Legal Brief: New SCOTUS Case Hits Close to Home for Integrators
Key Highlights
- The U.S. Supreme Court is weighing whether geofence warrants — reverse searches that scour location data to identify unknown suspects — violate Fourth Amendment protections against unreasonable search and seizure.
- The case hinges on whether people retain a reasonable expectation of privacy in location data voluntarily shared with third-party apps — a doctrine courts are increasingly willing to revisit as surveillance technology evolves.
- Security integrators and manufacturers should pay close attention: the systems you install generate exactly the kind of location-rich data at the center of this debate, and a broad ruling could expose that data to law enforcement requests that bypass traditional probable cause requirements.
This article originally appeared in the March 2026 issue of Security Business magazine. Don’t forget to mention Security Business magazine on LinkedIn or our other social handles if you share it.
Many years ago, as a Judge Advocate General (JAG) for the U.S. Air Force, I led an investigation into a recruiter who had inappropriate relationships with two female high school recruits – a crime under military law. Using creative investigative techniques, we tracked the suspect to a specific computer lab in a college dormitory where he had no legitimate reason to be. Confronted with the evidence, he confessed and pleaded guilty. Justice was served.
The case was resolved in 2000, when cell phone use wasn't ubiquitous, and communications networks were primitive by today's standards.
We had to work hard to place that suspect in that room. Today, law enforcement wouldn't have to work nearly as hard as we did, and that's exactly what the U.S. Supreme Court is considering.
Surveillance Technology in Focus for SCOTUS
A geofence warrant is a type of reverse search warrant in which the government seeks to identify who was within a defined physical area during a specific period of time.
Such searches function by surveying vast amounts of location history from communications networks and smartphones or other connected devices. This can include GPS information, Bluetooth beacons, cellphone location information from nearby cell towers, Internet Protocol address information, and/or the signal strength of nearby WiFi networks.
For security integrators and manufacturers, this case is worth watching. The systems you create, install, and monitor generate precisely the kind of location-rich data at the center of this debate.
Some refer to geofence warrants as “reverse warrants” because they can be used to identify suspects when none are known. Some allege geofence warrants are unconstitutional because they bypass customary probable cause requirements of the Fourth Amendment and collect data on innocent people present in a particular area, with potential for overreach during protests or in densely populated areas.
In January, the U.S. Supreme Court agreed to review the constitutionality of geofence warrants. In that case (Chatrie v. United States, Case Number 25-112), a man who was convicted of robbing a Virginia credit union after being apprehended on a geofence warrant asked the Supreme Court to resolve whether such warrants amount to a search under the Fourth Amendment.
The appeal focuses on whether such broad, location-based data dragnets meet the Fourth Amendment's requirement for individualized suspicion and probable cause. While the Supreme Court did agree to hear the case, it stated that its review would be limited only to the first question of the appeal – whether the execution of the geofence warrant violated the Fourth Amendment, not whether the evidence should be suppressed.
This is because the trial court and U.S. Court of Appeals for the Fourth Circuit determined that a “good faith” exception applied to the search. If law enforcement conducts an unconstitutional search on the good-faith belief that the search is not unconstitutional, a court can permit the evidence to be used at trial despite the violation. That is what happened in the Chatrie case – and it appears that the Supreme Court will not disturb that finding.
Meanwhile, the Fifth Circuit Court of Appeals took a different view in a different case. Specifically, they found that making Google dig through 500 million user accounts to find which ones were near the site of the crime at the right time does constitute a search, and that geofence warrants are unconstitutional general warrants.
Given the split between the Fourth and Fifth Circuits, the U.S. Supreme Court agreed to consider and resolve the issues. The arguments before the Supreme Court will focus on the question of whether people have a reasonable expectation of privacy in the location history data collected by Google and other app providers. Historically, a person does not have a reasonable expectation of privacy in information voluntarily conveyed to a third party. The government can thus obtain that information directly from the third party without running afoul of the Fourth Amendment.
But evolving technologies often cause courts to evolve. For example, in 2018, the Supreme Court ruled that information maintained by mobile network providers regarding which cell towers their subscribers’ phones were connected to does not fall under the third-party doctrine. If the government wants cell site information, it needs a warrant. While this may inhibit law enforcement, it also protects individual rights – a hallmark of our system.
Industry Implications
Regardless of what happens in the Chatrie case, the complex issue of what constitutes a search under the Fourth Amendment and what violates our fundamental right to privacy will continue to vex courts across our country.
For security integrators and manufacturers, this case is worth watching closely. The systems you create, install, and monitor – access control, video surveillance, mobile credentialing, and more – generate precisely the kind of location-rich data at the center of this debate.
A broad ruling could expose that data to law enforcement requests that bypass traditional probable cause requirements, creating legal and reputational risk for you and your customers. Understanding what data these systems collect, how long it is retained, and under what circumstances it can be compelled may very well become both legal and business questions that must be answered.
About the Author

Timothy J. Pastore, Esq.
Timothy J. Pastore Esq., is a Partner in the New York office of Montgomery McCracken Walker & Rhoads LLP (www.mmwr.com), where he is Vice-Chair of the Litigation Department. Before entering private practice, he was an officer and Judge Advocate General (JAG) in the U.S. Air Force and Attorney with the DOJ. [email protected] • (212) 551-7707
Meet Timothy J. Pastore
Timothy J. Pastore, Esq., is the newest columnist to join the Security Business magazine family. He is a Partner in the New York office of Montgomery McCracken Walker & Rhoads LLP (www.mmwr.com), where he is Vice-Chair of the Litigation Department.
Before entering private practice, Mr. Pastore was an officer and Judge Advocate General (JAG) in the U.S. Air Force and a Special Assistant U.S. Attorney with the U.S. Department of Justice. As a JAG, in particular, Mr. Pastore was legal counsel to the Air Force Security Forces and Air Force Office of Special Investigations.
Mr. Pastore has represented some of the largest companies in the security industry, including Protection One, Comcast, Charter, Cox, Altice, Mediacom, IASG, CMS and others. He regularly provides counsel on risk management, contracting, operations, licensing, sales practices, etc. Mr. Pastore also has served as lead counsel in courts throughout the country in dozens of litigation matters involving the security industry.
Among other examples, Mr. Pastore led the successful defense at trial of cable giant Comcast in a home invasion case in Seattle, Washington. The case received significant press attention and was heralded by CVN as a top-ten defense verdict.
Mr. Pastore is a graduate of Bucknell University and Boston College Law School.
Reach him at (212) 551-7707 or by e-mail at [email protected].
