In the
United States Court of Appeals
For the Seventh Circuit
No. 10-3803
U NITED S TATES OF A MERICA,
Plaintiff-Appellee,
v.
A BEL F LORES-L OPEZ,
Defendant-Appellant.
Appeal from the United States District Court
for the Southern District of Indiana, Indianapolis Division.
No. 1:09-cr-00136-WTL-KPF-2—William T. Lawrence, Judge.
A RGUED JANUARY 25, 2012—D ECIDED F EBRUARY 29, 2012
Before B AUER, P OSNER, and R OVNER, Circuit Judges.
P OSNER, Circuit Judge. This appeal requires us to
consider the circumstances in which the search of a cell
phone is permitted by the Fourth Amendment even if
the search is not authorized by a warrant. Lurking
behind this issue is the question whether and when a
laptop or desktop computer, tablet, or other type of
computer (whether called a “computer” or not) can be
searched without a warrant—for a modern cell phone is
a computer.
2 No. 10-3803
Law enforcement authorities had reason to believe that
the defendant was a supplier of illegal drugs to another
drug dealer, Alberto Santana-Cabrera, who in turn had
a retail customer who unbeknownst to him was a paid
police informant. The informant, after ordering a pound
of methamphetamine from Santana-Cabrera (a large
quantity—the informant’s hope was that it would induce
Santana-Cabrera’s supplier to attend the sale, thus
enabling the police to land a bigger fish), overheard a
phone conversation between Santana-Cabrera and the
defendant in which the latter said he would deliver the
meth that had been ordered to a garage, where the sale
would take place. The police were listening in on
the conversation remotely and arrested Santana-Cabrera
in the garage and the defendant in front of it.
The defendant had driven a truck containing the meth
to the garage, and together with Santana-Cabrera had
carried the meth into the garage to await a fourth person
(actually an undercover agent), who was to bring the
cash for the deal. Upon arresting the defendant and
Santana-Cabrera, officers searched the defendant and
his truck and seized a cell phone from the defendant’s
person and two other cell phones from the truck. The
defendant admitted that the cell phone found on his
person was his but denied that the other cell phones were.
He was tried together with Santana-Cabrera and both
were convicted of drug and related offenses. The
defendant was sentenced to 10 years in prison. Their
appeals were consolidated, but we are deciding Santana-
Cabrera’s appeal in a separate order, also issued today.
No. 10-3803 3
At the scene of the drug sale and arrests, an officer
searched each cell phone for its telephone number, which
the government later used to subpoena three months
of each cell phone’s call history from the telephone com-
pany. At trial the government sought to introduce the
call history into evidence. The history included the de-
fendant’s overheard phone conversation with Santana-
Cabrera along with many other calls between the defen-
dant and his coconspirators. After a brief hearing the
judge overruled the defendant’s objection, which how-
ever was limited to the call history of the cell phone that
he admitted was his, since he denied owning or having
used the other cell phones.
The defendant argues that the search of his cell phone
was unreasonable because not conducted pursuant to
a warrant. The phone number itself was not in-
criminating evidence, but it enabled the government
to obtain such evidence from the phone company, and
that evidence, the defendant argues, was the fruit of
an illegal search and was therefore inadmissible.
Building on the definition in New York v. Belton, 453
U.S. 454, 460 n. 4 (1981), of a container as “any object
capable of holding another object,” the government
responds, with support in case law, see, e.g., United
States v. Murphy, 552 F.3d 405, 410-12 (4th Cir. 2009);
United States v. Finley, 477 F.3d 250, 259-60 (5th Cir.
2007); cf. United States v. Ortiz, 84 F.3d 977, 984 (7th Cir.
1996) (pager); United States v. Thomas, 114 F.3d 403, 404
n. 2 (3d Cir. 1997) (dictum) (same); but see State v.
Smith, 920 N.E.2d 949, 953-54 (Ohio 2009), that any
4 No. 10-3803
object that can contain anything else, including data, is a
container. A diary is a container—and not only of pages
between which a razor blade or a sheet of LSD could
be concealed, a possibility that justifies the police in
turning each page. It is also a container of information,
as is a cell phone or other computer. And since a
container found on the person of someone who is
arrested may be searched as an incident to the arrest
even if the arresting officers don’t suspect that the con-
tainer holds a weapon or contraband, and thus without
any justification specific to that container, United States
v. Robinson, 414 U.S. 218, 236 (1973), the government
urges that a cell phone seized as an incident to an
arrest can likewise be freely searched.
This is a fair literal reading of the Robinson decision.
But the Court did not reject the possibility of categorical
limits to the rule laid down in it. Suppose the police stop
a suspected drug dealer and find a diary, but a quick
look reveals that it is a personal diary rather than a
record of drug transactions, yet the officers keep on
reading. A court might say that acquiring information
known to be unrelated to the crime of which the person
being arrested is suspected is an intrusion beyond the
scope of Robinson’s rule.
A modern cell phone is in one aspect a diary writ large.
Even when used primarily for business it is quite likely
to contain, or provide ready access to, a vast body of
personal data. The potential invasion of privacy in a
search of a cell phone is greater than in a search of a
“container” in a conventional sense even when the con-
No. 10-3803 5
ventional container is a purse that contains an address
book (itself a container) and photos. Judges are becoming
aware that a computer (and remember that a modern cell
phone is a computer) is not just another purse or address
book. “[A]nalogizing computers to other physical objects
when applying Fourth Amendment law is not an exact
fit because computers hold so much personal and
sensitive information touching on many private aspects
of life. . . . [T]here is a far greater potential for the ‘inter-
mingling’ of documents and a consequent invasion
of privacy when police execute a search for evidence on
a computer.” United States v. Lucas, 640 F.3d 168, 178
(6th Cir. 2011); see also United States v. Walser, 275 F.3d
981, 986 (10th Cir. 2001); United States v. Carey, 172
F.3d 1268, 1275 (10th Cir. 1999); cf. United States v. Com-
prehensive Drug Testing, Inc., 621 F.3d 1162, 1175-77 (9th
Cir. 2010); United States v. Otero, 563 F.3d 1127, 1132
(10th Cir. 2009). An iPhone application called iCam
allows you to access your home computer’s webcam so
that you can survey the inside of your home while you’re
a thousand miles away. “iCam—Webcam Video Stream-
ing,” http://itunes.apple.com/us/app/icam-webcam-video-
streaming/id296273730?mt=8 (visited Feb. 6, 2012, as
were the other web sites that we cite in this opinion).
At the touch of a button a cell phone search becomes
a house search, and that is not a search of a “container”
in any normal sense of that word, though a house
contains data.
A complication in this case is that, remarkably, the
record does not indicate the brand, model, or year of
6 No. 10-3803
the defendant’s cell phone, so we do not know how
dumb or smart it is. But does that matter? Even the dumb-
est of modern cell phones gives the user access to large
stores of information. For example, the “TracFone Prepaid
Cell Phone,” sold by Walgreens for $14.99, includes a
camera, MMS (multimedia messaging service) picture
messaging for sending and receiving photos, video, etc.,
mobile web access, text messaging, voicemail, call
waiting, a voice recorder, and a phonebook that can
hold 1000 entries. Walgreens, “TracFone Prepaid
Cell Phone,” www.walgreens.com/store/c/tracfone-
prepaid-cell-phone/ID=prod6046552-product.
Given the modern understanding that a warrant is
presumptively required for a search—though actually the
text of the Fourth Amendment limits searches pursuant
to warrants, see references in United States v. Sims, 553
F.3d 580, 582-83 (7th Cir. 2009), and requires of searches
without a warrant only that they be reasonable, the au-
thority to search a person incident to an arrest, without
a warrant, requires justification. The usual justification
offered is “the need [of the arresting officers] to
disarm and to discover evidence,” United States v.
Robinson, supra, 414 U.S. at 235, or, more exactingly,
evidence that the defendant or his accomplices might
destroy, discard, or conceal. Chimel v. California, 395 U.S.
752, 763 (1969). The restrictions on searching without a
warrant are relaxed when police arrest the driver
or passenger of a moving vehicle. They can search the
passenger compartment even if they have no reason
to think they’ll find any evidence, provided that “the
arrestee is unsecured and within reaching distance of
No. 10-3803 7
the passenger compartment at the time of the search.”
Arizona v. Gant, 129 S. Ct. 1710, 1719 (2009). But in this
case the arrest, and the search of the cell phone found
on the defendant’s person, took place after he had parked
and left his vehicle, and so any special rules applicable
to searches when police stop a vehicle and arrest an
occupant are inapplicable.
In some cases, a search of a cell phone, though not
authorized by a warrant, is justified by police officers’
reasonable concerns for their safety. One can buy a stun
gun that looks like a cell phone. Best Stun Gun, “Cell
Phone Stun Guns—Security Products in Disguise,”
www.beststungun.com/cell-phone-stun-gun.html; Safety
Products Unlimited, “The Cell Phone Stun Gun,” www.
safetyproductsunlimited.com/cell_phone_stun_gun.html.
But the defendant’s cell phone, once securely in
the hands of an arresting officer, endangered no one. It
did, however, contain evidence or leads to evidence—as
the officers knew was likely because they knew from
their informant that as is typical of drug dealers the
defendant had used cell phones to talk to Santana-
Cabrera and other coconspirators.
But was there any urgency about searching the cell
phone for its phone number? Yet even if there wasn’t, that
bit of information might be so trivial that its seizure
would not infringe the Fourth Amendment. In United
States v. Concepcion, 942 F.2d 1170, 1172-73 (7th Cir.
1991), police officers tested the keys of a person they
had arrested on various locks to discover which door
gave ingress to his residence, and this we said was a
8 No. 10-3803
search—and any doubts on that score have been scotched
by United States v. Jones, 132 S. Ct. 945, 949 (2011), which
holds that attaching a GPS device to a vehicle is a search
because “the Government physically occupied private
property for the purpose of obtaining information.” But
we went on to hold in Concepcion that a minimally
invasive search may be lawful in the absence of
a warrant, even if the usual reasons for excusing the
failure to obtain a warrant are absent, a holding that is
implied by Robinson and survives Jones, which declined
to decide whether the search entailed in attaching a GPS
device requires a warrant. Id. at 954.
So opening the diary found on the suspect whom the
police have arrested, to verify his name and address and
discover whether the diary contains information
relevant to the crime for which he has been arrested,
clearly is permissible; and what happened in this case
was similar but even less intrusive, since a cell phone’s
phone number can be found without searching
the phone’s contents, unless the phone is password-
protected—and on some cell phones even if it is. On an
iPhone without password protection two steps are re-
quired to get the number: touching the “settings” icon and
then the “phone” icon. On a Blackberry only one step is
required: touching the “phone” icon. Moreover, the
phone company knows a phone’s number as soon as
the call is connected to the telephone network; and ob-
taining that information from the phone company
isn’t a search because by subscribing to the telephone
service the user of the phone is deemed to surrender
No. 10-3803 9
any privacy interest he may have had in his phone num-
ber. Smith v. Maryland, 442 U.S. 735, 742-43 (1979).
We are quite a distance from the use of the iCam to view
what is happening in the bedroom of the owner of the
seized cell phone.
It’s not even clear that we need a rule of law specific
to cell phones or other computers. If police are entitled
to open a pocket diary to copy the owner’s address, they
should be entitled to turn on a cell phone to learn its
number. If allowed to leaf through a pocket address
book, as they are, United States v. Rodriguez, 995 F.2d 776,
778 (7th Cir. 1993), they should be entitled to read the
address book in a cell phone. If forbidden to peruse love
letters recognized as such found wedged between the
pages of the address book, they should be forbidden to
read love letters in the files of a cell phone. There is an
analogy (implied in United States v. Mann, 592 F.3d 779
(7th Cir. 2010), and cases discussed there) to the require-
ment that wiretaps “minimize the interception of com-
munications not otherwise subject to interception.”
18 U.S.C. § 2518(5); Scott v. United States, 436 U.S. 128, 130-
43 (1978); United States v. Mansoori, 304 F.3d 635, 645-
49 (7th Cir. 2002).
But set all this to one side and assume that justifica-
tion is required for police who have no warrant to look
inside a cell phone even if all they’re looking for and
all they find is the phone number. The government em-
phasizes the danger of “remote wiping.” Instant wiping,
called “local wiping,” as by pressing a button on the
cell phone that wipes its contents and at the same
time sends an emergency alert to a person previously
10 No. 10-3803
specified, see, e.g., Andrew Quinn, “U.S. Develops
‘Panic Button’ for Democracy Activists,” Mar. 25, 2011,
w w w .r eu t e rs .c o m / ar tic le /2 0 1 1/ 03 /2 5 /u s -r ig h t s -u s a -
technology-idUSTRE72O6DH20110325; BlackBerry, “Set
Maximum Password Attempts IT Policy Rule,”
http://docs.blackberry.com/en/admin/deliverables/4222/
Set_Maximum_Password_Attempts_204136_11.jsp, was not
a danger in this case once the officers seized the cell
phone. But remote-wiping capability is available on all
major cell-phone platforms; if the phone’s manufacturer
doesn’t offer it, it can be bought from a mobile-security
company. See, e.g., “Find My iPhone,” www.apple.com/
iphone/built-in-apps/find-my-iphone.html; “McAfee Mo-
bile Security for Android,” www.mcafeemobilesecurity.
com; “Kaspersky Mobile Security 9,” http://usa.kaspersky.
com/products-services/home-computer-security/mobile-
security. Wiped data may be recoverable in a laboratory,
but that involves delay.
According to Apple, a person with a “jailbroken”
iPhone (that is, a “self-hacked” iPhone, modified by its
owner to enlarge its functionality or run unauthorized
applications) could enable anonymous phone calls to
be made, a capability that Apple claims “would be desir-
able to drug dealers.” David Kravets, “iPhone Jail-
breaking Could Crash Cellphone Towers, Apple Claims,”
Wired, July 28, 2009, www.wired.com/threatlevel/2009/07/
jailbreak/. Apple would like the “jailbreaking” of its
phones made illegal, so it is not a disinterested commenta-
tor on the use of its phones by those dealers. See,
e.g., Adam Cohen, “The iPhone Jailbreak: A Win
against Copyright Creep,” Time U.S., July 28, 2010,
www.time.com/time/nation/article/ 0,8599,2006956,00.html.
No. 10-3803 11
Other conspirators were involved in the distribution
of methamphetamine besides Santana-Cabrera and the
defendant, and conceivably could have learned of the
arrests (they might even have been monitoring the trans-
action with the informant in the garage from afar) and
wiped the cell phones remotely before the government
could obtain and execute a warrant and conduct a
search pursuant to it for the cell phone’s number; and
conceivably the defendant might have had time to warn
them before the cell phone was taken from him, giving
them time to wipe it. “Conceivably” is not “probably”; but
set off against the modest benefit to law enforcement of
being able to obtain the cell phone’s phone number im-
mediately was only a modest cost in invasion of privacy.
Armed with that number the officers could obtain the
call history at their leisure, and the defendant does not
deny that if the number was lawfully obtained the sub-
poenaing of the call history from the phone company
was also lawful and the history thus obtained could
therefore properly be used in evidence against him.
The defendant argues that the officers could have
eliminated any possibility of remote wiping just by
turning off the cell phone. Without power a cell phone
won’t be connected to the phone network and so remote
wiping will be impossible. See, e.g., T-Mobile, “Mobile
Security FAQs,” http://support.t-mobile.com/docs/DOC-
1852; “MobileMe: Troubleshooting, Find My iPhone,”
http://support.apple.com/kb/TS2734. But a “roving bug”
installed in the phone could record everything that the
phone’s microphone could pick up even though the
phone was turned off (because “turning off” a cell
12 No. 10-3803
phone often just means a reduction in power—a kind of
electronic hibernation). United States v. Tomero, 471 F. Supp.
2d 448, 450 and n. 2 (S.D.N.Y. 2007); Nicole Perlroth,
“Traveling Light in a Time of Digital Thievery,” New York
Times, Feb. 11, 2012, p. A1, www.nytimes.com/2012/
02/11/technology/electronic-security-a-worry-in-an-age-of-
digital-espionage.html; Vic Walter & Krista Kjellman, “Can
You Hear Me Now?,” ABC News, Dec. 5, 2006,
http://abcnews.go.com/blogs/headlines/2006/12/can_you
_hear_me/. What we said in Ortiz about pagers is
broadly applicable to cell phones: “The contents of some
pagers also can be destroyed merely by turning off the
power or touching a button. See, e.g., United States v.
Meriwether, 917 F.2d 955, 957 (6th Cir. 1990). Thus, it is
imperative that law enforcement officers have the
authority to immediately ‘search’ or retrieve, incident to
a valid arrest, information from a pager in order to
prevent its destruction as evidence.” United States v.
Ortiz, supra, 84 F.3d at 984.
And if the phone is either turned off or powered down
to a level at which it appears to be turned off, the
police can’t obtain information from it, even its phone
number, knowledge of which as we said is minimally
invasive of privacy. The alternative to searching the cell
phone forthwith or turning it off (really turning it off—not
just powering it down) is to place it in a “Faraday bag”
or “Faraday cage” (essentially an aluminum-foil wrap) or
some equivalent, which isolates the cell phone from the
phone network and from Bluetooth and wireless Internet
signals. See, e.g., Department of Justice, Computer Crime
and Intellectual Property Section, “Awareness Brief: Find
No. 10-3803 13
My iPhone” (June 18, 2009); Cindy Murphy, “Cellular
Phone Evidence: Data Extraction and Documenta-
tion,” http://mobileforensics.files.wordpress.com/2010/07/
cell-phone-evidence-extraction-process-development-1-1-
8.pdf. (Faraday bags or cages are found in consumer
products such as microwave ovens to keep the micro-
waves in, and in coaxial cables to keep interfering radio
signals out.) It is also possible to “mirror” (copy) the
entire cell phone contents, to preserve them should
the phone be remotely wiped, without looking at the
copy unless the original disappears. See Keir Thomas, “Is
Smartphone Security Good Enough?,” PCWorld, Apr. 20,
2011, www.pcworld.com/businesscenter/article/225771/is_
smartphone_security_good_enough.html; American
Civil Liberties Union of Michigan, “ACLU Seeks
Records about State Police Searches of Cellphones,”
Apr. 13, 2011, www.aclumich.org/issues/privacy-and-
technology/2011-04/1542; Cellebrite, “UFED Ultimate,”
www.cellebrite.com/ mobile-forensics-products/forensics-
products/ufed-ultimate.html.
We said it was conceivable, not probable, that a con-
federate of the defendant would have wiped the data
from the defendant’s cell phone before the government
could obtain a search warrant; and it could be argued
that the risk of destruction of evidence was indeed so
slight as to be outweighed by the invasion of privacy
from the search. But the “invasion,” limited as it was to
the cell phone’s number, was also slight. And in
deciding whether a search is properly incident to an
arrest and therefore does not require a warrant, the
courts do not conduct a cost-benefit analysis, with
14 No. 10-3803
the invasion of privacy on the cost side and the risk of
destruction of evidence (or of an assault on the arresting
officers) on the benefit side of allowing the immediate
search. Toting up costs and benefits is not a feasible
undertaking to require of police officers conducting a
search incident to an arrest. Thus, even when the risk
either to the police officers or to the existence of the
evidence is negligible, the search is allowed, United
States v. Robinson, supra, 414 U.S. at 235, provided it’s no
more invasive than, say, a frisk, or the search of a con-
ventional container, such as Robinson’s cigarette pack,
in which heroin was found. If instead of a frisk it’s a
strip search, the risk to the officers’ safety or to the preser-
vation of evidence of crime must be greater to justify
the search. Campbell v. Miller, 499 F.3d 711, 717 (7th Cir.
2007), citing Mary Beth G. v. City of Chicago, 723 F.2d
1263, 1273 (7th Cir. 1983). Looking in a cell phone for
just the cell phone’s phone number does not exceed
what decisions like Robinson and Concepcion allow.
We need not consider what level of risk to personal
safety or to the preservation of evidence would be neces-
sary to justify a more extensive search of a cell phone
without a warrant, especially when we factor in the
burden on the police of having to traipse about with
Faraday bags or mirror-copying technology and having
to be instructed in the use of these methods for
preventing remote wiping or rendering it ineffectual.
We can certainly imagine justifications for a more
extensive search. The arrested suspect might have pre-
arranged with coconspirators to call them periodically
No. 10-3803 15
and if they didn’t hear from him on schedule to take
that as a warning that he had been seized, and to scatter.
Or if conspirators buy prepaid SIM (subscriber identity
module) cards, each of which assigns a different phone
number to the cell phone in which the card is inserted, and
replace the SIM card each day, a police officer who
seizes one of the cell phones will have only a short
interval within which to discover the phone numbers of
the other conspirators. See Adrian Chen, “The Mercenary
Techie Who Troubleshoots for Drug Dealers and Jealous
Lovers,” Gawker, Jan. 25, 2012, http://gawker.com/5878862/.
(This is provided the phone number is on the SIM card; in
some iPhones, for example, it is not.) The officer who
doesn’t make a quick search of the cell phone won’t find
other conspirators’ phone numbers that are still in use.
But these are questions for another day, since the
police did not search the contents of the defendant’s cell
phone, but were content to obtain the cell phone’s phone
number.
A FFIRMED.
2-29-12