On a summer day in 2019, someone robbed a Call Federal Credit Union branch in Midlothian, Virginia. Investigators had limited leads, so they tried something relatively new: they asked a judge for a warrant ordering Google to hand over data on every smartphone that had been near the bank during the heist. One of those phones belonged to Okello Chatrie. That single data point set off a chain of events that led to his arrest, his conviction, and now a Supreme Court showdown over whether the Constitution permits this kind of digital dragnet.
The justices are scheduled to hear oral arguments in Chatrie v. United States, No. 25-112, in late April 2026. Their decision will determine whether so-called geofence warrants violate the Fourth Amendment’s ban on unreasonable searches, a question that has divided lower courts and drawn intense interest from law enforcement, tech companies, and civil-liberties advocates alike.
How a geofence warrant works
A geofence warrant flips the traditional investigative sequence. Instead of identifying a suspect and then seeking evidence, police define a geographic area and a time window, then compel a tech company to reveal which devices were present. In Chatrie’s case, federal agents obtained a warrant in June 2019 directing Google to search its location-history database for every device detected within a boundary drawn around the credit union during the robbery.
Google’s process, as described in the company’s own amicus brief filed with the Court, operates in three stages. First, Google returns anonymized numerical identifiers for all devices in the specified zone and time frame. Investigators review that initial pool and select a narrower subset for more precise location data, still anonymized. Only after a second round of judicial approval does Google unmask account-holder information for the final set of devices. In Chatrie’s case, that process led agents to his Google account and, ultimately, to charges.
The database at the center of the technique has been referred to in court filings and reporting by The New York Times as “Sensorvault,” an internal Google repository that logged location pings from Android phones and apps like Google Maps. Google’s own transparency data showed the company received roughly 10,000 geofence requests from U.S. law enforcement in 2020 alone, a figure that climbed sharply year over year before the company changed its practices.
The constitutional clash
The Supreme Court agreed to take the case on January 16, 2026, as reflected on the official docket. Both Chatrie’s legal team and the U.S. government have filed merits briefs, and dozens of amici, including Google and organizations such as the American Civil Liberties Union and the Electronic Frontier Foundation, have weighed in.
Chatrie’s attorneys frame the warrant as a modern general warrant, the kind of open-ended government search that the framers of the Bill of Rights specifically intended to prohibit. In their merits brief, they argue that a geofence warrant “searches first and develops suspicion later,” sweeping up location data from potentially hundreds of bystanders who happened to be near a crime scene. Because the warrant does not name a suspect or even a particular device at the outset, they contend it fails the Fourth Amendment’s particularity requirement.
The government pushes back hard. Prosecutors argue in their brief that the warrant was tightly constrained: a small radius around the bank, a narrow window of minutes surrounding the robbery, and a multi-step disclosure process supervised by a judge at each stage. They characterize the technique as a reasonable evolution of established investigative methods, no different in principle from canvassing a neighborhood or reviewing surveillance footage from nearby businesses.
Hanging over both arguments is the Supreme Court’s 2018 decision in Carpenter v. United States, which held that police generally need a warrant to access weeks of historical cell-site location data for a known suspect. Chief Justice John Roberts, writing for the majority in Carpenter, recognized that continuous location tracking can reveal “the privacies of life” and that people do not surrender their Fourth Amendment rights simply by carrying a phone. But Carpenter involved records for an already-identified suspect, not a blanket query covering every device in a neighborhood. How the justices extend, limit, or distinguish that precedent will be the analytical heart of the opinion.
Why lower courts could not agree
The Supreme Court stepped in because federal and state courts have reached sharply different conclusions. The Fourth Circuit, reviewing Chatrie’s case, grappled with whether the warrant’s breadth made it constitutionally defective. Other courts have gone further: a federal magistrate judge in Illinois rejected a geofence warrant application outright in 2020, calling it “the digital equivalent of searching every home in a neighborhood.” Meanwhile, courts in California and Virginia have permitted the technique when geographic and temporal limits were tight enough.
The lack of consensus extends to the legal framework itself. Some judges analyze geofence warrants under the general-warrant doctrine, asking whether the search is so broad that it amounts to an exploratory rummaging. Others apply the third-party doctrine, which historically held that people lose certain privacy expectations when they voluntarily share information with a company like Google. Carpenter carved a significant exception to that doctrine for cell-site records, but the Court left open whether the same logic applies to other forms of location data collected by private firms. Analysis from the Brookings Institution maps these competing frameworks and notes that the circuit split all but guaranteed Supreme Court review.
Google changed the game, but the legal question remains
In December 2023, Google announced it would begin storing location-history data on users’ devices rather than on centralized servers. If fully implemented, the shift would effectively dismantle Sensorvault as a tool for geofence warrants, because Google would no longer maintain a single database that law enforcement could query for every device in a defined area.
That technical change does not moot the case. Chatrie’s warrant was executed years before the policy shift, so the legality of the evidence against him still needs to be resolved. More broadly, Google is not the only company that holds centralized location records. Wireless carriers retain cell-tower connection logs. Dozens of app developers collect and broker precise GPS data. Even if Google exits the geofence-warrant business, the legal principle the Court establishes will govern requests directed at any company sitting on similar troves of location information.
What a ruling could mean for your phone
For the roughly 300 million smartphone users in the United States, the practical stakes are straightforward. If the Court upholds geofence warrants with minimal new restrictions, police will retain the ability to demand records identifying every phone in a given place at a given time and then work backward from that pool to develop suspects. If the Court strikes the practice down or imposes strict limits, investigators will need to establish probable cause against a specific person, or at least a meaningfully narrow set of devices, before seeking location data.
The ruling may also reshape how tech companies handle location data. A decision declaring geofence warrants constitutionally suspect could accelerate the industry trend toward on-device storage and minimal data retention. A decision blessing the practice could push companies in the opposite direction, investing in compliance infrastructure and transparency reports while continuing to maintain queryable location logs.
People who want to limit their own exposure to geofence-style surveillance can start now. On Android, check Google’s “Location History” or “Timeline” settings and decide whether to keep them active, shorten the retention period, or disable them entirely. On iPhone, review which apps have access to precise location under Settings > Privacy & Security > Location Services, and consider restricting access to “While Using” rather than “Always.” These steps will not make a phone invisible to cell towers or every data broker, but they reduce the volume and precision of records stored in centralized databases that can be compelled by warrant.
Where the case goes from here
Once oral arguments conclude, the justices will deliberate and likely issue an opinion before the Court’s term ends in late June or early July 2026. The Supreme Court’s docket will be the first place to find orders, the argument transcript, and eventually the full opinion, including any concurrences or dissents that could shape how lower courts apply the ruling.
Whatever the justices decide, the opinion will reach far beyond Okello Chatrie’s case. It will set the constitutional baseline for how law enforcement interacts with the vast reservoir of location data that modern life generates, and it will answer a question millions of Americans carry in their pockets every day without thinking about it: when you walk past a crime scene with your phone, does the government get to know you were there?
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.