{"id":5262,"date":"2017-09-27T21:29:41","date_gmt":"2017-09-28T01:29:41","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5262"},"modified":"2020-06-04T20:52:53","modified_gmt":"2020-06-04T20:52:53","slug":"client-confidentiality-threatened-border","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/client-confidentiality-threatened-border\/","title":{"rendered":"Client Confidentiality Threatened at the Border"},"content":{"rendered":"<p>In <a href=\"https:\/\/www.supremecourt.gov\/opinions\/13pdf\/13-132_8l9c.pdf\"><em>Riley v. California<\/em><\/a>, the Supreme Court held that police must generally obtain a warrant before searching a cell phone, absent exigent circumstances. This ruling allowed smartphone users to breathe a sigh of relief knowing that the vast amounts of data that they have stored on their phones is protected by <a href=\"https:\/\/www.supremecourt.gov\/opinions\/13pdf\/13-132_8l9c.pdf\">law<\/a>. However, people may have failed to consider how the decision would be applied within 100 miles of the US border. At the border, \u201c[r]outine . . . searches may be conducted <a href=\"https:\/\/www.justice.gov\/sites\/default\/files\/usao\/legacy\/2014\/11\/14\/usab6206.pdf\">without a search warrant<\/a>, even in the absence of reasonable suspicion, because \u2018[t]he Government\u2019s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.\u2019\u201d Despite the Riley ruling in 2014, according to NBC, \u201c[s]earches <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">tripled<\/a> from 857 in October 2015 to 2,560 in October 2016, rising to 2,595 in March 2017.\u201d<br \/>\nUnfortunately, this exception, while originally effected to promote safety, now just promotes feelings of <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">fear, violation<\/a>, <a href=\"https:\/\/www.law360.com\/articles\/965657\">uncertainty<\/a>, and <a href=\"https:\/\/www.techdirt.com\/articles\/20170917\/19023838229\/eff-aclu-sue-government-over-warrantless-electronic-searches-border.shtml\">imposes financial hardship<\/a> on travelers. When border agents take a person\u2019s electronic device, they may go through all the <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">data<\/a> contained on the phone. Officers have the ability to \u201c<a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">review<\/a> . . . social media accounts, work emails, call and text history, photos, and other apps.\u201d The one limitation stipulated in a \u201c<a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">Department of Justice internal bulletin<\/a>\u201d appears to be \u201c<a href=\"https:\/\/www.justice.gov\/sites\/default\/files\/usao\/legacy\/2014\/11\/14\/usab6206.pdf\">remotely stored digital information<\/a>\u201d such as information on the Cloud. At first, the tradeoff between privacy and safety does not seem unreasonable. However, that is most likely because people do not immediately remember all the sensitive things that their phones may house. For example, phones may house texts <a href=\"https:\/\/assets.documentcloud.org\/documents\/4052244\/7-Amended-Complaint.pdf\">\u201cto loved ones\u201d,<\/a> information that collectively <a href=\"https:\/\/assets.documentcloud.org\/documents\/4052244\/7-Amended-Complaint.pdf\">reveals<\/a> personal \u201copinions\u201d, and even \u201csensitive medical, legal, and financial information.\u201d<br \/>\nIt is important to note that this search can take place <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">regardless<\/a> of whether the device is locked with a pin or password. If the phone is <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">locked<\/a>, border agents will ask the person to give them the password or pin to unlock the phone. If met with resistance, they <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">will arrest or detain<\/a> the person until they comply. In one instance, after declining to turn over his phone, one US Citizen was immobilized by two officers (one holding his legs and another <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/american-citizens-u-s-border-agents-can-search-your-cellphone-n732746\">\u201csqueez[ing] his throat from behind<\/a>\u201d) while a third took the cell phone out of his pocket.<br \/>\nIncidents like the one described above have now put the legal community on the <a href=\"https:\/\/www.law360.com\/articles\/965657\">defensive<\/a>.<\/p>\n<blockquote><p>Given the uncertainty of electronic privacy when crossing the border, lawyers who travel internationally could potentially have confidential client information <a href=\"https:\/\/www.law360.com\/articles\/965657\">exposed<\/a> during electronic searches.<\/p><\/blockquote>\n<p>To address rising concerns in the legal community about what this could, and would, mean for confidential client information, Association for <a href=\"https:\/\/www.law360.com\/articles\/965657\">Corporate Counsel in Virginia<\/a> held a panel on September 19, 2017 to discuss the matter. At the panel, lawyers joked that aside from trying to encrypt files or delete them off phones before arriving at the border, they should resort to <a href=\"https:\/\/www.law360.com\/articles\/965657\">\u201ctactics of 1990s drug dealers . . . burner phones.\u201d<\/a> It was also suggested that lawyers try to <a href=\"https:\/\/www.law360.com\/articles\/965657\"> strip \u201cemails of information . . . [and] wip[e] browser history.\u201d<\/a> Despite the lighthearted tone of the panel, there is still <a href=\"https:\/\/www.law360.com\/articles\/965657\">no clear solution<\/a> to the matter of electronic search within 100 miles of the US border.<br \/>\nHowever, legal professionals may soon obtain some clarity on this issue. On September 13, 2017, Electronic Frontier Foundation (\u201cEFF\u201d) and the American Civil Liberties Union (\u201cACLU\u201d), <a href=\"https:\/\/www.eff.org\/press\/releases\/eff-aclu-media-conference-call-today-announce-lawsuit-over-warrantless-phone-and\">on behalf of<\/a> 11 plaintiffs (\u201cPlaintiffs\u201d), filed a <a href=\"https:\/\/assets.documentcloud.org\/documents\/4052244\/7-Amended-Complaint.pdf\">Complaint for Injunctive and Declaratory Relief<\/a> against acting leaders of the U.S. Department of Homeland Security (\u201cDHS\u201d), U.S. Customs and Border Protection (\u201cCBP\u201d), and Immigration and Customs Enforcement (\u201cICE\u201d). The indictment alleges that the Plaintiffs\u2019 First and Fourth Amendment rights were violated when they had their \u201csmartphones, laptops, and other electronic devices\u201d <a href=\"https:\/\/assets.documentcloud.org\/documents\/4052244\/7-Amended-Complaint.pdf\">searched and seized<\/a> at the border without any probable cause to justify the border agent\u2019s action. The Plaintiffs are asking, among other things, that the Court recognize and declare that their Fourth Amendment rights were <a href=\"https:\/\/assets.documentcloud.org\/documents\/4052244\/7-Amended-Complaint.pdf\">violated<\/a>, and enjoin the Defendants \u201cfrom confiscating travelers\u2019 electronic devices, to effectuate searches of those devices after travelers leave the border, absent probable cause that the devices contain contraband or evidence of a violation of immigration or customs laws, and . . . in such cases, promptly to seek a warrant to search the device.\u201d Perhaps when this case is decided, lawyers will finally have some clarity with regards to exactly what privacy they, and their clients, may expect at the border.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Riley v. California, the Supreme Court held that police must generally obtain a warrant before searching a cell phone, absent exigent circumstances. This ruling allowed smartphone users to breathe a sigh of relief knowing that the vast amounts of data that they have stored on their phones is protected by law. However, people may <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/client-confidentiality-threatened-border\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5263,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5262"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5262"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5262\/revisions"}],"predecessor-version":[{"id":7050,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5262\/revisions\/7050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5263"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}