Skip to main content

Surrender Your Devices or Be Turned Away: Privacy Rights at the Border

  • Conference paper
  • First Online:
Cyber Security (CSS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 589))

Included in the following conference series:

  • 886 Accesses

Abstract

Recent revelations of mass surveillance programs used by the National Security Agency has triggered a shift in concerns over the information that we carry in our portable electronic devices remaining private. The public is becoming more protective of their personal information and apprehensive regarding who collects, stores and uses it. One major area of concern is that of information being carried with international travelers becoming subjected to a search without a search and seizure warrant at our nation’s ports of entry. Under the Border Search Doctrine, found within our Fourth Amendment, agents have the right to search inbound travelers for contraband, which is generally considered reasonable for the state to do to protect its citizens. However, when this doctrine is applied to electronic devices, the amount of information that likely would be accessed is vast and variable, potentially triggering our Fourth Amendment protection. This article discusses the standards of privacy under the Fourth Amendment, its border search doctrine, issues surrounding self-incrimination, other challenges, and a possible legislative solution that could protect passengers’ information as it passes through a port of entry into the United States.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Breslow, J.M.: How edward snowden leaked “thousands” of NSA documents, 13 May 2014. Public Broadcasting Service: http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/how-edward-snowden-leaked-thousands-of-nsa-documents/

  2. Chicago, T.U.: The Founder’s Constitution, Amenment IV, Document 2, vol. 5. Univeristy of Chicago, Chicago (2000). http://press-pubs.uchicago.edu/founders/documents/amendIVs2.html

    Google Scholar 

  3. Corbett, P.E.: The future if the fourth amendmend in a digital evidence context: where would the supreme court draw the electronic line at the international border? Miss. Law J. 18(5), 1263–1308 (2012)

    Google Scholar 

  4. Hurwitz, J., Bloor, R., Kaufman, M.: Cloud Computing for Dummies: HP Special Edition. Wiley Publishing Company, Indianapolis, Indiana (2010)

    Google Scholar 

  5. In re Grand Jury Subpoena to Sebastian Boucher, No. 2:03-mj-91, 2009 WL 424718 (United States District Court for the District of Vermont, 19 Feburary 2009)

    Google Scholar 

  6. Katz v. United States, 389 U.S. 347 (Supreme Court of the United States 1967)

    Google Scholar 

  7. Lotrionte, N.: The sky’s the limit: the border search doctrine and cloud computing. Brooklyn Law Rev. 78, 663–695 (2013)

    Google Scholar 

  8. McKnight, A.: Privacy rights left behind at the border: the exhaustive, exploratory searches effectuated in unites states v. cotterman. Brigh. Young Univ. Law Rev., 591–606 (2012)

    Google Scholar 

  9. Nadkarni, S.: Let’s have a look, shall we? a model for evaluating suspicionless border searches of portable electronic devices. UCLA Law Rev. 16, 148–194 (2013)

    Google Scholar 

  10. Smith v. Maryland, 442 U.S. 735 (Supreme Court of the United States 1979)

    Google Scholar 

  11. Sternstein, A.: Judge says border officials can search you laptop and cellphone, 31 December 2013. Nextgov: http://www.nextgov.com/defense/2013/12/judge-says-border-officials-can-search-your-laptop-and-cellphone/76130/

  12. Summary H.R. 6651–112th Congress, Washington D.C, 12 December 2011–2012

    Google Scholar 

  13. Townsend, S.A.: Laptop Searches at the Border and Unites States v Cotterman. Boston Univ. Law Rev. 94, 1745–1779 (2014)

    Google Scholar 

  14. US v. Cotterman, 709 F.3d 952 (9th Circuit 2013)

    Google Scholar 

  15. Vijayan, J.: Justices let stand appeals court decision on border searches of laptops, 14 January 2014. Computer World: http://www.computerworld.com/s/article/9245368/Justices_let_stand_appeals_court_decision_on_border_searches_of_laptops

  16. Winkowski, T.S., Kibble, K.C., Callahan, M.E.: Privacy impact assessment for the border searches of electronic devices. U.S. Department of Homeland Security (2009)

    Google Scholar 

Download references

Acknowledgments

Special appreciations to Pablo Breuer for the constant sounding board and leading to trust my own mind; Joshua Rosenblatt for sending me feedback until the night before presentation; Ebrima Ceesay for his advice and convincing me to pursue publication; Zachariah Abraham for his swift red-ink edits, Barry Grant for all his support, and Patrick Preller and David Mabry for inspiring my interest in our privacy laws.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elizabeth J. Etherington .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Etherington, E.J. (2016). Surrender Your Devices or Be Turned Away: Privacy Rights at the Border. In: Haltinner, K., Sarathchandra, D., Alves-Foss, J., Chang, K., Conte de Leon, D., Song, J. (eds) Cyber Security. CSS 2015. Communications in Computer and Information Science, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-319-28313-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28313-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28312-8

  • Online ISBN: 978-3-319-28313-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics