Can The Police Search Your Phone In The UK?

Your phone holds more personal information than your wallet — and yes, in the UK, the police can legally access it under certain conditions. But it’s not as simple as “they can just take it”. Here's how it actually works — legally, technically, and practically.

This article breaks it down precisely, using UK law, verifiable forensic capabilities, and recent platform changes.


Can the Police Legally Search Your Mobile Device Without Arresting You?

The answer is no, not under normal stop and search powers.

Under Section 1 of the Police and Criminal Evidence Act 1984 (PACE), an officer can search you and your possessions in a public place if they have reasonable grounds to suspect you’re carrying stolen goods, offensive weapons, or prohibited articles.

However, legal precedent is clear: search powers under PACE do not authorise access to digital content unless further statutory powers are triggered.

Case reference: R (Bridges) v Chief Constable of South Wales Police [2020] EWCA Civ 1058 highlighted the elevated privacy expectations attached to digital data under Article 8 of the European Convention on Human Rights.

Unless you’re arrested or specific legislation applies, police cannot compel you to unlock your phone, disclose your passcode, or permit content access.


Can the Police Access Your Mobile Device If You Are Arrested?

Yes, they can seize it. Under Section 19 of PACE 1984:

"A constable may seize anything… if he has reasonable grounds for believing… that it is evidence… and that it is necessary to seize it to prevent it being concealed, lost, altered or destroyed." — PACE 1984, Section 19(2)

And under Section 19(4):

"[The constable] may require any information stored in electronic form… to be produced in a form which is visible and legible."

So in practice:

  • Police can seize your phone following arrest.

  • If the device is unlocked or data is otherwise accessible, they may lawfully view and extract it.

  • They can attempt forensic access without your cooperation.

  • But they cannot force you to hand over a passcode unless lawfully served with a Section 49 notice under the Regulation of Investigatory Powers Act 2000 (RIPA).

“A person to whom a Section 49 notice has been given is guilty of an offence if he fails to comply.” — RIPA 2000, Section 53(1)

Penalties for non-compliance:

  • Up to 6 months' imprisonment on summary conviction or 2 years on indictment.

  • Up to 5 years where national security or child indecency is involved. — RIPA 2000, Section 53(5A)


Can Police Force You To Unlock Your Device?

Yes, but only under Section 49 of the Regulation of Investigatory Powers Act 2000 (RIPA).

This provision enables certain authorities to issue a decryption notice requiring you to disclose a password or cryptographic key.

"A person is guilty of an offence if he fails to comply with a Section 49 notice." — RIPA 2000, Section 53(1)

Conditions that must be satisfied for a valid Section 49 notice:

  1. The individual has, or had, possession or control of the protected information.

  2. The data was lawfully obtained or lawfully seized.

  3. The notice is approved by a judge, senior officer, or designated person under RIPA 2000, Section 49(5).

  4. Disclosure is necessary and proportionate, typically in connection with the prevention or detection of serious crime.

“The person granting permission shall not do so unless satisfied that the notice is necessary as mentioned in Section 49(2), and that the requirements of Section 49(3) are satisfied.” — RIPA 2000, Section 49(4)

Without a Section 49 notice, you are not legally required to disclose a PIN, password, or biometric unlock.


✈️ What if You’re at the Airport?

Yes, different legislation appliesSchedule 7 of the Terrorism Act 2000.

Under this law, police and border officers at UK ports and airports can:

  • Detain and question you without suspicion.

  • Search and seize mobile devices.

  • Demand access to information.

“A person commits an offence if he… (a) wilfully fails to comply… or (b) wilfully obstructs a search or examination.” — Terrorism Act 2000, Schedule 7, Paragraph 18

Penalty: Up to 3 months’ imprisonment, a fine, or both.


What Forensic Tools Are Used To Access Mobile Devices?

UK police forces use forensic platforms including Cellebrite UFED, GrayKey, and MSAB XRY. These tools exploit known vulnerabilities in iOS and Android operating systems.

Notable exploits and techniques:

  • Checkm8: A bootrom exploit used against A5–A11 iPhones (iPhone 5s to iPhone X).

  • CVE-2021-30883 / CVE-2023-32434: Kernel privilege escalation bugs in iOS.

  • Dirty Pipe (CVE-2022-0847): A high-impact Linux vulnerability affecting many Android devices.

  • USB Restricted Mode and DFU/Recovery bypass techniques.

These tools can:

  • Bypass weak device lock protections.

  • Extract messages, call logs, photos, app data.

  • Clone partitions or file systems.

But cannot reliably access:

  • iPhones running iOS 17.4+, now hardened with Secure Enclave updates.

  • Devices secured with strong alphanumeric passcodes.

  • iCloud data with Advanced Data Protection (ADP)Note: ADP is currently disabled for new UK Apple IDs due to government demands.

Cellebrite product documentation amongst other publicly available sources confirms iOS 17.4+ devices are listed as 'In Research'.

This means forensic engineers have no confirmed method for full extraction from these devices — even in AFU state — as of mid-2025.

An additional reason to keep your devices on the latest firmware!


Device Access States and Forensic Implications.

Understanding how secure your phone is depends on the state it's in when seized:

  • BFU (Before First Unlock): Phone is encrypted at rest. Most secure. No data access unless extreme vulnerabilities exist.

  • AFU (After First Unlock): Some decrypted data persists in RAM. Partial access may be possible.

  • Live Unlocked: Phone is unlocked during seizure. Maximum risk — full logical or physical extraction often possible.

Cellebrite, GrayKey, and similar tools are most effective when devices are in AFU or unlocked states.


What About Android?

While this guide focuses on iOS due to its widespread use, Android phones are also subject to forensic targeting.

Modern Android versions (Android 11 and above) feature File-Based Encryption (FBE) and scoped storage, which offer strong protection when locked. However:

  • Devices with outdated firmware or no Secure Boot are more vulnerable.

  • Exploits like CVE-2022-0847 (Dirty Pipe) can grant root access on affected kernels.

  • Some manufacturers still allow bootloader unlocking, making rooted access easier.

Avoiding USB debugging, enabling secure lock screens, and keeping firmware updated is critical for Android users.


What Can You Do To Protect Your Data?

  1. Use a strong alphanumeric passcode — longer than 6 digits.

  2. Restart your phone frequently — this returns the device to BFU state.

  3. Disable biometric unlock when travelling or under risk of compelled access.

  4. Turn off “Face ID/Touch ID” for lock screen (Settings > Face ID & Passcode).

  5. Keep your OS fully updated — patched devices resist forensic access.

  6. For Android: disable developer options and use verified boot.


Thanks for reading — I hope this article was informative and useful.

Please note that while every effort has been made to ensure the accuracy of the legal and technical information provided, this content is for general informational purposes only and should not be relied upon as legal advice.

Laws and policies may change, and individual circumstances can vary. If you are facing a legal situation or have concerns about your rights, you should seek advice from a qualified legal professional.

3
Subscribe to my newsletter

Read articles from Ciaran Doherty, AfCIIS, MBCS directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ciaran Doherty, AfCIIS, MBCS
Ciaran Doherty, AfCIIS, MBCS