Fifth Circuit Says Law Enforcement Doesn’t Need Warrants To Search Phones At The Border

from the never-mind-the-precedent dept

In 2014, the Supreme Court made it clear: phone searches require warrants. While it did note the case involved a search “incident to an arrest,” the precedent was undeniable. If a phone search attached to an arrest requires a warrant, it would logically follow that any phone search by law enforcement — even those not subsequent to an arrest — requires a warrant.

Since then, multiple federal courts have come to the opposite conclusion in cases involving searches of phones at borders or international airports. According to these judges, the Riley decision simply doesn’t apply when border security is in play. And it doesn’t matter whether the searched device belongs to an American citizen or a resident of a foreign country.

The law shouldn’t be unsettled, but it is. There’s no consensus at the appellate level. Nor is there one at the lower levels. All we have is a lack of clarity to work with. One federal judge (Jed Rakoff) said warrants are needed for “some” border phone searches — specifically “forensic” searches in which the government makes itself a copy of all data on a person’s phone.

The Fourth Circuit Appeals Court also made a limited finding in favor of Riley’s warrant requirement, stating that border law enforcement officers must have at least articulable suspicion to engage in forensic searches. That’s still a long way from probable cause, but it’s more than the “nothing at all” standard CBP and Border Patrol officers have been held to.

The Seventh Circuit had a chance to set precedent in another border device search case, but instead chose to save the question for a later day, leaving the “because border security” rationale for warrantless searches undisturbed.

This indecision has led to a steady increase in border device searches, driven by the ubiquity of smartphones and no one at the judicial level willing to decisively tell border officers a warrant is needed.

Texas immigration lawyer Adam Malik has given the Fifth Circuit a chance to set precedent more aligned with the Supreme Court’s 2014 Riley decision. Unfortunately, the Fifth Circuit has decided a forensic search of Malik’s device (which was held by the CBP for three weeks) isn’t a violation of the Fourth Amendment. (via FourthAmendment.com)

Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.

In response to Mr. Malik’s assertion of privilege, Officer Sullivan informed Mr. Malik that DHS was seizing the iPhone and that the digital contents would be searched. Officer Sullivan did not disconnect the iPhone from the internet or the communications network. He failed to take action that would protect the iPhone from accessing the internet or a communications network. Officer Sullivan ordered Mr. Malik to leave the deferred inspection area without the iPhone while the iPhone still was connected to the internet and a communications network.

Neither Officer Sullivan nor any other employee of Defendants asked Mr. Malik to disable connectivity of the iPhone to the internet or to any network. Had Officer Sullivan or any employee of Defendants offered to permit Mr. Malik to place the iPhone in airplane mode upon or after seizure of the iPhone, Mr. Malik would have done so immediately.

On top of not preventing the phone from continuing to collect data and communications, the DHS held on to Malik’s phone for five months. According to this, from the Fifth Circuit’s decision [PDF], part of that time was given over to the government’s efforts to avoid accessing privileged information.

The phone’s passcode feature prevented the border officers from accessing the phone, and thus from searching it, so they sent it to a forensics lab. The lab bypassed the phone’s security features, extracted the phone’s data, and returned the phone and the data to DHS. All of that took about three months. DHS then used a “filter team” to screen the extracted data for any privileged materials. That took about two more months. Once the filter team had finished, they provided the border officers in Dallas with “two thumb drives . . . consisting of the data that the filter team determined [the officers] were authorized to search.” DHS then conducted a border search of that data, and DHS returned the phone to Malik on May 21, 2021.

What’s not explained here is what the DHS was searching for. That it has the power to engage in warrantless searches of devices doesn’t automatically create reasons for it to do so. Very little was explained to Malik, other than that the officers could do this and, therefore, they were going to do this. All of this happened despite Malik being a government-approved member of the CBP’s Global Entry Trusted Traveler Program, which should have seen him subjected to less scrutiny when crossing borders, rather than what he was actually subjected to.

Following some hard questions posed to the DHS by Senator Ron Wyden, Malik sought to obtain more information to use in his lawsuit against the agency.

Discovery closed on February 11, 2022. Malik moved to reopen discovery a few weeks later, citing a public letter that United States Senator Ron Wyden sent to DHS’s Inspector General. Among other things, the letter alleges that DHS conducted “bulk surveillance of Americans’ financial records” by collecting troves of “transaction data” from Western Union. While the letter asks DHS to investigate these allegations, it does not address individual border searches, phone records, decryption, or DHS’s data-retention policies. The district court denied Malik’s motion.

The court denied this motion. Then it decided in favor of the DHS, ruling it had not violated Malik’s rights with this search of his phone.

Unfortunately, the Fifth Circuit Appeals Court (which splits the US-Mexico border with the Ninth Circuit) agrees with the lower court. No rights violation here, not when border security is on the line.

Malik argues that we should extend Riley v. California to border searches. Yet, for “[routine] cell phone searches at the border, our sister circuits have uniformly held that Riley does not require either a warrant or reasonable suspicion.” We have held the same. Even for non-routine searches, our sister circuit “have differed only as to whether reasonable suspicion is required.” We are not aware of any circuit court that has extended Riley’s warrant requirement to the border.

“Ordinarily, we would expect a party encouraging us to adopt a new constitutional [theory] to convincingly distinguish adverse authorities” and “to discuss the contours of the doctrine [he] wishes us to adopt. Malik has not done any of that. He has not even attempted to argue that the search was anything other than routine. He also has not discussed or analyzed Riley at any length, nor has he addressed the fact that “[e]very circuit that has faced this question has agreed that Riley does not mandate a warrant requirement for border searches of electronic devices, whether basic or advanced.

Instead, Malik has asked us to “intervene” and hold “that a judicial warrant is required at this time for the search of an attorney’s confidential client files and communications at the border.” Malik’s request for our “intervention” is itself a tacit concession that our precedent does not currently require a warrant for cell-phone searches at the border. We express no view on how the border-search exception may develop or be clarified in future cases, but we do expressly decline to address it further here.

So, like the Seventh Circuit, the Fifth Circuit decides analyzing Riley in terms of border searches is a question for another day. And, by passing on this opportunity, it ensures the next time someone asks the same question, it will be able to refer to its previous punt to kick the constitutional can further down the road.

That being said, the lawsuit isn’t entirely dead. Malik also wants to ensure the DHS destroys all the data it pulled from his phone, which includes plenty of privileged material. Not only were there attorney-client communications, but likely information dealing with ongoing immigration litigation against the government — work product that is likewise shielded from government snooping.

The Fifth Circuit agrees Malik is right to demand this form of expungement and the DHS is wrong to refuse to destroy this seized data unless Malik drops his lawsuit. (All emphasis in the original.)

In the district court, DHS argued that “the information is being retained only because Malik requested a litigation hold,” and that Malik cannot not rely on this self-inflicted injury to show standing. And, on appeal, DHS has represented that it will “destroy the remaining data in its possession and will be happy to provide an appropriate certification to Malik that all data in the government’s possession has been destroyed and that no data was transferred to any other governmental or nongovernmental entity or person” as soon as these “proceedings” conclude. DHS made similar representations to the district court. In other words, DHS argues that this lawsuit is the only obstacle separating Malik from the expungement that he seeks.

We do not agree that Malik’s injury is self-inflicted. The injury is that DHS still possesses privileged information that it unlawfully seized from his phone. Malik did not volunteer that data to DHS, and he has no control over how DHS handles it. That is why Malik came to court. DHS argues that it will delete the data if Malik non-suits this case. But while the possibility of an alternate form of relief confirms that Malik has suffered an injury, it does not mean that he caused the injury. That is especially true here, where Malik lacks any power to redress his injury. Instead, the most he can do is non-suit this case and trust DHS to delete the data. Where redress cannot be self-actuated, we are hesitant to conclude that an injury is self-inflicted.

We also do not agree that DHS can moot Malik’s suit merely by promising to delete the data once the suit is over. By its very nature, a promise of some future action cannot redress Malik’s injury now. DHS’s promise, then, supports no more than a prediction that this case could be moot in the future. But it is not presently moot. Rather, DHS still has Malik’s data. Just as we will not rely on “conjectural or hypothetical” facts to find that standing is present, so too we will not rely on predictions and what-ifs to find that standing is absent. We hold that Malik has standing to seek expungement.

That’s great but there’s nothing in here for Malik, other US citizens, or their constitutional rights. When it comes to the border, the house always wins. What Malik is being given here is nothing more than existing precedent regarding expungement of privileged material. What no one is being given is any more protection from their own government just because they cross borders or seek to board international flights. When it comes to anything the government calls a “border,” the rights we were guaranteed are mostly null and void.

Filed Under: , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Fifth Circuit Says Law Enforcement Doesn’t Need Warrants To Search Phones At The Border”

Subscribe: RSS Leave a comment
36 Comments
Anonymous Coward says:

Re:

Just wipe your phone using factory reset before you go so anything you don’t know about wint get you in trouble

People have had stuff on their phones they did not know was there and have been burned for it

Ads can bring in malware that do.things you don’t know about which is why ad blocking has become a necessary evil

So asblock detection scripts can be defeated by blocking any and all jQuery scripts which I do

Blocking jQuery to foil adblock detection does not break any criminal laws

Anonymous Coward says:

Re: Re:

I was wondering how long it would take in the comments, but nice work, got it in the first two. Will continue looking for the rest of the amazingly helpful instructions below.

Some people should certainly be smarter about such things, but it shouldn’t actually be a thing we have to worry about.

Also, some people have to do actual work and can’t be constantly VPNing into their Secret Base with a flip phone every time they need a phone number or client data, etc.

Anonymous Coward says:

Re:

That is one reason why when I go Disneyland I turn my phone security up to insane cop proof level so that if I am ever pulled over and my phone seized they will never be able to access the contents.

Too many failed password attempts and the phone will wipe and reset requiring my Google password to set up the phone again meaning my phone would be be nothing but a expensive paperweight on some fops desk

There is no law in California that makes it a 🤣 me for me to do this if pulled over by either the chp or Anaheim police

Anonymous Coward says:

Instead, Malik has asked us to “intervene” and hold “that a judicial warrant is required at this time for the search of an attorney’s confidential client files and communications at the border.”

I suspect that the issue is more like, “Malik has asked you to point to where in the Constitution it says that rights no longer apply at the border.”

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Cry me a river, TD.

Don’t want DHS searching your device without a warrant? Don’t exit and re-enter the U.S., or even travel internally near the border.

You wouldn’t be under suspicion if you were a good citizen, anyway! Of course, w/ a last name like “Malik,” it’s hardly a surprise that this traveler might provoke the legitimate concern of our government.

Anonymous Coward says:

Re:

That is how Michigan is able to seize phones which why when I go to Canada’s Wonderland I put a good password on my phone so that if I ever am pulled over and my phone calls nauseated nlby Michigan’s finest, they will never be able to get at the contents when they get the phone back to the cop shop.

I will just refuse to give Michigan’s finest my password if they try to demand it. I cannot be charged with a crime for refusing to give up my password

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Re: Re: Re:2

Making the right look bad is inconsequential. We already believe the worst out of them, and they are all terrorists who cannot be reasoned or negotiated with.

Making the left look bad on the other hand, well, we can easily assume that it’s the right doing it. The left would never make anyone look bad. We’re far too wholesome, authentic, and morally developed than those filthy disgusting breeders. Anyone who makes the left look bad is obviously someone from the right. In which case, they get blamed anyway. It’s a win-win.

Anonymous Coward says:

Re: Re:

Between that, your insane TSA and rabid cops is why I intend never to visit America again. Why would I when there are many much more friendly and beautiful places in the world.

Good, fuck off.

If America were truly such a terrible place, literally millions of undesirables wouldn’t be trying to illegally enter/remain here every year.

Take your (probably inconsequential or otherwise made-up) tourist spending to Canada, or better yet…Singapore!

Anonymous Coward says:

cute cover strythey knew what they were doing....

Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.

that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did!

Anonymous Coward says:

cute cover story! they knew what they were doing....

Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.

that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did!

Anonymous Coward says:

cute cover story! they knew what they were doing....

Malik sued the DHS and CBP in early 2021, after his phone was seized, searched, and held by the CBP. One of Malik’s many concerns was the government’s warrantless access to privileged attorney-client information. This is what happened during the search Malik sued over.

that was the info they where looking for! and once government has your data! that’s it! they will do with it what ever they want! just because they “claim” to destroy the data. doesn’t mean they actually did! this was done on purpose!

Anonymous Coward says:

new policy

when crossing the border.
factory reset all devices! so when they decide to search. they get NOTHING! and if they decide to hold the phone while you leave. report it “stollen!” get new phone!
government has NO right to your data!
we already know that data will be used to put you on the “LIST!” and if government doesn’t like your politics, religion, job, or social media comments. guess what! your on the LIST!

Anonymous Coward says:

Re:

That is what I have been saying for years.

You can get burned for what did not know what was on ther

Ads can bring malware which can do things you are not aware of.

And when I used to have my Australia based online radio station it was station policy to wipe station equipment before travelling, especially into or out of the 5 eyes countries

There is no law in Australia, New Zealand, Canada, Britain, or the United States that the station, or any personnel could have been prosecuted under for wiping station owned devices before going to customs.

Anonymous Coward says:

The level of ignorance shown here is appalling. A “factory reset” does not wipe all data from your smart phone. It’s more akin to a “fast format” of a disk drive in that it wipes out the file structure of your device, but does not wipe out the contents of the deleted files. So, nothing is retrievable via regular file access, but it is retrievable via reading the raw device. And once read, directories and files are easily recognized.

Anonymous Coward says:

Re:

That depends on the phone. If you encrypt tr data before resetting the phone that will do.

The data that was there wil still be there but will be encrypted jibberish

That is what I encrypt the contents then do the reset.

You cannot be prosecuted in Britain, Canada, Australia, New Zealand, or the United States for doing this.

When I had my online radio station, it was company policy to that before station owned devices were taken over international borders.

Ecryot before you reset.

They prosecute what they cant read

GrimOracle says:

phone reset does not remove data

Quite funny to see people here say “factory reset your phone”. When you do that, the data is not purged from the device. Sectors are unallocated on the storage device, but NOTHING is purged. They take the phone, and dump the contents in binary form. Then, they have tools to scan the data, and extract any TEXT, or picture or PART of picture from the dumped device data.

Reseting your phone does not purge the internal device storage device at all.

Anonymous Coward says:

Re: Re: Re:2

When I go to Disneyland I put my phone’a security up to where there is no way they can get to the data should myphone ever be seized by Anaheim police or the CHP. Disneyland is within 100 nautical miles of the border as the crow flies.

Neither the chp or Anaheim police can force me to give them my password on top of the fact that Samsung phones have “booby trap” mode where if brute forcing the password will cause the phone to wipe itself and reset after too many failed password attempts meaning they would need my Google password to set the phone back up again.

If either the bobby trap is sprung or a hard reset is fine you have done a hard reset the phone will require your Google password before it can be used again

There is no law on the books in California that makes it a crime to refuse to give the chp or Anaheim police your password if they seize your phone, even in the Constitution free zone.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...