Fifth Circuit Says Law Enforcement Doesn’t Need Warrants To Search Phones At The Border
from the never-mind-the-precedent dept
In 2014, the Supreme Court made it clear: phone searches require warrants. While it did note the case involved a search “incident to an arrest,” the precedent was undeniable. If a phone search attached to an arrest requires a warrant, it would logically follow that any phone search by law enforcement — even those not subsequent to an arrest — requires a warrant.
Since then, multiple federal courts have come to the opposite conclusion in cases involving searches of phones at borders or international airports. According to these judges, the Riley decision simply doesn’t apply when border security is in play. And it doesn’t matter whether the searched device belongs to an American citizen or a resident of a foreign country.
The law shouldn’t be unsettled, but it is. There’s no consensus at the appellate level. Nor is there one at the lower levels. All we have is a lack of clarity to work with. One federal judge (Jed Rakoff) said warrants are needed for “some” border phone searches — specifically “forensic” searches in which the government makes itself a copy of all data on a person’s phone.
The Fourth Circuit Appeals Court also made a limited finding in favor of Riley’s warrant requirement, stating that border law enforcement officers must have at least articulable suspicion to engage in forensic searches. That’s still a long way from probable cause, but it’s more than the “nothing at all” standard CBP and Border Patrol officers have been held to.
The Seventh Circuit had a chance to set precedent in another border device search case, but instead chose to save the question for a later day, leaving the “because border security” rationale for warrantless searches undisturbed.
This indecision has led to a steady increase in border device searches, driven by the ubiquity of smartphones and no one at the judicial level willing to decisively tell border officers a warrant is needed.
Texas immigration lawyer Adam Malik has given the Fifth Circuit a chance to set precedent more aligned with the Supreme Court’s 2014 Riley decision. Unfortunately, the Fifth Circuit has decided a forensic search of Malik’s device (which was held by the CBP for three weeks) isn’t a violation of the Fourth Amendment. (via FourthAmendment.com)
Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.
In response to Mr. Malik’s assertion of privilege, Officer Sullivan informed Mr. Malik that DHS was seizing the iPhone and that the digital contents would be searched. Officer Sullivan did not disconnect the iPhone from the internet or the communications network. He failed to take action that would protect the iPhone from accessing the internet or a communications network. Officer Sullivan ordered Mr. Malik to leave the deferred inspection area without the iPhone while the iPhone still was connected to the internet and a communications network.
Neither Officer Sullivan nor any other employee of Defendants asked Mr. Malik to disable connectivity of the iPhone to the internet or to any network. Had Officer Sullivan or any employee of Defendants offered to permit Mr. Malik to place the iPhone in airplane mode upon or after seizure of the iPhone, Mr. Malik would have done so immediately.
On top of not preventing the phone from continuing to collect data and communications, the DHS held on to Malik’s phone for five months. According to this, from the Fifth Circuit’s decision [PDF], part of that time was given over to the government’s efforts to avoid accessing privileged information.
The phone’s passcode feature prevented the border officers from accessing the phone, and thus from searching it, so they sent it to a forensics lab. The lab bypassed the phone’s security features, extracted the phone’s data, and returned the phone and the data to DHS. All of that took about three months. DHS then used a “filter team” to screen the extracted data for any privileged materials. That took about two more months. Once the filter team had finished, they provided the border officers in Dallas with “two thumb drives . . . consisting of the data that the filter team determined [the officers] were authorized to search.” DHS then conducted a border search of that data, and DHS returned the phone to Malik on May 21, 2021.
What’s not explained here is what the DHS was searching for. That it has the power to engage in warrantless searches of devices doesn’t automatically create reasons for it to do so. Very little was explained to Malik, other than that the officers could do this and, therefore, they were going to do this. All of this happened despite Malik being a government-approved member of the CBP’s Global Entry Trusted Traveler Program, which should have seen him subjected to less scrutiny when crossing borders, rather than what he was actually subjected to.
Following some hard questions posed to the DHS by Senator Ron Wyden, Malik sought to obtain more information to use in his lawsuit against the agency.
Discovery closed on February 11, 2022. Malik moved to reopen discovery a few weeks later, citing a public letter that United States Senator Ron Wyden sent to DHS’s Inspector General. Among other things, the letter alleges that DHS conducted “bulk surveillance of Americans’ financial records” by collecting troves of “transaction data” from Western Union. While the letter asks DHS to investigate these allegations, it does not address individual border searches, phone records, decryption, or DHS’s data-retention policies. The district court denied Malik’s motion.
The court denied this motion. Then it decided in favor of the DHS, ruling it had not violated Malik’s rights with this search of his phone.
Unfortunately, the Fifth Circuit Appeals Court (which splits the US-Mexico border with the Ninth Circuit) agrees with the lower court. No rights violation here, not when border security is on the line.
Malik argues that we should extend Riley v. California to border searches. Yet, for “[routine] cell phone searches at the border, our sister circuits have uniformly held that Riley does not require either a warrant or reasonable suspicion.” We have held the same. Even for non-routine searches, our sister circuit “have differed only as to whether reasonable suspicion is required.” We are not aware of any circuit court that has extended Riley’s warrant requirement to the border.
“Ordinarily, we would expect a party encouraging us to adopt a new constitutional [theory] to convincingly distinguish adverse authorities” and “to discuss the contours of the doctrine [he] wishes us to adopt. Malik has not done any of that. He has not even attempted to argue that the search was anything other than routine. He also has not discussed or analyzed Riley at any length, nor has he addressed the fact that “[e]very circuit that has faced this question has agreed that Riley does not mandate a warrant requirement for border searches of electronic devices, whether basic or advanced.
Instead, Malik has asked us to “intervene” and hold “that a judicial warrant is required at this time for the search of an attorney’s confidential client files and communications at the border.” Malik’s request for our “intervention” is itself a tacit concession that our precedent does not currently require a warrant for cell-phone searches at the border. We express no view on how the border-search exception may develop or be clarified in future cases, but we do expressly decline to address it further here.
So, like the Seventh Circuit, the Fifth Circuit decides analyzing Riley in terms of border searches is a question for another day. And, by passing on this opportunity, it ensures the next time someone asks the same question, it will be able to refer to its previous punt to kick the constitutional can further down the road.
That being said, the lawsuit isn’t entirely dead. Malik also wants to ensure the DHS destroys all the data it pulled from his phone, which includes plenty of privileged material. Not only were there attorney-client communications, but likely information dealing with ongoing immigration litigation against the government — work product that is likewise shielded from government snooping.
The Fifth Circuit agrees Malik is right to demand this form of expungement and the DHS is wrong to refuse to destroy this seized data unless Malik drops his lawsuit. (All emphasis in the original.)
In the district court, DHS argued that “the information is being retained only because Malik requested a litigation hold,” and that Malik cannot not rely on this self-inflicted injury to show standing. And, on appeal, DHS has represented that it will “destroy the remaining data in its possession and will be happy to provide an appropriate certification to Malik that all data in the government’s possession has been destroyed and that no data was transferred to any other governmental or nongovernmental entity or person” as soon as these “proceedings” conclude. DHS made similar representations to the district court. In other words, DHS argues that this lawsuit is the only obstacle separating Malik from the expungement that he seeks.
We do not agree that Malik’s injury is self-inflicted. The injury is that DHS still possesses privileged information that it unlawfully seized from his phone. Malik did not volunteer that data to DHS, and he has no control over how DHS handles it. That is why Malik came to court. DHS argues that it will delete the data if Malik non-suits this case. But while the possibility of an alternate form of relief confirms that Malik has suffered an injury, it does not mean that he caused the injury. That is especially true here, where Malik lacks any power to redress his injury. Instead, the most he can do is non-suit this case and trust DHS to delete the data. Where redress cannot be self-actuated, we are hesitant to conclude that an injury is self-inflicted.
We also do not agree that DHS can moot Malik’s suit merely by promising to delete the data once the suit is over. By its very nature, a promise of some future action cannot redress Malik’s injury now. DHS’s promise, then, supports no more than a prediction that this case could be moot in the future. But it is not presently moot. Rather, DHS still has Malik’s data. Just as we will not rely on “conjectural or hypothetical” facts to find that standing is present, so too we will not rely on predictions and what-ifs to find that standing is absent. We hold that Malik has standing to seek expungement.
That’s great but there’s nothing in here for Malik, other US citizens, or their constitutional rights. When it comes to the border, the house always wins. What Malik is being given here is nothing more than existing precedent regarding expungement of privileged material. What no one is being given is any more protection from their own government just because they cross borders or seek to board international flights. When it comes to anything the government calls a “border,” the rights we were guaranteed are mostly null and void.
Filed Under: 4th amendment, 5th circuit, adam malik, border searches, phone searches, riley, warrants
Comments on “Fifth Circuit Says Law Enforcement Doesn’t Need Warrants To Search Phones At The Border”
Leave your actual phone at home
Bring a simple flip phone with no data as your border phone, and still give them a hard time. They need a warrant.
Re:
Just wipe your phone using factory reset before you go so anything you don’t know about wint get you in trouble
People have had stuff on their phones they did not know was there and have been burned for it
Ads can bring in malware that do.things you don’t know about which is why ad blocking has become a necessary evil
So asblock detection scripts can be defeated by blocking any and all jQuery scripts which I do
Blocking jQuery to foil adblock detection does not break any criminal laws
Re: Re:
I was wondering how long it would take in the comments, but nice work, got it in the first two. Will continue looking for the rest of the amazingly helpful instructions below.
Some people should certainly be smarter about such things, but it shouldn’t actually be a thing we have to worry about.
Also, some people have to do actual work and can’t be constantly VPNing into their Secret Base with a flip phone every time they need a phone number or client data, etc.
Originalists, LOL
Where in the Constitution does it have a border exception?
The real danger: where is the border?
Is the border area still 100 miles from the actual borders? This includes anyone living 100 miles or less from an airport or anyone living 88 miles or less from the coast. That’s most of the population.
Re:
That is one reason why when I go Disneyland I turn my phone security up to insane cop proof level so that if I am ever pulled over and my phone seized they will never be able to access the contents.
Too many failed password attempts and the phone will wipe and reset requiring my Google password to set up the phone again meaning my phone would be be nothing but a expensive paperweight on some fops desk
There is no law in California that makes it a 🤣 me for me to do this if pulled over by either the chp or Anaheim police
Re: Re:
One other note is that Disneyland is right around 100 naiticaliles or 115.7 statute miles. The road distance from.the border is 116 miles, the straight line distance is a lot less so Disneyland is within that zone
Re: Re: Re:
The ‘border’ includes the coastline and has been claimed to include any international airport. Very little of the country is NOT within 100 nautical miles.
Disneyland is a LOT less than 100 nautical miles from the beach!
I suspect that the issue is more like, “Malik has asked you to point to where in the Constitution it says that rights no longer apply at the border.”
“But the border…” is the government’s version of “but the children…”
This comment has been flagged by the community. Click here to show it.
Cry me a river, TD.
Don’t want DHS searching your device without a warrant? Don’t exit and re-enter the U.S., or even travel internally near the border.
You wouldn’t be under suspicion if you were a good citizen, anyway! Of course, w/ a last name like “Malik,” it’s hardly a surprise that this traveler might provoke the legitimate concern of our government.
Re:
hey hyman
Re:
sup you rapist
Re:
That is how Michigan is able to seize phones which why when I go to Canada’s Wonderland I put a good password on my phone so that if I ever am pulled over and my phone calls nauseated nlby Michigan’s finest, they will never be able to get at the contents when they get the phone back to the cop shop.
I will just refuse to give Michigan’s finest my password if they try to demand it. I cannot be charged with a crime for refusing to give up my password
Re:
Of course, w/ a last name like “Coward,” it’s hardly a surprise that this troll might provoke the legitimate mockery of other commenters.
Re:
You’re supposed to lick the boot, not turn it into a three-course meal.
This comment has been flagged by the community. Click here to show it.
Re: Re:
I also think advocates of gender ideology should be sent to death camps, and Americans who oppose the national security state should lose their citizenship.
Re: Re: Re:
lmao we get it you’re playing the role of right-wing contrarion, hope you remember the rule of goats
Re: Re: Re:2
Making the right look bad is inconsequential. We already believe the worst out of them, and they are all terrorists who cannot be reasoned or negotiated with.
Making the left look bad on the other hand, well, we can easily assume that it’s the right doing it. The left would never make anyone look bad. We’re far too wholesome, authentic, and morally developed than those filthy disgusting breeders. Anyone who makes the left look bad is obviously someone from the right. In which case, they get blamed anyway. It’s a win-win.
Re: Re: Re:
Shit, man. Update your shtick. Not even the dumbest GQP believe this anymore now that they have declared war in the DOJ and the FBI. I mean, where are they going to go? Dumbfuckistan doesn’t exist so they can’t go to their ancestral homeland.
Re: Which is one of the reasons...
Between that, your insane TSA and rabid cops is why I intend never to visit America again. Why would I when there are many much more friendly and beautiful places in the world.
Re: Re:
Good, fuck off.
If America were truly such a terrible place, literally millions of undesirables wouldn’t be trying to illegally enter/remain here every year.
Take your (probably inconsequential or otherwise made-up) tourist spending to Canada, or better yet…Singapore!
Re: Poe's Law
I can’t tell, but I think this is intended to be irony. But it’s impossible to tell hyperbolic commentary on the right-wing position from the actual right-wing position. Poe’s Law applies. Of course, so does the Law of Goats.
cute cover strythey knew what they were doing....
Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.
that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did!
cute cover story! they knew what they were doing....
Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.
that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did!
cute cover story! they knew what they were doing....
Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.
that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did! this was done on purpose!
new policy
when crossing the border.
factory reset all devices! so when they decide to search. they get NOTHING! and if they decide to hold the phone while you leave. report it “stollen!” get new phone!
government has NO right to your data!
we already know that data will be used to put you on the “LIST!” and if government doesn’t like your politics, religion, job, or social media comments. guess what! your on the LIST!
Re:
That is what I have been saying for years.
You can get burned for what did not know what was on ther
Ads can bring malware which can do things you are not aware of.
And when I used to have my Australia based online radio station it was station policy to wipe station equipment before travelling, especially into or out of the 5 eyes countries
There is no law in Australia, New Zealand, Canada, Britain, or the United States that the station, or any personnel could have been prosecuted under for wiping station owned devices before going to customs.
We find they did nothing wrong in unlawfully stealing his data.
So stealing the data was fine and unlawful.
Scrodigers Rights?
Omg security!!!
Because being secure means stealing data from lawyers who sue the government because they can, and then call them taking the data unlawful.
It’s not just me who sees this right?
The level of ignorance shown here is appalling. A “factory reset” does not wipe all data from your smart phone. It’s more akin to a “fast format” of a disk drive in that it wipes out the file structure of your device, but does not wipe out the contents of the deleted files. So, nothing is retrievable via regular file access, but it is retrievable via reading the raw device. And once read, directories and files are easily recognized.
Re:
That depends on the phone. If you encrypt tr data before resetting the phone that will do.
The data that was there wil still be there but will be encrypted jibberish
That is what I encrypt the contents then do the reset.
You cannot be prosecuted in Britain, Canada, Australia, New Zealand, or the United States for doing this.
When I had my online radio station, it was company policy to that before station owned devices were taken over international borders.
Ecryot before you reset.
They prosecute what they cant read
phone reset does not remove data
Quite funny to see people here say “factory reset your phone”. When you do that, the data is not purged from the device. Sectors are unallocated on the storage device, but NOTHING is purged. They take the phone, and dump the contents in binary form. Then, they have tools to scan the data, and extract any TEXT, or picture or PART of picture from the dumped device data.
Reseting your phone does not purge the internal device storage device at all.
Re: So Wrong
A wipe deletes both master encryption keys on the device rendering any data on the device unrecoverable. No key no recovery of data.
Re: Re:
That is what I was saying on another post
Encryot before you reset
That will gurantee that nothing. Will ever be recovered
Re: Re: Re:
Not Guaranteed with flash memory, due to moving of data blocks,for wear leveling etc. The file may be encrypted, but an unencrypted copy may have been left on the storage. So, unless encrypted from the get go, some files may be recoverable.
Re: Re: Re:2
When I go to Disneyland I put my phone’a security up to where there is no way they can get to the data should myphone ever be seized by Anaheim police or the CHP. Disneyland is within 100 nautical miles of the border as the crow flies.
Neither the chp or Anaheim police can force me to give them my password on top of the fact that Samsung phones have “booby trap” mode where if brute forcing the password will cause the phone to wipe itself and reset after too many failed password attempts meaning they would need my Google password to set the phone back up again.
If either the bobby trap is sprung or a hard reset is fine you have done a hard reset the phone will require your Google password before it can be used again
There is no law on the books in California that makes it a crime to refuse to give the chp or Anaheim police your password if they seize your phone, even in the Constitution free zone.