Feds Can’t Force You to Unlock Your Phone with Finger or Face

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,457
A Northern California federal judge ruled last week that police can’t force suspects to unlock their phones with their fingers, eyes or face, even with a warrant, because it amounts to the same type of self-incrimination as being forced to hand over your passcode.

If other courts apply her decision, it could set an important precedent in Fifth Amendment interpretation and the debate between compelling suspects to use “what they are” (i.e., forced use of their bodies) vs. “what they know” (i.e., forcing suspects to unlock their brains to get at their passcodes). As Forbes reports, Judge Kandis Westmore ruled that compelled testimony is compelled testimony, regardless of whether it’s a passcode uttered aloud or a forced finger swipe. In this day and age, multiple forms of authentication unlock treasure troves of personal data, she wrote. If a person cannot be compelled to provide a passcode because it is a testimonial communication, a person cannot be compelled to provide one’s finger, thumb, iris, face, or other biometric feature to unlock that same device.

Judge Westmore wrote the decision in denial of a warrant to police who were investigating alleged extortion in Oakland, California. The suspects allegedly used Facebook Messenger to threaten a man with the release of an embarrassing video unless he coughed up money. Police had two suspects, but they wanted the go-ahead to compel anybody located on the same premises to unlock their devices, be it with a finger/thumb, face or iris. Judge Westmore denied the request for a search warrant on Fourth and Fifth Amendment grounds. She agreed that the officers had probable cause to search the suspects’ property, but not to unlock any and all devices or compel people to do so. That would be a fishing expedition, she said. The government can’t be permitted to search and seize people’s devices just because they happen to be present during a lawful search.
 

Michyon

Level 2
Verified
May 18, 2018
50
Encrypt a phone with at least 20 characters, leave it with an empty suitcase near the understaffed TSA security checkpoint. (Make sure the phone has a religious decal) Turn on the TV, and enjoy popcorn.

Jokes aside. haven't they gotten just a little too paranoid? I mean what happened to the world?
 

DeepWeb

Level 25
Verified
Top Poster
Well-known
Jul 1, 2017
1,396
Encrypt a phone with at least 20 characters, leave it with an empty suitcase near the understaffed TSA security checkpoint. (Make sure the phone has a religious decal) Turn on the TV, and enjoy popcorn.

Jokes aside. haven't they gotten just a little too paranoid? I mean what happened to the world?
Android has a password limit of 16 characters. Beautiful.
 

DeepWeb

Level 25
Verified
Top Poster
Well-known
Jul 1, 2017
1,396
Do you guys think that the feds will honor this? I mean they're a bunch of attorneys. They will probably find a loophole if they really need your data. But this will definitely help discourage them to collect data unnecessarily.
 

Predrag Radjenovic

Level 2
Verified
Apr 16, 2016
78
9/11 happened.
9/11 is an excuse/argument for everything US does, it didn't just "happen".

As for the article, someone somewhere will say that this can seriously diminish the gov't work on the field in rooting out potential ter. threats, so I think this will not take enough swing to become norm. I hope to be proven wrong.
 
  • Like
Reactions: vtqhtr413 and JB007

RoboMan

Level 34
Verified
Top Poster
Content Creator
Well-known
Jun 24, 2016
2,399
We're desperately trying to save the already dead privacy in the US. Nothing we can do. Do not store sensitive data on your phone. Use strong encryption software over your PC.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top