Jones v. State

321 Ga. 137
CourtSupreme Court of Georgia
DecidedMarch 4, 2025
DocketS24A1085
StatusPublished
Cited by2 cases

This text of 321 Ga. 137 (Jones v. State) is published on Counsel Stack Legal Research, covering Supreme Court of Georgia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Jones v. State, 321 Ga. 137 (Ga. 2025).

Opinion

321 Ga. 137 FINAL COPY

S24A1085. JONES v. THE STATE.

PINSON, Justice.

James Christopher Jones was charged with murder after the

police identified her using the location history from her cell phone.

The police got that location history through search warrants that

authorized the police to obtain from Google an anonymized list of

devices that reported their locations within 100 meters of the vic-

tim’s home during the four hours when the murder happened — a

process known as “geofencing” — and identifying information tied to

the subset of devices that were relevant to the investigation. Before

trial, Jones moved to suppress the evidence from the geofence war-

rants, arguing that the warrants violated the Fourth Amendment to

the United States Constitution because they were not supported by

probable cause and failed to satisfy that Amendment’s particularity

requirement. The trial court denied the motion, and we granted

Jones’s application for an interlocutory appeal.

1 We now affirm. The warrant applications explained among

other things that the suspect was caught on video using a cell phone

near the victim’s home, that many cell phones generate Google loca-

tion history data, and, later, that the movements of a specific cell

phone “matched up” with what was known of the suspect’s move-

ments. That information, together with the reasonable inferences

and common sense that a reviewing magistrate may draw on in as-

sessing probable cause, gave the magistrate here a substantial basis

for concluding that accessing the location history and identifying in-

formation sought from Google had a fair probability of helping the

police identify the unknown murder suspect in the video. And the

warrants satisfied the particularity requirement because they gave

the police specific guidance as to what information they were au-

thorized to access — a list of anonymized Google IDs and location

history data from devices reporting their locations within 100 me-

ters of the victim’s home during a given time frame, and then iden-

tifying information tied to one of those Google IDs — and avoided

the kind of unfettered discretion that would pose a particularity

2 problem.

1. Background

(a) Jones was charged with malice murder and other crimes in

connection with the stabbing death of Kay Conway Thomasson. Be-

fore trial, Jones moved to suppress cell-phone-based evidence the

police had obtained under two search warrants. The evidence intro-

duced at the hearing on the motion to suppress showed the follow-

ing.

On June 27, 2018, Detective J. T. Williams responded to a re-

port that a woman, Thomasson, had been found dead at a residential

address in Sandy Springs. At the scene, Williams spoke to the vic-

tim’s daughter and learned that the home was equipped with video

surveillance, including one camera pointing down the driveway and

another aimed at the back door. After getting a search warrant for

the home, Williams reviewed the camera footage and saw a suspect

arriving at the victim’s driveway at 1:10 a.m. on June 27, and the

same suspect leaving in the victim’s car at 5:03 a.m.

Several months later, after the investigation had come to a

3 standstill, Williams applied for the first search warrant at issue in

this appeal. The warrant was directed at Google, and it asked for

two things: (1) “GPS, Wi-Fi, or Bluetooth sourced location history

data generated from devices that reported” within 100 meters of

Thomasson’s home between 1:00 a.m. and 5:00 a.m. on June 27,

2018; and (2) “identifying information for Google Accounts associ-

ated with the responsive location history data.” The warrant de-

scribed a three-step process for collecting that information. In step

one, Google would provide an anonymized list of all devices that

were detected within the original geographic and temporal parame-

ters — 100 meters from the victim’s home, from 1:00 a.m. to 5:00

a.m. In step two, officers could request additional location infor-

mation outside the initial 100-meter radius for any of the devices

from step one that officers thought could be relevant to the investi-

gation. And in step three, after further review, the police could ask

for identifying information about the users associated with relevant

devices.

4 Williams explained at the hearing that this location infor-

mation was routinely collected by Google from its users. According

to Williams, Google tracks the physical location of everyone who

uses a Google application like Gmail or Google Maps, or who uses a

device that runs on Google’s Android operating system, through the

device’s cellular, Wi-Fi, and GPS capabilities. Google also assigns a

number, called a “Google ID,” to anyone who uses a Google applica-

tion or an Android-running device. So in layman’s terms, the war-

rant asked for the Google IDs, or account numbers, associated with

any devices that came within 100 meters of the victim’s home during

the four hours when the suspect was known to be there. The geo-

graphic area targeted by this type of warrant — here, the 100-meter

radius from the victim’s home — is called a “geofence,” and so this

kind of search warrant is sometimes called a geofence warrant.

Google responded to the geofence warrant and provided the re-

quested information. In its raw form, Google’s data were a list of

every time a Google ID was detected within the geofence. For each

hit, the data showed the Google ID, the time stamp, the latitude and

5 longitude coordinates, and the means of detection (GPS, Wi-Fi, or

cellular).

When police reviewed the data, two Google IDs “sparked [their]

interest.” One was the victim’s phone. The other was device

1258821290, which police found to be “very suspicious.” Device 290

was shown to be in or near the victim’s home during the time of the

killing, moving around the side of the home where the suspect was

seen in the surveillance video.

Police then went to step two of the search warrant and asked

for additional location data from Google about the victim’s phone

and device 290. They received all the location information for those

two phones, including locations outside the geofence, for an hour be-

fore and an hour after the original window of 1:00 a.m. to 5:00 a.m.

The data from the extended timeframe showed that the two devices

— the victim’s phone and device 290 — both left the area of the vic-

tim’s home after the killing. The phones traveled together to a

nearby business, where the victim’s phone remained until it went

6 dead 12 hours later. (The victim’s phone was never recovered.) De-

vice 290, however, continued on to an apartment complex in Cham-

blee.

Williams then explained how the police used the location data

they received from Google together with other evidence they col-

lected. Because the victim’s security cameras showed that the sus-

pect left the scene in the victim’s car, the police were able to track

the route the victim’s car took using license-plate-reading cameras

in the area. Comparing the car’s route with the location data for the

victim’s phone and device 290, they determined that the car and the

devices were traveling together. And police later found the victim’s

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Moss v. State
Supreme Court of Georgia, 2025
EVANS v. THE STATE (Two Cases)
Supreme Court of Georgia, 2025

Cite This Page — Counsel Stack

Bluebook (online)
321 Ga. 137, Counsel Stack Legal Research, https://law.counselstack.com/opinion/jones-v-state-ga-2025.