{"id":4962,"date":"2011-03-20T13:25:28","date_gmt":"2010-12-05T11:03:13","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2010-12-05T11:03:13","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=4962","title":{"rendered":"GA: A cell phone used for text messaging an undercover officer was subject to search upon its seizure at the time of defendant&#8217;s drug arrest"},"content":{"rendered":"<p>A cell phone used for text messaging an undercover officer was subject to search upon its seizure at the time of defendant&#8217;s drug arrest.There obviously was probable cause for searching it. <a href=\"http:\/\/www.lexisone.com\/lx1\/caselaw\/freecaselaw?searchType=citation&amp;fclSearch=2010+Ga.+App.+LEXIS+1131+&amp;action=FCLSearchCaseByCitation&amp;pageLimit=10&amp;format=CITE&amp;pageNumber=1&amp;sourceID=&amp;citation=2010+Ga.+App.+LEXIS+1131+&amp;searchTerm=\">Hawkins v. State<\/a>, 307 Ga. App. 253, 704 S.E.2d 886 (2010):<\/p>\n<blockquote><p>That the text messages were stored in electronic form in Hawkins\u2019s cell phone, rather than in plain view, does not deny the officer the right to discover them. When an officer is authorized to search in a vehicle for a specific object and, in the course of his search, comes across a container that reasonably might contain the object of his search, the officer is authorized to open the container and search within it for the object. See Ross, 456 U. S. at 824 (IV) (\u201cThe scope of a warrantless search of an automobile thus is not defined by the nature of the container in which the contraband is secreted. Rather, it is defined by the object of the search and the places in which there is probable cause to believe that it may be found.\u201d); see also Gant, 129 SC at 1719 (III) (\u201c[In some cases], the offense of arrest will supply a basis for searching the passenger compartment of an arrestee\u2019s vehicle and any containers therein [for evidence of the crime of arrest].\u201d (emphasis added)). The pertinent question, in this case, then, is whether a cell phone is enough like a \u201ccontainer\u201d to be treated like one in the context of a search for electronic data that might be stored on the phone. We think it is.<\/p>\n<p>Although it is a matter of first impression for our Court, many other courts have addressed this issue. Most have concluded that, when a search for electronic data that might reasonably be stored in a cell phone is authorized, the cell phone is roughly analogous to an electronic \u201ccontainer\u201d that properly can be \u201copened\u201d and searched for the data, much as a traditional \u201ccontainer\u201d can be opened to search for tangible objects within. See United States v. Finley, 477 F.3d 250, 260 (III) (B), n.7 (5th Cir. 2007); see also United States v. Wurie, 612 F.Supp.2d 104, 109 (D. Mass. 2009) (\u201cDecisions of district courts and Courts of Appeals (often analogizing cell phones to the earlier pager technology) trend heavily in favor of finding that the search incident to arrest &#8230; exception[] appl[ies] to searches of the contents of cell phones.\u201d) (citations omitted). Federal courts in Georgia are among those that have reached this conclusion. See, e.g., United States v. Cole, 2010 U. S. Dist. LEXIS 82822 at *60-68 (7) (N.D. Ga. 2010) (concluding that the defendant\u2019s cell phone was a \u201ccontainer\u201d for purposes of applying an exception to the warrant requirement since it contained information not readily apparent without manipulating the cell phone itself); United States v. McCray, 2008 U. S. Dist. LEXIS 116044 at *13 (S.D. Ga. 2008) (concluding that \u201c[a] cell phone, like a beeper, is an electronic \u2018container,\u2019 in that it stores information that may have great evidentiary value (and that might easily be destroyed or corrupted)\u201d). We are persuaded that, as a general matter, these decisions are correct.<\/p>\n<p>Cell phones and other mobile electronic data storage devices, however, are unlike traditional \u201ccontainers\u201d in several respects, and for this reason, we must apply the principles set forth in traditional \u201ccontainer\u201d cases to searches for electronic data with great care and caution. A traditional \u201ccontainer\u201d encloses tangible things and, therefore, can hold only a finite number of things and only things as voluminous as the physical volume of the container allows. An electronic \u201ccontainer,\u201d on the other hand, may contain innumerable electronic data of almost infinite variety in a volume having little, if any, relation to the physical size of the electronic \u201ccontainer.\u201d And, unlike a traditional \u201ccontainer,\u201d which simply contains whatever it contains, an electronic \u201ccontainer,\u201d through an Internet browser or other application, may have the capability to reach out and retrieve data from other places during the course of a search.<\/p>\n<p>In addition, as the Supreme Court has recognized, vehicles and the traditional \u201ccontainers\u201d transported in them \u201c\u2018seldom serve as &#8230; the repository of [tangible] personal effects.\u2019\u201d See Wyoming v. Houghton, 526 U. S. 295, 303 (II) (119 SC 1297, 143 LE2d 408) (1999). <\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=4962\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4962","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4962"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4962\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4962"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}