Supreme Court asked to limit mobile phone searches
Police should need warrants to search mobile phones beause of the amount of information they hold, lawyers for two suspects say
IDG News Service - Police shouldn't be able to search suspects' mobile phones at the time of arrest because of the huge amounts of private information now stored on those devices, lawyers for two criminal defendants argued before the U.S. Supreme Court on Tuesday.
The high court should make an exception for mobile phones in longstanding case law that allows police officers to search suspects at the time of the arrest without getting a court-ordered warrant, lawyers for the two defendants argued.
If the court allows uninhibited police searches of smartphones, it has "fundamentally changed the idea" that warrants are needed to search most personal effects, said Jeffrey Fisher, a lawyer representing David Riley, who was arrested on gang-related charges in San Diego in 2009. A smartphone potentially contains much more personal information than a suspect could carry in the predigital era, he said.
Several justices seemed to be sympathetic to the arguments for Riley, if not for Brima Wurie, a suspected drug dealer arrested in Boston in 2007.
The state of California's position that police should be allowed wide latitude to search suspects' mobile phones at the time of arrest opens up the possibility of privacy-invading searches of photographs, medical records, email, phone records and GPS records after arrests for minor infractions, said Justice Elena Kagan.
"A person can be arrested for anything," she said. "A person can be arrested for driving without a seat belt."
Other justices questioned why they should prohibit police from searching mobile phones, when they already can search a suspect's wallet or cigarette pack. Under current case law, police could search a piece of paper in a suspect's pocket that contains phone numbers, said Justice Samuel Alito.
The difference is one of scale, Fisher said. Smartphone users increasingly have their "entire lives" on their devices, he said.
Kagan agreed. A search of a suspect's smartphone has much broader privacy implications than "when people have pictures of their family in their billfolds," she said.
California Solicitor General Edward DuMont and U.S. Deputy Solicitor General Michael Dreeben called on the court to allow police searches of mobile phones at the time of the arrest. Police must have those search powers to investigate the crimes the suspects were arrested for, to protect themselves against bombs or other weapons hidden in phones and to prevent the suspect from calling or texting friends with a request to attack the arresting officers, they said.
In addition, police are becoming increasingly concerned about encryption on phones, Dreeben said. In some cases, if a smartphone is allowed to lock, it may be difficult for police to break the password or to defeat encryption on the phone, he said. "It may be months or years or never that they can break through the encryption," he said.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- SANS: Next-Generation Datacenters = Next-Generation Security
- This whitepaper takes a look at some new technology that may allow security teams to implement more flexible and capable protection models in...
- SANS: Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
- SANS review of McAfees Server Security Suite Essentials that address some of the emerging challenges of securing virtual platforms and cloud environments.
- Safeguarding the Next-Generation Data Center
- Use of virtual and cloud servers has exploded. Unfortunately, security often lags behind. McAfee recommends looking at innovative solutions in order to erect...
- Aberdeen: Securing the Evolving Datacenter
- This report highlights ways security technologies and services are evolving to provide the visibility and control needed to deploy workloads flexibly in the... All Government IT White Papers
- Is SQL Server AlwaysOn really as powerful? Tips and Tricks from the field With the introduction of AlwaysOn, Windows Clustering Services is now more critical than ever.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- All Government IT Webcasts