Вы находитесь на странице: 1из 29

42 GALR 1165 42 Ga. L. Rev.

1165

Page 1

Georgia Law Review Summer, 2008 Notes *1165 BRINGING AN END TO WARRANTLESS CELL PHONE SEARCHES Bryan Andrew Stillwagon Copyright (c) 2008 Georgia Law Review Association, Inc.; Bryan Andrew Stillwagon *1167 I. Introduction As local police were conducting surveillance at a suspected drug house, Dan, a young college student, walked up to the house. The officers watched as Dan spoke with a man who appeared from within the house. They saw the two men exchange items and then part ways. Once Dan was away from the house, the police decided to question him about his suspicious behavior. When the officers confronted him, Dan became noticeably nervous. The officers asked if he would mind emptying his pockets, and Dan reluctantly agreed. He produced some cash, his cell phone, and a small bag of marijuana. The officers then arrested him for possession, seized his belongings, searched the rest of his person incident to the arrest, [FN1] and placed him in their patrol car. With the hope of building evidence against the man in the house, the officers began scrolling through the phone's memory. They wrote down the numbers and corresponding names in the recent call log, and after searching the internal phone book for any familiar names, they wrote down the contact information for several suspected drug dealers. The officers then viewed the phone's inbox, which contained several recent emails and text messages. The messages made references to what the officers believed to be offers for the sale and purchase of marijuana. One message even included a local address. Noticing that it was a camera phone, the officers went to the stored images and video, where they found pictures of what appeared to be large amounts of marijuana sitting in a storage facility. Later that day, the officers decided to investigate the address listed in one of the text messages. After discovering that the address was for a local self-storage unit, they obtained a warrant and found that the unit stored several hundred kilograms of marijuana. With the evidence obtained from the cell phone, the officers charged Dan with possession with intent to distribute. This hypothetical scenario demonstrates one of the likely settings for a warrantless cell phone search. Many of the cases that this *1168 Note discusses involve some aspect of the drug trade, but such searches can arise in any number of circumstances. Although the act of browsing a cell phone's memory may seem trivial, the implications, as demonstrated above, can be enormous for the parties involved. The new problem this Note addresses is warrantless cell phone searches, but the core issues are by no means new. The nuances of search and seizure procedures have been litigated in-depth over the past century. Many of these cases have led to a new interpretation, or at least a new understanding, of the Fourth Amendment. These cases focus on new challenges that force the judiciary to adapt the constitutional text to modern situations while preserving its original meaning. Cases involving cell phones are no different. The text of the Fourth Amendment has not changed simply because society has. The ongoing technological revolution has impacted our society in every aspect of life. [FN2] Cell phones are commonplace, and it is rare to come across a person that does not own one. [FN3] Each day seems to bring phones

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 2

with newer features and greater storage capacity; each day also seems to take these devices further away from their single-function, fixed-line ancestors. [FN4] However, these new capabilities bring with them new challenges. The general rule for searches is that if officers perform them without obtaining a warrant and violate a reasonable expectation of privacy, then any evidence obtained is excluded. [FN5] There are, however, exceptions to this general rule. [FN6] This Note, though incorporating reasoning from a wide spectrum of search and seizure jurisprudence, primarily focuses on the search-incident-to-arrest exception to the warrant requirement, which allows an officer to conduct a search pursuant to a lawful arrest. [FN7] Application of this *1169 exception to cell phone searches is complicated by courts' differing jurisprudence with regard to cell phones discovered during searches. [FN8] Some courts have allowed searches of the devices by analogizing them to pagers and certain closed containers, while other courts have held these searches unconstitutional because they go far beyond what is reasonable under the exception. [FN9] This Note argues that the practice of warrantless cell phone searches should come to an end, using the search-incident-to-arrest exception as the focal point of discussion. This Note begins in Part II.A with a discussion of cell phones, including a brief look at their history, recent developments, and relation to crime. Then, Part II.B focuses on warrantless searches, discussing privacy expectations and briefly examining some of the instances where they are legal. Part II.B then focuses on the search-incident-to-arrest exception and demonstrates, through a survey of search and seizure case law, how the exception applies to objects that are potentially analogous to cell phones, including closed containers, pagers, and computers. Part II.C highlights those few cases that deal specifically with warrantless cell phone searches, including those dealing with the search-incident-to-arrest exception. Part III describes how to properly analyze cases involving warrantless cell phone searches. Specifically, Part III.A discusses how the current problem came about through poor analogizing and bad reasoning, and Part III.B discusses why cell phones are not closed containers, are not pagers, should not be considered immediately associated with the person, and are much more analogous to computers. Part III.C summarizes why cell phones should be treated differently than the objects that courts typically find analogous, and Part III.D provides alternatives to the warrantless searches. Finally, Part IV looks at what the costs and benefits would be to a system without such searches. *1170 II. Background A. Cell Phones Before delving into a discussion of warrantless searches, it is necessary to discuss the technology at the center of the debate. 1. History. Today's cell phones are the culmination of the work and inventions of many great thinkers. With the advent of Alexander Graham Bell's telephone in the mid-1870s [FN10] and Guglielmo Marconi's radio at the turn of the twentieth century, [FN11] people began thinking about how to combine the two inventions. [FN12] Although American Telephone & Telegraph (AT&T) had developed a car phone by 1945, it was large, inefficient, and quite expensive. [FN13] Developments a few decades later, however, gave the device the jump-start it needed. In December 1947, Donald H. Ring came up with the idea of dividing geographic areas into cells, each with its own antenna and transceiver unit. [FN14] While this approach would reduce power consumption, make it easier to expand service into new areas, and eliminate the problem of service getting weaker at the edges of coverage areas, there was simply not enough computer power available at the time, even to industry leaders. [FN15] In the same month, [FN16] scientists from Bell Laboratories were able to replace the bulky, unwieldy vacuum tubes with the transistor . . . making the mobile phone much easier to use [FN17] because of its smaller size, lower power drain, and better reliability. [FN18] It was Motorola's chief *1171 executive, however, who made the world's first call on a portable, hand-held cell phone in 1973. [FN19] This phone was the DynaTAC, a nearly two-and-a-half pound object, which soon received the moniker of the Brick. [FN20] Before cell phones became mainstream, however, it was the pager that grabbed society's attention. Popular in

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 3

the 1980s and early 1990s, and used by sixty-one million people in 1994, pagers were devices capable of receiving transmitted radio text messages. [FN21] During this time, many people were still underestimating the potential of the new cellular technology. In 1980, AT&T commissioned a company to forecast cell phone use in the year 2000. [FN22] The company predicted 900,000 subscribers. [FN23] The actual number of subscribers in 2000 was 109 million. [FN24] The company was in no way alone, however, in its faulty predictions. [FN25] Cell phones gradually got smaller, becoming less than eleven ounces in 1989 and 3.1 ounces in 1996. [FN26] Although the first-generation cell phones were relatively large in size and low in functionality, [FN27] Nokia raised the bar in 1996 when it introduced a mobile phone that was also a hand-held computer, allowing users to send not only their voice, but also data. [FN28] 2. Recent Developments. As the 1990s progressed, cell phones became multimedia-capable: second-generation cell phones included address books, clocks, alarms, calendars, calculators, and games. [FN29] The phones could track and store call details such as lists of calls sent and received, missed calls, the duration of calls, and voice *1172 messages. [FN30] With generation 2.5 came text messaging, image and video sending, and music downloading. [FN31] Third-generation cell phones had greater photo and video capabilities, as well as text messaging functions and access to the Internet. [FN32] Put simply, cell phones have transformed all aspects of our culture. They impact society everywhere, from work to pleasure and everything in between. [FN33] Accordingly, rather than studying cell phones simply as wireless voice devices, people are analyzing them as portable microcomputers, embedded in public spaces. [FN34] In 2007, these microcomputers were used by more than 255 million people in the United States, up from 141.8 million in 2002. [FN35] *1173 3. Cell Phones and Crime. Society has been dramatically transformed with the help of these technological innovations, but [u]nfortunately, those who commit crime have not missed the computer revolution. [FN36] More criminals are now using pagers, cell phones, laptop computers, and network servers to aid in the commission of crimes. [FN37] Police have caught people using camera phones to record PIN numbers at ATMs, steal corporate secrets, take covert pictures or video clips of partially dressed people, peek under women's clothing, and cheat on tests. [FN38] More disturbing are reports of criminals using camera phones to assist in robberies [FN39] and to record acts of sexual violence. [FN40] Cell phones are not just being used by criminals for their camera capabilities. There are reports of criminals using the text messaging function to commit fraud in ways more commonly seen in computer-based Internet schemes. [FN41] The standard voice capabilities are still widely used, and investigators often use the information acquired from phone calls to track suspects' movements. [FN42] Cell phones have also played a role in drug cases. [FN43] *1174 It's a sure bet that almost everybody isgoing to be carrying a cell phone . . . . It's just incredible, the information that it gives you. [FN44] Although the devices are sometimes used to commit crimes, they often serve as convenient storage devices for evidence of crime. [FN45] In a number of cases, cell phones have provided evidence of crimes later used at trial. [FN46] The fact that so much information can be stored on a cell phone today [FN47] has implications beyond just being able to scroll through address books and call logs. Cell phones are ubiquitous in today's world and nearly all crimes have a digital component to them. [FN48] Forensic scientists have discovered ways, including the use of flasher technology, [FN49] to access the inner secrets in cell phones, exposing a hidden gold mine of personal information. [FN50] This allows investigators to gain access to the internal memory of cell phones, *1175 even if the phone's SIM card [FN51] has been removed, and to deleted contacts and messages. [FN52] These developments, coupled with the phone's capability to store what is essentially a subjective picture of our habits, our friends, our interests and [our] activities, have led some in the legal community to voice concerns. [FN53] B. Warrantless Searches The Fourth Amendment to the Constitution states that [t]he right of the people to be secure in their persons, houses, papers, and effects[ ] against unreasonable searches and seizures, shall not be violated . . . . [FN54] The

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 4

reason for requiring search warrants lies with the desire to have magistrates rather than police officers determine the permissibility and limitations of searches and seizures. [FN55] This desire stems from the belief that magistrates are in a better position [t]o provide the necessary security against unreasonable intrusions upon the private lives of individuals . . . . [FN56] Searches are generally illegal if they are performed without a warrant and they violate the owner's reasonable expectation of privacy in the object being searched. [FN57] A warrant is not required, however, if there is either no reasonable expectation of privacy in the object being searched or one of the exceptions to the warrant requirement is established. [FN58] *1176 1. Expectation of Privacy. In order to determine whether an individual has a reasonable expectation of privacy, two questions are asked: first, whether the individual exhibits an actual (subjective) expectation of privacy, and second, whether that subjective expectation is one that society is prepared to recognize as reasonable. [FN59] In dealing with computers, the U.S. Department of Justice recommends treating them like a closed container such as a briefcase or file cabinet, because accessing the information stored within an electronic storage device is akin to opening a closed container. [FN60] Several courts have also found that there is a reasonable expectation of privacy in pagers. [FN61] With regard to the telephone, the Supreme Court held in Smith v. Maryland that a defendant entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not legitimate. [FN62] Years earlier, however, the Court found in Katz v. United States that the government's use of a listening device on a telephone call constituted a search, violating the Fourth Amendment and the caller's expectation of privacy. [FN63] The Smith Court distinguished the listening device in Katz by explaining that although pen registers record the numbers dialed, they do not acquire the contents of communications. [FN64] 2. Exceptions to the Warrant Requirement. [FN65] Even if a warrantless search does violate a person's reasonable expectation of privacy, it will still be constitutional if it falls within an established *1177 exception to the warrant requirement. [FN66] One of these established exceptions is a search that is conducted pursuant to consent. [FN67] Notable challenges arise when determining the scope of the consent given. In cases where consent was given to search an apartment, two federal courts of appeal found that such general consent did not extend to searching files on a computer within the apartment. [FN68] Similarly, a federal district court found that consent to look at a pager did not grant the legal right to scroll through its memory. [FN69] A second exception to the warrant requirement is the plain view doctrine, which provides that anything an individual knowingly exposes to public view . . . involves no reasonable expectation of privacy and is not a subject of Fourth Amendment protection. [FN70] If the police see the items in plain view, their initial intrusion was lawful, and they have probable cause to believe the items are contraband, then a warrantless seizure of the property is justified. [FN71] However, problems arise when this exception is applied to digital evidence because its contents are rarely visible without some type of human manipulation. [FN72] A third exception to the general warrant requirement is the doctrine of exigent circumstances. Exigent circumstances allow search and seizure without a warrant if the circumstances would cause a reasonable person to believe that entry . . . was necessary to prevent physical harm to the officers or other persons, the destruction of relevant evidence, the escape of the suspect, or some *1178 other consequence improperly frustrating legitimate law enforcement efforts. [FN73] Several cases have found exigent circumstances to exist when agents retrieved numbers from electronic pagers because of their limited memory capabilities. [FN74] It is important to note, however, that [w]hen the exigency ends, the right to conduct warrantless searches does as well; the need to take certain steps to prevent the destruction of evidence does not authorize agents to take further steps without a warrant. [FN75] 3. The Search-Incident-to-Arrest Exception. A search carried out at the time of an arrest is another established exception to the general rule against warrantless searches. [FN76] This exception, however, is subject to limitation. The search must result from a lawful arrest, and the search can only be made of the area within the control of the arrestee. [FN77] Accordingly, the search cannot be justified as incident to that arrest . . . if the search is remote in time or place from the arrest. [FN78] In addition, the search must be *1179 reasonable, [FN79] meaning that the need to search or seize should outweigh the invasion that the search entails. [FN80]

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 5

This exception is justified by the need to seize weapons and other things which might be used to assault an officer or effect an escape, as well as by the need to prevent the destruction of evidence of the crime. [FN81] 4. How the Search-Incident-to-Arrest Exception Applies to Analogous Objects. The justifications discussed above often arise when courts analyze how the search-incident-to-arrest exception applies to numerous specific objects. [FN82] How courts analyze these objects helps demonstrate the unique challenges that cell phones present. [FN83] a. Closed Containers. In a search incident to a lawful arrest, investigators are allowed to conduct a search of the area within the immediate control of the arrestee. [FN84] The remaining question, however, is how to treat closed containers or related articles that the arrestee has in his possession at the time of arrest. The Supreme Court attempted to answer this question in United States v. Robinson. [FN85] In Robinson, the respondent was arrested for operating a motor vehicle without an operator's permit. [FN86] During a pat-down search, the officer felt and retrieved an object in the respondent's jacket pocket that turned out to be a crumpled up cigarette package. [FN87] Still not knowing what was in the package, but feeling objects that *1180 were not cigarettes, the officer opened the package and found fourteen capsules of heroin. [FN88] Refusing to carry out a case-by-case adjudication of situations where officers need to make quick ad hoc judgments, the Court held that in the case of a lawful custodial arrest a full search of the person is not only an exception to the warrant requirement of the Fourth Amendment, but is also a reasonable search under that Amendment. [FN89] Interestingly, the Court seemed to sidestep the justification issue, noting that although the search-incident-to-arrest exception is justified by the need to disarm and to discover evidence, [it] does not depend on what a court may later decide was the probability in a particular arrest situation that weapons or evidence would in fact be found upon the person of the suspect. [FN90] Justice Marshall addressed this issue in his dissent, pointing out that because it was impossible for the respondent to access the package once the officer had retrieved it, [o]pening the package . . . did not further the protective purpose of the search. [FN91] The Supreme Court confronted the issue of closed containers again in New York v. Belton. [FN92] In Belton, a police officer discovered cocaine after unzipping the pocket of the respondent's jacket, which had been lying on the back seat of his car. [FN93] Because the officer was able to make a lawful, contemporaneous search of the vehicle's passenger compartment incident to the respondent's arrest, the Court found that he was also justified in examin[ing] the contents of any containers found within the passenger compartment because the contents of both would be within reach. [FN94] The fact that the jacket pocket was zipped did not matter to the Court because the justification for the search is not that the arrestee has no privacy interest in the container, but that the lawful custodial arrest *1181 justifies the infringement of any privacy interest the arrestee may have. [FN95] Nor did it matter to the Court that the officer searched the pocket after gaining exclusive control over the jacket because if the Court held otherwise no search or seizure incident to a lawful custodial arrest would ever be valid. [FN96] Many circuit courts have also addressed more personal items in the context of closed container searches. The Fifth Circuit held in United States v. Johnson that the search of a briefcase was a valid search incident to arrest because the item was located within the arrestee's reach. [FN97] Similarly, the Ninth Circuit held that the search of a rifle case constituted a lawful search incident to arrest. [FN98] There, the court found that because the case was near the arrestee's feet it was within his reach and could thus pose a danger to the arresting officers. [FN99] The Ninth Circuit also considered whether the search of a purse incident to an arrest was valid under the Fourth Amendment. [FN100] The court held that the search was illegal, but only because it was conducted at the police station more than an hour after the arrest, at a time when the protective rationale for the search no longer applie[d]. [FN101] Lastly, the Seventh Circuit, in United States v. Rodriguez, confronted a situation where a police officer searched an arrestee's wallet, photocopied the contents of an address book found therein, *1182 and discovered the phone number for a co-conspirator in cocaine distribution. [FN102] A few years earlier, the circuit decided United States v. Molinaro, in which an officer found several slips of paper in an arrestee's wallet that contained

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 6

incriminating evidence. [FN103] Relying on Robinson, which the court interpreted to stand for the proposition that any personal property within an arrestee's pockets could be searched incident to arrest, [FN104] the court in Molinaro held that an officer could search the contents of a defendant's wallet incident to arrest because the search took place within ten to twenty minutes of the arrest. [FN105] In Rodriguez, the court also upheld the search despite the fact that it took place at the sheriff's department rather than at the scene of the arrest. [FN106] Finally, the court justified the deputy's search of the address book as an attempt to preserve evidence. [FN107] b. Pagers. Upon first glance, pagers are seemingly the closest analog to cell phones that courts have considered in detail. In determining how to treat pagers, courts tend to draw reasoning from their case law on closed containers. [FN108] For example, in United States v. Galante, which held that consent to search a car included consent to search a pager within the car, the court analogized the pager to a closed container. [FN109] Dealing directly with searches incident to arrest, the court in United States v. Lynch held that a search of the respondent's pager was valid [j]ust as police can lawfully search the *1183 contents of an arrestee's wallet or address book. [FN110] The court, as in previous cases, noted that the police interest in finding a weapon or obtaining evidence outweighed any privacy concern of the arrestee. [FN111] The court also justified the search because the pager was found upon [the arrestee's] person on his hip, which the court considered to be part of his person for purposes of the search. [FN112] In United States v. Chan, a DEA agent seized the defendant's pager incident to his arrest, activated its memory, and retrieved certain telephone numbers stored therein. [FN113] Although there was no danger that the defendant could produce a weapon from the pager, and no threat that he would access the pager to destroy evidence, the court found that the search was not remote in time or in space and held that accessing the pager's memory was a valid search incident to arrest. [FN114] United States v. Reyes, which cites Chan as support, involved three separate pagers, only one of which was procured through the search-incident-to-arrest exception. [FN115] The court found that the agent who accessed the pager's memory had performed a valid search incident to arrest because it was retrieved from a bag attached to the defendant's wheelchair no more than twenty minutes after his arrest. [FN116] *1184 c. Computers. Even when police have warrants to execute a search, they do not possess absolute authority to search computers and other digital evidence. In order to properly conduct such a search, the warrant must meet the particularity requirement of the Fourth Amendment. [FN117] Some jurisdictions even have given explicit directions to their investigators on how to accurately word the warrant in order to access information on a computer if there is probable cause that it contains incriminating evidence. [FN118] Because of this, perhaps, case law involving computers searched incident to a valid arrest is limited. In a case decided by the Washington Court of Appeals, a defendant was arrested on suspicion of auto theft. [FN119] Inside his car was a bag in which the arresting officer discovered a laptop computer. [FN120] Once back at the station, another officer accessed the computer's files to see whether they indicated an owner other than the arrested defendant, thus evincing computer theft. [FN121] Although the court found that the police had probable cause to seize the computer, it concluded that [t]he subsequent search of the computer's files . . . did not fall under any of the exceptions to the warrant requirement. [FN122] In doing so, the court argued that compliance with the warrant requirement is necessary to ensure that the police are justified in invading a person's privacy interest to search for evidence. [FN123] *1185 In a California case, the search of a defendant's luggage yielded a laptop computer, a separate hard drive, a computer memory stick, and six compact discs. [FN124] In determining whether the government could access the information stored on the various devices without a search warrant, the court noted the technological advances that now permit individuals and businesses to store vast amounts of private, personal and valuable information within a myriad of portable electronic storage devices such as those in the defendant's possession. [FN125] For this and other reasons, the court held that the evidence obtained as a result of the warrantless search had to be suppressed. [FN126] C. Warrantless Cell Phone Searches

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 7

As seen in the search and seizure cases above, the courts have previously discussed objects that may be helpful in analyzing the challenges surrounding cell phones. Some cases, however, have applied the search-incident-to-arrest exception to cell phones through a more direct analysis. 1. Expectation of Privacy. It is important to remember that before reaching the issue of applicable exceptions to the warrant requirement, a court may find a search valid if there was not a reasonable expectation of privacy in the object, thus eliminating the *1186 initial need for a warrant altogether. [FN127] As the following three cases demonstrate, the state of the law is not yet settled in this area. The court in Beckwith v. Erie County Water Authority discussed privacy expectations specifically in the context of cell phones. [FN128] Because the defendant voluntarily conveyed numerical information to the telephone company and exposed that information to its equipment, the court held that he had lost any reasonable expectation of privacy in the existence and identity of such calls. [FN129] The court reasoned that unlike private records in one's office computer, the cell phone calls had been shared electronically with the company providing the phone service. [FN130] The problems with this analysis adopted from Smith were pointed out in Smith's dissenting opinions. First, Justice Stewart argued that the telephone company's capability of performing some act-recording dialed numbers or the actual conversations-is not relevant to the inquiry of whether the government's actions were constitutional. [FN131] [W]e have squarely held that the user of even a public telephone is entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world. [FN132] Second, Justice Marshall criticized the majority's all-or-nothing labeling of privacy [FN133] because a caller who discloses information to the telephone company does not assume that the information will be transferred to the government to use for their own purposes. [FN134] *1187 Finally, Justice Marshall attacked the majority's assumption of the risk argument by highlighting the vital role telephone communication plays in society: [FN135] Unless a person is prepared to forgo use of what for many has become a personal or professional necessity, he cannot help but accept risk of surveillance. [FN136] The court in United States v. Chan reached a different conclusion than Beckwith, however, stating that [t]he expectation of privacy in an electronic repository for personal data is . . . analogous to that in a personal address book or other repository for such information. [FN137] The court in State v. Smith hinted at perhaps a third option. [FN138] The trial court permitted introduction of the defendant's call records and numbers from his cell phone but granted his motion to suppress incriminating photos also retrieved from his phone. [FN139] The court reasoned that the admissible evidence was only that which the arresting officers had a reasonable suspicion was on the defendant's person at the time of his arrest. [FN140] 2. Search-Seizure Distinction and Other Exceptions. In many cell phone cases, it is the search rather than the seizure that is at issue. [FN141] There are several instances where an officer may seize *1188 possessions from a defendant, including when items are seized during a pat-down search [FN142] and when items are seized while they are in plain view. [FN143] Also, although a court might find that the search-incident-to-arrest exception does not apply to a particular warrantless cell phone search, it may still hold the search valid under an alternate theory, such as exigent circumstances [FN144] or consent. [FN145] 3. Searches Beyond the Exceptions. Some courts have found that the warrantless search of a cell phone does not fall within any exceptions to the warrant requirement. In United States v. Morales-Ortiz, an officer retrieved the names and numbers from the memory of a cell phone found on the defendant's kitchen counter without obtaining a search warrant. [FN146] The court found that the search was not authorized under the plain view [FN147] or exigent circumstances [FN148] *1189 exceptions, but that it could be permitted under the doctrine of inevitable discovery. [FN149] The court did not discuss the search-incident-to-arrest exception, but it noted that it did not have to because neither party raised the argument that the agents needed a separate warrant to search the . . . cell phone's memory. [FN150] Thus, it is unclear whether the court's ruling would be different if the defendant had challenged the actual search of the cell phone. In other cases, courts have specifically assessed the constitutionality of searches related to the multimedia capacity of cell phones. For example, in People v. McGee, undercover officers arrested the defendant after they saw him taking pictures of a woman's buttocks using his cell phone. [FN151] Once back at the precinct, one of the officers opened the cell phone and examined the stored video and images. [FN152] The State did not raise the

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 8

search-incident-to-arrest exception, but instead argued to admit the images under the independent source rule and the theory of inevitable discovery. [FN153] The court held that neither exception applied to the case and granted the motion to suppress the images. [FN154] 4. Cell Phone Searches Incident to Arrest. As with other electronic items, courts have found some warrantless searches of cell phones to fall squarely within the search-incident-to-arrest *1190 exception. In United States v. Murphy, an officer arrested the defendant for obstruction of justice and retrieved a cell phone in his possession that contained various text messages. [FN155] Because the arrest was lawful, the court held that the items yielded from the search conducted incident to such a lawful arrest, i.e., the cell phone, should not be suppressed. [FN156] Similarly, in United States v. Dennis, officers examined phone numbers contained in the defendant's cell phone after his arrest. [FN157] Although the defendant claimed there were enough law enforcement officers at the scene to make it impossible for him to destroy any evidence, [FN158] the court held that a warrant was not needed and that the evidence should not be suppressed. [FN159] According to the court, the test for determining the validity of a search incident to arrest is not whether the defendant has actual, present capacity to destroy the evidence, but merely whether the evidence was within his immediate control near the time of his arrest. [FN160] The defendant's cell phone in United States v. Deans, which was seized from his vehicle, allegedly provided information linking him to the other defendant. [FN161] Even if the officers could search his vehicle incident to his arrest, the defendant argued that they could not search his cell phone simply because the officers came into possession of it lawfully. [FN162] The defendant also attempted to liken his privacy interest in his cell phone to that of the contents of computer disks. [FN163] The court, however, cited to New York v. Belton [FN164] in holding that officers may search any data stored *1191 electronically in the cell phone if officers first lawfully seize the device. [FN165] But the court also noted that Belton was decided in 1981, prior to widespread cell phone use, and did not expressly address the authority to search a device's electronic memory. [FN166] In United States v. Mercado-Nava, officers found two cell phones on the defendant after his arrest and contemporaneously downloaded the memories of both. [FN167] The court found that police can search an arrestee to prevent the concealment or destruction of evidence, and because this extends to containers found on the arrestee's person, the search of the phone was valid. [FN168] The court in United States v. Valdez elaborated on the preservation of evidence theory in upholding the search of an arrestee's cell phone. [FN169] After the defendant was arrested, a detective's search of the seized phone one minute later revealed evidence from the address book and call history of communications with alleged co-conspirators. [FN170] The detective stated that he performed the search immediately because he was concerned that the information contained in the phone . . . could be erased remotely or lost on deactivation. [FN171] This apparent exigency, together with the satisfied contemporaneity requirement, led the court to uphold the search after distinguishing the facts from another case with a contrary holding. [FN172] *1192 When considering the contemporaneity requirement, courts have had different opinions as to what might invalidate a search incident to arrest. In United States v. Cote, officers arrested the defendant, seized his cell phone, and accessed information from its call log, phone book, and wireless web inbox. [FN173] The court held that no warrant was required for the search of the phone's content because the phone was analogous to wallets and address books in that they contained similar information. [FN174] Furthermore, even though the officers searched the phone two and a half hours after they arrested the defendant, the court found that the short lapse in time was not enough to invalidate the search. [FN175] However, in United States v. Park, the court did find that a search of the defendant's cell phone an hour and a half after his arrest was not contemporaneous with his arrest. [FN176] In Park, the court recognized the exception to the contemporaneity requirement set forth in United States v. Edwards, but it distinguished that case because it involved a search of the arrestee's clothing. [FN177] The court held that possessions within an arrestee's immediate control have [F]ourth [A]mendment protection at the station house unless the possession can be characterized as an element of the clothing. [FN178] In addition, the court cited United *1193 States v. Chadwick, [FN179] which also distinguished Edwards, [FN180] for the proposition that [u]nlike searches of the person, searches of possessions within an arrestee's immediate control cannot be justified by any reduced expectations of privacy caused by the arrest. [FN181] Finally, the court in Park found

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 9

that cell phones should be considered possessions within an arrestee's immediate control rather than as part of the arrestee's person because of their capacity for storing immense amounts of private information. [FN182] Unfortunately, this holding appears to be unique among the cases identified that have dealt with cell phones searched incident to arrest. [FN183] The Fifth Circuit confronted the issue of warrantless cell phone searches in early 2007 in United States v. Finley. [FN184] In Finley, after the defendant was arrested, an officer searched through the call records and text messages in the defendant's cell phone, several of which appeared to relate to narcotics use and trafficking. [FN185] When the search was challenged, the court first found that the defendant had a reasonable expectation of privacy in the phone, despite the fact that his business had issued it to him. [FN186] The court then found *1194 that the search was valid pursuant to the defendant's arrest and, in doing so, distinguished Chadwick. [FN187] The court reasoned that because the phone was on his person at the time of his arrest, it was immediately associated with his person and thus could be searched. [FN188] III. Analysis A. Bad Reasoning and Poor Analogizing The Fourth Amendment speaks specifically to people being secure in their . . . papers[ ] and effects[ ] against unreasonable searches and seizures. [FN189] When the Fourth Amendment was drafted, papers and effects obviously carried different connotations than they do today. No longer are all of our papers and effects stored solely in satchels, briefcases, cabinets, and folders. Rather, many of them are stored digitally on hard drives, flash drives, memory cards, and discs. These objects are not enumerated in the Fourth Amendment, but they need not be; the Constitution is a document well-suited to adapt to new situations and changing circumstances. [FN190] Because the technological revolution has undoubtedly altered and affected how society functions, our present circumstances merit a modern interpretation of the Fourth Amendment. This [will] assure[ ] preservation of that degree of privacy against government that existed when the Fourth *1195 Amendment was adopted. [FN191] The courts seem to have realized this, but only to a limited extent. Because the American judicial system is based on precedent and stare decisis, it is easy to see how a few lapses in reasoning coupled with poor analogies can cause problems in subsequent cases. The snowball effect created from bad case law threatens to destroy a vast portion of society's protection under the Fourth Amendment. When new circumstances arise-here, in the realm of technology surrounding modern cell phones-the judiciary must be cautious in applying analogies and borrowing reasoning from previous case law. Often it may be helpful to see how previous courts have dealt with seemingly similar objects, but it is absolutely critical for the courts to evaluate whether the analogs that they have employed are appropriate. B. Analogizing and Distinguishing the Related Objects to Cell Phones 1. Cell Phones Are Not Closed Containers. When the Supreme Court ruled in Belton that closed containers could be searched incident to arrest, it did so with the justification that objects within the containers capable of harming the arresting officer or effecting an escape were just as accessible as other objects within the arrestee's immediate reach. [FN192] Cell phones may very well be-and often are-within their owner's immediate reach, but they do not contain any of the objects that provide the basis for this justification. The Court's definition for container, as laid out in Belton, [FN193] hardly seems applicable to cell phones. Although a cell phone may literally fit within the definition of an object capable of holding another object, [FN194] it is unlikely the Court was referring to objects *1196 that may contain digital items. [FN195] Examples of closed containers that the Court does provide-glove compartments, consoles, luggage, boxes, bags, and clothing-suggest the types of objects the Court had in mind. [FN196] This list illustrates that the Court was contemplating the original justifications for the warrantless search-incident-to-arrest exception because each of these containers could easily hold objects that could harm the arresting officer or effect an escape. Other than the possibility of an arrestee striking an officer with his phone, there is little chance of him doing

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 10

any harm with the object. Even this risk, however, can be averted by simply seizing the object. An arrestee also may use the phone to contact an accomplice to effect his escape, or he may access the phone's memory to destroy evidence of a crime, but these risks are similarly eliminated by seizing the phone. The Court in Belton stated that an officer's exclusive control of the object, there a jacket's zipped pocket, would not affect the search's validity because otherwise that factor would invalidate all searches incident to arrest. [FN197] However, this is not necessarily true. The Court in Chadwick gives a good example of a situation where a search still would be justified despite an officer having exclusive control: [I]f officers have reason to believe that luggage contains some immediately dangerous instrumentality, such as explosives, it would be foolhardy to transport it to the station house without opening the luggage and disarming the weapon. [FN198] Accordingly, if the only justifications for applying the search-incident-to-arrest exception to cell phones are those listed above, then perhaps such searches should be invalidated. Cell phones are easily distinguishable from the closed containers searched in the cases cited above. Unlike a briefcase, a purse, and, most obviously, a rifle case, a cell phone contains electronic components, not weapons. [FN199] For those containers, the search-*1197 incident-to-arrest justifications fit; they may very well contain weapons and instruments of escape. These justifications fail, however, when they are used to rationalize searches of cell phones. Wallets and address books also are distinguishable, albeit for slightly different reasons. While it is unlikely that a wallet will contain any weapon or instrument of escape, and none of the cases discussed above make any reference to this ever actually happening, it is at least theoretically possible. Using the Court's definition of container, [FN200] a wallet is an object that holds other objects, such as currency, pictures, and various plastic cards, but it also could hold razorblades and keys. In the cases discussed above, however, the courts do not use this justification. Instead, they allow searches of wallets and address books because they are items of personal property located in the arrestees' pockets at the times of arrest. [FN201] This justification is simply not supported by the original cases that established the search-incident-to-arrest exception, [FN202] and these cases fail to give any policy reasons for allowing the practice to trump the requirements of the Fourth Amendment. [FN203] Some courts hold that searches of containers incident to arrest are valid because the arrest destroys the arrestee's privacy. [FN204] Justice Marshall points out in his Robinson dissent, however, that this approach was rejected by the Court in Chimel. [FN205] He stated that simply because some interference with an individual's privacy and freedom of movement has lawfully taken place, there was no reason why further intrusions should automatically be allowed *1198 despite the absence of a warrant that the Fourth Amendment would otherwise require. [FN206] The acts of seizing and searching an object are two distinct processes. As the Court stated in United States v. Walter, an officer's authority to possess a package is distinct from his authority to examine its contents. [FN207] Accordingly, although the seizure of objects is often necessary under the justifications cited above, when the seized item is a cell phone, those justifications are not furthered by a subsequent search. 2. Cell Phones Are Not Pagers. As discussed above, when faced with warrantless searches of pagers incident to arrest, many courts began their analysis by analogizing the pagers to closed containers. [FN208] This was simply bad judgment. It is not necessary, however, to discuss further in this Note the many reasons why the pager cases may have been wrongly decided. It is sufficient to show why cell phones are not analogous to pagers. Although we may view pagers as the predecessors of cell phones, they are a different technology. Especially today, with the prevalence of multimedia-capable phones and PDAs (personal data assistants), cell phones are drastically different than the pagers at issue in the cases discussed above. The court in Park distinguished the two in the following manner: Unlike pagers . . . modern cell phones record incoming and outgoing calls, and can also contain address books, calendars, voice and text messages, email, video and pictures. Individuals can store highly personal information on their cell phones, and can record their most private thoughts and conversations on their cell phones through email and text, voice and instant messages. [FN209] *1199 Because of these capabilities, searches of cell phones are vastly more intrusive than searches of pagers.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 11

A cell phone search can reveal information from several aspects of the owner's life, much of which may not have any relevance to the investigation, and all of which should have protection under the Fourth Amendment. The court in Park also noted that the search of a pager implicated significantly fewer privacy interests [than that of a modern cell phone] given the technological differences between the two devices. [FN210] Some courts, however, have found that officers can search pagers because there is not an expectation of privacy in transmitting messages when there is a risk that someone other than the intended recipient will actually receive the messages. [FN211] This also could be the case, however, with emails, letters, and other correspondence that people intend to keep private. There is always the possibility that someone will read another's email or steal a letter from a mailbox, but that does not mean that the sender did not expect some privacy in the communication. When someone sends a text message, they expect it to be read only by the owner of the phone number to which they sent the message. The fact that a friend of the phone's owner also may read the message should not automatically wipe out the sender's expectation that the message will be kept out of the public and government domains. 3. Cell Phones Should Not Be Immediately Associated with the Person. Modern cell phones are small. They can fit inside small pockets and are beginning to fit around our ears and our wrists. Although cell phones usually are found on the person, however, *1200 they are not objects that should be immediately associated with the person. [FN212] While there is little that tells us what these words actually mean or the objects they may denote, several courts have used the distinction. In Chadwick, the Court attempted to create a rule to distinguish between personal property not immediately associated with the person of the arrestee and property that did have such an association. [FN213] Although the case was overruled as to containers within a vehicle, [FN214] courts have drawn upon some of its reasoning. The court in United States v. Passaro held that a wallet in the defendant's pocket was an element of his clothing, his person. [FN215] Similarly, in United States v. Finley, the court held that the defendant's cell phone on his hip, or on his person, was immediately associated with his person. [FN216] These cases set bad precedent for cell phones. If a wallet or pager is considered a separate item, it should not be labeled as part of the person. Arguably, the same reasoning could apply to cell phones, which store much more information than any wallet or pager. The court in Park correctly noted that because of the quantity and quality of information that can be stored on a cellular phone . . . [it] should not be characterized as an element of [an] individual's clothing or person, but rather as a possession[ ] within an arrestee's immediate control. [FN217] Even though the arrestee may forfeit some expectation of privacy upon arrest, that forfeiture should not extend to his possessions without some additional justification for violating his privacy in those possessions. 4. Cell Phones Are Most Comparable to Computers. As previously noted, modern cell phones have the ability to store vast amounts of *1201 information. [FN218] Even the most basic phones may contain lengthy phone books and detailed call logs. The more advanced devices are practically hand-held computers with telephone capabilities, giving the user access to a wealth of public and private data stored online and in the device's memory. As the court in United States v. Arnold noted, the information contained in a laptop and in electronic storage devices renders a search of their contents substantially more intrusive than a search of the contents of a lunchbox or other tangible object. [FN219] The modern cell phone is such an electronic storage device. The cell phone not only stores names and numbers, much like the typical address book, but it also contains detailed call records, pictures, videos, text messages, emails, and much more. Looking at the internal components of a cell phone may not reveal any useful information, [FN220] but, as previously noted, a look into a cell phone's memory can reveal a subjective picture of our life. [FN221] As this technology develops and cell phones become even more advanced, the line between cell phones and personal computers [will continue to become] increasingly blurry. [FN222] Accordingly, the first step in solving the problem of warrantless cell phone searches is for the judiciary to recognize that cell phones are, in fact, much more analogous to modern computers than to wallets, briefcases, or even pagers, and thus police should obtain a search warrant, just as they would when they seize a personal computer from an accused. [FN223] *1202 C. Why and How Cell Phones Should be Treated Differently

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 12

As noted above, when courts' analogizing ceases to be effective, it should end. [FN224] Courts should not be in the practice of forcing analogies between objects just to make their analysis simpler. The facts of each case matter, and the advent of cell phones has drastically changed a key factor in the search and seizure analysis. Searching a lunchbox likely will prove less intrusive than the search of a cell phone because lunchboxes usually do not contain vast amounts of private information. However, if an electronic search is substantially more intrusive because of the amount of information that the search reveals, then a logical question follows: Where should courts draw this quantitative line in the era of expansive technology? It seems justifiable that an arrestee could have an expectation of privacy in merely a few bits [FN225] of digital information. Given that new technology-likely obsolete by publication-allows current cell phones to store up to twelve gigabytes of information, [FN226] the justification for an expectation of privacy in such data only seems to strengthen as the technology evolves. Some courts, in addressing warrantless cell phone searches, seem to give weight to whether the phone was locked or password-protected. [FN227] This factor is irrelevant in setting a baseline *1203 expectation of privacy. Of course, those with passwords may have a heightened privacy expectation, but even unlocked cell phones require physical manipulation in order to access their memories and retrieve data. [FN228] For example, the court in People v. McGee noted that [t]he officer had to progress through approximately five steps to access the defendant's information. [FN229] Even without a password, there is no risk of onlookers casually seeing cell phone data in plain view. [FN230] Furthermore, the link between heightened protection and expectations of privacy is tenuous at best. The fact that a house or car does not have an alarm system does not mean that its owner has any less of a privacy expectation. The same is true for a cell phone owner who fully intends to maintain possession and control of her device's content. Even if courts were to follow Robinson's bright-line rule that permits officers to conduct a full search of an arrestee's person, [FN231] limits still exist. As the Department of Justice states, [t]he limit on this argument is that any search incident to an arrest must be reasonable. While a search of physical items found on the arrestee's person may always be reasonable, more invasive searches in different circumstances may violate the Fourth Amendment. [FN232] Thus, given cell phones' vast storage capacity, [FN233] searches of them should be viewed as increasingly invasive and, therefore, unreasonable as their capacities continue to expand. If a defendant were arrested while carrying a computer, officers could search his person and seize the object without infringing upon the Fourth Amendment, but absent any consent, exigent circumstances, or the like, the officers would be unable to search the defendant's personal effects. Under Terry v. Ohio, in which the Court stated that a search which is reasonable at its inception may violate the Fourth *1204 Amendment by virtue of its intolerable intensity and scope, [FN234] a search of those effects may illegally extend the search of the arrestee beyond what is reasonable. [FN235] Not only must the intrusion into the arrestee's privacy be reasonable under the circumstances, but that privacy can only be superseded by certain justifications. [FN236] The courts seem to have misconstrued the search-incident-to-arrest exception over time by allowing searches to take place when the original justifications for those searches no longer were present. D. Alternatives to a Warrantless Search When an officer arrests someone who has a cell phone in their possession, there may very well be reason to suspect that the phone contains valuable information. This is especially true in the case of drug-related arrests. [FN237] Because the cell phone contains call logs and address books, it would be an obvious target for investigators. That information could help link a defendant to a particular drug transaction, and it also could provide authorities with other persons involved in the illegal activity. The officers may even have seen the defendant using the cell phone during the commission of a crime. [FN238] However, these are precisely the types of situations where probable cause could be used to obtain a search warrant. [FN239] The case of *1205 United States v. Klinger is an ideal illustration of how a search warrant can be used. In Klinger, police officers recovered two cell phones from the defendant's person during a search incident to a lawful arrest. [FN240] Rather than hastily searching through the cell phones at that time, the officers demonstrated

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 13

admirable restraint and placed the items into police evidence storage. [FN241] Nine days after the arrest, the district court judge issued a warrant based on probable cause to search the electronically stored contents of [the] two particularly identified cell phones recovered from [the defendant's] person. [FN242] With commendable particularity, the search warrant identified the objects of the warrant as cellular voice mail messages, text messages, calls received, calls sent, calls missed and photographs. [FN243] This is exactly how the process should function under the Fourth Amendment. This case demonstrates how officers can still retrieve the desired information from a cell phone while staying within constitutional boundaries. In situations where none of the justifications for a search incident to arrest are present, officers are prevented from making hasty judgments that infringe on the arrestee's Fourth Amendment rights. [FN244] The Supreme Court aptly described the issue in Johnson v. United States: The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being *1206 judged by the officer engaged in the often competitive enterprise of ferreting out crime. [FN245] The Court does not indicate that society has antipathy toward combating crime, but rather recognizes society's overarching desire for a reasonable degree of privacy. [FN246] This reasoning is equally applicable to cell phones. It is of great concern if officers are given absolute discretion to delve into an arrestee's life by exploring the vast quantities of data stored within his cell phone. The phone may contain nothing, or purely harmless information, but it could contain everything. Regardless of its outcome, a search is not to be made legal by what it turns up. In law it is good or bad when it starts and does not change character from its success. [FN247] IV. Conclusion Cell phones undoubtedly pose new analytical challenges to judicial interpretations of the Fourth Amendment. These challenges, however, are surmountable. Rather than blindly relying on distinguishable precedent, courts should recognize the nuances of modern cell phone technology. Cell phones are not simply analogs of other personal items; they are unique communicative devices capable of storing immense quantities of personal information in a compact, digital form. By allowing unfettered exploration of this private data, courts permit the government to execute an unwarranted search of the cell phone user's life and habits. The device's portable and easily manipulated form should not relax the Fourth Amendment's stringent requirements. When the intrusion can not reasonably be justified by purposes such as officer protection, evidence preservation, or arrestee containment, a simple seizure of the device must suffice until a warrant can be procured. *1207 What will it cost the criminal justice system to bring an end to warrantless cell phone searches? Without a doubt, it will take some extra effort. Police officers will have to use restraint and take the extra time to obtain a search warrant before conducting the search. Simply because the Constitution may frustrate some efforts, however, does not mean that it should be pushed aside to make life easier for law enforcement officials. Will this extra restraint mean that there is a chance some guilty parties may go free because evidence of their crime was not discovered? Probably so, but [i]t is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. [FN248] Police officers have the responsibility to prevent the occurrence of illegal acts and to capture persons participating in such acts. They certainly have the support of much of society in carrying out these objectives effectively because their success greatly benefits society. However, society, including the officers themselves, also desires to retain the liberty interest protected by the Fourth Amendment. This interest is not diminished by ever-expanding technological developments. Rather, perhaps more so today than ever before, as people increasingly carry enormous amounts of information in their hands or their pockets, people have the right to be secure in their personal effects. Justice Stewart's dissenting opinion in Edwards reiterates a classic reminder from an earlier case: The intrusion here was hardly a shocking one, and it cannot be said that the police acted in bad faith. The Fourth Amendment, however, was not designed to apply only to situations where the intrusion is massive and the violation of privacy shockingly flagrant. Rather, . . . [i]t may be that it is the obnoxious

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 14

thing in its mildest and *1208 least repulsive form; but illegitimate and unconstitutional practices get their first footing in that way, namely, by silent approaches and slight deviations from legal modes of procedure. . . . It is the duty of courts to be watchful for the constitutional rights of the citizen, and against any stealthy encroachments thereon. [FN249] Although these searches may only be constitutional violations in their mildest and least repulsive form, [FN250] it is the duty of courts to uphold the Fourth Amendment to the Constitution, to protect the privacy of citizens, and to bring an end to warrantless cell phone searches. [FN1]. See infra note 76 and accompanying text. [FN2]. See generally Clarice Swisher, The Technological Revolution (2002) (examining important discoveries and advances in computer science and their impact on civilization). [FN3]. See Pew Research Center, The Pew Global Attitudes Project 77-78 (2007), available at http://pewglobal.org/reports/pdf/258.pdf (indicating widespread cell phone use around world and that [t]he proportion of adults who own a cell phone has surged in the past five years). [FN4]. See infra Part II.a.2. [FN5]. 22A C.J.S. Criminal Law 1066 (2006). [FN6]. See infra Part II.b.2. [FN7]. See infra note 76 and accompanying text. [FN8]. See infra Part II.c. [FN9]. See infra Part II.c. [FN10]. Gerald Goggin, Cell Phone Culture 20 (2006). [FN11]. Id. at 24. [FN12]. Tom Farley, The Cell-Phone Revolution, Am. Heritage of Invention & Tech., Winter 2007, at 8, 8, available at http:// www.americanheritage.com/articles/magazine/it/2007/3/2007_3_8_print.shtml. [FN13]. Id. at 10. [FN14]. Id. at 11. [FN15]. See id. (noting that during 1940s and 1950s, necessary switching protocols were beyond capability of AT&T). [FN16]. See Farley, supra note 12, at 11 (identifying December 1947 as month Ring developed idea for cells and month Bell Laboratories created transistors). [FN17]. Goggin, supra note 10, at 26. [FN18]. Farley, supra note 12, at 11. [FN19]. Goggin, supra note 10, at 29-30.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 15

[FN20]. Id. at 30. [FN21]. Id. at 28. [FN22]. Farley, supra note 12, at 15. [FN23]. Id. [FN24]. Id. [FN25]. Other faulty predictions included those by Fortune magazine (1984 estimate: one million by 1989; actual figure: 3.5 million); Donaldson, Lufkin, Jenrette (1990 estimate: fifty-six to sixty-seven million by 2000; actual figure: 109 million); and Herschel Shosteck Associates (1994 estimate: sixty to ninety million by 2004; actual figure: 182 million). Id. [FN26]. Goggin, supra note 10, at 31. [FN27]. Id. [FN28]. Farley, supra note 12, at 18. [FN29]. Goggin, supra note 10, at 32. [FN30]. Id. [FN31]. Id. at 33. [FN32]. Id. at 189. Also, [t]hey may be used to shop, bank, deal in shares, or receive the latest sports scores-along with a video clip of the action. They may be used as an automatic credit card or [be] embedded into other devices such as a palm, pocket, or laptop PC. Janey Gordon, The Cell Phone: An Artifact of Popular Culture and a Tool of the Public Sphere, in The Cell Phone Reader 45, 47 (Anandam Kavoori & Noah Arceneaux eds., 2006). CTIA, an international trade association for the wireless telecommunications industry, reports that wireless data service revenues (all non-voice wireless services) reached $15.2 billion in 2006, a seventy-seven percent increase over 2005 revenues. Press Release, CITA, CITA-The Wireless Association Releases Comprehensive Wireless Industry Survey Results (Mar. 28, 2007); see also USA SMS Traffic Almost Doubled in 2006 - Report, Cellular-News, Mar. 29, 2007, http://www.cellular-news.com/story/22869.php (summarizing CITA report). Furthermore, in 2006, more than 158 billion text messages and 2.7 billion multimedia messages were sent. Press Release, supra. Also notably, wireless customers used more than 1.7 trillion minutes in that same year. Id. For information on location tracking, which also became popular with third-generation phones, see generally M. Wesley Clark, Cell Phones As Tracking Devices, 41 Val. U. L. Rev. 1413 (2007), which explains the burden of proof necessary for the government to compel cell phone providers to disclose customers' cell phone location information, and Kevin McLaughlin, Note, The Fourth Amendment and Cell Phone Location Tracking: Where Are We?, 29 Hastings Comm. & Ent. L.J. 421 (2007), which argues that cell phone location tracking constitutes unconstitutional searching under the Fourth Amendment. [FN33]. See Goggin, supranote 10, at 2 (statingthat cell phones currently are used for staying in constant contact, text messaging, fashion, identity-construction, music, mundane daily work routines, remote parenting, interacting with television programs, watching video, surfing the Internet, meeting new people, dating, flirting, loving, bullying, mobile commerce, and locating people). [FN34]. Adriana de Souza e Silva, Interfaces of Hybrid Spaces, in The Cell Phone Reader, supra note 32, at 19, 19. [FN35]. International Telecommunication Union, Mobile Cellular Subscribers,

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 16

http://www.itu.int/ITU-D/ICTEYE/Indicators/Indicators.aspx (follow 3. Mobile cellular, subscribers per 100 people hyperlink; then follow Select output PDF and View Report hyperlink) (last visited Sept. 21, 2008) (calculating statistic to be 83.51 cell phone users out of every 100 inhabitants). For a more complete, and more technologically detailed, history of cell phones, see Goggin, supra note 10, at 19-33, and Farley, supra note 12, at 8-19. [FN36]. Computer Crime & Intellectual Prop. Section, Criminal Div., U.S. Dep't of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations viii (2002), available at http:// www.cybercrime.gov/s&smanual2002.pdf. [FN37]. Id. [FN38]. L.A. Johnson, A Tough Call, Pittsburgh Post-Gazette, Oct. 27, 2004, at C1; see also Kate Duffy, Cell Phone Spy Busted, WCAX-TV Channel 3 News, June 22, 2006, http://www.wcax.com/global/story.asp?s=5068021 (noting use of camera phones to spy in dressing rooms and tanning booths). [FN39]. See Cellphones: Criminals Use Cameraphones to Assist in Robbing, http://gizmodo.com/gadgets/cellphones/criminals-use-cameraphones-to-assist-in-robbing-192249.php (last visited Aug. 4, 2008) (discussing South African gang members practice of photographing possible victims withdrawing large amounts of money in banks and then sending photos to another gang member outside who would stalk and rob victim). [FN40]. Robert Snell et al., Cops: Gang Rape of 11-Year-Old Girl Taped on Cell Phone, Detroit News, Feb. 15, 2007, at 1A. [FN41]. See, e.g., Posting of Ed Dickson to Fraud, Phishing and Financial Misdeeds, Criminals Using Text Messaging to Commit Cybercrime, http:// fraudwar.blogspot.com/2006/07/criminals-using-text-messaging-to.html (July 19, 2006, 21:27 EST) (discussing how malware can be placed onto host computers after cell phones receive false dating service text messages). [FN42]. See Chris Tisch, Cell Phone Trails Snare Criminals, Call or No, St. Petersburg Times (Fla.), Sept. 17, 2005, at 1A (noting that many criminals make calls on cell phones around time of crime). [FN43]. See United States v. Slater, 971 F.2d 626, 637 (10th Cir. 1992) (recognizing cellular phone as tool of trade for drug dealing); see also United States v. Fierros-Alavarez, 547 F. Supp. 2d 1206, 1208 (D. Kan. 2008) (stating testimony that drug couriers commonly use cellular telephones to stay in contact with suppliers, to deal with changes in plans, to learn the time and location for the delivery, or to communicate with the eventual recipient of the contraband). [FN44]. See Tisch, supra note 42 (quoting Bruce Bartlett, Chief Assistant, Pinellas-Pasco State Attorney's Office). [FN45]. Computer Crime & Intellectual Prop. Section, supra note 36, at viii. [FN46]. See, e.g., United States v. Valdez, No. 06-CR-336, 2008 WL 360548, at *1 (E.D. Wis. Feb. 8, 2008) (using defendant's cell phone to establish that he had been in contact with co-conspirators). [FN47]. See, e.g., Press Release, ScanDisk, ScanDisk Announces the 12-Gigabyte microSDHC Card - the World's Largest Capacity Card for Mobile Phones (Jan. 7, 2008), available at http:// www.Scandisk.com/Corporate/PressRoom/PressReleases/PressRelease.aspx?ID=4079 (noting that 12GB card is capable of storing approximately 1,500 songs, 3,600 photos, and 24.5 hours of video). This card highlights the growing popularity of mobile phones with storage intensive features. Id. [FN48]. Hilary Hylton, What Your Cell Knows About You, Time, Aug. 15, 2007,

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 17

http://www.time.com/time/health/article/0,8599,1653267,00.html (quoting Rick Mislan, Assistant Professor of Computer Information Technology at Purdue University). [FN49]. For more information on flasher technology, see Expert: Flasher Technology Digs Deeper for Digital Evidence, PhysOrg.com, Apr. 12, 2007, http://www.physorg.com/news95611284.html, which explains that flasher technology provides deeper access to data on cell phones, PDAs, and smartphones by plugging these devices into a flasher box and extracting their entire contents, including contacts, call history, and deleted images and video, granting direct access to everything that may have existed in the phone. [FN50]. Hylton, supra note 48; see also Is Your Cell Phone Spilling Your Secrets?, MSN Money, Aug. 31, 2006, http:// articles.moneycentral.msn.com/Banking/FinancialPrivacy/IsYourCellPhoneSpillingYourSecrets.aspx (explaining growing problem with secondary users accessing deleted information from Internet-sold secondhand phones, including credit card numbers, banking passwords, business secrets, and evidence of adultery). [FN51]. A SIM card is a portable memory chip, similar to a mini hard drive, that stores phone information. What is a SIM Card?, http:// www.wisegeek.com/what-is-a-sim-card.htm (last visited Sept. 21, 2008). [FN52]. SeeHylton, supra note 48 (noting that Purdue University Assistant Professor Rick Mislan pulled off 250 deleted contacts from memory of suspect's cell phone). [FN53]. Id. (quoting Chris Calabrese of Technology & Liberty Project at American Civil Liberties Union). [FN54]. U.S. Const. amend. IV. [FN55]. [Magistrates were preferred] so that an objective mind might weigh the need to invade that privacy in order to enforce the law. The right of privacy was deemed too precious to entrust to the discretion of those whose job is the detection of crime and the arrest of criminals. McDonald v. United States, 335 U.S. 451, 455-56 (1948). [FN56]. Chimel v. California, 395 U.S. 752, 758-59 (1969) (quoting Trupiano v. United States, 334 U.S. 699, 705 (1948)). [FN57]. 22A C.J.S. Criminal Law, supra note 5, 1066. For purposes of this Note, it is assumed that probable cause exists, but the warrant requirement has not been met. [FN58]. Computer Crime & Intellectual Prop. Section, supra note 36, at 1 (citing Illinoisv. Rodriguez, 497 U.S. 177, 185 (1990) (regarding exceptions to warrant requirement); Illinois v. Andreas, 463 U.S. 765, 771 (1983) (regarding requirement for reasonable expectation of privacy)). [FN59]. Id. [FN60]. Id. at 2; see also discussion infra Part II.b.4.c. [FN61]. See generally Robin Miller, Annotation, Expectation of Privacy in Text Transmissions to or from Pager, Cellular Telephone, or Other Wireless Personal Communications Device, 25 A.L.R. 6th 201 (2007) (discussing various cases and their differing treatments of privacy expectations in wireless devices). [FN62]. 442 U.S. 735, 742-45 (1979) (reasoning that because users realize they convey phone numbers to telephone company that may keep permanent records of calls and reveal such information to police, users voluntarily turn information over to third party, and thereby lose any expectation of privacy). [FN63]. 389 U.S. 347, 353 (1967).

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 18

[FN64]. Smith, 442 U.S. at 741. But see id. at 748 (Stewart, J., dissenting) (arguing numbers dialed from private telephone are not without content). [FN65]. There are additional exceptions to the general warrant requirement that are beyond the scope of this Note and not discussed. [FN66]. Computer Crime & Intellectual Prop. Section, supra note 36, at 1. A search conducted without a warrant is per se unreasonable . . . subject only to a few specifically established and well-delineated exceptions. Schneckloth v. Bustamonte, 412 U.S. 218, 219 (1973) (quoting Katz, 389 U.S. at 357). [FN67]. Schneckloth, 412 U.S. at 219. More information on the consent exception can be found in Computer Crime & Intellectual Prop. Section, supra note 36, at 10-18. [FN68]. United States v. Carey, 172 F.3d 1268, 1272-73 (10th Cir. 1999); United States v. Turner, 169 F.3d 84, 86 (1st Cir. 1999). [FN69]. United States v. Blas, No. 90-CR-162, 1990 WL 265179, at *20-21 (E.D. Wis. Dec. 4, 1990) (analogizing pager to closed container). [FN70]. 68 Am. Jur. 2d Searches and Seizures 232 (2000). [FN71]. Id. [FN72]. For an extensive analysis of the plain view doctrine and the implications of applying it to digital evidence, see generally RayMing Chang, Why the Plain View Doctrine Should Not Apply to Digital Evidence, 12 Suffolk J. Trial & App. Advoc. 31 (2007). See also infra notes 220, 229 and accompanying text. [FN73]. United States v. McConney, 728 F.2d 1195, 1199 (9th Cir. 1984) (en banc). A test for determining whether such circumstances exist was set forth by the Fourth Circuit. United States v. Reed, 935 F.2d 641, 642 (4th Cir. 1991) (considering (1) degree of urgency involved, (2) amount of time necessary to obtain warrant, (3) whether evidence is about to be removed or destroyed, (4) possibility of danger at site, (5) information indicating possessors of contraband know police are on their trail, and (6) ready destructibility of contraband). [FN74]. See State v. DeLuca, 739 A.2d 455, 463 (N.J. Super. Ct. App. Div. 1999) (noting possibility of losing information stored in pager's memory when additional calls are received); see also United States v. Ortiz, 84 F.3d 977, 984 (7th Cir. 1996) (justifying retrieval of numbers from pager because electronic data is easily destroyed). [FN75]. Computer Crime & Intellectual Prop. Section, supra note 36, at 19. [FN76]. United States v. Hudson, 100 F.3d 1409, 1419 (9th Cir. 1996); see also Agnello v. United States, 269 U.S. 20, 30 (1925) (noting right to contemporaneously search persons lawfully arrested without search warrant); Weeks v. United States, 232 U.S. 383, 392 (1914) (noting government's right to search the person of the accused when legally arrested to discover and seize the fruits or evidences of crime). [FN77]. United States v. Robinson, 414 U.S. 218, 224 (1973). The area within [the arrestee's] immediate control is said to mean the area from within which he might gain possession of a weapon or destructible evidence. Chimel v. California, 395 U.S. 752, 763 (1969). [FN78]. United States v. Chadwick, 433 U.S. 1, 15 (1977) (quoting Preston v. United States, 376 U.S. 364, 367 (1964)); see also Chimel, 395 U.S. at 768 (holding search of entire house unreasonable because it went far beyond the petitioner's person and the area from within which he might have obtained either a weapon or something that could have been used as evidence against him). But see infra notes 176-82 and accompanying text.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 19

[FN79]. See Swain v. Spinney, 117 F.3d 1, 6 (1st Cir. 1997) (stating that Robinson, 414 U.S. 218, did not hold that all possible searches are automatically permissible as searches incident to arrest, but that they must [still] be tested by the Fourth Amendment's general proscription against unreasonable searches and seizures' (quoting United States v. Edwards, 415 U.S. 800, 808 n.9 (1974))). [FN80]. See Terry v. Ohio, 392 U.S. 1, 21 (1968) (noting that there is no ready test for determining reasonableness other than [this] balancing (quoting Camara v. Mun. Court, 387 U.S. 523, 536-37 (1967))). [FN81]. Preston v. United States, 376 U.S. 364, 367 (1964) (explaining risk in situation where weapon or evidence is under accused's immediate control). [FN82]. See discussion infra Part II.b.4.a-c. [FN83]. See infra Part III.b. [FN84]. See supra note 77 and accompanying text. [FN85]. 414 U.S. 218 (1973). [FN86]. Id. at 220. [FN87]. Id. at 222-23. [FN88]. Id. at 223. [FN89]. Id. at 235. The Court further noted that custodial arrest of a suspect based on probable cause is a reasonable intrusion under the Fourth Amendment; that intrusion being lawful, a search incident to the arrest requires no additional justification. Id. [FN90]. Id. [FN91]. Id. at 256 (Marshall, J., dissenting). [FN92]. 453 U.S. 454 (1981). [FN93]. Id. at 456. [FN94]. Id. at 460. [FN95]. Id. at 461. The Court defined container to mean any object capable of holding another object, including closed or open glove compartments, consoles, or other receptacles located anywhere within the passenger compartment, as well as luggage, boxes, bags, clothing, and the like. Id. at 460 n.4. [FN96]. See id. at 461 n.5 (rejecting reasoning of court of appeals). [FN97]. 846 F.2d 279, 282 (5th Cir. 1988) (noting that Belton eradicates any differences between searches of the person and searches within the arrestee's immediate control). [FN98]. United States v. Hudson, 100 F.3d 1409, 1420 (9th Cir. 1996). [FN99]. Id. The search also met the temporal requirement of the search-incident-to-arrest exception because only three minutes elapsed between the arrest and the search of the case. Id.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 20

[FN100]. See United States v. Monclavo-Cruz, 662 F.2d 1285, 1286-87 (9th Cir. 1981) (outlining factual background of case and legal issue presented). [FN101]. Id. at 1288. Although unrelated to the search-incident-to-arrest exception, the court noted that the Fourth Amendment protects possessions within an arrestee's immediate control at the station house unless the possessions are elements of clothing. Id. at 1290. The court distinguished a wallet in the pocket, found to be an element of the arrestee's clothing in United States v. Passaro, 624 F.2d 938, 944 (9th Cir. 1980), from a purse on an arrestee's lap by analogizing the purse to a suitcase or briefcase. Monclavo-Cruz, 662 F.2d at 1290. [FN102]. 995 F.2d 776, 777 (7th Cir. 1993). [FN103]. 877 F.2d 1341, 1344 (7th Cir. 1989). [FN104]. Id. at 1346. [FN105]. See id. at 1346-47 (citing cases from several other circuits with same holding). [FN106]. See Rodriguez, 995 F.2d at 778 (finding search valid because it took place immediately upon arrestee's arrival at initial place of detention); see also United States v. Edwards, 415 U.S. 800, 803 (1974) (stating in dicta that searches and seizures that could be made on the spot at the time of arrest may legally be conducted later when the accused arrives at the place of detention). But see Monclavo-Cruz, 662 F.2d at 1289-90 (distinguishing dicta in Edwards from the court's holding authorizing warrantless search of suspect's clothes at station house and confining that exception to person and clothing of arrestee). Even assuming, arguendo, that Edwards's dicta is correct, a warrantless search of a cell phone should not be made even at the time of arrest. See infra Part III. [FN107]. Rodriguez, 995 F.2d at 778. [FN108]. See supra Part II.b.4.a. [FN109]. United States v. Galante, No. 94 Cr. 633 (LMM), 1995 WL 507249, at *3 (S.D.N.Y. Aug. 25, 1995). [FN110]. United States v. Lynch, 908 F. Supp. 284, 288 (D.V.I. 1995). [FN111]. See id. at 288 (noting further that under New York v. Belton, 453 U.S. 454, 462 (1981), [t]he fact that the object is no longer at risk of being accessed by the defendant, because it is in the exclusive control of the arresting officers, is immaterial). The court failed, however, to identify how the pager search furthered either of the police's stated interests. [FN112]. Lynch, 908 F. Supp. at 289 n.5; see also United States v. Passaro, 624 F.2d 938, 944 (9th Cir. 1980) (finding wallet in defendant's pocket to be element of his clothing, his person, which is, for a reasonable time following a legal arrest, taken out of the realm of protection from police interest). [FN113]. United States v. Chan, 830 F. Supp. 531, 533 (N.D. Cal. 1993). These numbers linked the defendant to heroin dealings that the DEA was investigating. Id. [FN114]. Id. at 536 (noting that pager was product of legal search of defendant's person and that search destroyed his privacy interests in its contents); see also supra note 111 and accompanying text. [FN115]. United States v. Reyes, 922 F. Supp. 818, 832-34 (S.D.N.Y. 1996) (citing Chan, 830 F. Supp. at 535). While the first pager was seized incident to a valid arrest, the court held the scope of the search of the second pager reasonable by analogizing it to a closed container. Id. at 834-36. In contrast, the court invalidated the search of a third pager based on a lack of exigent circumstances. Id.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 21

[FN116]. Id. at 833. [FN117]. NTS Am. Jur. 2d Computers and the Internet 20 (2007). [FN118]. See Search Warrants: Computer Devices, Crim. L. News (Office of the Dist. Attorney, Westchester County, N.Y.), Feb. 2007, at 7, 7, available at http://www.da.westchester.ny.us/Newsletter0307.pdf (instructing investigators to describe seized items to greatest extent possible, as well as facts showing probable cause). [FN119]. State v. Washington, No. 47773-1-I, 2002 WL 104492, at *2 (Wash. Ct. App. Jan. 28, 2002). [FN120]. Id. The court simply stated, without discussion, that the search of the bag itself was valid. Id. Although the court's lack of explanation may be explained by the fact that the defendant did not specifically challenge the search of the bag, id. at *2 n.1, such searches are also easily justified based on New York v. Belton, 453 U.S.454 (1981). See supranotes 94-96 and accompanying text. [FN121]. Washington, 2002 WL 104492, at *1. [FN122]. Id. at *3. [FN123]. Id. (noting further that probable cause of stolen computer was not enough to circumvent warrant requirement); see also United States v. David, 756 F. Supp. 1385, 1390 (D. Nev. 1991) (finding defendant's computer memo book was entitled to same Fourth Amendment protection as any other closed container). [FN124]. United States v. Arnold, 454 F. Supp. 2d 999, 1001 (C.D. Cal. 2006). [FN125]. Id. at 1000. Such information could include diaries, personal letters, medical information, photos, financial records, attorneys' confidential client information, reporters' confidential sources or story leads, and inventors' and corporate executives' trade secrets. Id. at 1004. [FN126]. Id. at 1007. That this case involves a different exception to the warrant requirement-the border search-only strengthens the argument for requiring warrants in other contexts. The Supreme Court stated that searches made at the border, pursuant to the long-standing right of the sovereign to protect itself by stopping and examining persons and property crossing into this country, are reasonable simply by virtue of the fact that they occur at the border. United States v. Ramsey, 431 U.S. 606, 616 (1977); see also Carroll v. United States, 267 U.S. 132, 154 (1925) (Travel[ ]ers may be so stopped in crossing an international boundary because of national self protection reasonably requiring one entering the country to identify himself as entitled to come in, and his belongings as effects which may be lawfully brought in.). Because of the apparent ease in which authorities can conduct searches at the border, the Arnold court's refusal to allow even these permissive searches to extend into the electronic realm signals hope for the protection of cell phones. [FN127]. See supra note 58 and accompanying text. For more information on what constitutes a reasonable expectation of privacy, see supra Part II.b.1. [FN128]. Beckwith v. Erie County Water Auth., 413 F. Supp. 2d 214, 223-24 (W.D.N.Y. 2006). Although Beckwith dealt with an authority's request for the records rather than a warrantless search of the records, id., it is one of the few cases that discusses privacy expectations related to numbers dialed from cell phones. Thus, the reasoning may be applicable to numbers retrieved in a warrantless search. [FN129]. Id. at 224 (quoting Smith v. Maryland, 442 U.S. 735, 744 (1979)); see also supra note 62 and accompanying text. [FN130]. Beckwith, 413 F. Supp. 2d at 224; see also Commonwealth v. Cahoon, No. 05-520, 2006 WL 1084101,

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 22

at *2 (Mass. Super. Ct. Feb. 27, 2006) (finding no expectation of privacy in numbers retrieved from defendant's cell phone in warrantless search). [FN131]. Smith, 442 U.S. at 747 (Stewart, J., dissenting). [FN132]. Id. at 746-47 (quoting Katz v. United States, 389 U.S. 347, 352 (1967)). [FN133]. Id. at 749 (Marshall, J., dissenting) (Privacy is not a discrete commodity, possessed absolutely or not at all.). [FN134]. See id. (Those who disclose certain facts to a bank or phone company for a limited business purpose need not assume that this information will be released to other persons for other purposes.) [FN135]. Id. at 749, 751. [FN136]. Id. at 750 (It is idle to speak of assuming risks in contexts where, as a practical matter, individuals have no realistic alternative.). [FN137]. United States v. Chan, 830 F. Supp. 531, 534 (N.D. Cal. 1993) (discussing pagers, but finding expectation of privacy under rationale applicable to cell phones). The court also quoted United States v. Blas, No. 90-CR-162, 1990 WL 265179, at *21 (E.D. Wis. Dec. 4, 1990), which said that an individual has the same expectation of privacy in a pager, computer or other electronic data storage and retrieval device as in a closed container. Furthermore, the court in United States v. Zavala, No. 07-20200, 2008 WL 3877232, at *10 (5th Cir., Aug. 22, 2008), stated that the defendant had a reasonable expectation of privacy regarding the wealth of private information within the cell phone, including emails, text messages, call histories, address books, and subscriber numbers. [FN138]. State v. Smith, No. 07-CA-47 2008 WL 2861693, at *8 (Ohio Ct. App. July 25, 2008). [FN139]. Id. [FN140]. Id. The line that the court drew in State v. Smith also seems to conform with the Katz and Smith v. Maryland distinction of contents of communications, whereby call records and phone numbers presumably do not carry the same content as photos. See supra notes 63-64 and accompanying text. [FN141]. See, e.g., United States v. Finley, 477 F.3d 250, 260 (5th Cir. 2007) (Finley concedes that the officers' post-arrest seizure of his cell phone from his pocket was lawful, . . . [but asserts that] the police had no authority to examine the phone's contents without a warrant.). [FN142]. See, e.g., Terry v. Ohio, 392 U.S. 1, 30 (1968) (upholding officer's removal of weapons after pat-down search of defendant's outer clothing). But see Sibron v. New York, 392 U.S. 40, 65 (1968) (holding invalid officer's removal of heroin from defendant's pocket after simply thrusting in his hand to search for drugs). [FN143]. See United States v. Diaz, 494 F.3d 221, 226, 226 n.5 (1st Cir. 2007) (holding seizure of cell phone valid under plain view exception, but noting in footnote that it is unclear whether information gained from phone constituted search); United States v. Morales-Ortiz, 376 F. Supp. 2d 1131, 1141 (D.N.M. 2004) (finding that agents properly seized defendant's pager and cell phone under plain view doctrine). [FN144]. See United States v. Lottie, No. 3:07cr51RM, 2008 WL 150046, at *3 (N.D. Ind. Jan. 14, 2008) (holding exigent circumstances justified warrantless search of cell phone because officers believed that counter-surveillance was being conducted in immediate vicinity); United States v. Zamora, No. 1:05 CR 250 WSD, 2006 WL 418390, at *4-5 (N.D. Ga. Feb. 21, 2006) (finding cell phones to be dynamic [and] subject to change without warning because of risk that number stored in phone's memory could be deleted upon receipt of new call,

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 23

and noting it was cell phone technology's function and limitation that motivated immediate warrantless search). [FN145]. See, e.g., United States v. Galante, No. 94 Cr. 633 (LMM), 1995 WL 507249, at *3 (S.D.N.Y. Aug. 25, 1995) (holding consent to search car included consent to search cell phone within car to extent it could be considered closed container). A situation in Maryland came out differently, however, when a mother allowed police to search her son's room for a stolen handgun. City/County Digest, Balt. Sun, Aug. 2, 2006, at 3B. When police found the son's cell phone, they searched it without a warrant and found a photo of the gun in a text message. Id. Because the evidence was obtained from a warrantless cell phone search, the State's attorney did not pursue charges. Id.; see also Smith v. State, 713 N.E.2d 338, 343 (Ind. Ct. App. 1999) (holding that accessing cell phone's computer memory to retrieve its contents was invalid and exceeded scope of defendant's consent to search his vehicle). [FN146]. United States v. Morales-Ortiz, 376 F. Supp. 2d 1131, 1135-36 (D.N.M. 2004). [FN147]. Id. at 1141 (holding that plain view doctrine only permits seizure of item, not manipulation of item to gain information). [FN148]. Id. at 1142 (refusing to find exigent circumstances because search was of phone book's memory rather than incoming call list). [FN149]. Id. at 1143 (stating that because phone would have been searched legally pursuant to search warrant that was later issued, information's discovery was inevitable). [FN150]. Id. at 1143 n.8 (noting further that search warrant allowing for seizure of cell phones is sufficient to find information retrieved from those phones admissible under circumstances). [FN151]. See People v. McGee, No. 2006NY047717, 2007 WL 1947624, at *1 (N.Y. Crim. Ct. June 29, 2007) (stating that officers also saw images on defendant's cell phone screen at same time). [FN152]. Id. at *2 (The officer had to progress through approximately five steps to access the video and still images.). [FN153]. See id. at *5 (noting that independent source rule applies to evidence initially discovered during, or as a result of, an illegal search but later obtained through activities untainted by the illegal search). [FN154]. Id. at *6. In a similar case out of North Carolina, police seized a suspect's camera phone, activated the phone, and retrieved several explicit images linking the suspect to a sexual offense. See Posting of Dai Hunter to photo.net, No Warrant? Search Illegal! Case Thrown Out, http:// photo.net/bboard/q-and-a-fetch-msg?msg_id=00C7EI (May 8, 2005, 06:57 a.m.) (discussing news reports surrounding North Carolina case). The superior court judge refused to allow the pictures into evidence because they were obtained without a search warrant. Id. [FN155]. United States v. Murphy, No. 1:06CR00062, 2006 WL 3761384, at *2-3 (W.D. Va. Dec. 20, 2006). [FN156]. Id. at *4. [FN157]. United States v. Dennis, No. 07-008-DLB, 2007 WL 3400500, at *2 (E.D. Ky. Nov. 13, 2007). [FN158]. Id. at *8. [FN159]. Id. at *7. [FN160]. Id.at *8. But see supra note 81 and accompanying text (discussing narrower policy justifications for

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 24

search-incident-to-arrest exception). [FN161]. United States v. Deans, No. 07-CR-423 (JMR/SNR), 2008 WL 880195, at *5 (D. Minn. Mar. 28, 2008). [FN162]. Id. [FN163]. Id. (citing United States v. James, 353 F.3d 606, 614 (8th Cir. 2003), which found defendant intended to keep contents of disks private). [FN164]. New York v. Belton, 453 U.S. 454, 460-61 (1981) (holding scope of vehicle's search incident to owner's lawful arrest extends to open and closed containers within passenger compartment). [FN165]. Deans, 2008 WL 880195, at *5. [FN166]. Id. [FN167]. United States v. Mercado-Nava, 486 F. Supp. 2d 1271, 1274 (D. Kan. 2007). [FN168]. Id. at 1277-78. The court said that the evidentiary justification was underscored where evidence may be lost due to the dynamic nature of the information on cell phones, analogizing them to pagers. Id. at 1278. [FN169]. United States v. Valdez, No. 06-CR-336, 2008 WL 360548, at *3-4 (E.D. Wis. Feb. 8, 2008). [FN170]. Id. at *1. [FN171]. Id. The detective stated that he recalled receiving an alert from other drug investigators that one company, U.S. Cellular, enables its users to remotely delete all of the information contained on their phones. Id. The detective was unable to recall, however, whether he received this alert prior to the arrest at issue. Id. [FN172]. See id. at *3-4 (distinguishing United States v. Park, No. CR 05-375 SI, 2007 WL 1521573 (N.D. Cal. May 23, 2007), because in Park search occurred hour and half after arrest and was not supported by any exigencies). [FN173]. United States v. Cote, No. 03CR271, 2005 WL 1323343, at *6 (N.D. Ill. May 26, 2005). [FN174]. Id. [FN175]. Id. (citing United States v. Edwards, 415 U.S. 800, 803 (1974)); People v. Diaz, 81 Cal. Rptr. 3d 215, 217 (Ct. App. 2008) (holding ninety minute delay between arrest and search of defendant's cell phone did not render search invalid as incident to arrest); see also supra note 106 and accompanying text. [FN176]. Park, 2007 WL 1521573, at *1; see also State v. Novicky, No. A07-0170, 2008 WL 1747805, at *4-6 (Minn. Ct. App. Apr. 15, 2008) (finding search of defendant's cell phone on first day of trial was not incident to arrest due to remoteness in time from arrest, but holding search valid under automobile exception). [FN177]. Park, 2007 WL 1521573, at *6. In United States v. Edwards, the court authorized a warrantless search of a suspect's clothes at the police station ten hours after the arrest. 415 U.S. 800, 801, 807-08. The court noted that the officers were examining the clothing for evidence of a crime, which is normal in a custodial arrest, and that the suspect was no more imposed upon than he could have been at the time and place of the arrest or immediately upon arrival at the place of detention. Id. at 805. In United States v. Monclavo-Cruz, 662 F.2d 1285, 1290 (9th Cir. 1981), the Ninth Circuit confine[d] the Edwards exception to the person and clothing of an arrestee. [FN178]. Park, 2007 WL 1521573, at *7.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 25

[FN179]. United States v. Chadwick, 433 U.S. 1 (1977). In Chadwick, federal narcotics agents arrested the defendants as they lifted a large footlocker into the truck of their car. Id. at 4. The agents seized the footlocker that was in the car's open truck, stored it at the federal building, and conducted a warrantless search of it an hour and a half after the arrest. Id. The Court held that this search violated the Warrant Clause because, unlike searches of the person, searches of possessions within an arrestee's immediate control cannot be justified by any reduced expectations of privacy caused by the arrest. Id. at 16 n.10. But see infra note 181 and accompanying text. [FN180]. See Chadwick, 433 U.S. at 16 n.10 (distinguishing searches of person from searches of possessions within arrestee's immediate control). [FN181]. Park, 2007 WL 1521573, at *6 (internal citations omitted) (quoting Chadwick, 433 U.S. at 16 n.10). Chadwick was abrogated on other grounds by California v. Acevedo, 500 U.S. 565 (1991), which overrul[ed] Chadwick as to containers within a vehicle and [held that] police may search a container within a vehicle without a warrant if they have probable cause to believe that the container itself holds contraband or evidence. Park, 2007 WL 1521573, at *6 n.4. However, Chadwick's holding that a search incident to arrest must not be too remote in time or place is stillgood law. Id.; see alsosupra note 78 and accompanying text. [FN182]. Park, 2007 WL 1521573, at *8. [FN183]. See, e.g., supra notes 173-75 and accompanying text. [FN184]. United States v. Finley, 477 F.3d 250 (5th Cir. 2007). [FN185]. Id. at 254. [FN186]. Id. at 259 (finding that defendant had right to exclude others from using phone and had reasonable expectation to be free from government and general public intrusion, even though employer could have read messages once he returned phone, and noting that employer permitted personal use of phone). [FN187]. Id. at 260 n.7. The court also found the search was substantially contemporaneous because, although it took place after the arrest when the officers took the defendant back to his residence, the administrative processes incident to the arrest had not yet been completed. Id. [FN188]. Id. [FN189]. U.S. Const. amend. IV. [FN190]. See, e.g., Kyllo v. United States, 533 U.S. 27, 34 (2001) (finding that obtaining information regarding interior of home with sense-enhancing technology constituted search); Katz v. United States, 389 U.S. 347, 353 (1967) (finding government's actions in electronically listening to and recording person using telephone booth violated expectation of privacy and constituted search and seizure within meaning of Fourth Amendment). [FN191]. Kyllo, 533 U.S. at 34. [FN192]. New York v. Belton, 453 U.S. 454, 460 (1981) (citing Chimel v. California, 395 U.S. 752, 763 (1969)); see also supra notes 93-96 and accompanying text. [FN193]. See supra note 95 and accompanying text. [FN194]. Belton, 453 U.S. at 460 n.4. [FN195]. But see Smith v. State, 713 N.E.2d 338, 343 (Ind. Ct. App. 1999) (stating that cell phone is capable of

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 26

hiding items such as drugs or money and holding that seizure, but not search, was valid to determine whether phone was operational). [FN196]. Belton, 453 U.S. at 460 n.4. [FN197]. See id. at 461 n.5 (criticizing lower court's broad and unworkable rationale). [FN198]. United States v. Chadwick, 433 U.S. 1, 15 n.9 (1977). [FN199]. The searches of wallets and address books, because of the justifications the courts use to uphold them, pose a different problem that is discussed infra in Part III.b.3. [FN200]. Belton, 453 U.S. at 460 n.4. [FN201]. See, e.g., United States v. Molinaro, 877 F.2d 1341, 1346-47 (7th Cir. 1989) (citing United States v. Robinson, 414 U.S. 218 (1973)). More detailed discussion about the search of such items is contained in Part III.b.3, infra. [FN202]. Preston v. United States, 376 U.S. 364, 367 (1964) (explaining risk in situation where weapon or evidence is under accused's immediate control). [FN203]. See Molinaro, 877 F.2d at 1346-47 (agreeing with precedent without providing reasoning). [FN204]. See United States v. Robinson, 414 U.S. 218, 235 (1973) (stating that lawful, custodial arrest is reasonable intrusion, and search incident to arrest requires no additional justification). [FN205]. Id. at 256 (Marshall, J., dissenting). [FN206]. Id. at 257 (quoting Chimel v. California, 395 U.S. 752, 767 n.12 (1969)). [FN207]. 447 U.S. 649, 654 (1980). [FN208]. See, e.g., United States v. Galante, No. 94 Cr. 633 (LMM), 1995 WL 507249, at *3 (S.D.N.Y. Aug. 25, 1995) (analogizing pager to closed container). [FN209]. United States v. Park, No. CR 05-375 SI, 2007 WL 1521573, at *8 (N.D. Cal. May 23, 2007) (citation omitted). [FN210]. Id. at *9. [FN211]. See United States v. Meriwether, 917 F.2d 955, 959 (6th Cir. 1990) (identifying rule that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties' (quoting Smith v. Maryland, 442 U.S. 735, 743-44 (1979))). The court in United States v. Valdez cited Smith v. Maryland for the same proposition, noting that there were no privacy concerns raised when a detective searched only a cell phone's address book and call history. United States v. Valdez, No. 06-CR-336, 2008 WL 360548, at *3 & n.3 (E.D. Wis. Feb. 8, 2008). Dissenting in Smith, however, Justice Stewart doubted anyone would be happy if a list of their dialed numbers were broadcast to the world. Smith, 442 U.S. at 748 (Stewart, J., dissenting). This is not because such a list might in some sense be incriminating, but because it easily could reveal the identities of the persons and the places called, and thus reveal the most intimate details of a person's life. Id. [FN212]. See infra notes 213-17 and accompanying text. [FN213]. United States v. Chadwick, 433 U.S. 1, 15 (1977).

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 27

[FN214]. See supra note 181 and accompanying text. [FN215]. United States v. Passaro, 624 F.2d 938, 944 (9th Cir. 1980). [FN216]. 477 F.3d 250, 260 n.7 (5th Cir. 2007). [FN217]. United States v. Park, No. CR 05-375 SI, 2007 WL 1521573, at *9 (N.D. Cal. May 23, 2007) (quoting United States v. Monclavo-Cruz, 662 F.2d 1285, 1290 (9th Cir. 1981)); see also United States v. Lasalle, Cr. No. 07-00032 SOM, 2007 WL 1390820, at *6 (D. Haw. May 9, 2007) (holding that exception allowing search of person and clothing of arrestee at station house does not apply because cell phone clearly is not defendant's person). [FN218]. See supra Part II.a.2. [FN219]. 454 F. Supp. 2d 999, 1003 (C.D. Cal. 2006). [FN220]. Like a computer, the information stored in a pager's memory-and by extension a cell phone's memory-can only be retrieved through the activation of the microprocessors that are within the device, and [u]nlike a telephone book, an inspection of the physical object reveals nothing more of its contents than microprocessors and switches. United States v. Blas, No. 90-CR-162, 1990 WL 265179, at *20 (E.D. Wis. Dec. 4, 1990) (discussing pagers, but with reasoning equally applicable to cell phones). [FN221]. Hylton, supra note 48 (quoting Chris Calabrese of the Technology & Liberty Project at American Civil Liberties Union). [FN222]. Park, 2007 WL 1521573, at *8; see also State v. Smith, No. 07-CA-47, 2008 WL 2861693, at *10 (Ohio Ct. App. July 25, 2008) (Donovan, J., dissenting) (The divide between the personal computer and the cellular phone appears to be diminishing by the day.). [FN223]. State v. Smith, 2008 WL 2861693, at *10; see also United States v. Zavola, No. 07-20200, 2008 WL 3877232, at *10 (5th Cir. Aug. 22, 2008) (A cell phone is similar to a personal computer that is carried on one's person.). [FN224]. After all, what would Llewellyn say? Most likely, the rule follows where its reason leads; where the reason stops, there stops the rule. Karl N. Llewellyn, The Bramble Bush 157-58 (Oceana Publ'ns 1951) (1930). [FN225]. A bit is a basic unit of digital information storage equivalent to the result of choice between two alternatives. Bit, Merriam-Webster Online Dictionary, http://www.merriam-webster.com/dictionary/bit (last visited Sept. 21, 2008). The information on a sheet of single-spaced typewritten paper would comprise approximately 20,000 bits, while a single word is roughly sixty-four bits. Orders of Magnitude (Data), Wikipedia, http:// en.wikipedia.org/wiki/Orders_of_magnitude_%28data%29 (last visited Sept. 21, 2008). A typical phone book contains between 50 and 100 million bits. Id. [FN226]. See supra note 47 and accompanying text. [FN227]. See, e.g., United States v. Mercado-Nava, 486 F. Supp. 2d 1271, 1275 (D. Kan. 2007) (stating that there was no evidence contents of defendant's phone were protected by password); United States v. Galante, No. 94 Cr. 633 (LMM), 1995 WL 507249, at *3 n.4 (S.D.N.Y. Aug. 25, 1995) (finding no basis to infer cell phone was locked or not readily-opened). [FN228]. See People v. McGee, No. 2006NY047717, 2007 WL 1947624, at *2 (N.Y. Crim. Ct. June 29, 2007) (describing number of steps required to access information); see also supra note 220 and accompanying text.

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 28

[FN229]. McGee, 2007 WL 1947624, at *2. [FN230]. See generally Chang, supra note 72 (discussing inapplicability of plain view doctrine to digital evidence). [FN231]. United States v. Robinson, 414 U.S. 218, 235 (1973). [FN232]. Computer Crime & Intellectual Prop. Section, supra note 36, at 22 (citation omitted). [FN233]. See supra note 47 and accompanying text. [FN234]. 392 U.S. 1, 18 (1968). [FN235]. See United States v. Edwards, 415 U.S. 800, 808-09 (1974) ( While the legal arrest of a person should not destroy the privacy of his premises, it does-for at least a reasonable time and to a reasonable extent-take his own privacy out of the realm of protection from police interest in weapons, means of escape, and evidence. (quoting United States v. DeLeo, 422 F.2d 487, 493 (1st Cir. 1970))). [FN236]. Preston v. United States, 376 U.S. 364, 367 (1964) (explaining risk in situation where weapon or evidence is under accused's immediate control). [FN237]. See, e.g., United States v. Mercado-Nava, 486 F. Supp. 2d 1271, 1274 (D. Kan. 2007) (stating agents arrested defendant after discovering eighteen kilograms of cocaine hidden in vehicle and seized two cell phones contemporaneous with arrest). [FN238]. See, e.g., People v. McGee, No. 2006NY047717, 2007 WL 1947624, at *1 (N.Y. Crim. Ct. June 29, 2007) (stating officers arrested defendant after seeing him take pictures of woman's buttocks with camera phone). [FN239]. To ensure that things like cell phone contact lists, PDA address books, and other electronic data storage items can be seized and searched, one jurisdiction recommends including the following language in the warrant: any and all address books, telephone directories, and contact lists, whether such items exist in written or electronic form. Search Warrants: Computer Devices, supra note 118, at 7. [FN240]. United States v. Klinger, Crim. No. 07-437, 2008 WL 482357, at *1 (D. Minn. Feb. 19, 2008). [FN241]. See id. at *2 (noting that until search warrant was issued cell phones were in police custody in evidence storage pursuant to warrantless search of defendant's person in the course of his arrest). [FN242]. Id. [FN243]. Id.; see alsosupra note 118 andaccompanying text. [FN244]. See supra notes 55-56 and accompanying text. [FN245]. Johnson v. United States, 333 U.S. 10, 13-14 (1948). [FN246]. See id. at 14 (Crime, even in the privacy of one's own quarters, is, of course, of grave concern to society, and the law allows such crime to be reached on proper showing. The right of officers to thrust themselves into a home is also a grave concern, not only to the individual but to a society which chooses to dwell in reasonable security and freedom from surveillance.).

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

42 GALR 1165 42 Ga. L. Rev. 1165

Page 29

[FN247]. United States v. Di Re, 332 U.S. 581, 595 (1948) (citation omitted). [FN248]. United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting) (stating further that the Fourth Amendment . . . was a safeguard against recurrence of abuses so deeply felt by the Colonies as to be one of the potent causes of the Revolution, rather than merely a requirement for a piece of paper), overruled by Chimel v. California, 395 U.S. 752, 768 (1969). [FN249]. United States v. Edwards, 415 U.S. 800, 812-13 (1974) (Stewart, J., dissenting) (quoting Boyd v. United States, 116 U.S. 616, 635 (1886)). [FN250]. Id. 42 Ga. L. Rev. 1165 END OF DOCUMENT

2010 Thomson Reuters. No Claim to Orig. US Gov. Works.

Вам также может понравиться