{"id":4742,"date":"2016-10-20T13:34:16","date_gmt":"2016-10-20T17:34:16","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4742"},"modified":"2020-06-04T20:52:58","modified_gmt":"2020-06-04T20:52:58","slug":"feds-approved-unlock-phones-fingerprints","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/feds-approved-unlock-phones-fingerprints\/","title":{"rendered":"Maybe Switch to a Password: Feds Approved to Unlock Phones with Fingerprints"},"content":{"rendered":"<p>On October 16, 2016, Forbes <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/10\/16\/doj-demands-mass-fingerprint-seizure-to-open-iphones\/#49e808798d9d\">reported on a court filing<\/a><\/span> from May 2016, detailing a Department of Justice search warrant request. This memo in support of a search warrant wasn\u2019t just for a search of the house, nor even of unlocked phones. The memo in support of the warrant in question sought permission to \u201cdepress the fingerprints and thumbprints\u201d of everyone at the search location believed to be in connection with the search (in other words, everyone at the search location). The <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.documentcloud.org\/documents\/3143273-Mass-Fingerprint-Case-Redacted-Copy-1.html\">memo cites<\/a><\/span> various phone protections of the devices &#8211; such as Apple products requiring the use of a passcode after five failed fingerprint attempts and use of a passcode after more than 48 hours without unlocking the phone \u2013 as reasons why use of fingerprints to unlock phones during the search should be granted. Why wait to gather other evidence during a search if you don\u2019t have to?<br \/>\nThis memo comes on the heels of the FBI\u2019s attempt to force Apple to hack into an iPhone owned by one of the alleged shooters in the San Bernadino terrorist attacks of December 2015. To refresh your memory, despite obtaining an order compelling Apple to hack into the suspect\u2019s iPhone, the tech company refused. Apple stated the software the FBI wanted Apple to create to override the phone\u2019s security features would open a \u201cbackdoor\u201d into all iPhones around the world. The battle was cut short when the government announced it had found its own way to hack into the phone without Apple\u2019s help, a turn of events Apple was not <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.latimes.com\/business\/technology\/la-fi-tn-apple-next-steps-20160330-story.html\">particularly happy to hear<\/a><\/span>.<br \/>\nIs this newly surfaced memo in support of a search warrant as unprecedented as Forbes reports, or even that surprising? The FBI has already announced that it was able to hack into the San Bernadino suspect\u2019s phone, and by inference, any other iPhone the Bureau may feel the need to dig into. A <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.pcworld.com\/article\/3131560\/security\/to-unlock-phones-feds-demand-all-occupants-surrender-fingerprints.html\">Los Angeles<\/a><\/span> court granted a search warrant in early 2016 compelling a woman with Armenian gang connections to unlock her phone with her fingerprints. Government access to personal data goes beyond smartphones and criminal investigations already; earlier this month <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-yahoo-nsa-exclusive-idUSKCN1241YT\">Reuters reported<\/a><\/span> that Yahoo secretly scanned emails in real time \u201cfor specific information provided by U.S. intelligence officials.\u201d With so much information already being provided to the federal government, one might be so desensitized as to wonder if one more fingerprint (or a household of fingerprints) is truly shocking.<br \/>\nThat it was a household of fingerprints seems to be the main difference between the above mentioned instances and the search warrant in question.<\/p>\n<blockquote><p>Though the memo attempts to limit their search to those \u201creasonably connected with the search\u201d, there is no reason to believe that this would not include all persons present at the property while the search was conducted.<\/p><\/blockquote>\n<p>While the search warrant itself has not surfaced, Forbes reports that the search has apparently occurred.<br \/>\nPotentially more frightening is the part of the memo not having to do with fingerprints. The memo in question partially relies on <em>Virginia v. Baust<\/em>, a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.scribd.com\/doc\/245628784\/Fingerprint-Unlocking-Ruling\">Virginia Circuit Court<\/a><\/span> ruling which held that a criminal suspect \u201ccannot be compelled to produce his passcode to access his smartphone but he can be compelled to produce his fingerprint to do the same.\u201d This holding was based on the premise that passcodes fall under 5th Amendment protections against self-incrimination, while fingerprints do not. However, the memo states that the warrant includes \u201cseizure of passwords, encryption keys, and other access devices that may be necessary to access the device\u201d with little explanation as to how this access would not violate the 5th Amendment. While the prevailing logic from Virginia and a federal District Court in Pennsylvania <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/gizmodo.com\/reminder-you-dont-have-to-tell-police-your-phone-passc-1733036749\">is that<\/a><\/span> suspects do not have to reveal phone passcodes to police, there is not yet any Supreme Court precedent on the matter, leaving the Department of Justice seemingly able to cherry-pick arguments from various states and circuits as it pleases in order to obtain the type of search warrant most suitable to the Department\u2019s needs.<br \/>\nBetween search warrants for fingerprints and government hacking of suspect\u2019s phones, perhaps the best choice we have at the moment is to choose a <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.thedailybeast.com\/articles\/2015\/09\/07\/don-t-hate-me-because-i-don-t-have-a-cellphone.html\">cell phone-less<\/a><\/span> life until further notice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 16, 2016, Forbes reported on a court filing from May 2016, detailing a Department of Justice search warrant request. This memo in support of a search warrant wasn\u2019t just for a search of the house, nor even of unlocked phones. The memo in support of the warrant in question sought permission to \u201cdepress <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/feds-approved-unlock-phones-fingerprints\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4743,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4742"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4742"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4742\/revisions"}],"predecessor-version":[{"id":7151,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4742\/revisions\/7151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4743"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}