Feeds

US Supreme Court: Duh, obviously cops need a warrant to search mobes

Laws written before world + dog stored whole life on phones

Reducing the cost and complexity of web vulnerability management

In a landmark decision, the US Supreme Court has unanimously ruled that police need a warrant if they want to search the mobile phones of the folks they arrest.

Chief Justice John Roberts, who penned the ruling, said the huge amount of data stored on phones means police cannot routinely inspect mobes as they would the contents of arrested people’s pockets and wallets.

“Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans 'the privacies of life',” he said.

The Supreme Court ruling comes after two defendants in two different cases argued that their convictions should be overturned because the evidence used to find them guilty was taken from mobiles they had on them.

When arresting folks, police are allowed a warrantless search of the person for safety reasons – i.e. searching for weapons – and to gather evidence that could be easily disposed of. The Justice Department said in a filing to the court that the same rules should apply to newer devices that people carry around.

But privacy advocates argue that mobiles can’t be seen in the same categories as wallets and address books because they contain photos, videos and social media as well as calls, texts and other personal information.

"Allowing police officers to search a person's cell phone without a warrant following an arrest would be a substantial infringement on privacy, is unnecessary, and unreasonable under the Fourth Amendment," the Electronic Privacy Information Centre said in its own appeal to the court.

Judge Roberts said that the old rules couldn’t apply to modern mobiles, because they were a technology whose scope was unheard of when the laws were put in place.

“These cases require us to decide how the search incident to arrest doctrine applies to modern cell phones, which are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy,” Roberts said.

“Cell phones place vast quantities of personal information literally in the hands of individuals. A search of the information on a cell phone bears little resemblance to the type of brief physical search [outlined by prior legislation].” ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.