{"id":24455,"date":"2014-07-01T16:41:34","date_gmt":"2014-07-01T20:41:34","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24455"},"modified":"2014-07-01T16:41:34","modified_gmt":"2014-07-01T20:41:34","slug":"does-cell-phone-case-imperil-nsa-spying","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/does-cell-phone-case-imperil-nsa-spying.php","title":{"rendered":"Does Cell-Phone Case Imperil NSA Spying?"},"content":{"rendered":"<p><p>    Though the Republican-controlled U.S. Supreme Court often    splits 5-4 on partisan and ideological issues, a consensus is    emerging against the governments electronic intrusion on    personal privacy, which could portend trouble for NSA spying,    says Marjorie Cohn.  <\/p>\n<p>    By Marjorie Cohn  <\/p>\n<p>    In one of the most significant Fourth Amendment rulings ever    handed down by the Supreme Court, all nine justices agreed in    an opinion involving two companion cases, Riley v.    California and United States v. Wurie, that police    generally need a warrant before reading data on the cell phone    of an arrestee.  <\/p>\n<p>    This decision may well presage how the Court will rule on the    constitutionality of the National Security Agency (NSA)    metadata collection program when that issue inevitably comes    before it.  <\/p>\n<p>      U.S. Supreme Court    <\/p>\n<p>    There has always been a preference for search warrants when the    police conduct a Fourth Amendment search or seizure. But, over    the years, the Court has carved out certain exceptions to the    warrant requirement, including the search incident to a lawful    arrest.  <\/p>\n<p>    The 1969 case of Chimel v. California defined the    parameters of this exception. Upon a lawful arrest, police can    search the person of the arrestee and areas within his    immediate control from which he could secure a weapon or    destroy evidence.  <\/p>\n<p>    Four years later, in United States v. Robinson, the    Court confirmed that the search incident to a lawful arrest is    a bright-line rule. These types of searches will not be    analyzed on a case-by-case basis. If the arrest is lawful, a    search incident to it needs no further justification. It does    not matter whether the officer is concerned in a given case    that the arrestee might be armed or destroy evidence.  <\/p>\n<p>    In Riley\/Wurie, the Court declined to apply the search    incident to a lawful arrest exception to searches of data    contained on an arrestees cell phone. Chief Justice John    Roberts wrote for the Court that the dual rationales for    applying the exception to the search of physical objects     protecting officers and preventing destruction of evidence  do    not apply to the digital content on cell phones: There are no    comparable risks when the search is of digital data.  <\/p>\n<p>    Moreover, [m]odern cell phones, as a category, Roberts noted,    implicate privacy concerns far beyond those implicated by the    search of a cigarette pack, a wallet, or a purse. Responding    to the governments assertion that a search of cell phone data    is materially indistinguishable from searches of physical    items, Roberts quipped, That is like saying a ride on    horseback is materially indistinguishable from a flight to the    moon.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/consortiumnews.com\/2014\/06\/30\/does-cell-phone-case-imperil-nsa-spying\" title=\"Does Cell-Phone Case Imperil NSA Spying?\">Does Cell-Phone Case Imperil NSA Spying?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Though the Republican-controlled U.S. Supreme Court often splits 5-4 on partisan and ideological issues, a consensus is emerging against the governments electronic intrusion on personal privacy, which could portend trouble for NSA spying, says Marjorie Cohn. By Marjorie Cohn In one of the most significant Fourth Amendment rulings ever handed down by the Supreme Court, all nine justices agreed in an opinion involving two companion cases, Riley v. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-24455","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24455"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24455"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24455\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}