{"id":16111,"date":"2017-04-05T08:51:42","date_gmt":"2017-04-05T12:51:42","guid":{"rendered":"http:\/\/www.megalextoria.com\/wordpress\/?p=16111"},"modified":"2017-04-05T08:51:42","modified_gmt":"2017-04-05T12:51:42","slug":"the-bill-of-rights-at-the-border-fourth-amendment-limits-on-searching-your-data-and-devices","status":"publish","type":"post","link":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/2017\/04\/05\/the-bill-of-rights-at-the-border-fourth-amendment-limits-on-searching-your-data-and-devices\/","title":{"rendered":"The Bill of Rights at the Border: Fourth Amendment Limits on Searching Your Data and Devices"},"content":{"rendered":"<p>More than <a href=\"https:\/\/qz.com\/898888\/the-trump-administration-is-using-a-misleading-travel-statistic-to-defend-its-immigration-order\/\">325,000 people<\/a> enter the United States via airports every day, with <a href=\"http:\/\/www.politifact.com\/truth-o-meter\/statements\/2016\/sep\/14\/donald-trump\/trump-says-1-million-legal-crossings-along-us-mexi\/\">hundreds of thousands more<\/a> crossing by land at the borders. Not only is that a lot of people, it\u2019s also a lot of computers, smartphones, and tablets riding along in our pockets, bags, and trunks.\u00a0 Unfortunately, the Fourth Amendment protections we enjoy inside the U.S. for our devices aren\u2019t always as strong when we\u2019re crossing borders\u2014and the <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/you-have-no-right-to-electronic-privacy-when-you-cross-the-us-border\">Department of Homeland Security takes advantage of it<\/a>. On the other hand, <a href=\"https:\/\/www.aclu.org\/other\/constitution-100-mile-border-zone\">the border is not a Constitution-free zone<\/a>. What are the limits to how and how much customs and immigrations officials can access our data?<\/p>\n<p>To help answer those questions, we\u2019re offering the second in our series of posts on the Constitution at the border, focusing this time on the Fourth Amendment. For Part 1 on the First Amendment, <a href=\"https:\/\/www.eff.org\/deeplinks\/2017\/03\/bill-rights-border-first-amendment-and-right-anonymous-speech\">click here<\/a>.<\/p>\n<h3>The Default Privacy Rule<\/h3>\n<p><center><br \/>\n<a href=\"https:\/\/www.linkbucks.com\/referral\/504781\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.megalextoria.com\/wordpress\/wp-content\/uploads\/2017\/04\/468_60link_bucks.gif\" width=\"468\" height=\"60\" border=\"0\"><\/a><br \/>\n<\/center><\/p>\n<p>The Fourth Amendment <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/547\/398\/opinion.html\">forbids \u201cunreasonable\u201d searches<\/a> and seizures by the government. In most circumstances, the Fourth Amendment requires that government agents obtain a warrant from a judge by presenting preliminary evidence establishing \u201c<a href=\"http:\/\/constitution.findlaw.com\/amendment4.html\">probable cause<\/a>\u201d to believe that the thing to be searched or seized likely contains evidence of illegal activity <i>before<\/i> the officer is authorized to search.<\/p>\n<h3>The Border Search Exception<\/h3>\n<p>Unfortunately, the Supreme Court has sanctioned a \u201cborder search exception\u201d to the probable cause warrant requirement on the theory that the government has an interest in protecting the \u201c<a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/473\/531\/case.html\">integrity of the border<\/a>\u201d by enforcing the <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/116\/616\/case.html\">immigration and customs laws<\/a>. As a result, \u201croutine\u201d searches at the border do not require a warrant or any individualized suspicion that the thing to be searched contains evidence of illegal activity.<b><\/b><\/p>\n<h3>The Exception to the Exception: \u201cNon-Routine\u201d Searches<\/h3>\n<p>But the border search exception is not without limits. As noted, this exception only applies to \u201c<a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/541\/149\/\">routine<\/a>\u201d searches, such as those of luggage or bags presented at the border. \u00a0\u201cNon-routine\u201d searches \u2013 such as searches that are \u201chighly intrusive\u201d and impact the \u201cdignity and privacy interests\u201d of individuals, or are carried out in a \u201cparticularly offensive manner\u201d \u2013 must meet a higher standard: individualized \u201c<a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/431\/606\/case.html\">reasonable suspicion<\/a>.\u201d In a nutshell, that means border agents must have specific and articulable facts suggesting that a particular person may be involved in criminal activity.<\/p>\n<p>For example, the Supreme Court held that <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/541\/149\/\">disassembling a gas tank<\/a> is \u201croutine\u201d and so a warrantless and suspicionless search is permitted. However, border agents cannot <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/473\/531\/case.html\">detain a traveler until they have defecated<\/a> to see if they are smuggling drugs in their digestive tract <i>unless<\/i> the agents have a \u201creasonable suspicion\u201d that the traveler is a drug mule.<\/p>\n<h3>Border Searches of Digital Devices<\/h3>\n<p>How does this general framework apply to digital devices and data at the border? <a href=\"https:\/\/www.cbp.gov\/sites\/default\/files\/documents\/search_authority_2.pdf\">Border agents argue<\/a> that the border search exception applies to digital searches.\u00a0 <a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/12\/law-enforcement-uses-border-search-exception-fourth-amendment-loophole\">We think they are wrong<\/a>.\u00a0 Given that digital devices like smartphones and laptops contain highly personal information and provide access to even more private information stored in the cloud, the border search exception should <i>not <\/i>apply.<\/p>\n<p>As Chief Justice Roberts recognized in a 2014 case, <i>Riley v. California:<\/i><\/p>\n<blockquote><p>Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans <a href=\"https:\/\/www.supremecourt.gov\/opinions\/13pdf\/13-132_8l9c.pdf\">the privacies of life<\/a>.<\/blockquote>\n<p>Snooping into such privacies is extraordinarily intrusive, not \u201croutine.\u201d Thus, when the government asserted the so-called \u201cincident to arrest\u201d exception to justify searching a cell phone without a warrant during or immediately after an arrest, the Supreme Court called foul.<\/p>\n<p>Why is the <i>Riley<\/i> decision important at the border? For one thing, the \u201cincident to arrest\u201d exception that the government tried to invoke is directly comparable to the <a href=\"https:\/\/supreme.justia.com\/cases\/federal\/us\/431\/606\/case.html\">border search exception<\/a>, because both are considered \u201ccategorical\u201d exemptions. Given that the intrusion is identical in both instances, the same privacy protections should apply.<\/p>\n<p>Moreover, with the ubiquity of cloud computing, a digital device serves as a portal to highly sensitive data, where the privacy interests are even more significant. Following <i>Riley<\/i>, we believe that <i>any<\/i> border search of a digital device or data in the cloud is unlawful unless border agents first obtain a warrant by showing, <i>to a judge,<\/i> <i>in advance<\/i>, that they have probable cause to believe the device (or cloud account) likely contains evidence of illegal activity.<\/p>\n<p>However, lower courts haven\u2019t quite caught up with <i>Riley<\/i>. \u00a0For example, the Ninth Circuit held that border agents only need reasonable suspicion of illegal activity before they could conduct a <a href=\"https:\/\/d3bsvxk93brmko.cloudfront.net\/datastore\/opinions\/2013\/03\/08\/09-10139.pdf\">non-routine <i>forensic<\/i> search<\/a> of a traveler\u2019s laptop, aided by sophisticated software. Even worse, the Ninth Circuit also held that a <i><a href=\"https:\/\/d3bsvxk93brmko.cloudfront.net\/datastore\/opinions\/2013\/03\/08\/09-10139.pdf\">manual search<\/a><\/i> of a digital device is \u201croutine\u201d and so a warrantless and suspicionless search is still \u201creasonable\u201d under the Fourth Amendment. Some courts have been even less protective. Last year a court in the <a href=\"https:\/\/casetext.com\/case\/united-states-v-feiten\">Eastern District of Michigan<\/a> upheld a computer-aided border search of a traveler\u2019s electronic devices that lasted several hours without reasonable suspicion.<\/p>\n<p>EFF is working hard to persuade courts (and border agents) to adopt the limits set forth in the <i>Riley <\/i>decision for border searches of cellphones and other digital devices. In the meantime, what should you do to protect your digital privacy?<\/p>\n<p>Much turns on your individual circumstances and personal risk assessment. The consequences for non-compliance with a command from a CBP agent to unlock a device will be different, for example, for a U.S. citizen versus a non-citizen. If you are a U.S. citizen, agents must let you enter the country eventually; they cannot detain you indefinitely. If you are a lawful permanent resident, agents might raise complicated questions about your continued status as a resident. If you are a foreign visitor, agents may deny you entry entirely.<\/p>\n<p>We recommend that everyone conduct their own <a href=\"https:\/\/www.eff.org\/files\/2015\/11\/24\/3mod_threat-modeling-ssd_9-3-15.pdf\">threat model<\/a> to determine what course of action to take at the border. Our in depth <a href=\"https:\/\/www.eff.org\/files\/2017\/03\/10\/digital-privacy-border-2017-guide3.10.17.pdf\">Border Search Whitepaper<\/a> offers you a spectrum of tools and practices that you may choose to use to protect your personal data from government intrusion. For a more general outline of potential practices, see our pocket guides to <a href=\"https:\/\/www.eff.org\/files\/2017\/03\/08\/border-privacy.pdf\">Knowing Your Rights<\/a> and <a href=\"https:\/\/www.eff.org\/document\/eff-border-search-pocket-guide\">Protecting Your Data<\/a> at the Border.<\/p>\n<p>And join EFF in calling for stronger Constitutional protection for your digital information <a href=\"https:\/\/act.eff.org\/action\/demand-border-agents-get-a-warrant-before-digital-searches\">by contacting Congress on this issue today<\/a>.<\/p>\n<p class=\"raindrops-press-this\">Source: <em><a href=\"https:\/\/www.eff.org\/deeplinks\/2017\/04\/bill-rights-border-fourth-amendment-limits-searching-your-data-and-devices\">The Bill of Rights at the Border: Fourth Amendment Limits on Searching Your Data and Devices | Electronic Frontier Foundation<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 325,000 people enter the United States via airports every day, with hundreds of thousands more crossing by land at the borders. Not only is that a lot of people, it\u2019s also a lot of computers, smartphones, and tablets riding along in our pockets, bags, and trunks.\u00a0 Unfortunately, the Fourth Amendment protections we enjoy inside the U.S. for our devices aren\u2019t always as strong when we\u2019re crossing borders\u2014and the Department of Homeland Security takes advantage of it. On the other hand, the border is not a Constitution-free zone. What are the limits to how and how much customs and immigrations officials can access our data? To help answer those questions, we\u2019re offering the second in our series of posts on the Constitution at the border, focusing this time on the Fourth Amendment. For Part 1 on the First Amendment, click here. The Default Privacy Rule The Fourth Amendment forbids \u201cunreasonable\u201d searches and seizures by the government. In most circumstances, the Fourth Amendment requires that government agents obtain a warrant from a judge by presenting preliminary evidence establishing \u201cprobable cause\u201d to believe that the thing to be searched or seized likely contains evidence of illegal activity before the officer is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[106],"class_list":["post-16111","post","type-post","status-publish","format-standard","hentry","category-news-and-politics","tag-4th-amendment"],"_links":{"self":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/16111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/comments?post=16111"}],"version-history":[{"count":0,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/16111\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/media?parent=16111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/categories?post=16111"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/tags?post=16111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}