EFF Fights Texas' Claims That Searching A Cell Phone Is No Different Than Searching 'A Pair Of Pants'

from the caution:-pants-may-contain-internet-history dept

Although the prevailing winds are now beginning to shift a little, it has been the opinion of many in law enforcement (and backed up by the courts) that they are welcome to search the contents of a detainee's cell phone without obtaining a warrant. The thought process seems to be that anything on that person (or in their immediate vicinity) is fair game.

The EFF has filed an amicus brief in the Texas Court of Criminal Appeals opposing this mentality in hopes of preventing the state's flawed logic from becoming legal precedent. The case the EFF is involved with began with a warrantless search of a teenager's cell phone while he was detained at a Texas county jail.
Teenager Anthony Granville was arrested at his high school for a misdemeanor and booked into the county jail. All of his belongings, including his cell phone, were taken from him and placed in the jail's property room while he was locked up. Three hours after his arrest, a different officer than the one who arrested Granville at the high school went into the property room and, without a search warrant, looked through Granville's phone in search of evidence connected to another, unrelated felony.
Fortunately (and correctly), the trial court suppressed the evidence "recovered" from Granville's phone, stating that the officer had time to obtain a warrant. It also pointed out the likely reason for the lack of a warrant -- namely, "no exigent circumstance" to justify searching for unrelated evidence on Granville's cell phone.

The state appealed, rationalizing the officer's actions using a couple of rather incredible claims, the second of which shows a complete (or willing) lack of comprehension as to how much information the average cell phone can contain.
The state appealed to the Texas Court of Appeals, arguing that Granville had no expectation of privacy in the contents of his cell phone while it was in the jailhouse, noting that looking through the phone was no different than looking at a person's clothes when they are booked into jail.
(I would imagine "looking at" means "searching" a person's clothes, rather than, say, admiring the stitching.)

The appeals court followed the trial court in shooting down the state's arguments, along with its generally terrible comparison.
The appellate court disagreed with the government's analogy, finding the amount of information stored on mobile devices make a cell phone search far more invasive than a search of clothing.
Despite the count being 0-2, state prosecutors show no willingness to stop swinging, bringing the case to the Texas Court of Criminal Appeals, where it will once again pit its lousy justification for Fourth Amendment violations against the EFF, the Texas Civil Rights Project and the ACLU of Texas.

The EFF's amicus brief shoots several holes into the state's "cell phone = pants" equation.
In our amicus brief we explain the government had no excuse for not obtaining a warrant before searching Granville's phone. A person doesn't surrender their expectation of privacy in the contents of their phone once the phone is in the hands of jail officials. Plus none of the exceptions to the search warrant requirement applied. This wasn't a search "incident to arrest "since it took place hours after Granville was arrested, when the phone was out of his control. And it wasn't an "inventory search" because once the phone itself was inventoried and secured by the police, there was no need to inventory the data on the phone. Plus, an inventory search can't be used as a pretext for a clearly investigatory search, which this certainly was.
Refining broad search policies and eliminating procedural gaps is a necessity as cell phones move further and further away from being simply portable phones. The amount of personal information contained on the average cell phone, along with the number of cloud-based services accessed through them, can make for a very rewarding fishing trip.

These days, searching a phone under the pretenses stated above isn't much different than an officer letting himself into a detainee's home and rooting around on the home computer. Between social networks and cloud services, much of what's "contained" in a cell phone is accessible from multiple points. Arguing that a cell phone is nothing more than a set of pants pockets is deliberately understating the reality in order to justify skirting the Fourth Amendment. Here's hoping the state goes 0-3.


Reader Comments (rss)

(Flattened / Threaded)

  •  
    identicon
    Anonymous, Apr 5th, 2013 @ 4:00am

    If he had been in Missouri, the highway patrol would probably have just stolen it, like trooper (now corporal, oooh) Brad Odle does. Odle is a thief, like the rest of his corrupt buddies in Troop G.

     

    reply to this | link to this | view in chronology ]

    •  
      icon
      art guerrilla (profile), Apr 7th, 2013 @ 6:24am

      Re: parasitizing on a dead thread...

      but want to interject some points which the denizens of techdirtia should understand the significance of:

      1. we are RAPIDLY approaching the point where not just micro-botz, but nano-botz will be capable of numerous surveillance (if not 'direct-action') functions...

      2. they will be all but undetectable to normal senses...

      3. does that therefore mean since they are unobtrusive, they are beyond the reach of the law/constitution which bars 'unreasonable search and seizures' ? ? ?

      4. *besides* the one-way slide which allows more and more 'unreasonable search and seizures', who thinks 'The Law' will not side with Empire and allow any/all micro/nano bot 'searches', since law enforcement doesn't think it is 'unreasonable' at all to send a nano-bot up our cloaca...

      step 5. embedded in the Borg Empire...

      step 6. Profit Uber Alles ! ! !

      art guerrilla
      aka ann archy
      eof

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:01am

    With all the emphasis the government has been putting on cyber- being differently enforceable than non-cyber- you would think this could apply to searches of electronic devices. If you can search (opposed to cyber-search) a person's electronic device, then you can't also turn around and charge someone double crimes because it involved an electronic device.

    I propose that any and all legislation involving differentiating cyber- from non-cyber- also include equal differentiating between how law enforcement is able to handle electronic or cyber-devices.

    We can call it the Cyber-Cake and Eat It Too.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:08am

    The cell phone was in his pants when we searched him, therefore...

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Anonymous Coward, Apr 5th, 2013 @ 5:43am

      Re:

      and had the phone been searched when the guy was first arrested, they might have had a stronger argument, albeit still a weak one. This was several hours later. Exgent Circumstances is basically only when there is a risk of evidence being hidden or lost. They have the phone already, they can afford to delay while they get a warrant.

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:08am

    Or*
    Tablet keyboard was spazzing out.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:09am

    Searching the phone can be the same as searching a pair of pants

    The analogy does make sense, as long as the search is confined to the physical object, instead of its digital contents.

    If they got the phone, opened the battery cover, and removed the battery and SIM, looking for hidden objects, but got no further, it could be considered as very similar to searching a pair of pants and rummaging through its pockets.

    The analogy stops working as soon as they bring out the screwdrivers; that would be similar to completely undoing the stitching of the pair of pants, to look for hidden stuff within the fabric.

    And the analogy does not work at all for data; normal pairs of pants do not have data or network access.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Anonymous Coward, Apr 5th, 2013 @ 4:37am

      Re: Searching the phone can be the same as searching a pair of pants

      Unless their cyber sniffing dog hit on the phone, then anything goes.

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        Anonymous Coward, Apr 5th, 2013 @ 5:09am

        Re: Re: Searching the phone can be the same as searching a pair of pants

        But the dog claim can be bogus too. Unless they can provide documentation of the specific training that the dog received including what the specific signal the dog is trained to give when it detects something and actual evidence (such as a video) that the dog gave the signal when presented with the device, what's to keep them from simply claiming that the dog gave the signal just to give them an excuse.

         

        reply to this | link to this | view in chronology ]

        •  
          identicon
          Anonymous Coward, Apr 5th, 2013 @ 5:33am

          Re: Re: Re: Searching the phone can be the same as searching a pair of pants

          Agreed ...

          The cyber police dog will probably be an app which sports an animated dog making sniffing noises and followed by "the signal" thus indicating contraband. The whole will be a ruse resulting in much laughter.

           

          reply to this | link to this | view in chronology ]

  •  
    icon
    Zakida Paul (profile), Apr 5th, 2013 @ 4:20am

    It's true, they are no different. Law enforcement should not be allowed to search either without due cause and a warrant.

     

    reply to this | link to this | view in chronology ]

    •  
      icon
      egghead (profile), Apr 5th, 2013 @ 7:09am

      Re:

      Of course, now GEICO has an "e-insurance card" on your phone so you can easily hand over your phone to the officer during a traffic stop along with your license. If they're nice, they'll just hand it right back, but they might just take it back there to the cruiser to fill out their paperwork*.**


      * Paperwork - electronic or paper document designed to contain any and all data gleaned from the accused.

      ** Feel free to use that sentence as an example of how to use they're, there and their.

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:34am

    Such a good idea

    These days, searching a phone under the pretenses stated above isn't much different than an officer letting himself into a detainee's home and rooting around on the home computer.


    Tim, that is such a good idea. If they find keys in the pocket in the detainee's clothing, then they could use it to go into the house and search for data. Afterall, it is no different to looking through pants...

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    Ninja (profile), Apr 5th, 2013 @ 4:38am

    Terrorists is what these EFF morons are. The Govt should be able to spy on anything and everything if it'll keep our citizens safe. We must protect our citizens from everything. Themselves included. (sarcasm...)

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 4:39am

    Apparently these keystone cops think that martial law has been declared - on second thought ... maybe it has, in secret.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Stanley Ipkiss, Apr 5th, 2013 @ 4:50am

    Did you guys know that I keep 3,781 pages of email, 853 pages of bookmarks, my entire banking history, 400 cds, 11 board games, 4 1/2 hours of porn and 5 dvds conveniently stored away in my pants.

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    That Anonymous Coward (profile), Apr 5th, 2013 @ 4:52am

    So then the prosecutors should have no issue allowing the public total access to their phones.
    We just want to admire the label on the jeans...

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 5:20am

    The bright side...

    They are setting some nice legal precedent here for these sorts of cases.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 5:58am

    So if someone is booked into jail on a misdemeanor and a search of his pants reveals a picture of him posing with a dead body and a diary detailing a murder plot the police need a search warrant to look at it? If the phone is not password protected, I fail to see how it requires a warrant.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Anonymous Coward, Apr 5th, 2013 @ 6:12am

      Re:

      If it were mine and was password protected, they can get their warrant, that still doesn't mean I will give them access to it.

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        kog999, Apr 5th, 2013 @ 6:27am

        Re: Re:

        If it were mine and was password protected, they can get their warrant, that still doesn't mean I will give them access to it.

        That standard password screen in an iphone or andriod isn't difficult for them to get around

         

        reply to this | link to this | view in chronology ]

    •  
      icon
      Sneeje (profile), Apr 5th, 2013 @ 6:17am

      Re:

      That falls under the plain sight doctrine during inventory search. And intent is very important to understand the difference.

      If you uncover plain-sight evidence in the act of an inventory search (intent = making certain there are no hidden weapons and making sure the detainee can recover his/her belongings later), you can act on it, because it was found in a reasonable manner.

      If you conduct an investigatory search on someone's phone (intent = finding incriminating evidence) you need a warrant because you need to show cause for invading someone's privacy.

      See the difference? Those doctrines exist to create a bright line between public security and individual privacy.

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      Josh in CharlotteNC (profile), Apr 5th, 2013 @ 6:31am

      Re:

      Much like a laptop going through customs, phones contain a lot of information. And like a laptop, the owner generally does not choose specific information to include - unlike the physical world where your hypothetical person chose to carry his diary and a picture around. Also, a phone may not actually include some of this information, but just links to where it resides in the cloud. If I choose to carry my keychain around on me, and am detained, does that mean the police can search my house without a warrant? My storage locker? My friend's house (that I also have a key to)?

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      Reality Check (profile), Apr 5th, 2013 @ 7:05am

      Re:

      Yeah, and by that logic, if you don't lock your house, then the police are welcome to walk right in, and browse your computer, unless password protected, and look in all your closets and drawers, unless locked.

      Lock everything or post a sign saying 'private' or else you have no right to privacy.

      Frack that.

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      John Fenderson (profile), Apr 5th, 2013 @ 9:09am

      Re:

      If the phone is not password protected, I fail to see how it requires a warrant.


      If your house is left unlocked, the police still need a warrant to search it.

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Apr 5th, 2013 @ 7:34am

    Wait, what?

    I shouldn't consider the inside of my pants private?

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    slick8086, Apr 5th, 2013 @ 8:16am

    papers

    The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.


    It seems pretty obvious that a the digital information stored in a cell phone should count as "papers" with regards to 4th amendment protections.

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    Nina Paley (profile), Apr 5th, 2013 @ 10:22am

    Pants

    The TSA searches inside my pants every time I fly. While I'm in them.

    Really, searching a call phone is no different than searching a body cavity. Just routine, for my own protection I'm told.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Purple Emily, Apr 5th, 2013 @ 10:49am

    Solution or tampering with evidence?

    So, this case seems to be decided properly - they need a warrant to read through someone's phone contents.
    However, there have been other courts that have decided against this. Some have even decided that cops can demand your phone password. One of the major issues is that passwords to cloud data are saved on most people's phones, so cops can get access to more stuff than is on the phone itself. (I have problems with them accessing stuff on the phone itself, but the amount of cloud data I have available on my phone is huge).

    What if there were an app that allowed you to have 2 passwords. One password simply unlocked the phone. The other password unlocked the phone, but wiped all your login information? Would that be destroying or tampering with evidence?

     

    reply to this | link to this | view in chronology ]

    •  
      icon
      John Fenderson (profile), Apr 5th, 2013 @ 12:43pm

      Re: Solution or tampering with evidence?

      You can get apps right now that do something like this, except that when you enter the alternate unlock code, it wipes the phone's memory of everything, essentially restoring it to factory state.

      Until/unless the laws about this are made reasonable, I think this is a utility that everyone should have on their phones.

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      techinabox (profile), Apr 6th, 2013 @ 5:07pm

      Re: Solution or tampering with evidence?

      Imagine if you had GoToPC on your phone. They would be able to search inside your home from the police station!

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        Patrick B, Apr 7th, 2013 @ 9:56am

        Re: Re: Solution or tampering with evidence?

        This is EXACTLY what I have been thinking on cases like this. This is the slipperiest kind of slope I can imagine, and in my opinion exactly the type of thing the constititution was intended to defend against.

         

        reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This