Skip to main content
Photo of a Law Library

Enhancing Law Enforcement or Compromising Privacy? The Problem With South Carolina’s Use of Automatic License Plate Readers

PDF

William K. Rees[1]*

Introduction

The Fourth Amendment emerged as a direct response to the loathed “‘general warrants’ and ‘writs of assistance’” that plagued policing in the colonial era.[2] These instruments granted British officers unchecked power to invade homes, rummaging for evidence of criminal activity.[3] When the Fourth Amendment was written and ratified, the primary investigative tool envisioned by the framers was the “constable’s eyes” aided by a simple lantern.[4] In contrast, modern searches leverage sophisticated surveillance techniques and technologies that were inconceivable in 1791.[5] One such advanced technology widely used today is Automatic License Plate Readers (ALPRs).[6]

Since 1998,[7] law enforcement agencies nationwide have integrated ALPRs into their operational arsenals,[8] resulting in the extensive deployment of tens of thousands of readers across the country.[9] ALPRs come in two primary configurations: stationary, like those affixed to traffic lights, telephone poles, or highway overpasses; and mobile, such as those mounted on law enforcement vehicles.[10] ALPR systems work by employing a combination of cameras and optical character recognition software to systemically scan the license plates of all passing vehicles—recording details such as the scan’s date and time, the vehicle’s GPS coordinates, the vehicle’s make and model, the speed at which a vehicle is traveling—and take photographs of the vehicle.[11] Some of the photographs even capture the occupants of the vehicle.[12] These readers are able to scan thousands of plates per minute.[13] To put the capabilities of ALPRs in perspective, one vendor proudly asserts that its ALPRs can capture readable plates and detailed vehicle images in “bright daylight and pitchblack darkness.”[14] Additionally, the vendor maintains that its ALPRs can reliably record license plates on vehicles traveling at speeds of up to 150 miles per hour.[15]

The data law enforcement agencies collect using ALPRs is subsequently uploaded to databases; ensuring seamless accessibility for law enforcement agencies.[16] The retention period of ALPR data fluctuates across agencies, ranging from mere days to several years, with some agencies opting for indefinite retention.[17] The agencies’ data is also automatically cross-referenced with a “hot list,” which is a catalogued list of license plates that law enforcement is actively seeking.[18] If an ALPR detects a license plate appearing on the hot list, the system immediately notifies the police.[19] Typically, these hot lists contain the license plates of stolen vehicles and vehicles associated with AMBER Alerts for abducted children.[20] However, some hot lists may include vehicles linked to low-level misdemeanors and traffic offenses, such as unpaid parking tickets.[21]

Moreover, law enforcement’s utilization of ALPR data often extends beyond the scans acquired through their own devices.[22] Many departments have agreements that provide them with access to private databases housing scans from private ALPRs, as well as those collected by other local and federal law enforcement agencies.[23] For example, Vigilant Solutions, a prominent ALPR vendor owned by Motorola Solutions, offers access to its database containing over five billion license plate scans gathered nationwide.[24] Furthermore, access to ALPR databases is not limited to law enforcement agencies.[25] Businesses frequently employ ALPR location data during the evaluation of loan applications to corroborate that applicant’s stated residential address or to identify commercial vehicle usage while investigating insurance claims.[26] Additionally, private neighborhood associations may acquire ALPR systems for neighborhood security purposes.[27] These private entities then have the discretion to decide whether to share any collected data with law enforcement.[28]

The value ALPRs provide to law enforcement is undeniable.[29] These systems offer a robust tool for enhancing public safety and preventing crime.[30] Law enforcement agencies depend on ALPRs for a myriad of tasks, including verifying a vehicle’s presence at a crime scene, monitoring travel patterns, and identifying potentially associated vehicles.[31] This technology has been instrumental in solving numerous crimes, ranging from burglaries and the recovery of stolen vehicles to kidnappings and murders.[32] Government agencies can even find valuable applications for ALPRs outside of law enforcement, such as aiding in traffic management and environmental pollution control.[33] However, the advantages offered by ALPRs come at a price—namely, the erosion of individual privacy.[34]

This Note surveys the relevant Fourth Amendment jurisprudence, offering an analysis of the privacy concerns arising from the unregulated use of ALPRs. In emphasizing the particular susceptibility of South Carolina’s ALPR practices to Fourth Amendment challenges, this Note aims to establish guiding principles for courts and legislators to follow in creating laws to regulate ALPR use. Recognizing that the enactment of law is always an exercise in compromise, these principles are intended to strike a balance between the preservation of individual privacy and the unimpeded functionality of law enforcement, that is consistent with the core tenets of the Fourth Amendment. The Note’s overarching objective is to provide a comprehensive framework in which to approach the regulation of ALPR technology. Accordingly, this Note explores a range of approaches for regulating the technology and addresses potential drawbacks associated with each approach.

Background

The Fourth Amendment: A Historical Analysis

The Fourth Amendment of the United States Constitution protects the people against “unreasonable searches and seizures.”[35] It endeavors to achieve this protection by “secur[ing] the ‘privacies of life’ against ‘arbitrary power’” and “plac[ing] obstacles in the way of a too permeating police surveillance.”[36] Thus, the Fourth Amendment assumes a dual role within the American legal framework, functioning as the chief source of both privacy protection and regulation of law enforcement.[37] These two roles—protecting privacy and regulating the police—require the Fourth Amendment to strike a delicate balance between adequately preserving individual privacy and empowering the police to ensure public safety.[38] In the twenty-first century, as advancements in information technology increasingly jeopardize individuals’ privacy, the Fourth Amendment’s balancing of these competing interests may be more critical than ever before. As noted by Justice Douglas, “[e]lectronic surveillance is the greatest leveler of human privacy ever known.”[39]

Although the Fourth Amendment commences with “[t]he right of the people,” the Court’s early interpretation limited the amendment’s protection to specific locations, such as one’s home or its immediate surroundings, referred to as “curtilage.”[40] Olmstead v. United States illustrates the Court’s property-focused interpretation of the Fourth Amendment.[41] In Olmstead, federal officers conducted wiretaps on the telephone lines of four residences and one office without obtaining a search warrant, resulting in the interception of incriminating messages that led to the defendants’ arrests.[42] Importantly, the wiretapping had been effectuated without a physical trespass by the government.[43] According to the Court’s rationale, the absence of a physical trespass meant that the actions did not constitute a Fourth Amendment search.[44] The Court’s reasoning was rooted in the belief that the Amendment itself implies a search of “material things”—namely, “the person, the house, his papers, or his effects.”[45] Thus, the officers’ actions did not violate the Fourth Amendment because there was no physical intrusion into the defendants’ property, only “voluntary conversations secretly overheard.”[46] As a result, subsequent case law centered around constitutionally protected areas rather than individual rights; thereby, maintaining the Olmstead property rights approach as the Fourth Amendment standard for thirty-nine years.[47]

In Katz v. United States, the Court made a significant departure from the property rights approach established in Olmstead.[48] Specifically, the Court abandoned the previously held belief that Fourth Amendment protections hinged solely on physical trespass, opting instead for an inquiry centered around an individual’s reasonable expectation of privacy.[49] In Katz, FBI agents affixed an electronic listening device to the exterior of a telephone booth.[50] The government, aligned with previous precedent, asserted that no search had taken place since there was no physical intrusion into a constitutionally protected area.[51] Nevertheless, the Court rebuffed this contention, emphatically stating that the Fourth Amendment “protects people, not places.”[52] According to the Court, what a person “seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.”[53] Thus, the Court ruled that a search had occurred because the defendant entered the telephone booth with the intention of keeping out “uninvited ears.”[54] The key consideration after Katz became whether the defendant’s reasonable expectation of privacy had been violated.[55] Interestingly, the relevant inquiry was articulated in Justice Harlan’s concurring opinion, which delineated a two-pronged test for evaluating the breach of an individual’s reasonable expectation of privacy.[56] According to Justice Harlan, one must have “exhibited an actual (subjective) expectation of privacy,” and that expectation must “be one that society is prepared to recognize as reasonable.”[57]

Katz, while seemingly expanding the scope of Fourth Amendment protection by eliminating the need for a physical intrusion, simultaneously introduced the “knowing exposure” principle—noting that “[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.”[58] Using this principle, the Court, in subsequent cases, validated various police surveillance methods and technologies.[59] For example, in United States v. Knotts, the Court pronounced that “[a] person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.”[60] The case revolved around the police’s use of a beeper placed within a container of chloroform to track it to the defendant’s secluded cabin, wherein they discovered a drug laboratory for amphetamine production.[61] The Court’s rationale rested on the notion that the defendant’s location was “voluntarily conveyed to anyone who wanted to look.”[62] Moreover, the Court noted that “[n]othing in the Fourth Amendment prohibited the police from augmenting the sensory faculties bestowed upon them at birth with such enhancement as science and technology afforded them . . . .”[63] Hence, the Court reasoned that beepers merely facilitated the observation of what was already in plain sight.[64] While the Court declined to “equate[] police efficiency with unconstitutionality,”[65] it left open the question of more long-term surveillance, cautioning that if such widespread practices materialized, the suitability of different constitutional principles might need to be examined.[66]

Although Katz ostensibly rejected the property rights approach to the Fourth Amendment,[67] this line of reasoning experienced a revival in United States v. Jones.[68] In Jones, law enforcement monitored the defendant’s movements for twenty-eight days through a GPS device discreetly affixed to his vehicle.[69] The government argued that this surveillance did not constitute a search because the defendant had no reasonable expectation of privacy regarding the locations of his vehicle on public roads, which were voluntarily conveyed to all.[70] However, the Court arrived at a different conclusion, asserting that the act of attaching such a device to someone’s vehicle and employing it to track their public movements amounted to a search.[71] The basis of this determination was that the government had physically encroached upon private property with the intention of gathering information.[72] In reaching this conclusion, the Court emphasized the importance of safeguarding a level of privacy from government intrusion that aligns with the principles present at the time of the Fourth Amendment’s inception.[73] Moreover, the Court noted that Katz established that “‘property rights are not the sole measure of Fourth Amendment violations,’ but did not ‘snuf[f] out the previously recognized protection for property.’”[74] Accordingly, the Court reasoned that “the Katz reasonable-expectation-of-privacy test has been added to, not substituted for, the common law trespassory test.”[75] Thus, the Court abstained from addressing the government’s knowing exposure contentions, finding that the defendant’s Fourth Amendment rights did not fall within the Katz formulation.[76]

While Jones was ultimately decided on trespass grounds,[77] two concurring opinions revealed a significant division in the Court’s reasoning. In her concurring opinion, Justice Sotomayor agreed with the majority that reaffirmation of the Olmstead property rights approach to the Fourth Amendment was sufficient to decide Jones.[78] Nevertheless, she wrote separately to articulate her concerns regarding the broader societal implications of modern police surveillance practices.[79] According to Justice Sotomayor, GPS monitoring violates the Fourth Amendment because it “generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.”[80] Moreover, the records can be stored and effectively “mined” for years, and the inexpensiveness of GPS monitoring compared to conventional surveillance techniques “evades the ordinary checks that constrain abusive law enforcement practices: ‘limited police resources and community hostility.’”[81] Justice Sotomayor’s overarching concern was that extensive surveillance fosters an environment akin to a police state, as “[a]wareness that the Government may be watching chills associational and expressive freedoms” and “may ‘alter the relationship between citizen and government in a way that is inimical to democratic society.’”[82] Thus, Justice Sotomayor was skeptical that the average individual would reasonably expect their movements to be recorded and aggregated in manner that enables the government to ascertain such sensitive and personal information.[83] Even so, Justice Sotomayor was content to reserve such a judgment for a case in which the facts could not substantiate a physical trespass.

In contrast, Justice Alito, joined by three other Justices, assumed a more proactive stance, accusing the Court of deciding the case “based on 18th-century tort law.”[84] He denounced the majority’s trespass approach as “unwise” and “artificial,” advocating instead for the need to analyze the use of the GPS tracking device under the Katz reasonable expectation of privacy test.[85] In support of his position, Justice Alito noted that individuals in the “pre-computer age” were protected by practical limitations on police surveillance:

Traditional surveillance for any extended period of time was difficult and costly and therefore rarely undertaken. The surveillance at issue in this case—constant monitoring of the location of a vehicle for four weeks—would have required a large team of agents, multiple vehicles, and perhaps aerial assistance. Only an investigation of unusual importance could have justified such an expenditure of law enforcement resources. Devices like the one used in the present case, however, make long-term monitoring relatively easy and cheap.[86]

Accordingly, he concluded that protracted GPS monitoring violates the Fourth Amendment, as individuals did not anticipate that law enforcement would surreptitiously track and record their every movement over an extended period of time.[87] Justice Alito reached this conclusion despite the fact that the Court earlier determined in Knotts that a person traveling in a car on public thoroughfares has no reasonable expectation of privacy in their movements from one place to another.[88] Even so, he contended that relatively brief monitoring of an individual’s movements aligns with the privacy expectations that society has acknowledged as reasonable.[89] Despite distinguishing between short- and long-term surveillance,[90] Justice Alito refrained from pinpointing the precise juncture at which tracking a vehicle on public streets constitutes a search.[91] He did, however, state that “the line was surely crossed before the 4-week mark.”[92]

Although the decision to reverse in Jones was unanimous, the variance in the Justices’ reasoning creates uncertainty regarding which legal framework law enforcement should follow when using GPS to track a suspect’s public movements. On the one hand, the majority opinion suggests that the use of GPS tracking without a physical intrusion on the suspect’s property is permissible under the Fourth Amendment. On the other hand, the concurrences indicate that GPS tracking may violate the Fourth Amendment even in the absence of a physical intrusion, as five Justices agreed that “longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.”[93] Fortunately, Carpenter v. United States helped clarify this issue by solidifying what a majority of the Jones Court already recognized— “that individuals have a reasonable expectation of privacy in the whole of their physical movements.”[94]

In Carpenter, law enforcement obtained access to 127 days’ worth of cell-site location information (CSLI) through a court order.[95] Ultimately, the Court determined that the acquisition of this information constituted a search within the meaning of the Fourth Amendment.[96] This conclusion arose from a re-examination of the fundamental tenets of the Fourth Amendment, coupled with a careful review of past precedents in the context of evolving technology.[97] Through this historical analysis, the Court found that this sort of digital data did “not fit neatly under existing precedents”[98] because it was “far more intrusive than the precedents might have anticipated.”[99] Notably, the Court declined to apply the principle set forth in Knotts, which posited that individuals have no reasonable expectation of privacy in their public movements.[100] The Court pointed out that Knotts “was careful to distinguish between the rudimentary tracking facilitated by the beeper and more sweeping modes of surveillance.”[101] In light of this distinction, the Court declared that individuals do not “surrender all Fourth Amendment protection by venturing into the public sphere.”[102] Instead, the Court, citing Justice Alito’s and Justice Sotomayor’s concurring opinions in Jones, reasoned that “[a] majority of this Court has already recognized that individuals have a reasonable expectation of privacy in the whole of their physical movements.”[103] That the movements occurred in public did not negate the entitlement to protection against overly pervasive police surveillance.[104]

The Court also rejected an argument based on the third-party doctrine.[105] The third-party doctrine, which stems from the Katz “knowing exposure” principle, holds that individuals who voluntarily share information with third parties relinquish any reasonable expectation of privacy in that information.[106] The government’s primary contention was that the CSLI was fair game because they were business records created and maintained by the wireless carriers.[107] However, according to the Court, the collection of CSLI did not align with the voluntary exposure rationale underpinning the third-party doctrine.[108] As the Court observed, “cell phones and the services they provide are ‘such a pervasive and insistent part of daily life’ that carrying one is indispensable to participation.”[109] Furthermore, the Court noted that the cell-site location information is collected “without any affirmative act on the part of the user beyond powering up.”[110] Thus, the Court reasoned that the user does not “voluntarily ‘assume[ ] the risk’ of turning over a comprehensive dossier of his physical movements,” as “[a]part from disconnecting the phone from the network, there is no way to avoid leaving behind a trail of location data.”[111] Accordingly, the Court declined to extend the third-party doctrine to the collection of cell-site location information.[112]

The Court found several key aspects of CSLI particularly troubling, echoing the concerns expressed by Justice Alito and Justice Sotomayor in their Jones concurrences. For one, the Court highlighted the absence of practical constraints, such as limited funding, that had previously curbed the government’s access to such a “deep repository of historical location information.”[113] As the Court observed, CSLI offered a comprehensive record of individuals’ movements, opening “an intimate window into a person’s life.”[114] In the Court’s assessment, this level of detail revealed not only specific movements but also private aspects of a person’s existence, including their “‘familial, political, professional, religious, and sexual associations.’”[115] The Court also expressed apprehension about the retrospective nature of the records, which enabled the government to “travel back in time to retrace a person’s whereabouts” and granted access “to a category of information otherwise unknowable.”[116] Furthermore, the collection of CSLI was not confined only to those suspected of criminal wrongdoing.[117] The Court distinguished the case from Jones where the police needed to identify the target before tracking them.[118] With cell-site location information, the government could chronicle the past movements of anyone, irrespective of suspicion of criminal activity.[119] As the Court put it, “[w]hoever the suspect turns out to be, he has effectively been tailed every moment of every day for five years.”[120]

Despite the Court’s attempt in Carpenter to bring the law in conformity “with the seismic shifts in digital technology,”[121] it maintained that its ruling was “a narrow one.”[122] Specifically, the Court aimed to restrict its judgment solely to cell-site location information, without “call[ing] into question conventional surveillance techniques and tools, such as security cameras.”[123] The Court’s purpose in cabining its opinion was to avoid “embarrass[ing] the future.”[124] However, by presuming that security cameras are exempt from the concerns it addressed, the Court may have actually invited future complications rather than prevented them. After all, automatic license plate readers are simply security cameras adapted to a different use, blurring the lines between what the Court considers conventional and contemporary surveillance tools.

How Courts Have Applied Carpenter

Federal Courts

Although Carpenter seemingly exempted security cameras from privacy concerns, the Fourth Circuit challenged this presumption in Leaders of Beautiful Struggle v. Baltimore Police Department.[125] That case revolved around the Baltimore Police Department’s Aerial Investigation Research (AIR) program, which utilized planes equipped with cameras to surveil Baltimore City.[126] The significance of Carpenter, as the Fourth Circuit saw it, was that it “solidified the line between short-term tracking of public movements . . . and prolonged tracking that can reveal intimate details through habits and patterns.”[127] Contrary to the district court’s view, the Fourth Circuit found that the AIR program fell into the latter category of surveillance, infringing upon individuals’ reasonable expectation of privacy in the whole of their movements.[128] In reaching this conclusion, the court engaged in a direct comparison of the AIR program data to the cell-site location information in Carpenter, unveiling numerous similarities.[129] The court noted that the AIR program’s forty-five-day retention policy created a detailed record of individuals’ movements over the preceding month and a half.[130] Thus, the AIR program data, like cell-site location information, allowed retrospective location tracking of everyone, not just those suspected of criminal wrongdoing.[131]

Interestingly, the district court had refused to analogize the Baltimore Police Department’s use of the AIR program to cell-site location information.[132] The basis of the district court’s opinion was that the AIR program had restricted tracking capabilities because data collection was confined to daylight hours; the photographic resolution was limited to one pixel per person or vehicle; and the program was inoperable during inclement weather.[133] Thus, the district court reasoned that the AIR program “could not expose the ‘privacies of life,’” as the inherent gaps in the data hindered law enforcement’s ability to track suspects across multiple days.[134] However, the Fourth Circuit considered the data gaps insignificant, as the information was abundant enough to make deductions about private aspects of individuals’ lives—“the epitome of information expected to be beyond the warrantless reach of the government.”[135] Moreover, the court observed that the government’s ability to deduce intimate information about individuals’ lives was heightened by the government’s capacity to cross-reference the AIR program data with data from other surveillance systems.[136] Notably, the court explicitly mentioned license plate readers as one of the data systems the police could use in conjunction with the AIR program data,[137] suggesting its view that license plate readers constituted a permissible form of surveillance when used alone. Even so, the Fourth Circuit’s ruling in Leaders of a Beautiful Struggle illuminates a critical point: traditional surveillance tools, when repurposed for innovative applications, may encroach upon individuals’ reasonable expectations of privacy.

State Courts

While the Fourth Circuit has yet to address the constitutional implications of ALPRs, state courts have been more receptive to these concerns.[138] For example, in Commonwealth v. McCarthy, the Supreme Judicial Court of Massachusetts found that widespread ALPR use could implicate constitutional protections against unreasonable searches.[139] In McCarthy, law enforcement utilized four ALPR cameras positioned at two fixed locations on opposite ends of two bridges to surveil the defendant’s movements over a three-month period.[140] The defendant contested the warrantless search of the ALPR data;[141] however, the court held that the limited use of ALPRs in this case did not constitute a search under the Fourth Amendment.[142] Consequently, the court affirmed the denial of the defendant’s motion to suppress.[143] While the court refrained from specifying the threshold at which ALPR usage invokes constitutional protections,[144] it made clear that it would reach a different conclusion in cases involving more pervasive ALPR systems.[145] Specifically, the court reasoned that “[w]ith enough cameras in enough locations, the historic location data from an ALPR system . . . would invade a reasonable expectation of privacy and would constitute a search for constitutional purposes.”[146] This dicta in McCarthy indicates that ALPR use may merit greater constitutional scrutiny in future cases.[147]

Relationship Between the Federal and South Carolina Constitutions

The prospect of ALPRs facing greater constitutional scrutiny seems more likely in states like South Carolina, which provide heightened privacy protections beyond those mandated by the Fourth Amendment.[148] The Fourth Amendment’s prohibition against “unreasonable searches and seizures” safeguards the rights of every citizen in all criminal proceedings.[149] The South Carolina constitution operates in tandem with the Fourth Amendment, providing supplementary safeguards against unauthorized searches and seizures.[150] State legislatures have the authority to grant broader rights under state constitutional provisions than those guaranteed by the federal Constitution.[151] This dynamic is commonly characterized “as a recognition that the federal Constitution sets the floor for individual rights while the state constitution establishes the ceiling.”[152] Thus, South Carolina state courts can interpret state law to provide citizens with an additional layer of protection against unlawful searches and seizures.[153]

South Carolina’s constitution, in addition to replicating the language of the Fourth Amendment, contains an explicit protection of the right of privacy:

The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures and unreasonable invasions of privacy shall not be violated, and no warrants shall issue but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, the person or thing to be seized, and the information to be obtained.[154]

According to the Supreme Court of South Carolina, by expressly prohibiting “‘unreasonable invasions of privacy,’” the legislature has “indicated that searches and seizures that do not offend the federal constitution may still offend the South Carolina Constitution.”[155] Thus, the court reasoned that South Carolina’s constitution “favors an interpretation offering a higher level of privacy protection than the Fourth Amendment.”[156] Accordingly, law enforcement surveillance technologies that might escape the classification of a search under the Fourth Amendment may nevertheless constitute a search under the South Carolina constitution.

South Carolina ALPRs

The South Carolina Law Enforcement Division (SLED) is one of the many law enforcement agencies across the country utilizing a comprehensive statewide network of ALPRs to record and store millions of license plate images annually.[157] These images, termed “reads” by SLED, encompass digital snapshots of license plates and vehicles, complete with vital metadata including date, time, and geographical coordinates.[158] This wealth of information is meticulously organized within SLED’s expansive database, aptly named the “Back Office,” which acts as a centralized hub, pooling ALPR data from forty-eight law enforcement agencies throughout South Carolina.[159] Despite the data contributed to the Back Office being retained for a period of only three years, SLED amassed an astonishing collection of over four hundred million license plate reads by 2022.[160] This trove of data is far from static and it continues to expand at a rapid pace.[161] In 2021 alone, SLED processed a staggering 150 million license plate reads—up from 135 million in 2020 and 26 million in 2014.[162] The database’s rapid growth shows no signs of slowing down; propelled by the continuous integration of new ALPR cameras by various municipalities, all seamlessly feeding their data into this colossal repository.[163]

This extensive archive of information is not confined to internal use; it is disseminated to ninety-nine municipal, state, and federal agencies, ensuring broad accessibility.[164] To maintain some semblance of control, SLED’s ALPR policy imposes certain criteria on users of the database: only officers possessing National Crime Information Center (NCIC) inquiry certification and authorized credentials, in the form of usernames and passwords provided by SLED, are permitted to access the Back Office.[165] However, despite these ostensibly demanding measures, the active user base currently stands at 2,077,[166] raising questions about the stringency of this standard.

The Back Office is a searchable database, allowing individuals or agencies with authorized access to conduct searches based on a license plate, a partial license plate, or an address.[167] A Back Office search based on a license plate will generate a report of every image of that plate in the database, along with the date, time, and location of each image that was taken.[168] A search based on an address will generate a report of all license plates captured at or near a location of the user’s choosing.[169] For each search, the user has the flexibility to tailor their results.[170] They can opt for a comprehensive overview spanning the entire three-year dataset, or alternatively, narrow their focus by specifying a precise time frame.[171]

There is no evidentiary threshold an officer must satisfy before conducting a search of the Back Office.[172] The only restriction SLED imposes on law enforcement’s use of the Back Office is that it be for a “legitimate law enforcement purpose” or “public safety-related mission.”[173] SLED’s ALPR policy does not define these terms, inviting subjective and potentially discriminatory interpretations by users searching the database.[174] Adding to the ambiguity, the legislature has failed to provide any specific guidance on SLED’s utilization of the ALPR system.[175] The legislature has given SLED the exclusive authority to operate and maintain a statewide criminal justice database,[176] “with such functions as the Division may assign to it.”[177] However, unlike other criminal justice databases SLED maintains, such as the DNA database,[178] there is no specific statute governing SLED’s use of an ALPR database.[179] As a result, SLED is entrusted with self-regulating its ALPR use.[180]

SLED’s ALPR program has already come under fire for its lack of statutory authority.[181] The South Carolina Public Interest Foundation (SCPIF), in collaboration with a Greenville resident, recently filed a lawsuit against SLED concerning its statewide ALPR database.[182] The basis of the lawsuit is that SLED exceeded its statutory authority by unilaterally enacting the ALPR program without any guidance or permission from the legislature.[183] Interestingly, SCPIF declined to challenge the legality of the program under the Fourth Amendment, despite acknowledging that that SLED’s ALPR database implicates the privacy rights of millions of South Carolina residents.[184] Thus, the question remains: does SLED’s use of an ALPR database constitute a search under the Fourth Amendment?

Analysis Under Carpenter

ALPR systems epitomize the concern Justice Alito highlighted in his Jones concurrence—the ability to bypass the practical constraints on law enforcement that formerly safeguarded individuals during the “pre-computer age.”[185] Prior to the advent of ALPRs, license plate numbers had to be manually recorded, a process that inherently restricted the scope and duration of police surveillance efforts.[186] To track a vehicle for any extended period of time “would have required a large team of agents, multiple vehicles, and perhaps aerial assistance.”[187] In contrast, ALPR technology can scan and record license plate numbers at an unprecedented speed and volume without any affirmative effort from police, significantly amplifying law enforcement’s data collection capabilities.[188] ALPRs are not only efficient but are also cost effective.[189] Unlike many advanced surveillance technologies, these systems can achieve this heightened surveillance without burdening law enforcement agencies with exorbitant costs.[190] The economical nature of ALPRs facilitates long-term monitoring in a diverse range of investigations, not just those of “unusual importance.”[191]

While ALPR technology circumvents the practical constraints that historically protected individual privacy, the crux of the issue is not inherent to the technology itself, but rather stems from the data aggregation it enables. With ALPR information from forty-eight law enforcement agencies across South Carolina feeding into the Back Office,[192] SLED’s ALPR database, like the database in Carpenter, is “detailed” and “encyclopedic,”[193] “provid[ing] an all-encompassing record of the [driver’s] whereabouts.”[194] Access to such a “deep repository of historical location information”[195] reveals far more than the public movements of individuals contemplated by the Court in Knotts. It opens an “intimate window into a person’s life,”[196] empowering law enforcement to pinpoint sensitive places individuals frequent, including their residences, workplaces, healthcare facilities, and places of worship.[197] The stored data even enables law enforcement to make accurate predictions about individuals’ future whereabouts.[198]

Moreover, SLED’s three-year retention policy[199] gives it the ability to enter a virtual time machine and view an individual’s past movements. Before ALPRs, SLED’s “attempts to reconstruct a person’s movements were limited by a dearth of records and the frailties of recollection.”[200] However, with the retrospective nature of the Back Office data, SLED can now do what concerned the Court, “travel back in time to retrace a person’s whereabouts,” giving it access to “a category of information otherwise unknowable.”[201] Further, SLED’s ALPR database indiscriminately preserves records of all drivers, regardless of any suspicion of criminal activity. In fact, less than one percent of vehicles scanned nationwide are linked to any criminal activity or wrongdoing.[202] Thus, South Carolina law enforcement “need not even know in advance whether they want to follow a particular individual, or when.”[203] Rather, “[w]hoever the suspect turns out to be, he has effectively been tailed every moment of every day for [three] years . . . .”[204]

South Carolina citizens, like all American citizens, have a reasonable expectation of privacy in the whole of their physical movements.[205] The determination of whether South Carolina law enforcement invades this expectation in the way that concerned the Court in Carpenter, hinges on the scope of the Back Office search. Justice Alito noted that relatively brief monitoring of an individual’s whereabouts, comparable to what law enforcement could achieve without the assistance of modern surveillance technology, does not infringe upon reasonable expectations of privacy.[206] However, as a majority of Justices in Jones agreed, prolonged surveillance of public movements by SLED unveils intimate aspects of South Carolina citizens’ lives, thereby constituting a search under the Fourth Amendment.[207] Notwithstanding Justice Alito’s observation that “the line was surely crossed before the 4-week mark,”[208] the distinction between short-term and long-term surveillance remains unclear. The absence of a clearly defined line deprives South Carolina law enforcement of the necessary guidance for the lawful utilization of SLED’s ALPR database and places the privacy of South Carolina citizens at a perpetual risk of intrusion.

Proposed Solution

Judicial

To safeguard the rights of South Carolina citizens, a court tasked with adjudicating a challenge to SLED’s ALPR database ought to strive for a precise delineation between short- and long-term tracking of an individual’s movements. Recognizing the latter as a search within the meaning of the Fourth Amendment, the court should mandate law enforcement agencies to secure a warrant for such surveillance, while exempting short-term tracking from this requirement. Thus, by definitively delineating the threshold between short- and long-term tracking, the court would effectively define the parameters of law enforcement’s warrantless utilization of the ALPR database. An informed understanding of the Court’s reasoning in Carpenter, coupled with the perspectives articulated by Justices Alito and Sotomayor in their Jones concurrences, suggests that a warrantless search of the Back Office should be confined to the data associated with an individual trip.

This proposal is rooted in an understanding of the data law enforcement could feasibly acquire without the data aggregation made possible by modern surveillance technologies. For example, if an officer suspects an individual is involved in some form of criminal wrongdoing, it would be reasonable for the officer to tail the suspect in an attempt to ascertain information that could implicate the suspect in the alleged crime. According to Justice Alito, this type of surveillance “accords with expectations of privacy that our society has recognized as reasonable.”[209] However, absent extraordinary circumstances justifying a substantial expenditure of law enforcement resources, no individual reasonably anticipates continuous monitoring spanning multiple days, let alone years. Indeed, as Justice Alito observed, such extensive monitoring is virtually impossible without contemporary surveillance technology.[210] By limiting the warrantless utilization of the Back Office to data obtained from individual trips, a South Carolina trial court would align South Carolina law enforcement’s tracking capabilities with South Carolina citizens’ reasonable expectations of privacy. That is, a warrantless search of the Back Office would not unveil the entirety of an individual’s physical movements; instead, it would only disclose an individual’s observable whereabouts at a specific moment in time.

Limiting warrantless use of the Back Office in this way would address many of the concerns expressed by the Court in Carpenter. For one, law enforcement’s tracking capabilities under such a restriction would be akin to those in the “pre-computer age.”[211] As a result, the absence of practical constraints on law enforcement’s surveillance, such as limited funding, would be rendered inconsequential, as the restriction would curtail law enforcement’s access to such a “deep repository of historical location information.”[212] Secondly, the insights law enforcement gleans from a warrantless search of the Back Office would be confined to a single trip viewed in isolation, thereby preventing law enforcement from making deductions that intrude on private facets of South Carolina citizens’ lives. Furthermore, a one trip restriction would hinder law enforcement’s ability to “travel back in time to retrace a person’s whereabouts,” as warrantless access to data would be limited to an individual trip, irrespective of its temporal proximity to the search.[213]

Moreover, a one trip restriction is particularly well-suited for South Carolina, as it aligns with the Fourth Circuit’s understanding of Carpenter.[214] In Leaders of Beautiful Struggle, the Fourth Circuit found that the intrusive tracking capabilities of Baltimore’s Air program invaded reasonable expectations of privacy because its data collection was “enough to yield ‘a wealth of detail,’ greater than the sum of individual trips.”[215] Further, the court noted that the program “enable[d] deductions about ‘what a person does repeatedly, what he does not do, and what he does ensemble,’ which ‘reveal[s] more about a person than does any individual trip viewed in isolation.’”[216] This reasoning sheds light on the Fourth Circuit’s perspective on the distinction between short- and long-term tracking, suggesting that accessing data beyond that derived from an individual trip constitutes long-term tracking. The proposed restriction gains even greater resonance when the Fourth Circuit’s rationale is considered in conjunction with the heightened Fourth Amendment protection afforded to South Carolina citizens.[217]

While the proposed restriction effectively addresses many concerns raised by the Court in Carpenter, a notable shortcoming arises—it does not adequately tackle the indiscriminate nature of SLED’s ALPR data.[218] Accordingly, the adjudicating court should also seek to establish an evidentiary threshold for the warrantless use of the Back Office. Without such a threshold, the proposed restriction may inadvertently permit the misuse of the Back Office by allowing law enforcement access to anyone’s location data, provided that it does not exceed data derived from an individual trip.

Fortunately, the court need not embark on a novel endeavor to institute an evidentiary threshold for warrantless use of the Back Office, as Fourth Amendment law already offers a well-suited standard—reasonable suspicion.[219] Under this standard, an officer seeking to justify a warrantless search “must be able to point to specific and articulable facts which, taken together with rational inferences from those facts, reasonably warrant the intrusion.”[220] Notably less demanding than the probable cause standard required for warrants, the reasonable suspicion standard allows a search “with information that is different in quantity or content” and “can arise from information that is less reliable” than that necessary to demonstrate probable cause.[221] Consequently, reasonable suspicion grants officers the a more constrained authority to conduct a search than probable cause.[222] As such, the reasonable suspicion standard aligns well with the context of warrantless Back Office use, as the modest requirements of this standard proportionately match the limited data associated with an individual trip.

In sum, the solution proposed by this achieves the overarching objective of the Fourth Amendment—preserving individual privacy without unduly hampering law enforcement. Under the proposed solution, SLED is empowered to ensure public safety by retaining the enhanced surveillance capabilities offered by its ALPR database, without a significant drain on resources. Simultaneously, the proposed restriction ensures that SLED’s utilization of the database does not infringe upon reasonable expectations of privacy. However, while courts wield considerable authority in devising judicial solutions, their power is constrained by an inherent limitation—they can only rule on issues that are presented to them.[223] Consequently, the proposed restriction can only be implemented by a court if SLED’s ALPR database is challenged on Fourth Amendment grounds. Acknowledging this infirmity, the Justice Alito noted that “[i]n circumstances involving dramatic technological change, the best solution to privacy concerns may be legislative.”[224]

Legislative

The legislature possesses certain institutional advantages that make it better suited to address the privacy issues raised by new technologies.[225] Namely, legislatures have the ability to act more swiftly than courts due to their broader scope of action, unconstrained by the specific issues brought before them.[226] Indeed, as Justice Alito observed in his Jones concurrence, “[a] legislative body is well situated to gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way.”[227]

A number of states have heeded Justice Alito’s counsel, as at least sixteen state legislatures have enacted statutes that expressly regulate the use of ALPRs.[228] A prominent feature among these statutes are provisions regulating the retention of data collected by ALPRs.[229] The majority of these states limit data retention to a matter of days, while some states have opted for a retention period as brief as a few minutes.[230] South Carolina seeks to follow suit and explicitly regulate the use of ALPRs, as a bill addressing the use of ALPRs is currently under consideration in the House Committee on Judiciary.[231] If passed, this legislation would curtail SLED’s ALPR data retention to a period of ninety days.[232] Such a restriction would prevent South Carolina law enforcement agencies from delving into the past and uncovering intimate details of individuals’ private lives. Even so, the proposed statute is not adequate.

Effective statutes not only grant authorization for specific actions but also offer comprehensive guidance on executing the authorized action. The proposed statute makes a commendable step toward governing SLED’s utilization of ALPR data insomuch as it provides explicit statutory authorization, thereby alleviating the ultra vires concern at the heart of SCPIF’s complaint.[233] However, the proposed statute falls short in actively regulating SLED’s use of the ALPR database.

A restriction on data retention fails to address the actual concerns articulated by the Court in Carpenter. Carpenter’s ruling was unequivocal: a search occurred when “the government accessed CSLI from the wireless carriers.”[234] Thus, the Court’s focus was not on data collection but rather on its utilization.[235] As a result, the absence of practical constraints on law enforcement’s surveillance remains of consequence, as surveilling a suspect over a ninety-day period would be nearly impossible without modern surveillance technology. Additionally, retaining ninety days’ worth of data provides ample information for law enforcement to glean insights into the private aspects of individuals’ lives, especially considering the habitual nature of human behavior. Furthermore, a ninety-day retention policy only has a marginal impact on the overall retrospective nature of ALPR data, as law enforcement can still “travel back in time to retrace a person’s whereabouts”[236] well beyond the “4-week mark.”[237] Therefore, the South Carolina legislature should exercise its institutional advantages to codify the solution proposed by this Note, which, as previously discussed, avoids the shortcomings associated with regulations on data retention.

While statutory regulation is optimal, it is important to acknowledge its inherent limitations. Namely, the fact that the institutional advantages of legislatures, such as the potential for quicker action compared to courts, often go unrealized.[238] This unrealized potential is partly a product of divisions along party lines, which stall legislative progress. Additionally, legislative decisions are susceptible to political fluctuations; measures passed by one party may be quickly repealed when the opposing party assumes power after an election. The South Carolina ALPR bill exemplifies these limitations, as the same bill has been proposed as early as 2018 and has yet to make it out of the Committee on Judiciary.[239] Consequently, the most effective solution may be for SLED to undertake self-regulation of its Back Office use—the very matter currently under litigation.[240]

SLED Self-Regulation

Just as privacy interests should not be subject to the whims of political majorities, SLED’s policing efforts should not be susceptible to the uncertainties of the law. Unlike elected officials, the personnel of administrative agencies, such as SLED, operate independently from political pressures.[241] As a consequence, these agencies possess the capacity to enact regulations with greater agility than legislative bodies. Presently, administrative agencies surpass both Congress and the judiciary in rule creation.[242] Hence, SLED can leverage its rule-making authority to proactively address and preempt any Fourth Amendment challenges to its ALPR utilization.

While the absence of explicit court or legislative directives makes imposing constraints on ALPR usage appear counterintuitive, it is actually advantageous for SLED to adopt a more rigorous regulatory approach to its ALPR usage. Qualified immunity acts to shield law enforcement from legal consequences, leaving the exclusionary rule as the primary recourse for addressing unreasonable searches in violation of the Fourth Amendment.[243] This rule bars the government from introducing evidence obtained in violation of the Fourth Amendment.[244] Consequently, the ambiguous legality surrounding SLED’s utilization of ALPR data places the agency at a perpetual risk of having evidence derived from such data suppressed. This risk, in turn, could prove detrimental to SLED’s ability to secure a conviction if the contested evidence is pivotal to the prosecution’s case. Accordingly, it is advisable for SLED to revise its existing ALPR policy to conform with legal standards, thereby mitigating the risk of suppression.

Specifically, SLED should consider integrating into its policy the limitations suggested by this Note. While mandating officers to secure a warrant for accessing ALPR data beyond individual trips will add an additional hurdle to SLED’s policing efforts, incorporating a warrant requirement in the context of ALPR data is not as burdensome as it may initially seem. As previously noted, the Court in Carpenter was not concerned with the existence of the data, only with its use.[245] Thus, a warrant would not be required for the actual collection of ALPR data, allowing SLED to continue aggregating ALPR data from law enforcement agencies across South Carolina without violating the Fourth Amendment. The warrant requirement would become relevant only when an agency seeks access to data beyond that provided by an individual trip.

Secondly, implementing a warrant requirement for data beyond that derived from an individual trip would prevent suppression of ALPR data due to the good-faith exception.[246] This exception ensures that evidence obtained by officers relying on search warrant, even if deemed invalid, is not excluded.[247] Thus, if an officer obtains a warrant to access SLED’s ALPR database, any evidence derived from the database will not be suppressed, even if the warrant is ultimately found to be invalid.

Furthermore, implementing a warrant requirement for data beyond that associated with an individual trip is not so rigid as to prevent SLED from using ALPR data when it is absolutely necessary.[248] As the Court in Carpenter aptly pointed out, a well-recognized exception to the warrant requirement “applies when ‘the exigencies of the situation’ make the needs of law enforcement so compelling that [a] warrantless search is objectively reasonable under the Fourth Amendment.”[249] Such exigencies include “the need to pursue a fleeing suspect, protect individuals who are threatened with imminent harm, or prevent the imminent destruction of evidence.”[250] Thus, when confronted with an urgent situation such as a child abduction, the needs of law enforcement will likely justify an immediate and comprehensive use of the Back Office, obviating the need for a warrant.

Similarly, implementing a reasonable suspicion standard for the warrantless use of the Back Office would not unduly hinder SLED’s policing endeavors. For one, the reasonable suspicion standard is likely not much different from SLED’s existing restriction, which mandates that the Back Office be used only for “legitimate law enforcement purposes” or “public safety-related missions.” Presumably, these restrictions already necessitate an officer to harbor some level of suspicion that a suspect has committed or is about to commit a crime, and that the Back Office contains evidence related to the crime. If so, the current restrictions align closely with the concept of reasonable suspicion, albeit with the distinction that reasonable suspicion demands a suspicion level beyond a mere hunch and requires officers to substantiate their suspicion with articulable facts.[251] Regardless, the ambiguity surrounding SLED’s current restriction is a compelling reason for the agency to consider adopting the reasonable suspicion standard. Unlike SLED’s current restriction, which lacks a definitive definition, the reasonable suspicion standard is supported by a comprehensive body of case law that clearly outlines the standard, facilitating easier compliance for officers.[252] Additionally, while offering a more precisely articulated standard, reasonable suspicion also grants officers considerable latitude to exercise their professional judgment.[253] Consequently, any supposed benefit SLED gains from maintaining an entirely ambiguous standard becomes inconsequential, as reasonable suspicion enables officers to draw logical inferences based on their experience and expertise.

Moreover, while suppression serves as the traditional remedy for unreasonable searches, suppression is only one reason SLED should be concerned with its current ALPR practices. A Fourth Amendment violation can also give rise to monetary damages via a § 1983 claim.[254] Section 1983 is a federal statute that enables people to sue certain government entities and its employees for violations of their civil rights.[255] Typically, Fourth Amendment violations do not give rise to money damages, as the damage in such cases usually stems from the presentation of illegally obtained evidence; thus, the wrong is generally redressed by suppression of the evidence.[256] However, the existence of § 1983 means that an award of monetary damages is not entirely precluded. Furthermore, whether in defense against a suppression motion or a § 1983 action, the costs associated with litigation are substantial. Therefore, it is in SLED’s interest to revise its ALPR policy in accordance with the solution proposed by this Note to prevent an unnecessary expenditure of taxpayer dollars.

CONCLUSION

Although no court has explicitly affirmed that the utilization of ALPR databases qualifies as a search under the Fourth Amendment, an application of the Court’s reasoning in Carpenter, coupled with the state court’s hesitancy towards ALPR use, suggests that the utilization of ALPR databases is not entirely immune from Fourth Amendment challenges. Given South Carolina citizens’ enhanced Fourth Amendment protection,[257] SLED’s use of the Back Office is especially susceptible to such a challenge. Additionally, the Fourth Circuit has already shown a willingness to extend Carpenter to “traditional surveillance tools” despite Carpenter’s “narrow” holding.[258] Therefore, SLED should proactively address these potential challenges by embracing the solution proposed in this Note, even in the absence of express court or legislative attention to the privacy concerns posed by SLED’s ALPR database. By doing so, SLED stands to avoid significant litigation expenses, potential monetary damages awards, and the jeopardization of otherwise straightforward convictions. Importantly, these advantages have a negligible burden on SLED’s efficiency, as the proposed solution imposes minimal strain on the agency’s existing policing operations.

  1. * First and foremost, I express my sincere gratitude to Professor Leventis for her invaluable guidance throughout the writing process. This Note owes its existence to her mentorship and expertise. I am also thankful for the dedicated members of the South Carolina Law Review, whose collaboration and feedback were instrumental in refining this Note for publication. Lastly, I would like to thank my friends and family for their unwavering love and encouragement throughout the writing journey. Their support has been a constant source of strength and inspiration.
  2. . Carpenter v. United States, 585 U.S. 296, 303 (2018).
  3. . Id.
  4. . Ronald J. Allen Et At., Criminal Procedure: Investigation and Rights to Counsel 379 (4th ed. 2020).
  5. . Id.
  6. . Brian A. Reaves, Local Police Departments, 2013: Equipment and Technology, U.S. Dep’t Just.: Bureau of Just. Stat. (July, 2015), https://bjs.ojp.gov/content/
    pub/pdf/lpd13et.pdf [https://perma.cc/35WX-QU6Q] (93% of police departments in cities with populations of one million or more used their own ALPR systems in 2013).
  7. . Lauren Fash, Automated License Plate Readers: The Difficult Balance of Solving Crime and Protecting Individual Privacy, 78 Md. L. Rev. 63, 64 (2019) (discussing how ALPR devices originated in the United Kingdom as a way to defend against attacks by the Irish Republican Army and then made its way to North America in 1998).
  8. . Id.
  9. . Ángel Díaz & Rachel Levinson-Waldman, Automatic License Plate Readers: Legal Status and Policy Recommendations for Law Enforcement Use, Brennan Ctr. for Just. (Sept. 10, 2020), https://www.brennancenter.org/our-work/research-reports/automatic-license-plate-readers-legal-status-and-policy-recommendations [https://perma.cc/Y6GJ-BMG3].
  10. . Id.; Street-Level Surveillance: Automated License Plate Readers (ALPRs), Elec. Frontier Found, https://www.eff.org/pages/automated-license-plate-readers-alpr [https://per
    ma.cc/XH6Y-YYZZ] [hereinafter Street-Level Surveillance].
  11. . Id.
  12. . Id.
  13. . Id.
  14. . Motorola Solutions, https://www.motorolasolutions.com/en_us/video-security-access-control/license-plate-recognition-camera-systems/l5m-mobile-lpr-solution.html [https://
    perma.cc/HME6-KPL5].
  15. . Id.
  16. . Street-Level Surveillance, supra note 9.
  17. . Id.
  18. . Id.; Díaz & Levinson-Waldman, supra note 8.
  19. . Street-Level Surveillance, supra note 9. 
  20. . Díaz & Levinson-Waldman, supra note 8.
  21. . Street-Level Surveillance, supra note 9.
  22. . Díaz & Levinson-Waldman, supra note 8.
  23. . Id.
  24. . Id.
  25. . Id.
  26. . Id.
  27. . Id.
  28. . Id.
  29. . See Dimitar Kostadinov, Privacy Implications of Automatic License Plate Recognition Technology, INFOSEC (Feb. 7, 2014), https://resources.infosecinstitute.com/topic
    s/general-security/privacy-implications-automatic-license-plate-recognition-technology/#gref [https://perma.cc/8QWY-FBDS].
  30. . See id.
  31. 30. Street-Level Surveillance, supra note 9.
  32. . Randy L. Dryer & S. Shane Stroud, Automatic License Plate Readers: An Effective Law Enforcement Tool or Big Brother’s Latest Instrument of Mass Surveillance? Some Suggestions for Legislative Action, 55 Jurimetrics J. 225, 226 (2015).
  33. . Díaz & Levinson-Waldman, supra note 8.
  34. . See Kostadinov, supra note 28; Street-Level Surveillance, supra note 9; Díaz & Levinson-Waldman, supra note 8.
  35. . U.S. Const. amend. IV.
  36. . Carpenter v. United States, 585 U.S. 296, 305 (2018). 
  37. . Allen, supra note 3, at 316.
  38. . Id.
  39. . United States v. White, 401 U.S. 745, 756 (1971) (Douglas, J., dissenting).
  40. . See Olmstead v. United States, 277 U.S. 438 (1928).
  41. . See id.
  42. . Id. at 456–57.
  43. . Id. at 457.
  44. . Id. at 464.
  45. . Id.
  46. . Id.
  47. . See Commonwealth v. Chaitt, 380 Pa. 532 (1955); People v. Ross, 236 Cal. App. 2d 364 (1965); United States v. Borgese, 235 F. Supp. 286 (1964).
  48. . See 389 U.S. 347 (1967).
  49. . Id. at 353 (“We conclude that the underpinnings of Olmstead and Goldman have been so eroded by our subsequent decisions that the ‘trespass’ doctrine there enunciated can no longer be regarded as controlling. The Government’s activities in electronically listening to and recording the petitioner’s words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a ‘search and seizure’ within the meaning of the Fourth Amendment.”).
  50. . Id. at 348.
  51. . Id. at 352 (“The Government contends, however, that the activities of its agents in this case should not be tested by Fourth Amendment requirements, for the surveillance technique they employed involved no physical penetration of the telephone booth from which the petitioner placed his calls.”).
  52. . Id. at 351.
  53. . Id.
  54. . Id. (“But what he sought to exclude when he entered the booth was not the intruding eye—it was the uninvited ear.”).
  55. . See Florida v. Jardines, 569 U.S. 1 (2013); Kyllo v. United States, 533 U.S. 27 (2001); Florida v. Riley, 488 U.S. 445 (1989); Oliver v. United States, 466 U.S. 170 (1984); Smith v. Maryland, 442 U.S. 735 (1979).
  56. . See Katz, 389 U.S. at 360–61 (Harlan, J., Concurring).
  57. . Id.
  58. . Id. at 351.
  59. . See Riley, 488 U.S. 445; United States v. Knotts, 460 U.S. 276 (1983); Smith, 442 U.S. 735.
  60. . 460 U.S. 276, 281 (1983).
  61. . Id. at 278–79.
  62. . Id. at 281–82 (“When Petschen travelled over the public streets he voluntarily conveyed to anyone who wanted to look the fact that he was travelling over particular roads in a particular direction, the fact of whatever stops he made, and the fact of his final destination when he exited from public roads onto private property.”).
  63. . Id. at 282.
  64. . Id. at 284 (“As noted above, a principal rationale for allowing warrantless tracking of beepers, particularly beepers in or on an auto, is that beepers are merely a more effective means of observing what is already public.”) (internal quotation marks and citation omitted).
  65. . Id. (“Insofar as respondent’s complaint appears to be simply that scientific devices such as the beeper enabled police to be more effective in detecting crime, it simply has no constitutional foundation. We have never equated police efficiency with unconstitutionality, and we decline to do so now.”).
  66. . Id. at 283–84 (“[I]f such dragnet type law enforcement practices as respondent envisions should eventually occur, there will be time enough then to determine whether different constitutional principles may be applicable.”).
  67. . Katz v. United States, 389 U.S. 347, 353 (1967). (“We conclude that the underpinnings of Olmstead and Goldman have been so eroded by our subsequent decisions that the ‘trespass’ doctrine there enunciated can no longer be regarded as controlling.”).
  68. . See United States v. Jones, 565 U.S. 400 (2012).
  69. . Id. at 403.
  70. . Id. at 406 (“The Government contends that the Harlan standard shows that no search occurred here, since Jones has no ‘reasonable expectation of privacy’ in the . . . locations of the Jeep on the public roads, which were visible to all.”).
  71. . Id. at 404.
  72. . Id. at 404–05 (“The Government physically occupied private property for the purpose of obtaining information. We have no doubt that such a physical intrusion would have been considered a ‘search’ within the meaning of the Fourth Amendment when it was adopted.”).
  73. . Id. at 406 (“At bottom, we must ‘assur[e] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.’”) (citing Kyllo v. United States 533 U.S. 27, 34 (2001)).
  74. . Id. at 407 (citing Soldal v. Cook Cnty., 506 U.S. 56, 64 (1992)).
  75. . Id. at 409.
  76. . Id. at 406 (“But we need not address the Government’s contentions, because Jones’s Fourth Amendment rights do not rise or fall with the Katz formulation.”).
  77. . Id. at 404–05.
  78. . Id. at 414 (Sotomayor, J., concurring) (“[T]he trespassory test applied in the majority’s opinion reflects an irreducible constitutional minimum: When the government physically invades personal property to gather information, a search occurs. The reaffirmation of that principle suffices to decide this case.”).
  79. . See id. at 414–15 (“Nonetheless, as Justice ALITO notes, physical intrusion is now unnecessary to many forms of surveillance. With increasing regularity, the government will be capable of duplicating the monitoring undertaken in this case by enlisting factory- or owner-installed vehicle tracking devices or GPS-enabled smartphones. In cases of electronic or other novel modes of surveillance that do not depend upon a physical invasion on property, the majority opinion’s trespassory test may provide little guidance. But ‘[s]ituations involving merely the transmission of electronic signals without trespass would remain subject to Katz analysis.’ As Justice ALITO incisively observes, the same technological advances that have made possible nontrespassory surveillance techniques will also affect the Katz test by shaping the evolution of societal privacy expectations.”) (internal citations omitted).
  80. . Id. at 415.
  81. . Id. at 415–16.
  82. . Id. at 416 (citing United States v. Cuevas-Perez, 640 F.3d 272, 285 (C.A.7 2011) (Flaum, J., concurring).
  83. . Id. (“I would take these attributes of GPS monitoring into account when considering the existence of a reasonable societal expectation of privacy in the sum of one’s public movements. I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on.”).
  84. . Id. at 418 (Alito, J., concurring).
  85. . Id. at 419 (Alito, J., concurring).
  86. . Id. at 429.
  87. . Id. at 430–31 (“[S]ociety’s expectation has been that law enforcement agents and others would not—and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual’s care for a very long period. . . . For these reasons, I conclude that the lengthy monitoring that occurred in this case constituted a search under the Fourth Amendment.”).
  88. . C.f. United States v. Knotts, 460 U.S. 276 (1983).
  89. . Jones, 565 U.S. at 430 (“[R]elatively short-term monitoring of a person’s movements on public streets accords with expectations of privacy that our society has recognized as reasonable. But the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.”).
  90. . Id.
  91. . Id. (“We need not identify with precision the point at which the tracking of this vehicle became a search, for the line was surely crossed before the 4-week mark.”).
  92. . Id.
  93. . Id.; Id. at 415 (Sotomayor, J., concurring).
  94. . 585 U.S. 296, 310 (2018).
  95. . Id. at 309.
  96. . Id. at 316.
  97. . See id. at 305.
  98. . Id. at 306 (“This sort of digital data—personal location information maintained by a third party—does not fit neatly under existing precedents. Instead, requests for cell-site records lie at the intersection of two lines of cases, both of which inform our understanding of the privacy interests at stake.”).
  99. . Smart Cities: Fourth Amendment, Center For Legal & Court Technology, https://law.wm.edu/academics/intellectuallife/researchcenters/clct/exhibit-ai/additional-resourc
    es/exhibit-ai—exhibit-8—additional-resources.pdf [https://perma.cc/NCV7-AAL6].
  100. . See Carpenter, 585 U.S. at 306.
  101. . Id.
  102. . Id. at 310.
  103. . Id.
  104. . Id.
  105. . Id. at 309 (“Given the unique nature of cell phone location records, the fact that the information is held by a third party does not by itself overcome the user’s claim to Fourth Amendment protection.”).
  106. . Id. at 308 (“We have previously held that ‘a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.’”) (citing Smith v. Maryland, 442 U.S. 735, 743-44 (1979)).
  107. . Id. at 313.
  108. . Id. at 315.
  109. . Id. (internal citation omitted).
  110. . Id.
  111. . Id. (internal citation omitted).
  112. . Id. (“We therefore decline to extend Smith and Miller to the collection of CSLI.”).
  113. . Id. at 311 (“And like GPS monitoring, cell phone tracking is remarkably easy, cheap, and efficient compared to traditional investigative tools. With just the click of a button, the Government can access each carrier’s deep repository of historical location information at practically no expense.”).
  114. . Id. at 311.
  115. . Id. (citing United States v. Jones, 565 U.S. 400, 415 (2012) (Sotomayor, J., concurring)).
  116. . Id. at 312.
  117. . See id. (“Critically, because location information is continually logged for all of the 400 million devices in the United States—not just those belonging to persons who might happen to come under investigation—this newfound tracking capacity runs against everyone.”).
  118. . Id. (“Unlike with the GPS device in Jones, police need not even know in advance whether they want to follow a particular individual or when.”).
  119. . Id.
  120. . Id.
  121. . Id. at 313.
  122. . Id. at 316.
  123. . Id.
  124. . Id. (“[T]he Court must tread carefully in such cases, to ensure that we do not ‘embarrass the future.’”) (citing Northwest Airlines, Inc. v. Minnesota, 322 U.S. 292, 300 (1944)).
  125. . See 2 F.4th 330, 333 (2021).
  126. . Id. at 333.
  127. . Id. at 341.
  128. . Id. at 342 (“The latter form of surveillance invades the reasonable expectation of privacy that individuals have in the whole of their movements and therefore requires a warrant. . . . “That the Defendants chose to limit the data collection to daylight hours and a certain resolution does not make the AIR program equivalent to traditional, short-term surveillance.”).
  129. . See id at 341–45.
  130. . Id. at 341 (“Because the data is retained for 45 days—at least—it is a ‘detailed, encyclopedic,’ record of where everyone came and went within the city during daylight hours over the prior month-and-a-half.”) (citing Carpenter v. United States, 138 S.Ct. 2206, 2218 (2018).
  131. . Id. at 341–42 (“Law enforcement can ‘travel back in time’ to observe a target’s movements, forwards and backwards. Without technology, police can attempt to tail suspects, but AIR data is more like ‘attach[ing] an ankle monitor’ to every person in the city. ‘Whoever the suspect turns out to be,’ they have ‘effectively been tailed’ for the prior six weeks. Thus, the ‘retrospective quality of the data’ enables police to ‘retrace a person’s whereabouts,’ granting access to other ‘unknowable’ information.”) (citing Carpenter v. United States, 138 S. Ct. 2206, 2218 (2018)).
  132. . Id. at 340 (“Plaintiffs argued the AIR program violates Carpenter. The district court rejected this analogy, relying on precedents that approved warrantless pole cameras and flyover photography, and distinguishing CSLI as ‘a far more intrusive, efficient, and reliable method of tracking a person’s whereabouts.’”) (internal citation omitted).
  133. . Id. (“The district court’s conclusion arose from its read of the facts: ‘the AIR program has limited location-tracking abilities’ because it ‘will only depict individuals as miniscule dots moving about a city landscape’; the planes ‘will not fly at night and cannot capture images in inclement weather’; and ‘gaps in the data will prohibit that tracking of individuals over the course of multiple days.’”) (internal citation omitted).
  134. . Id. (“From that premise, it believed that the AIR program could not expose the ‘privacies of life.’”) (internal citation omitted).
  135. . Id. at 342 (“We do not suggest that the AIR program allows perfect tracking of all individuals it captures across all the time it covers. Though the data is collected in 12-hour increments, the tracks are often shorter snippets of several hours or less. Still, the program enables photographic, retrospective location tracking in multi-hour blocks, often over consecutive days, with a month and a half of daytimes for analysts to work with. That is enough to yield ‘a wealth of detail,’ greater than the sum of the individual trips. It enables deductions about ‘what a person does repeatedly, what he does not do, and what he does ensemble,’ which “reveal[s] more about a person than does any individual trip in isolation.’”) (internal citations omitted).
  136. . Id. at 344 (“Further, the AIR program does not deduce identity from randomly selected location points, like in a research study. Rather, the context of a specific investigation narrows the pool of possible identities. Police can cross-reference against publicly available information and, even more valuably, their own data systems.”).
  137. . Id. (“PSS can enhance the process by integrating BPD systems—like its CitiWatch camera network, license plate readers, and gunshot detectors—into its ‘iView software,’ ‘mak[ing] all the systems work together.”) (internal citation omitted).
  138. . See, e.g., Commonwealth v. McCarthy, 142 N.E.3d 1090 (2020).
  139. . Id. at 1095.
  140. . Id.
  141. . Id. at 1097 (“Defendant filed motions to suppress the ALPR data and the fruits of the arrest.”).
  142. . Id. at 1095 (“We conclude that, while the defendant has a constitutionally protected expectation of privacy in the whole of his public movements, an interest which potentially could be implicated by the widespread use of ALPRs, that interest is not invaded by the limited extent and use of ALPR data in this case.”).
  143. . Id. at 1109.
  144. . Id. at 1106. (“While we cannot say precisely how detailed a picture of the defendant’s movements must be revealed to invoke constitutional protections, it is not that produced by four cameras at fixed locations on the ends of two bridges.”).
  145. . Id. at 1104.
  146. . Id.
  147. . See id. at 1104, 1109 (“For while no ALPR network is likely to be as detailed in its surveillance as GPS or CSLI data, one well may be able to make many of the of the same inferences from ALPR data that implicates expressive and associative rights.”) (citing American Civ. Liberties Union Found. Of S. Cal. v. Superior Court of Los Angeles Cnty., 3 Cal. 5th 1032, 1044 (2017)); “While we recognize that the widespread use of ALPRs . . . could implicate constitutional protections against unreasonable searches, the limited use of the technology in this case does not.”).
  148. . See State v. Forrester, 343 S.C. 637, 644, 541 S.E.2d 837, 841 (2001).
  149. . Id. at 643, 541 S.E.2d at 840.
  150. . Id. (“In parallel with the protection of the Fourth Amendment, the South Carolina Constitution also provides a safeguard against unlawful searches and seizures.”) (citing S.C. Const. art. 1 § 10).
  151. . Id. (“The relationship between the two constitutions is significant because ‘[s]tate courts may afford more expansive rights under state constitutional provisions than the rights which are conferred by the Federal Constitution.”) (citing State v. Easler, 327 S.C. 121, 131 n.13, 489 S.E.2d 617, 625 n. 13 (1997)).
  152. . Id. (citing Segura v. Texas, 826 S.W.2d 178, 182 (Tex. App. 1992)).
  153. . Id. at 644, 541 S.E.2d at 840. (“Thus, this Court can interpret the state protection against unreasonable searches and seizures in such a way as to provide greater protection than the federal Constitution.”).
  154. . S.C. Const. art. 1 § 10 (emphasis added).
  155. . Forrester, 343 S.C. at 644, 541 S.E.2d at 841.
  156. . Id. at 645, 541 S.E.2d at 841.
  157. . Policing Project, SCPIF v. SLED, NYU School of Law, https://www.policingprojec
    t.org/south-carolina-license-plate-reader-lawsuit [https://perma.cc/392A-C48G].
  158. . See Policing Project, SCPIF v. SLED, Exhibits, NYU School of Law, at 10, https://static1.squarespace.com/static/58a33e881b631bc60d4f8b31/t/6434d73559e6c8337894dcd7/1681184565793/SCPIF+v.+SLED+-+Exhibits.pdf [https://perma.cc/SPA2-63YT].
  159. . Id. at 30.
  160. . See Policing Project, SCPIF v. SLED, Complaint, NYU School of Law, at 9, https://static1.squarespace.com/static/58a33e881b631bc60d4f8b31/t/6434d6b649164819cf971985/1681184439055/SCPIF+v.+SLED+-+Complaint+for+Declaratory+and+Injunctive+Relief
    +%282%29.pdf [https://perma.cc/55FW-AV4S].
  161. . See id. at 4.
  162. . Id. at 9.
  163. . See Rickey Ciapha Dennis Jr., North Charleston Planning to Add Over 700 Cameras Around the City to Expand Surveillance, The Post and Courier (Apr. 28, 2022), https://bit.ly/3FKNdNr [https://perma.cc/Q5YZ-4T5R]; Corinne McGrath, Horry County Police Department to Install 23 License Plate Readers to Combat Crime, WMBF (Mar. 21, 2022), https://bit.ly/3t5FaDa [https://perma.cc/HY62-S6B6]; Simpsonville Uses Automated License Plate Readers to Help Fight Crime, WSPA (Mar. 31, 2021), http://bit.ly/3T4P3Mg [https://perma.cc/NUP3-69JE].
  164. . See Policing Project, supra note 157.
  165. . Id.
  166. . Id.
  167. . See Project Policing, supra note 159.
  168. . Id.
  169. . Id.
  170. . See id.
  171. . Id.
  172. . See Project Policing, supra note 159, at 8.
  173. . See Project Policing, supra note 157, at 12.
  174. . See id.
  175. . Joshua Manson, South Carolinians Sue to End Unauthorized Police Surveillance, Policing Project at N.Y.U. Sch. of L. (Apr. 11, 2023), https://www.policingproject.org
    /scpif-v-sled [https://perma.cc/8JES-VBLV].
  176. . S.C. Code Ann. § 23-3-15(A)(4) (2003).
  177. . S.C. Code Ann. § 23-3-110 (1962).
  178. . S.C. Code. Ann. § 23-3-600 (1994).
  179. . Manson, supra note 174.
  180. . See id.
  181. . See id.
  182. . Id.
  183. . See Project Policing, supra note 159, at 4.
  184. . Id. (“The program implicates the privacy interests and individual rights of millions of South Carolina residents whose movements are being recorded and monitored by an unauthorized surveillance database.”)
  185. . United States v. Jones, 565 U.S. 400, 419 (2012) (Alito, J., concurring).
  186. . Street-Level Surveillance, supra note 9.
  187. . Jones, 565 U.S. at 429 (Alito, J., concurring).
  188. . Street-Level Surveillance, supra note 9; Díaz & Levinson-Waldman, supra note 8.
  189. . See Kostadinov, supra note 28.
  190. . Id.
  191. . Jones, 546 U.S. at 429 (Alito, J., concurring) (referring to Justice Alito’s remarks that the surveillance at issue in Jones “would have required a large team of agents, multiple vehicles, and perhaps aerial assistance,” which is an expenditure only an “investigation of unusual importance could have justified.”).
  192. . See Project Policing, supra note 157, at 4.
  193. . United States v. Carpenter, 585 U.S. 296, 309 (2018).
  194. . Id. at 311.
  195. . Id.
  196. . Id.
  197. . Street-Level Surveillance, supra note 9.
  198. . Id.; Díaz & Levinson-Waldman, supra note 8.
  199. . See Project Policing, supra note 157, at 4.
  200. . United States v. Carpenter, 585 U.S. 296, 312 (2018).
  201. . Id.
  202. . Street-Level Surveillance, supra note 9; Díaz & Levinson-Waldman, supra note 8.
  203. . Carpenter, 585 U.S. at 312.
  204. . Id.
  205. . See id. at 310.
  206. . United States v. Jones, 565 U.S. 400, 430 (2012) (Alito, J., concurring) (citing United States v. Knotts 460 U.S. 276, 281–82 (1983)).
  207. . See id. at 430–31.
  208. . Id. at 430.
  209. 208. Id. at 430.
  210. . See id. at 429.
  211. . See id.
  212. . United States v. Carpenter, 138 S.Ct. 2206, 2218 (2018).
  213. . Id.
  214. . See generally Leaders of a Beautiful Struggle v. Balt. Police Dep’t, 2 F.4th 330 (4th Cir. 2021).
  215. . Id. at 342 (emphases added) (citing United States v. Jones, 565 U.S. 400, 415–17 (2012) (Sotomayor, J., concurring)).
  216. . Id. (emphases added) (citing United States v. Maynard, 615 F.3d 544, 562–63 (D.C. Cir. 2010)).
  217. . See State v. Forrester, 343 S.C. 637, 644, 541 S.E.2d 837, 841 (2001).
  218. . Carpenter, 585 U.S. at 312.
  219. . See Terry v. Ohio, 392 U.S. 1, 19 (1968).
  220. . Id. at 21.
  221. . Alabama v. White, 496 U.S. 325, 330 (1990).
  222. . Reasonable Suspicion, Cornell L. Sch., https://www.law.cornell.edu/wex/reasona
    ble_suspicion
    [https://perma.cc/MCJ3-MNS4].
  223. . See Osborn v. Bank of the U.S., 22 U.S. 738, 819 (1824).
  224. . United States v. Jones, 565 U.S. 400, 429 (2012) (Alito, J., concurring).
  225. . See id.
  226. . See Leaders of a Beautiful Struggle v. Balt. Police Dep’t, 2 F.4th 330, 359 (4th Cir. 2021) (Wilkinson, J., dissenting).
  227. . Jones, 556 U.S. at 429 (Alito, J., concurring).
  228. . Automated License Plate Readers: State Statutes, Nat’l Conference of State Legis. (Feb. 3, 2022), https://www.ncsl.org/technology-and-communication/automated-license
    -plate-readers-state-statutes [https://perma.cc/2RDG-38N3].
  229. . Id.
  230. . See id.
  231. . See H.R. 3374, 2023–2024 Gen. Assemb., 125th Sess. (S.C. 2023).
  232. . H.R. 3374(E).
  233. . See Project Policing, supra note 159, at 14.
  234. . United States v. Carpenter, 585 U.S. 296, 313 (2018).
  235. . See id. at 313–14.
  236. . Id. at 2218.
  237. . United States v. Jones, 565 U.S. 400, 430 (2012) (Alito, J., concurring).
  238. . See Alan B. Rosenthal, The State of the Florida Legislature, 14 FLA. ST. U. L. REV. 399, 430 (1986) (“The performance of a legislature depends on capacity, membership, power, politics, and process”) See also Stephen Chang, Towards Moderate Teacher Tenure Reform in California: An Efficiency-Effectiveness Framework and the Legacy of Vergara, 104 Calif. L. Rev. 1503, 1520 (describing courts as useful to “provide the ‘political cover’ to permit willing policymakers to act” and to solve legislative log jams).
  239. . See generally H.R. 3366, 2023–2024 Gen. Assemb., 125th Reg. Sess. (S.C. 2023).
  240. . See Project Policing, supra note 159, at 2.
  241. . Nancy K. Kubasek & Gary S. Silverman, Environmental Law (Prentice Hall 3rd ed. 2000).
  242. . Id.
  243. . Exclusionary Rule, Cornell L. Sch., https://www.law.cornell.edu/wex/reasonabl
    e_suspicion
    [https://perma.cc/5H38-W9RU].
  244. . Id.
  245. . United States v. Carpenter, 585 U.S. 296, 313-14 (2018).
  246. . See Herring v. United States, 555 U.S. 135, 137 (2009) (“[S]uppression is not an automatic consequence of a Fourth Amendment violation.”); see also United States v. Leon, 468 U.S. 897, 922 (1984) (“We conclude that the marginal or nonexistent benefits produced by suppressing evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant cannot justify the substantial costs of exclusion.”). See generally Carpenter, 585 U.S. at 313–14 (holding that a person has an expectation of privacy in the whole of his or her physical movements, which suggests that accessing such aggregated historical ALPR data beyond an individual trip without a warrant could be considered a violation of the Fourth Amendment).
  247. . Exclusionary Rule, supra note 242.
  248. . See Carpenter, 585 U.S. at 319.
  249. . Id.
  250. . Id. at 320.
  251. . 5 Barbara E. Bergman et al., Wharton’s Criminal Procedure § 29:6 (14th ed. 2023).
  252. . See id.
  253. . See id.
  254. . See What are the Elements of a Section 1983 Claim?, Thomas Reuters (June 13, 2022) https://legal.thomsonreuters.com/blog/what-are-the-elements-of-a-section-1983-claim/ [
    https://perma.cc/3G6L-NJFZ].
  255. . Id.
  256. . Allen et al., supra note 3, at 317, 331.
  257. . See State v. Forrester, 343 S.C. 637, 644, 541 S.E.2d 837, 841 (2001).
  258. . See Leaders of a Beautiful Struggle v. Balt. Police Dep’t, 2 F.4th 330 (4th Cir. 2021).