{"id":3139,"date":"2014-10-22T00:12:13","date_gmt":"2014-10-22T00:12:13","guid":{"rendered":"http:\/\/ncjolt.org\/?p=3139"},"modified":"2020-06-04T20:53:40","modified_gmt":"2020-06-04T20:53:40","slug":"will-new-cellphone-encryption-prevent-the-fbi-from-abusing-your-privacy","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/will-new-cellphone-encryption-prevent-the-fbi-from-abusing-your-privacy\/","title":{"rendered":"Will new cellphone encryption prevent the FBI from abusing your privacy?"},"content":{"rendered":"<p>It has been an arduous year for credit card users. Target, Home Depot, and K-Mart <a href=\"http:\/\/abcnews.go.com\/Business\/wireStory\/kmart-latest-victim-data-breach-26114866\">all were hacked<\/a> and had shopper\u2019s credit card information stolen. Fortunately, some of the information was encrypted and thus unusable to the hackers. Their response was to <a href=\"http:\/\/www.businessweek.com\/articles\/2014-09-12\/home-depot-didnt-encrypt-credit-card-data-former-workers-say\">begin<\/a> encrypting more of the credit card data. It seemed to be a very natural step. Once you become aware of your vulnerability, you begin to develop new ways to protect yourself.<br \/>\nIt also has been a rough year for people who take pictures on their cell phones. After hundreds of naked celebrity photos were recently leaked\u2014allegedly taken from the celebrities cellphones\u2014a popular photo-sharing app, Snapchat, was also <a href=\"http:\/\/money.cnn.com\/2014\/10\/10\/technology\/mobile\/snapchat-not-private\/index.html\">hacked<\/a>. Apple and Google both <a href=\"http:\/\/rt.com\/usa\/197132-fbi-apple-google-privacy\/\">decided<\/a> to encrypt their cell phones to make them more private and secure. But not everyone is happy about this move to protect cell phone user\u2019s privacy from hackers.<br \/>\nAccording to <a href=\"http:\/\/money.cnn.com\/2014\/10\/13\/technology\/security\/fbi-apple\/index.html\">CNN Money<\/a> the FBI Director compared selling iPhones with new data encryption to selling &#8220;cars with trunks that couldn&#8217;t ever be opened by law enforcement with a court order.&#8221; Furthermore, <a href=\"http:\/\/money.cnn.com\/2014\/10\/13\/technology\/security\/fbi-apple\/index.html\">he added to CBS<\/a>, &#8220;The notion that people have devices . . . that with court orders, based on a showing of probable cause in a case involving kidnapping or child exploitation or terrorism, we could never open that phone? My sense is that we&#8217;ve gone too far when we&#8217;ve gone there.&#8221; The Director of the FBI <a href=\"http:\/\/www.cbsnews.com\/news\/fbi-director-james-comey-on-privacy-and-surveillance\/\">asserted<\/a> that the FBI always gets court orders before forcing a company to use their \u201cbackdoor\u201d and turn over user records. He also <a href=\"http:\/\/rt.com\/usa\/197132-fbi-apple-google-privacy\/\">said<\/a> that \u201c[w]e also need a regulatory or legislative fix . . . so that all communication service providers are held to the same standard,\u201d and that companies like Apple or Google, should be required to build lawful intercept capabilities for law enforcement.<\/p>\n<blockquote><p>The FBI\u2019s actions using a back-door for a cellphone search warrant are essentially akin to executing a search warrant on a home, without notifying the resident.<\/p><\/blockquote>\n<p>This brings up a very interesting point. The FBI\u2019s actions using a back-door for a cellphone search warrant are essentially akin to executing a search warrant on a home, without notifying the resident. There has long been a \u201cknock and announce\u201d rule. For more information on this, please see the Supreme Court\u2019s application of the \u201cknock and announce rule\u201d as part of a \u201creasonable search\u201d in <a href=\"http:\/\/www.law.cornell.edu\/wex-cgi\/wexlink?wexns=USR&amp;wexname=514:927#content\">Wilson v. Arkansas<\/a>, 514 U.S. 927 (1995).The Supreme Court <a href=\"http:\/\/www.law.cornell.edu\/supremecourt\/text\/547\/586\">identified<\/a> several reasons for the \u201cknock and announce\u201d rule including protecting the occupants&#8217; privacy and dignity. While law enforcement do have access to a \u201csneak-and-peek\u201d warrant, those type of warrants are <a href=\"https:\/\/ssd.eff.org\/your-computer\/govt\/sneak-and-peek\">extremely rare<\/a>, and only about fifty are issued a year across the entire country. The FBI\u2019s current access to phones is similar to this extremely rare \u201csneak-and-peek\u201d without any valid reason.<br \/>\nIn <a href=\"http:\/\/www.supremecourt.gov\/opinions\/13pdf\/13-132_8l9c.pdf\">Riley v. California<\/a>, the Supreme Court held that a cellphone is more protected than an arrested person\u2019s other belongings. <a href=\"http:\/\/www.supremecourt.gov\/opinions\/13pdf\/13-132_8l9c.pdf\">\u201cA cell phone search would typically expose to the government far <em>more<\/em> than the most exhaustive search of a house: A phone not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form\u2014unless the phone is.\u201d<\/a> With the importance the Supreme Court places on cell phone privacy, why are they being even less protected than a home?<br \/>\nThe Director of the FBI\u2019s comment that \u201cwith court orders . . . we could never open that phone\u201d is utterly unrealistic. Rather, after law enforcement obtained a court order, the law enforcement agency would be required to approach the phone\u2019s owner, inform them of the order, and then access it within their oversight, like a traditional, legal, and dignified search of a home.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It has been an arduous year for credit card users. Target, Home Depot, and K-Mart all were hacked and had shopper\u2019s credit card information stolen. Fortunately, some of the information was encrypted and thus unusable to the hackers. Their response was to begin encrypting more of the credit card data. It seemed to be a <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/will-new-cellphone-encryption-prevent-the-fbi-from-abusing-your-privacy\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":3140,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3139"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=3139"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3139\/revisions"}],"predecessor-version":[{"id":7416,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/3139\/revisions\/7416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/3140"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=3139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=3139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=3139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}