CBP, ICE Have No Idea If Their Thousands Of Warrantless Device Searches Are Actually Making The Country Safer

from the so-essential-we-can't-even-be-bothered-to-justify-it dept

An ongoing lawsuit by the EFF and ACLU challenging warrantless device searches at the border has uncovered some disturbing news. The CBP and ICE have guidelines that govern these searches but they're so expansive they allow these agencies to search any device for almost any reason. We know this because it came straight from the agencies in their testimony during this case.

The government has long argued -- mostly successfully -- that the our rights as Americans (and those we extend to those entering our country) simply don't apply at the border. Why? The best the government can offer is that national security trumps the Constitution within 100 miles of any border, port, or international airport. Securing the nation apparently can't be done without violating rights, so rights will just have to be violated.

The CBP has been searching devices with increasing frequency over the past couple of years, providing plenty of ammo for court challenges. Unfortunately, none have been successful. But maybe this damning testimony showing the government granting itself all sorts of leeway might finally result in some restoration of our rights at our borders. The many details of border search policies are detailed in the EFF/ACLU's motion for summary judgment [PDF], asking the court to side with Americans and their rights, rather than exaggerated claims about the insecurity of our nation.

The CBP's policies place almost no restrictions on searches of devices. Basic searches -- which involve an agent paging through a phone's contents manually, rather than using another device to perform a forensic search -- can be done with zero reasonable suspicion.

Policy allows officers to retain devices for as long as they want. The policy says retention shouldn't exceed five days, but there is no upper limit to how long the CBP can hold onto a device with supervisory approval. The policies also allow the CBP to retain data from devices even when it has no probable cause to do so.

This information is then shared with a number of other agencies, which the CBP can't be bothered to vet.

The CBP Policy permits officers to share information retained from electronic devices with federal, state, local, and foreign law enforcement agencies. Exh. 19 (CBP 2018 Directive) at § 5.5.1.3, Bates 122.

CBP does not know how long other government entities keep the information they receive from CBP’s border searches of electronic devices. Exh. 13 (CBP 30(b)(6) depo.) at 200:2–12.

CBP does not monitor whether other government entities impermissibly retain the information CBP shares from border searches of electronic devices. Exh. 13 (CBP 30(b)(6) depo.) at 203:7–204:3

If the CBP wants to, it can turn over seized devices to ICE. ICE has its own policies, but it also does not need reasonable suspicion to perform a basic search. Unlike the CBP, ICE says it has up to 30 days to perform a device search. Again, this soft cap on retention can be removed by a supervisor, giving the agency indefinite possession of someone else's devices.

Unlike the CBP, ICE actually destroys info that isn't relevant to its work. But that may not matter much because ICE is also allowed to share this info with other agencies and does not make any destruction demands when its does so.

If a person has been flagged by CBP's "Automated Targeting System," the information pulled from their devices can be stored for more than a decade.

If an advanced search of an electronic device yields information that a CBP officer deems of law enforcement benefit, then the officer will copy it into ATS.

[...]

ATS stores copies of data from travelers’ devices, not officers’ narrative descriptions of that data. Exh. 13 (CBP 30(b)(6) depo.) at 190:10–19.

ATS stores copies of data from travelers’ devices for 15 years or “the life of the law enforcement matter,” whichever is longer. Exh. 23 (CBP 2017 ATS PIA) at Bates 1037.

The number of device searches by the CBP continues to escalate, up from 5,085 in 2012 to 33,295 in 2018. These numbers are likely lower than the actual number of searches the agency performed because CBP officers aren't all that great at filling out paperwork -- something that happened to the plaintiffs in this lawsuit.

CBP determines the number of border searches of electronic devices in a given period by calculating the number of closed or completed Electronic Media Reports (“EMRs”). Exh. 26 (Defs. Interrog. Responses) at #11. EMRs are sometimes called “IOEMs.” Exh. 13 (CBP 30(b)(6) depo.) at 201:7–9.

CBP officers sometimes do not complete EMRs after conducting border searches of electronic devices. Exh. 27 (DHS OIG 2018 Report) at Bates 973, 978; Exh. 13 (CBP 30(b)(6) depo.) at 248:18–249:9.

For example, on August 28, 2017, CBP officers searched the smartphone they seized from Plaintiff Nadia Alasaad’s bag. Exhs. 15 & 16 (Answer and Complaint) at ¶¶ 73–74, 76. Defendants have no records, including EMRs, documenting that search. Exh. 26 (Defs. Doc. Responses) at #17.

We have to assume the same thing is happening with ICE. Unfortunately, we don't know how often ICE searches devices because the agency has conveniently decided not to track that information.

Despite both agencies claiming to be very concerned about national security and immigration law violations, a lot of what ICE does has nothing to do with either.

ICE asserts that agents may conduct a warrantless or suspicionless border search of the electronic device of a traveler:

a. Who is suspected of violating tax laws, to find emails reflecting the tax law violations. Exh. 14 (ICE 30(b)(6) depo.) at 29:4–8, 31:5–12.

b. Who is suspected of hiding assets in bankruptcy, to find emails reflecting the hiding of assets. Id. at 33:4–22.

c. Who is an executive of a company suspected of criminally dumping toxins into a river, to find emails reflecting the illegal dumping. Id. at 31:14–23, 32:2–8.

d. Who is suspected of violating consumer protection laws, to find evidence reflecting the consumer protection law violations. Id. at 32:10–33:2.

e. Who is suspected of money laundering, to find emails or other evidence reflecting money laundering, including the creation of corporations and accounts and the structuring of deposits. Id. at 41:3–42:13

ICE likely searches devices for evidence of any number of criminal activities unrelated to immigration or customs enforcement. Multiple federal agencies are making use of the border exception by proxy, asking ICE to perform the warrantless searches they can't.

ICE’s decisions to conduct warrantless or suspicionless border searches of electronic devices are informed by information or requests from other government agencies. Exh. 26 (Defs. Interrog. Responses) at #17. See also Exh. 14 (ICE 30(b)(6) depo.) at 189:9–190:21, 191:18–192:3. These agencies include the Bureau of Alcohol, Tobacco, Firearms and Explosives, Internal Revenue Service, Secret Service, Federal Bureau of Investigation, State Department, state and local police departments and county sheriffs, and foreign law enforcement agencies. Exh. 14 (ICE 30(b)(6) depo.) at 194:13–201:25.

It's not just the Fourth Amendment being ignored at the borders. It's also the First Amendment. ICE testimony shows it searches the devices of journalists if they've made any contact with suspected terrorists or "foreign sources of interest to the government," regardless of whether or not the journalist is suspected of wrongdoing.

Despite a stated need to use Constitutional rights as a doormat in the interest of the greater good -- i.e., securing the nation -- neither agency can say for sure these invasive warrantless searches are actually making the country safer.

CBP and ICE do not know how many warrantless or suspicionless border searches of electronic devices uncover digital contraband. Exh. 26 (Defs. Interrog. Responses) at #13; Exh. 13 (CBP 30(b)(6) depo.) at 68:10–14; Exh. 14 (ICE 30(b)(6) depo.) at 44:25–45:7.

CBP and ICE do not know how many warrantless or suspicionless border searches of electronic devices uncover potential evidence of criminal activity. Exh. 13 (CBP 30(b)(6) depo.) at 68:15–20; Exh. 14 (ICE 30(b)(6) depo.) at 338:18–24.

CBP does not know how many warrantless or suspicionless border searches of electronic devices result in prosecution or conviction. Exh. 27 (DHS OIG 2018 Report) at Bates 982.

ICE does not know how many warrantless or suspicionless border device searches result in criminal arrests or indictments, or referrals to other law enforcement agencies. Exh. 36 (ICE/HSI Priority Requests) at Bates 93.

This is the tradeoff: we lose our rights and, in return, we get a shrug. It's time for the judicial system to stop cutting the federal government so much "national security" slack.

Filed Under: 4th amendment, cbp, device searches, ice, record keeping


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • This comment has been flagged by the community. Click here to show it
    identicon
    Anonymous Coward, 2 May 2019 @ 7:14am

    Compelling government interest yawn.

    reply to this | link to this | view in chronology ]

  • identicon
    clem3, 2 May 2019 @ 7:14am

    4th- Border Exception

    "It's time for the judicial system to stop cutting the federal government so much "national security" slack."

    :

    Ha !

    the judicial system is an integral part of the government -- that's like expecting a Mafia consigliere to make the Don law-abiding.

    The US Supreme Court has quite deliberately weakened the 4th Amendment repeatedly over many decades.
    A corrupt judicial system is merely a symptom of the larger problem.

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 2 May 2019 @ 7:48am

    Some time ago as I sat awaiting my flight, I watched as others were boarding. I should have been in the bar getting trashed. Anyways, I was intrigued by the folk who simply waved their cell phones at the scanner and continued down the jet way to the plane.

    It now occurs to me that such convenience may cause trouble if their cell phone were confiscated for further examination and you have a connecting flight. Better print out that boarding pass just in case.

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 2 May 2019 @ 8:01am

      Re:

      Always print your boarding pass. Never keep anything incriminating on your phone. Just in case anything could be misconstrued as incriminating on your phone make sure you have set a password and disable face/fingerprint access.

      reply to this | link to this | view in chronology ]

      • identicon
        Anonymous Coward, 2 May 2019 @ 8:29am

        Re:

        And why shouldn't the intelligent agents seize the printed boarding pass and hold it for five days or fifteen years, whichever is longer, just in case it contains steganographic messages?

        Are they only allowed to seize electronic devices?

        reply to this | link to this | view in chronology ]

        • identicon
          Anonymous Coward, 2 May 2019 @ 8:42am

          Re: Re:

          They can seize whatever they want and keep you from your flight even if they seize nothing. But your phone should be useless to them if you don't allow them access.

          Never provide evidence if it can be avoided. Remember: Any information you provide can and will be used against you. It doesn't matter whether you've done anything wrong.

          reply to this | link to this | view in chronology ]

  • icon
    TheResidentSkeptic (profile), 2 May 2019 @ 8:04am

    So who is providing the data to ICE?

    Who is giving them info on the travelers for excuses a through e????

    Does everyone under suspicion by every agency get reported to ICE in case they travel so ICE/CBP can do the searches for them?

    Or can they just tell by looking?

    reply to this | link to this | view in chronology ]

    • icon
      Bamboo Harvester (profile), 2 May 2019 @ 10:17am

      Re: So who is providing the data to ICE?

      I suspect ALL the CBP data is instantly available to ICE, who screens it for cases they want to get in on.

      reply to this | link to this | view in chronology ]

  • icon
    Tim R (profile), 2 May 2019 @ 9:31am

    Border Exception

    The thing that's always rubbed me the wrong way was that I live in Florida, and there's basically no place that isn't within 100 miles of the border, owing to the peninsular shape of the state. I can remember a few years back that my ex-wife was telling me about CBP searching her car without probable cause at a Tampa Bay area beach, and this was a tiny little beach on the bay itself, not even on the Gulf of Mexico. At the time, it just wasn't something she had the resources to legally fight, which can also be said about the large bulk of the population.

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 2 May 2019 @ 10:15am

      Re: Border Exception

      What did they find?
      Some out of date condiment?
      The Horror!!!!!!

      It would be funny to say, "While you're in there, could you check the oil?" but that is probably ill advised.

      reply to this | link to this | view in chronology ]

  • identicon
    TDR, 2 May 2019 @ 12:32pm

    CPB, ICE, FBI, NSA, DOJ...

    Why we need all these letters is a puzzle even Vanna can't solve...

    reply to this | link to this | view in chronology ]

  • icon
    That One Guy (profile), 2 May 2019 @ 4:04pm

    When the numbers aren't on your side, ignore the numbers

    If they actually tracked those numbers it would be possible to demonstrate just how useless their actions are in dealing with what they might claim as a goal. By instead not bothering they leave it up to entirely subjective feelings on the matter, where someone can claim that their actions are working because they just know that they are.

    reply to this | link to this | view in chronology ]

  • icon
    Gerald Robinson (profile), 3 May 2019 @ 10:01am

    I'VE CBP

    Abolishing ICE & CON is an obvious solution, but is silly. Simply require a warent.

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Close

Add A Reply

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: I Invented Email
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.