United States v. Easterday

CourtDistrict Court, District of Columbia
DecidedJanuary 18, 2024
DocketCriminal No. 2022-0404
StatusPublished

This text of United States v. Easterday (United States v. Easterday) is published on Counsel Stack Legal Research, covering District Court, District of Columbia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Easterday, (D.D.C. 2024).

Opinion

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

UNITED STATES OF AMERICA

v. Criminal Action No. 22-404 (JEB)

ISREAL EASTERDAY,

Defendant.

MEMORANDUM OPINION

Defendant Isreal Easterday was a member of the crowd that stormed the U.S. Capitol on

January 6, 2021. On October 26, 2023, a jury found him guilty of nine counts arising from his

conduct on that day. Before trial, Defendant filed a Motion to Suppress identification evidence

obtained from a geofence warrant, which the Court declined to rule on until it had received

certain factual clarifications from the Government. Having now obtained this information, the

Court concludes that the warrant process complied with the Fourth Amendment, and it will thus

deny the Motion.

I. Background

Before turning to the specifics of the geofence warrant sought in this case, a quick word

about that species of warrant. A geofence warrant is used to obtain location data generated by

cellphones and other electronic devices, data that is collected and stored by third-party entities

such as Google and Meta. One example is the Google location-history data at issue here, which

is generated when a Google account user enables the “Location Reporting” feature on her device.

See ECF No. 81 (Gov’t Supp.) at 7. Once this feature is enabled, the user’s device will begin to

1 collect location-history data more or less automatically, though such data is most likely to be

collected when the user does something that involves “location information.” Id. at 9. Examples

of this include using Google Maps for directions or taking photographs and videos that capture

location as metadata. Id.

Geofence warrants differ from “warrant[s] authorizing surveillance of a known suspect,”

since they are normally employed when the identity of a suspect is unknown. United States v.

Rhine, 652 F. Supp. 3d 38, 86 (D.D.C. 2023) (emphasis added). Such warrant applications

“identify the physical area and time range in which there is probable cause to believe that

criminal activity occurred.” Id. at 67. Upon disclosure, those devices that turn up within such

parameters can then be traced back to their owners. Given that this data can reveal a smartphone

owner’s location with a high degree of precision, law-enforcement agencies have increasingly

turned to this investigative tool in recent years. See ECF No. 45 (Motion to Suppress), Exh. 1

(Google Amicus Brief) at 3 (“Year over year, Google has observed over a 1,500% increase in the

number of geofence requests it received . . . .”).

As part of its January 6 investigation, the United States applied for a geofence warrant

soon after the insurrection, requesting that Google produce certain “(1) location history data and

(2) identifying information for Google accounts associated with such responsive data.” Mot. at

7. The geographical parameters covered the Capitol building itself, but none of the surrounding

grounds. See Mot. at 8–9 (depicting initial geofence); Gov’t Supp. at 2. The application also set

out three time windows for which the Government sought this data: 12:00 p.m.–12:15 p.m.

(“Pre-Riot Control List”), 2:00 p.m.–6:30 p.m. (“Initial Riot List”), and 9:00 p.m.–9:15 p.m.

(“Post-Riot Control List). See Gov’t Supp. at 2. The temporal parameters of these lists more or

less tracked the timeline of the January 6 events. See, e.g., Department of Defense, Planning and

2 Execution Timeline for the National Guard’s Involvement in the January 6, 2021 Violent Attack

at the U.S. Capitol (Jan. 8, 2021), https://perma.cc/PQ4F-DNHH (noting that D.C. National

Guard received initial request for assistance at 1:49 p.m. and that Capitol Building was declared

secure at 8:00 p.m.). These lists, in other words, identified the devices that were there only

during the riot (most likely unlawfully) as well as those that were there before or after the riot

(most likely lawfully).

Besides setting out these parameters, the warrant application also outlined a multi-step

process that the Government would employ to handle the anonymized data and obtain

deanonymized information later on. To begin, Google was to disclose the location-history data

of the devices — represented as anonymized device IDs — that fell within the relevant area and

the time period of the riot. See Mot. at 7. Also at this step, Google would provide the United

States with two control lists corresponding to the non-riot time windows described above. Id.

The Government would then review all of the data provided both to identify any accounts whose

location history was not likely to be “evidence of a crime” — say, because the data placed their

device “in an inaccessible place” — and to cross-reference the Initial Riot List with the two

control lists. See Gov’t Supp. at 3 n.3. Any information that was removed from that Riot List at

this point would be “sealed and excluded from further review.” Id. at 2. At the next and last

step, and once it completed this culling process, the Government would return to the Magistrate

Judge to obtain an order requiring Google to de-anonymize or unmask the remaining accounts.

See Mot. at 7.

The search-warrant application was approved by Magistrate Judge Michael Harvey, and

Google consequently disclosed the anonymized location history requested. See Gov’t Supp. at

2–3. After aggregating the initial lists provided by Google, the Government determined that

3 5,723 accounts fell within the Initial Riot List time period, with 176 also falling within the Pre-

Riot time period, and 159 also falling within the Post-Riot time period. Id. At this point, the

Government took three additional steps to zero in on the accounts it wanted to unmask or

deanonymize. First, it compared the Riot List with the two control lists furnished by Google and

removed 215 accounts — presumably the nonoverlapping total of the 176 and 159 accounts just

described — leaving a total of 5,508. Id. at 4. Second, it removed all accounts that “did not

have at least one location data point where the margin-of-error radius was contained” entirely

within the geofence, which brought the total down from 5,508 to 1,498. Id. Finally, it added

back 37 accounts excluded at step two because these had at least one location-history hit that fell

within the geofence and there was evidence that these account users had deleted their Location

History data after January 6. Id. All in all, the Government sought to unmask 1,535 accounts it

obtained from this geofence warrant, a request that was granted by Magistrate Judge Harvey on

January 18, 2021. Id. Easterday, however, was not part of this initial batch of device holders.

Instead, Defendant’s identifying information was disclosed as part of the Government’s

subsequent request to unmask an additional 2,264 user accounts that were part of the original

5,508 but different from the 1,535 accounts for which it had received identifying information.

See Mot. at 10. To justify this request, the Government presented Magistrate Judge Harvey with

an expanded geofence that covered both the Capitol and its surrounding grounds, which were

also closed to the public on January 6. Id. at 9–10 (depicting expanded geofence). It further

represented that the location-history data of these devices “fell within the Initial Geofence Area

[i.e., the Capitol building] and the margin of error fell entirely within the Expanded Geofence

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Warden, Maryland Penitentiary v. Hayden
387 U.S. 294 (Supreme Court, 1967)
Zurcher v. Stanford Daily
436 U.S. 547 (Supreme Court, 1978)
Dalia v. United States
441 U.S. 238 (Supreme Court, 1979)
Ybarra v. Illinois
444 U.S. 85 (Supreme Court, 1980)
Illinois v. Gates
462 U.S. 213 (Supreme Court, 1983)
United States v. Leon
468 U.S. 897 (Supreme Court, 1984)
United States v. Williams
616 F.3d 760 (Eighth Circuit, 2010)
Messerschmidt v. Millender
132 S. Ct. 1235 (Supreme Court, 2012)
United States v. Hurwitz
459 F.3d 463 (Fourth Circuit, 2006)
United States v. Gerry Burnett
827 F.3d 1108 (D.C. Circuit, 2016)
United States v. Dante Sheffield
832 F.3d 296 (D.C. Circuit, 2016)
Carpenter v. United States
585 U.S. 296 (Supreme Court, 2018)
Devon Tinius v. Luke Choi
77 F.4th 691 (D.C. Circuit, 2023)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Easterday, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-easterday-dcd-2024.