CBP to continue searches of travelers’ laptops

The Homeland Security Department announced on Thursday that it will continue to allow Customs and Border Protection officials to search travelers' laptop computers and other electronic devices without suspicion of wrongdoing.

The practice of searching travelers' electronic devices without suspicion has been controversial. In April 2008, a 9th Circuit Court of Appeals judge ruled CBP agents do not need reasonable suspicion to search travelers' laptops, smart phones and other electronic devices.

In June 2009, the Senate Judiciary Subcommittee on the Constitution, Civil Rights and Civil Liberties held a hearing on the issue, which has been challenged in court 11 times by individuals convicted of having child pornography on their laptops.

Homeland Security released two directives on Thursday, indicating the Obama administration will continue the practice of suspicionless searches, much to the dismay of privacy advocates. Group such as the Electronic Frontier Foundation and the American Civil Liberties Union have opposed the practice, saying it is invasive and likely to lead to racial and religious profiling.

"Keeping Americans safe in an increasingly digital world depends on our ability to lawfully screen materials entering the United States," said DHS Secretary Janet Napolitano. "The new directives announced today strike the balance between respecting the civil liberties and privacy of all travelers, while ensuring DHS can take the lawful actions necessary to secure our borders."

The new directives describe the department's policy on searching travelers' laptops, cell phones and other electronic devices in-depth and set a five-day limit on Customs and Border Protection searches. Immigration and Customs Enforcement special agents are allowed up to 30 days to search an electronic device. The new rules require agents to get a supervisor's approval before confiscating a device and CBP must notify travelers where their device is being kept.

But the changes don't go far enough, according to Christopher Calabrese, counsel for the ACLU's Technology and Liberty program.

"Essentially, they retain the power to look at any laptop at any time," Calabrese said. "Our reaction is that we still haven't reached the core problems of the searches -- the totally suspicionless search of anyone with a laptop and anything on a laptop."

Calabrese said in addition to protecting sensitive information like legal documents or medical records that might be on the devices, his organization is concerned about CBP agents using the policies to profile minorities. The policy is misguided, given that anyone attempting to smuggle data into the United States could easily do so from anywhere in the world via an encrypted e-mail, he added.

"There have been a number of reports from advocacy organizations, Muslim advocates, describing people clearly targeted because of religion and race," Calabrese said. "We take it too much for granted in this country sometimes, that when we're talking about security it's OK to do nudge-and-wink racial profiling. But it's not, and it doesn't have security value."

Customs and Border Protection searched approximately 1,000 laptops between Oct. 1, 2008, and Aug. 11, 2009, 46 of them in-depth.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.