United States v. Rogers

71 F. Supp. 3d 745, 2014 U.S. Dist. LEXIS 145980, 2014 WL 5152543
CourtDistrict Court, N.D. Illinois
DecidedOctober 9, 2014
Docket13 CR 952
StatusPublished
Cited by5 cases

This text of 71 F. Supp. 3d 745 (United States v. Rogers) is published on Counsel Stack Legal Research, covering District Court, N.D. Illinois primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Rogers, 71 F. Supp. 3d 745, 2014 U.S. Dist. LEXIS 145980, 2014 WL 5152543 (N.D. Ill. 2014).

Opinion

MEMORANDUM OPINION

CHARLES P. KOCORAS, District Judge:

Defendants Eric Rogers (“Rogers”) and Eric Curtis (“Curtis”) (collectively “Defendants”) seek to suppress electronic location evidence collected from Defendants’ cell phones. For the reasons set forth below, Defendants’ motion is denied.

BACKGROUND

For the purposes of providing context to the Defendants’ motion to suppress we rely on the allegations contained in the criminal complaint and indictment filed against Defendants. The Defendants do not contest: (1) that the government had probable cause to believe that they were involved in numerous robberies committed with varying groups of individuals; and (2) the accuracy of the cell phone numbers used at the time of the robberies.

In early January 2013, the Federal Bureau of Investigation (“FBI”) began investigating a series of armed robberies of cellular telephone stores in Illinois and Indiana. On February 5, 2013, three men were arrested after robbing an AT & T cellular store in LaPorte, Indiana (“La-Porte Robbery”). Those three men were identified as Daniel Wright (“Wright”), Marcus Harris and Individual A. One of [747]*747the arrested individuals, Wright, agreed to speak with law enforcement officers and confessed to his involvement in the robberies. Wright admitted his involvement in the LaPorte robbery and also confessed to his involvement in multiple other cellular phone store robberies. Wright identified Rogers as the leader of the robbery crew. Wright went into detail about Rogers’ role in recruiting participants, planning and executing the robberies. Wright provided Rogers’ cellular phone number as 708-541-8767, and identified it as the number Rogers used to communicate with others during the robberies.

Based on this information, an application was submitted to a federal judge in the Northern District of Illinois on April 1, 2013, seeking cellular records from AT & T for the number provided by Wright. Law enforcement sought the disclosure of Rogers’ cellular phone information under the Stored Communication Act (“SCA”), 18 . U.S.C. § 2703(d) and confined the time period of their request from June 1, 2012 through March 29, 2013.

On April 8, 2013, the T-Mobile store in Deerfield, Illinois was robbed in a manner which matched the pattern of robberies of other cellular phone retail locations. One of the captured robbers Andre Wadling-ton-Anthony (“Wadlington-Anthony”) cooperated with law enforcement and admitted to his involvement as a member of the robbery crew. Wadlington-Anthony identified Curtis as an additional leader of the robbery operation. Wadlington-Anthony provided information concerning Curtis’ scouting of perspective robbery locations, organizing the individuals to participate in the robberies and acting as the “look out” when the robbery was in progress. Wad-lington-Anthony identified Curtis’ mobile phone number as 708-969-6006.

Based on this additional information, an application was submitted to a federal judge in the Northern District of Illinois on April 11, 2013, seeking cellular phone records for Curtis’ cellular phone from U.S. Cellular. Law enforcement sought the disclosure of Curtis’ cellular phone information under 18 U.S.C. § 2703(d) for the time period of June 1, 2012 through April 10, 2013. On August 13, 2013, another individual that was suspected of participating in the robberies, Individual B, provided information to law enforcement about Rogers’ and Curtis’ shared participation in other robberies. This new information was the basis for another application which was submitted to a federal judge in the Northern District of Illinois, seeking cellular call records under 18 U.S.C. § 2703(d) for Rogers’ and Curtis’ cellular phones from AT & T and U.S. Cellular for the periods of March 29, 2013, through August 13, 2013.

On December 14, 2013, Defendants were arrested fleeing the scene of a T-Mobile cellular store robbery. On February 6, 2014, Defendants were indicted on charges of conspiracy to obstruct, delay and affect commerce in violation of Title 18 U.S.C. § 1951(a). On August 13, 2014, Defendants filed a joint motion to suppress the historic electronic location evidence gathered in the course of law enforcement’s investigation.

LEGAL STANDARD

The Fourth Amendment provides that “[t]he right of people to be secure ... against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV. The amendment protects “people- and not simply ‘areas’ — against unreasonable searches and seizures.” Katz v. United States, 389 U.S. 347, 353, 88 S.Ct. 507, 19 L.Ed.2d 576 [748]*748(1967). “A ‘search’ occurs when an expectation of privacy that society is prepared to consider reasonable is infringed,” United States v. Jacobsen, 466 U.S. 109, 113, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984), or when the government engages in an unlicensed physical intrusion of a constitutionally protected area in order to obtain information. Florida v. Jardines, — U.S. -, 133 S.Ct. 1409, 1414-15, 185 L.Ed.2d 495 (2013). The party seeking suppression bears the burden of establishing that he had a reasonable expectation of privacy in what was searched. See United States v. Pitts, 322 F.3d 449, 456 (7th Cir.2003); United States v. Meyer, 157 F.3d 1067, 1079 (7th Cir.1998).

DISCUSSION

Defendants seek the suppression of all electronic location evidence gathered from third-party cellular companies in the course of the government’s investigation. Defendants argue that suppression is warranted because: (1) the collection and acquisition of historic electronic location evidence data obtained under the SCA should only be acquired under the auspices of a search warrant; and (2) the SCA does not specifically authorize a warrantless search for location data.

Before addressing the merits of Defendants’ motion to suppress, the Court will provide an abbreviated explanation of the technology at issue. Wireless technology operates through a network of cellular towers that emit radio frequencies capable of carrying the human voice and other data. Cellular phones áre able to be located in one of two ways: by cell-site tracking, or by Global Positioning System (“GPS”) signal tracking. Cell-site tracking relies on a cellular phones’ requirement that they be constantly connected to a mobile network. To facilitate a cellular phone’s connection to a mobile network, cellular phones are programmed to be constantly searching for the nearest cellular tower to ensure connection to the strongest signal. Once the phone selects the strongest signal, it transmits the user’s identifying data so that the subscriber’s network confirms the cell phones location to route any incoming calls. This constant search and submission of information occurs every few seconds.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Aaron Graham
796 F.3d 332 (Fourth Circuit, 2015)
United States v. Lang
78 F. Supp. 3d 830 (N.D. Illinois, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
71 F. Supp. 3d 745, 2014 U.S. Dist. LEXIS 145980, 2014 WL 5152543, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-rogers-ilnd-2014.