Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
If you're arrested for allegedly committing a crime and the courts order you to use your physical key to open a safe deposit box so they can examine the contents, is that legal? It seems like this case would be no different, with a key of a more modern kind being used to access the files.

I agree that this is consistent with the way U.S. law has worked - testimony (contents of the mind) cannot be compelled, but a legal search warrant is the "key" to physical/documentary evidence.

My question is whether the contents of a smartphone might enter the realm of "contents of the mind" rather than documentary evidence. Can it become a spouse-equivalent that cannot be compelled to testify against its spouse? Is there a doctor-patient or attorney-client privilege? Or will it remain the equivalent of a household servant/office employee, who can be compelled to speak?

It's a matter of the nature of the "relationship" a person has with their smart devices and how that relationship may become even more intimate as technology evolves. Voice and gestural control of the world around us is opening even deeper levels of "intimacy." 'Every breath you take, every move you make... I'll be watching you.'

The benefits we may obtain from these new technologies require ever-deepening levels of trust - we'll have to trust our self-driving vehicles with our lives. That simply cannot happen if we have reason to fear Siri and company. Isaac Asimov explored that question extensively and concluded that we would not embrace robots, though his reasons tended to be closer to xenophobia than rational distrust.

At the least, the comprehensive nature of the information recorded argues for limitations on the power of a search warrant - the warrant can't be a fishing expedition into every aspect of a person's life.

What of a legal, warrantless search (such as when you've been arrested while committing a crime)? The comprehensive nature of the recorded information would argue that there is a reasonable expectation that evidence of the crime is contained within, so it would be very difficult to argue that a search is illegitimate.

To what degree is a smart device akin to an automobile, that cannot be subjected to warrantless search without reasonable cause? Is the smart device a place/situation where we have a reasonable expectation of privacy (again, a "place" exempted from warrantless search)? Do Pass codes and biometric locks give us a reasonable expectation of privacy?

So much more information is collected, both intentionally and incidentally, than we could ever have imagined in the days of paper and pencil. It is far more organized (i.e. susceptible to efficient search) than conventional evidence. Essentially, is a smartphone a direct extension of our mind? Its ability to make us more effective (never forgetting a birthday, appointment, or password) entices us to share. Its nonjudgmental nature encourages us to confide.

These are all interesting questions, but what of the answers? It's clear that "forgetfulness" benefits both manufacturer/service provider and end user - classes of data that will automatically be purged (absent a legal order to the contrary, of course - I can imagine an entire body of law devoted to this - a temporary, automatic, police-ordered "stay," while actual disclosure awaits a valid warrant...).

What of the "wrong finger" tactic? It certainly can fall into the realm of tampering with/destroying evidence or refusing to comply with a legal warrant. Since police have a compelling reason to prevent destruction of evidence, I'd think they will not compel an on-the-spot unlock, outside of cases where an unlock may avert immediate public danger. If time is not of the essence, it's probably better to obtain a warrant and perform the unlock under controlled conditions - with legal counsel in attendance. That's a matter of good police procedure, rather than constitutional protections.
 
  • Like
Reactions: manu chao
yikes .. i guess people will start disabling touch id for long passcodes
Most people will keep using Touch ID because it saves them an extra 1 second everytile they unlock their phone and won't ever be in the position where they could be ordered to unlock their phone.
 
  • Like
Reactions: burgman
I have an idea that would prove useful in this scenario and many others.

Apple should implement a self-wipe voice command to iPhone.

Say, train Siri to recognize your voice and a specific command which you can set and can be activated with Hey Siri.

"Hey Siri, code red."

>Phone is restored to factory defaults.
 
  • Like
Reactions: manu chao
How about an auto-destruct wipe finger.

Say you put your middle finger and all your phones content gets wiped.

Or better yet. Assign a set of fingers to disable Touch ID and require passcode and erase after 10 attempts.

I wish there was a lock now Touch ID. I have mine to lock after so many minutes with passcode.
 
  • Like
Reactions: Aldaris
Touchid is a great convience, but if you are very serious about privacy/security, disable it and use a long passcodes, it's very hard to remember those codes when stressed....
When I am stressed, I can't remember which finger I used.
or I used some other body parts ....
 
I use passcode only with my one finger. I keep my other finger in the trigger location.
 
When I am stressed, I can't remember which finger I used.
or I used some other body parts ....

You may accidentally hit you head while in custody and wake up to find your phone has been unlocked..... ;)
 
There is a button on the side or top of your iPhone which does this. Hold it down for a few seconds until the screen goes dark.
Yes but if someone was forcing you to unlock your device, they would see you trying that and stop you. It would need to be something real quick.
 
An iPhone has GPS, which is usually turned off. Information about your previous locations is not stored, unless you install an app that specifically does that. There was an outcry and a bugfix some years ago when it turned out that the iPhone cached locations of cell towers near locations where you were; that information was nowhere near accurate enough to provide evidence of trespassing, and doesn't get stored anymore.

This is incorrect. If you have an iPhone go into Settings->Privacy->Location Services->System Services (at bottom)->Frequent Locations. Unless you have turned it off you will see that your phone has tracked many locations for you. It will do this using Wi-Fi and cell signals even if you have the GPS off. Unless you have disabled location services, it will be periodically turning the GPS on itself anyway.

Furthermore, this is certainly not the only place your iPhone keeps location data. If you jailbreak an iPhone and look at the system databases it uses you will see that iOS snapshots your location every single time you launch an app unless you have specifically turned that off as well. It does this using GPS, Wi-Fi and cell and is very accurate... much more than the cached cell tower locations from before.

In short, by default your iPhone is tracking your location an awful lot.
 
Touch ID times out if it's over 24 hours without a login or the phone is restarted. How could they possibly have compelled her within that timeframe?

To obtain a warrant all you need to do is call a judge. It really doesn't take long to do.
 
I think the article is using the SJW definition of "forced". It appears that the police have the the phone, there is a warrant, and the woman is being compelled by the court to unlock it or face a an additional contempt charge. I'm looking for the part where the police took hold of her hand and forced her to apply it to the phone but have not found it yet.

I assume that the police have her fingerprints from booking. Why would they need to compel her to unlock the phone when they can simply do it themselves?
 
An iPhone has GPS, which is usually turned off. Information about your previous locations is not stored, unless you install an app that specifically does that. There was an outcry and a bugfix some years ago when it turned out that the iPhone cached locations of cell towers near locations where you were; that information was nowhere near accurate enough to provide evidence of trespassing, and doesn't get stored anymore.

Actually, the cache has two things: cell towers your phone hears (which isn't very useful for location tracking) and WiFi access points your phone hears. The latter provides very good location accuracy, although not enough to prove trespassing unless the area is very large, or there's no way to hear the WiFi AP outside the prohibited area.

The data is still cached -- it's used to estimate your position, and makes GPS signal acquisition MUCH faster. By maintaining the cache of recent WiFi APs that are heard, the phone doesn't constantly query Apple's database and use up your network bandwidth. The bug was in the algorithm to purge older entries from the cache.

https://www.apple.com/pr/library/2011/04/27Apple-Q-A-on-Location-Data.html

In this article, Apple says they think it shouldn't retain more than 7 days of data. I wasn't able to quickly find a citation that says exactly how long an iPhone now keeps a cache entry.

When I first read the claim that "your iPhone is tracking you", I found the data (an SQLite database) in my iPhone backup and looked at it myself. I noticed the use of MAC addresses for an index, and immediately suspected it was a WiFi location cache. But, it was confirmed when I wrote a script to convert the database to a series of markers on a Google Maps page. By zooming in and examining the actual locations, I confirmed the points were NEAR my known locations, about a block away from a bike trail I ride frequently. But, I had never been at the actual location in the cache, at least in the time I owned my iPhone.

It was interesting to see the distribution of points that were mapped, all over the US and a few places outside the country. I did a lot of traveling for business during that time, and the map was almost a travelogue of my days as a "road warrior". But, there were some errors, too. One point was in the middle of San Jose, and I hadn't been there over a decade. I presumed that Apple's database placed the MAC address in the wrong place -- either because the AP was moved, or perhaps because it was a mobile hotspot.
 
  • Like
Reactions: jnpy!$4g3cwk
This is brutal. Wow. I don't even know what to say. This is complete 5th A BS.

Anyone who says "well don't commit crimes and you'll have nothing to worry about" is a complete tool.

China has never even considered this.

Looks like the US has officially become Room 101.
[doublepost=1462215956][/doublepost]
Also very interesting is that your fingerprints are captured when you enter US for a non citizen . Fingerprint scanners are not a good form of security, they are a convience
That's why Japan does finger and retina now.
 
use the wrong finger three times, and it will require a code. The warrant probably doesn't cover the code. It will just delay things...
 
id be sweating so much my finger wouldnt even work anyway lol happens to me post of summer

Also very interesting is that your fingerprints are captured when you enter US for a non citizen . Fingerprint scanners are not a good form of security, they are a convience

they also scan your retina
 
  • Like
Reactions: manu chao
I assume that the police have her fingerprints from booking. Why would they need to compel her to unlock the phone when they can simply do it themselves?
How long does it take you to create a fake finger and unlock a phone using a digitally stored fingerprint or an ink-on-paper image? Can you describe the simple process you use?
 
Touch ID times out if it's over 24 hours without a login or the phone is restarted. How could they possibly have compelled her within that timeframe?

The article wrote: "U.S. Magistrate Judge Alicia Rosenberg signed the Touch ID-related search warrant about 45 minutes after Bkhchadzhyan was taken into custody".
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.