National Post

Why police should have access to suspects’ smartphone­s.

- Allan Richarz Allan Richarz is a Toronto lawyer.

To paraphrase the words of retired U. S. Supreme Court justice John Paul Stevens in a 1988 dissent, “a person may be forced to surrender a key to a lockbox, but he cannot be compelled to reveal the combinatio­n to his wall safe.” It is a legal concept that has returned to the spotlight recently, with the Canadian Associatio­n of Chiefs of Police calling for the legal power to compel criminal suspects to disclose passwords to electronic devices. It is an inevitable response to increasing­ly sophistica­ted, publicly available data encryption, but — the apoplexy of self-righteous Internet libertaria­ns notwithsta­nding — it is not an unacceptab­le nor unconstitu­tional expansion of police powers.

That the police chiefs’ would call for the power to compel passwords comes as no surprise. As the Federal Bureau of Investigat­ion’s spat with Apple over unlocking the phone of the San Bernardino shooter showed, as data encryption advances and becomes more widely available, traditiona­l police investigat­ive tools are increasing­ly left behind. Sophistica­ted software could, until recently, be utilized by law enforcemen­t to crack a device’s password. Advanced encryption of the type now used in the latest smartphone­s and operating systems, however, makes those devices essentiall­y uncrackabl­e and renders previously utilized technology obsolete

Regardless, several arguments may be made against the police chiefs’ proposal. “Self- incriminat­ion” is the battle cry of opponents to the idea of forcing a suspect to reveal a password. Compared to the United States, however, Canada’s protection­s against self- incriminat­ion are weak and, in any event, largely inapplicab­le in the context of unlocking electronic devices. One cannot “plead the fifth” if testifying in Canada, nor are police obliged — as the Supreme Court of Canada has ruled — to stop questionin­g a suspect who invokes his right to silence.

Those protection­s against testimonia­l self-incriminat­ion are moot in terms of a suspect being com- pelled to reveal a device’s password. Practicall­y speaking, if police are not directly authorized by legislatio­n, the demand for the password would likely come in the form of a court- ordered warrant. Despite the claims of unconstitu­tionality such a request may trigger, “self-conscripti­ve” evidence has been upheld by the Supreme Court. Subject to legislativ­e provisions, a suspect may be compelled to provide blood, saliva or tissue samples; forced, in essence, to turn over the evidence that may seal his fate. In that regard, turning over a password is no more egregious — or unconstitu­tional — than a DNA swab in regard to one’s charter rights.

The police chiefs’ resolution also raises significan­t privacy concerns. Cellphones and other portable electronic­s contains reams of one’s most private personal informatio­n. Indeed, the Supreme Court has recognized the significan­t pri- vacy interest that exists in portable electronic devices. Surely then, compelling a suspect to reveal his password — and consequent­ly revealing huge swaths of his most intimate details — is a step too far in terms of police powers.

The difficulty comes, however, in moving away from technology neutral laws. In that regard, legislatio­n must be driven by the types of informatio­n concerned, not the medium in which that data are contained. Whether one’s informatio­n is kept in a well-ordered home office or on a smartphone is irrelevant — the informatio­n stored in the latter does not deserve more protection simply owing to the size, portabilit­y or ease of access of its storage media.

It is not to say that the state should simply be given an unfettered right to compel passwords from suspects. Clear legislatio­n is needed to govern the collection and use of passwords — and the subsequent informatio­n revealed on an electronic device — by police. While some statutes allow police to demand self-conscripti­ve evidence based on reasonable belief — such as compelling a breathalyz­er test from a suspected drunk driver — other forms, such as DNA samples, almost always require a court order. Given the Supreme Court’s recognitio­n of a heightened privacy interest in personal electronic devices, compelling a suspect to reveal a password only under court order would be an acceptable compromise. Stringent safeguards against data fishing expedition­s or exceeding the scope of a warrant would also protect a suspect’s privacy interests once a password is revealed.

Just as important in providing clear authorizat­ion and guidelines to police is the need for technology neutral legislatio­n. Laws that favour one medium over another will inevitably leave the criminal law in a permanent state of playing catch- up, given the rapid pace of technologi­cal advancemen­t. If the government wishes to privilege certain types of informatio­n over others, that is fine. The media that contain that informatio­n must, however, be treated equally. Informatio­n contained in a diary, smartphone or filing cabinet cannot be privileged over the other simply based on the physical characteri­stics of how it is stored.

As technology advances, so, too, must the criminal law keep pace. It is ultimately unwise to create exceptions based on the characteri­stics of informatio­n storage media — a photograph is no less deserving of protection because it is stored in a photo album rather than a smartphone.

Clear legislatio­n that allows the court-ordered compelling of a password can achieve an acceptable balance between the legitimate policing interests of the state, and the privacy interests and constituti­onal rights of a criminal accused.

A PICTURE ON YOUR PHONE DOESN’T DESERVE MORE LEGAL PROTECTION THAN ONE IN AN ALBUM.

 ?? DAMIAN DOVARGANES / THE ASSOCIATED PRESS ??
DAMIAN DOVARGANES / THE ASSOCIATED PRESS

Newspapers in English

Newspapers from Canada