recommended reading

Panel sympathetic to geolocation privacy concerns

FreeSoulProduction /

A House Judiciary subcommittee appeared sympathetic on Thursday to calls for Congress to set standards for when law enforcement can gain access to geolocation information generated by cell phones and other devices.

The Crime, Terrorism and Homeland Security Subcommittee debated legislation offered by Rep. Jason Chaffetz, R-Utah., that would require the government to show probable cause and obtain a warrant before requesting geolocation information from cell phones or other devices. The bill includes some exceptions for bypassing the standard such as for emergencies involving possible death or serious harm and national security.

Chaffetz and other supporters argue that Congress needs to step in and clarify the rules for when law enforcement can access geolocation data, particularly in light of the Supreme Court’s January decision in United States v. Jones. In that case, the high court ruled that law enforcement must obtain a warrant before attaching a GPS device to a suspect’s car.

"Just because it can be done doesn't mean it necessarily should be done," Chaffetz said.

Supporters of Chaffetz's bill note that the decision only applied to GPS devices and left uncertainty about the standards that would apply to geolocation data collected by cell phones and other wireless devices.

In a separate opinion in the Jones case, Justice Samuel Alito urged Congress to step in to clarify the law for all devices.

Chaffetz's bill is backed by privacy advocates and tech firms, which favor clear rules that would eliminate uncertainty involving the privacy of cell phone geolocation data. “Requiring law enforcement agents to obtain a warrant based upon probable cause before obtaining geolocation information would allow legitimate investigations to proceed, while ensuring that innocent Americans do not have their privacy intruded upon,” Catherine Crump, a staff attorney with the American Civil Liberties Union, told the subcommittee.

But law enforcement officials worry that the standard set by the bill is too high and would hamper their ability to conduct investigations. They note that when they access geolocation data from cell phone companies now, they canot monitor phone conversations but instead get an approximate sense of where a call originated or was received.

“We feel the way [the bill] is written is overly broad and needs to be narrowed down so it doesn’t hinder law enforcement,” John Ramsey, national vice president of the Federal Law Enforcement Officers Association, said.

In response to repeated questioning from Chaffetz, Ramsey agreed that there need to be some standards but said his group does not favor the bill’s approach.

Rep. Trey Gowdy,  R-S.C., said he is sympathetic to law enforcement’s concerns, but pushed Ramsey and other law enforcement officials to work with Chaffetz and the bill’s other supporters to find a standard they could live with.

Subcommittee Chairman James Sensenbrenner, R-Wis., did not say if his panel would mark up the legislation. He and several other senior committee members, however, have signed on as co-sponsors of the legislation.

Sen. Ron Wyden, D-Ore., has introduced a similar version of the bill in the Senate.

(Image via FreeSoulProduction /

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.