Abstract
Recent revelations of mass surveillance programs used by the National Security Agency has triggered a shift in concerns over the information that we carry in our portable electronic devices remaining private. The public is becoming more protective of their personal information and apprehensive regarding who collects, stores and uses it. One major area of concern is that of information being carried with international travelers becoming subjected to a search without a search and seizure warrant at our nation’s ports of entry. Under the Border Search Doctrine, found within our Fourth Amendment, agents have the right to search inbound travelers for contraband, which is generally considered reasonable for the state to do to protect its citizens. However, when this doctrine is applied to electronic devices, the amount of information that likely would be accessed is vast and variable, potentially triggering our Fourth Amendment protection. This article discusses the standards of privacy under the Fourth Amendment, its border search doctrine, issues surrounding self-incrimination, other challenges, and a possible legislative solution that could protect passengers’ information as it passes through a port of entry into the United States.
Similar content being viewed by others
References
Breslow, J.M.: How edward snowden leaked “thousands” of NSA documents, 13 May 2014. Public Broadcasting Service: http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/how-edward-snowden-leaked-thousands-of-nsa-documents/
Chicago, T.U.: The Founder’s Constitution, Amenment IV, Document 2, vol. 5. Univeristy of Chicago, Chicago (2000). http://press-pubs.uchicago.edu/founders/documents/amendIVs2.html
Corbett, P.E.: The future if the fourth amendmend in a digital evidence context: where would the supreme court draw the electronic line at the international border? Miss. Law J. 18(5), 1263–1308 (2012)
Hurwitz, J., Bloor, R., Kaufman, M.: Cloud Computing for Dummies: HP Special Edition. Wiley Publishing Company, Indianapolis, Indiana (2010)
In re Grand Jury Subpoena to Sebastian Boucher, No. 2:03-mj-91, 2009 WL 424718 (United States District Court for the District of Vermont, 19 Feburary 2009)
Katz v. United States, 389 U.S. 347 (Supreme Court of the United States 1967)
Lotrionte, N.: The sky’s the limit: the border search doctrine and cloud computing. Brooklyn Law Rev. 78, 663–695 (2013)
McKnight, A.: Privacy rights left behind at the border: the exhaustive, exploratory searches effectuated in unites states v. cotterman. Brigh. Young Univ. Law Rev., 591–606 (2012)
Nadkarni, S.: Let’s have a look, shall we? a model for evaluating suspicionless border searches of portable electronic devices. UCLA Law Rev. 16, 148–194 (2013)
Smith v. Maryland, 442 U.S. 735 (Supreme Court of the United States 1979)
Sternstein, A.: Judge says border officials can search you laptop and cellphone, 31 December 2013. Nextgov: http://www.nextgov.com/defense/2013/12/judge-says-border-officials-can-search-your-laptop-and-cellphone/76130/
Summary H.R. 6651–112th Congress, Washington D.C, 12 December 2011–2012
Townsend, S.A.: Laptop Searches at the Border and Unites States v Cotterman. Boston Univ. Law Rev. 94, 1745–1779 (2014)
US v. Cotterman, 709 F.3d 952 (9th Circuit 2013)
Vijayan, J.: Justices let stand appeals court decision on border searches of laptops, 14 January 2014. Computer World: http://www.computerworld.com/s/article/9245368/Justices_let_stand_appeals_court_decision_on_border_searches_of_laptops
Winkowski, T.S., Kibble, K.C., Callahan, M.E.: Privacy impact assessment for the border searches of electronic devices. U.S. Department of Homeland Security (2009)
Acknowledgments
Special appreciations to Pablo Breuer for the constant sounding board and leading to trust my own mind; Joshua Rosenblatt for sending me feedback until the night before presentation; Ebrima Ceesay for his advice and convincing me to pursue publication; Zachariah Abraham for his swift red-ink edits, Barry Grant for all his support, and Patrick Preller and David Mabry for inspiring my interest in our privacy laws.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Etherington, E.J. (2016). Surrender Your Devices or Be Turned Away: Privacy Rights at the Border. In: Haltinner, K., Sarathchandra, D., Alves-Foss, J., Chang, K., Conte de Leon, D., Song, J. (eds) Cyber Security. CSS 2015. Communications in Computer and Information Science, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-319-28313-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-28313-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28312-8
Online ISBN: 978-3-319-28313-5
eBook Packages: Computer ScienceComputer Science (R0)