NOTICE: This opinion is subject to
formal revision before publication in the preliminary print of the
United States Reports. Readers are requested to notify the Reporter
of Decisions, Supreme Court of the United States, Washington,
D. C. 20543, of any typographical or other formal errors, in
order that corrections may be made before the preliminary print
goes to press.
SUPREME COURT OF THE UNITED STATES
_________________
Nos. 13–132 and 13–212
_________________
DAVID LEON RILEY, PETITIONER
13–132 v.
CALIFORNIA
on writ of certiorari to the court of appeal
of cali-fornia, fourth appellate district, division one
UNITED STATES, PETITIONER
13–212 v.
BRIMA WURIE
on writ of certiorari to the united states
court of appeals for the first circuit
[June 25, 2014]
Chief Justice Roberts
delivered the opinion of the Court.
These two cases raise a
common question: whether the police may, without a warrant, search
digital information on a cell phone seized from an individual who
has been arrested.
I
A
In the first case,
petitioner David Riley was stopped by a police officer for driving
with expired registration tags. In the course of the stop, the
officer also learned that Riley’s license had been suspended. The
officer impounded Riley’s car, pursuant to department policy, and
another officer conducted an inventory search of the car. Riley was
arrested for possession of concealed and loaded firearms when that
search turned up two handguns under the car’s hood. See Cal. Penal
Code Ann. §§12025(a)(1), 12031(a)(1) (West 2009).
An officer searched
Riley incident to the arrest and found items associated with the
“Bloods” street gang. He also seized a cell phone from Riley’s
pants pocket. According to Riley’s uncontradicted assertion, the
phone was a “smart phone,” a cell phone with a broad range of other
functions based on advanced computing capability, large storage
capacity, and Internet connectivity. The officer accessed
information on the phone and noticed that some words (presumably in
text messages or a contacts list) were preceded by the letters
“CK”—a label that, he believed, stood for “Crip Killers,” a slang
term for members of the Bloods gang.
At the police station
about two hours after the arrest, a detective specializing in gangs
further examined the contents of the phone. The detective testified
that he “went through” Riley’s phone “looking for evidence, because
. . . gang members will often video themselves with guns
or take pictures of themselves with the guns.” App. in No. 13–132,
p. 20. Although there was “a lot of stuff” on the phone, particular
files that “caught [the detective’s] eye” included videos of young
men sparring while someone yelled encouragement using the moniker
“Blood.” Id., at 11–13. The police also found photographs of Riley
standing in front of a car they suspected had been involved in a
shooting a few weeks earlier.
Riley was ultimately
charged, in connection with that earlier shooting, with firing at
an occupied vehicle, assault with a semiautomatic firearm, and
attempted murder. The State alleged that Riley had committed those
crimes for the benefit of a criminal street gang, an aggravating
factor that carries an enhanced sentence. Compare Cal. Penal Code
Ann. §246 (2008) with §186.22(b)(4)(B) (2014). Prior to trial,
Riley moved to suppress all evidence that the police had obtained
from his cell phone. He contended that the searches of his phone
violated the Fourth Amendment, because they had been performed
without a warrant and were not otherwise justified by exigent
circumstances. The trial court rejected that argument. App. in No.
13–132, at 24, 26. At Riley’s trial, police officers testified
about the photographs and videos found on the phone, and some of
the photographs were admitted into evidence. Riley was convicted on
all three counts and received an enhanced sentence of 15 years to
life in prison.
The California Court of
Appeal affirmed. No. D059840 (Cal. App., Feb. 8, 2013), App. to
Pet. for Cert. in No. 13–132, pp. 1a–23a. The court relied on the
California Supreme Court’s decision in People v. Diaz, 51 Cal. 4th
84, 244 P. 3d 501 (2011), which held that the Fourth Amendment
permits a warrantless search of cell phone data incident to an
arrest, so long as the cell phone was immediately associated with
the arrestee’s person. See id., at 93, 244 P. 3d, at 505–506.
The California Supreme
Court denied Riley’s petition for review, App. to Pet. for Cert. in
No. 13–132, at 24a, and we granted certiorari, 571 U. S. ___
(2014).
B
In the second case, a
police officer performing routine surveillance observed respondent
Brima Wurie make an apparent drug sale from a car. Officers
subsequently arrested Wurie and took him to the police station. At
the station, the officers seized two cell phones from Wurie’s
person. The one at issue here was a “flip phone,” a kind of phone
that is flipped open for use and that generally has a smaller range
of features than a smart phone. Five to ten minutes after arriving
at the station, the officers noticed that the phone was repeatedly
receiving calls from a source identified as “my house” on the
phone’s external screen. A few minutes later, they opened the phone
and saw a photograph of a woman and a baby set as the phone’s
wallpaper. They pressed one button on the phone to access its call
log, then another button to determine the phone number associated
with the “my house” label. They next used an online phone directory
to trace that phone number to an apartment building.
When the officers went
to the building, they saw Wurie’s name on a mailbox and observed
through a window a woman who resembled the woman in the photograph
on Wurie’s phone. They secured the apartment while obtaining a
search warrant and, upon later executing the warrant, found and
seized 215 grams of crack cocaine, mari-juana, drug paraphernalia,
a firearm and ammunition, and cash.
Wurie was charged with
distributing crack cocaine, possessing crack cocaine with intent to
distribute, and being a felon in possession of a firearm and
ammunition. See 18 U. S. C. §922(g); 21
U. S. C. §841(a). He moved to suppress the evidence
obtained from the search of the apartment, arguing that it was the
fruit of an unconstitutional search of his cell phone. The District
Court denied the motion. 612 F. Supp. 2d 104 (Mass. 2009).
Wurie was convicted on all three counts and sentenced to 262 months
in prison.
A divided panel of the
First Circuit reversed the denial of Wurie’s motion to suppress and
vacated Wurie’s convictions for possession with intent to
distribute and possession of a firearm as a felon. 728 F. 3d 1
(2013). The court held that cell phones are distinct from other
physical possessions that may be searched incident to arrest
without a warrant, because of the amount of personal data cell
phones contain and the negligible threat they pose to law
enforcement interests. See id., at 8–11.
We granted certiorari.
571 U. S. ___ (2014).
II
The Fourth Amendment
provides:
“The right of the
people to be secure in their persons, houses, papers, and effects,
against unreasonable searches and seizures, shall not be violated,
and no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be
searched, and the persons or things to be seized.”
As the text makes
clear, “the ultimate touchstone of the Fourth Amendment is
‘reasonableness.’ ” Brigham City v. Stuart, 547 U. S.
398, 403 (2006) . Our cases have determined that “[w]here a search
is undertaken by law enforcement officials to discover evidence of
criminal wrongdoing, . . . reasonableness generally
requires the obtaining of a judicial warrant.” Vernonia School
Dist. 47J v. Acton, 515 U. S. 646, 653 (1995) . Such a warrant
ensures that the inferences to support a search are “drawn by a
neutral and detached magistrate instead of being judged by the
officer engaged in the often competitive enterprise of ferreting
out crime.” Johnson v. United States, 333 U. S. 10, 14 (1948)
. In the absence of a warrant, a search is reasonable only if it
falls within a specific exception to the warrant requirement. See
Kentucky v. King, 563 U. S. ___, ___ (2011) (slip op., at
5–6).
The two cases before us
concern the reasonableness of a warrantless search incident to a
lawful arrest. In 1914, this Court first acknowledged in dictum
“the right on the part of the Government, always recognized under
English and American law, to search the person of the accused when
legally arrested to discover and seize the fruits or evidences of
crime.” Weeks v. United States, 232 U. S. 383 . Since that
time, it has been well accepted that such a search constitutes an
exception to the warrant requirement. Indeed, the label “exception”
is something of a misnomer in this context, as warrantless searches
incident to arrest occur with far greater frequency than searches
conducted pursuant to a warrant. See 3 W. LaFave, Search and
Seizure §5.2(b), p. 132, and n. 15 (5th ed. 2012).
Although the existence
of the exception for such searches has been recognized for a
century, its scope has been de-bated for nearly as long. See
Arizona v. Gant, 556 U. S. 332, 350 (2009) (noting the
exception’s “checkered his-tory”). That debate has focused on the
extent to which officers may search property found on or near the
arrestee. Three related precedents set forth the rules governing
such searches:
The first, Chimel v.
California, 395 U. S. 752 (1969) , laid the groundwork for
most of the existing search incident to arrest doctrine. Police
officers in that case arrested Chimel inside his home and proceeded
to search his entire three-bedroom house, including the attic and
garage. In particular rooms, they also looked through the contents
of drawers. Id., at 753–754.
The Court crafted the
following rule for assessing the reasonableness of a search
incident to arrest:
“When an arrest is made, it is reasonable
for the arresting officer to search the person arrested in order to
remove any weapons that the latter might seek to use in order to
resist arrest or effect his escape. Otherwise, the officer’s safety
might well be endangered, and the arrest itself frustrated. In
addition, it is entirely reasonable for the arresting officer to
search for and seize any evidence on the arrestee’s person in order
to prevent its concealment or destruction. . . .
There is ample justification, therefore, for a search of the
arrestee’s person and the area ‘within his immediate
control’—construing that phrase to mean the area from within which
he might gain possession of a weapon or destructible evidence.”
Id., at 762–763.
The extensive warrantless search of Chimel’s
home did not fit within this exception, because it was not needed
to protect officer safety or to preserve evidence. Id., at 763,
768.
Four years later, in
United States v. Robinson, 414 U. S. 218 (1973) , the Court
applied the Chimel analysis in the context of a search of the
arrestee’s person. A police officer had arrested Robinson for
driving with a revoked license. The officer conducted a patdown
search and felt an object that he could not identify in Robinson’s
coat pocket. He removed the object, which turned out to be a
crumpled cigarette package, and opened it. Inside were 14 capsules
of heroin. Id., at 220, 223.
The Court of Appeals
concluded that the search was unreasonable because Robinson was
unlikely to have evidence of the crime of arrest on his person, and
because it believed that extracting the cigarette package and
opening it could not be justified as part of a protective search
for weapons. This Court reversed, rejecting the notion that
“case-by-case adjudication” was required to determine “whether or
not there was present one of the reasons supporting the authority
for a search of the person incident to a lawful arrest.” Id., at
235. As the Court explained, “[t]he authority to search the person
incident to a lawful custodial arrest, while based upon the need to
disarm and to discover evidence, does not depend on what a court
may later decide was the probability in a particular arrest
situation that weapons or evidence would in fact be found upon the
person of the suspect.” Ibid. Instead, a “custodial arrest of a
suspect based on probable cause is a reasonable intrusion under the
Fourth Amendment; that intrusion being lawful, a search incident to
the arrest requires no additional justification.” Ibid.
The Court thus
concluded that the search of Robinson was reasonable even though
there was no concern about the loss of evidence, and the arresting
officer had no specific concern that Robinson might be armed. Id.,
at 236. In doing so, the Court did not draw a line between a search
of Robinson’s person and a further examination of the cigarette
pack found during that search. It merely noted that, “[h]aving in
the course of a lawful search come upon the crumpled package of
cigarettes, [the officer] was entitled to inspect it.” Ibid. A few
years later, the Court clarified that this exception was limited to
“personal property . . . immediately associated with the
person of the arrestee.” United States v. Chadwick, 433 U. S. 1, 15
(1977) (200-pound, locked footlocker could not be searched incident
to arrest), abrogated on other grounds by California v. Acevedo,
500 U. S. 565 (1991) .
The search incident to
arrest trilogy concludes with Gant, which analyzed searches of an
arrestee’s vehicle. Gant, like Robinson, recognized that the Chimel
concerns for officer safety and evidence preservation underlie the
search incident to arrest exception. See 556 U. S., at 338. As
a result, the Court concluded that Chimel could authorize police to
search a vehicle “only when the arrestee is unsecured and within
reaching distance of the passenger compartment at the time of the
search.” 556 U. S., at 343. Gant added, however, an
independent exception for a warrantless search of a vehicle’s
passenger compartment “when it is ‘reasonable to believe evidence
relevant to the crime of arrest might be found in the
vehicle.’ ” Ibid. (quoting Thornton v. United States, 541
U. S. 615, 632 (2004) (Scalia, J., concurring in judgment)).
That exception stems not from Chimel, the Court explained, but from
“circumstances unique to the vehicle context.” 556 U. S., at
343.
III
These cases require
us to decide how the search incident to arrest doctrine applies to
modern cell phones, which are now such a pervasive and insistent
part of daily life that the proverbial visitor from Mars might
conclude they were an important feature of human anatomy. A smart
phone of the sort taken from Riley was unheard of ten years ago; a
significant majority of American adults now own such phones. See A.
Smith, Pew Research Center, Smartphone Ownership—2013 Update (June
5, 2013). Even less sophisticated phones like Wurie’s, which have
already faded in popularity since Wurie was arrested in 2007, have
been around for less than 15 years. Both phones are based on
technology nearly inconceivable just a few decades ago, when Chimel
and Robinson were decided.
Absent more precise
guidance from the founding era, we generally determine whether to
exempt a given type of search from the warrant requirement “by
assessing, on the one hand, the degree to which it intrudes upon an
individual’s privacy and, on the other, the degree to which it is
needed for the promotion of legitimate governmental interests.”
Wyoming v. Houghton, 526 U. S. 295, 300 (1999) . Such a
balancing of interests supported the search incident to arrest
exception in Robinson, and a mechanical application of Robinson
might well support the warrantless searches at issue here.
But while Robinson’s
categorical rule strikes the appropriate balance in the context of
physical objects, neither of its rationales has much force with
respect to digital content on cell phones. On the government
interest side, Robinson concluded that the two risks identified in
Chimel—harm to officers and destruction of evidence—are present in
all custodial arrests. There are no comparable risks when the
search is of digital data. In addition, Robinson regarded any
privacy interests retained by an individual after arrest as
significantly diminished by the fact of the arrest itself. Cell
phones, however, place vast quantities of personal information
literally in the hands of individuals. A search of the information
on a cell phone bears little resemblance to the type of brief
physical search considered in Robinson.
We therefore decline to
extend Robinson to searches of data on cell phones, and hold
instead that officers must generally secure a warrant before
conducting such a search.
A
We first consider
each Chimel concern in turn. In doing so, we do not overlook
Robinson’s admonition that searches of a person incident to arrest,
“while based upon theneed to disarm and to discover evidence,” are
reasonable regardless of “the probability in a particular arrest
situation that weapons or evidence would in fact be found.” 414 U.
S., at 235. Rather than requiring the “case-by-case adjudication”
that Robinson rejected, ibid., we ask instead whether application
of the search incident to arrest doctrine to this particular
category of effects would “untether the rule from the
justifications underlying the Chimel exception,” Gant, supra, at
343. See also Knowles v. Iowa, 525 U. S. 113, 119 (1998)
(declining to extend Robinson to the issuance of citations, “a
situation where the concern for officer safety is not present to
the same extent and the concern for destruction or loss of evidence
is not present at all”).
1
Digital data stored
on a cell phone cannot itself be used as a weapon to harm an
arresting officer or to effectuate the arrestee’s escape. Law
enforcement officers remain free to examine the physical aspects of
a phone to ensure that it will not be used as a weapon—say, to
determine whether there is a razor blade hidden between the phone
and its case. Once an officer has secured a phone and eliminated
any potential physical threats, however, data on the phone can
endanger no one.
Perhaps the same might
have been said of the cigarette pack seized from Robinson’s pocket.
Once an officer gained control of the pack, it was unlikely that
Robinson could have accessed the pack’s contents. But unknown
physical objects may always pose risks, no matter how slight,
during the tense atmosphere of a custodial arrest. The officer in
Robinson testified that he could not identify the objects in the
cigarette pack but knew they were not cigarettes. See 414
U. S., at 223, 236, n. 7. Given that, a further search was a
reasonable protective measure. No such unknowns exist with respect
to digital data. As the First Circuit explained, the officers who
searched Wurie’s cell phone “knew exactly what they would find
therein: data. They also knew that the data could not harm them.”
728 F. 3d, at 10.
The United States and
California both suggest that a search of cell phone data might help
ensure officer safety in more indirect ways, for example by
alerting officers that confederates of the arrestee are headed to
the scene. There is undoubtedly a strong government interest in
warning officers about such possibilities, but neither the United
States nor California offers evidence to suggest that their
concerns are based on actual experience. The proposed consideration
would also represent a broadening of Chimel’s concern that an
arrestee himself might grab a weapon and use it against an officer
“to resist arrest or effect his escape.” 395 U. S., at 763.
And any such threats from outside the arrest scene do not “lurk[ ]
in all custodial arrests.” Chadwick, 433 U. S., at 14–15.
Accordingly, the interest in protecting officer safety does not
justify dispensing with the warrant requirement across the board.
To the extent dangers to arresting officers may be implicated in a
particular way in a particular case, they are better addressed
through consideration of case-specific exceptions to the warrant
requirement, such as the one for exigent circumstances. See, e.g.,
Warden, Md. Penitentiary v. Hayden, 387 U. S. 294 –299 (1967)
(“The Fourth Amendment does not require police officers to delay in
the course of an investigation if to do so would gravely endanger
their lives or the lives of others.”).
2
The United States and
California focus primarily on the second Chimel rationale:
preventing the destruction of evidence.
Both Riley and Wurie
concede that officers could have seized and secured their cell
phones to prevent destruction of evidence while seeking a warrant.
See Brief for Petitioner in No. 13–132, p. 20; Brief for Respondent
in No. 13–212, p. 41. That is a sensible concession. See Illinois
v. McArthur, 531 U. S. 326 –333 (2001); Chadwick, supra, at
13, and n. 8. And once law enforcement officers have secured a cell
phone, there is no longer any risk that the arrestee himself will
be able to delete incriminating data from the phone.
The United States and
California argue that information on a cell phone may nevertheless
be vulnerable to two types of evidence destruction unique to
digital data—remote wiping and data encryption. Remote wiping
occurs when a phone, connected to a wireless network, receives a
signal that erases stored data. This can happen when a third party
sends a remote signal or when a phone is preprogrammed to delete
data upon entering or leaving certain geographic areas (so-called
“geofencing”). See Dept. of Commerce, National Institute of
Standards and Technology, R. Ayers, S. Brothers, & W. Jansen,
Guidelines on Mobile Device Forensics (Draft) 29, 31 (SP 800–101
Rev. 1, Sept. 2013) (hereinafter Ayers). Encryption is a security
feature that some modern cell phones use in addition to password
protection. When such phones lock, data becomes protected by
sophisticated encryption that renders a phone all but “unbreakable”
unless police know the password. Brief for United States as Amicus
Curiae in No. 13–132, p. 11.
As an initial matter,
these broader concerns about the loss of evidence are distinct from
Chimel’s focus on a defendant who responds to arrest by trying to
conceal or destroy evidence within his reach. See 395 U. S.,
at 763–764. With respect to remote wiping, the Government’s primary
concern turns on the actions of third parties who are not present
at the scene of arrest. And data encryption is even further afield.
There, the Government focuses on the ordinary operation of a
phone’s security features, apart from any active attempt by a
defendant or his associates to conceal or destroy evidence upon
arrest.
We have also been given
little reason to believe that either problem is prevalent. The
briefing reveals only a couple of anecdotal examples of remote
wiping triggered by an arrest. See Brief for Association of State
Criminal Investigative Agencies et al. as Amici Curiae in No.
13–132, pp. 9–10; see also Tr. of Oral Arg. in No. 13–132,p. 48.
Similarly, the opportunities for officers to search a
password-protected phone before data becomes encrypted are quite
limited. Law enforcement officers are very unlikely to come upon
such a phone in an unlocked state because most phones lock at the
touch of a button or, as a default, after some very short period of
inactivity. See, e.g., iPhone User Guide for iOS 7.1 Software 10
(2014) (default lock after about one minute). This may explain why
the encryption argument was not made until the merits stage in this
Court, and has never been considered by the Courts of Appeals.
Moreover, in situations
in which an arrest might trigger a remote-wipe attempt or an
officer discovers an unlocked phone, it is not clear that the
ability to conduct a warrantless search would make much of a
difference. The need to effect the arrest, secure the scene, and
tend to other press-ing matters means that law enforcement officers
may well not be able to turn their attention to a cell phone right
away. See Tr. of Oral Arg. in No. 13–132, at 50; see also Brief for
United States as Amicus Curiae in No. 13–132, at 19. Cell phone
data would be vulnerable to remote wiping from the time an
individual anticipates arrest to the time any eventual search of
the phone is completed, which might be at the station house hours
later. Likewise, an officer who seizes a phone in an unlocked state
might not be able to begin his search in the short time remaining
before the phone locks and data becomes encrypted.
In any event, as to
remote wiping, law enforcement is not without specific means to
address the threat. Remote wiping can be fully prevented by
disconnecting a phone from the network. There are at least two
simple ways to do this: First, law enforcement officers can turn
the phone off or remove its battery. Second, if they are concerned
about encryption or other potential problems, they can leave a
phone powered on and place it in an enclosure that isolates the
phone from radio waves. See Ayers 30–31. Such devices are commonly
called “Faraday bags,” after the English scientist Michael Faraday.
They are essentially sandwich bags made of aluminum foil: cheap,
lightweight, and easy to use. See Brief for Criminal Law Professors
as Amici Curiae 9. They may not be a complete answer to the
problem, see Ayers 32, but at least for now they provide a
reasonable response. In fact, a number of law enforcement agencies
around the country already encourage the use of Faraday bags. See,
e.g., Dept. of Justice, National Institute of Justice, Electronic
Crime Scene Investigation: A Guide for First Responders 14, 32 (2d
ed. Apr. 2008); Brief for Criminal Law Professors as Amici Curiae
4–6.
To the extent that law
enforcement still has specific concerns about the potential loss of
evidence in a particular case, there remain more targeted ways to
address those concerns. If “the police are truly confronted with a
‘now or never’ situation,”—for example, circumstances suggesting
that a defendant’s phone will be the target of an imminent
remote-wipe attempt—they may be able to rely on exigent
circumstances to search the phone immediately. Missouri v. McNeely,
569 U. S. ___, ___ (2013) (slip op., at 10) (quoting Roaden v.
Kentucky, 413 U. S. 496, 505 (1973) ; some internal quotation
marks omitted). Or, if officers happen to seize a phone in an
unlocked state, they may be able to disable a phone’s
automatic-lock feature in order to prevent the phone from locking
and encrypting data. See App. to Reply Brief in No. 13–132, p. 3a
(diagramming the few necessary steps). Such a preventive measure
could be analyzed under the principles set forth in our decision in
McArthur, 531 U. S. 326 , which approved officers’ reasonable
steps to secure a scene to preserve evidence while they awaited a
warrant. See id., at 331–333.
B
The search incident
to arrest exception rests not only on the heightened government
interests at stake in a volatile arrest situation, but also on an
arrestee’s reduced privacy interests upon being taken into police
custody. Robinson focused primarily on the first of those
rationales. But it also quoted with approval then-Judge Cardozo’s
account of the historical basis for the search incident to arrest
exception: “Search of the person becomes lawful when grounds for
arrest and accusation have been discovered, and the law is in the
act of subjecting the body of the accused to its physical
dominion.” 414 U. S., at 232 (quoting People v. Chiagles, 237
N. Y. 193, 197, 142 N. E. 583, 584 (1923)); see also 414
U. S., at 237 (Powell, J., concurring) (“an individual
lawfully subjected to a custodial arrest retains no significant
Fourth Amendment interest in the privacy of his person”). Put
simply, a patdown of Robinson’s cloth-ing and an inspection of the
cigarette pack found in his pocket constituted only minor
additional intrusions compared to the substantial government
authority exercised in taking Robinson into custody. See Chadwick,
433 U. S., at 16, n. 10 (searches of a person are
justified in part by “reduced expectations of privacy caused by the
arrest”).
The fact that an
arrestee has diminished privacy interests does not mean that the
Fourth Amendment falls out of the picture entirely. Not every
search “is acceptable solely because a person is in custody.”
Maryland v. King, 569 U. S. ___, ___ (2013) (slip op., at 26).
To the contrary, when “privacy-related concerns are weighty enough”
a “search may require a warrant, notwithstanding the diminished
expectations of privacy of the arrestee.” Ibid. One such example,
of course, is Chimel. Chimel refused to “characteriz[e] the
invasion of privacy that results from a top-to-bottom search of a
man’s house as ‘minor.’ ” 395 U. S., at 766–767, n. 12.
Because a search of the arrestee’s entire house was a substantial
invasion beyond the arrest itself, the Court concluded that a
warrant was required.
Robinson is the only
decision from this Court applying Chimel to a search of the
contents of an item found on an arrestee’s person. In an earlier
case, this Court had approved a search of a zipper bag carried by
an arrestee, but the Court analyzed only the validity of the arrest
itself. See Draper v. United States, 358 U. S. 307 –311
(1959). Lower courts applying Robinson and Chimel, however, have
approved searches of a variety of personal items carried by an
arrestee. See, e.g., United States v. Carrion, 809 F. 2d 1120,
1123, 1128 (CA5 1987) (billfold and address book); United States v.
Watson, 669 F. 2d 1374, 1383–1384 (CA11 1982) (wallet); United
States v. Lee, 501 F. 2d 890, 892 (CADC 1974) (purse).
The United States
asserts that a search of all data stored on a cell phone is
“materially indistinguishable” from searches of these sorts of
physical items. Brief for United States in No. 13–212, p. 26. That
is like saying a ride on horseback is materially indistinguishable
from a flight to the moon. Both are ways of getting from point A to
point B, but little else justifies lumping them together. Modern
cell phones, as a category, implicate privacy concerns far beyond
those implicated by the search of a cigarette pack, a wallet, or a
purse. A conclusion that inspecting the contents of an arrestee’s
pockets works no substantial additional intrusion on privacy beyond
the arrest itself may make sense as applied to physical items, but
any extension of that reasoning to digital data has to rest on its
own bottom.
1
Cell phones differ in
both a quantitative and a qualitative sense from other objects that
might be kept on an arrestee’s person. The term “cell phone” is
itself misleading shorthand; many of these devices are in fact
minicomputers that also happen to have the capacity to be used as a
telephone. They could just as easily be called cameras, video
players, rolodexes, calendars, tape recorders, libraries, diaries,
albums, televisions, maps, or newspapers.
One of the most notable
distinguishing features of modern cell phones is their immense
storage capacity. Before cell phones, a search of a person was
limited by physical realities and tended as a general matter to
constitute only a narrow intrusion on privacy. See Kerr, Foreword:
Accounting for Technological Change, 36 Harv. J. L. & Pub.
Pol’y 403, 404–405 (2013). Most people cannot lug around every
piece of mail they have received for the past several months, every
picture they have taken, or every book or article they have
read—nor would they have any reason to attempt to do so. And if
they did, they would have to drag behind them a trunk of the sort
held to require a search warrant in Chadwick, supra, rather than a
container the size of the cigarette package in Robinson.
But the possible
intrusion on privacy is not physically limited in the same way when
it comes to cell phones. The current top-selling smart phone has a
standard capacity of 16 gigabytes (and is available with up to 64
gigabytes). Sixteen gigabytes translates to millions of pages of
text, thousands of pictures, or hundreds of videos. See Kerr,
supra, at 404; Brief for Center for Democracy & Technol-ogy
et al. as Amici Curiae 7–8. Cell phones couple that capacity
with the ability to store many different types of information: Even
the most basic phones that sell for less than $20 might hold
photographs, picture messages, text messages, Internet browsing
history, a calendar, a thousand-entry phone book, and so on. See
id., at 30; United States v. Flores-Lopez, 670 F. 3d 803, 806
(CA7 2012). We expect that the gulf between physical practicability
and digital capacity will only continue to widen in the future.
The storage capacity of
cell phones has several interrelated consequences for privacy.
First, a cell phone collects in one place many distinct types of
information—an address, a note, a prescription, a bank statement, a
video—that reveal much more in combination than any isolated
record. Second, a cell phone’s capacity allows even just one type
of information to convey far more than previously possible. The sum
of an individual’s private life can be reconstructed through a
thousand photographs labeled with dates, locations, and
descriptions; the same cannot be said of a photograph or two of
loved ones tucked into a wallet. Third, the data on a phone can
date back to the purchase of the phone, or even earlier. A person
might carry in his pocket a slip of paper reminding him to call Mr.
Jones; he would not carry a record of all his communications with
Mr. Jones for the past several months, as would routinely be kept
on a phone.[
1]
Finally, there is an
element of pervasiveness that characterizes cell phones but not
physical records. Prior to the digital age, people did not
typically carry a cache of sensitive personal information with them
as they went about their day. Now it is the person who is not
carrying a cell phone, with all that it contains, who is the
exception. According to one poll, nearly three-quarters of smart
phone users report being within five feet of their phones most of
the time, with 12% admitting that they even use their phones in the
shower. See Harris Interactive, 2013 Mobile Consumer Habits Study
(June 2013). A decade ago police officers searching an arrestee
might have occasionally stumbled across a highly personal item such
as a diary. See, e.g., United States v. Frankenberry, 387
F. 2d 337 (CA2 1967) (per curiam). But those discoveries were
likely to be few and far between. Today, by contrast, it is no
exaggeration to say that many of the more than 90% of American
adults who own a cell phone keep on their person a digital record
of nearly every aspect of their lives—from the mundane to the
intimate. See Ontario v. Quon, 560 U. S. 746, 760 (2010) .
Allowing the police to scrutinize such records on a routine basis
is quite different from allowing them to search a personal item or
two in the occasional case.
Although the data
stored on a cell phone is distinguished from physical records by
quantity alone, certain types of data are also qualitatively
different. An Internet search and browsing history, for example,
can be found on an Internet-enabled phone and could reveal an
individual’s private interests or concerns—perhaps a search for
certain symptoms of disease, coupled with frequent visits to WebMD.
Data on a cell phone can also reveal where a person has been.
Historic location information is a stand-ard feature on many smart
phones and can reconstruct someone’s specific movements down to the
minute, not only around town but also within a particular building.
See United States v. Jones, 565 U. S. ___, ___ (2012)
(Sotomayor, J., concurring) (slip op., at 3) (“GPS monitoring
generates a precise, comprehensive record of a person’s public
movements that reflects a wealth of detail about her familial,
political, professional, religious, and sexual associations.”).
Mobile application
software on a cell phone, or “apps,” offer a range of tools for
managing detailed information about all aspects of a person’s life.
There are apps for Democratic Party news and Republican Party news;
apps for alcohol, drug, and gambling addictions; apps for sharing
prayer requests; apps for tracking pregnancy symptoms; apps for
planning your budget; apps for every conceivable hobby or pastime;
apps for improving your romantic life. There are popular apps for
buying or selling just about anything, and the records of such
transactions may be accessible on the phone indefinitely. There are
over a million apps available in each of the two major app stores;
the phrase “there’s an app for that” is now part of the popular
lexicon. The average smart phone user has installed 33 apps, which
together can form a revealing montage of the user’s life. See Brief
for Electronic Privacy Information Center as Amicus Curiae in No.
13–132, p. 9.
In 1926, Learned Hand
observed (in an opinion later quoted in Chimel) that it is “a
totally different thing to search a man’s pockets and use against
him what they contain, from ransacking his house for everything
which may incriminate him.” United States v. Kirschenblatt, 16
F. 2d 202, 203 (CA2). If his pockets contain a cell phone,
however, that is no longer true. Indeed, a cell phone search would
typically expose to the government far more than the most
exhaustive search of a house: A phone not only contains in digital
form many sensitive records previ-ously found in the home; it also
contains a broad array of private information never found in a home
in any form—unless the phone is.
2
To further complicate
the scope of the privacy interests at stake, the data a user views
on many modern cell phones may not in fact be stored on the device
itself. Treating a cell phone as a container whose contents may be
searched incident to an arrest is a bit strained as an initial
matter. See New York v. Belton, 453 U. S. 454, 460, n. 4
(1981) (describing a “container” as “any object capable of holding
another object”). But the analogy crumbles entirely when a cell
phone is used to access data located elsewhere, at the tap of a
screen. That is what cell phones, with increasing frequency, are
designed to do by taking advantage of “cloud computing.” Cloud
computing is the capacity of Internet-connected devices to display
data stored on remote servers rather than on the device itself.
Cell phone users often may not know whether particular information
is stored on the device or in the cloud, and it generally makes
little difference. See Brief for Electronic Privacy Information
Center in No. 13–132, at 12–14, 20. Moreover, the same type of data
may be stored locally on the device for one user and in the cloud
for another.
The United States
concedes that the search incident to arrest exception may not be
stretched to cover a search of files accessed remotely—that is, a
search of files stored in the cloud. See Brief for United States in
No. 13–212, at 43–44. Such a search would be like finding a key in
a suspect’s pocket and arguing that it allowed law enforcement to
unlock and search a house. But officers searching a phone’s data
would not typically know whether the information they are viewing
was stored locally at the time of the arrest or has been pulled
from the cloud.
Although the Government
recognizes the problem, its proposed solutions are unclear. It
suggests that officers could disconnect a phone from the network
before searching the device—the very solution whose feasibility it
contested with respect to the threat of remote wiping. Compare Tr.
of Oral Arg. in No. 13–132, at 50–51, with Tr. of Oral Arg. in No.
13–212, pp. 13–14. Alternatively, the Government proposes that law
enforcement agencies “develop protocols to address” concerns raised
by cloud computing. Reply Brief in No. 13–212, pp. 14–15. Probably
a good idea, but the Founders did not fight a revolution to gain
the right to government agency protocols. The possibility that a
search might extend well beyond papers and effects in the physical
proximity of an arrestee is yet another reason that the privacy
interests here dwarf those in Robinson.
C
Apart from their
arguments for a direct extension of Robinson, the United States and
California offer various fallback options for permitting
warrantless cell phone searches under certain circumstances. Each
of the proposals is flawed and contravenes our general preference
to provide clear guidance to law enforcement through categorical
rules. “[I]f police are to have workable rules, the balancing of
the competing interests . . . ‘must in large part be done
on a categorical basis—not in an ad hoc, case-by-case fashion
by individual police officers.’ ” Michigan v. Summers, 452
U. S. 692, 705, n. 19 (1981) (quoting Dunaway v. New York, 442
U. S. 200 –220 (1979) (White, J., concurring)).
The United States first
proposes that the Gant standard be imported from the vehicle
context, allowing a warrantless search of an arrestee’s cell phone
whenever it is reasonable to believe that the phone contains
evidence of the crime of arrest. But Gant relied on “circumstances
unique to the vehicle context” to endorse a search solely for the
purpose of gathering evidence. 556 U. S., at 343. Justice
Scalia’s Thornton opinion, on which Gant was based, explained that
those unique circumstances are “a reduced expectation of privacy”
and “heightened law enforcement needs” when it comes to motor
vehicles. 541 U. S., at 631; see also Wyoming v. Houghton, 526
U. S., at 303–304. For reasons that we have explained, cell
phone searches bear neither of those characteristics.
At any rate, a Gant
standard would prove no practical limit at all when it comes to
cell phone searches. In the vehicle context, Gant generally
protects against searches for evidence of past crimes. See 3 W.
LaFave, Search and Seizure §7.1(d), at 709, and n. 191. In the cell
phone context, however, it is reasonable to expect that
incriminating information will be found on a phone regardless of
when the crime occurred. Similarly, in the vehicle context Gant
restricts broad searches resulting from minor crimes such as
traffic violations. See id., §7.1(d), at 713, and n. 204. That
would not necessarily be true for cell phones. It would be a
particularly inexperienced or unimaginative law enforcement officer
who could not come up with sev-eral reasons to suppose evidence of
just about any crime could be found on a cell phone. Even an
individual pulled over for something as basic as speeding might
well have locational data dispositive of guilt on his phone. An
individual pulled over for reckless driving might have evidence on
the phone that shows whether he was texting while driving. The
sources of potential pertinent information are virtually unlimited,
so applying the Gant standard to cell phones would in effect give
“police officers unbridled discretion to rummage at will among a
person’s private effects.” 556 U. S., at 345.
The United States also
proposes a rule that would restrict the scope of a cell phone
search to those areas of the phone where an officer reasonably
believes that infor-mation relevant to the crime, the arrestee’s
identity, or officer safety will be discovered. See Brief for
United States in No. 13–212, at 51–53. This approach would again
impose few meaningful constraints on officers. The proposed
categories would sweep in a great deal of information, and officers
would not always be able to discern in advance what information
would be found where.
We also reject the
United States’ final suggestion that officers should always be able
to search a phone’s call log, as they did in Wurie’s case. The
Government relies on Smith v. Maryland, 442 U. S. 735 (1979) ,
which held that no warrant was required to use a pen register at
telephone company premises to identify numbers dialed by a
particular caller. The Court in that case, however, concluded that
the use of a pen register was not a “search” at all under the
Fourth Amendment. See id., at 745–746. There is no dispute here
that the officers engaged in a search of Wurie’s cell phone.
Moreover, call logs typically contain more than just phone numbers;
they include any identifying information that an individual might
add, such as the label “my house” in Wurie’s case.
Finally, at oral
argument California suggested a different limiting principle, under
which officers could search cell phone data if they could have
obtained the same information from a pre-digital counterpart. See
Tr. of Oral Arg. in No. 13–132, at 38–43; see also Flores-Lopez,
670 F. 3d, at 807 (“If police are entitled to open a pocket
diary to copy the owner’s address, they should be entitled to turn
on a cell phone to learn its number.”). But the fact that a search
in the pre-digital era could have turned up a photograph or two in
a wallet does not justify a search of thousands of photos in a
digital gallery. The fact that someone could have tucked a paper
bank statement in a pocket does not justify a search of every bank
statement from the last five years. And to make matters worse, such
an analogue test would allow law enforcement to search a range of
items contained on a phone, even though people would be unlikely to
carry such a variety of information in physical form. In Riley’s
case, for example, it is implausible that he would have strolled
around with video tapes, photo albums, and an address book all
crammed into his pockets. But because each of those items has a
pre-digital analogue, police under California’s proposal would be
able to search a phone for all of those items—a significant
diminution of privacy.
In addition, an
analogue test would launch courts on a difficult line-drawing
expedition to determine which digital files are comparable to
physical records. Is an e-mail equivalent to a letter? Is a
voicemail equivalent to a phone message slip? It is not clear how
officers could make these kinds of decisions before conducting a
search, or how courts would apply the proposed rule after the fact.
An analogue test would “keep defendants and judges guessing for
years to come.” Sykes v. United States, 564 U. S. 1 , ___
(2011) (Scalia, J., dissenting) (slip op., at 7) (discussing the
Court’s analogue test under the Armed Career Criminal Act).
IV
We cannot deny that
our decision today will have an impact on the ability of law
enforcement to combat crime. Cell phones have become important
tools in facilitating coordination and communication among members
of criminal enterprises, and can provide valuable incriminating
information about dangerous criminals. Privacy comes at a cost.
Our holding, of course,
is not that the information on a cell phone is immune from search;
it is instead that a warrant is generally required before such a
search, even when a cell phone is seized incident to arrest. Our
cases have historically recognized that the warrant requirement is
“an important working part of our machinery of gov-ernment,” not
merely “an inconvenience to be somehow ‘weighed’ against the claims
of police efficiency.” Coolidge v. New Hampshire, 403 U. S.
443, 481 (1971) . Recent technological advances similar to those
discussed here have, in addition, made the process of obtaining a
warrant itself more efficient. See McNeely, 569 U. S., at ___
(slip op., at 11–12); id., at ___ (Roberts, C. J., concurring
in part and dissenting in part) (slip op., at 8) (describing
jurisdiction where “police officers can e-mail warrant requests to
judges’ iPads [and] judges have signed such warrants and e-mailed
them back to officers in less than 15 minutes”).
Moreover, even though
the search incident to arrest exception does not apply to cell
phones, other case-specific exceptions may still justify a
warrantless search of a particular phone. “One well-recognized
exception applies when ‘ “the exigencies of the situation”
make the needs of law enforcement so compelling that [a]
warrantless search is objectively reasonable under the Fourth
Amendment.’ ” Kentucky v. King, 563 U. S., at ___ (slip
op., at 6) (quoting Mincey v. Arizona, 437 U. S. 385, 394
(1978) ). Such exigencies could include the need to prevent the
imminent destruction of evidence in individual cases, to pursue a
fleeing suspect, and to assist persons who are seriously injured or
are threatened with imminent injury. 563 U. S., at ___. In
Chadwick, for example, the Court held that the exception for
searches incident to arrest did not justify a search of the trunk
at issue, but noted that “if officers have reason to believe that
luggage contains some immediately dangerous instrumentality, such
as explosives, it would be foolhardy to transport it to the station
house without opening the luggage.” 433 U. S., at 15, n.
9.
In light of the
availability of the exigent circumstances exception, there is no
reason to believe that law enforcement officers will not be able to
address some of the more extreme hypotheticals that have been
suggested: a suspect texting an accomplice who, it is feared, is
preparing to detonate a bomb, or a child abductor who may have
information about the child’s location on his cell phone. The
defendants here recognize—indeed, they stress—that such
fact-specific threats may justify a warrantless search of cell
phone data. See Reply Brief in No. 13–132, at 8–9; Brief for
Respondent in No. 13–212, at 30, 41. The critical point is that,
unlike the search incident to arrest exception, the exigent
circumstances exception requires a court to examine whether an
emergency justified a warrantless search in each particular case.
See McNeely, supra, at ___ (slip op., at 6).[
2]
* * *
Our cases have
recognized that the Fourth Amendment was the founding generation’s
response to the reviled “general warrants” and “writs of
assistance” of the colonial era, which allowed British officers to
rummage through homes in an unrestrained search for evidence of
criminal activity. Opposition to such searches was in fact one of
the driving forces behind the Revolution itself. In 1761, the
patriot James Otis delivered a speech in Boston denouncing the use
of writs of assistance. A young John Adams was there, and he would
later write that “[e]very man of a crowded audience appeared to me
to go away, as I did, ready to take arms against writs of
assistance.” 10 Works of John Adams 247–248 (C. Adams ed. 1856).
According to Adams, Otis’s speech was “the first scene of the first
act of opposition to the arbitrary claims of Great Britain. Then
and there the child Independence was born.” Id., at 248 (quoted in
Boyd v. United States, 116 U. S. 616, 625 (1886) ).
Modern cell phones are
not just another technological convenience. With all they contain
and all they may reveal, they hold for many Americans “the
privacies of life,” Boyd, supra, at 630. The fact that technology
now allows an individual to carry such information in his hand does
not make the information any less worthy of the protection for
which the Founders fought. Our answer to the question of what
police must do before searching a cell phone seized incident to an
arrest is accordingly simple—get a warrant.
We reverse the judgment
of the California Court of Appeal in No. 13–132 and remand the case
for further proceedings not inconsistent with this opinion. We
affirm the judgment of the First Circuit in No. 13–212.
It is so ordered.