Will Apple’s FaceID Affect Your Rights?

You’re stopped by the police and your phone is taken. Can the cops just turn your phone around, point it at your face, and gain access to everything on the device?

That’s the scenario that has many people worrying since Apple announced last week that its new iPhones will allow users to unlock their phones by simply gazing into the front cameras of their devices. That new feature brings the company deeper into a legal debate that it helped kick off years ago with the introduction of a similar feature, TouchID, which uses fingerprints to unlock phones. The introduction of FaceID will likely spur the litigation of difficult questions concerning the Fourth Amendment right against unreasonable searches and seizures and the Fifth Amendment right against self-incrimination.

So what should people know about the legal implications of using this new feature?

Let’s take the easy part first. Under the Supreme Court’s 2014 ruling in Riley v. California, it is crystal clear what police must do in order to search a cellphone obtained during an arrest: In the words of Chief Justice John Roberts, they have to “get a warrant.” (For now, the government argues that the border is excepted from that requirement, but a new lawsuit filed by the ACLU and the Electronic Frontier Foundation seeks to change that.) The warrant requirement holds no matter how the government wants to search the phone, locked or unlocked: by thumbing around itself, by using sophisticated software that can guess your password and review the phone’s full contents, or by using your own fingerprint to unlock the phone. That requirement would also apply if the government wanted to unlock your phone via FaceID.

Moreover, there are limits to what even a warrant can do: In a recent opinion, a federal magistrate judge rejected a request for a warrant that sought to compel any person present at the time of a police search to use their fingerprints to unlock devices present at the scene, ruling that the demand lacked probable cause as to any particular person.

Now to the murkier part. Under the Fifth Amendment, an individual may not be “compelled in any criminal case to be a witness against himself.” This — the right against self-incrimination — is perhaps the most well-known of the guarantees listed in the Bill of Rights, featuring in countless films and episodes of Law & Order. But while the right is easy to dramatize, it is exceedingly difficult to apply, not least because it is a highly formal doctrine without a large amount of Supreme Court guidance.

The focus of Fifth Amendment self-incrimination is testimony. This is why most films or television shows will illustrate it by having a witness on the stand “take the Fifth” before a stunned judge and jury in order to avoid answering any questions that could reveal his own criminality. But the Fifth Amendment also protects against compelled self-incriminating “testimonial acts,” including so-called “acts of production.” At the most basic level, if a non-verbal act would tell the government something incriminating akin to the kind of testimony it could elicit from asking you questions — revealing the contents of your mind — then the introduction of it as evidence at trial it is barred by the Fifth Amendment.

In the classic paradigm, the compelled entry of a safe’s combination is testimonial, and thus protected against by the Fifth Amendment, because it requires the use of the contents of an individual’s mind. But generally speaking, the compelled production of a safe’s key is not testimonial, and is thus unprotected, because it involves a purely physical act.

But even where an act is deemed to be testimonial, it doesn’t necessarily get full Fifth Amendment protection. That’s because of the so-called “foregone conclusion” doctrine, under which the government can get around the self-incrimination right if it knows enough about the facts it will learn through an individual’s testimony. In other words, when the government already knows something, compelling you to produce it is not really “testimony” for self-incrimination purposes. For example, a criminal defendant might try to challenge the introduction of a compelled statement that “the body is buried on Green Bay Road,” arguing that the statement was incriminating and testimonial. But the government might respond that the testimony at issue — the location of the body, and the fact that the defendant knew it — were “foregone conclusions,” since the police already had eyewitness accounts of those facts.

But what this doctrine actually requires is also hotly debated. Some have argued that all law enforcement needs to know is that the individual owns or controls the device in question, justifying the compelled entry of the password. That runs contrary to a recent 11th Circuit case, which held that the government had to show with “reasonable particularity” what evidence would be found on the device. The ACLU and EFF have argued in recent amicus briefs in support of the latter view, in part to prevent government fishing expeditions for evidence, and because the privacy interests at stake support a stiffer legal standard.

When it comes to modern smartphones, courts have so far held that the protections of the Fifth Amendment vary depending on how you set up your device.

In a 2014 case out of a Virginia state court that seems to have set off the current debate, police obtained a search warrant to search a suspect’s home and to seize various items, including his smartphone that had TouchID enabled. The judge in that case drew a bright line: Under the Fifth Amendment, police could not force the suspect to communicate his passcode, but they could force him to use his fingerprint to unlock the device. The reason? Providing a fingerprint was “non-testimonial,” because it did not require the suspect to produce anything from his own mind. On the other hand, to give up your personal passcode is classically testimonial, since it comes from your head. If that dichotomy is correct, and future courts adhere to it, then FaceID presents simply a different version of that — meaning Fifth Amendment protection is lost when you use biometric “keys” to protect digital devices, including fingerprints or faceprints.

But it may not be so simple. First, there are good reasons to believe that the same Fifth Amendment protections should apply no matter how the government seeks to unlock your phone with your assistance. Earlier this year, a magistrate judge questioned whether old cases holding that biometric collections for pure identification purposes should apply to the new fingerprint readers, since they are used for purposes that go far beyond identification:

We do not believe that a simple analogy that equates the limited protection afforded a fingerprint used for identification purposes to forced fingerprinting to unlock an Apple electronic device that potentially contains some of the most intimate details of an individual’s life (and potentially provides direct access to contraband) is supported by Fifth Amendment jurisprudence.

Second, devices that not only lock data, but encrypt it (by transforming the 1s and 0s on a device into an incomprehensible mishmash that can be reversed only by entering the correct decryption key) present a distinct issue. In our recent briefs, the ACLU and EFF argued that forcing an individual to decrypt data on a digital device will always be testimonial, regardless of what the government already knows — akin to the government forcing her to translate into English a diary written in a personal secret language.

As you can see, this area of law is far from definitive. As law enforcement continues to exploit new features like TouchID and FaceID to gain access to devices, courts will have to grapple with these new realities, and how old cases about keys and combos remain relevant in a world where a device smaller than a deck of playing cards can hold a warehouse worth of personal papers.

But here’s the best summary we can offer: If you use a passcode to protect your device, you will sometimes have a Fifth Amendment right that prevents the government from forcing you to unlock (and decrypt) your device, depending on what the government already knows. Of course, your passcode should be strong, and you should enable a guess-limiting feature on your smartphone.

You should also enable Apple’s new feature allowing you to quickly disengage TouchID and FaceID to require a passcode, since if you use a biometric, the current trend suggests you could lose any shot at a Fifth Amendment argument. Though depending on how the law develops, that could change.

View comments (17)
Read the Terms of Use


I've had a theory about the fifth that contradicts the use in common debate.

The purpose is not too protect information that could incriminate you. Instead it's purpose is to protect you from punishment in case someone accuse you off knowing something you don't.

In terms of fingerprint or face you can be forced to present them, but once you do, you can't be accused of having presented a false face.

A pin in the other hand can be falsified or forgotten. The fifth protect against false accusations. Someone might believe you know where the bodies are buried, but that belief alone can't be the basis for punishing you if you refuse to tell where, simply because the belief may be wrong and would result you being considered guilty by accusation.

Same with pin, the accusation that you might know it alone should not punish you.

I do think that personal information should be protected by random search but i don't believe that there have ever been laws written to protect against it.


Providing a fingerprint was non-testimonial since it didn't require the suspect to produce anything from his own mind.
https://spanishto-english.com/ Spanish to English


Finally. The ACLU now answered my question of 2years I asked them. Can police use the same 100mile inside the USA border to search someone the way border police can without the 4th amendment rights? Thanks for finally answering.


A good example of a competent article, if I have something to compare, then only with this site https://192168ll.mobi/ . That's for such articles and it is worth going to the Internet

Carl Bowser

Suppose Apple modified their software so that it would require an additional password to access data or apps the phone owner wanted protected. It would amount to a second password whether or not the phone was opened by face recognition. The secondary password would be testimonial, thus protected by the fifth amendment.
Come on, Apple, help us out here!

gejala asma

GEJALA ASMA Biasanya sering muncul pada seseorang yang memiliki penyakit asma. GEJALA ASMA Ini Biasanya Ditandai Dengan Munculnya Gangguan Pada pernafasan. Tak Sedikit Penderita Yang Terganggu Dengan Munculnya GEJALA ASMA Ini. Maka dari itu jika anda ingin terbebas dari GEJALA ASMA, Anda Dapat Melakukan Pengobatan Yang Benar Benar Optimal. Pengobatan Yang Dilakukan Harus Benar Benar Ampuh Agar GEJALA ASMA Ini Benar Benar Terobati. Biasanya GEJALA ASMA dapat terjangkit pada siapapun dari berbagai usia. Tak sedikit GEJALA ASMA Yang Muncul Pada Pria maupun Wanita. Intinya GEJALA ASMA Ini Dapat Terjadi Pada Pria Maupun Wanita Diberbagai Usia. Untuk Itu Jangan Remehkan GEJALA ASMA. Metode Pengobatan Herbal Biasanya Menjadi Alternatif Dalam Penyembuhan GEJALA ASMA, Karena dengan pengobatan herbal GEJALA ASMA Ini Akan Terobati Tanpa Dengan Disertai Efek Samping Yang Berbahaya. Dengan Keunggulan Inilah Yang Membuat Pengobatan Herbal Menjadi Alternatif Dalam Mengobati GEJALA ASMA Secara Alami. Untuk Itu Atasi GEJALA ASMA Sekarang Juga Sebelum GEJALA ASMA Ini Menjadi semakin parah.


Herbal Medicines? Really?

despacito lyrics

The information you share is very useful. It is closely related to my work and has helped me grow. Thank you!
despacito lyrics ,
color switch

Bailey Shaw

This is definitely a very alarming situation because this can result in security breach and anyone can easily gain access to your phone. Essay Help UK


Interesting things you describe here. Împrumut pe termen lung


Stay Informed