Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

US Supreme Court Grapples with Mobile Phone Quandary

WASHINGTON – The Supreme Court heard arguments Tuesday in two cases testing the police’s authority to search detainees’ mobile phones without warrants, in what could have a major impact on US law enforcement.

WASHINGTON – The Supreme Court heard arguments Tuesday in two cases testing the police’s authority to search detainees’ mobile phones without warrants, in what could have a major impact on US law enforcement.

The closely watched cases at the top US court are a dramatic example of justice systems adapting to increasingly pervasive new technologies, particularly with smartphones able to contain reams of important personal information — including photos and videos.

The nine justices on the prestigious panel will have to decide how to apply the 18th century US Constitution’s Fourth Amendment protection against “unreasonable searches and seizures” to today’s highly advanced data troves contained in mobile phones.

The US government argues that phones, like other personal items such as wallets or purses, may be searched during an arrest without a warrant, but privacy advocates are showing resistance.

About 12 million people are arrested every year in the United States — many of them for trivial offenses — while 90 percent of the population owns a mobile phone.

“People carry their entire life on cellphones,” said Justice Elena Kagan.

“The police can seize the phone and look at the personal data because that person was arrested for driving without a seat belt?”

Justice Samuel Alito expressed the need “to balance the interests of privacy versus the law enforcement,” particularly in light of the rapid advance of technology.

Advertisement. Scroll to continue reading.

The hearing focused on two cases.

The first emerged from the arrest of David Riley, a Californian student pulled over in 2009. His car registration was found to have expired.

Police discovered loaded guns in his car and, after scouring his smartphone, entries related to a local gang and an earlier shooting.

His sentence of 15 years to life was upheld on appeal.

In the other case, Boston police in 2007 searched the call log of Brima Wurie’s flip phone, which led them to an apartment where they found drugs, money and weapons.

An appeals court threw out the evidence found on Wurie’s phone, saying it had been obtained unconstitutionally.

‘Great deal of evidence’

Michael Dreeben, representing the government, said mobile phones can potentially “contain a great deal of evidence” and argued that police should have the right to search phones without a warrant to avoid evidence on the phone being destroyed.

Challenging the government’s position, Justice Antonin Scalia exclaimed: “It seems absurd to search in a cellphone for an arrest for not wearing a seat belt!”

The New York Times is among several news organizations that filed a brief supporting Riley and Wurie, saying mobile phone searches threatened news-gathering.

“Mobile phones aren’t weapons and pose no physical threat,” the Times said in an editorial on the eve of the Supreme Court arguments.

“For better or worse, mobile phones have become repositories of our daily lives, and will become only more powerful over time. As a rule, the police should have to get a warrant to search them.”

Norman Reimer, executive director of the National Association of Criminal Defense Lawyers, said “allowing the police to search the contents of a cellphone without obtaining a warrant would be an affront to America’s long history of individual privacy rights.”

“It is akin to granting the police the right to search the most intimately personal details of our lives,” he said ahead of Tuesday’s arguments.

The Supreme Court has already acknowledged the need to adapt to new technologies, ruling in 2012 that authorities would violate the Fourth Amendment if they attached a GPS tracking device to a private car.

A final decision on the cellphone cases is expected by late June.

*Updated after court sessions with headline reflecting change.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...