2009 DHS Document Says Border Patrol Can Search/Copy The Contents Of Your Device Just Because It Wants To
from the all-about-that-privacy-you-won't-be-allowed dept
FOIA clearinghouse MuckRock has scored another revealing document, this time from Customs and Border Protection. As we're well aware, the US border isn't technically considered to be part of the United States, at least not as far as the Constitution is concerned. All bets are off, 4th (and others) Amendment-wise. If you're traveling with anything -- whether its a vehicle, suitcase or laptop -- expect it to be searched.
What MuckRock has obtained is the DHS's Privacy Impact Assessment of the CBP's search policies. The only thing seen of this near-mythical document to this point has been a two-page summary of the report's contents, released nearly three years after its border search policy went into effect.The assessment basically says privacy will be severely impacted… and not much else. To do otherwise is to open the borders to terrorists, illegal immigrants, drug runners, child porn traffickers... at least according to the talking points. If you're none of the above, you're not exempt from in-depth warrantless searches of your person and belongings, including laptops and other electronic devices.
Based upon little more than the opinion of a single US Customs and Border Patrol (CBP) officer, any device can be searched and its contents read. With approval from a supervisor, the device can be seized, its contents copied in full, or both.These opinions, also known as "gut feelings" and "mental coin tosses" (the latter extremely popular with the TSA's Behavioral Detection Officers), are all it takes to initiate a very intrusive search.
Part of this we can blame on the courts and their deference to national security fears.
Under DHS authorities to conduct border searches, travelers' electronic devices are equally subject to search as any other belongings because the information contained in them may be relevant to customs and immigration inspection processes and decisions. While the terms "merchandise" and "baggage" are used, the courts have interpreted border search authorities to extend to all of a traveler's belongings, including electronic devices and the information in such devices.Beyond the hunches that trigger warrantless searches of electronic devices, the CBP also has the authority to demand travelers translate foreign languages and/or decrypt files.
Demand for Assistance: During a border search, ICE and CBP have specific statutory authority to demand assistance from any person or entity. For searches of electronic devices, CBP or ICE may demand technical assistance, including translation or decryption or specific subject matter expertise that may be necessary to allow CBP or ICE to access or understand the detained information.In some cases, travelers will be notified that their device has been searched. In others, the CBP and ICE will withhold this information from the person who owns the searched device. This includes cases where the agents image the entire contents of the device in order to perform a search later. In fact, in most cases where this is done, the person is cut out of the informational loop.
Instead of detaining the electronic device, CBP or ICE may instead copy the contents of the electronic device for a more in-depth border search at a later time. For CBP, the decision to copy data contained on an electronic device requires supervisory approval. Copying may take place where CBP or ICE does not want to alert the traveler that he is under investigation; where facilities, lack of training, or other circumstances prevent CBP or ICE from performing the search at secondary inspection; or where the traveler is unwilling or is unable to assist, or it is not prudent to allow the traveler to assist in the search (such as providing a password to log on to a laptop).And, again, this sort of detainment/search can be triggered by nothing more than an agent's feelings about the person being vetted. And while a CBP officer may have to check with a supervisor before imaging a device, ICE agents are able to self-approve intrusive searches and seizures.
As federal criminal investigators, ICE Special Agents are empowered to make investigative decisions based on the particular facts and circumstances of each case. The decision to detain or seize electronic devices or detain, seize, or copy information therefrom is a typical decision a Special Agent makes as part of his or her basic law enforcement duties. However, although no additional permission is required at this stage, Special Agents must comply with precise timeframes and supervisory approvals at further stages throughout each border search.While there are oversight guidelines in force, they aren't set in motion until after the copying/searching has already been performed.
As the PIA notes later, the DHS's agencies don't care whether it's papers in a briefcase or the entirety of your digital life housed within a smartphone. Either way, it claims to have the right to search, seize and copy data without probable cause. Or so it did until recently.
The 9th Circuit Court's 2013 decision on border searches of electronic devices undercuts a lot of the assertions in this 2009 DHS document. Most importantly, the decision forces the government to stop pretending the contents of a laptop or cellphone are no different than the contents of a briefcase or suitcase. (h/t to Daniel Nazer for pointing out this superseding decision)
The amount of private information carried by international travelers was traditionally circumscribed by the size of the traveler’s luggage or automobile. That is no longer the case. Electronic devices are capable of storing warehouses full of information. The average 400-gigabyte laptop hard drive can store over 200 million pages—the equivalent of five floors of a typical academic library.... Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.
The nature of the contents of electronic devices differs from that of luggage as well. Laptop computers, iPads and the like are simultaneously offices and personal diaries. They contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails. This type of material implicates the Fourth Amendment’s specific guarantee of the people’s right to be secure in their “papers.”.... The express listing of papers “reflects the Founders’ deep concern with safeguarding the privacy of thoughts and ideas—what we might call freedom of conscience—from invasion by the government.”... These records are expected to be kept private and this expectation is “one that society is prepared to recognize as ‘reasonable.’”This decision partially restores the Fourth Amendment to the Constitution-free Zone -- at least the portion covered by the Ninth Circuit. The decision doesn't forbid these searches. It just holds them -- and the CBP/ICE -- to a higher standard than agents' hunches.
So, in all the principles (transparency, minimization, information safeguards) listed in the DHS's 2009 Privacy Impact Assessment of warrantless border searches, there's not a single one devoted to warrants, warrant requirements or establishing reasonable suspicion. It took a court to reach that obvious conclusion and it took a court's explanation as to why a laptop isn't a briefcase to force the CBP to stop behaving like a law unto itself in the Ninth's jurisdiction. A privacy impact assessment that doesn't mention Fourth Amendment implications is a waste of 50 sheets of paper.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: 4th amendment, border, dhs, download, laptops, privacy, search
Reader Comments
Subscribe: RSS
View by: Time | Thread
I honestly do not understand why you Americans don't really seem to care all that much when those leading(lording) over you ignore the laws they enforce at gunpoint on you. Your rights don't seem to be worth the paper they are written on considering those in charge keep ignoring them when they get in the way of their mad rush for power and wealth at the average citizens expense.
You criticize how things are and talk and maybe even protest a bit about it. But what has that accomplished? It is a sad day when the Arabs have more worldly respect than Americans because they took a stand against their corrupt leaders while most Americans I have seen are just apathetic and waiting for someone else to start an American spring as it were.
[ link to this | view in chronology ]
Re:
We can't fight them in the courts because everything is secret or national security.
We can't fight them in Congress because everyone is either bought by special interests or just doesn't care. And should we manage to get a few people who do care about the American people above money interest, they're thwarted by endless partisanship.
We're quickly running out of non-violent options here and the first person who takes up arms is going to be smeared up and down the country's media.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
bread and circuses...
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Three skipped meals away...
[ link to this | view in chronology ]
How about some tea?
Hint - it is much harder, when the opposed party shares the territory.
Yes, sometimes it ends up with a revolution; then the question becomes - is revolution possible in today's US? Or - does US differ from Russia or North Korea all that much?
Yes, in Russia they might just "disappear" you, in N.K. - you'd end up in a "happy camp" - but is it really morally worse from being completely ruined or take the "deal", since you can't afford to fight in court?
[ link to this | view in chronology ]
Re:
Or from any other point of possible entry, such as an airport. That only covers about 90% of the US population, though. The other 10% still have a constitution, so what's the problem?
/s
[ link to this | view in chronology ]
How is this the so-called greatest country on earth?
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
Welcome to the club. Murrica has been doing that to pretty much everyone outside the US forever. You should read what Clemens (Mark Twain) said about US imperialism more than a century ago (it's on Lew Rockwell's site).
Personally, I'm both sad and glad the US' gov't is treating its own citizens the way it's been treating us for so long. Perhaps it will convince enough of you that it's long passed time this abominable conduct should have ended. Your gov't is not under control by you. It's long ago been taken over by special interest tyranical fascists. It's amazing they've managed to get away with it for so long. I expected far better from you "Don't tread on me!" patriots when I was younger.
[ link to this | view in chronology ]
looking for?
[ link to this | view in chronology ]
lol...
oh my f****** god are these ppl morons, they forgot a bunch ...
does anyone want to ring off all of the talking points they missed?
[ link to this | view in chronology ]
Of course, I have to record it all other was I get the death penalty unlike the asshole who's violating me...
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Rights
With some difficulty Muriel spelt it out.
"It says,
she announced
finally.
Curiously enough, Clover had not remembered that the Constitution mentioned borders; but as it was there on the wall, it must have done so.
And Squealer, who happened to be passing at this moment, attended by two or three dogs, was able to put the whole matter in its proper perspective.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
giant pen.is sale
[ link to this | view in chronology ]
[ link to this | view in chronology ]
I wrote a paper about this called "Border Confidential: Why Searches of Laptop Computers at the Border Should Require Reasonable Suspicion," which you can find here: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1469292
This article argues that laptop border searches are intrusive and should require, at a minimum, reasonable suspicion. If you want to learn about the background of the Fourth Amendment during border searches, the article reviews the case law and reasoning fairly in-depth.
I had wanted to write "searches of laptops at the border are like strip searches of the mind," but my advisor thought it would be too polemical. Lol. While I think at the time she was correct, I wish I had gotten that phrase into it.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Backup and wipe
It may arouse suspicion, but there will be less chance your data ends up in government databases. It's truly sad that circumstances would be such that one would have to suggest the above option, being that the US is supposed to be the "Land of the Free."
[ link to this | view in chronology ]
Re: Backup and wipe
[ link to this | view in chronology ]
Re: Re: Backup and wipe
I suppose that you wouldn't mind buying one for anyone who asked then, huh? Where can I pick mine up?
[ link to this | view in chronology ]
What is to differentiate a law enforcement agency from a criminal agency...
Once they cease acknowledging that the people on whom they infringe have a right (if qualified) to carry on unmolested and unspoiled, the legitimacy of the agency, no matter its original intent, ceases.
At that point it becomes and should be recognized as a criminal organization malicious to the people.
That would include the DHS and any agency that follows its policies. No recognition of the fourth amendment (or any human right), no legitimacy.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
All of the bad, none of the good
[ link to this | view in chronology ]
techwise, how quick can they do this.
If I copy several thousands of files over USB (2.0, I guess), it can take several eternities.
And not a quick "Let Officer Bob handle your devices for 5 minutes while you answer these 20 questions".
If it takes several hours to copy stuff, you won't get your devices back at an ordinary border stop.
[ link to this | view in chronology ]
Re: techwise, how quick can they do this.
[ link to this | view in chronology ]
Then what?
I'm assuming no.
Once they copy your drive, they can share it with anyone, foreign or domestic? Government or private? Can they hold it forever? Think of the corporate espionage opportunities!
[ link to this | view in chronology ]
The obvious strategy
2) CBP takes a copy of the entire thing.
3) Bust them for massive copyright infringement, since, as the last few years have shown clearly, copyright law trumps the US Constitution.
[ link to this | view in chronology ]