FILED
United States Court of Appeals
Tenth Circuit
August 8, 2017
PUBLISH Elisabeth A. Shumaker
Clerk of Court
UNITED STATES COURT OF APPEALS
TENTH CIRCUIT
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v. No. 15-3313
ANTHONY CARLYLE THOMPSON,
Defendant - Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF KANSAS
(D.C. NO. 5:13-CR-40060-DDC-10)
Kari S. Schmidt (Tyler J. Emerson with her on the briefs), Conlee Schmidt &
Emerson, LLP, Wichita, Kansas, for Appellant.
James A. Brown, Assistant United States Attorney (Thomas E. Beall, United
States Attorney, with him on the brief), Office of the United States Attorney,
Topeka, Kansas, for Appellee.
Before TYMKOVICH, Chief Judge, MATHESON and MORITZ, Circuit
Judges.
TYMKOVICH, Chief Judge.
I. Introduction
This appeal arose from a law enforcement investigation into a drug-
trafficking operation in the Geary County, Kansas area. Agents gathered
evidence by making controlled buys of crack cocaine through a confidential
informant; monitoring telephones used by certain of the co-conspirators,
including Anthony Carlyle Thompson; and conducting searches of several
residences, including Thompson’s. Thompson was arrested and charged with one
count of conspiracy to distribute more than 280 grams of cocaine base, in
violation of 21 U.S.C. §§ 846 and 841(a), and multiple counts of distribution of
cocaine base, in violation of 21 U.S.C. § 841(a)(1).
Before trial, Thompson moved to dismiss the indictment for Speedy Trial
Act violations. The district court overruled the motion, finding the court had
properly granted an ends-of-justice continuance that tolled the speedy-trial clock.
Also before trial, the district court admitted cell-service location information
(CSLI) the government obtained without a warrant as part of the process for
determining whether certain intercepted phone calls were admissible at trial. In
addition, the court denied Thompson’s motion to suppress evidence obtained from
a search of his residence, finding the search warrant was supported by probable
cause.
Thompson was tried along with several co-defendants, including Johnny
Lee Ivory, Martye Madkins, and Albert Dewayne Banks, who are appellants in
-2-
related appeals. Thompson and his co-defendants were convicted on all counts.
Using an extrapolation method of calculation, the presentence investigation report
(PSR) attributed 8.477 kilograms of cocaine base to Thompson. The PSR then
imposed a four-level leadership sentencing enhancement, which yielded a total
offense level of 40, a criminal history category of IV, and a corresponding
guidelines range of 360 months to life in prison. Thompson objected to both the
drug-quantity calculation and the imposition of the leadership enhancement. At
sentencing, the court rejected Thompson’s objections, finding he was responsible
for 8.477 kilograms of cocaine base and applying the four-level leadership
enhancement. The court then sentenced Thompson to 360 months’ imprisonment.
Thompson now appeals his convictions and sentence, incorporating by
reference some of the arguments made by his co-defendants Madkins, Banks, and
Ivory in their related appeals. 1 In particular, Thompson contends the district court
erred in (1) denying his motion to dismiss for Speedy Trial Act violations; (2)
admitting CSLI obtained without a warrant; (3) denying his motion to suppress
evidence obtained from the search of his residence; and (4) delivering a
constitutionally deficient reasonable doubt instruction to the jury. Thompson also
appeals his sentence, arguing the district court erred in (1) relying on an
1
We consolidated these four appeals for all procedural purposes, including
briefing and oral argument. The government thus submitted one consolidated
response brief, and we heard oral argument in Thompson’s appeal along with
consolidated cases 15-3299 (Madkins) and 15-3324 (Banks). Consolidated case
15-3238 (Ivory) was submitted on the briefs.
-3-
extrapolation method to calculate the drug quantity attributable to him as relevant
conduct; and (2) imposing the four-level leader-organizer enhancement, because
the evidence did not establish he served as a leader or organizer in the conspiracy.
For the reasons below, we affirm the district court in full, finding no error
in the court’s various rulings or in the sentence it imposed.
II. Analysis
We address Thompson’s challenges to his convictions and sentence in turn.
A. Speedy Trial Action Violations
Thompson first argues the district court violated his right to a speedy trial.
Pursuant to Federal Rule of Appellate Procedure 28(j), Thompson joins in and
adopts by reference the Speedy Trial Act arguments made by his co-defendant
Madkins.
In United States v. Madkins, No. 15-3299 (10th Cir. 2017), we explain the
relevant factual background, which is materially indistinguishable for purposes of
Thompson’s appeal. Pertinently, Thompson filed a motion to dismiss for Speedy
Trial Act violations. It is the district court’s denial of that motion that Thompson
now appeals.
In Madkins, we hold that the district court complied with the requirements
of the Speedy Trial Act in granting an ends-of-justice continuance, because the
record contains sufficient ends-of-justice findings. For the same reasons, we
-4-
conclude the district court did not violate Thompson’s right to a speedy trial. We
therefore affirm Thompson’s convictions.
B. Admission of CSLI
Thompson next argues the district court erred in granting the government’s
application for historical cell-service location information (CSLI) and in
admitting that CSLI at a pretrial evidentiary hearing. The Stored
Communications Act (SCA), 18 U.S.C. § 2703(d), allows the government to
obtain a court order for disclosure of CSLI if it makes a showing of reasonable
suspicion. Thompson contends § 2703(d) is unconstitutional, because cell-phone
users have a reasonable expectation of privacy in their historical CSLI. And
because collecting CSLI constitutes a search, Thompson argues, the Fourth
Amendment requires the government to procure a warrant before obtaining a cell-
phone user’s historical CSLI.
We first explain the relevant background facts and then evaluate
Thompson’s constitutional arguments. Before trial, the parties engaged in
extensive litigation over the admissibility of recorded telephone calls the
government had intercepted pursuant to wiretap orders entered by Judge David R.
Platt, a state court judge sitting in the Eighth Judicial District of Kansas. Judge
Platt had issued wiretap orders for target phones used by Thompson, Banks, and
Ivory. Based in part on information derived from intercepts conducted pursuant
to the wiretap orders, law enforcement applied for search warrants of various
-5-
locations and residences, including Thompson’s residence. When law
enforcement carried out the search of Thompson’s residence, officers seized cell
phones, cash, miscellaneous documents, drug paraphernalia, and credit cards.
Thompson filed a motion to suppress the intercepted calls, arguing law
enforcement had intercepted his communications outside the territorial
jurisdiction of the Eighth Judicial District. Co-defendant Ivory joined the motion.
Following a hearing, the federal district court ruled that Kansas law required
suppression of evidence about any calls made from a phone that was physically
located outside the boundaries of the Eighth Judicial District, since Judge Platt’s
jurisdiction only extended that far. The court therefore concluded the government
could introduce evidence about the wiretapped calls only if it could show that the
tapped phones were physically located within the Eighth Judicial District at the
time the calls were intercepted. The court postponed its rulings on Thompson’s
motion to suppress pending the government’s coming forth with evidence
showing the physical locations of the phones.
The government filed an application for orders pursuant to § 2703(d) of the
SCA, asking the court to require the electronic service providers for the target
phones—those used by Thompson, Banks, and Ivory—to disclose historical CSLI
relating to those phones. Section 2703(d) does not require the government to
show probable cause to obtain a court order; rather, the government must simply
show there are reasonable grounds to believe the material is relevant to an
-6-
ongoing criminal investigation. Thompson filed a response in opposition to the
government’s application, arguing § 2703(d) is unconstitutional, because a cell-
phone user’s location is constitutionally protected by the Fourth Amendment.
Banks and Ivory joined the motion.
The district court granted the government’s application. The court
concluded that a cell-phone user has no reasonable expectation of privacy in his
CSLI, because CSLI records are business records that fall within the Fourth
Amendment’s third-party doctrine. Alternatively, the court ruled that even if the
Fourth Amendment did apply to CSLI, the government had shown probable cause
to support the issuance of the search warrants.
After obtaining the CSLI, the government sought to establish the location
of the intercepted phone calls by showing that a call had “pinged” certain cell
towers in and around the Junction City area within the Eighth Judicial District.
At a pretrial evidentiary hearing, the government presented the CSLI and
testimony from two experts who agreed that if the CSLI showed a phone
connected to one of the Junction City towers, then it was highly likely the phone
was physically located in the Eighth Judicial District. The district court found
that this evidence—along with other circumstances, including the fact that many
of the defendants’ residences and meeting places were located in and around
Junction City—established by a preponderance of the evidence that a phone was
physically located in the Eighth Judicial District if it had pinged one of the
-7-
Junction City towers. Accordingly, the court ruled that if a call had pinged one of
those towers, it was admissible. Calls that had not pinged the towers, however,
were suppressed.
After the court’s ruling, Thompson, Banks, and Ivory filed a second round
of suppression motions, seeking to suppress evidence they claimed was obtained
derivatively of the suppressed calls and arguing, among other things, that
insufficient probable cause remained to support the search warrants once the
suppressed calls were excised from the affidavits supporting the warrants. The
district court denied the motions. The court found that, even excluding the
suppressed calls, the affidavits established probable cause to support issuing the
warrants. At trial, the government introduced calls that had pinged on three
towers in or immediately surrounding Junction City, along with some of the
evidence found during the searches of Banks’s and Ivory’s residences. The
government did not present any evidence found during the search of Thompson’s
residence. Thompson now appeals the district court’s rulings.
* * *
The SCA provides two different routes for the government to obtain
historical CSLI. The government may (1) “obtain[] a warrant using the
procedures described in the Federal Rules of Criminal Procedure”; or (2)
“obtain[] a court order for such disclosure under subsection (d).” 18 U.S.C.
§ 2703(c)(1). Subsection 2703(d) provides that such a court order “shall issue
-8-
only if the governmental entity offers specific and articulable facts showing that
there are reasonable grounds to believe that the contents of a wire or electronic
communication, or the records or other information sought, are relevant and
material to an ongoing criminal investigation.” 18 U.S.C. § 2703(d).
We review de novo Thompson’s challenge to the constitutionality of
§ 2703(d). See United States v. Yelloweagle, 643 F.3d 1275, 1279 (10th Cir.
2011). In doing so, our analysis is guided by the Supreme Court’s business
records cases and the opinions of the four other circuit courts of appeals that have
considered this precise question. Those circuits held, as we do today, that cell-
phone users lack a reasonable expectation of privacy in their historical CSLI,
because they voluntarily convey CSLI to third parties who create records of that
information for their own business purposes. In reaching this conclusion, we do
not write on a blank slate. Perhaps if we did, we would reach a different
conclusion—we wholeheartedly recognize that Thompson raises valid concerns
about the application of the third-party doctrine in the digital age. But until the
Supreme Court instructs us otherwise, we are bound to follow its third-party
doctrine precedents. 2
The Fourth Amendment protects “[t]he right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and
2
The Supreme Court recently granted certiorari in United States v.
Carpenter, 819 F.3d 880 (6th Cir. 2016), to address whether the Fourth
Amendment permits the warrantless seizure and search of historical CSLI.
-9-
seizures.” U.S. Const. amend. IV. Historically, the Fourth Amendment was
understood as guarding primarily against physical governmental trespass upon the
areas enumerated in its text. See United States v. Jones, 565 U.S. 400, 405
(2012). But since 1967, the Supreme Court has recognized a second, privacy-
based approach to the Fourth Amendment as consistent with its original public
meaning. See Katz v. United States, 389 U.S. 347 (1967). Under that approach,
we ask (1) whether the individual asserting an expectation of privacy has
“exhibited an actual (subjective) expectation of privacy”; and (2) whether that
expectation is “one that society is prepared to recognize as reasonable.” See id. at
361 (Harlan, J., concurring). Where an expectation of privacy satisfies both of
these requirements, government invasion of that legitimate expectation of privacy
generally constitutes a search. Smith v. Maryland, 442 U.S. 735, 740 (1979).
Relying on Katz, Thompson contends cell-phone users have a legitimate
expectation of privacy in their historical CSLI, given the ubiquity of cell phones
in modern American life and their ability to store and generate large amounts of
personal information, including information about a cell-phone user’s location.
We are not the first circuit court to confront this issue: four other circuits
have already considered and rejected Thompson’s position. First, in 2013, the
Fifth Circuit held that the government’s acquisition of CSLI under § 2703(d) does
not constitute a search or seizure subject to the Fourth Amendment’s warrant
requirement. In In re Application of the United States for Historical Cell Site
-10-
Data, 724 F.3d 600 (5th Cir. 2013), the court explained that historical CSLI “is
clearly a business record” created by a third party from information that cell-
phone users turn over voluntarily. Id. at 611–13. Writing for the majority, Judge
Clement explained that “who is recording an individual’s information initially is
key,” because when an individual “knowingly exposes his activities to third
parties, he surrenders Fourth Amendment protections.” Id. at 610 (quoting
Reporters Comm. for Freedom of Press v. Am. Tel. & Tel. Co., 593 F.2d 1030,
1043 (D.C. Cir. 1978)).
Judge Clement therefore analyzed the constitutionality of § 2703(d) under a
pair of Supreme Court cases dealing with business records created by a third
party—namely, United States v. Miller, 425 U.S. 435 (1976), and Smith v.
Maryland, 442 U.S. 735 (1979). The Fourth, Sixth, and Eleventh circuits have
since done the same. See United States v. Graham, 824 F.3d 421, 426 (4th Cir.
2016) (en banc) (“[T]he question before us is whether the government invades an
individual’s reasonable expectation of privacy when it obtains, from a third party,
the third party’s records, which permit the government to deduce location
information. . . . [T]he cases that establish the third-party doctrine provide the
answer.”); United States v. Carpenter, 819 F.3d 880, 888–89 (6th Cir. 2016)
(“Whether a defendant had a legitimate expectation of privacy in certain
information depends in part on what the government did to get it. . . . This case
involves business records obtained from a third party . . . .”) (citing Miller, 425
-11-
U.S. at 443), cert. granted, 2017 U.S. App. LEXIS 3686 (U.S. 2017) ; United
States v. Davis, 785 F.3d 498, 511 (11th Cir. 2015) (en banc) (“[L]ike the bank
customer in Miller and the phone customer in Smith, Davis has no subjective or
objective reasonable expectation of privacy in MetroPCS’s business records
showing the cell tower locations that wirelessly connected his calls. . . .”).
These circuit decisions also generated thoughtful dissents. In United States
v. Davis, for example, Judge Martin dissented from the en banc majority opinion,
because she would have distinguished CSLI from the conventional telephone and
bank records in Smith and Miller and therefore would have held § 2703(d)
unconstitutional. Judge Martin warned of the potential consequences of the
majority’s holding in an era of rapid technological change, stating “the majority’s
blunt application of the third-party doctrine threatens to allow the government
access to a staggering amount of information that surely must be protected under
the Fourth Amendment,” such as a person’s web-search history. See Davis, 785
F.3d at 535–36 (Martin, J., dissenting). And because she would not have decided
the issue under the third-party doctrine, Judge Martin explained that in today’s
digital world, she believes cell-phone users have a legitimate, reasonable
expectation of privacy that their location information will be kept private. Id. at
539.
Similarly, in United States v. Graham, Judge Wynn dissented in part from
the opinion of the court, because he believed cell-phone users do not voluntarily
-12-
convey their CSLI. Judge Wynn explained his view that voluntary conveyance
has two components: “knowledge of particular information and an action
submitting that information.” Graham, 824 F.3d at 443 (Wynn, J., dissenting).
Unlike the majority, Judge Wynn found “no reason to think that a cell phone user
is aware of his CSLI, or that he is conveying it.” Id. at 445. He also pointed out
that CSLI can be automatically generated even when a user receives a call. Id. In
the absence of voluntary conveyance, then, Judge Wynn would have continued to
the Fourth Amendment reasonableness inquiry and held the government violates
reasonable expectations of privacy when it obtains CSLI without a warrant. And
like Judge Martin, Judge Wynn also highlighted his concerns about the
application of the third-party doctrine to new technology, given heightened
privacy interests and the potential for government overreach.
Although these dissents raise some valid points, we agree with the majority
opinions that Miller and Smith provide the applicable framework for considering
whether § 2703(d) violates the Fourth Amendment. In Miller, the question before
the Supreme Court was whether the defendant had a reasonable expectation of
privacy in subpoenaed copies of his checks and other bank records maintained in
accordance with the Bank Secrecy Act. 425 U.S. at 437. The Court held the
defendant did not have a legitimate expectation of privacy in the subpoenaed
records, reasoning the defendant could “assert neither ownership nor possession”
of the documents; instead, the records were “the business records of the banks”
-13-
and related to transactions to which the banks were a party. Id. at 440–41. The
Court explained the bank records were “not confidential communications,” but
rather “contain[ed] only information voluntarily conveyed to the banks and
exposed to their employees in the ordinary course of business.” Id. at 442. And
the Court reiterated it had repeatedly held that the Fourth Amendment does not
forbid “the obtaining of information revealed to a third party and conveyed by
him to Government authorities, even if the information is revealed on the
assumption that it will be used only for a limited purpose and the confidence
placed in the third party will not be betrayed.” Id. at 443.
Several years later, in Smith, the Court held the third-party doctrine applied
to the warrantless installation of a pen register used to record telephone numbers
dialed from the defendant’s home. 442 U.S. at 743–46. Applying the
reasonableness test from Katz, the Court rejected the defendant’s claim that he
had a legitimate expectation of privacy in the phone numbers dialed on his home
telephone. Id. at 742. In doing so, the Court distinguished the device used in
Katz, where the government had listened to the contents of a phone conversation,
from the pen register at issue in Miller, which recorded only the numbers dialed
from the phone. Id. at 741. And, the Court reasoned, telephone users “typically
know that they must convey numerical information to the phone company; that
the phone company has facilities for recording this information; and that the
phone company does in fact record this information for a variety of legitimate
-14-
business purposes.” Id. at 743. Because the defendant voluntarily turned over his
numerical information to a third-party phone company, he lacked a legitimate
expectation of privacy in that information. Id. at 743–44.
So too here. To begin, fundamentally it is not the government who is
initially gathering users’ historical CSLI, but rather third-party service providers
who create records for their own business purposes. This distinction matters a
great deal, as the Supreme Court has repeatedly emphasized in its third-party
cases. See Miller, 425 U.S. at 443 (listing cases). The Fourth Amendment is a
bulwark against government action. And indeed, every other circuit has likewise
focused on who is collecting CSLI in the first instance. For example, in
Carpenter, Judge Kethledge wrote, “[w]hether a defendant had a legitimate
expectation of privacy in certain information depends in part on what the
government did to get it. . . . This case involves business records obtained from
a third party, which can only diminish the defendants’ expectation of privacy in
the information those records contain.” 819 F.3d at 888; see also Davis, 785 F.3d
at 514 (“MetroPCS, not the government, built and controlled the electronic
mechanism (the cell towers) and collected its cell tower data for legitimate
business purposes.”).
Furthermore, under the same rationale the Court articulated in Miller and
Smith, cell-phone users voluntarily turn over their CSLI to service providers, thus
relinquishing any reasonable expectation of privacy. In Miller, the Court stated,
-15-
“The depositor takes the risk, in revealing his affairs to another, that the
information will be conveyed by that person to the Government . . . .” 425 U.S.
at 443. And in Smith, the Court explained that when the defendant used his
phone, he “voluntarily conveyed numerical information to the telephone company
and ‘exposed’ that information to its equipment in the ordinary course of
business,” thus “assum[ing] the risk that the company would reveal to police the
numbers he dialed.” 442 U.S. at 744. The Court also noted that “[t]he fortuity of
whether or not the phone company in fact elects to make a quasi-permanent
record of a particular number” had no bearing on the constitutional question. Id.
at 745.
Applying this reasoning here, we agree with the other circuits that “any
cellphone user who has seen her phone’s strength fluctuate must know that, when
she places or receives a call, her phone ‘exposes’ its location to the nearest cell
tower and thus to the company that operates the tower.” See Carpenter, 819 F.3d
at 888 (first citing Davis, 785 F.3d at 511; then citing In re Application for
Historical Cell Site Data, 724 F.3d at 614). And we agree with the Fifth Circuit
that, “[e]ven if this cell phone-to-tower transmission was not ‘common
knowledge’ . . . cell phone service providers’ and subscribers’ contractual terms
of service and providers’ privacy policies expressly state that a provider uses a
subscriber’s location information to route his cell phone calls.” Id. at 613. These
documents also “inform subscribers that the providers not only use the
-16-
information, but collect it” and “will turn over these records to government
officials if served with a court order.” Id. In fact, such disclaimers go above and
beyond what the Constitution requires: Smith tells us users’ knowledge that
business records are being created does not “make any constitutional difference.”
442 U.S. at 745.
Nevertheless, Thompson contends the third-party doctrine has no
application here, because that doctrine presumes a voluntary relinquishment of
information. And since a cell phone’s transmission of location information is
“automatic and surreptitious,” Thompson argues, and providers gather and retain
location information whenever calls, text messages, or data are sent or received,
individuals do not voluntarily disclose their CSLI to service providers. We
disagree. Cell-phone users voluntarily enter arrangements with service providers
knowing they “must maintain proximity to the provider’s cell towers” in order for
their phones to function. Graham, 824 F.3d at 430; see also Davis, 785 F.3d at
520 (Pryor, J., concurring) (“[C]ell phone users realize that their calls are routed
through nearby cell towers. It is no state secret that cell phones work less
effectively in remote areas without cell towers nearby.”).
Finally, we emphasize that like the phone numbers recorded by the pen
register in Smith, CSLI is not a record of conversations between individuals, but
rather a record of the transmission of data that occurs to facilitate those
conversations. As Judge Kethledge explained in Carpenter, “federal courts have
-17-
long recognized a core distinction” between the content of personal
communications and the information necessary to convey that content. 819 F.3d
at 887. In other words, “although the content of personal communications is
private, the information necessary to get those communications from point A to
point B is not.” Id. Thus, like the numerical information in Smith, CSLI is not
protected by the Fourth Amendment, because it functions merely “as a means of
establishing communication.” See 442 U.S. at 741.
In reaching our holding today, we recognize the difficulties inherent in
applying longstanding precedent to new technology, which has progressed at an
exponential pace in the four decades since Miller and Smith were decided. We
are acutely aware of the privacy concerns accompanying technological
advancement, particularly in our society, where using a cell phone has become a
near necessity in the modern American economy. And we acknowledge that
distinguishing between the content of communication and the means of
transmission may be more difficult for other types of data, such as web-browsing
history. But today we focus on the narrow question before us: whether Thompson
has a reasonable expectation of privacy in his historical CSLI. And for the
reasons above, we hold he does not.
-18-
Thompson relies on the Supreme Court’s decision in United States v. Jones
to argue that societal expectations of privacy have changed. 3 He points to Justice
Sotomayor’s concurrence, where she opined, “it may be necessary to reconsider
the premise that an individual has no reasonable expectation of privacy in
information voluntarily disclosed to third parties,” characterizing this approach as
“ill suited to the digital age, in which people reveal a great deal of information
about themselves to third parties in the course of carrying out mundane tasks.”
Jones, 565 U.S. at 417 (Sotomayor, J., concurring). This may well be true. But
Justice Sotomayor’s concurrence was not the opinion of the Court. And in any
event, she merely called into question the future of the third-party doctrine. Until
3
As part of his Fourth Amendment argument, then, Thompson contends
cell-phone users have a reasonable expectation of privacy in their CSLI because
societal expectations of privacy have changed in light of technological advances.
The government believes Thompson has waived this argument by failing to raise
it below. But in his objection to the government’s application for § 2703(d)
orders, Thompson argued that “a phone user’s location is constitutionally
protected by the Fourth Amendment,” citing for support the Eleventh Circuit’s
panel opinion in United States v. Davis, 754 F.3d 1205 (2014), overruled in part
by United States v. Davis, 785 F.3d 498 (2015) (en banc). After reviewing the
record, we conclude Thompson adequately preserved his arguments for appeal.
Our conclusion is bolstered by the district court’s discussion of the Fourth
Amendment issue in its order granting the government’s application. In rejecting
Thompson’s arguments, the court decided not to follow Davis. Instead, the court
relied on the Fifth Circuit’s decision in In re Application for Historical Cell Cite
Data, where the court held cell-phone users lack a reasonable expectation of
privacy in their CSLI, because users voluntarily convey that information to third
parties. The court’s thorough discussion of reasonable expectations of privacy in
CSLI further indicates Thompson sufficiently preserved his Fourth Amendment
arguments for our review.
-19-
a majority of justices on the Court instructs us otherwise, we are still bound by
the third-party doctrine as it exists today.
Ultimately, Jones tells us very little that is relevant here, since its holding
did not rely on a privacy theory of the Fourth Amendment. Instead, five justices
agreed the government’s installation of a GPS device on the defendant’s vehicle
after the search warrant had expired constituted a physical trespass contrary to the
Fourth Amendment. Writing for the majority, Justice Scalia explained the
government’s installation and use of a GPS device surely “would have been
considered a ‘search’ within the meaning of the Fourth Amendment when it was
adopted.” Id. at 404–05. Justice Scalia expressly stated “the present case” did
not require the court to consider whether electronic surveillance of the defendant,
“without an accompanying trespass,” would be “an unconstitutional invasion of
privacy.” Id. at 412.
To be sure, like Justice Sotomayor and the dissenting judges in other
circuit-level CSLI cases, Thompson raises valid concerns about the third-party
doctrine in the digital age. The aggregation of an individual’s location data can
tell the government a great deal about that person. As Justice Sotomayor stated in
Jones, “GPS monitoring generates a precise, comprehensive record of a person’s
public movements that reflects a wealth of detail about her familial, political,
professional, religious, and sexual associations.” 565 U.S. at 415 (Sotomayor, J.,
concurring). The same could be said about a person’s web-browsing history.
-20-
And we, too, fear the Orwellian-style surveillance state that could emerge from
unfettered government collection of personal data.
At this point, however, we can only speculate how the Supreme Court will
address these concerns, now that it has taken up the question of historical CSLI
by granting certiorari in Carpenter. Perhaps the Supreme Court will revisit the
third-party doctrine in light of evolving technology, especially given the ubiquity
of cell phones in Americans’ lives, possible changing societal expectations of
privacy, and their implications on the national economy. And in fact, in Riley v.
California, 134 S. Ct. 2473 (2014), Chief Justice Roberts famously recognized
that modern cell phones “are now such a pervasive and insistent part of daily life
that the proverbial visitor from Mars might conclude they were an important
feature of human anatomy.” Id. at 2484. The Chief Justice went on to distinguish
cell phones from the types of physical objects in earlier cases involving the search
incident to arrest doctrine, citing rapid technological change and heightened
privacy interests, since cell phones store “vast quantities of personal information”
and raise unique concerns about government overreach. Id. at 2484–85. The
Court may well draw on these types of cell-phone-specific concerns to expressly
limit the reach of the third-party doctrine to business records created from the use
of conventional telephones or bank statements. If the Court were to hold that
cell-phone users enjoy a reasonable expectation of privacy in their historical
-21-
CSLI, then law enforcement would simply be required to obtain a warrant
supported by probable cause pursuant to § 2703(c)(1)(A) of the SCA.
But again, today our analysis of the narrow issue of historical CSLI is
governed by the third-party doctrine as it currently exists. In the meantime, we
believe privacy concerns about historical CSLI are best directed to legislative
bodies, which are better equipped to evaluate the types of empirical studies and
policy arguments Thompson presents and weigh the interests on both sides. And
indeed, at least six states—Colorado, Maine, Minnesota, Montana, Tennessee, and
Utah—have legislated privacy protections for CSLI. See Colo. Rev. Stat. Ann.
§ 16-3-303.5(2) (West 2014); Me. Rev. Stat. Ann. tit. 16, § 648 (West 2014);
Minn. Stat. Ann. §§ 626A.28(3)(d), 626A.42(2) (West 2014); Mont. Code Ann.
§ 46-5-110(1)(a) (West 2013); Tenn. Code Ann. § 39-13-610(b) (West 2014);
Utah Code Ann. § 77-23c-102(1)(a) (West 2016). These state statutes generally
require law enforcement to procure a warrant before obtaining CSLI, with most
allowing for certain exceptions such as exigent circumstances or other exceptions
to the warrant requirement.
So for now, at least, as Judge Clement advised in In re Application for
Historical Cell Site Data, the recourse for cell-phone users’ desire for their
historical CSLI to remain private “is in the market or the political process: in
demanding that service providers do away with such records (or anonymize them)
or in lobbying elected representatives to enact statutory protections. The Fourth
-22-
Amendment, safeguarded by the courts, protects only reasonable expectations of
privacy.” 724 F.3d at 615 (emphasis added).
In sum, we hold that cell-phone users lack a reasonable expectation of
privacy in their historical CSLI, which users voluntarily convey to third-party
cell-service providers. Therefore, the district court did not err in granting the
government’s application for orders requesting historical CSLI under § 2703(d) or
in admitting some of that CSLI at a pretrial proceeding. 4
C. Denial of Motion to Suppress
Thompson next contends the district court erred in denying his motion to
suppress evidence obtained from a search of his residence, because there was
insufficient probable cause to support the search warrant after any suppressed
calls were excised from the affidavits. 5 But Thompson conceded at oral argument
that the CSLI issue is a “lynchpin” for him: if the CSLI was properly admitted,
then so were the calls that pinged the three towers in the Junction City area.
Having concluded the CSLI was properly obtained and admitted, the affidavits
supporting the application for a warrant to search Thompson’s residence
sufficiently alleged probable cause.
4
In so holding, we also reject Thompson’s alternative argument that
obtaining CSLI requires a Title III wiretap warrant. Although the government
certainly could have chosen to apply for a Title III warrant, it was not required to.
5
We reject Thompson’s suppression arguments on the merits. But in any
event, none of the evidence Thompson challenges was admitted at trial.
-23-
We also reject Thompson’s contention that the district court should not
have admitted any of the intercepted calls at trial, because the court erred in
requiring the government to prove the phones were in Kansas’s Eighth Judicial
District by a preponderance of the evidence, rather than clear and convincing
evidence. This argument lacks merit. For one thing, Thompson fails to cite any
authority for this proposition. And for another, this court has applied a
preponderance standard in reviewing the sufficiency of the evidence on venue in a
criminal case—an element of every crime which has constitutional underpinnings.
See United States v. Kelly, 535 F.3d 1229, 1233 (10th Cir. 2008); cf. United
States v. Bowers, 660 F.2d 527, 531 (5th Cir. 1981). If a preponderance is the
proper standard for determinations of venue in criminal cases, then surely the
same standard applies to the jurisdictional question that was at issue here.
Even if the court erred in analogizing to venue in criminal cases—and we
do not believe it did—the Supreme Court has stated, “the controlling burden of
proof at suppression hearings should impose no greater burden than proof by a
preponderance of the evidence.” See United States v. Matlock, 415 U.S. 164, 177
n.14 (1974). The use of the preponderance standard in the Fourth Amendment
context therefore also suggests the same standard applies for questions of
jurisdictional fact involving a wiretap order. And under a preponderance
standard, the government clearly met its burden of proving the calls from the
target phones were made in the Eighth Judicial District.
-24-
Accordingly, we hold the district court did not err in denying Thompson’s
motion to suppress evidence obtained from a search of his residence.
D. Reasonable Doubt Instruction
Thompson next contends the district court’s reasonable doubt instruction
was constitutionally deficient. Pursuant to Federal Rule of Appellate Procedure
28(j), Thompson joins in and adopts by reference the arguments raised by his co-
defendant Ivory.
The factual background is the same as that described in United States v.
Ivory, No. 15-3238 (10th Cir. 2017). And like Ivory, Thompson cannot meet his
burden of establishing plain error. As we explain in Ivory, our recent decision in
United States v. Petty, 856 F.3d 1306 (10th Cir. 2017), forecloses any possibility
of error here. In Petty, we reviewed de novo the constitutionality of a materially
identical reasonable doubt instruction and squarely rejected the precise challenges
Ivory and Thompson now assert on appeal.
For the same reasons articulated in Ivory, we discern no error in the court’s
reasonable doubt instruction and affirm Thompson’s convictions.
E. Challenges to Thompson’s Sentence
Finally, Thompson challenges his sentence in two ways, arguing the court
erred in (1) relying on an extrapolation method to calculate the drug quantity
attributable to him as relevant conduct; and (2) imposing a four-level leadership
-25-
enhancement without sufficient evidentiary support. We first explain the relevant
background information and then consider Thompson’s arguments in turn.
Before sentencing, the probation officer prepared the PSR. To calculate the
quantity of drugs attributable to Thompson, the PSR extrapolated from two
sources: (1) a recorded encounter between Thompson and a confidential informant
in which Thompson said he was purchasing approximately nine ounces of cocaine
every week; and (2) a telephone call in which Thompson purchased approximately
five ounces of powder cocaine from one of his suppliers. Using these amounts,
the PSR attributed seven ounces of powder cocaine (the midpoint between five
and nine) to Thompson and multiplied by forty-eight weeks, the amount of time
Thompson was involved in the conspiracy. The PSR converted that amount to
cocaine base, which yielded a total of 8.477 kilograms and a corresponding base
offense level of 36. The PSR then applied a four-level enhancement for being a
leader or organizer of a criminal activity involving five or more participants to
reach a total offense level of 40, a criminal history category of IV, and a
corresponding advisory guidelines range of 360 months to life in prison.
Thompson objected to both the drug-quantity calculation and the leadership
enhancement.
At sentencing, the court rejected Thompson’s objections, finding the
extrapolation method was reliable and attributing 8.477 kilograms of cocaine base
to Thompson. The court also found the factors in the application note to the
-26-
leadership enhancement guideline supported applying the enhancement. The
court acknowledged that one factor—how the co-conspirators distributed the
proceeds of the conspiracy—was ambiguous, but it stated the other factors clearly
supported a finding that Thompson served in a leader or organizer role.
Accordingly, the court imposed the four-level enhancement, which yielded a
guidelines range of 360 months to life in prison. The court sentenced Thompson
to 360 months in prison.
1. Extrapolation Method for Drug-Quantity Calculation
Thompson first argues the district court erred in relying on the
extrapolation method in the PSR, which attributed 8.477 kilograms of crack
cocaine to Thompson as relevant conduct.
We review for clear error a district court’s determination of the drug
quantity attributable to a defendant, including the scope of jointly undertaken
criminal activity. United States v. Sells, 541 F.3d 1227, 1235 (10th Cir. 2008).
We will reverse a drug-quantity finding “only if the district court’s finding was
without factual support in the record or we are left with the definite and firm
conviction that a mistake has been made.” United States v. Ryan, 236 F.3d 1268,
1273 (10th Cir. 2001).
In conspiracy cases, the Guidelines require a district court to make
particularized findings regarding both jointly undertaken criminal activity and the
reasonably foreseeable acts of others in connection with that criminal activity
-27-
before determining the drug quantity attributable to a defendant. See USSG
§ 1B1.3. Extrapolation can be a permissible method of calculating that quantity.
We have previously recognized that “when the actual drugs . . . are not seized, the
trial court may rely upon an estimate to establish the defendant’s guideline
offense level so long as the information relied upon has some basis of support in
the facts of the particular case and bears sufficient indicia of reliability.” United
States v. Dalton, 409 F.3d 1247, 1251 (10th Cir. 2005) (quotation marks omitted).
But we have cautioned, “the ‘need to estimate drug quantities at times is not a
license to calculate drug quantities by guesswork.’” Id. (quoting United States v.
Richards, 27 F.3d 465, 469 (10th Cir. 1994)). Thus, in considering whether a
drug-quantity estimation is clearly erroneous, we look for other corroborating
evidence to determine whether the estimation has sufficient factual support. See
Dalton, 409 F.3d at 1251.
Thompson makes several challenges to the district court’s drug-quantity
calculation. None has merit. First, Thompson claims the court clearly erred in
crediting expert testimony that interpreted a recorded conversation between
Thompson and a confidential informant. When asked how much cocaine he was
distributing, Thompson responded, “‘bout a nine. I ain’t trying to do too much.”
Aplt. Br. at 37. A Kansas Bureau of Investigation Agent testified that this meant
when Thompson received crack cocaine from his suppliers, he received
approximately nine ounces of it each time. The expert’s interpretation is a
-28-
plausible basis for extrapolating from the nine-ounce amount as part of the drug-
quantity calculation. At sentencing the district court referenced other portions of
the PSR which described numerous instances of Thompson selling various
amounts of cocaine. Viewing the record as a whole, then, the court’s decision to
credit this expert testimony for the nine-ounce quantity was not clearly erroneous.
Thompson next challenges the PSR’s reference to intercepted phone calls in
which Thompson discussed purchasing five ounces of powder cocaine from a co-
defendant, Steven Clark. At sentencing, Thompson objected to the district court’s
consideration of the call, because both sides agreed it was a suppressed call. The
court overruled the objection, finding there was an alternative source of the
information: Clark gave the government the same information through proffer
statements and as part of the factual basis for his guilty plea. Thompson now
argues for the first time that the proffer statement was not a true alternative
source, because the suppressed call started a chain of events that led to Clark’s
proffer statement, which in turn was tainted fruit. But Thompson has waived this
argument by failing to argue for plain error, “surely mark[ing] the end of the road
for an argument for reversal not first presented to the district court.” See
Richison v. Ernest Grp., Inc., 634 F.3d 1123, 1131 (10th Cir. 2011).
Finally, Thompson argues the district court clearly erred by not attributing
200.48 grams to him—an amount that excludes the quantities extrapolated from
the conversation with the confidential informant and the Clark phone call/proffer
-29-
statement. But as the district court recognized at sentencing, “one of the
problems with relevant conduct findings in this context is drug traffickers don't
keep good records. There are not inventory records on when we got this and
when it went out, that sort of thing.” R., Vol. VII at 4307. The court thus
decided to credit the extrapolation in paragraph 119 of the PSR, finding it was
sufficiently supported by other reliable evidence in the record. We agree. If
anything, the figure derived from the extrapolation was likely a conservative
estimate, given the numerous other drug transactions Thompson was involved in.
In sum, finding no clear error in the district court’s drug-quantity findings,
we affirm Thompson’s sentence.
2. Four-Level Leadership Enhancement
Thompson next contends the court erred in imposing the four-level
leadership sentencing enhancement, because there was not sufficient evidence in
the record to support the court’s finding that Thompson was a leader or organizer
of the conspiracy for purposes of the enhancement.
We review challenges to the imposition of guidelines enhancements for
clear error as to findings of fact and de novo as to questions of law. United States
v. Irvin, 682 F.3d 1254, 1276–77 (10th Cir. 2012). In doing so, we give “due
deference to the district court’s application of the guidelines to the facts.” United
States v. Reed, 1 F.3d 1105, 1110 (10th Cir. 1993) (quoting 18 U.S.C. § 3742(e)).
-30-
Section 3B1.1(a) of the Guidelines provides for a four-level increase in a
defendant’s total offense level “[i]f the defendant was an organizer or leader of a
criminal activity that involved five or more participants or was otherwise
extensive.” The application notes explain,
Factors the court should consider include the exercise of
decision making authority, the nature of participation in
the commission of the offense, the recruitment of
accomplices, the claimed right to a larger share of the
fruits of the crime, the degree of participation in planning
or organizing the offense, the nature and scope of the
illegal activity, and the degree of control and authority
exercised over others.
USSG § 3B1.1 cmt. n.4.
We have previously stated, “[i]n considering these factors, the sentencing
court should remain conscious of the fact that the gravamen of this enhancement
is control, organization, and responsibility for the actions of other individuals,
because § 3B1.1(a) ‘is an enhancement for organizers or leaders, not for
important or essential figures.’” United States v. Torres, 53 F.3d 1129, 1142
(10th Cir. 1995) (quoting United States v. Roberts, 14 F.3d 502, 523 (10th Cir.
1993)). And we have clarified, “[t]his is not a particularly onerous showing: ‘The
Guideline requires only a conclusion that the defendant supervised at least one
such participant; it does not require the court to identify specific examples.’”
United States v. Gallant, 537 F.3d 1202, 1241 (10th Cir. 2008) (quoting United
States v. Aptt, 354 F.3d 1269, 1287 (10th Cir. 2004)).
-31-
Here, Thompson argues the district court clearly erred because the record is
completely devoid of evidence to support the application of the enhancement.
But Thompson mischaracterizes the record, which is replete with instances of
Thompson recruiting and directing other members of the conspiracy. For
example, the PSR recounts how Thompson recruited co-conspirator Charles
Foster as a customer and then began using him to facilitate drug transactions with
third persons. And the PSR provides specific examples of Foster and another co-
conspirator, Patricia Foy, completing drug transactions on Thompson’s behalf.
Both Foster and Foy acknowledged serving as middlemen for Thompson in
Mirandized, videotaped statements made upon their arrests. Likewise, the PSR
details how co-conspirator Barbara Shaw served as a distributor for Thompson.
Intercepted phone calls and text messages showed Shaw had repeatedly contacted
Thompson requesting crack cocaine for herself and others.
On this record, we cannot agree with Thompson that the district court
clearly erred in applying the four-level leadership enhancement. Accordingly, we
affirm Thompson’s sentence.
III. Conclusion
For the foregoing reasons, we AFFIRM Thompson’s convictions and
sentence.
-32-