Just how much does the Constitution protect your digital data? The Supreme Cpurt will now consider whether police can search the contents of a mobile phone without a warrant if the phone is on or around a person during an arrest.
California has asked the justices to refrain from a sweeping ruling, particularly one that upsets the old assumptions that authorities may search through the possessions of suspects at the time of their arrest. It is hard, the state argues, for judges to assess the implications of new and rapidly changing technologies.
The court would be recklessly modest if it followed California’s advice. Enough of the implications are discernable, even obvious, so that the justice can and should provide updated guidelines to police, lawyers and defendants.
They should start by discarding California’s lame argument that exploring the contents of a smartphone- a vast storehouse of digital information is similar to say, going through a suspect’s purse .The court has ruled that police don't violate the Fourth Amendment when they go through the wallet or porcketbook, of an arrestee without a warrant. But exploring one’s smartphone is more like entering his or her home. A smartphone may contain an arrestee’s reading history ,financial history, medical history and comprehensive records of recent correspondence. The development of “cloud computing.” meanwhile, has made that exploration so much the easier.
But the justices should not swallow California’s argument whole. New, disruptive technology sometimes demands novel applications of the Constitution’s protections. Orin Kerr, a law professor, compares the explosion and accessibility of digital information in the 21st century with the establishment of automobile use as a digital necessity of life in the 20th: The justices had to specify novel rules for the new personal domain of the passenger car then; they must sort out how the Fourth Amendment applies to digital information now.
26. The Supreme court, will work out whether, during an arrest, it is legitimate to
[A] search for suspects’ mobile phones without a warrant.
[B] check suspects’ phone contents without being authorized.
[C] prevent suspects from deleting their phone contents.
[D] prohibit suspects from using their mobile phones.
27. The author’s attitude toward California’s argument is one of
28. The author believes that exploring one’s phone content is comparable to
[A] getting into one’s residence.
[B] handing one’s historical records.
[C] scanning one’s correspondences.
[D] going through one’s wallet.
29. In Paragraph 5 and 6, the author shows his concern that
[A] principles are hard to be clearly expressed.
[B] the court is giving police less room for action.
[C] phones are used to store sensitive information.
[D] citizens’ privacy is not effective protected.
30.Orin Kerr’s comparison is quoted to indicate that
(A)the Constitution should be implemented flexibly.
(B)New technology requires reinterpretation of the Constitution.
(C)California’s argument violates principles of the Constitution.
(D)Principles of the Constitution should never be altered.