What To Do If Border Police Ask To Search Your Phone
Know how much the law does—and doesn’t—protect your privacy rights.
Border phone searches are in the news a lot lately. Last month, a French scientist was allegedly blocked from coming to a conference in Houston after U.S. Customs and Border Protection (CBP) found statements against President Donald Trump on his phone. A few days later, Brown University doctor Rasha Alawieh was turned away at the airport after CBP allegedly found pro-Hezbollah images on her phone.
How does CBP have the power to rummage through phones so easily? After all, ordinary police can't just stop you on the street and search your phone without a warrant. But courts have recognized a border exemption to the Fourth Amendment, allowing the government to conduct routine anti-smuggling searches of travelers. Although some lower courts have weighed in on whether that exemption applies to personal electronic files, there's no definitive ruling yet on phone searches at the border.
Until the Supreme Court rules on the issue, CBP officers are mostly limited by the agency's own internal regulations. The regulations allow officers to conduct a "basic search" (flipping through the phone by hand) at their discretion, and require "reasonable suspicion" or a "national security concern" to conduct an "advanced search" with forensic phone hacking software such as Cellebrite. The regulations also restrict officers to searching what's already on the phone, not downloading new data, so phone searches should be conducted in airplane mode or otherwise disconnected from the internet.
Of course, an agency pinky-swearing not to violate your rights is not worth much in the way of practical protection. The Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) have both put out guides for protecting electronic privacy at the border. Reason spoke to Sophia Cope, senior staff attorney at the EFF, and Nathan Wessler, deputy director of the ACLU's Speech, Privacy, and Technology Project, about the nitty gritty of defending your data.
There are a few basic tips that people should know but often don't. The U.S. government cannot prevent Americans from reentering the country no matter what. Nor can it compel anyone to give up their passwords. (The cops can force you to open a Face ID or fingerprint lock, though.) And shutting down an iPhone makes it much harder to break into. Other aspects of border privacy require more careful consideration.
The bottom line? Prospective travelers "need to have a plan about how to protect their data, and what they are going to do if they're pulled into secondary inspection and asked to unlock their device," Cope says. "You cannot be in secondary inspection like, oh crap, what am I supposed to be doing? That's the most important thing. The second most important point is that one size doesn't fit all."
Know Your Risk Factors
U.S. citizens have the most power to refuse the government's demands for information. CBP can't stop Americans from coming back to their own country, but it can slow them down and physically separate them from their belongings. If you're an American citizen and you refuse to unlock your phone, CBP may hold you for longer—typically no more than a few hours—and seize your phone for a forensic scan.
"The government cannot compel you to provide or enter the password, but what they will do is say, if you don't give us the password, we're going to hold your phone until we can get into it ourselves," Wessler says.
Visa holders (and travelers from visa-free nationalities) are in a very different boat. CBP agents can decide on the spot whether or not a visitor is really "eligible" to enter the United States, and the agency claims that phone searches are a routine part of that process. The principle of "innocent until proven guilty" is flipped on its head for visitors; refusing to provide information can itself become a reason to deny you entry.
Legal permanent residents are in a gray area. In theory, a valid green card should give you the right to re-enter the country unless an immigration judge takes it away. "Prior to this version of the Trump administration, we would say that generally speaking, green card holders have the same rights as citizens to come back into the country," Cope says, but the Trump administration is now trying to flex its power to revoke green cards for "national security," as in the cases of Mahmoud Khalil and Yunseo Chung.
Beyond immigration status, certain people might attract more government attention. CBP has used the border search exception to help domestic authorities (including even the Food and Drug Administration) look into people they were already investigating. Travel history in certain countries, especially more frequent or longer trips, may also raise red flags.
Professionals who deal with confidential information—such as lawyers, businesspeople, doctors, and journalists—have to consider the security of their work product. The CBP regulations around medical and journalistic data are vague, stating only that they "shall be handled in accordance with any applicable federal law and CBP policy." The regulations similarly state that CBP will treat commercial data "as business confidential information and shall protect that information from unauthorized disclosure."
The protections for attorney-client privilege are a little stronger; CBP officers are required to bring in the agency's lawyers before searching potentially privileged data. However, the regulations also call for pretty intense questioning in the process: "The Officer shall seek clarification, if practicable in writing, from the individual asserting this privilege as to specific files, file types, folders, categories of files, attorney or client names, email addresses, phone numbers, or other particulars that may assist CBP in identifying privileged information."
Protect Your Data
If CBP escalates by seizing a device, then the data they can access is a matter of technical security measures. Users can increase the security of their devices by encrypting their hard drives, for example. (The latest version of the iPhone automatically encrypts its hard drive if idled.) Simply shutting down a device may make it harder to break encryption. Unfortunately, the government's abilities are somewhat unclear.
"The question that is impossible to answer from the outside," Wessler says, "is at any given moment, where are we in the cat-and-mouse game between Cellebrite and similar companies and Google and Apple and their operating systems?"
The best way to protect data is not to have it lying around. After all, "border authorities can only search things that you have on your devices at the border," Wessler adds. The trick is knowing how to make sure that data is actually inaccessible when you're crossing the border, and how to make sure you can get it back once you're done with your journey.
A simple solution is the good old burner phone. It might make sense to keep separate travel and home devices, and it's often possible to switch SIM cards between phones, so that both devices can be reached at the same phone number. The EFF guide for border privacy recommends the Google Chromebook as a good travel device, because the laptop is both cheap and designed to store most data on the cloud rather than locally.
In general, cloud storage is your friend. Services such as Google Drive and iCloud allow users to easily access their data via the internet without storing that data on the physical device itself. Again, CBP only searches devices that have been disconnected from the internet. It's possible to disconnect from cloud storage and delete local copies of the data before a journey, and then connect to cloud storage and download the data again afterwards.
However, there are a few important considerations. Data that is "deleted" from a device may still be there. Alawieh's allegedly incriminating photos, for example, were found in the "Recently Deleted" folder of her phone. (The iPhone keeps deleted photos in the bin for 30 days unless the user manually removes them.) Even clearing out the virtual trash bin "is not a guarantee at all that it will be safe from search, because deleting often means it just goes into unallocated space on the phone," Wessler warns.
The EFF guide includes a technical overview of how to securely delete data. The most dramatic measure is to perform a "factory reset" of your phone before crossing the border. However, crossing the border with an empty device can cause CBP agents to think you are hiding something. If you're a citizen, that suspicion may lead to more of a headache. If you're a visitor, CBP may decide to turn you away.
Be Practical
Some data may have to cross the border with you. "Maybe you won't have internet access, because you're going to be out on an expedition somewhere, and you really need data on your phone," Cope says. "It's not really reasonable for you to put a bunch of data on the cloud and wait there for two hours for it to download. There's lots of different factors that would implicate how people would decide."
On the other hand, making some information available could help to avoid more aggressive scrutiny. For example, journalists might want to delete their conversations with sources while keeping benign family group chats. "As a privacy advocate, I don't like that advice. In an ideal situation, you don't want the government to have access to anything, because even looking at text messages with your mom is a privacy invasion," Cope says. "But it is about a practical decision."
Another consideration is what happens on the other side of the journey. Canada, Britain, Australia, and New Zealand, which all share intelligence with the U.S. government under the Five Eyes program, have different border privacy policies. Under Australian law, travelers do not have to unlock their phones. Canadian authorities, like U.S. authorities, say they will seize a phone if a traveler refuses to unlock it. New Zealand imposes a $5,000 fine for failing to unlock a phone, and Britain considers refusing to unlock a phone for police to be a counterterrorism offense.
American citizens who have done nothing wrong might still hesitate to exercise their rights at the border, simply because of the obstacles that CBP can impose. Sitting in secondary inspection for two hours could cause a traveler to miss a connecting flight, and CBP seizing electronics can impose a major financial burden. Although CBP regulations state that electronics should only be held for five days, the agency has held on to phones for months, according to the ACLU guide.
Electronic search and seizure is especially stressful when the device belongs to someone else. Employers should have a plan for dealing with government searches of company data at the border, and "ideally back up their employees…to give people the right to say, this is my work laptop and I am not authorized to give you access because of the proprietary and confidential information on there," Cope says.
Finally, the government can simply disobey its own rules. In Alawieh's case, and the case of Venezuelans deported under the Alien Enemies Act, the Trump administration got around court orders by moving too fast for the courts to intervene. "We can say what's legal and what's not, but that doesn't seem to be stopping the current government from trying a lot of outrageous things," Wessler says.
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please to post comments
It's been a while since I was stopped by border police (the last time was in Canada, actually) but, I generally find that swearing at them very loudly in perfectly accented Spanish is a good way to de-escalate the situation.
The louder the better. Mix in some profanities.
there's a hilariously profane song the line guys at Taco Bell used to sing when I was a teenager if it will help everyone I can post the lyrics
I'm game. Please post the lyrics.
Rah! Rah! Rasca mi los huevos! Chupa me la verga! Tu mama mi perro. La la la la la la la (repeat)
We used to just say:
Con respecto de la información que dice que El Presidente tiene un tatuaje en sus genitales, queremos hacer una desmentida.
Solo queremos desmentir que su tatuaje dice: Prohibido subir o bajar con el vehículo en movimiento.
lol
Pro tip: Don't show up to the Canadian border as a half-Mexican driving a Mexican furniture truck, just because you finished your delivery to UP Michigan early and wanted to pop over for lunch and a LaBatt's. The mounties are going to want to look inside the truck even though you told them there was nothing inside.
Then, when they SEE that there's nothing inside, they get very confused. 'So, what's your business in Canada, eh?' 'We're not here for business, we just wanted to pop over to grab some poutine and good Canadian beer.'
'So you're saying you have no business in Canada?' 'Yes sir, that's correct.' 'Well, we're saying you have no business in Canada, too. Turn the truck around.'
Or just never leave the wonderful country that is America?
Here's another radical idea, don't do stuff against America; then it doesn't matter what the border cops see.
And after all, only two thirds of the USA lives within the 'border zone' of 100 miles.
Step 1 don't have an ms13 face tattoo
But he also had a Air Jordan tattoo, so he's innocent. Duh.
Don't get a face tattoo, period.
How is it people need to have this explained to them.
Seemed like a good idea at the time.
don't post hate from your phones and then come to America, stupids
"I lost my phone in a boating accident."
Okay. Now let's talk about that grenade launcher in your carry on bag.
Buy a burner for travel, problem solved.
I travel INTL a LOT, a burner works great. Plus if I lose my burner I don't care...
this. prepare, people! never take your phone to a murder and never bring your real phone to an ICE establishment
Use a custom lock screen app that when a different code is entered unlocks into a sandbox environment filled with border patrol cosplay porn.
Hand over a scrubbed and innocuous phone?
It's refreshing to see Reason editors take an adversarial tack with the government for a change. I've missed it in the last couple of years.
Well, nowadays the Reason comments section is given over mostly to authoritarian MAGA shitbags who would enjoy nothing more than a thorough cavity search up to Don Bongino's elbow. These sort of articles aren't really of interest to them.
"The government cannot compel you to provide or enter the password, but what they will do is say, if you don't give us the password, we're going to hold your phone until we can get into it ourselves," Wessler says.
What a world we live in. The government is still stupid, at least, since the cloud has been a concept for probably as long as many of their agents have been alive. Nobody is 'smuggling' data through border checkpoints on their phone. The whole 'internet' thing is pretty well established now.
Unless, of course, all the data that comes in internationally over the internet is somehow vetted and scanned without our knowledge or consent...
Oh, and of course SD cards exist government, you rascally retards.
I've always thought border phone or laptop searches were silly and unjustified for that reason. The justification for border controls are: collecting duties, keeping dangerous or restricted goods out and keeping dangerous or restricted people out. Searching phones contributes to none of those objectives because anything that can be smuggled on a phone can be sent in an encrypted file over the internet. Trying to control information at the border is completely futile.
control & recon are not the same
I see it as a violation of the 4A for US citizens to have to unlock their phones for random inspection by CBP. It's also unproductive for the reasons you laid out.
I also see the drunk-driving checkpoints as violations of our rights codified by the 4A. If someone is swerving or driving recklessly, then by all means conduct a stop. But forcing everyone into the checkpoint funnel without a reason for a stop is just wrong.
What's worse it that they will stop you if you turn or turn around to avoid the checkpoint.
They got you coming and going.
And I believe it's not an infraction to turn away from the checkpoint, as long as you don't violate and traffic laws in doing so. But turning around to avoid the checkpoint is viewed as guilt by the cops so they pull you over anyway.
I don't drive if I've had anything to drink. But if I were in a situation like that after having a couple drinks, possibly slightly over the limit, I'd definitely turn away from the checkpoint. If the cop's dashcam doesn't show me doing anything illegal or violating any traffic rules, the whole thing could potentially get thrown out if the reason for the initial stop is invalid. "fruit from the poisonous tree"
Yeah, that'll work, because cops, prosecutors, and judges are honest.
Don't be an idiot. I'm not in any way arguing that cops, prosecutors, and judges are honest. The opposite in fact. However, if your lawyer requests the dash cam footage and the cops claim it doesn't exist, which it does, you have a great way to get the case dropped, regardless of the dishonesty of the cops. It's not a guarantee, but you have better chances of that happening in this scenario, than if you just pull into the checkpoint and say, "yes, I've been drinking and am impaired."
The renobs that write for Reason still do not understand, or conveniently leave out, that non-citizens do not have the full array of rights that citizens have. Green card, legal resident, visa, whatever. If you are not a US citizen, do not expect to enjoy all the rights and privileges that citizens have, and act and speak accordingly. This is not difficult to understand, or an unreasonable ask.
I think the solution here is that all you criminals should just put your cellphones into condoms and swallow them.
Yeah but you cops sure love your cavity searches.
They just regard it as giving back to the LGBT Pedo community.
And if you're not a fag, it's kinda like LGBT Pedo in the classroom. Forced on you. For your own good.