Back to News & Commentary

Documents Shed Light on Border Laptop Searches

Brian Hauss,
Senior Staff Attorney,
勛圖眻畦 Speech, Privacy, and Technology Project
Share This Page
September 9, 2013

The case of David Miranda got a lot of attention around the world after UK authorities were accused of abusing an anti-terrorism law to evade the normal constitutional restrains on police power and question someone because of their political associations. Well, a very similar abuse of power appears to have happened here in the United States.

Today we are releasing new government documents that provide rare insight into how the government uses its powers at the border to search and seize Americans electronic devices. The documents, obtained by our client David House as a result of his lawsuit against the Department of Homeland Security, demonstrate how the government is abusing its border search authority to evade constitutional restrictions on its surveillance powers. (You can see the documents here.)

House was stopped at Chicagos O'Hare International Airport coming back from vacation in November 2010. At the time, he was working with the Bradley Manning Support Network, which was raising funds for the legal defense of the soldier who has since plead guilty to providing classified documents to WikiLeaks. DHS agents detained House, interrogated him about his political activities and beliefs, and then seized his laptop computer, mobile phone, camera, and USB drive. The agents returned Houses phone after inspecting it, but the government kept the rest of his devices for seven weeks while agents searched his files for evidence. Even after the government returned Houses physical devices, it continued to actively investigate copies of his files for nearly six more months.

The 勛圖眻畦 and the 勛圖眻畦 of Massachusetts filed a federal lawsuit on Houses behalf arguing that the government targeted House solely because of his association with the Bradley Manning Support Network, violating both his First Amendment right to freedom of association and his Fourth Amendment right to be free from unreasonable searches and seizures.

In March 2012, the judge in the case denied the governments motion to dismiss the lawsuit, holding that even though the government does not need suspicion or a warrant to search peoples electronic devices at the border, that power is not unlimited and First Amendment rights still apply. After months of negotiations, House and the government inked a settlement agreement in May 2013. As part of that agreement, the government agreed to destroy all of the data it got from Houses electronics, and also turn over documents related to its investigation of House and the search of his devices.

The settlement documents reveal that an agent with Homeland Security Investigations (HSI)an Immigration and Customs Enforcement (ICE) subdivision that is now the second largest law enforcement agency in the United Statesentered a lookout into a government database called TECS (see the document here), effectively notifying government agents throughout the country that House was wanted for questioning in connection with the Department of Justices investigation into Manning and WikiLeaks. As a result of the lookout, which was linked to the , HSI later received an automated notification that House would be traveling outside the country and that he would return through OHare on November 3, 2010.

Houses case provides a perfect example of how the government uses its border search authority to skirt the protections afforded by the Fourth Amendment. The government enjoys wider latitude to search people and their belongings at the border than it possesses elsewhere, for the purpose of protecting our borders. But the settlement documents demonstrate that the seizure of Houses computer was unrelated to border security or customs enforcement. It was simply an opportunity to conduct a suspicionless search that no court would ever have approved inside the country.

The records also show that HSI was acting in cooperation withand perhaps at the request ofthe Department of Justice, the Department of State, and the Armys Criminal Investigative Division, not to protect our borders but to further a domestic investigation of the WikiLeaks disclosures. Houses connection to Manning through the Bradley Manning Support Network made him a target of that investigation. The government then used its access to airline passenger information to learn when and where David House, and others, would be traveling across our border (see the document here), and laid in wait to seize his computer and other electronic devices.

Electronic device searches are substantially more invasive than traditional border searches, which is why this particularly intrusive form of government surveillance should not be conducted without reasonable suspicion. The documents show how, using sophisticated forensics software, the government can conduct comprehensive and intrusive searches of the large number of personal documents stored on todays electronic devices. In this case, the government searched Houses electronics for 183 keywords, turning up more than 26,000 potentially responsive files/objects. But even the governments own analysis of Houses information concluded that no data was found that constituted evidence of a crime (and would justify ICEs seizure of the materials).

The fact that an American crosses the border should not be an excuse for the government to scour his most personal files or to seize his electronics for a prolonged period of time. A federal appeals court that the forensic examination of a persons laptop is so comprehensive and intrusive that the government should not be allowed to search such devices at the border without reasonable suspicion of wrongdoing.

The documents expose the governments process for searching electronic devices at the borderand it is not reassuring. Although the government reports searching thousands of electronic devices a year at the border, the details of how it conducts these searches have been largely kept secret so far. ICEs policy states that electronic device searches should generally be completed within 30 days, but it took some seven months for the government to complete its search of Houses information and conclude that there was no evidence of wrongdoing data. During that period, Houses devices were imaged multiple times and shared with another government agency, the Army Criminal Investigation Division.

Unfortunately, Houses case is not an isolated incident. The that 4,957 passengers had their electronic devices searched between October 1, 2012 and August 31, 2013, and an additional 4,898 individuals were subject to electronic device searches the previous year.

We have no way of knowing how many of those searches may have been carried out not to search for contrabandwhich is the reason ICE has been granted such broad search powersbut to exploit border search powers to evade the Constitution.

Learn More 勛圖眻畦 the Issues on This Page