port of entry and customs agent

Federal Court Rules That Warrantless Device Searches at Airports, Ports of Entry Violate Fourth Amendment

Under the terms of the ruling, border agents must demonstrate “individualized suspicion” of international travelers before officials can seize and search an electronic device.

Warrantless government searches of phones and laptops of international travelers at airports and American ports of entry are violations of the Fourth Amendment, a federal court in Boston ruled on Tuesday.

In 2017, the American Civil Liberties Union and the Electronic Frontier Foundation filed a lawsuit on behalf of 11 people whose devices were searched without warrants or “individualized suspicion” as they attempted to enter the United States. Ten of the travelers were American citizens, and one was a permanent U.S. resident, The Associated Press reported.

The court decision comes as the number of device searches at ports of entry has increased significantly. In 2018, the ACLU found that the federal government conducted more than 33,000 such searches, which was nearly four times the number of searches in 2015.

While the federal government has called the searches a crucial method to protect Americans from international and domestic threats, the ACLU and other advocacy groups have argued that they violate the rights of international travelers. Under the ruling, border officials would have to demonstrate “individualized suspicion of contraband before they can search a traveler’s device,” according to the ACLU.

“This ruling significantly advances Fourth Amendment protections for the millions of international travelers who enter the United States every year,” Esha Bhandari, staff attorney with the ACLU’s Speech, Privacy, and Technology Project, said in a statement. “By putting an end to the government’s ability to conduct suspicionless fishing expeditions, the court reaffirms that the border is not a lawless place and that we don’t lose our privacy rights when we travel.”

In previous statements about the lawsuit, the Department of Homeland Security said that all travelers, regardless of citizenship status, was subject to search by customs officers. They argue that important evidence of human trafficking, terrorism and intellectural property rights violations have been discovered as a result of the searches, according to the Associated Press.

However, the ACLU and other critics say that DHS officials’ targeting was too broad because officers were not only searching laptops and phones of targeted individuals but their associates, friends and families. Other searches were random, according to the DHS.

“This is a great day for travelers who now can cross the international border without fear that the government will, in the absence of any suspicion, ransack the extraordinarily sensitive information we all carry in our electronic devices," Sophia Cope, EFF senior staff attorney, said in a statement.

U.S. government officials have yet to make public statements on the ruling or if there are plans to appeal.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • 5 Tips to Improve Your Password Security

    Change Your Password Day is right around the corner. Observed every year on February 1, the day aims to raise awareness about cybersecurity and underscores the importance of keeping passwords strong and up to date. Read Now

  • Enhancing Port Security

    DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-leading technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security.To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. Read Now

  • Hot AI Chatbot DeepSeek Comes Loaded With Privacy, Data Security Concerns

    In the artificial intelligence race powered by American companies like OpenAI and Google, a new Chinese rival is upending the market—even with the possible privacy and data security issues. Read Now

  • Survey: CISOs Increasing Budgets for Crisis Simulations in 2025

    Today, Cyber Performance Center, Hack The Box, released new data showcasing the perspectives of Chief Information Security Officers (CISOs) towards cyber preparedness in 2025. In the aftermath of 2024’s high-profile cybersecurity incidents, including NHS, CrowdStrike, TfL, 23andMe, and Cencora, CISOs are reassessing their organization’s readiness to manage a potential “chaos” of a full-scale cyber crisis. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.