US vs. Florez-Lopez (2/3)

author by Daniel K. Gelb on Apr. 10, 2014

Lawsuit & Dispute Litigation 

Summary: Does the Phone Booth Now Reside Inside the Phone?

(con't.)

A Trivial Act?

The Seventh Circuit has found that searching for a subscriber’s cell phone number is ministerial and nonintrusive, and therefore, not rising to the level that requires a warrant. However, as far back as the last six months of 2009, more than two of every nine adults lived in wireless- only household (8). The statistic of wire- less-only telephone users is rapidly increasing. Wireless association CTIA has estimated that 31.6 percent of households in the United States are wireless-only (9) For many cell phone users, the mobile hand- held contains their “life,” such as contact, medical, and financial information. Therefore, the reasoning of Katz v. United States should control in the cell phone context of searching for cell phone content — irrespective of whether or not the content seized by the government is “trivial” (10).  For example, if a defendant has a mobile application on a smartphone providing access to statutorily protected data in the “cloud” such as bank accounts or medical records, it seems clear that the defendant has an actual (subjective) expectation of privacy. The U.S. Supreme Court even intimated the following in Quon v. City of Ontario:

Cell phone and text message communications are so pervasive that some persons  may consider  them  to  be essential means or necessary instruments for self-expression, even self-identification. That might strengthen the case for an expectation of privacy [in the employee-employer context]. On the other hand, the ubiquity of those devices has made them generally affordable, so one could counter that employees who need cell phones or similar devices for personal matters can purchase and pay for their own (11).

The exponential growth of cell phone usage in the United States, coupled with the fact that many users insure their handhelds, store personal information on them (e.g., notes, pictures, text messages, etc.), and subscribe to mobile backup or redundancy services clearly evidences that society is prepared  to objectively recognize a reasonable expectation of the right to privacy in electronically stored information  (“ESI”) stored on one’s  mobile device (12). Text messages — and their associated data — have been treated as private, and therefore deserving Fourth Amendment protection. The entire technological mechanism by which text messages operate between cell phone subscribers to the service is through the telephone number associated with the user.

 The subjectivity prong of Katz is not so clear cut when it comes to historical cell phone data seized from the defendant. For example, in Commonwealth v. Pitt, a  Massachusetts Superior Court judge recently ruled that  historical cell site location data is the kind of information society is ready to adopt  as being private, and therefore, protected from unlawful encroachment under the Fourth Amendment (13). In other words, individuals do not  expect their whereabouts to be logged simply based on the phone calls they make.

 According to  Flores-Lopez, a  cell phone user arguably does not have a privacy interest requiring Fourth Amendment protection in the cell phone numbers on records of text message exchanges. In other words, has Flores- Lopez raised the  issue of “virtual curtilage” associated with a cell phone?

 Due to the various models of cell phones on the market, it is unrealistic that the  government  will be  able  to search only for the number assigned to it without risking a privacy violation. Moreover, since the Fourth Amendment protects people and not property, it is an extremely precarious proposition to permit the government to open one’s cell phone  and  risk searching content  that would violate a defendant’s legal and/or statutory right to privacy concerning the ESI either stored on a cell phone itself or in the “cloud” (i.e., email, contacts, calendars, etc.) (14) For example, if an iPhone user subscribes to Apple’s “iCloud,” many data files are stored both  in the “cloud” as well as on the iPhone itself. When an iPhone user adds a contact or calendar event via Apple’s website (www.icloud.com), the cloud-based service automatically synchronizes the iPhone and vice-versa with the iCloud website. To log into iCloud online, one must provide a user name and password. Therefore, ESI stored in iCloud is arguably protected by the Stored Communications  Act, and therefore, so would the same information on the mobile device itself on which the telephone  number  resides. Notably, such data would only be accessible by the government with a warrant under applicable federal wiretap statutes. (15)

 Certainly, the subject cell phone in each case will not always be an iPhone. Nevertheless, how can the court safely make the distinction  as to what stored content is protected under the Electronic Communications   Privacy Act (ECPA) and related wiretap laws, and what information  stored on  the phone  is merely “trivial”? The distinction that needs to be made is that the task may be ministerial, but matching a key to a mailbox does not run the risk of violating the ECPA. The risk of intrusion is too substantial.

 One cannot analogize all cell phones to a traditional bounded paper diary or a mailbox associated with an apartment. The procedural prerequisites the government  must  satisfy to access ESI under ECPA are much greater — where judicial process is mandated  by statute — than accessing narcotics  hidden  in  between pages of a book, which may be minimally intrusive or permissible pursuant to a well-founded  legal  exception  to  the Fourth Amendment.

 In addition to holding that searching for a cell phone number  on the device itself is “trivial,” the Seventh Circuit also accepted the prosecution’s argument that mobile phones are simply “container(s)” of information subject to search without reason  specific to  the  container  itself. Therefore, relying on the U.S. Supreme Court case of United States v. Robinson, a cell phone  may be searched for certain content such as the number assigned to it without justification specific to the mobile phone (“container”)  itself (16).  The Seventh Circuit analogized a cell phone containing electronically stored information to a defendant’s diary, which could also contain data on the pages of the hard copy book. According to the court, both a cell phone  and  diary contain  information, and therefore both can be opened and searched for identifiable information without a warrant. Flores-Lopez points to various examples of wiping software and other remote manipulation tools to justify the presence of exigent circumstances to search for a telephone number on a cell phone.

 The discussion in Flores-Lopez as to “exigency” and “triviality” neglects to balance the risk of violating a defendant’s statutory  privacy rights.  However, the court acknowledges there is  an  unresolved issue concerning what should be the tolerable breadth of warrantless cell phone  searches. Since legally protected ESI is inextricably tied into the cell phone itself, one cannot practically analogize a cell phone to the lock and key in Concepcion or the container in Robinson.

 A few questions come to mind. What if the recent calls directory on the cell phone contains the user’s telephone number on the screen of the telephone, but a text message from the suspect’s physician or attorney pops up when the search is being conducted? What if the number searched is virtual and used for incoming calls (e.g., Google Voice) requiring  an online password for access? What if the phone opened by the governmental official was seconds from entering a self-lock mode? What about GPS data and the fact that the government is required to have a warrant before accessing it? Nearly all cell phones double as GPS devices, so what makes accessing them trivial? (17)

 It may be impractical to require that law enforcement officials carry around mobile forensics hardware. Exigency is fact-based, however, and it should not be assumed that a suspect has arranged for a remote wipe of his cell phone. There is a serious  collision  between  wiretap  law and the Fourth  Amendment  that remains unresolved. The situation is further complicated  by Flores-Lopez.  The major distinction  between accessing an electronic device versus a physical object such as a plastic container is that the risk of  intrusion  into  statutorily  protected data  is extraordinarily  greater  when  a device is involved, whereas one can reasonably determine where hard copy evidence physically resides.

 Preserving cell phone content forensically in order to apply for a warrant to search the phone may not be ideal for the government; however, it  is  the  most rational and constitutionally sound mechanism to protect society’s expectation  of  cell phone  privacy. There are portable digital forensics tools available that are not unduly burdensome for law enforcement to use. Requiring law enforcement officers to use these forensics tools is a smaller price to pay than compromising a suspect’s constitutional right to privacy.18 If a defendant chooses to arrange for a remote wipe of a cell phone upon being arrested, then the forensic image will yield evidence of consciousness of guilt. There are less intrusive and more constitutionally  sound mechanisms to ensure justice is served.

Flores-Lopez has paved the way for numerous legal arguments  concerning cell phone evidence and its related ESI. There are many different kinds of cell phones  containing  a multitude  of features and applications with varying levels of privacy settings. Arguably, cell phones are more like the  telephone  booth  in Katz, except the phone booth now resides inside the  telephone. (19).  Unlike a paper bound diary with contraband stored inside of it, a cell phone is vulnerable to manipulation, spoliation of evidence, and doubling as the government’s gateway to ESI protected by the Fourth Amendment and by state and federal statutes.

(con't).

Legal Articles Additional Disclaimer

Lawyer.com is not a law firm and does not offer legal advice. Content posted on Lawyer.com is the sole responsibility of the person from whom such content originated and is not reviewed or commented on by Lawyer.com. The application of law to any set of facts is a highly specialized skill, practiced by lawyers and often dependent on jurisdiction. Content on the site of a legal nature may or may not be accurate for a particular state or jurisdiction and may largely depend on specific circumstances surrounding individual cases, which may or may not be consistent with your circumstances or may no longer be up-to-date to the extent that laws have changed since posting. Legal articles therefore are for review as general research and for use in helping to gauge a lawyer's expertise on a matter. If you are seeking specific legal advice, Lawyer.com recommends that you contact a lawyer to review your specific issues. See Lawyer.com's full Terms of Use for more information.

© 2025 LAWYER.COM INC.

Use of this website constitutes acceptance of Lawyer.com’s Terms of Use, Email, Phone, & Text Message and Privacy Policies.