Advertisement

Surrender Your Devices or Be Turned Away: Privacy Rights at the Border

  • Elizabeth J. EtheringtonEmail author
Conference paper
  • 747 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 589)

Abstract

Recent revelations of mass surveillance programs used by the National Security Agency has triggered a shift in concerns over the information that we carry in our portable electronic devices remaining private. The public is becoming more protective of their personal information and apprehensive regarding who collects, stores and uses it. One major area of concern is that of information being carried with international travelers becoming subjected to a search without a search and seizure warrant at our nation’s ports of entry. Under the Border Search Doctrine, found within our Fourth Amendment, agents have the right to search inbound travelers for contraband, which is generally considered reasonable for the state to do to protect its citizens. However, when this doctrine is applied to electronic devices, the amount of information that likely would be accessed is vast and variable, potentially triggering our Fourth Amendment protection. This article discusses the standards of privacy under the Fourth Amendment, its border search doctrine, issues surrounding self-incrimination, other challenges, and a possible legislative solution that could protect passengers’ information as it passes through a port of entry into the United States.

Keywords

Surveillance National security agency Homeland security Border patrol Privacy Fourth amendment Fifth amendment Self-incrimination Electronic device Cloud computing 

Notes

Acknowledgments

Special appreciations to Pablo Breuer for the constant sounding board and leading to trust my own mind; Joshua Rosenblatt for sending me feedback until the night before presentation; Ebrima Ceesay for his advice and convincing me to pursue publication; Zachariah Abraham for his swift red-ink edits, Barry Grant for all his support, and Patrick Preller and David Mabry for inspiring my interest in our privacy laws.

References

  1. 1.
    Breslow, J.M.: How edward snowden leaked “thousands” of NSA documents, 13 May 2014. Public Broadcasting Service: http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/how-edward-snowden-leaked-thousands-of-nsa-documents/
  2. 2.
    Chicago, T.U.: The Founder’s Constitution, Amenment IV, Document 2, vol. 5. Univeristy of Chicago, Chicago (2000). http://press-pubs.uchicago.edu/founders/documents/amendIVs2.html Google Scholar
  3. 3.
    Corbett, P.E.: The future if the fourth amendmend in a digital evidence context: where would the supreme court draw the electronic line at the international border? Miss. Law J. 18(5), 1263–1308 (2012)Google Scholar
  4. 4.
    Hurwitz, J., Bloor, R., Kaufman, M.: Cloud Computing for Dummies: HP Special Edition. Wiley Publishing Company, Indianapolis, Indiana (2010)Google Scholar
  5. 5.
    In re Grand Jury Subpoena to Sebastian Boucher, No. 2:03-mj-91, 2009 WL 424718 (United States District Court for the District of Vermont, 19 Feburary 2009)Google Scholar
  6. 6.
    Katz v. United States, 389 U.S. 347 (Supreme Court of the United States 1967)Google Scholar
  7. 7.
    Lotrionte, N.: The sky’s the limit: the border search doctrine and cloud computing. Brooklyn Law Rev. 78, 663–695 (2013)Google Scholar
  8. 8.
    McKnight, A.: Privacy rights left behind at the border: the exhaustive, exploratory searches effectuated in unites states v. cotterman. Brigh. Young Univ. Law Rev., 591–606 (2012)Google Scholar
  9. 9.
    Nadkarni, S.: Let’s have a look, shall we? a model for evaluating suspicionless border searches of portable electronic devices. UCLA Law Rev. 16, 148–194 (2013)Google Scholar
  10. 10.
    Smith v. Maryland, 442 U.S. 735 (Supreme Court of the United States 1979)Google Scholar
  11. 11.
    Sternstein, A.: Judge says border officials can search you laptop and cellphone, 31 December 2013. Nextgov: http://www.nextgov.com/defense/2013/12/judge-says-border-officials-can-search-your-laptop-and-cellphone/76130/
  12. 12.
    Summary H.R. 6651–112th Congress, Washington D.C, 12 December 2011–2012Google Scholar
  13. 13.
    Townsend, S.A.: Laptop Searches at the Border and Unites States v Cotterman. Boston Univ. Law Rev. 94, 1745–1779 (2014)Google Scholar
  14. 14.
    US v. Cotterman, 709 F.3d 952 (9th Circuit 2013)Google Scholar
  15. 15.
    Vijayan, J.: Justices let stand appeals court decision on border searches of laptops, 14 January 2014. Computer World: http://www.computerworld.com/s/article/9245368/Justices_let_stand_appeals_court_decision_on_border_searches_of_laptops
  16. 16.
    Winkowski, T.S., Kibble, K.C., Callahan, M.E.: Privacy impact assessment for the border searches of electronic devices. U.S. Department of Homeland Security (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of BaltimoreBaltimoreUSA

Personalised recommendations