PA Superior Court: No Search Warrant Required to Access Data on Public WiFi Network

The Superior Court has decided the case of Commonwealth v. Dunkins, holding that the police do not need a search warrant to obtain data that is transmitted over a public WiFi network. This decision is significant because people access public WiFi networks on a daily basis and now may have a reduced privacy interest in that activity. If you are a suspect in a crime, the police then can use this information as substantive evidence to arrest you. Despite this information being very personal, Dunkins holds that the police do not need to obtain a search warrant to obtain this information.

Commonwealth v. Dunkins

Criminal Defense Lawyer Zak Goldstein

Criminal Defense Lawyer Zak Goldstein

The incident in question took place on February 2, 2017 at approximately 2:00 AM at Moravian College in Bethlehem, PA. Two men wearing ski masks pretended to be campus police officers and gained access to the dorm room shared by the complainants. The complainants were apparently known drug dealers at Moravian College. When one of the complainants opened the dorm door, one of the masked men punched him and caused him to fall. The masked men then held the students at gunpoint and demanded marijuana and the key to one of the complainant’s footlockers. The masked men accessed the footlocker and stole approximately $1,000 in cash as well as a jar of marijuana.

Several hours later, around 11:00 AM, one of the complainants reported the robbery to the campus officials. A Moravian Campus Police Officer requested that Moravian’s Director of Systems Engineering analyze its wireless network data to compile a list of the students who logged onto the network near the wireless access point in the dormitory where the complainants resided. The campus officials discovered, at the time of the robbery, that there were only three individuals logged onto the campus WiFi at that location who did not reside in that building. Two of the three WiFi users were female. The male user was the defendant, who was also a Moravian student.

The Moravian Campus Police provided this WiFi data to a detective with the Bethlehem Police Department which subsequently took over the investigation. One of the complainants told the detective that the defendant previously “robbed” him by taking marijuana from him without payment in return. The defendant was subsequently interviewed by the police. He denied the accusations and stated he has not been in the complainant’s dormitory since October 2016. This was obviously contradicted by the WiFi records.

Another student who lived in the dorm room next to the defendant told police that the defendant came to his room after midnight on February 3, 2017 and showed off a large display of cash and bragged that he obtained this money in a recent robbery. According to this student, the defendant boasted that he and another individual posed as campus police officers to gain access to the victim’s room and subsequently stole drugs and money from the complainant’s footlocker.

The Motion to Suppress

The defendant was subsequently arrested and charged with robbery, conspiracy, receiving stolen property, and simple assault. The defendant then filed a motion to suppress, arguing that the campus police conducted an illegal search in obtaining the campus WiFi log-on data without first obtaining a warrant. At his suppression hearing, the Moravian Systems Engineering Director explained that in order to utilize Moravian’s WiFi each student must log on to the network with their individual username and password. However, at their initial log-on, students may choose to have their devices automatically long on to the campus WiFi without entering their credentials again. The parties also noted that the defendant had signed the Moravian Student Handbook which indicated that he accepted and understood Moravian’s policies, including its technology rules. These rules specifically state that “users cannot and should not have any expectation of privacy with regard to any data, documents…or other computer files created or stored on computers within or connected to the institution’s network.” After the evidence was presented, the trial court denied the defendant’s motion to suppress.

The defendant then proceeded to a jury trial where he was found guilty of the aforementioned crimes. On January 4, 2019, the trial court imposed an aggregate sentence of five to ten years’ imprisonment. The defendant then filed a post-sentence motion which was denied. The defendant then filed a timely appeal. On appeal, the defendant raised several issues. For purposes of this blog, only the issue as to whether the trial court improperly denied the defendant’s motion to suppress will be addressed.

Does the Fourth Amendment Protect Data that is Generated from Electronic Devices?

Yes. Fourth Amendment protection is not constrained by the type of property in question, but instead whether the person who claims the protection has a legitimate expectation of privacy in the property. Recently, the United States Supreme Court decided the case of Carpenter v. United States in which the Court held that law enforcement officials improperly acquired the defendant’s cell site location information (hereinafter “CSLI”) without a warrant. In that case, the law enforcement officers compelled the defendant’s wireless carriers to provide a record of his CSLI for a four-month period. This allowed the officers to track his movements during the time when robberies had occurred. In that case, the United States Supreme Court found that collecting this CLSI data without a warrant violated the Fourth Amendment.

However, the United States Supreme Court emphasized that this was a narrow opinion. Specifically, the Court said that its decision does not apply to “tower dumps” which is a download of information on all of the devices that were connected to a particular cell site during a particular interval. Additionally, other federal circuit courts have held that a person can lose their privacy interests in their data when they sign employer policies that state their electronic activity can and will be disclosed to third parties. As such, when an individual signs these “contracts,” they can lose their right to challenge the disclosure of their electronic data being transmitted to third parties.

The Superior Court’s Decision

The Superior Court affirmed the trial court’s order denying the defendant’s motion to suppress. In its opinion, the Superior Court declined to overturn the trial court’s decision for several reasons. First, the Superior Court analogized the acquisition of the data from Moravian’s wireless campus to a “tower dump,” which as previously discussed, is permissible under Fourth Amendment law. Additionally, the Superior Court found that the defendant’s specific CSLI was not obtained in this case and therefore the police’s actions were not specifically intrusive to the defendant. Finally, the Superior Court found it persuasive that the defendant voluntarily consented to third parties accessing the data that was transmitted over Moravian’s WiFi systems. Therefore, the Superior Court found that the trial court properly denied his motion to suppress. Additionally, his other issues on appeal were denied, and therefore the defendant will not get a new trial and he will be forced to serve his sentence.     

Facing Criminal Charges? We Can Help.

Philadelphia Criminal Defense Lawyers

Philadelphia Criminal Defense Lawyers

If you are facing criminal charges or under investigation by the police, we can help. We have successfully defended thousands of clients against criminal charges in courts throughout Pennsylvania and New Jersey. We have successfully obtained full acquittals in cases involving charges such as Conspiracy, Aggravated Assault, Rape, and Murder. Our award-winning Philadelphia criminal defense lawyers offer a free criminal defense strategy session to any potential client. Call 267-225-2545 to speak with an experienced and understanding defense attorney today.

Previous
Previous

Can a judge give a worse sentence if you file a motion to reconsider the sentence?

Next
Next

Third Circuit Court of Appeals: Suspect Who Refuses to Provide Password Can Only Be Held in Contempt For 18 Months