation. But helicopters are not bound by the lower limits of the navigable airspace allowed to other aircraft.[3] Any member of the public could legally have been flying over Riley's property in a helicopter at the altitude of 400 feet and could have observed Riley's greenhouse. The police officer did no more. This is not to say that an inspection of the curtilage of a house from an aircraft will always pass muster under the Fourth Amendment simply because the plane is within the navigable airspace specified by law. But it is of obvious importance that the helicopter in this case was not violating the law, and there is nothing in the record or before us to suggest that helicopters flying at 400 feet are sufficiently rare in this country to lend substance to respondent's claim that he reasonably anticipated that his greenhouse would not be subject to [452] observation from that altitude. Neither is there any intimation here that the helicopter interfered with respondent's normal use of the greenhouse or of other parts of the curtilage. As far as this record reveals, no intimate details connected with the use of the home or curtilage were observed, and there was no undue noise, and no wind, dust, or threat of injury. In these circumstances, there was no violation of the Fourth Amendment.

The judgment of the Florida Supreme Court is accordingly reversed.

So ordered.

JUSTICE O'CONNOR, concurring in the judgment.

I concur in the judgment reversing the Supreme Court of Florida because I agree that police observation of the greenhouse in Riley's curtilage from a helicopter passing at an altitude of 400 feet did not violate an expectation of privacy "that society is prepared to recognize as `reasonable.' " Katz v. United States, 389 U. S. 347, 361 (1967) (Harlan, J., concurring). I write separately, however, to clarify the standard I believe follows from California v. Ciraolo, 476 U. S. 207 (1986). In my view, the plurality's approach rests the scope of Fourth Amendment protection too heavily on compliance with FAA regulations whose purpose is to promote air safety, not to protect "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." U. S. Const., Amdt. 4.

Ciraolo involved observation of curtilage by officers flying in an airplane at an altitude of 1,000 feet. In evaluating whether this observation constituted a search for which a warrant was required, we acknowledged the importance of curtilage in Fourth Amendment doctrine: "The protection afforded the curtilage is essentially a protection of families and personal privacy in an area intimately linked to the home, both physically and psychologically, where privacy expectations are most heightened." 476 U. S., at 212-213. Although the curtilage is an area to which the private activities [453] of the home extend, all police observation of the curtilage is not necessarily barred by the Fourth Amendment. As we observed: "The Fourth Amendment protection of the home has never been extended to require law enforcement officers to shield their eyes when passing by a home on public thoroughfares." Id., at 213. In Ciraolo, we likened observation from a plane traveling in "public navigable airspace" at 1,000 feet to observation by police "passing by a home on public thoroughfares." We held that "[i]n an age where private and commercial flight in the public airways is routine," it is unreasonable to expect the curtilage to be constitutionally protected from aerial observation with the naked eye from an altitude of 1,000 feet. Id., at 215.

Ciraolo's expectation of privacy was unreasonable not because the airplane was operating where it had a "right to be," but because public air travel at 1,000 feet is a sufficiently routine part of modern life that it is unreasonable for persons on the ground to expect that their curtilage will not be observed from the air at that altitude. Although "helicopters are not bound by the lower limits of the navigable airspace allowed to other aircraft," ante, at 451, there is no reason to assume that compliance with FAA regulations alone determines " `whether the government's intrusion infringes upon the personal and societal values protected by the Fourth Amendment.' " Ciraolo, supra, at 212 (quoting Oliver v. United States, 466 U. S. 170, 182-183 (1984)). Because the FAA has decided that helicopters can lawfully operate at virtually any altitude so long as they pose no safety hazard, it does not follow that the expectations of privacy "society is prepared to recognize as `reasonable' " simply mirror the FAA's safety concerns.

Observations of curtilage from helicopters at very low altitudes are not perfectly analogous to ground-level observations from public roads or sidewalks. While in both cases the police may have a legal right to occupy the physical space from which their observations are made, the two situations [454] are not necessarily comparable in terms of whether expectations of privacy from such vantage points should be considered reasonable. Public roads, even those less traveled by, are clearly demarked public thoroughfares. Individuals who seek privacy can take precautions, tailored to the location of the road, to avoid disclosing private activities to those who pass by. They can build a tall fence, for example, and thus ensure private enjoyment of the curtilage without risking public observation from the road or sidewalk. If they do not take such precautions, they cannot reasonably expect privacy from public observation. In contrast, even individuals who have taken effective precautions to ensure against ground-level observations cannot block off all conceivable aerial views of their outdoor patios and yards without entirely giving up their enjoyment of those areas. To require individuals to completely cover and enclose their curtilage is to demand more than the "precautions customarily taken by those seeking privacy." Rakas v. Illinois, 439 U. S. 128, 152 (1978) (Powell, J., concurring). The fact that a helicopter could conceivably observe the curtilage at virtually any altitude or angle, without violating FAA regulations, does not in itself mean that an individual has no reasonable expectation of privacy from such observation.

In determining whether Riley had a reasonable expectation of privacy from aerial observation, the relevant inquiry after Ciraolo is not whether the helicopter was where it had a right to be under FAA regulations. Rather, consistent with Katz, we must ask whether the helicopter was in the public airways at an altitude at which members of the public travel with sufficient regularity that Riley's expectation of privacy from aerial observation was not "one that society is prepared to recognize as `reasonable.' " Katz, supra, at 361. Thus, in determining " `whether the government's intrusion infringes upon the personal and societal values protected by the Fourth Amendment,' " Ciraolo, supra, at 212 (quoting Oliver, supra, at 182-183), it is not conclusive to observe, [455] as the plurality does, that "[a]ny member of the public could legally have been flying over Riley's property in a helicopter at the altitude of 400 feet and could have observed Riley's greenhouse." Ante, at 451. Nor is it conclusive that police helicopters may often fly at 400 feet. If the public rarely, if ever, travels overhead at such altitudes, the observation cannot be said to be from a vantage point generally used by the public and Riley cannot be said to have "knowingly expose[d]" his greenhouse to public view. However, if the public can generally be expected to travel over residential backyards at an altitude of 400 feet, Riley cannot reasonably expect his curtilage to be free from such aerial observation.

In my view, the defendant must bear the burden of proving that his expectation of privacy was a reasonable one, and thus that a "search" within the meaning of the Fourth Amendment even took place. Cf. Jones v. United States, 362 U. S. 257, 261 (1960) ("Ordinarily, then, it is entirely proper to require of one who seeks to challenge the legality of a search as the basis for suppressing relevant evidence that he allege, and if the allegation be disputed that he establish, that he himself was the victim of an invasion of privacy"); Nardone v. United States, 308 U. S. 338, 341 (1939).

Because there is reason to believe that there is considerable public use of airspace at altitudes of 400 feet and above, and because Riley introduced no evidence to the contrary before the Florida courts, I conclude that Riley's expectation that his curtilage was protected from naked-eye aerial observation from that altitude was not a reasonable one. However, public use of altitudes lower than that — particularly public observations from helicopters circling over the curtilage of a home — may be sufficiently rare that police surveillance from such altitudes would violate reasonable expectations of privacy, despite compliance with FAA air safety regulations.

[456] JUSTICE BRENNAN, with whom JUSTICE MARSHALL and JUSTICE STEVENS join, dissenting.

The Court holds today that police officers need not obtain a warrant based on probable cause before circling in a helicopter 400 feet above a home in order to investigate what is taking place behind the walls of the curtilage. I cannot agree that the Fourth Amendment to the Constitution, which safeguards "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures," tolerates such an intrusion on privacy and personal security.

I

The opinion for a plurality of the Court reads almost as if Katz v. United States, 389 U. S. 347 (1967), had never been decided. Notwithstanding the disclaimers of its final paragraph, the opinion relies almost exclusively on the fact that the police officer conducted his surveillance from a vantage point where, under applicable Federal Aviation Administration regulations, he had a legal right to be. Katz teaches, however, that the relevant inquiry is whether the police surveillance "violated the privacy upon which [the defendant] justifiably relied," id., at 353 — or, as Justice Harlan put it, whether the police violated an "expectation of privacy . . . that society is prepared to recognize as `reasonable.' " Id., at 361 (concurring opinion). The result of that inquiry in any given case depends ultimately on the judgment "whether, if the particular form of surveillance practiced by the police is permitted to go unregulated by constitutional restraints, the amount of privacy and freedom remaining to citizens would be diminished to a compass inconsistent with the aims of a free and open society." Amsterdam, Perspectives on the Fourth Amendment, 58 Minn. L. Rev. 349, 403 (1974); see also 1 W. LaFave, Search and Seizure § 2.1(d), pp. 310-314 (2d ed. 1987).

The plurality undertakes no inquiry into whether low-level helicopter surveillance by the police of activities in an enclosed [457] backyard is consistent with the "aims of a free and open society." Instead, it summarily concludes that Riley's expectation of privacy was unreasonable because "[a]ny member of the public could legally have been flying over Riley's property in a helicopter at the altitude of 400 feet and could have observed Riley's greenhouse." Ante, at 451. This observation is, in turn, based solely on the fact that the police helicopter was within the airspace within which such craft are allowed by federal safety regulations to fly.

I agree, of course, that "[w]hat a person knowingly exposes to the public . . . is not a subject of Fourth Amendment protection." Katz, supra, at 351. But I cannot agree that one "knowingly exposes [an area] to the public" solely because a helicopter may legally fly above it. Under the plurality's exceedingly grudging Fourth Amendment theory, the expectation of privacy is defeated if a single member of the public could conceivably position herself to see into the area in question without doing anything illegal. It is defeated whatever the difficulty a person would have in so positioning herself, and however infrequently anyone would in fact do so. In taking this view the plurality ignores the very essence of Katz. The reason why there is no reasonable expectation of privacy in an area that is exposed to the public is that little diminution in "the amount of privacy and freedom remaining to citizens" will result from police surveillance of something that any passerby readily sees. To pretend, as the plurality opinion does, that the same is true when the police use a helicopter to peer over high fences is, at best, disingenuous. Notwithstanding the plurality's statistics about the number of helicopters registered in this country, can it seriously be questioned that Riley enjoyed virtually complete privacy in his backyard greenhouse, and that that privacy was invaded solely by police helicopter surveillance? Is the theoretical possibility that any member of the public (with sufficient means) could also have hired a helicopter and looked over Riley's fence of any relevance at all in determining [458] whether Riley suffered a serious loss of privacy and personal security through the police action?

In California v. Ciraolo, 476 U. S. 207 (1986), we held that whatever might be observed from the window of an airplane flying at 1,000 feet could be deemed unprotected by any reasonable expectation of privacy. That decision was based on the belief that airplane traffic at that altitude was sufficiently common that no expectation of privacy could inure in anything on the ground observable with the naked eye from so high. Indeed, we compared those airways to "public thoroughfares," and made the obvious point that police officers passing by a home on such thoroughfares were not required by the Fourth Amendment to "shield their eyes." Id., at 213. Seizing on a reference in Ciraolo to the fact that the police officer was in a position "where he ha[d] a right to be," ibid., today's plurality professes to find this case indistinguishable because FAA regulations do not impose a minimum altitude requirement on helicopter traffic; thus, the officer in this case too made his observations from a vantage point where he had a right to be.[1]

It is a curious notion that the reach of the Fourth Amendment can be so largely defined by administrative regulations issued for purposes of flight safety.[2] It is more curious still [459] that the plurality relies to such an extent on the legality of the officer's act, when we have consistently refused to equate police violation of the law with infringement of the Fourth Amendment.[3] But the plurality's willingness to end its inquiry when it finds that the officer was in a position he had a right to be in is misguided for an even more fundamental reason. Finding determinative the fact that the officer was where he had a right to be is, at bottom, an attempt to analogize surveillance from a helicopter to surveillance by a police officer standing on a public road and viewing evidence of crime through an open window or a gap in a fence. In such a situation, the occupant of the home may be said to lack any [460] reasonable expectation of privacy in what can be seen from that road — even if, in fact, people rarely pass that way.

The police officer positioned 400 feet above Riley's backyard was not, however, standing on a public road. The vantage point he enjoyed was not one any citizen could readily share. His ability to see over Riley's fence depended on his use of a very expensive and sophisticated piece of machinery to which few ordinary citizens have access. In such circumstances it makes no more sense to rely on the legality of the officer's position in the skies than it would to judge the constitutionality of the wiretap in Katz by the legality of the officer's position outside the telephone booth. The simple inquiry whether the police officer had the legal right to be in the position from which he made his observations cannot suffice, for we cannot assume that Riley's curtilage was so open to the observations of passersby in the skies that he retained little privacy or personal security to be lost to police surveillance. The question before us must be not whether the police were where they had a right to be, but whether public observation of Riley's curtilage was so commonplace that Riley's expectation of privacy in his backyard could not be considered reasonable. To say that an invasion of Riley's privacy from the skies was not impossible is most emphatically not the same as saying that his expectation of privacy within his enclosed curtilage was not "one that society is prepared to recognize as `reasonable.' " Katz, 389 U. S., at 361 (Harlan, J., concurring).[4] While, as we held in Ciraolo, air traffic at elevations of 1,000 feet or more may be so common that whatever could be seen with the naked eye from that elevation is unprotected by the Fourth Amendment, it is a large step from there to say that the Amendment offers no protection against low-level helicopter surveillance of enclosed curtilage [461] areas. To take this step is error enough. That the plurality does so with little analysis beyond its determination that the police complied with FAA regulations is particularly unfortunate.

II

Equally disconcerting is the lack of any meaningful limit to the plurality's holding. It is worth reiterating that the FAA regulations the plurality relies on as establishing that the officer was where he had a right to be set no minimum flight altitude for helicopters. It is difficult, therefore, to see what, if any, helicopter surveillance would run afoul of the plurality's rule that there exists no reasonable expectation of privacy as long as the helicopter is where it has a right to be.

Only in its final paragraph does the plurality opinion suggest that there might be some limits to police helicopter surveillance beyond those imposed by FAA regulations:

"Neither is there any intimation here that the helicopter interfered with respondent's normal use of the greenhouse or of other parts of the curtilage. As far as this record reveals, no intimate details connected with the use of the home or curtilage were observed, and there was no undue noise, and no wind, dust, or threat of injury. In these circumstances, there was no violation of the Fourth Amendment." Ante, at 452.[5]

I will deal with the "intimate details" below. For the rest, one wonders what the plurality believes the purpose of the Fourth Amendment to be. If through noise, wind, dust, and threat of injury from helicopters the State "interfered with respondent's normal use of the greenhouse or of other parts [462] of the curtilage," Riley might have a cause of action in inverse condemnation, but that is not what the Fourth Amendment is all about. Nowhere is this better stated than in JUSTICE WHITE'S opinion for the Court in Camara v. Municipal Court, 387 U. S. 523, 528 (1967): "The basic purpose of this Amendment, as recognized in countless decisions of this Court, is to safeguard the privacy and security of individuals against arbitrary invasions by governmental officials." See also Marshall v. Barlow's, Inc., 436 U. S. 307, 312 (1978) (same); Schmerber v. California, 384 U. S. 757, 767 (1966) ("The overriding function of the Fourth Amendment is to protect personal privacy and dignity against unwarranted intrusion by the State"); Wolf v. Colorado, 338 U. S. 25, 27 (1949) ("The security of one's privacy against arbitrary intrusion by the police . . . is at the core of the Fourth Amendment. . . "), overruled on other grounds, Mapp v. Ohio, 367 U. S. 643 (1961); Boyd v. United States, 116 U. S. 616, 630 (1886) ("It is not the breaking of his doors, and the rummaging of his drawers, that constitutes the essence of the offence; but it is the invasion of his indefeasible right of personal security. . .").

If indeed the purpose of the restraints imposed by the Fourth Amendment is to "safeguard the privacy and security of individuals," then it is puzzling why it should be the helicopter's noise, wind, and dust that provides the measure of whether this constitutional safeguard has been infringed. Imagine a helicopter capable of hovering just above an enclosed courtyard or patio without generating any noise, wind, or dust at all — and, for good measure, without posing any threat of injury. Suppose the police employed this miraculous tool to discover not only what crops people were growing in their greenhouses, but also what books they were reading and who their dinner guests were. Suppose, finally, that the FAA regulations remained unchanged, so that the police were undeniably "where they had a right to be." Would today's [463] plurality continue to assert that "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" was not infringed by such surveillance? Yet that is the logical consequence of the plurality's rule that, so long as the police are where they have a right to be under air traffic regulations, the Fourth Amendment is offended only if the aerial surveillance interferes with the use of the backyard as a garden spot. Nor is there anything in the plurality's opinion to suggest that any different rule would apply were the police looking from their helicopter, not into the open curtilage, but through an open window into a room viewable only from the air.

III

Perhaps the most remarkable passage in the plurality opinion is its suggestion that the case might be a different one had any "intimate details connected with the use of the home or curtilage [been] observed." Ante, at 452. What, one wonders, is meant by "intimate details"? If the police had observed Riley embracing his wife in the backyard greenhouse, would we then say that his reasonable expectation of privacy had been infringed? Where in the Fourth Amendment or in our cases is there any warrant for imposing a requirement that the activity observed must be "intimate" in order to be protected by the Constitution?

It is difficult to avoid the conclusion that the plurality has allowed its analysis of Riley's expectation of privacy to be colored by its distaste for the activity in which he was engaged. It is indeed easy to forget, especially in view of current concern over drug trafficking, that the scope of the Fourth Amendment's protection does not turn on whether the activity disclosed by a search is illegal or innocuous. But we dismiss this as a "drug case" only at the peril of our own liberties. Justice Frankfurter once noted that "[i]t is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very [464] nice people," United States v. Rabinowitz, 339 U. S. 56, 69 (1950) (dissenting opinion), and nowhere is this observation more apt than in the area of the Fourth Amendment, whose words have necessarily been given meaning largely through decisions suppressing evidence of criminal activity. The principle enunciated in this case determines what limits the Fourth Amendment imposes on aerial surveillance of any person, for any reason. If the Constitution does not protect Riley's marijuana garden against such surveillance, it is hard to see how it will prohibit the government from aerial spying on the activities of a law-abiding citizen on her fully enclosed outdoor patio. As Professor Amsterdam has eloquently written: "The question is not whether you or I must draw the blinds before we commit a crime. It is whether you and I must discipline ourselves to draw the blinds every time we enter a room, under pain of surveillance if we do not." 58 Minn. L. Rev., at 403.[6]

IV

I find little to disagree with in JUSTICE O'CONNOR'S concurrence, apart from its closing paragraphs. A majority of the Court thus agrees that the fundamental inquiry is not whether the police were where they had a right to be under FAA regulations, but rather whether Riley's expectation of privacy was rendered illusory by the extent of [465] public observation of his backyard from aerial traffic at 400 feet.

What separates me from JUSTICE O'CONNOR is essentially an empirical matter concerning the extent of public use of the airspace at that altitude, together with the question of how to resolve that issue. I do not think the constitutional claim should fail simply because "there is reason to believe" that there is "considerable" public flying this close to earth or because Riley "introduced no evidence to the contrary before the Florida courts." Ante, at 455 (O'CONNOR, J., concurring in judgment). I should think that this might be an apt occasion for the application of Professor Davis' distinction between "adjudicative" and "legislative" facts. See Davis, An Approach to Problems of Evidence in the Administrative Process, 55 Harv. L. Rev. 364, 402-410 (1942); see also Advisory Committee's Notes on Fed. Rule Evid. 201, 28 U. S. C. App., pp. 683-684. If so, I think we could take judicial notice that, while there may be an occasional privately owned helicopter that flies over populated areas at an altitude of 400 feet, such flights are a rarity and are almost entirely limited to approaching or leaving airports or to reporting traffic congestion near major roadways. And, as the concurrence agrees, ante, at 455, the extent of police surveillance traffic cannot serve as a bootstrap to demonstrate public use of the airspace.

If, however, we are to resolve the issue by considering whether the appropriate party carried its burden of proof, I again think that Riley must prevail. Because the State has greater access to information concerning customary flight patterns and because the coercive power of the State ought not be brought to bear in cases in which it is unclear whether the prosecution is a product of an unconstitutional, warrantless search, cf. Bumper v. North Carolina, 391 U. S. 543, 548 (1968) (prosecutor has burden of proving consent to search), the burden of proof properly rests with the State and [466] not with the individual defendant. The State quite clearly has not carried this burden.[7]

V

The issue in this case is, ultimately, "how tightly the fourth amendment permits people to be driven back into the recesses of their lives by the risk of surveillance." Amsterdam, supra, at 402. The Court today approves warrantless helicopter surveillance from an altitude of 400 feet. While JUSTICE O'CONNOR'S opinion gives reason to hope that this altitude may constitute a lower limit, I find considerable cause for concern in the fact that a plurality of four Justices would remove virtually all constitutional barriers to police surveillance from the vantage point of helicopters. The Fourth Amendment demands that we temper our efforts to apprehend criminals with a concern for the impact on our fundamental liberties of the methods we use. I hope it will be a matter of concern to my colleagues that the police surveillance methods they would sanction were among those described 40 years ago in George Orwell's dread vision of life in the 1980's:

"The black-mustachio'd face gazed down from every commanding corner. There was one on the house front immediately opposite. BIG BROTHER IS WATCHING YOU, the caption said . . . . In the far distance a helicopter skimmed down between the roofs, hovered for an instant like a bluebottle, and darted away again with a curving flight. It was the Police Patrol, snooping into people's windows." Nineteen Eighty-Four 4 (1949).

[467] Who can read this passage without a shudder, and without the instinctive reaction that it depicts life in some country other than ours? I respectfully dissent.

JUSTICE BLACKMUN, dissenting.

The question before the Court is whether the helicopter surveillance over Riley's property constituted a "search" within the meaning of the Fourth Amendment. Like JUSTICE BRENNAN, JUSTICE MARSHALL, JUSTICE STEVENS, and JUSTICE O'CONNOR, I believe that answering this question depends upon whether Riley has a "reasonable expectation of privacy" that no such surveillance would occur, and does not depend upon the fact that the helicopter was flying at a lawful altitude under FAA regulations. A majority of this Court thus agrees to at least this much.

The inquiry then becomes how to determine whether Riley's expectation was a reasonable one. JUSTICE BRENNAN, the two Justices who have joined him, and JUSTICE O'CONNOR all believe that the reasonableness of Riley's expectation depends, in large measure, on the frequency of nonpolice helicopter flights at an altitude of 400 feet. Again, I agree.

How is this factual issue to be decided? JUSTICE BRENNAN suggests that we may resolve it ourselves without any evidence in the record on this point. I am wary of this approach. While I, too, suspect that for most American communities it is a rare event when nonpolice helicopters fly over one's curtilage at an altitude of 400 feet, I am not convinced that we should establish a per se rule for the entire Nation based on judicial suspicion alone. See Coffin, Judicial Balancing, 63 N. Y. U. L. Rev. 16, 37 (1988).

But we need not abandon our judicial intuition entirely. The opinions of both JUSTICE BRENNAN and JUSTICE O'CONNOR, by their use of "cf." citations, implicitly recognize that none of our prior decisions tells us who has the burden of proving whether Riley's expectation of privacy was reasonable. In the absence of precedent on the point, it is appropriate for us to take into account our estimation of the [468] frequency of nonpolice helicopter flights. See 4 W. LaFave, Search and Seizure § 11.2(b), p. 228 (2d ed. 1987) (burdens of proof relevant to Fourth Amendment issues may be based on a judicial estimate of the probabilities involved). Thus, because I believe that private helicopters rarely fly over curtilages at an altitude of 400 feet, I would impose upon the prosecution the burden of proving contrary facts necessary to show that Riley lacked a reasonable expectation of privacy. Indeed, I would establish this burden of proof for any helicopter surveillance case in which the flight occurred below 1,000 feet — in other words, for any aerial surveillance case not governed by the Court's decision in California v. Ciraolo, 476 U. S. 207 (1986).

In this case, the prosecution did not meet this burden of proof, as JUSTICE BRENNAN notes. This failure should compel a finding that a Fourth Amendment search occurred. But because our prior cases gave the parties little guidance on the burden of proof issue, I would remand this case to allow the prosecution an opportunity to meet this burden.

The order of this Court, however, is not to remand the case in this manner. Rather, because JUSTICE O'CONNOR would impose the burden of proof on Riley and because she would not allow Riley an opportunity to meet this burden, she joins the plurality's view that no Fourth Amendment search occurred. The judgment of the Court, therefore, is to reverse outright on the Fourth Amendment issue. Accordingly, for the reasons set forth above, I respectfully dissent.

[*] Briefs of amici curiae urging reversal were filed for the State of Indiana et al. by Linley E. Pearson, Attorney General of Indiana, and Lisa M. Paunicka, Deputy Attorney General, Don Siegelman, Attorney General of Alabama, Robert K. Corbin, Attorney General of Arizona, John Steven Clark, Attorney General of Arkansas, John J. Kelly, Chief State's Attorney of Connecticut, Charles M. Oberly, Attorney General of Delaware, Warren Price III, Attorney General of Hawaii, Jim Jones, Attorney General of Idaho, Neil F. Hartigan, Attorney General of Illinois, Robert T. Stephan, Attorney General of Kansas, Frederic J. Cowan, Attorney General of Kentucky, Frank J. Kelley, Attorney General of Michigan, Hubert H. Humphrey III, Attorney General of Minnesota, William L. Webster, Attorney General of Missouri, Robert M. Spire, Attorney General of Nebraska, Lacy H. Thornburg, Attorney General of North Carolina, Anthony J. Celebrezze, Jr., Attorney General of Ohio, Dave Frohnmayer, Attorney General of Oregon, Travis Medlock, Attorney General of South Carolina, Roger A. Tellinghuisen, Attorney General of South Dakota, David L. Wilkinson, Attorney General of Utah, Jeffrey Amestoy, Attorney General of Vermont, Don Hanaway, Attorney General of Wisconsin, and Joseph B. Meyer, Attorney General of Wyoming; and for the Airborne Law Enforcement Association, Inc., by Ellen M. Condon and Paul J. Marino.

Briefs of amici curiae urging affirmance were filed for the American Civil Liberties Union et al. by Kent L. Richland, Pamela Victorine, John A. Powell, Steve R. Shapiro, Paul Hoffman, Joan W. Howarth, and James K. Green; for Community Outreach to Vietnam Era Returnees, Inc., by Deborah C. Wyatt; and for the National Association of Criminal Defense Lawyers by Milton Hirsch.

[1] The Florida Supreme Court mentioned the State Constitution in posing the question, once in the course of its opinion, and again in finally concluding that the search violated the Fourth Amendment and the State Constitution. The bulk of the discussion, however, focused exclusively on federal cases dealing with the Fourth Amendment, and there being no indication that the decision "clearly and expressly . . . is alternatively based on bona fide separate, adequate, and independent grounds," we have jurisdiction. Michigan v. Long, 463 U. S. 1032, 1041 (1983).

[2] The first use of the helicopter by police was in New York in 1947, and today every State in the country uses helicopters in police work. As of 1980, there were 1,500 such aircraft used in police work. E. Brown, The Helicopter in Civil Operations 79 (1981). More than 10,000 helicopters, both public and private, are registered in the United States. Federal Aviation Administration, Census of U. S. Civil Aircraft, Calendar Year 1987, p. 12. See also 1988 Helicopter Annual 9. And there are an estimated 31,697 helicopter pilots. Federal Aviation Administration, Statistical Handbook of Aviation, Calendar Year 1986, p. 147.

[3] While Federal Aviation Administration regulations permit fixed-wing aircraft to be operated at an altitude of 1,000 feet while flying over congested areas and at an altitude of 500 feet above the surface in other than congested areas, helicopters may be operated at less than the minimums for fixed-wing aircraft "if the operation is conducted without hazard to persons or property on the surface. In addition, each person operating a helicopter shall comply with routes or altitudes specifically prescribed for helicopters by the [FAA] Administrator." 14 CFR § 91.79 (1988).

[1] What the plurality now states as a firm rule of Fourth Amendment jurisprudence appeared in Ciraolo, 476 U. S., at 213, as a passing comment: "Nor does the mere fact that an individual has taken measures to restrict some views of his activities preclude an officer's observations from a public vantage point where he has a right to be and which renders the activities clearly visible. E. g., United States v. Knotts, 460 U. S. 276, 282 (1983)." This rule for determining the constitutionality of aerial surveillance thus derives ultimately from Knotts, a case in which the police officers' feet were firmly planted on the ground. What is remarkable is not that one case builds on another, of course, but rather that a principle based on terrestrial observation was applied to airborne surveillance without any consideration whether that made a difference.

[2] The plurality's use of the FAA regulations as a means for determining whether Riley enjoyed a reasonable expectation of privacy produces an incredible result. Fixed-wing aircraft may not be operated below 500 feet (1,000 feet over congested areas), while helicopters may be operated below those levels. See ante, at 451, n. 3. Therefore, whether Riley's expectation of privacy is reasonable turns on whether the police officer at 400 feet above his curtilage is seated in an airplane or a helicopter. This cannot be the law.

[3] In Oliver v. United States, 466 U. S. 170 (1984), for example, we held that police officers who trespassed upon posted and fenced private land did not violate the Fourth Amendment, despite the fact that their action was subject to criminal sanctions. We noted that the interests vindicated by the Fourth Amendment were not identical with those served by the common law of trespass. See id., at 183-184, and n. 15; see also Hester v. United States, 265 U. S. 57 (1924) (trespass in "open fields" does not violate the Fourth Amendment). In Olmstead v. United States, 277 U. S. 438, 466-469 (1928), the illegality under state law of a wiretap that yielded the disputed evidence was deemed irrelevant to its admissibility. And of course Katz v. United States, 389 U. S. 347 (1967), which overruled Olmstead, made plain that the question whether or not the disputed evidence had been procured by means of a trespass was irrelevant. Recently, in Dow Chemical Co. v. United States, 476 U. S. 227, 239, n. 6 (1986), we declined to consider trade-secret laws indicative of a reasonable expectation of privacy. Our precedent thus points not toward the position adopted by the plurality opinion, but rather toward the view on this matter expressed some years ago by the Oregon Court of Appeals: "We . . . find little attraction in the idea of using FAA regulations because they were not formulated for the purpose of defining the reasonableness of citizens' expectations of privacy. They were designed to promote air safety." State v. Davis, 51 Ore. App. 827, 831, 627 P. 2d 492, 494 (1981).

[4] Cf. California v. Greenwood, 486 U. S. 35, 54 (1988) (BRENNAN, J., dissenting) ("The mere possibility that unwelcome meddlers might open and rummage through the containers does not negate the expectation of privacy in their contents . . .").

[5] Without actually stating that it makes any difference, the plurality also notes that "there is nothing in the record or before us to suggest" that helicopter traffic at the 400-foot level is so rare as to justify Riley's expectation of privacy. Ante, at 451. The absence of anything "in the record or before us" to suggest the opposite, however, seems not to give the plurality pause. It appears, therefore, that it is the FAA regulations rather than any empirical inquiry that is determinative.

[6] See also United States v. White, 401 U. S. 745, 789-790 (1971) (Harlan, J., dissenting):

"By casting its `risk analysis' solely in terms of the expectations and risks that `wrongdoers' or `one contemplating illegal activities' ought to bear, the plurality opinion, I think, misses the mark entirely. . . . The interest [protected by the Fourth Amendment] is the expectation of the ordinary citizen, who has never engaged in illegal conduct in his life, that he may carry on his private discourse freely, openly, and spontaneously . . . . Interposition of a warrant requirement is designed not to shield `wrongdoers,' but to secure a measure of privacy and a sense of personal security throughout our society."

[7] The issue in Jones v. United States, 362 U. S. 257, 261 (1960), cited by JUSTICE O'CONNOR, was whether the defendant had standing to raise a Fourth Amendment challenge. While I would agree that the burden of alleging and proving facts necessary to show standing could ordinarily be placed on the defendant, I fail to see how that determination has any relevance to the question where the burden should lie on the merits of the Fourth Amendment claim.

4.9 Open Fields 4.9 Open Fields

4.9.1 Oliver v. United States 4.9.1 Oliver v. United States

OPEN FIELDS

 

Yes trespass, No 4Am violation

OLIVER v. UNITED STATES

No. 82-15.

Argued November 9, 1983

Decided April 17, 1984*

*172Powell, J., delivered the opinion of the Court, in which Burger, C. J., and Blackmun, Rehnquist, and O’Connor, JJ., joined, and in Parts I and II of which White, J., joined. White, J., filed an opinion concurring in part and concurring in the judgment, post, p. 184. Marshall, J., filed a dissenting opinion, in which Brennan and Stevens, JJ., joined, post, p. 184.

Frank E. Haddad, Jr., argued the cause for petitioner in No. 82-15. With him on the briefs was Robert L. Wilson. Wayne S. Moss, Assistant Attorney General of Maine, argued the cause for petitioner in No. 82-1273. With him on the briefs were James E. Tierney, Attorney General, James W. Brannigan, Jr., Deputy Attorney General, Robert S. Frank, Assistant Attorney General, and David W. Crook.

Alan I. Horowitz argued the cause for the United States in No. 82-15. With him on the brief were Solicitor General Lee, Assistant Attorney General Jensen, and Deputy Solicitor General Frey. Donna L. Zeegers, by appointment of the Court, 461 U. S. 924, argued the cause and filed a brief for respondent in No. 82-1273.

*173Justice Powell

delivered the opinion of the Court.

The “open fields” doctrine, first enunciated by this Court in Hester v. United States, 265 U. S. 57 (1924), permits police officers to enter and search a field without a warrant. We granted certiorari in these cases to clarify confusion that has arisen as to the continued vitality of the doctrine.

I

No. 82-15.Acting on reports that marihuana was being raised on the farm of petitioner Oliver, two narcotics agents of the Kentucky State Police went to the farm to investigate.1 Arriving at the farm, they drove past petitioner's house to a locked gate with a “No Trespassing” sign. A footpath led around one side of the gate. The agents walked around the gate and along the road for several hundred yards, passing a bam and a parked camper. At that point, someone standing in front of the camper shouted: “No hunting is allowed, come back up here.” The officers shouted back that they were Kentucky State Police officers, but found no one when they returned to the camper. The officers resumed their investigation of the farm and found a field of marihuana over a mile from petitioner’s home.

Petitioner was arrested and indicted for “manufacturing]” a “controlled substance.” 21 U. S. C. § 841(a)(1). After a pretrial hearing, the District Court suppressed evidence of the discovery of the marihuana field. Applying Katz v. United States, 389 U. S. 347, 357 (1967), the court found that petitioner had a reasonable expectation that the field would remain private because petitioner “had done all that could be expected of him to assert his privacy in the area of farm that was searched.” He had posted “No Trespassing” signs at regular intervals and had locked the gate at the entrance to the center of the farm. App. to Pet. for Cert. in No. 82-15, *174pp. 23-24. Further, the court noted that the field itself is highly secluded: it is bounded on all sides by woods, fences, and embankments and cannot be seen from any point of public access. The court concluded that this was not an “open” field that invited casual intrusion.

The Court of Appeals for the Sixth Circuit, sitting en banc, reversed the District Court. 686 F. 2d 356 (1982).2 The court concluded that Katz, upon which the District Court relied, had not impaired the vitality of the open fields doctrine of Hester. Rather, the open fields doctrine was entirely compatible with Katz’ emphasis on privacy. The court reasoned that the “human relations that create the need for privacy do not ordinarily take place” in open fields, and that the property owner’s common-law right to exclude trespassers is insufficiently linked to privacy to warrant the Fourth Amendment’s protection. 686 F. 2d, at 360.3 We granted certiorari. 459 U. S. 1168 (1983).

No. 82-1273. After receiving an anonymous tip that marihuana was being grown in the woods behind respondent Thornton’s residence, two police officers entered the woods by a path between this residence and a neighboring house. They followed a footpath through the woods until they reached two marihuana patches fenced with chicken wire. Later, the officers determined that the patches were on the property of respondent, obtained a warrant to search the property, and seized the marihuana. On the basis of this evidence, respondent was arrested and indicted.

*175The trial court granted respondent’s motion to suppress the fruits of the second search. The warrant for this search was premised on information that the police had obtained during their previous warrantless search, that the court found to be unreasonable.4 “No Trespassing” signs and the secluded location of the marihuana patches evinced a reasonable expectation of privacy. Therefore, the court held, the open fields doctrine did not apply.

The Maine Supreme Judicial Court affirmed. 453 A. 2d 489 (1982). It agreed with the trial court that the correct question was whether the search “is a violation of privacy on which the individual justifiably relied,” id., at 493, and that the search violated respondent’s privacy. The court also agreed that the open fields doctrine did not justify the search. That doctrine applies, according to the court, only when officers are lawfully present on property and observe “open and patent” activity. Id., at 495. In this case, the officers had trespassed upon defendant’s property, and the respondent had made every effort to conceal his activity. We granted certiorari. 460 U. S. 1068 (1983).5

*176h — I

The rule announced in Hester v. United States was founded upon the explicit language of the Fourth Amendment. That Amendment indicates with some precision the places and things encompassed by its protections. As Justice Holmes explained for the Court in his characteristically laconic style: “[T]he special protection accorded by the Fourth Amendment to the people in their ‘persons, houses, papers, and effects,’ is not extended to the open fields. The distinction between the latter and the house is as old as the common law.” Hester v. United States, 265 U. S., at 59.6

Nor are the open fields “effects” within the meaning of the Fourth Amendment. In this respect, it is suggestive that James Madison’s proposed draft of what became the Fourth *177Amendment preserves “[t]he rights of the people to be secured in their persons, their houses, their papers, and their other property, from all unreasonable searches and seizures . . . .” See N. Lasson, The History and Development of the Fourth Amendment to the United States Constitution 100, n. 77 (1937). Although Congress’ revisions of Madison’s proposal broadened the scope of the Amendment in some respects, id., at 100-103, the term “effects” is less inclusive than “property” and cannot be said to encompass open fields.7 We conclude, as did the Court in deciding Hester v. United States, that the government’s intrusion upon the open fields is not one of those “unreasonable searches” proscribed by the text of the Fourth Amendment.

hH HH

This interpretation of the Fourth Amendment’s language is consistent with the understanding of the right to privacy expressed in our Fourth Amendment jurisprudence. Since Katz v. United States, 389 U. S. 347 (1967), the touchstone of Amendment analysis has been the question whether a person has a “constitutionally protected reasonable expectation of privacy.” Id., at 360 (Harlan, J., concurring). The Amendment does not protect the merely subjective expectation of privacy, but only those “expectation[s] that society is prepared to recognize as ‘reasonable.’” Id., at 361. See also Smith v. Maryland, 442 U. S. 735, 740-741 (1979).

A

No single factor determines whether an individual legitimately may claim under the Fourth Amendment that a place should be free of government intrusion not authorized by warrant. See Rakas v. Illinois, 439 U. S. 128, 152-153 *178(1978) (Powell, J., concurring). In assessing the degree to which a search infringes upon individual privacy, the Court has given weight to such factors as the intention of the Framers of the Fourth Amendment, e. g., United States v. Chadwick, 433 U. S. 1, 7-8 (1977), the uses to which the individual has put a location, e. g., Jones v. United States, 362 U. S. 257, 265 (1960), and our societal understanding that certain areas deserve the most scrupulous protection from government invasion, e. g., Payton v. New York, 445 U. S. 573 (1980). These factors are equally relevant to determining whether the government’s intrusion upon open fields without a warrant or probable cause violates reasonable expectations of privacy and is therefore a search proscribed by the Amendment.

In this light, the rule of Hester v. United States, supra, that we reaffirm today, may be understood as providing that an individual may not legitimately demand privacy for activities conducted out of doors in fields, except in the area immediately surrounding the home. See also Air Pollution Variance Bd. v. Western Alfalfa Corp., 416 U. S. 861, 865 (1974). This rule is true to the conception of the right to privacy embodied in the Fourth Amendment. The Amendment reflects the recognition of the Framers that certain enclaves should be free from arbitrary government interference. For example, the Court since the enactment of the Fourth Amendment has stressed “the overriding respect for the sanctity of the home that has been embedded in our traditions since the origins of the Republic.” Payton v. New York, supra, at 601.8 See also Silverman v. United States, 365 U. S. 505, 511 (1961); United States v. United States District Court, 407 U. S. 297, 313 (1972).

*179In contrast, open fields do not provide the setting for those intimate activities that the Amendment is intended to shelter from government interference or surveillance. There is no societal interest in protecting the privacy of those activities, such as the cultivation of crops, that occur in open fields. Moreover, as a practical matter these lands usually are accessible to the public and the police in ways that a home, an office, or commercial structure would not be. It is not generally true that fences or “No Trespassing” signs effectively bar the public from viewing open fields in rural areas. And both petitioner Oliver and respondent Thornton concede that the public and police lawfully may survey lands from the air.9 For these reasons, the asserted expectation of privacy in open fields is not an expectation that “society recognizes as reasonable.”10

*180The historical underpinnings of the open fields doctrine also demonstrate that the doctrine is consistent with respect for “reasonable expectations of privacy. ” As Justice Holmes, writing for the Court, observed in Hester, 265 U. S., at 59, the common law distinguished “open fields” from the “curti-lage,” the land immediately surrounding and associated with the home. See 4 W. Blackstone, Commentaries *225. The distinction implies that only the curtilage, not the neighboring open fields, warrants the Fourth Amendment protections that attach to the home. At common law, the curtilage is the area to which extends the intimate activity associated with the “sanctity of a man’s home and the privacies of life,” Boyd v. United States, 116 U. S. 616, 630 (1886), and therefore has been considered part of the home itself for Fourth Amendment purposes. Thus, courts have extended Fourth Amendment protection to the curtilage; and they have defined the curtilage, as did the common law, by reference to the factors that determine whether an individual reasonably may expect that an area immediately adjacent to the home will remain private. See, e. g., United States v. Van Dyke, 643 F. 2d 992, 993-994 (CA4 1981); United States v. Williams, 581 F. 2d 451, 453 (CA5 1978); Care v. United States, 231 F. 2d 22, 25 (CA10), cert. denied, 351 U. S. 932 (1956). Conversely, the common law implies, as we reaffirm today, that no expectation of privacy legitimately attaches to open fields.11

*181We conclude, from the text of the Fourth Amendment and from the historical and contemporary understanding of its purposes, that an individual has no legitimate expectation that open fields will remain free from warrantless intrusion by government officers.

B

Petitioner Oliver and respondent Thornton contend, to the contrary, that the circumstances of a search sometimes may indicate that reasonable expectations of privacy were violated; and that courts therefore should analyze these circumstances on a case-by-case basis. The language of the Fourth Amendment itself answers their contention.

Nor would a case-by-case approach provide a workable accommodation between the needs of law enforcement and the interests protected by the Fourth Amendment. Under this approach, police officers would have to guess before every search whether landowners had erected fences sufficiently high, posted a sufficient number of warning signs, or located contraband in an area sufficiently secluded to establish a right of privacy. The lawfulness of a search would turn on “ ‘[a] highly sophisticated set of rules, qualified by all sorts of ifs, ands, and buts and requiring the drawing of subtle nuances and hairline distinctions . . . New York v. Belton, 453 U. S. 454, 458 (1981) (quoting LaFave, “Case-By-Case Adjudication” versus “Standardized Procedures”: The Robinson Dilemma, 1974 S. Ct. Rev. 127, 142). This Court repeatedly has acknowledged the difficulties created for courts, police, and citizens by an ad hoc, case-by-case definition of Fourth Amendment standards to be applied in differing factual circumstances. See Belton, supra, at 458-460; Robbins v. California, 453 U. S. 420, 430 (1981) (Powell, J., concurring in judgment); Dunaway v. New York, 442 U. S. 200, 213-214 (1979); United States v. Robinson, 414 U. S. 218, 235 (1973). The ad hoc approach not only makes it difficult for the policeman to discern the scope of his authority, Belton, supra, at 460; it also creates a danger that consti*182tutional rights will be arbitrarily and inequitably enforced. Cf. Smith v. Goguen, 415 U. S. 566, 572-573 (1974).12

IV

In any event, while the factors that petitioner Oliver and respondent Thornton urge the courts to consider may be relevant to Fourth Amendment analysis in some contexts, these factors cannot be decisive on the question whether the search of an open field is subject to the Amendment. Initially, we reject the suggestion that steps taken to protect privacy establish that expectations of privacy in an open field are legitimate. It is true, of course, that petitioner Oliver and respondent Thornton, in order to conceal their criminal activities, planted the marihuana upon secluded land and erected fences and “No Trespassing” signs around the property. And it may be that because of such precautions, few members of the public stumbled upon the marihuana crops seized by the police. Neither of these suppositions demonstrates, however, that the expectation of privacy was legitimate in the sense required by the Fourth Amendment. The test of legitimacy is not whether the individual chooses to conceal assertedly “private” activity.13 Rather, the correct inquiry is whether the government’s intrusion infringes upon the per*183sonal and societal values protected by the Fourth Amendment. As we have explained, we find no basis for concluding that a police inspection of open fields accomplishes such an infringement.

Nor is the government’s intrusion upon an open field a “search” in the constitutional sense because that intrusion is a trespass at common law. The existence of a property right is but one element in determining whether expectations of privacy are legitimate. “ ‘The premise that property interests control the right of the Government to search and seize has been discredited.’” Katz, 389 U. S., at 353 (quoting Warden v. Hayden, 387 U. S. 294, 304 (1967)). “[E]ven a property interest in premises may not be sufficient to establish a legitimate expectation of privacy with respect to particular items located on the premises or activity conducted thereon.” Rakas v. Illinois, 439 U. S., at 144, n. 12.

The common law may guide consideration of what areas are protected by the Fourth Amendment by defining areas whose invasion by others is wrongful. Id., at 153 (Powell, J., concurring).14 The law of trespass, however, forbids intrusions upon land that the Fourth Amendment would not proscribe. For trespass law extends to instances where the exercise of the right to exclude vindicates no legitimate privacy interest.15 Thus, in the case of open fields, the general *184rights of property protected by the common law of trespass have little or no relevance to the applicability of the Fourth Amendment.

V

We conclude that the open fields doctrine, as enunciated in Hester, is consistent with the plain language of the Fourth Amendment and its historical purposes. Moreover, Justice Holmes’ interpretation of the Amendment in Hester accords with the “reasonable expectation of privacy” analysis developed in subsequent decisions of this Court. We therefore affirm Oliver v. United States; Maine v. Thornton is reversed and remanded for further proceedings not inconsistent with this opinion.

It is so ordered.

Justice White,

concurring in part and concurring in the judgment.

I concur in the judgment and join Parts I and II of the Court’s opinion. These Parts dispose of the issue before us; there is no need to go further and deal with the expectation of privacy matter. However reasonable a landowner’s expectations of privacy may be, those expectations cannot convert a field into a “house” or an “effect.”

Justice Marshall,

with whom Justice Brennan and Justice Stevens join, dissenting.

In each of these consolidated cases, police officers, ignoring clearly visible “No Trespassing” signs, entered upon private land in search of evidence of a crime. At a spot that could *185not be seen from any vantage point accessible to the public, the police discovered contraband, which was subsequently used to incriminate the owner of the land. In neither case did the police have a warrant authorizing their activities.

The Court holds that police conduct of this sort does not constitute an “unreasonable search” within the meaning of the Fourth Amendment. The Court reaches that startling conclusion by two independent analytical routes. First, the Court argues that, because the Fourth Amendment by its terms renders people secure in their “persons, houses, papers, and effects,” it is inapplicable to trespasses upon land not lying within the curtilage of a dwelling. Ante, at 176-177. Second, the Court contends that “an individual may not legitimately demand privacy for activities conducted out of doors in fields, except in the area immediately surrounding the home.” Ante, at 178. Because I cannot agree with either of these propositions, I dissent.

HH

The first ground on which the Court rests its decision is that the Fourth Amendment “indicates with some precision the places and things encompassed by its protections,” and that real property is not included in the list of protected spaces and possessions. Ante, at 176. This line of argument has several flaws. Most obviously, it is inconsistent with the results of many of our previous decisions, none of which the Court purports to overrule. For example, neither a public telephone booth nor a conversation conducted therein can fairly be described as a person, house, paper, or effect;1 yet we have held that the Fourth Amendment forbids the police without a warrant to eavesdrop on such a conversation. Katz v. United States, 389 U. S. 347 (1967). Nor can it plau*186sibly be argued that an office or commercial establishment is covered by the plain language of the Amendment; yet we have held that such premises are entitled to constitutional protection if they are marked in a fashion that alerts the public to the fact that they are private. Marshall v. Barlow’s, Inc., 436 U. S. 307, 311 (1978); G. M. Leasing Corp. v. United States, 429 U. S. 338, 358-359 (1977).2

Indeed, the Court’s reading of the plain language of the Fourth Amendment is incapable of explaining even its own holding in this case. The Court rules that the curtilage, a zone of real property surrounding a dwelling, is entitled to constitutional protection. Ante, at 180. We are not told, however, whether the curtilage is a “house” or an “effect”— or why, if the curtilage can be incorporated into the list of things and spaces shielded by the Amendment, a field cannot.

The Court’s inability to reconcile its parsimonious reading of the phrase “persons, houses, papers, and effects” with our prior decisions or even its own holding is a symptom of a more fundamental infirmity in the Court’s reasoning. The Fourth Amendment, like the other central provisions of the Bill of Rights that loom large in our modern jurisprudence, was designed, not to prescribe with “precision” permissible and impermissible activities, but to identify a fundamental human liberty that should be shielded forever from government intrusion.3 We do not construe constitutional pro*187visions of this sort the way we do statutes, whose drafters can be expected to indicate with some comprehensiveness and exactitude the conduct they wish to forbid or control and to change those prescriptions when they become obsolete.4 Rather, we strive, when interpreting these seminal constitutional provisions, to effectuate their purposes — to lend them meanings that ensure that the liberties the Framers sought to protect are not undermined by the changing activities of government officials.5

The liberty shielded by the Fourth Amendment, as we have often acknowledged, is freedom “from unreasonable government intrusions into . . . legitimate expectations of privacy.” United States v. Chadwick, 433 U. S. 1, 7 (1977). That freedom would be incompletely protected if only government conduct that impinged upon a person, house, paper, or effect were subject to constitutional scrutiny. Accordingly, we have repudiated the proposition that the Fourth Amendment applies only to a limited set of locales or kinds of property. In Katz v. United States, we expressly rejected a proffered locational theory of the coverage of the Amendment, holding that it “protects people, not places.” 389 U. S., at 351. Since that time we have consistently adhered *188to the view that the applicability of the provision depends solely upon “whether the person invoking its protection can claim a ‘justifiable,’ a ‘reasonable,’ or a ‘legitimate expectation of privacy’ that has been invaded by government action.” Smith v. Maryland, 442 U. S. 735, 740 (1979).6 The Court’s contention that, because a field is not a house or effect, it is not covered by the Fourth Amendment is inconsistent with this line of cases and with the understanding of the nature of constitutional adjudication from which it derives.7

H-I HH

The second ground for the Court s decision is its contention that any interest a landowner might have in the privacy of his woods and fields is not one that “society is prepared to recognize as ‘reasonable.’” Ante, at 177 (quoting Katz v. United States, 389 U. S., at 361 (Harlan, J., concurring)). *189The mode of analysis that underlies this assertion is certainly more consistent with our prior decisions than that discussed above. But the Court’s conclusion cannot withstand scrutiny.

As the Court acknowledges, we have traditionally looked to a variety of factors in determining whether an expectation of privacy asserted in a physical space is “reasonable.” Ante, at 177-178. Though those factors do not lend themselves to precise taxonomy, they may be roughly grouped into three categories. First, we consider whether the expectation at issue is rooted in entitlements defined by positive law. Second, we consider the nature of the uses to which spaces of the sort in question can be put. Third, we consider whether the person claiming a privacy interest manifested that interest to the public in a way that most people would understand and respect.8 When the expectations of privacy asserted by petitioner Oliver and respondent Thornton9 are examined through these lenses, it becomes clear that those expectations are entitled to constitutional protection.

A

We have frequently acknowledged that privacy interests are not coterminous with property rights. E. g., United States v. Salvucci, 448 U. S. 83, 91 (1980). However, because “property rights reflect society’s explicit recognition *190of a person’s authority to act as he wishes in certain areas, [they] should be considered in determining whether an individual’s expectations of privacy are reasonable.” Rakas v. Illinois, 439 U. S. 128, 153 (1978) (Powell, J., concurring).10 Indeed, the Court has suggested that, insofar as “[o]ne of the main rights attaching to property is the right to exclude others, . . . one who owns or lawfully possesses or controls property will in all likelihood have a legitimate expectation of privacy by virtue of this right to exclude.” Id., at 144, n. 12 (opinion of the Court).11

It is undisputed that Oliver and Thornton each owned the land into which the police intruded. That fact alone provides considerable support for their assertion of legitimate privacy interests in their woods and fields. But even more telling is the nature of the sanctions that Oliver and Thornton could invoke, under local law, for violation of their property rights. In Kentucky, a knowing entry upon fenced or otherwise enclosed land, or upon unenclosed land conspicuously posted with signs excluding the public, constitutes criminal trespass. Ky. Rev. Stat. §§ 511.070(1), 511.080, 511.090(4) (1975). The law in Maine is similar. An intrusion into “any place from *191which [the intruder] may lawfully be excluded and which is posted in a manner prescribed by law or in a manner reasonably likely to come to the attention of intruders or which is fenced or otherwise enclosed” is a crime. Me. Rev. Stat. Ann., Tit. 17A, §402(1)(C) (1964).12 Thus, positive law not only recognizes the legitimacy of Oliver’s and Thornton’s insistence that strangers keep off their land, but subjects those who refuse to respect their wishes to the most severe of penalties — criminal liability. Under these circumstances, it is hard to credit the Court’s assertion that Oliver’s and Thornton’s expectations of privacy were not of a sort that society is prepared to recognize as reasonable.

B

The uses to which a place is put are highly relevant to the assessment of a privacy interest asserted therein. Rakas v. Illinois, supra, at 153 (POWELL, J., concurring). If, in light of our shared sensibilities, those activities are of a kind in which people should be able to engage without fear of intrusion by private persons or government officials, we extend the protection of the Fourth Amendment to the space in question, even in the absence of any entitlement derived from positive law. E. g., Katz v. United States, 389 U. S., at 352-353.13

*192Privately owned woods and fields that are not exposed to public view regularly are employed in a variety of ways that society acknowledges deserve privacy. Many landowners like to take solitary walks on their property, confident that they will not be confronted in their rambles by strangers or policemen. Others conduct agricultural businesses on their property.14 Some landowners use their secluded spaces to meet lovers, others to gather together with fellow worship-pers, still others to engage in sustained creative endeavor. Private land is sometimes used as a refuge for wildlife, where flora and fauna are protected from human intervention of any kind.15 Our respect for the freedom of landowners to use *193their posted “open fields” in ways such as these partially explains the seriousness with which the positive law regards deliberate invasions of such spaces, see supra, at 190-191, and substantially reinforces the landowners’ contention that their expectations of privacy are “reasonable.”

C

Whether a person “took normal precautions to maintain his privacy” in a given space affects whether his interest is one protected by the Fourth Amendment. Rawlings v. Kentucky, 448 U. S. 98, 105 (1980).16 The reason why such precautions are relevant is that we do not insist that a person who has a right to exclude others exercise that right. A claim to privacy is therefore strengthened by the fact that the claimant somehow manifested to other people his desire that they keep their distance.

Certain spaces are so presumptively private that signals of this sort are unnecessary; a homeowner need not post a “Do Not Enter” sign on his door in order to deny entrance to uninvited guests.17 Privacy interests in other spaces are more ambiguous, and the taking of precautions is consequently more important; placing a lock on one’s footlocker strengthens one’s claim that an examination of its contents is impermissible. See United States v. Chadwick, 433 U. S., at 11. Still other spaces are, by positive law and social convention, presumed accessible to members of the public unless the owner manifests his intention to exclude them.

Undeveloped land falls into the last-mentioned category. If a person has not marked the boundaries of his fields or woods in a way that informs passersby that they are not wel*194come, he cannot object if members of the public enter onto the property. There is no reason why he should have any greater rights as against government officials. Accordingly, we have held that an official may, without a warrant, enter private land from which the public is not excluded and make observations from that vantage point. Air Pollution Variance Board v. Western Alfalfa Corp., 416 U. S. 861, 865 (1974). Fairly read, the case on which the majority so heavily relies, Hester v. United States, 265 U. S. 57 (1924), affirms little more than the foregoing unremarkable proposition. From aught that appears in the opinion in that case, the defendants, fleeing from revenue agents who had observed them committing a crime, abandoned incriminating evidence on private land from which the public had not been excluded. Under such circumstances, it is not surprising that the Court was unpersuaded by the defendants’ argument that the entry onto their fields by the agents violated the Fourth Amendment.18

A very different case is presented when the owner of undeveloped land has taken precautions to exclude the public. As indicated above, a deliberate entry by a private citizen onto private property marked with “No Trespassing” signs will expose him to criminal liability. I see no reason why a government official should not be obliged to respect such *195unequivocal and universally understood manifestations of a landowner’s desire for privacy.19

In sum, examination of the three principal criteria we have traditionally used for assessing the reasonableness of a person’s expectation that a given space would remain private indicates that interests of the sort asserted by Oliver and Thornton are entitled to constitutional protection. An owner’s right to insist that others stay off his posted land is firmly grounded in positive law. Many of the uses to which such land may be put deserve privacy. And, by marking the boundaries of the land with warnings that the public should not intrude, the owner has dispelled any ambiguity as to his desires.

The police in these cases proffered no justification for their invasions of Oliver’s and Thornton’s privacy interests; in neither case was the entry legitimated by a warrant or by one of the established exceptions to the warrant requirement. I conclude, therefore, that the searches of their land violated the Fourth Amendment, and the evidence obtained in the course of those searches should have been suppressed.

HH t — i

A clear, easily administrable rule emerges from the analysis set forth above: Private land marked in a fashion sufficient to render entry thereon a criminal trespass under the law of the State in which the land lies is protected by the Fourth Amendment’s proscription of unreasonable searches and seizures. One of the advantages of the foregoing rule is that *196it draws upon a doctrine already familiar to both citizens and government officials. In each jurisdiction, a substantial body of statutory and case law defines the precautions a landowner must take in order to avail himself of the sanctions of the criminal law. The police know that body of law, because they are entrusted with responsibility for enforcing it against the public; it therefore would not be difficult for the police to abide by it themselves.

By contrast, the doctrine announced by the Court today is incapable of determinate application. Police officers, making warrantless entries upon private land, will be obliged in the future to make on-the-spot judgments as to how far the curtilage extends, and to stay outside that zone.20 In addition, we may expect to see a spate of litigation over the question of how much improvement is necessary to remove private land from the category of “unoccupied or undeveloped area” to which the “open fields exception” is now deemed applicable. See ante, at 180, n. 11.

The Court’s holding not only ill serves the need to make constitutional doctrine “workable for application by rank- and-file, trained police officers,” Illinois v. Andreas, 463 U. S. 765, 772 (1983), it withdraws the shield of the Fourth Amendment from privacy interests that clearly deserve protection. By exempting from the coverage of the Amendment large areas of private land, the Court opens the way to investigative activities we would all find repugnant. Cf., e. g., United States v. Lace, 669 F. 2d 46, 54 (CA2 1982) (Newman, J., concurring in result) (“[WJhen police officers execute military maneuvers on residential property for three weeks of round-the-clock surveillance, can that be called frea-*197sonable’?”); State v. Brady, 406 So. 2d 1093, 1094-1095 (Fla. 1981) (“In order to position surveillance groups around the ranch’s airfield, deputies were forced to cross a dike, ram through one gate and cut the chain lock on another, cut or cross posted fences, and proceed several hundred yards to their hiding places”), cert. granted, 456 U. S. 988, supplemental memoranda ordered and oral argument postponed, 459 U. S. 986 (1982).21

The Fourth Amendment, properly construed, embodies and gives effect to our collective sense of the degree to which men and women, in civilized society, are entitled “to be let alone” by their governments. Olmstead v. United States, 277 U. S. 438, 478 (1928) (Brandeis, J., dissenting); cf. Smith v. Maryland, 442 U. S., at 750 (Marshall, J., dissenting). The Court’s opinion bespeaks and will help to promote an impoverished vision of that fundamental right.

I dissent.