SUPREME
COURT OF CANADA
Citation: R. v. Fearon, 2014 SCC 77, [2014] S.C.R. 621
|
Date: 20141211
Docket: 35298
|
Between:
Kevin
Fearon
Appellant
and
Her
Majesty The Queen
Respondent
- and -
Director
of Public Prosecutions of Canada, Attorney General of Quebec, Attorney General
of Alberta, Samuelson-Glushko Canadian Internet Policy and Public Interest
Clinic, British Columbia Civil Liberties Association, Criminal Trial Lawyers’
Association (Alberta), Canadian Civil Liberties Association, Canadian
Association of Chiefs of Police and Criminal Lawyers’ Association
Interveners
Coram: McLachlin C.J. and LeBel, Abella, Cromwell, Moldaver,
Karakatsanis and Wagner JJ.
Reasons
for Judgment:
(paras. 1 to 99)
Dissenting
Reasons:
(paras. 100 to 198)
|
Cromwell J. (McLachlin C.J. and Moldaver
and Wagner JJ. concurring)
Karakatsanis J. (LeBel and Abella JJ.
concurring)
|
r. v. fearon, 2014
SCC 77, [2014] S.C.R. 621
Kevin Fearon Appellant
v.
Her Majesty The Queen Respondent
and
Director of Public Prosecutions of
Canada,
Attorney General of Quebec,
Attorney General of Alberta,
Samuelson-Glushko Canadian Internet
Policy and Public Interest Clinic,
British Columbia Civil Liberties
Association,
Criminal Trial Lawyers’ Association
(Alberta),
Canadian Civil Liberties Association,
Canadian Association of Chiefs of Police
and
Criminal Lawyers’ Association Interveners
Indexed as: R. v. Fearon
2014 SCC 77
File No.: 35298.
2014: May 23; 2014: December 11.
Present: McLachlin C.J. and LeBel, Abella, Cromwell, Moldaver,
Karakatsanis and Wagner JJ.
on appeal from the court of appeal for ontario
Constitutional law — Charter of Rights — Search
and seizure — Search incident to arrest — Cell phone found on accused and
searched without warrant — Text message and photos on cell phone introduced as
evidence at trial — Whether general common law framework for searches incident
to arrest needs to be modified in case of cell phone searches incident to
arrest — Whether search of cell phone incident to arrest was unreasonable and
contrary to accused’s right to be secure against unreasonable search or seizure
— If so, whether evidence discovered in search should be excluded — Canadian
Charter of Rights and Freedoms, ss. 8 , 24(2) .
Police — Powers — Search incident to arrest —
Warrantless search of cell phone — Text message and photos on cell phone
introduced as evidence at trial of accused — Whether common law police power to
search incident to arrest permits cell phone searches — Whether search of cell
phone incident to arrest was unreasonable and contrary to accused’s right to be
secure against unreasonable search or seizure — Canadian Charter of Rights and
Freedoms, s. 8 .
Two
men, one armed with a handgun, robbed a merchant as she loaded her car with
jewellery. The robbers grabbed some bags, one of which was filled with
jewellery, and fled in a black vehicle. The police became involved very
shortly afterward. At that point, they had not located the jewellery or the
handgun. Later that evening, they located and secured the getaway vehicle, and
arrested F and C. During the pat-down search of F conducted incident to
arrest, police found a cell phone in F’s pocket. Police searched the phone at
that time and again within less than two hours of the arrest. They found a
draft text message which read “We did it were the jewlery at nigga
burrrrrrrrrrr”, and some photos, including one of a handgun. A day and a half
later, when police had a warrant to search the vehicle, they recovered the
handgun used in the robbery and depicted in the photo. Months later, police
applied for and were granted a warrant to search the contents of the phone. No
new evidence was discovered.
On
a voir dire, the trial judge found that the search of the cell phone
incident to arrest had not breached s. 8 of the Charter . She admitted the
photos and text message and convicted F of robbery with a firearm and related
offences. The Court of Appeal dismissed an appeal.
Held (LeBel,
Abella and Karakatsanis JJ. dissenting): The appeal should be
dismissed.
Per McLachlin C.J. and Cromwell, Moldaver and
Wagner JJ.: The common law power to search incident to a lawful arrest permits
the search of cell phones and similar devices found on the suspect, although some modification of the existing common law framework is necessary because the search
of a cell phone has the potential to be a much more significant invasion of
privacy than the typical search incident to arrest.
The power to search incident to
arrest is extraordinary in that it permits reasonable searches when the police
have neither a warrant nor reasonable and probable grounds. That the exercise
of this extraordinary power has been considered in general to meet
constitutional muster reflects the important law enforcement objectives which
are served by searches of people who have been lawfully arrested. This power
must be exercised in the pursuit of a valid purpose related to the proper
administration of justice and the search must be truly incidental to the
arrest.
Like other searches incident to
arrest, prompt cell phone searches incident to arrest may serve important law
enforcement objectives: they can assist police to identify and mitigate risks
to public safety; locate firearms or stolen goods; identify accomplices; locate
and preserve evidence; prevent suspects from evading or resisting law
enforcement; locate the other perpetrators; warn officers of possible impending
danger; and follow leads promptly. Cell phone searches also have an element of
urgency, which supports the extension of the power to search incident to
arrest.
Safeguards
must be added to the law of search of cell phones incident to arrest in order
to make that power compliant with s. 8 of the Charter . Ultimately, the
purpose of the exercise is to strike a balance that gives due weight to the
important law enforcement objectives served by searches incidental to arrest
and to the very significant privacy interests at stake in cell phone searches.
Consequently, four conditions must be met in order for the search of a cell
phone or similar device incidental to arrest to comply with s. 8 . First, the
arrest must be lawful. Second, the search must be truly incidental to the
arrest. This requirement should be strictly applied to permit searches that
must be done promptly upon arrest in order to effectively serve the law
enforcement purposes. In this context, those purposes are protecting the
police, the accused or the public; preserving evidence; and, if the
investigation will be stymied or significantly hampered absent the ability to
promptly conduct the search, discovering evidence. Third, the nature and the
extent of the search must be tailored to its purpose. In practice, this will
mean that only recently sent or drafted emails, texts, photos and the call log
will, generally, be available, although other searches may, in some
circumstances, be justified. Finally, the police must take detailed notes of
what they have examined on the device and how they examined it. The notes
should generally include the applications searched, the extent of the search,
the time of the search, its purpose and its duration. The record-keeping
requirement is important to the effectiveness of after-the-fact judicial
review. It will also help police officers to focus on whether what they are
doing in relation to the phone falls squarely within the parameters of a lawful
search incident to arrest.
None of the three main
modifications to the common law power to search cell phones incident to arrest previously
suggested in the case law strike the balance required by s. 8 . First, the
considerations that prompted the Court to take a categorical approach with
respect to the non-consensual seizure of bodily samples are entirely absent in
this case. Second, police will rarely have reasonable and probable grounds to search
for safety purposes or to believe that evidence of the offence will be found on
the phone at the time of arrest. Third, allowing cell phone searches only in
exigent circumstances would share the pitfalls of imposing a standard of
reasonable and probable grounds, and would give almost no weight to the law
enforcement objectives served by prompt searches. Moreover, the search
incident to arrest exception to the warrant requirement is not a subset of the
exigency exception.
In this
case, the initial search of the cell phone, which disclosed all of the cell
phone evidence tendered by the Crown at trial, breached F’s s. 8 rights. Although
they were truly incidental to
F’s arrest for robbery, were for valid law enforcement objectives, and were
appropriately linked to the offence for which F had been lawfully arrested, detailed evidence about precisely what was searched, how and why,
was lacking.
Despite
that breach, the evidence should not be excluded. The impact of the breach on F’s
Charter -protected interests favours exclusion of the evidence, but it
does so weakly. Although any search of any cell phone has the potential to be
a very significant invasion of a person’s informational privacy interests, the
invasion of F’s privacy was not particularly grave. Further, as he did not
challenge the warrant that was subsequently issued for the comprehensive search
of the cell phone, his privacy interests were going to be impacted and the particular
breach did not significantly change the nature of that impact. However, other
factors favour inclusion. As to the seriousness of the Charter -infringing
state conduct, the dominant view at the time of the search approved cell phone
searches incident to arrest. In addition, the police fully disclosed the
earlier searches when they decided to obtain the warrant to search the cell phone.
While the police should, when faced with real uncertainty, choose a course of
action that is more respectful of the accused’s potential privacy rights, an
honest mistake, reasonably made, is not state misconduct that requires the
exclusion of evidence. Society’s interest in the adjudication of the case on
its merits also favours admission: the evidence is cogent and reliable, and its
exclusion would undermine the truth-seeking function of the justice system.
Per
LeBel, Abella and Karakatsanis JJ. (dissenting): Searches of personal digital
devices — including personal computers — risk serious encroachments on privacy
and are therefore not authorized under the common law power to search incident
to arrest. Only judicial pre-authorization can provide the effective and
impartial balancing of the state’s law enforcement objectives with the
intensely personal and uniquely pervasive privacy interests in our digital
devices. Section 8 of the Charter provides constitutional protection for
privacy, which includes the right to be free of the threat of unreasonable
intrusions on privacy and the right to determine when, how, and to what extent
we release personal information.
Generally,
the law enforcement interests will outweigh the privacy interest that an arrested
person has in the physical items in his immediate vicinity. However, because
the privacy interest in a digital device is quantitatively and qualitatively
different from that in other physical items traditionally subject to such
searches, the constitutional balance between privacy and the needs of law
enforcement with respect to the search of cell phones and similar digital
devices incident to arrest must be reassessed, using first principles.
A
cell phone cannot be treated like any other piece of physical evidence that may
be found on an arrestee and searched incident to arrest. Individuals have a
high expectation of privacy in their digital devices because they store immense
amounts of information, are fastidious record keepers, retain files and data
even after users think they have been destroyed, make the temporal and
territorial limitations on a search incident to arrest meaningless, and can
continue to generate evidence even after they have been seized.
The
law enforcement interests relate to the three purposes justifying searches
incident to arrest: safety, the preservation of evidence, and the discovery of
evidence. Digital devices are not physically dangerous weapons and they cannot
conceal such a weapon. The mere possibility that a phone could have been used
to summon backup or that evidence on the cell phone could be remotely deleted
should not justify a search incident to arrest. Although the delay of
obtaining a warrant may come at a cost to the prompt pursuit of the
investigation, this cost must be weighed against the privacy interest in a
personal digital device.
The
most pressing state interests can be accommodated by the existing doctrine that
permits warrantless searches under exigent circumstances. Exigent circumstances
exist when (1) there is a reasonable basis to suspect a search may prevent an
imminent threat to safety or (2) there are reasonable grounds to believe that
the imminent destruction of evidence can be prevented by a warrantless search.
Where exigent circumstances do not exist, a telewarrant can usually be obtained
relatively quickly and with little harm to the investigation.
Thus,
the weighty privacy interest that an arrested person has in a personal digital
device will outweigh the state interest in performing a warrantless search
incident to arrest, except in exigent circumstances.
Searches
that treat a cell phone merely as a physical object continue to be permissible
incident to arrest since it is the information that attracts a heightened
expectation of privacy. As such, the police may usually seize a phone incident
to arrest in order to preserve the evidence, but will require a warrant before
they can search its contents.
In
performing a search of a cell phone, whether under exigent circumstances or
pursuant to a warrant, the police officers must not extend that search beyond
the scope of the grounds permitting the search.
Tailoring
the scope of the common law power to search incident to arrest does not adequately
protect the reasonable expectations of privacy in personal digital devices. The
majority’s proposed modifications generate problems of impracticality, police
uncertainty, and increased after-the-fact litigation. And while detailed
note-taking may be desirable, it may prove to be an impractical requirement,
and it is not an adequate remedy to what would be an extraordinary search
power. Fundamentally, the police are not in the best position to determine
whether the law enforcement objectives clearly outweigh the potentially
significant intrusion on privacy in the search of a digital device, and, if
they are wrong, the subsequent exclusion of the evidence will not remedy the
initial privacy violation.
Here,
the searches of F’s phone were not justified and unreasonably infringed his
privacy, in violation of s. 8 of the Charter . The facts of this case
fall far below either standard for exigency.
The
evidence which was unconstitutionally obtained should be excluded. The state
conduct was not particularly objectionable, given that the police acted in good
faith, and the evidence is reliable; however, the high privacy interest
individuals have in their electronic devices tips the balance in favour of
exclusion. Unwarranted searches undermine the public’s confidence that personal
communications, ideas and beliefs will be protected on their digital devices.
This is particularly important given the increasing use and ubiquity of such
technology. It is difficult to conceive of a sphere of privacy more intensely
personal ― or indeed more pervasive ― than that found in an
individual’s personal digital device or computer. To admit evidence obtained
in breach of this particularly strong privacy interest would tend to bring the
administration of justice into disrepute.
Cases Cited
By Cromwell J.
Distinguished:
R. v. Golden, 2001 SCC 83, [2001] 3 S.C.R. 679; R.
v. Stillman, [1997] 1 S.C.R. 607; referred to: R. v. Giles, 2007 BCSC 1147 (CanLII); R. v. Otchere-Badu, 2010 ONSC 1059 (CanLII); Young v. Canada,
2010 CanLII 74003; R. v. Howell, 2011 NSSC 284, 313 N.S.R. (2d) 4; R.
v. Franko, 2012 ABQB 282, 541 A.R. 23; R. v. Cater, 2014 NSCA 74
(CanLII); R. v. D’Annunzio (2010), 224 C.R.R. (2d) 221; R. v. Polius
(2009), 196 C.R.R. (2d) 288; R. v. Hiscoe, 2013 NSCA 48, 328 N.S.R. (2d)
381; R. v. Mann, 2014 BCCA 231, 310 C.C.C. (3d) 143; R. v. Liew,
2012 ONSC 1826 (CanLII); Hunter v. Southam Inc., [1984] 2 S.C.R. 145; R.
v. Collins, [1987] 1 S.C.R. 265; R. v. Caslake, [1998] 1 S.C.R. 51; Cloutier
v. Langlois, [1990] 1 S.C.R. 158; R. v. Beare, [1988] 2 S.C.R. 387; R.
v. Debot, [1989] 2 S.C.R. 1140; R. v. Dyment, [1988] 2 S.C.R. 417; R.
v. Pohoretsky, [1987] 1 S.C.R. 945; R. v. Nolet, 2010 SCC 24, [2010]
1 S.C.R. 851; United States v. Santillan, 571 F.Supp.2d 1093 (2008); R.
v. Vu, 2013 SCC 60, [2013] 3 S.C.R. 657; R. v. Khan, 2013 ONSC 4587,
287 C.R.R. (2d) 192; R. v. Rochwell, 2012 ONSC 5594, 268 C.R.R. (2d)
283; Riley v. California, 134 S. Ct. 2473 (2014); R. v. Feeney, [1997] 2 S.C.R. 13; R. v.
Grant, 2009 SCC 32, [2009] 2 S.C.R. 353; R. v. Finnikin, 2009 CanLII
82187; R. v. Côté, 2011 SCC 46, [2011] 3 S.C.R. 215.
By
Karakatsanis J. (dissenting)
R. v. Caslake,
[1998] 1 S.C.R. 51; R. v.
Tessling, 2004 SCC 67,
[2004] 3 S.C.R. 432; R. v. Dyment, [1988] 2 S.C.R. 417; R. v. Spencer,
2014 SCC 43, [2014] 2 S.C.R. 212; R. v. Duarte, [1990] 1 S.C.R. 30; United
States v. White, 401 U.S. 745 (1971); Hunter v. Southam Inc., [1984]
2 S.C.R. 145; R. v. Collins, [1987] 1 S.C.R. 265; R. v. Mann, 2004
SCC 52, [2004] 3 S.C.R. 59; R. v. Clayton, 2007 SCC 32, [2007] 2 S.C.R.
725; Cloutier v. Langlois, [1990] 1 S.C.R. 158; R. v. Feeney,
[1997] 2 S.C.R. 13; R. v. Golub (1997), 34 O.R. (3d) 743; R. v.
Stillman, [1997] 1 S.C.R. 607; R. v. Vu, 2013 SCC 60, [2013] 3 S.C.R.
657; R. v. White, 2007 ONCA 318, 85 O.R. (3d) 407; R. v. TELUS
Communications Co., 2013 SCC 16, [2013] 2 S.C.R. 3; R. v. Polius (2009), 196 C.R.R. (2d) 288; R. v. Golden,
2001 SCC 83, [2001] 3 S.C.R. 679; R. v. Kelsy, 2011 ONCA 605, 283 O.A.C.
201; R. v. Grant, 2009 SCC 32, [2009] 2 S.C.R. 353; R. v. Grant,
[1993] 3 S.C.R. 223; R. v. Morelli, 2010 SCC 8, [2010] 1 S.C.R. 253; R.
v. Cole, 2012 SCC 53, [2012] 3 S.C.R. 34.
Statutes and Regulations Cited
Canadian Charter of Rights and Freedoms,
ss. 8 , 24(2) .
Criminal Code, R.S.C. 1985, c. C-46, ss.
487(1) (b), 487.11 , 529.3 .
Authors Cited
Austin, Lisa. “Privacy and the Question of Technology” (2003), 22 Law
& Phil. 119.
Austin, Lisa M. “Control Yourself, or at Least Your Core Self” (2010), 30
Bull. Sci. Tech. & Soc. 26.
Brown, Patrick. “Searches of Cell Phones Incident to Arrest:
Overview of the Law as It Stands and a New Path Forward” (2014), 27 Harv. J.L.
& Tech. 563.
Fontana,
James A. The Law of Search and Seizure in Canada, 3rd ed. Toronto: Butterworths,
1992.
Fontana,
James A., and David Keeshan. The Law of Search and Seizure in Canada,
8th ed. Markham, Ont.: LexisNexis, 2010.
Nagel, Thomas. “Concealment and Exposure” (1998), 27 Phil. &
Publ. Aff. 3.
APPEAL
from a judgment of the Ontario Court of Appeal (MacPherson, Armstrong and Watt
JJ.A.), 2013 ONCA 106, 114 O.R. (3d) 81, 302 O.A.C. 284, 296 C.C.C. (3d) 331,
100 C.R. (6th) 296, 277 C.R.R. (2d) 126, [2013] O.J. No. 704 (QL), 2013
CarswellOnt 1703, affirming the accused’s conviction for armed robbery and
related offences. Appeal dismissed, LeBel, Abella and Karakatsanis JJ.
dissenting.
Sam Goldstein and Shelley Flam, for the appellant.
Randy Schwartz, for the respondent.
Kevin Wilson and W. Paul Riley, for the intervener the Director
of Public Prosecutions of Canada.
Dominique A.
Jobin, for
the intervener the Attorney General of Quebec.
Jolaine Antonio, for the intervener the
Attorney General of Alberta.
Written
submissions only by Tamir Israel, for the intervener the Samuelson-Glushko
Canadian Internet Policy and Public Interest Clinic.
Gerald Chan and Nader R. Hasan, for the intervener the British
Columbia Civil Liberties Association.
Dane F.
Bullerwell and
Jeffrey W. Beedell, for the intervener the Criminal Trial Lawyers’
Association (Alberta).
Matthew Milne-Smith, for the intervener the Canadian
Civil Liberties Association.
Leonard T. Doust, Q.C., and Bronson
Toy, for the intervener the Canadian
Association of Chiefs of Police.
Written
submissions only by Susan M. Chapman, Jennifer Micallef and Kristen Allen, for the intervener the Criminal
Lawyers’ Association.
The judgment of McLachlin
C.J. and Cromwell, Moldaver and Wagner JJ. was delivered by
Cromwell J. —
I.
Introduction
[1]
The police have a common law power to search
incident to a lawful arrest. Does this power permit the search of cell phones
and similar devices found on the suspect? That is the main question raised by
this appeal.
[2]
Canadian courts have so far not provided a
consistent answer. At least four approaches have emerged. The first is to hold
that the power to search incident to arrest generally includes the power to
search cell phones, provided that the search is truly incidental to the arrest:
R. v. Giles, 2007 BCSC 1147 (CanLII); R. v. Otchere-Badu, 2010
ONSC 1059 (CanLII); Young v. Canada, 2010 CanLII 74003 (Nfld. Prov. Ct.); R. v. Howell, 2011
NSSC 284, 313 N.S.R. (2d) 4; R. v. Franko, 2012 ABQB 282, 541 A.R. 23; R.
v. Cater, 2014 NSCA 74 (CanLII); R. v. D’Annunzio (2010), 224
C.R.R. (2d) 221 (Ont. S.C.J.). The second view is that “cursory” searches are
permitted: R. v. Polius (2009), 196 C.R.R. (2d) 288 (Ont. S.C.J.). A
third is that thorough “data-dump” searches are not permitted incident
to arrest: R. v. Hiscoe, 2013 NSCA 48, 328 N.S.R. (2d) 381; R. v.
Mann, 2014 BCCA 231, 310 C.C.C. (3d) 143. Finally, it has also been held
that searches of cell phones incident to arrest are not permitted except in
exigent circumstances, in which a “cursory” search is permissible: R. v.
Liew, 2012 ONSC 1826 (CanLII). These divergent results underline both the
difficulty of the question and the need for a more consistent approach.
[3]
In order to resolve the issue, we must strike a
balance between the demands of effective law enforcement and everyone’s right
to be free of unreasonable searches and seizures. In short, we must identify
the point at which the “public’s interest in being left alone by government
must give way to the government’s interest in intruding on the individual’s
privacy in order to advance its goals, notably those of law enforcement”: Hunter
v. Southam Inc., [1984] 2 S.C.R. 145, at pp. 159-60.
[4]
In my view, we can achieve that balance with a
rule that permits searches of cell phones incident to arrest, provided that the
search — both what is searched and how it is searched— is strictly incidental
to the arrest and that the police keep detailed notes of what has been searched
and why.
II.
Overview of the Facts, Proceedings and Issues
[5]
The issue on appeal concerns the admissibility
at Mr. Fearon’s armed robbery trial of a draft text message and two photos
found by police on his cell phone. The issue arises out of the investigation of
a crime that has become depressingly routine.
[6]
Two men, one armed with a handgun, robbed a
merchant as she loaded her car with jewellery. The robbers grabbed some bags,
one of which was filled with jewellery, and fled in a black vehicle. The police
became involved very shortly afterward and at that point, they reasonably
believed that there was a handgun on the streets and that the robbers had taken
a large quantity of readily-disposable jewellery. It was obviously important to
locate the gun before it could be used again and the jewellery before it could
be disposed of or hidden.
[7]
The investigation quickly centred on the appellant,
Kevin Fearon, and Junior Chapman. Later that same evening, police arrested both
men, but had not at that point located any jewellery or the handgun. Police
also quickly located the getaway vehicle and secured it, but they did not
search it until a day and a half later when they had a warrant to do so.
[8]
When Mr. Fearon was arrested, Sgt. Hicks
conducted a pat-down search incident to the arrest. He found a cell phone in
Mr. Fearon’s right front pants pocket. Police searched the phone at that time
and again within less than two hours of the arrest. They found a draft text
message referring to jewellery and opening with the words “We did it”. They
also found a photo of a handgun and photos of males. Police later recovered a
handgun during their search of the getaway vehicle and, at trial, the judge
found that it was the handgun used in the robbery and depicted in the photo
found on Mr. Fearon’s cell phone: trial judge’s oral reasons. Months later,
police applied for and were granted a warrant to search the contents of the
phone. No new evidence was discovered.
[9]
At his trial for robbery, Mr. Fearon argued that
the search of his cell phone had violated s. 8 of the Canadian Charter of
Rights and Freedoms and that admitting the photographs and text message
into evidence would bring the administration of justice into disrepute. On a voir
dire, the trial judge found that the search of the cell phone
incident to arrest had not breached s. 8 of the Charter and that the
photos and text message were admissible. She convicted Mr. Fearon of robbery
with a firearm and related offences.
[10]
The Court of Appeal
unanimously dismissed Mr. Fearon’s appeal. The court affirmed the trial
judge’s conclusion that the search incident to arrest had not violated Mr.
Fearon’s s. 8 rights.
[11]
The appeal to this
Court raises two main questions:
1.
Was
the search incident to arrest unreasonable and therefore contrary to s. 8 of
the Charter ?
2.
If
so, should the evidence be excluded under s. 24(2) of the Charter ?
III.
Analysis
A.
First Issue: The Search Incident to Arrest
(1)
The Analytical Framework
[12]
A search is reasonable within the meaning of s.
8 of the Charter if it is authorized by a reasonable law and is conducted
reasonably: R. v. Collins, [1987] 1 S.C.R. 265, at p. 278; R. v.
Caslake, [1998] 1 S.C.R. 51, at para. 10. The main question on
appeal therefore concerns the proper scope of the common law power to search
incident to arrest: is a cell phone search incident to arrest authorized by a
reasonable law?
[13]
This question about the scope of the power to
search incident to arrest cannot be answered in too categorical a fashion. As Lamer
C.J. explained in Caslake, the permissible scope of a search incident to
arrest turns on several different aspects of the search including the nature of
items seized, the place of search and the time of search in relation to the
time of arrest: paras. 15-16. Each of these aspects may engage distinct
considerations that cannot be addressed in very general terms. Moreover,
arrests relate to many different crimes and are made in many different
circumstances. It follows that the permissible scope of searches incident to
arrest will be affected by the particular circumstances of the particular
arrest. The courts will rarely be able to establish any categorical limit
applicable to all arrests and all purposes incidental to them.
[14]
There is no question that there is a common law
police power to search incident to arrest. The question here — and it is a
novel one for this Court — relates to whether this power permits the particular
cell phone searches in issue here. To determine the precise scope of this
common law power, the Court must weigh the competing interests involved,
particularly whether the search “is reasonable in light of the public purposes
served by effective control of criminal acts on the one hand and on the other
respect for the liberty and fundamental dignity of individuals”: Cloutier v.
Langlois, [1990] 1 S.C.R. 158, at pp. 181-82; Caslake, at para. 17.
The Court’s task is “to delineate the scope of the common law power . . .
in a way that is consistent with the Charter right to be protected
against unreasonable search and seizure”: R. v. Golden, 2001 SCC 83, [2001]
3 S.C.R. 679, at para. 87.
[15]
This task may be approached in more than one
way. I approach it by considering first whether the search falls within the
existing general framework of the common law power to search incident to
arrest. Having decided that it does, I go on to ask whether that framework must
be modified so that the common law search power complies with s. 8 of the Charter
in light of the particular law enforcement and privacy interests at stake
in this context. The Court followed this analytical approach in R. v.
Stillman, [1997] 1 S.C.R. 607, and Golden, two important
cases which considered whether searches incident to arrest were Charter
compliant, and it serves equally well in this case. My conclusion is that some
modification of the existing common law framework is necessary.
(2)
The Common Law Police Power to Search Incident
to Arrest
[16]
Although the common law power to search incident
to arrest is deeply rooted in our law, it is an extraordinary power in two
respects. The power to search incident to arrest not only permits searches
without a warrant, but does so in circumstances in which the grounds to obtain
a warrant do not exist. The cases teach us that the power to search incident
to arrest is a focussed power given to the police so that they can pursue their
investigations promptly upon making an arrest. The power must be exercised in
the pursuit of a valid purpose related to the proper administration of justice.
The central guiding principle is that the search must be, as the case law puts
it, truly incidental to the arrest.
[17]
The Court affirmed the common law power of the
police to search incident to arrest in R. v. Beare, [1988] 2 S.C.R.
387. La Forest J., for the Court, noted that the search incident to arrest
power exists because of the need “to arm the police with adequate and
reasonable powers for the investigation of crime” and that “[p]romptitude and
facility in the identification and the discovery of indicia of guilt or
innocence are of great importance in criminal investigations”: p. 404; see also
R. v. Debot, [1989] 2 S.C.R. 1140, at p. 1146. Thus, the need for the
police to be able to promptly pursue their investigation upon making a lawful
arrest is an important consideration underlying the power to search incident to
arrest.
[18]
The power was further affirmed and explained in Cloutier,
at pp. 180-81, where L’Heureux-Dubé J. summed up Canadian common law to that
point:
. . . it seems beyond
question that the common law as recognized and developed in Canada holds that
the police have a power to search a lawfully arrested person and to seize
anything in his or her possession or immediate surroundings to guarantee the
safety of the police and the accused, prevent the prisoner’s escape or provide
evidence against him.
[19]
The Court held, in Cloutier, that a “‘frisk’
search incidental to a lawful arrest reconciles the public’s interest in the
effective and safe enforcement of the law . . . and . . . its
interest in ensuring the freedom and dignity of individuals”: p. 185. The
search “must be for a valid objective in pursuit of the ends of criminal
justice, such as the discovery of an object that may be a threat to the safety
of the police, the accused or the public, or that may facilitate escape or act
as evidence against the accused”, and it “must not be conducted in an abusive
fashion”: p. 186.
[20]
The Court next considered search incident to
arrest in Stillman, at paras. 27-50, a case that considered whether
taking teeth impressions, hair samples and buccal swabs from a suspect after
his lawful arrest for murder fell within the scope of the power to search
incident to arrest. The Court affirmed that, in order for a search incident to
arrest to be lawful, the arrest itself must be lawful, the search must be an
incident of that arrest, and the manner in which it is conducted must be
reasonable: para. 27. Turning to the specific issue of whether the common law
power of search incident to arrest extends to the seizure of bodily substances,
the Court ruled that it did not. Seizure of bodily substances “invades an area
of personal privacy essential to the maintenance of . . . human
dignity” and is “much more serious” than an intrusion into the suspect’s office
or home: at para. 42, quoting with approval R. v. Dyment, [1988] 2
S.C.R. 417, at p. 432; see also R. v. Pohoretsky, [1987] 1 S.C.R. 945,
at p. 949. Seizing bodily samples gives rise to “completely different concerns”
because of the impact on a person’s bodily integrity, which may be “the
ultimate affront to human dignity”: para. 39. Moreover, there is no need for
prompt access to the information: there is no danger of the bodily samples
disappearing, or that the suspect’s teeth impressions or DNA will change with
the passage of time: para. 49.
[21]
That brings me to the leading case from this
Court, Caslake. The case concerned an inventory search of a suspect’s vehicle
six hours after he was arrested for possession of narcotics. The Court
concluded that the search did not fall within the scope of lawful search
incident to arrest. Lamer C.J. articulated the justification of the common law
power as being the need for law enforcement authorities to gain control of
things or information, a need which outweighs the individual’s interest in
privacy: para. 17. Whether the search is justified depends on whether the
search is truly incidental to the arrest: para. 17. This means that the police
must be attempting to achieve some valid purpose connected to the arrest. That
turns on what they were looking for and why. The police must have one of the
purposes for a valid search incident to arrest in mind when the search is conducted,
and the officer conducting the search must reasonably believe that this purpose
may be served by the search.
[22]
This is not a standard of reasonable and
probable grounds, but simply a requirement that there be some reasonable basis
for doing what the police did. For example, if the purpose of the search is to
find evidence, there must be some reasonable prospect of finding evidence of
the offence for which the accused is being arrested: Caslake, at paras.
19-24. Lamer C.J. summarized the law as follows:
If the law on which the Crown is
relying for authorization is the common law doctrine of search incident to
arrest, then the limits of this doctrine must be respected. The most important
of these limits is that the search must be truly incidental to the arrest. This
means that the police must be able to explain, within the purposes articulated
in Cloutier, supra (protecting the police, protecting the
evidence, discovering evidence), or by reference to some other valid purpose,
why they searched. They do not need reasonable and probable grounds. However, they
must have had some reason related to the arrest for conducting the search at
the time the search was carried out, and that reason must be objectively
reasonable. Delay and distance do not automatically preclude a search from
being incidental to arrest, but they may cause the court to draw a negative
inference. However, that inference may be rebutted by a proper explanation. [Emphasis
added; para. 25.]
[23]
The Court next considered search incident to
arrest in Golden. The question before the Court was whether the common
law power to search incident to arrest includes the power to strip search (i.e.
a search involving “the removal or rearrangement of some or all of the clothing
of a person so as to permit a visual inspection of a person’s private areas,
namely genitals, buttocks, breasts (in the case of a female), or
undergarments”: para. 47). The Court concluded that, because of the intrusive
nature of a strip search, as compared with the frisk search in issue in Cloutier,
a higher degree of justification was required. A serious infringement of
privacy and personal dignity was “an inevitable consequence of a
strip search”: para. 99 (emphasis added). In addition, the Court noted that
strip searches are rarely required to be done promptly given the low risk of
disposal or loss of the evidence: para. 93.
[24]
For these reasons, strip searches will only be
reasonable when they are conducted in a reasonable manner “as an incident to a
lawful arrest for the purpose of discovering weapons in the detainee’s
possession or evidence related to the reason for the arrest” and the
police “have reasonable and probable grounds for concluding that a strip search
is necessary in the particular circumstances of the arrest”: Golden, at paras.
98-99.
[25]
I turn finally to R. v. Nolet, 2010 SCC
24, [2010] 1 S.C.R. 851. One of the issues was whether the search of a vehicle
some two hours after the driver’s arrest for possession of the proceeds of
crime was lawful. The Court unanimously upheld the legality of the search as
being incidental to the accused’s lawful arrest. Binnie J. reiterated the
important point made in Caslake and Golden that a search is
properly incidental to arrest when “the police attempt to ‘achieve some valid
purpose connected to the arrest’ including ‘ensuring the safety of the police
and the public, the protection of evidence from destruction at the hands of the
arrestee or others, and the discovery of evidence . . .’”: para. 49 (emphasis
deleted), quoting Caslake, at para. 19. As Binnie J. put it, “[t]he
important consideration is the link between the location and purpose of the
search and the grounds for the arrest”: para. 49. He repeated the propositions,
settled in other cases, that, first, reasonable and probable grounds are not
required, and second, the basis of the warrantless search is not exigent
circumstances, but connection or relatedness to the crime for which the suspect
has been arrested: paras. 51-52.
[26]
In light of this review, I turn to the two
analytical steps. The first is whether the search here falls within the general
common law parameters for searches incident to arrest. If it does, the second
issue is whether, having regard to the appropriate balance between the need for
effective law enforcement and the suspect’s privacy interests, some further
restrictions must be imposed and if so, what they should be.
(3)
Were the Searches Truly Incidental to a Lawful Arrest?
[27]
The common law framework requires that a search
incident to arrest must be founded on a lawful arrest, be truly incidental to
that arrest and be conducted reasonably. In my view, the initial searches of
the cell phone in this case satisfied these requirements.
[28]
Mr. Fearon was lawfully arrested for robbery,
and that satisfies the first requirement.
[29]
There is no serious suggestion in this Court
that the cell phone searches that led police to the text message and the photo
of the handgun were other than truly incidental to the arrest, or, in other
words that they were not conducted in pursuit of a “valid purpose connected to
the arrest”, as required by Caslake, at para. 19. To understand
why, we need at this point to review the facts in more detail.
[30]
Recall that, upon his arrest, Mr. Fearon was subjected
to a pat-down search that led the police to seize a cell phone found in his
pants pocket. Mr. Fearon does not complain about this search or the seizure of
the phone resulting from it. Sgt. Hicks, the officer conducting the pat-down
search, had “a look through the phone”: trial judge’s ruling on cell phone
search, 2010 ONCJ 645 (CanLII) (the “Ruling”), at para. 20. Sergeant Hicks “explained
that he manipulated the keypad to the extent that he entered into different
modes to access text messages and photographs on the phone”: para. 22. He did
not remember specifics, but believed that he saw photos of males and a photo of
a gun. This occurred between the time of arrest at 9:15 p.m. and the time Mr.
Fearon was placed in the police van at 9:24 p.m. Sergeant Hicks kept custody of
the phone. Shortly before 10:50 p.m., Sgt. Hicks showed the phone to the
investigating detectives, Det. Const. Abdel-Malik and Det. Nicol at the police
station. He testified that he pointed them to the photos as well as a text
message. The message, apparently unsent, read: “We did it were the jewlery at
nigga burrrrrrrrrrr”: Ruling, at para. 24. Detective Constable Abdel-Malik
understood this to mean “We did it” and to ask where the jewellery was. Detective
Constable Abel-Malik testified that he looked at the phone “a little bit more”
for about two minutes to see if the text message had been sent.
[31]
Sergeant Hicks and the two detectives inspected
the contents of the phone “a few times” throughout the early morning following
the arrest as the unfolding investigation led them to think that there could be
more relevant information on it. Detective Constable Abdel-Malik “looked into
the phone . . . after learning that there was a third suspect who
went by the name of ‘Swipes’ and that his contact number should be in the cell
phone”: Ruling, at para. 25. Officers checked “some of the phone numbers
called by Mr. Fearon to see if they led to possible associates including the
then unidentified ‘Swipes’”: ibid. Sometime after 3:51 a.m., Det. Const.
Abdel-Malik got information that “Swipes’” telephone number would be in Mr.
Fearon’s phone. He confirmed, however, that the main key components of what
they required were the picture of the handgun and the words of the text message.
[32]
The police eventually obtained a warrant to
search the black vehicle that they had seized and secured shortly after the
robbery. That search took place in the early morning hours of the second day
following the robbery. The search revealed a loaded Smith & Wesson silver
semi-automatic handgun which the trial judge found was the same gun shown in
the cell phone picture. The police also obtained a warrant some months later to
search and download the contents of the cell phone. The trial judge noted that
there was no dispute that the photographs and text message originally viewed by
Sgt. Hicks were the same items obtained as a result of the search warrants and
sought to be admitted.
[33]
In my view, the searches of the cell phone that
lead to the discovery of the text message and the photos that the Crown
introduced as evidence at trial were truly incidental to the arrest. It is
clear from the record and the trial judge’s findings that the search was
directed at public safety (locating the handgun), avoiding the loss of evidence
(the stolen jewellery) and obtaining evidence of the crime (information linking
Mr. Fearon to the robbery and locating potential accomplices).
[34]
At trial, Mr. Fearon submitted that Sgt. Hicks
did not have grounds to believe subjectively or reasonably that the cell phone
could afford evidence prior to looking into its contents. However, the trial
judge rejected this contention and found that Sgt. Hicks reasonably believed
that the cell phone might contain evidence of the robbery for which Mr. Fearon had
been arrested. She found:
. . .
Sgt. Hicks was justified in his belief that the cell phone may contain evidence
relevant to the armed robbery for which Mr. Fearon was being arrested. . .
. By the time he received direction to arrest Mr. Fearon for armed robbery at
9:15 p.m. he also knew: (1) that more than one perpetrator committed the
robbery; (2) approximately three hours had elapsed since the robbery; and (3)
there was a gun or imitation gun involved in the robbery.
In these circumstances, I
find that there was a reasonable prospect of securing evidence of the offence
for which the accused was being arrested in searching the contents of the cell
phone. In particular, it was reasonable for Sgt. Hicks to believe that the
arrestee, Mr. Fearon, may have had communication through the cell phone before,
during or after the robbery with other perpetrators or with third parties. [Ruling,
at paras. 43-44]
[35]
The trial judge’s conclusion on this point is
not challenged and it is amply supported by the evidence.
[36]
Detective Constable Abdel-Malik testified that
it was important to the investigation to know if the text message had been sent
to someone. The message suggested that the intended recipient knew where the
jewellery was. It was an important goal of the investigation to recover the
stolen property, which was easy to dispose of or to hide. Thus, finding someone
who knew where it was would be important and needed to be done promptly. Detective
Constable Abdel-Malik also testified that information likely to be on the cell
phone such as telephone numbers related to names, calendar dates, text messages
and photographs would be helpful to the investigation.
[37]
Defence counsel at trial put to Det. Const.
Abdel-Malik that he could have obtained a search warrant for the cell phone as
soon as Sgt. Hicks told him about the information he had seen on the phone in
his initial look at it. Detective Constable Abdel-Malik rejected this
contention. He emphasized that they faced a situation in which they believed
there was a handgun on the street and stolen property unaccounted for and the
information on the cell phone could help them locate both promptly:
I mean,
we’ve got an outstanding gun, an outstanding property and now we know that this
cell phone could have information that’s going to lead us to this property and
to this gun. So since it was definitely relevant to the investigation and as it
unfolded, it--it was relevant, I think at that time the--right thing to do was
to look through the phone and see if it would assist us with the investigation
. . . .
[38]
Detective Nicol’s evidence was also clear and
detailed about the link between the arrest and the search of the cell phone. He
referred to the need to look through the cell phone to see if there was any
contact information that could lead the police to the identity of the as-yet-unidentified
suspect, the jewellery, or the firearm. He was asked to explain how looking
through the cell phone could help expedite finding the gun and the jewellery.
His answer is instructive:
Well, based on any text
messages sent between them and a party assisting them in hiding or moving
stolen property, that would be something I’d want to know right away so I
could attempt to recover that evidence. If there was other messages
indicating locations and--and where they went after the robbery, that would be
something I’d want to know because those are places I’d want to investigate to
see if there was evidence being jewellery or firearms, clothing worn by the
suspects, anything left behind at those addresses would be places that we’d
have to attend. You know, based on my experience, people take photographs of
things they steal, places that they go, targets of their offences. There--there’s
a number of--of things that people contain on phones and I hoped that any of
those items might be on that phone that we can act on and subsequently locate
evidence. [Emphasis added.]
[39]
Detective Nicol also testified that it was
important to follow up all leads immediately because they still had outstanding
jewellery, a firearm and an unidentified suspect. When he was asked in
cross-examination why he thought that he did not need a warrant initially to
search the cell phone, he replied:
And, and [my] understanding it’s still
that, um, that an investigation where I’m looking for jewellery, I’m looking
for outstanding suspects, I’m looking for, um, the gun that’s outstanding, and
I have concerns that that--those items might go missing, destroyed, um, and
then I have a chance to recover those items, that I’m able to look through that
phone and ensure that, that there’s anything there to assist my investigation
at the time, I can, I can use that information.
[40]
He testified that his primary concerns were to
recover the handgun and the jewellery. The jewellery, he noted, was “evidence,
it’s property . . . that, um, they can move very quickly, be sold
very quickly, hidden, any, any number of things that can happen to it and you
have to act quickly in order to recover it”.
[41]
There is no basis to disturb the judge’s finding
that the searches of the cell phone were for valid law enforcement objectives
and were appropriately linked to the offence for which Mr. Fearon had been
lawfully arrested. The searches were, in short, truly incidental to Mr.
Fearon’s arrest for robbery.
[42]
The judge did not explicitly address the third
element of the test: whether the search was conducted reasonably. However, she
did find the examination of the phone at the arrest scene was “brief and
cursory” and there was “no suggestion that this was an expansive or abusive
search”: Ruling, at para. 44. She also noted that it was common ground that
the evidence presented by the Crown from the phone — the photos and the text
message — was that originally found by Sgt. Hicks in his initial search of the
phone and within about an hour and a half of the arrest. I conclude that the
third element of the test was satisfied under the general framework for search
incident to arrest. However, as I will explain, my view is that some revision
of the general framework is necessary in relation to searches of cell phones
incident to arrest.
[43]
I therefore conclude that the searches of the
cell phone resulting in finding the photos and text message fell within the
scope of the common law police power, subject to assessing whether the common
law’s general framework must be modified in order to make it compliant with s.
8 of the Charter .
(4)
Does the Common Law Test Need to Be Modified in Light
of the Charter ?
[44]
As Stillman, Caslake and Golden
illustrate, the common law police power to search incident to arrest must be
defined and applied in a way that gives effect to the right to be free of
unreasonable searches and seizures. In both Stillman and Golden,
the Court modified the common law power in relation to particularly
invasive types of searches in order to make that power consistent with s. 8 of
the Charter . What is required is an assessment of the importance of the
legitimate law enforcement objectives served by the search and of the nature
and extent of the infringement of the detainee’s reasonable expectation of
privacy.
[45]
The Court has repeatedly affirmed that, in
general, the common law power to search incident to arrest permits reasonable
searches within the meaning of s. 8 of the Charter : Cloutier, at p.
182; Stillman, at para. 27; Caslake, at paras. 12 and 14; Golden,
at paras. 44, 49, 75 and 104; Nolet, at paras. 49 and 52. We should not
pass too quickly over this fundamental point. As I have explained, this common
law power is extraordinary because it requires neither a warrant nor reasonable
and probable grounds. That the exercise of this extraordinary power has been considered
in general to meet constitutional muster reflects the important law enforcement
objectives which are served by searches of people who have been lawfully
arrested. As was said in Caslake, in the context of arrest, the
need for police “to gain control of things or information . . . outweighs
the individual’s interest in privacy”: para. 17.
[46]
The record shows how a prompt search of a
suspect’s cell phone may serve important law enforcement objectives. The police
were on the scene of a violent crime — the robbery — very promptly. They faced
a situation in which there was weak identification of the perpetrators, the
subject matter of the crime — the stolen jewellery — was easily hidden or
otherwise disposed of, there was an indication that there may have been more
people involved than the two persons observed at the scene, there were reports
that a handgun had been used, and that handgun had not been located. The police
were justified in their belief that the cell phone could contain evidence
relevant to the armed robbery. The record also justifies the conclusion that
the search served the purposes of public safety and preventing the loss of
evidence because it might lead the police to the firearm and the jewellery.
[47]
I conclude that the cell phone search incident
to arrest in this case served important law enforcement objectives.
[48]
Beyond the facts of this case, there are other
types of situations in which cell phone searches conducted incidental to a
lawful arrest will serve important law enforcement objectives, including public
safety. Cell phones are used to facilitate criminal activity. For example, cell
phones “are the ‘bread and
butter’ of the drug trade and the means by which drugs are marketed on the
street”: Howell, at para. 39. Prompt access by
law enforcement to the contents of a cell phone may serve the purpose of
identifying accomplices or locating and preserving evidence that might
otherwise be lost or destroyed. Cell phones may also be used to evade or resist law enforcement. An individual may be a “scout” for drug smugglers, using a cell
phone to warn criminals that police are in the vicinity or to call for “back
up” to help resist law enforcement officers: see, e.g., United States v.
Santillan, 571 F.Supp.2d 1093 (D. Ariz. 2008), at pp. 1097-98. In such
situations, a review of recent calls or text messages may help to locate the
other perpetrators before they can either escape or dispose of the drugs and
reveal the need to warn officers of possible impending danger.
[49]
I conclude that prompt cell phone searches
incidental to arrest may serve important law enforcement objectives. The
evidence in this case shows why prompt follow-up of leads may be necessary and
how the search of a cell phone may assist those efforts. In this respect, cell
phone searches are unlike the taking of dental impressions, buccal swabs and
hair samples discussed in Stillman. There, the Court noted that there
were no relevant considerations of urgency supporting the extension of the
power to search incident to arrest to these procedures: there was no risk that
the accused’s teeth or DNA would be lost or destroyed if the procedures were
not carried out promptly: para. 49. And, of course, such searches, unlike cell
phone searches, are very unlikely to allow police to identify and mitigate
risks to public safety or to assist them to preserve evidence that might
otherwise be lost or destroyed. Similarly, in Golden, while the strip
search incident to arrest was aimed at the discovery of illegal drugs on the
accused’s person, there was little reason to think that the search needed to be
performed promptly upon arrest in order to fulfill this purpose: paras. 92-93.
[50]
Having considered the law enforcement objectives
potentially at stake, we must look at the individual and societal interests in
privacy and the extent to which a cell phone search incident to arrest
interferes with those interests.
[51]
It is well settled that the search of cell
phones, like the search of computers, implicates important privacy interests
which are different in both nature and extent from the search of other
“places”: R. v. Vu, 2013 SCC 60, [2013] 3 S.C.R. 657, at paras.
38 and 40-45. It is unrealistic to equate a cell phone with a briefcase or
document found in someone’s possession at the time of arrest. As outlined in Vu,
computers — and I would add cell phones — may have immense storage capacity, may
generate information about intimate details of the user’s interests, habits and
identity without the knowledge or intent of the user, may retain information
even after the user thinks that it has been destroyed, and may provide access
to information that is in no meaningful sense “at” the location of the search:
paras. 41-44.
[52]
We should not differentiate among different
cellular devices based on their particular capacities when setting the general
framework for the search power. So, for example, the same general framework for
determining the legality of the search incident to arrest should apply to the
relatively unsophisticated cellular telephone in issue in this case as it would
to other devices that are the equivalent of computers: see Vu, at
para. 38.
[53]
I pause here for a moment to note that some courts
have suggested that the protection s. 8 affords to individuals in the context
of cell phone searches varies depending on whether an individual’s phone is
password-protected: see, e.g., Court of Appeal judgment, 2013 ONCA 106,
114 O.R. (3d) 81, at paras. 73 and 75; Ruling, at para. 49; R. v. Khan,
2013 ONSC 4587, 287 C.R.R. (2d) 192, at para. 18; Hiscoe, at paras.
80-81. I would not give this factor very much weight in assessing either an
individual’s subjective expectation of privacy or whether that expectation is
reasonable. An individual’s decision not to password protect his or her cell
phone does not indicate any sort of abandonment of the significant privacy
interests one generally will have in the contents of the phone: see, e.g., R.
v. Rochwell, 2012 ONSC 5594, 268 C.R.R. (2d) 283, at para. 54. Cell phones —
locked or unlocked — engage significant privacy interests. But we must also
keep this point in perspective.
[54]
First, while cell phone searches — especially
searches of “smart phones”, which are the functional equivalent of computers —
may constitute very significant intrusions of privacy, not every search is inevitably
a significant intrusion. Suppose, for example, that in the course of the search
in this case, the police had looked only at the unsent text message and the
photo of the handgun. The invasion of privacy in those circumstances would, in
my view, be minimal. So we must keep in mind that the real issue is the
potentially broad invasion of privacy that may, but not inevitably will,
result from law enforcement searches of cell phones.
[55]
In this respect, a cell phone search is
completely different from the seizure of bodily samples in Stillman and
the strip search in Golden. Such searches are invariably and inherently
very great invasions of privacy and are, in addition, a significant affront to
human dignity. That cannot be said of cell phone searches incident to arrest.
[56]
Second, we should bear in mind that a person who
has been lawfully arrested has a lower reasonable expectation of privacy than
persons not under lawful arrest: Beare, at p. 413.
[57]
Third, the common law requirement that the
search be truly incidental to a lawful arrest imposes some meaningful limits on
the scope of a cell phone search. The search must be linked to a valid law enforcement
objective relating to the offence for which the suspect has been arrested. This
requirement prevents routine browsing through a cell phone in an unfocussed
way.
[58]
All of that said, the search of a cell phone has
the potential to be a much more significant invasion of privacy than the
typical search incident to arrest. As a result, my view is that the general
common law framework for searches incident to arrest needs to be modified in
the case of cell phone searches incident to arrest. In particular, the law
needs to provide the suspect with further protection against the risk of
wholesale invasion of privacy which may occur if the search of a cell phone is
constrained only by the requirements that the arrest be lawful and that the
search be truly incidental to arrest and reasonably conducted. The case law
suggests that there are three main approaches to making this sort of
modification: a categorical prohibition, the introduction of a reasonable and
probable grounds requirement, or a limitation of searches to exigent
circumstances. I will explain why, in my view, none of these approaches is
appropriate here and then outline the approach I would adopt.
(a)
Categorical Prohibition
[59]
Stillman excluded
the non-consensual seizure of bodily samples from the scope of the power to
search incident to arrest. The Court took this categorical approach for two
reasons. First, seizures of bodily samples give rise to “completely different
concerns” than other types of searches: they impact on a person’s bodily integrity,
which may be, as Cory J. put it, “the ultimate affront to human dignity”: para.
39. Second, the Court noted that there was no risk that evidence would be lost
if it were not obtained immediately: there was no risk of the teeth impressions
or the DNA in hair follicles changing or being destroyed: para. 49. Thus, the
potentially important law enforcement ability to act promptly could be given
little, if any, weight in this context: Beare, at p. 404, per La
Forest J.
[60]
Adopting this categorical approach would mean
that, although the police may lawfully seize a cell phone found in the course
of a search incident to arrest where there is reason to believe it contains
evidence relevant to the offence, the phone may not be searched, at all,
without a warrant. The Supreme Court of the United States essentially adopted
this approach in Riley v. California, 134 S. Ct. 2473 (2014). I would
not follow suit for two reasons.
[61]
First, the only case from this Court to adopt a
categorical exclusion from searches incident to arrest is Stillman. But
the considerations that prompted the Court to take a categorical approach in
that case are entirely absent in this case. The record in this case shows that
important law enforcement objectives are served by the power to search cell
phones promptly incident to arrest. This is unlike the Stillman situation,
in which the Court concluded that the prompt access to the suspect’s bodily
samples did little to serve law enforcement objectives incidental to the
arrest. Moreover, and in marked contrast to the bodily sample seizures at issue
in Stillman, while cell phone searches have the potential to be a
significant invasion of privacy, they are neither inevitably a major
invasion of privacy nor inherently degrading. Looking at a few recent
text messages or a couple of recent pictures is hardly a massive invasion of
privacy, let alone an affront to human dignity.
[62]
Second, I am not as pessimistic as some about
the possibility of placing meaningful limits on the manner and extent of cell
phone searches incident to arrest. Meaningful limits, rather than blanket
exclusions, have been imposed in other settings. For example, in Golden,
the Court did not categorically preclude all strip searches incident to an arrest.
Instead, the Court limited the purposes for which they could be conducted,
imposed a reasonable grounds threshold, and established rules governing how the
searches should be conducted (essentially search protocols). The Court took
this approach even though it found strip searches to be “inherently humiliating
and degrading . . . regardless of the manner in which they are
carried out”: para. 90.
[63]
A cell phone search engages very significant
informational privacy interests. However, it is not as invasive as a strip
search. It seems to me that s. 8 would require a categorical prohibition on
cell phone searches only if this Court were to find that it is impossible to
impose meaningful limits on the purposes, threshold and manner of such
searches. As I discuss below, I am not satisfied that this is the case.
[64]
I therefore reject the idea that s. 8 of the Charter
categorically precludes any search of a cell phone seized incidental to a
lawful arrest.
[65]
The question becomes what safeguards must be
added to the law of search of cell phones incident to arrest in order to make
that power compliant with s. 8 of the Charter .
(b)
Imposing a Reasonable and Probable Grounds Requirement
[66]
One possibility is to require reasonable and
probable grounds for the search, as the Court did in Golden. This Court
has described the higher threshold of “reasonable and probable grounds” as
requiring “reasonable probability” or “credibly-based probability”: Debot,
at p. 1166; Hunter v. Southam Inc., at p. 167. In my respectful opinion,
imposing that threshold here would significantly undermine the important law
enforcement objectives in this context. A main rationale of search incident to
arrest, in addition to safety of the police, the suspect and the public, is to
allow the police to promptly pursue their investigation: see, e.g., Beare,
at p. 404, per La Forest J. Investigations have many leads and many dead
ends. To restrict a cell phone search to situations in which the officers have
reasonable and probable cause to believe that evidence of the offence will be
found on the cell phone, to my way of thinking, effectively precludes prompt
access to what may be very important information which is required for the
immediate purposes of the unfolding investigation.
[67]
The record in this case demonstrates this. A prompt
search of a cell phone may lead investigators to other perpetrators and to stolen
and easily disposed of property. At the point of arrest, police will rarely
have reasonable and probable grounds to believe that evidence of the offence
will be found on the phone, and yet some limited access to its contents may be,
as here, an important investigative step that needs to be taken promptly. As
Det. Nicol testified, there were in this investigation — as there will be in
many investigations — information and leads that needed to be followed up immediately.
Imposing a “reasonable and probable grounds” requirement for all cell phone
searches will cut off access to this important step in virtually all cases.
[68]
Further, in my view, requiring reasonable and
probable grounds to search for the purpose of protecting the police, the
accused, or the public overshoots the point at which the public’s interest in
being left alone by government must give way to intruding on an individual’s
privacy to advance law enforcement objectives. A case such as this one is
instructive: the police knew a dangerous weapon was on the streets. In this
type of situation, it is reasonable to be concerned that the weapon could be
used to commit another offence or could be disposed of in a public area,
endangering the safety of innocent individuals. As with the case of discovery
of evidence, the police may not have reasonable and probable grounds to believe
that a search of the cell phone is necessary to protect them, the accused or
the public. However, they may have reason to think that searching the cell
phone may further those objectives. A standard of reasonable and probable
grounds, in my view, has the potential to unreasonably compromise the safety of
the police, the accused, or the public. It strikes an inappropriate balance
between those important law enforcement objectives and the accused’s privacy
interests.
(c)
Exigent Circumstances
[69]
Another possibility is to allow cell phone
searches only in exigent circumstances, as the appellant urges us to do: A.F., at
paras. 41 and 53. The Ontario Superior Court of Justice adopted this approach
in Liew, but, so far as I have been able to determine, it has not been
followed in any other Canadian case. As I see it, that standard requires too
much knowledge on the part of the police, given the very early point in an
investigation at which a search incident to arrest will often occur. It shares
the pitfalls of imposing a standard of reasonable and probable grounds and, if
applied in the manner proposed by my colleague, Karakatsanis J., would go even
further to prohibit a cell phone search in all but the most exceptional
circumstances.
[70]
This approach, in my view, gives almost no
weight to the law enforcement objectives served by the ability to promptly
search a cell phone incidental to a lawful arrest. If, as is my view, importing
a standard of reasonable and probable grounds would significantly undermine
these objectives, then imposing a requirement of urgency and restricting the
purposes for which the search may be conducted would effectively gut them. This
standard, in my respectful view, fails to strike the balance required by s. 8
between the privacy interests of the individual and the state’s interest in
protecting the public.
[71]
Finally, to prohibit cell phone searches in all
but “exigent circumstances” is simply not consistent with the structure of our
law relating to search incident to arrest. As P. Brown observes in relation to
American case law, which has relied on exigent circumstances to justify a cell
phone search incident to arrest
[i]f an actual danger of destruction of
evidence were required to trigger the [search incident to arrest] exception to
the warrant requirement, then [search incident to arrest] would be a mere subset
of the exigency exception. . . . The reasoning in [some] cases is
therefore flawed because it silently reads the [search incident to arrest]
exception out of existence by rendering it a restatement of the exigency
exception.
(“Searches
of Cell Phones Incident to Arrest: Overview of the Law as It Stands and a New
Path Forward” (2014), 27 Harv. J.L. & Tech. 563, at p. 572)
[72]
I also resist reliance on the statutory
provisions adopted in response to this Court’s decision in R. v. Feeney,
[1997] 2 S.C.R. 13, to set a standard that would permit searches of
cell phones incident to arrest. This Court has yet to make any pronouncements
regarding the constitutionality of s. 529.3 of the Criminal Code, R.S.C.
1985, c. C-46 , and I prefer not to rely on its assumed constitutionality in
setting the constitutional parameters of cell phone searches incident to
arrest.
[73]
To be clear, nothing in my reasons changes the
existing law in relation to warrantless searches in exigent circumstances.
(5)
Other Steps
[74]
The focus of our attention, in my view, should
not be on steps that effectively gut the usefulness of searches incident to
arrest. Rather, we should concentrate on measures to limit the potential
invasion of privacy that may, but does not inevitably result from a cell phone
search. This may be done by making some modifications to the common law power
to search cell phones incidental to arrest. Ultimately, the purpose of the
exercise is to strike a balance that gives due weight, on the one hand, to the
important law enforcement objectives served by searches incident to arrest and,
on the other, to the very significant privacy interests at stake in cell phone
searches.
[75]
The requirement that the search of the cell
phone be truly incidental to the arrest should be strictly applied to permit
searches that are required to be done promptly upon arrest in order to effectively
serve the purposes of officer and public safety, loss or destruction of
evidence, or discovery of evidence. Three modifications to the general rules
would give effect to this approach.
[76]
First, the scope of the search must be tailored
to the purpose for which it may lawfully be conducted. In other words, it is
not enough that a cell phone search in general terms is truly incidental to the
arrest. Both the nature and the extent of the search performed on the cell
phone must be truly incidental to the particular arrest for the particular
offence. In practice, this will mean that, generally, even when a cell phone
search is permitted because it is truly incidental to the arrest, only recently
sent or drafted emails, texts, photos and the call log may be examined as in
most cases only those sorts of items will have the necessary link to the
purposes for which prompt examination of the device is permitted. But these are
not rules, and other searches may in some circumstances be justified. The test
is whether the nature and extent of the search are tailored to the purpose for
which the search may lawfully be conducted. To paraphrase Caslake, the
police must be able to explain, within the permitted purposes, what they
searched and why: see para. 25.
[77]
This approach responds to the privacy concerns
posed by the virtually infinite storage capacity of cell phones by, in general,
excluding resort to that capacity in a search incident to arrest. It would
also provide these protections while preserving the ability of the police to
have resort to basic cell phone data where this serves the purposes for which
searches incident to arrest are permitted.
[78]
There is a parallel here with the Court’s
decision in Vu. A warrant to search a computer does not give the police
“a licence to scour the devices indiscriminately”: para. 61. Similarly, the
fact that some examination of a cell phone is truly incidental to arrest does
not give the police a licence to rummage around in the device at will. The
nature and extent of the search must be truly incidental to the arrest in order
for it to fall within the scope of the common law rule and respect s. 8 of the Charter .
I agree with the courts of appeal in British Columbia and Nova Scotia that,
generally, the search of the entire contents of a cell phone or a download of
its contents is not permitted as a search incident to arrest: Mann, at
para. 123; Hiscoe, at paras. 63 and 79.
[79]
The law enforcement objectives served by
searches incident to arrest will generally be most compelling in the course of
the investigation of crimes that involve, for example, violence or
threats of violence, or that in some other way put public safety at risk, such
as the robbery in this case, or serious property offences that involve readily
disposable property, or drug trafficking. Generally speaking, these types of
crimes are most likely to justify some limited search of a cell phone incident
to arrest, given the law enforcement objectives. Conversely, a search of a cell
phone incident to arrest will generally not be justified in relation to minor
offences.
[80]
A further modification is that the third purpose
for which searches incident to arrest are permitted — the discovery of evidence
— must be treated restrictively in this context. The discovery of evidence, in the
context of a cell phone search incident to arrest, will only be a valid law
enforcement objective when the investigation will be stymied or significantly
hampered absent the ability to promptly search the cell phone incident to
arrest. Only in those types of situations does the law enforcement objective in
relation to the discovery of evidence clearly outweigh the potentially
significant intrusion on privacy. For example, if, as in this case, there is
reason to think that there is another perpetrator who has not been located, the
search of a cell phone for that purpose will be truly incidental to the arrest
of the other suspects. As Det. Nicol testified, there were matters that needed
to be followed up immediately in this case. If, on the other hand, all
suspects are in custody and any firearms and stolen property have been
recovered, it is hard to see how police could show that the prompt search of a
suspect’s cell phone could be considered truly incidental to the arrest as it
serves no immediate investigative purpose. This will mean, in practice, that
cell phone searches are not routinely permitted simply for the purpose of
discovering additional evidence. The search power must be used with great
circumspection. It also means, in practice, that the police will have to be
prepared to explain why it was not practical (and I emphasize that this does not
mean impossible), in all the circumstances of the investigation, to postpone
the search until they could obtain a warrant.
[81]
The approach taken by the trial judge in D’Annunzio
is instructive. The accused was arrested for sexual assault immediately after a
young girl complained that he had inappropriately touched her in a grocery
store. A search incident to that arrest discovered a cell phone. The officer
seized it and searched for photos or videos of a sexual nature that were related
to the offence, and for other inappropriate sexual content. At trial, the
accused challenged the admissibility of two photos and a video found on the
phone during this search. The trial judge ruled that the search was not truly
incidental to the arrest. The search was “not done to further a legitimate
purpose incidental to [the] arrest. . . . The cell phone was in the
possession of the police at all times and there was no urgency”: paras. 23-24.
To put this differently, the prompt search of the cell phone was not
sufficiently linked to an important law enforcement objective.
[82]
Finally, officers must make detailed notes of
what they have examined on the cell phone. The Court encouraged this sort of
note keeping in Vu in the context of a warranted search: para. 70. It
also encouraged that notes be kept in the context of strip searches: Golden,
at para. 101. In my view, given that we are dealing here with an extraordinary
search power that requires neither a warrant nor reasonable and probable
grounds, the obligation to keep a careful record of what is searched and how it
was searched should be imposed as a matter of constitutional imperative. The
record should generally include the applications searched, the extent of the
search, the time of the search, its purpose and its duration. After-the-fact
judicial review is especially important where, as in the case of searches
incident to arrest, there is no prior authorization. Having a clear picture of
what was done is important to such review being effective. In addition, the
record keeping requirement is likely to have the incidental effect of helping
police officers focus on the question of whether their conduct in relation to
the phone falls squarely within the parameters of a lawful search incident to
arrest.
[83]
To summarize, police officers will not be
justified in searching a cell phone or similar device incidental to every
arrest. Rather, such a search will comply with s. 8 where:
(1)
The arrest was lawful;
(2)
The search is truly incidental to the arrest in
that the police have a reason based on a valid law enforcement purpose to
conduct the search, and that reason is objectively reasonable. The valid law
enforcement purposes in this context are:
(a)
Protecting the police, the accused, or the
public;
(b)
Preserving evidence; or
(c)
Discovering evidence, including locating
additional suspects, in situations in which the investigation will be stymied
or significantly hampered absent the ability to promptly search the cell phone
incident to arrest;
(3)
The nature and the extent of the search are
tailored to the purpose of the search; and
(4)
The police take detailed notes of what they have
examined on the device and how it was searched.
[84]
In setting out these requirements for the common
law police power, I do not suggest that these measures represent the only way
to make searches of cell phones incident to arrest constitutionally compliant.
This may be an area, as the Court concluded was the case in Golden, in
which legislation may well be desirable. The law enforcement and privacy
concerns may be balanced in many ways and my reasons are not intended to
restrict the acceptable options.
B.
Second Issue: Application of the Framework to
the Present Case
[85]
The initial search of the appellant’s cell phone
incidental to his arrest revealed a relevant draft text message and
photographs. Although there were subsequent searches, no additional evidence
was found and the evidence from the cell phone tendered by the Crown at trial
was that originally viewed by Sgt. Hicks: Ruling, at para. 30. It is therefore
only necessary to rule on the legality of his initial searches of the cell
phone.
[86]
As I discussed in detail earlier in my reasons,
there were important law enforcement objectives to be served by a prompt search
of aspects of the phone. The police believed that to be the case, and their
belief was reasonable. However, the officers’ evidence about the extent of the
cell phone search was not satisfactory. Sergeant Hicks said that he “had a look
through the cell phone” but could not recall specifics: Ruling, at para. 20.
Detective Constable Abdel-Malik said that he later did “some quick checks” for
about two minutes, but, again, his evidence is not very specific: Ruling, at
para. 24. There were subsequent examinations of the phone by Sgt. Hicks, Det.
Const. Abdel-Malik and Det. Nicol, but they were not able to provide many
specifics of exactly what was examined.
[87]
The Crown bears the burden of establishing that
the search incident to arrest was lawful. In my view, that burden is not met,
absent detailed evidence about precisely what was searched, how and why. That
sort of evidence was lacking in this case, and the lack of evidence, in turn,
impedes meaningful judicial review of the legality of the search. As I
mentioned earlier, this after-the-fact review is particularly important in the
case of warrantless searches where there has been no prior judicial screening
as occurs when a warrant is required.
[88]
I conclude that the initial search was not
reasonable and it therefore breached Mr. Fearon’s s. 8 rights.
C.
Should the Evidence Be Excluded?
[89]
Section 24(2) of the Charter provides
that evidence obtained in a manner that infringes the accused’s rights “shall
be excluded if it is established that, having regard to all the circumstances,
the admission of it in the proceedings would bring the administration of
justice into disrepute”. This requires courts to assess and balance the effect
of admitting the evidence in light of three factors: R. v. Grant, 2009
SCC 32, [2009] 2 S.C.R. 353, at para. 71. The party seeking to have the
evidence excluded bears the burden of proving its exclusion is required.
[90]
The trial judge found no breach, but conducted a
s. 24(2) analysis in the event she erred in that respect. Her findings of fact
in this regard, like her other findings of fact, are entitled to deference on
appeal.
[91]
The first factor is the seriousness of the Charter -infringing
state conduct. An important consideration is whether admission of the evidence
may send a message that the court condones serious state misconduct.
[92]
The trial judge made strong findings relevant to
this factor. She concluded that, “if there was a breach, it was not conduct on
the serious end of the scale”: Ruling, at para. 54. She also found that the
police acted in good faith:
Sgt. Hicks and later Abdel-Malik and
Nicol believed that they were acting within their powers of search incident to
arrest at the time they looked into the contents. To date, there is no clear
binding jurisprudence that would have directed the police to treat the cell
phone in any way other than they did upon arrest. Detective Nicol applied for
and obtained a warrant to do a comprehensive search and download of the phone
six months after the initial searches with those searches fully disclosed in
the information to obtain. He did this after learning about a case, subsequent
to the searches on July 26 and 27, 2009, that ruled that he should get a
warrant to have the Technological Crime Lab search and download the information
stored in the cell phone. [ibid.]
[93]
The trial judge’s summary of the state of the
law at the time of the search is a fair one, in my view. At the time, the
decision most favourable to the appellant’s position was that of the Ontario
Superior Court of Justice in Polius, but it was issued only slightly
more than a month before the search and it contemplated “cursory” searches of cell
phones incident to arrest: paras. 39 ff. (I note that R. v. Finnikin, 2009
CanLII 82187 (Ont. S.C.J.), to which the trial judge referred, was decided
several months after the search in this case.) As the trial judge pointed out,
there were cases at the time approving cell phone searches incident to arrest.
In fact, it is fair to say that this was the dominant view at the time of the
arrest. The Court of Appeal’s unanimous decision upholding the legality of the
search in this case supports the conclusion that the officer’s view of the law
was reasonable. The officer’s subsequent conduct in obtaining the warrant which
fully disclosed the earlier searches supports the trial judge’s conclusion that
the police acted in good faith.
[94]
Of course, the police cannot choose the least
onerous path whenever there is a gray area in the law. In general, faced with
real uncertainty, the police should err on the side of caution by choosing a
course of action that is more respectful of the accused’s potential privacy
rights. But here, if the police faced a gray area, it was a very light shade
of gray, and they had good reason to believe, as they did, that what they were
doing was perfectly legal.
[95]
In my view, the first factor favours admission
of the evidence. There is not here even a whiff of the sort of indifference on
the part of the police to the suspect’s rights that requires a court to
disassociate itself from that conduct. The police simply did something that
they believed on reasonable grounds to be lawful and were proven wrong, after
the fact, by developments in the jurisprudence. That is an honest mistake,
reasonably made, not state misconduct that requires exclusion of evidence.
[96]
The second factor concerns the impact of the
breach on the Charter -protected interests of the accused. Any search of
any cell phone has the potential to be a very significant invasion of a
person’s informational privacy interests. But, in the particular circumstances
of this case, the trial judge found, in effect, that Mr. Fearon had not established
that the invasion of his privacy had been particularly grave. This conclusion
is supported by the fact that Mr. Fearon did not challenge the warrant that was
subsequently issued for the comprehensive search of the cell phone. This
amounts to a concession that, even if the findings of the initial search were
excised from the information to obtain that warrant, reasonable and probable
grounds were still made out. As the trial judge noted, “[t]he unchallenged
warrant mitigates against both the seriousness of the assumed earlier breach
and the impact on [Mr. Fearon’s] Charter -protected interests”: Ruling,
at para. 54. So we are not here concerned with a search that could not have
been legally conducted at all. Mr. Fearon’s privacy interests were going to be
impacted one way or the other, and the particular breach of his s. 8 rights in
this case did not significantly change the nature of that impact: see, e.g., R.
v. Côté, 2011
SCC 46, [2011] 3 S.C.R. 215, at para. 84. While this factor favours exclusion,
it does so weakly.
[97]
The final factor is society’s interest in the
adjudication of the case on its merits. The evidence here is cogent and
reliable. As the trial judge found, its exclusion “would undermine the truth
seeking function of the justice system”: Ruling, at para. 55. This factor
favours admission.
[98]
I conclude that the evidence should not be
excluded.
IV.
Disposition
[99]
I would dismiss the appeal.
The
reasons of LeBel, Abella and Karakatsanis JJ. were delivered by
Karakatsanis J. (dissenting) —
I.
Introduction
[100]
We live in a time of profound technological
change and innovation. Developments in mobile communications and computing
technology have revolutionized our daily lives. Individuals can, while walking
down the street, converse with family on the other side of the world, browse
vast stores of human knowledge and information over the Internet, or share a
video, photograph or comment about their experiences with a legion of friends
and followers.
[101]
The devices which give us this freedom also
generate immense stores of data about our movements and our lives.
Ever-improving GPS technology even allows these devices to track the locations
of their owners. Private digital devices record not only our core biographical
information but our conversations, photos, browsing interests, purchase
records, and leisure pursuits. Our digital footprint is often enough to
reconstruct the events of our lives, our relationships with others, our likes
and dislikes, our fears, hopes, opinions, beliefs and ideas. Our digital
devices are windows to our inner private lives.
[102]
Therefore, as technology changes, our law must
also evolve so that modern mobile devices do not become the telescreens of
George Orwell’s 1984. In
this appeal, we are asked to decide when police officers are entitled to search
a mobile phone found in the possession or vicinity of an accused person upon
arrest. Because this new technology poses unique threats to peoples’ privacy,
we must turn to first principles to determine the appropriate response.
[103]
An individual’s right to a private sphere is a
hallmark of our free and democratic society. This Court has recognized that
privacy is essential to human dignity, to democracy, and to
self-determination. Section 8 of the Canadian Charter of Rights and
Freedoms protects the right to be free from unreasonable search and
seizure. In defining the contours of a reasonable search, the law
balances legitimate state interests, including safety and securing evidence in
law enforcement, with the privacy interests of individuals. This balance
generally requires judicial pre-authorization for a search, and a warrantless
search is prima facie unreasonable.
[104]
Nonetheless, our law recognizes that
pre-authorization is not always feasible, such as when a search is reasonably
necessary to effect an arrest. For this reason, the police have a limited
power to search lawfully arrested individuals and their immediate vicinity.
However, this police power does not extend to searches which encroach on the
arrested person’s most private spheres ― searches of the home, or the
taking of bodily samples. In my view, searches of personal digital devices
risk similarly serious encroachments on privacy and are therefore not
authorized under the common law power to search incident to arrest.
[105]
The intensely personal and uniquely pervasive
sphere of privacy in our personal computers requires protection that is clear,
practical and effective. An overly complicated template, such as the one
proposed by the majority, does not ensure sufficient protection. Only judicial
pre-authorization can provide the effective and impartial balancing of the
state’s law enforcement objectives with the privacy interests in our personal
computers. Thus, I conclude that the police must obtain a warrant before they
can search an arrested person’s phone or other personal digital communications
device. Our common law already provides flexibility where there are exigent
circumstances ― when the safety of the officer or the public is at stake,
or when a search is necessary to prevent the destruction of evidence.
[106]
In this case, the appellant was arrested in
connection with an armed robbery. Upon arrest, the police searched his cell
phone and discovered incriminating evidence. The police had no grounds to
suspect there was an imminent threat to safety and no grounds to believe there
was an imminent risk of the destruction of evidence. Consequently, I conclude
that the search was unreasonable and unconstitutional. The police were
required to obtain a warrant before searching the phone, although they were
entitled to seize the phone pending an application for a warrant. I would
exclude the evidence so obtained.
II.
Facts
[107]
Kevin Fearon was arrested in connection with the
armed robbery of jewellery at a market in Toronto in July 2009. A pat-down
search by police, incident to arrest, revealed a cell phone in Fearon’s
pocket. The phone was not locked, and an arresting officer accessed its text
messages and photographs, including a photograph of a gun. That evening, the
phone was examined by another officer, who discovered an unsent text message
reading “We did it were the jewlery at nigga burrrrrrrrrrr” (trial judge’s
ruling on cell phone searches, 2010 ONCJ 645 (CanLII), at para. 24 (Ruling)).
The officer saved the message and checked the cell phone four more times
throughout the night.
[108]
In early 2010, the officers came to believe a
warrant was required in order to submit the phone to the Technological Crime
Unit and download its contents. They therefore sought a warrant, which was
granted in February 2010. Apart from the photograph and unsent text found
shortly after the arrest, no further incriminating evidence was found during
the subsequent examination.
[109]
At trial, Fearon unsuccessfully argued that the
warrantless search of the cell phone constituted an unreasonable search and
seizure in violation of s. 8 of the Charter . Oleskiw J. held that the
officers had a reasonable prospect of securing evidence of the offence when
they searched the phone, as required by this Court’s decision in R. v. Caslake,
[1998] 1 S.C.R. 51, at para. 22, and the search was therefore reasonable. The
trial judge concluded that, while the information in a cell phone is private,
the information in this particular cell phone was not sufficiently connected to
the dignity of the person for the court to create an exception to the power to
search incidental to arrest. The evidence was admitted, and Fearon was
ultimately convicted of armed robbery and related offences.
[110]
Fearon appealed to the Ontario Court of Appeal,
in part on the basis that the search of his cell phone incident to arrest was
in violation of s. 8 . The court concluded that the initial search by the
arresting officer was within the ambit of the power to search incident to
arrest. The cell phone was not password-protected or otherwise “locked” and
the police officers had a reasonable belief that they might find relevant
evidence. While the court considered that the subsequent searches of the cell
phone at the police station that evening may have gone beyond the power to
search incident to arrest, they found no palpable and overriding error with the
trial judge’s conclusion.
[111]
The court declined to create an exception to the
power of search incident to arrest with respect to cell phones. They concluded
that such an exception would mark a significant departure from the existing
state of the law on a record that does not suggest it is necessary. They
considered it particularly significant that the cell phone was not
password-protected or otherwise “locked”, and suggested that it would not have
been appropriate to search a locked phone without a warrant. The court
dismissed the appeal.
III.
Analysis
A.
Privacy and the Power to Search Incident to
Arrest
[112]
Our Charter jurisprudence recognizes the
concept of a “sphere of privacy” to define the proper limits of state authority
in a free and democratic society. It recognizes that privacy ― a sphere
of protection for private life ― is essential to personal freedom and dignity
(see R. v. Tessling, 2004 SCC 67, [2004] 3 S.C.R. 432, at para. 16).
Privacy gives us a safe zone in which to explore and develop our identities and
our potential both as individuals and as participants in our society.
[113]
On our digital devices, we may choose to
investigate an idea on the Internet without wishing to attach ourselves to it.
We may take pictures in the context of an intimate relationship, but not wish
that these pictures be seen by others and redefine our public image. We may
debate controversial ideas through text message or email, but not intend to
commit to the opinions expressed.
[114]
Individuals should be free to choose the
audiences with whom they share their ideas, habits, experiments and movements.
We should be free to act, think, feel, and ponder outside the public gaze. We should feel free to
take actions that may elicit negative reactions, or which may be inherently
“incompatible with . . . putting on a public face”: L. Austin,
“Privacy and the Question of Technology” (2003), 22 Law & Phil. 119,
at p. 146, citing T. Nagel, “Concealment and Exposure” (1998), 27 Phil.
& Publ. Aff. 3, at pp. 18-20. But individuals would fear to do these
things if there were no private arena; no place for connections shared only
between intimately connected people; no controversial discussion and debate.
As Professor Austin argues, at pp. 146-47, we need this private space in order
to grow as distinct individuals, and in order to have an “authentic inner life
and intimate relationships”.
[115]
A private inner life is essential to the
autonomous individual that forms the basis of a free and democratic society as
envisioned by the Charter . Privacy is a shield for autonomy and
freedom, both for their own sake, and because they are prerequisites for our
social and political structures.
[116]
This Court has recognized both the intrinsic
value of privacy and the importance of privacy to the fulfillment of other Charter
rights and values. La Forest J. summarized this dual role in R. v. Dyment,
[1988] 2 S.C.R. 417, at pp. 427-28:
Grounded in man’s physical and moral
autonomy, privacy is essential for the well-being of the individual. For this
reason alone, it is worthy of constitutional protection, but it also has
profound significance for the public order. The restraints imposed on
government to pry into the lives of the citizen go to the essence of a
democratic state.
More recently, in R. v. Spencer,
2014 SCC 43, [2014] 2 S.C.R. 212, at para. 15, Cromwell J. wrote that privacy
is “a prerequisite to individual security, self-fulfilment and autonomy as well
as to the maintenance of a thriving democratic society”.
[117]
This Court has also pronounced on the dangers of
putting “its imprimatur” on practices tending to give individuals reason
to fear arbitrary or unjustified intrusions upon their privacy. The threat
of unreasonable intrusions on privacy (and not only the unreasonable intrusion
itself) is enough to undermine the values served by privacy. In R. v.
Duarte, [1990] 1 S.C.R. 30, at p. 54, La Forest J. adopted the words of Harlan J., dissenting, in United States
v. White, 401 U.S. 745 (1971), at pp. 787-88:
Authority is
hardly required to support the proposition that words would be measured a good
deal more carefully and communication inhibited if one suspected his conversations
were being transmitted and transcribed. Were third-party bugging a prevalent
practice, it might well smother that spontaneity ― reflected in
frivolous, impetuous, sacrilegious, and defiant discourse ― that
liberates daily life. Much off-hand exchange is easily forgotten and one may
count on the obscurity of his remarks, protected by the very fact of a limited
audience, and the likelihood that the listener will either overlook or forget
what is said, as well as the listener’s inability to reformulate a conversation
without having to contend with a documented record.
[118]
As this Court noted in Duarte, Canadians
value “the right to live in reasonable security and freedom from surveillance,
be it electronic or otherwise. And it has long been recognized that this
freedom not to be compelled to share our confidences with others is the very
hallmark of a free society” (p. 53). Our personal autonomy includes our right
to determine when, how, and to what extent we release personal information (p.
46).
[119]
Section 8 of the Charter provides
constitutional protection for privacy. It recognizes the right to be “secure
against unreasonable search or seizure”. Of course, interests protected by the
Charter are not absolute, and only unreasonable searches and
seizures are prohibited; thus, the protection strikes a balance between the
public interest in effective law enforcement and society’s interest in
protecting privacy. As Dickson J. wrote in Hunter v. Southam Inc.,
[1984] 2 S.C.R. 145, at pp. 159-60:
This limitation on the right guaranteed
by s. 8 , whether it is expressed negatively as freedom from “unreasonable”
search and seizure, or positively as an entitlement to a “reasonable”
expectation of privacy, indicates that an assessment must be made as to whether
in a particular situation the public’s interest in being left alone by
government must give way to the government’s interest in intruding on the
individual’s privacy in order to advance its goals, notably those of law
enforcement.
[120]
Hunter v. Southam Inc. established that, when feasible,
there must be prior judicial authorization of a search. A
warrantless search is prima facie unconstitutional, and the onus is on
the Crown to establish the reasonableness of the search.
The search will be reasonable under s. 8 if it is authorized by law; if
the law itself is reasonable, and if the search is executed in a reasonable
manner (R. v. Collins, [1987] 1 S.C.R. 265, at p. 278). The issue in
this case is whether a warrantless search of a cell phone, incident to arrest,
is authorized by law.
[121]
A search may be authorized by a common law
police power if it is reasonably necessary to the execution of a recognized
police duty, in light of all the circumstances (R. v. Mann, 2004 SCC 52,
[2004] 3 S.C.R. 59, at paras. 39-40; R. v. Clayton, 2007 SCC 32, [2007]
2 S.C.R. 725, at paras. 21 and 29). This Court has long recognized that police
officers have a common law power to conduct a search of the individual and the
immediate surroundings, as an incident to arrest (Cloutier v. Langlois,
[1990] 1 S.C.R. 158, at pp. 180-82). This limited power was born of necessity,
in order to secure an arrest. In Cloutier, this Court recognized
that it will often be necessary to perform a “pat-down” or “frisk” search (1)
to ensure the safety of the police, the public and the accused, and (2) to
preserve evidence (pp. 182 and 186). A warrant will often not be feasible to
respond to these purposes. In Caslake, this Court highlighted the third
law enforcement purpose that may justify a search connected to the arrest: (3)
the discovery of evidence which can be used at trial (para. 19).
[122]
The power to search incident to arrest evolved
as a common law exception to the general requirement of judicial
pre-authorization. It permits the physical search of items in the possession
of the accused and authorizes searches that are reasonably necessary to conduct
the arrest. Thus, a warrantless search is justified when the
immediate needs of law enforcement authorities outweigh the individual’s
privacy interest (Caslake, at para. 17).
[123]
Consistent with the balancing inherent in a s. 8
analysis, subsequent cases have recognized that a heightened privacy interest
in a place or a piece of information may tilt the balance in favour of
protecting privacy and preclude a search incident to arrest. In R. v.
Feeney, [1997] 2 S.C.R. 13, at para. 159, this Court concluded that the
heightened privacy interest in the home weighs against warrantless arrests in
dwelling houses. In R. v. Golub (1997), 34 O.R. (3d) 743, at pp.
756-57, Doherty J.A. of the Ontario Court of Appeal applied this reasoning to
conclude that searches of the home incident to arrest are generally prohibited
because the privacy interest in the home outweighs the state interest in
performing a warrantless search, barring exceptional circumstances. Similarly,
in R. v. Stillman, [1997] 1 S.C.R. 607, at paras. 49-50, this
Court concluded that the warrantless taking of bodily samples including hair
samples and teeth impressions following arrest was unlawful.
[124]
The key principle emerging from this
jurisprudence is that the law enforcement interests in ensuring safety,
preserving evidence, and gathering evidence on arrest will generally outweigh
the privacy interest that an arrested person has in the physical items in his
immediate vicinity, justifying a search incident to arrest. But where the
underlying assumptions change ― be it due to the exigencies of law
enforcement or the privacy interest impacted by the search ― the
constitutional balance must be reassessed.
[125]
This case examines whether the police power to
search incident to arrest includes a power to search a cell phone or other
digital device. Because the privacy interest in such a device is
quantitatively and qualitatively different from that in other physical items
traditionally subject to such searches, this analysis must begin with the
consideration of first principles: what constitutes a Charter compliant
“reasonable” balance between privacy and the needs of law enforcement with
respect to the search of cell phones and similar devices incident to arrest. I
will first consider the privacy interest in such digital devices, then the law
enforcement interest in performing a warrantless search upon arrest, and
conclude by discussing the appropriate balance between the two.
B.
Privacy Interest in Digital Devices
[126]
All parties agree that individuals have a high
expectation of privacy in their cell phones.
[127]
However, a cell phone cannot be treated like any
other piece of physical evidence that may be found on an arrestee and searched
incident to arrest. The analogy to a “briefcase” is not apt. In R. v. Vu,
2013 SCC 60, [2013] 3 S.C.R. 657, at paras. 38 and 47, this Court
recognized that a computer or cell phone is fundamentally unlike a
conventional “receptacl[e]”. The four reasons Cromwell J. identified in that
case are equally applicable here.
[128]
First, computers and cell phones store immense
amounts of information, some of which will be highly private in nature (Vu,
at para. 41). In the case of a cell phone, this will include private
communications in the form of texts and emails, potentially dating back years.
The data storage capacity of a phone can vastly exceed what an individual could
carry on their person or in a briefcase: thousands of pictures, messages, or
videos. When combined in sufficient quantities, even individually mundane
pieces of information have the potential to reveal aspects of our most private
lives.
[129]
Second, computers and cell phones are
“fastidious record keeper[s]” (Vu, at para. 42). These digital
devices can generate records of websites visited, documents read and created,
and the details of the uses of almost all programs on the device. Cell phones
in particular retain records of messages, both drafted and sent, calls made,
and files transmitted and received. The ability of a cell phone to generate an
exhaustive record of seemingly trivial aspects of a person’s day-to-day life
means that it contains a far more thorough picture of what that person thought,
said and did than any conventional form of data storage ever could. Because
cell phones record details about so many aspects of our lives that would
otherwise disappear, any intrusion into the device compromises our privacy
interest in an unprecedented way. Our cell phones, on a daily basis, perform a
level of surveillance which can generate and allow access to information
ranging from social media communications to personal habits, and from tracked
news feeds to medication schedules.
[130]
As well, digital devices can retain files and
data even after users think they have been destroyed (Vu, at para. 43).
This problem may be even more pronounced with respect to cell phones, on which
detailed manipulation of background files can be even more challenging for the
average user.
[131]
Finally, the limitation inherent in searches
incident to arrest ― limiting a search to a particular place or item
― is not a meaningful restriction, since modern digital devices are
portals to vast stores of information that is not “in” the device, but is instead
stored on servers, or on third party devices (Vu, at para. 44). For
example, if a user logs in to an Internet browser on both her home computer and
on her cell phone, the browser on the cell phone may contain not just a
fastidious record of Internet usage on the cell phone, but also on the home
computer. Similarly, social media applications may allow the holder of the
cell phone to review messages and information generated by the user on other
devices. Emails which have never been sent or read from the cell phone may be
accessible through email applications (potentially including those sent many
years ago). Files which have never been opened or created on the cell phone
may be accessible through applications that allow the user to store files
remotely. Moreover, someone examining the device may not be able to identify
what is stored remotely.
[132]
In short, the cell phone acts like a key or
portal which can allow the user to access the full treasure trove of records
and files that the owner has generated or used on any number of devices. It is
not just the device itself and the information it has generated, but the gamut
of (often intensely) personal data accessible via the device that gives rise to
the significant and unique privacy interests in digital devices. The fact that
a suspect may be carrying their house key at the time they are arrested does
not justify the police using that key to enter the suspect’s home. In the same
way, seizing the key to the user’s digital life should not justify a wholesale
intrusion into that realm. Indeed, personal digital devices are becoming as
ubiquitous as the house key. Increasingly large numbers of people carry such
devices with them everywhere they go (be they cell phones, mobile computers,
smart watches, smart glasses, or tablets).
[133]
Cell phones and other wireless communications
devices can continue to generate evidence even after they have been seized.
The cell phone can continue to receive calls, text messages and emails even
when out of the owner’s control. Some of the concerns associated with searches
of desktop computers identified in Vu ― that the computer can
generate information unknown to the user and that such information is difficult
to delete ― are magnified with phones that can generate and record that
information when out of the owner’s hands and without her knowledge. This
information, along with many of the records on the phone, will also implicate
the privacy interests of third parties who sent the communications,
collaborated in their creation, or have given the owner access to their files.
[134]
Thus, like the search of a private home, a strip
search or the seizure of bodily samples, the search of the portal to our
digital existence is invasive and impacts major privacy interests. The privacy
interest in a cell phone or other digital communication and storage device is
extremely high. The ability of these devices to generate, store, process,
communicate and share truly massive quantities of deeply private information
explains their usefulness and the way in which they have revolutionized modern
society. At the same time, these impressive capacities underlie the necessity
for rigorous protection of users’ privacy. The incredible and unique power of
modern digital communications devices as portals to vast stores of information
― and their ability to expose our private lives ― means that they
can be even more threatening to our privacy than the search of our homes.
C.
Law Enforcement Interest in Searching Digital
Devices
[135]
The respondent and aligned interveners argued
that, although the privacy interest in a cell phone may be high, there are also
pressing state interests that require warrantless searches of cell phones.
[136]
I will address these law enforcement interests
through the three purposes justifying searches incident to arrest: safety, the
preservation of evidence, and the discovery of evidence.
[137]
I conclude that, while searching a cell phone
will often be very useful for law enforcement, it will be an exceptional case
where a warrantless search will be justified on that basis. In my view, the
most pressing state interests can be accommodated by the existing doctrine that
permits warrantless searches under exigent circumstances ― when (1) there
is a reasonable basis to suspect a search may prevent an imminent threat to safety
or (2) there are reasonable grounds to believe that the imminent loss or destruction
of evidence may be prevented by a warrantless search. (I will discuss the
doctrine of exigent circumstances in greater detail below.)
[138]
Where exigent circumstances do not exist, a
telewarrant can usually be obtained relatively quickly and with little harm to
the investigation. Excluding cell phones from the power to search incident to
arrest does not necessarily mean they cannot be searched. Rather, it
means that police officers will have to seek a warrant to do so from a judicial
officer who will ensure that individuals’ privacy is appropriately safeguarded.
(1)
Safety
[139]
In Cloutier, at p. 182, this Court
described the first rationale for the power to search incident to arrest as
follows:
. . . a search of the accused
for weapons or other dangerous articles is necessary as an elementary
precaution to preclude the possibility of their use against the police, the
nearby public or the accused himself.
[140]
Clearly a cell phone (or any other digital
communication device) is not a physically dangerous weapon and, unlike a
physical receptacle like a briefcase, cannot conceal such a weapon. However,
digital communications capacity can generate new types of threats. For
example, a cell phone could be used to summon violent backup, posing an
imminent threat to the arresting officer or the public.
[141]
When an arresting officer has a reasonable
suspicion that a cell phone has been used to generate such a threat, this
constitutes an exigent circumstance, justifying a warrantless search. For
example, in R. v. White, 2007 ONCA 318, 85 O.R.
(3d) 407, the suspect acted in a manner that indicated he realized he was under
investigation and was heard to remark “Yeah, they’re here now” into his cell
phone immediately before being arrested (paras. 10-12). However, this will be an exceptional case. The mere possibility that a
phone could have been used to summon backup does not justify a search
incident to arrest any more than the theoretical possibility that the suspect’s
home could contain accomplices justifies a search of the home. This does not rise to
the level of imminent risk to safety.
(2)
Preservation of Evidence
[142]
The respondent raised two main concerns relating
to the preservation of evidence: first, evidence on the phone itself may be
remotely deleted, either by an accomplice or automatically, and second, an
accomplice may destroy physical evidence while the police are delayed by the
need to wait for a warrant.
[143]
It seems to me (on this record) that there will
rarely be reasonable grounds to believe an accomplice is destroying evidence,
and that a search of the cell phone is required to prevent such action.
However, where there is such a reasonable basis, this could, in principle,
constitute an exigent circumstance justifying a search.
[144]
Usually the information on the cell phone will
remain available pending the acquisition of a search warrant. This case is an
example. The mere possibility that evidence on the cell phone could be
remotely deleted should not justify a search. Furthermore, even if the suspect
has an accomplice with the technological skills to wipe the cell phone
remotely, this threat is easily addressed by removing the cell phone’s battery
or placing it in a “Faraday bag”, an inexpensive receptacle which blocks
wireless communications.
(3)
Discovery of Evidence
[145]
In practice, the most common benefit of a police
search of a cell phone or other digital device incident to arrest is that it
can provide police with information that may assist in the investigation
― a cell phone is a virtual gold mine of information. This is exactly
the same reason that a cell phone attracts a heightened expectation of
privacy. The fact that a cell phone may keep and access meticulously taken
records about almost every aspect of a person’s life explains both why
searching it would be so useful to law enforcement and why such a search may be
so offensive to the person’s dignity.
[146]
The text messages and photographs discovered in
this case are examples of incriminating evidence that generally would not
disappear if police wait to acquire a warrant.
[147]
However, often a contact list will allow the
police to immediately track down associates who may be involved in the offence
or identify witnesses. Other forms of communication such as emails, voice
messages and call histories may be similarly useful. Cromwell J. identifies
the “prompt” pursuit of the investigation as an important law enforcement
objective (paras. 49, 59 and 66). The immediate acquisition of this
information is valuable because of what the Canadian Association of Chiefs of
Police referred to as “investigative immediacy”. The value of information may
decline as witnesses, accomplices or evidence disappears, and so the police want
to act before the trail goes cold. While telewarrants can be acquired quickly, even small delays may
come at a cost to the investigation.
[148]
This problem may be exacerbated by the
difficulty of bypassing password protection on certain cell phones. For example,
counsel for the respondent suggested that accessing a locked iPhone can take
months as they must be sent to Apple Inc. in the United States. However, there
is no evidence before us that this is a common problem, or that there are many
instances in which the police have a brief window to access a phone incident to
arrest while it is still unlocked. In any event, this justification would only
apply to phones that are password-protected but unlocked at the moment they are
seized. (It may, for example, justify entry for the limited purpose of
disabling the password protection.)
[149]
Finally, there may be valuable information on a
phone that the police will be unable to obtain a warrant to acquire. The
police need only a reasonable basis to conduct a search incident to arrest. To
acquire a warrant, they require reasonable grounds to believe that relevant
information will be found on the cell phone. This higher standard may mean
that relevant evidence is simply never discovered.
[150]
There is a cost to requiring police officers to
obtain a warrant before searching an arrestee’s phone. Searches for the
purposes of imminent risks to safety or the preservation of evidence are
permitted under exigent circumstances, answering the most serious of these
concerns. However, the requirement to obtain a warrant will sometimes mean
that the police are unable to discover potentially valuable evidence or that
their investigation will be delayed. This cost must be weighed against the
privacy interest in a phone.
D.
Balance When Searching Digital Devices
[151]
All parties agreed that there is a heightened
privacy interest in personal digital devices. These devices give rise to
significant and unique privacy interests. However, they disagreed on how that
interest would impact the authority to search.
[152]
In my view, the inherent limitations of the
search incident to arrest ― the fact that it is targeted to the offence,
that it requires reasonable grounds, and that it must be proximate in time and
place to the arrest ― do not adequately limit the intrusion on the
privacy interest in digital devices, unlike physical items. For tangible
items, the intrusion on privacy is necessarily limited by the temporal and
territorial dimensions. However, the nature of the privacy interest in a
personal digital device is qualitatively and quantitatively different from that
in a purse, briefcase or filing cabinet (Vu, at para. 47). A modern
digital device is a portal to vast stores of information that are not truly on
the device, and digital information has the potential to be more intensely and
extensively personal than what might be found in a briefcase. Particularly for
the “digital generation”, these devices contain far more information, and
information far more personal, than does a private home. These devices provide
a window not just into the owner’s most intimate actions and communications,
but into his mind, demonstrating private, even uncommunicated, interests,
thoughts and feelings. Thus, like the search of the body and of the home, the
warrantless search of personal digital devices as an incident of arrest is not
proportionate to our privacy interests.
[153]
In my view, the weighty privacy interest an
arrested person has in her cell phone will outweigh the state interest in
performing a warrantless search incident to arrest, except in exigent
circumstances. The police may usually seize a phone incident to arrest
in order to preserve the evidence, but will require a warrant before they can search
its contents.
[154]
Consequently, the police may lose the opportunity
to immediately follow up on leads that the cell phone may disclose, or may not
be able to access certain evidence. But our system of law has long recognized
that the state interest in acquiring evidence is not absolute. Doubtless, the
ability to always search a suspect’s home upon arrest would be useful to law
enforcement, but the high expectation of privacy in our homes dictates
otherwise. When it comes to cell phones and other such personal digital
devices, privacy demands no less protection.
[155]
This approach only protects the digital
information stored on such devices, and not the physical devices themselves,
because it is the information that attracts a heightened expectation of
privacy. Searches that treat a cell phone (or other similar device) merely as
a physical object continue to be permissible incident to arrest. For example,
seizing a cell phone, searching for hidden compartments, testing that cell
phone for fingerprints, or reading the identification number physically
inscribed on the cell phone, do not interfere with the heightened expectation
of privacy in the accessible information.
[156]
Similarly, since it is the nature of the
information accessible through the device that is relevant, the form of the
digital device is immaterial. To the extent that devices such as tablets,
smart watches, laptop computers and smart glasses may provide access to or
generate the same types of information, they will likely be subject to the same
treatment.
[157]
As Cromwell J. recognized in Vu,
protocols limiting the way in which a computer may be searched are not, as a
general rule, constitutionally required for a warrant to be issued:
para. 53. The same reasoning applies to cell phones, although the development
of such protocols is not precluded.
[158]
In performing a search of a cell phone, whether
under exigent circumstances or pursuant to a warrant, the police officers must
not extend that search beyond the scope of the grounds permitting the search.
The grounds for the search only outweigh the suspect’s privacy interest in the
device with respect to specific purposes ― it is hard to think of a
ground that would justify the unlimited abrogation of the powerful privacy
interest in a digital device. If exigent circumstances justify a warrantless
safety search because of fears of armed backup, those grounds will only justify
a search of relatively recent messages. Grounds to search a cell phone for a
specific purpose cannot provide carte blanche to roam the suspect’s
digital life without restraint.
(1)
Alternative Approaches
[159]
I have concluded that the correct balance is
struck under s. 8 of the Charter by the requirement of judicial
pre-authorization, absent exigent circumstances. The parties to this appeal,
the courts below, and other courts throughout the country have advanced
alternative solutions to address the enhanced privacy interest in a cell
phone. In my view, none of these alternatives adequately protect our
reasonable expectations of privacy in our personal digital devices.
[160]
First, unlike the Ontario Court of Appeal, I do
not see how the considerable privacy interest in a cell phone could be overcome
when it is not password-protected or otherwise locked. Leaving a cell phone
without password protection cannot be said to constitute a waiver of the privacy
interest in the vast web of digital information accessible through the phone,
nor does it demonstrate a subjectively diminished expectation of privacy. Like
the private sphere of the home, our digital devices remain intensely personal,
even when we do not take every possible precaution to protect them. An
individual who leaves her front door unlocked does not forfeit her privacy
interest in her home to the state; the same is true of her phone.
[161]
Second, I agree with my colleague and the
parties to this appeal that there is little value in drawing a distinction
between smart and dumb cell phones. Even dumb cell phones enable access to
text message history, which can provide a transcript of years of private
conversations (R. v. TELUS Communications Co., 2013 SCC 16, [2013] 2
S.C.R. 3, at para. 34), as well as pictures, call history, and contacts. Many
dumb cell phones can provide access to the Internet and email even when they
lack the touch screens or keypads that make such uses easier. Officers
cannot, based on a brief visual inspection of a phone, assess how it has been
used or the depth of private information it can access. The Crown advocated
against such a distinction, submitting that it would place an unworkable burden
on police to differentiate between dumb and smart phones, particularly given
the rapid rate of technological evolution.
[162]
Third, certain decisions have adopted an
approach that would allow a limited or “cursory” search of a cell phone
incident to arrest (R. v. Polius (2009), 196 C.R.R. (2d) 288
(Ont. S.C.J.), at para. 39). While the notion of a brief, targeted search that
could quickly identify evidence without significantly invading the suspect’s
privacy is appealing, based upon the current record, such an approach is
neither practical nor principled. Consequently, this approach was also
rejected by both parties.
[163]
Given that the information that can be accessed
through a cell phone is highly private, it would be unprincipled to countenance
a cursory infringement of the owner’s privacy ― much as it is not
permissible to take a cursory walk inside a suspect’s home.
[164]
Moreover, it is very difficult ― if not
impossible ― to perform a meaningfully constrained targeted or cursory
inspection of a cell phone or other personal digital device. For example,
recent communications could have been transmitted via a text message, an email,
an instant messaging application, a social networking application, a
conventional voice call or a “data” voice call, a message board, through a
shared calendar or cloud folder, a picture messaging application, or any number
of websites. In short, a cursory inspection for recent communications will
need to search a host of applications ― the privacy infringement may be
far from minimal and the inspection far from quick. Similarly, a cursory
inspection of photos may involve any number of private and personal photographs
of the individual ― and of third parties.
[165]
Further, as the Crown argued, the difficulty
inherent in setting a standard for a cursory search would generate uncertainty
for the police and result in increased after-the-fact litigation of searches.
That same uncertainty would also result in increased numbers of searches that
were later determined to be unconstitutional.
[166]
Fourth, the Director of the Public Prosecutions
Services of Canada suggested that searches of cell phones incident to arrest
could be limited to a manual search, that is, a search that the officer could
perform using the capacities of the device itself, as opposed to downloading or
analysing its contents using other equipment as part of a full technical
examination. However, as with a cursory examination, even a brief manual
examination means that individuals would not feel secure in the privacy of
their digital devices. Moreover, this approach mistakenly suggests that it is
the technical nature of a search that poses the threat, when the use of
technology can cut both ways. When an officer manually searches a cell phone,
she cannot tell, without opening it, whether a particular photograph or text
message is deeply private and irrelevant, or highly relevant to the
investigation ― she opens them all alike. However, a computer search
could be used to identify only certain types of files containing certain key
words that are likely to be relevant, and then display only those files to the
officers. In this way, the privacy interest of the individual may be better
protected by a targeted high tech search, as opposed to a manual one.
[167]
On the other hand, a technical search can also
create new vulnerabilities. For example, the use of technology can expose
patterns in the information on or use of the cell phone that may not otherwise
be obvious in a manual search. It is the degree to which private information
is revealed that is relevant ― not whether the search is high or low
tech.
[168]
The intervener the Canadian Association of
Chiefs of Police suggested that this Court should permit a search of a phone
incident to arrest, but raise the standard to permit that search to “reasonable
and probable grounds”, as this Court did in R. v. Golden, 2001
SCC 83, [2001] 3 S.C.R. 679, with respect to strip searches. This approach
would only yield usable evidence in cases where a warrant would necessarily
have been obtainable since the standards for a search and to obtain a warrant
would be the same. Police would therefore gain the time and resources
otherwise needed to seek a warrant.
[169]
However, this modest gain is outweighed by a
significant cost to privacy. If a police officer searches a cell phone,
mistakenly believing that she has reasonable grounds, the exclusion of the
evidence obtained at a subsequent trial does not render the search harmless.
The arrested person’s privacy will have been unjustifiably infringed, and their
general sense of freedom and security affected, even if any information thereby
obtained cannot be used against her. Only a requirement of pre-authorization
can give people confidence that their privacy will be respected. As La Forest
J. wrote in Dyment, at p. 430:
. . .
if the privacy of the individual is to be protected, we cannot afford to wait
to vindicate it only after it has been violated. . . . Dickson J.
made this clear in Hunter v. Southam Inc. After repeating that the
purpose of s. 8 of the Charter was to protect individuals against
unjustified state intrusion, he continued at p. 160:
That
purpose requires a means of preventing unjustified searches before they happen,
not simply of determining, after the fact, whether they ought to have occurred
in the first place. This, in my view, can only be accomplished by a system of prior
authorization, not one of subsequent validation. [Emphasis in original.]
[170]
My colleague concludes that modifications to the
common law power to search cell phones or personal computers incident to arrest
would adequately limit the invasion of privacy and render judicial
pre-authorization unnecessary (paras. 75-84). He emphasizes that the scope of
the search must be truly incidental to the particular arrest (para. 78). He
limits the objective of discovering evidence to that which serves an immediate
investigative purpose, and notes that law enforcement objectives will most
likely justify the search in relation to serious offences (paras. 79-80). In
addition, he requires the police to keep detailed notes of what they have
searched and why (para. 82).
[171]
In my view, Cromwell J.’s proposed tailoring of
the search’s scope encounters the same problems of impracticality, police
uncertainty, and increased after-the-fact litigation as the cursory search
discussed above. My colleague draws a parallel between his approach and the
approach set out by this Court in Vu, but Vu provides that a judge
may determine the scope of a search of a computer when issuing the warrant
(para. 62). And while detailed note-taking of what the police have searched
and why may be desirable (Vu, para. 70, in the context of a search under
warrant), it may prove to be an impractical requirement in the context of a
time-sensitive investigation. It is not, in my view, an adequate remedy to
what would be “an extraordinary search power” (para. 82).
[172]
Fundamentally, my colleague’s approach puts the
balancing decision in the hands of the police. I doubt not that police
officers faced with this decision would act in good faith, but I do not think
that they are in the best position to determine “with great circumspection”
whether the law enforcement objectives clearly outweigh the potentially
significant intrusion on privacy in the search of a personal cell phone or
computer (para. 80). If they are wrong, the subsequent exclusion of the
evidence will not remedy the initial privacy violation.
E.
The Scope of “Exigent Circumstances” Justifying
a Search Incident to Arrest
[173]
The doctrine of exigent circumstances, as
expressed in the common law and the Criminal Code, R.S.C. 1985, c. C-46 ,
recognizes that privacy protections may be overridden under exigent
circumstances. This doctrine is an exception to the general requirement to
obtain a search warrant.
[174]
Under s. 487(1)(b), the police may obtain
a search warrant if “there are reasonable grounds to believe that . . . [a
search] will afford evidence with respect to the commission of an offence, or
will reveal the whereabouts of a person who is believed to have committed an
offence”. Section 487.11 provides:
A peace
officer . . . may, in the course of his or her duties, exercise any
of the powers described in subsection 487(1) . . . without a warrant
if the conditions for obtaining a warrant exist but by reason of exigent
circumstances it would be impracticable to obtain a warrant.
Thus, the requirement for
a warrant to search a personal digital device can be dispensed with under
exigent circumstances, if the conditions for obtaining a warrant exist. These
provisions, however, do not define exigency.
[175]
At common law, exigent circumstances have been
defined to include (1) the imminent loss or destruction of evidence or (2) an
imminent threat to police or public safety (Feeney, at para. 52,
citing J. A. Fontana, The Law of Search and Seizure in Canada (3rd ed. 1992);
J. A. Fontana and D. Keeshan, The Law of Search and Seizure in Canada (8th
ed. 2010), at p. 1066; R. v. Kelsy, 2011 ONCA 605, 283 O.A.C. 201, at para. 24).
[176]
The definition of exigency in s. 529.3 of the Criminal
Code is consistent with the common law. That provision authorizes the
police to enter a home, without a warrant, under exigent circumstances, which
are defined in s. 529.3(2) as circumstances in which the officer:
(a) has reasonable
grounds to suspect that entry into the dwelling-house is necessary to prevent
imminent bodily harm or death to any person; or
(b) has reasonable
grounds to believe that evidence relating to the commission of an indictable
offence is present in the dwelling-house and that entry into the dwelling-house
is necessary to prevent the imminent loss or imminent destruction of the
evidence.
[177]
This provision provides for a lower standard for
exigency to protect safety (reasonable suspicion) than to preserve evidence
(reasonable belief). Similarly, in Golub, at pp. 758-59, the Ontario
Court of Appeal recognized the power to search a home incident to an arrest in
exceptional circumstances, based on a reasonable suspicion that an armed
person or injured victim may have been inside.
[178]
In my view, the existing common law standards of
exigency are equally applicable to the search of a cell phone. The usual
standard of reasonable belief is appropriate for the preservation of
evidence. However, the standard to infringe an arrested person’s privacy
interest is lower when the search is reasonably necessary to safely and
effectively perform an arrest. When an accused has summoned backup, the arrest
itself is potentially jeopardized by threats to the police and the public. The
highest purpose of law enforcement is to protect the public, and officers are
entitled to ensure their own safety in carrying out their dangerous and
necessary duties. Thus, a reasonable suspicion that the search of a
cell phone is necessary to prevent imminent bodily harm or death will justify a
warrantless search.
[179]
Therefore, a warrantless search of a cell phone
on arrest will be justified when (1) there is a reasonable basis to suspect a
search may prevent an imminent threat to safety or (2) there are reasonable
grounds to believe that the imminent loss or destruction of evidence may be
prevented by a warrantless search.
IV.
Application
[180]
The search of a cell phone without a warrant
cannot be justified under the common law power of search incident to arrest.
[181]
In my view, the circumstances of this case did
not justify a warrantless search of the appellant’s phone, as the facts of this
case fall far below either standard for exigency. There was no reasonable
basis to suspect that it was necessary to search the cell phone for the
purposes of safety. The mere use of an unrecovered firearm in the commission
of the offence ― the presence of a gun on the streets ― is
insufficient to ground a reasonable suspicion of imminent bodily harm or
death. This case demonstrates the appropriateness of such restraint ―
the handgun was later found in the getaway car, which had already been secured
but not yet searched. Nor was there any basis to suspect that violent backup
had been called for. The officer did not observe the appellant making a call
or sending a text, nor did he have any basis to think that the appellant knew
an arrest was imminent. Similarly, there were no reasonable grounds to believe
that the destruction of evidence was imminent, either by remote wiping of the
phone or destruction of physical evidence by a possible accomplice.
[182]
Therefore, the searches of the appellant’s phone
were not justified and unreasonably infringed his privacy, in violation of s. 8
of the Charter .
A.
Exclusion of the Evidence
[183]
The evidence which was unconstitutionally
obtained from the appellant’s phone should be excluded.
[184]
The trial judge found no Charter infringement
but nonetheless directed her mind towards s. 24(2) , concluding that, even if
unconstitutionally obtained, the evidence on the phone should not be excluded.
While trial judges’ decisions under s. 24(2) are generally entitled to
considerable deference (R. v. Grant, 2009 SCC 32, [2009] 2 S.C.R. 353,
at para. 86), that is not the case when an appellate court reaches a different
conclusion on the breach itself. That said, absent palpable and overriding
error, the trial judge’s underlying factual findings are always entitled to
deference (Grant (2009), at para. 129; see also R. v. Grant,
[1993] 3 S.C.R. 223, at p. 256).
[185]
In Grant (2009) this Court established a
three-part test to determine whether unconstitutionally obtained evidence
should be excluded under s. 24(2) :
. . . (1) the seriousness of
the Charter -infringing state conduct (admission may send the message the
justice system condones serious state misconduct), (2) the impact of the breach
on the Charter -protected interests of the accused (admission may send
the message that individual rights count for little), and (3) society's
interest in the adjudication of the case on its merits. [para. 71]
(1)
Seriousness of the Charter -Infringing
State Conduct
[186]
The first factor considers the seriousness of
the offending state conduct ― the more severe or deliberate the conduct,
the greater the need for the courts to dissociate themselves from it to
maintain public confidence in the justice system.
[187]
The trial judge found that the police acted in
good faith. The police believed they were acting within their powers and there
was no clear precedent that directed them to treat a cell phone differently
than other receptacles. Moreover, when the police later learned of a case that
they believed required them to obtain a warrant, they promptly applied for and
obtained such a warrant. In doing so, the police made full disclosure of their
prior searches of the phone.
[188]
I find no reviewable error in the trial judge’s
conclusion. The searches took place before this Court released its decision in
R. v. Morelli, 2010 SCC 8, [2010] 1 S.C.R. 253. That decision
marked a sea change in the law’s approach to digital devices by making it clear
that individuals have a very strong privacy interest in their computers (and,
by extension, similar devices). Before that decision, many appellate courts
had endorsed a broad power to search receptacles such as purses or briefcases
incident to arrest and this Court had not indicated that the police should
treat a cell phone differently.
[189]
As Fish J. concluded in R. v. Cole,
2012 SCC 53, [2012] 3 S.C.R. 34, a mistaken understanding about the power to
search without a warrant is much more understandable in an unsettled area of
law (para. 86). In my opinion the state conduct factor weighs against
exclusion.
(2)
Impact on the Charter -Protected Interests
of the Accused
[190]
The second factor considers the extent to which
the seriousness of the breach undermined the interests protected by the right
infringed. As these reasons make clear, individuals have an extremely high
expectation of privacy in their digital devices, much as they do in their
homes. The information contained in such devices is often extensive, private
and highly personal. Consequently, the impact of an unwarranted search of a
cell phone will tend to be very severe. Any such Charter breach must be
treated seriously.
[191]
In this case, the police searched text messages
and photographs. I have concluded that the fact that the phone in question was
a dumb phone, as opposed to one with greater data storage and computing
capacities, does not reduce the need to obtain a warrant. In practice, it may
be that the search of a dumb phone has the potential to reveal less personal
information than a more thorough search of a smart phone. However, even this
simple modern cell phone contained private text message conversations,
photographs, and call histories. Individuals reasonably expect that such highly
personal information will remain private. The breach of the privacy interest
was very serious.
[192]
This factor strongly favours the exclusion of
evidence.
(3)
Society’s Interest in an Adjudication on the
Merits
[193]
The third factor asks whether the truth-seeking
function of the criminal trial process would be better served by admission of
the evidence or by its exclusion.
[194]
There is no reason to be concerned about the
reliability of the evidence. Unlike an improperly obtained confession, for
example, nothing about the police conduct in this case undermined the
reliability of the messages or photographs retrieved from the phone. I agree
with the trial judge that the evidence was reliable and cogent.
[195]
However, even though armed robbery is a serious
offence, this case would not have been “gutted” by the exclusion of the cell
phone evidence, given the existence of witness testimony and physical evidence
― most particularly a firearm found in the “getaway” car that matched the
description of that used in the commission of the offence.
[196]
Consequently, this factor is of limited
assistance.
B.
Conclusion
[197]
In my opinion, the evidence should be excluded.
The state conduct was not particularly objectionable, given that the police
acted in good faith, and the evidence is reliable. However, the high privacy
interest individuals have in their electronic devices tips the balance in
favour of exclusion. Judicial pre-authorization is an essential bulwark
against unjustified infringements of individual privacy. Unwarranted searches
undermine the public’s confidence that personal communications, ideas and
beliefs will be protected on their digital devices. This is particularly
important given the increasing use and ubiquity of such technology. It is
difficult to conceive of a sphere of privacy more intensely personal ― or
indeed more pervasive ― than that found in an individual’s personal
digital device or computer. To admit evidence obtained in breach of this
particularly strong privacy interest, one of concern to an ever-increasing
majority of Canadians, would tend to bring the administration of justice into
disrepute.
[198]
Accordingly, I would allow the appeal.
Appeal
dismissed, LeBel, Abella and Karakatsanis JJ. dissenting.
Solicitors
for the appellant: Sam Goldstein, Toronto; Shelley Flam, Toronto.
Solicitor
for the respondent: Attorney General of Ontario, Toronto.
Solicitor
for the intervener the Director of Public Prosecutions of Canada: Public
Prosecution Service of Canada, Toronto.
Solicitor
for the intervener the Attorney General of Quebec: Attorney General of Quebec,
Québec.
Solicitor
for the intervener the Attorney General of Alberta: Attorney General of
Alberta, Calgary.
Solicitor
for the intervener the Samuelson-Glushko Canadian Internet Policy and Public
Interest Clinic: University of Ottawa, Ottawa.
Solicitors
for the intervener the British Columbia Civil Liberties Association: Ruby
Shiller Chan Hasan, Toronto.
Solicitors
for the intervener the Criminal Trial Lawyers’ Association (Alberta): Pringle,
Chivers, Sparks, Teskey, Edmonton; Gowling Lafleur Henderson, Ottawa.
Solicitors
for the intervener the Canadian Civil Liberties Association: Davies Ward
Phillips & Vineberg, Toronto.
Solicitor
for the intervener the Canadian Association of Chiefs of Police: City of
Vancouver, Vancouver.
Solicitors for the
intervener the Criminal Lawyers’ Association: Ursel Phillips Fellows
Hopkinson, Toronto.