Warrantless Cellphone Searches Illegal, Supreme Court Rules - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Mobile & Wireless

Warrantless Cellphone Searches Illegal, Supreme Court Rules

Supreme Court bars police from searching data on an individual's cellphone without a warrant.

In a unanimous ruling that extends privacy protections to include the smartphones owned by the majority of Americans, the Supreme Court ruled Wednesday that police need warrants to search cellphones of individuals they arrest.

The 9-0 decision extends Fourth Amendment protections to Americans' cellphones that store myriad data on their personal lives, such as their contacts, correspondence, and financial data.

Chief Justice John G. Roberts Jr. minced no words in what he wrote on behalf of the court. "Our answer to the question of what police must do before searching a cellphone seized incident to an arrest is accordingly simple -- get a warrant."

Smartphones "are not just another technological convenience," Roberts wrote on behalf of the court, but one that, because of their impressive storage capacity and their ability to store details of one's personal life, is "worthy of the protection for which the Founders fought."

The Fourth Amendment to the US Constitution prohibits unreasonable searches and seizures and requires police to obtain a warrant, judicially sanctioned and supported by probable cause, before accessing such information for prosecutorial purposes.

The court heard arguments in April on two cases regarding the issue: Riley v. California (13-132) and US v. Wurie (13-212).

In the first case, police in 2009 used various files on the smartphone of David Riley, without first obtaining a warrant, to convict Riley on a variety of charges, including attempted murder. Riley was sentenced to 15 years to life in prison. A California Appeals Court upheld the conviction, stating that none of the data extracted from the phone required a warrant.

In the second case, police in 2007 searched without a warrant the call log on the flip phone of suspected Boston drug dealer Brima Wurie to identify the location of his apartment and conduct a raid that produced drugs, cash, and a weapon. Wurie was convicted by a federal judge on gun and drug crimes, but a federal appeals court reversed the decision, finding that police should have obtained a warrant.

[Did SCOTUS get it right on another tech-related decision? See Supreme Court Rules Against Aereo.]

"The police generally may not, without a warrant, search digital information on a cellphone seized from an individual who has been arrested," Roberts wrote.

The justices noted that a search of digital information on a cellphone jeopardizes personal privacy to a degree "substantially greater" than a brief physical search at time of arrest.

Primary exemptions to obtaining a warrant at time of arrest have historically fallen under the landmark case of Chimel v. California, in which warrantless searches at time of arrest might be allowed for reasons of officer safety or to prevent the destruction of evidence, noted Roberts.

"The digital data stored on cellphones does not present either Chimel risk," he wrote. "To the extent that cellphone data might warn officers of an impending danger, e.g., that the arrestee's confederates are headed to the scene, such a concern is better addressed through consideration of case-specific exceptions to the warrant requirement, such as exigent circumstances," he wrote.

As for the matter of whether cellphone data is vulnerable to remote wiping and data encryption, Roberts wrote, "The briefing also gives little indication that either problem is prevalent or that the opportunity to perform a search incident to arrest would be an effective solution. And, at least as to remote wiping, law enforcement currently has some technologies of its own for combating the loss of evidence."

The Chief Justice noted the unprecedented storage capacity of the modern smartphone and the "interrelated consequences" such capacity holds for privacy: The device collects in one place many different types of information, the storage capacity of the device conveys far more than previously possible about an individual's private life from one source of information than previously possible, and the data stored on the device can stretch back to the purchase of the device -- and in some situations, even earlier.

He noted the rapid adoption of smartphones and the central role they now play in the daily lives of Americans. "A smartphone of the sort taken from Riley was unheard of 10 years ago; a significant majority of American adults now own such phones."

Cloud computing has been endorsed by everyone from the president on down as a key way to make government IT more efficient and responsive. Planning a move should be on every agency's to-do list. Get the Gov Cloud: Executive Initiatives, Enterprise Experience report today (registration required).

William Welsh is a contributing writer to InformationWeek Government. He has covered the government IT market since 2000 for publications such as Washington Technology and Defense Systems. View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Lorna Garey
Lorna Garey,
User Rank: Author
6/26/2014 | 3:55:22 PM
The two are apples and oranges, I think, as the NSA operates under a whole different rulebook from local police, ultimate constitutional basis aside. I hadn't though about the idea that if I were arrested and my phone taken that I could have a partner remotely wipe it. That's certainly very feasible -- perhaps drug cartels will start buying MDM systems and containerizing their dealers' devices.
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll