{"id":188733,"date":"2017-04-21T02:08:10","date_gmt":"2017-04-21T06:08:10","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-bill-of-rights-at-the-border-fifth-amendment-protections-for-eff\/"},"modified":"2017-04-21T02:08:10","modified_gmt":"2017-04-21T06:08:10","slug":"the-bill-of-rights-at-the-border-fifth-amendment-protections-for-eff","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fifth-amendment\/the-bill-of-rights-at-the-border-fifth-amendment-protections-for-eff\/","title":{"rendered":"The Bill of Rights at the Border: Fifth Amendment Protections for &#8230; &#8211; EFF"},"content":{"rendered":"<p><p>    This is the third and final installment in our series on the    Constitution at the border. Today, well focus on the Fifth    Amendment and passwords. Click here for     Part 1 on the First Amendment or     Part 2 on the Fourth Amendment.  <\/p>\n<p>    Lately, a big question on everyone's mind has been: Do I have    to give my password to customs agents?  <\/p>\n<p>    As anyone whos ever watched any cop show knows, the Fifth    Amendment gives you the right to remain silent and to    refuse to provide evidence against yourself  even at the    border. If a CBP agent asks you a question, you can tell them    you choose to remain silent and want to speak to an attorney,    even if you dont have one retained yet. That choice may not    stop CBP agents from pressuring you to voluntarily talk to    them, but they are supposed to stop questioning you once you    ask for a lawyer. Also, beware that government agents are    permitted to lie to you in order to convince you to waive your    right to remain silent, but you can be criminally prosecuted if    you lie to them.  <\/p>\n<p>    CBP agents are unlikely to advise you that you have this choice    because the government generally argues that such warnings are    only required if you are taken into custody and subjected to    a criminal prosecution. And at least one federal court of    appeals has determined that     secondary inspection  the separate interview area you get    referred to if the CBP officer cant readily verify your    information at the initial port of entry  doesnt qualify as    custody.  <\/p>\n<p>    But you dont have to be in custody or subject to a criminal    prosecution before you choose to invoke your Fifth Amendment    rights to remain silent or to object to being deprived of your    property without due process of law. For example, the     Second Circuit Court of Appeals has held that a persons    request for an attorney is enough to invoke the privilege    against self-incrimination, even at the border.  <\/p>\n<p>    And that privilege includes refusing to provide the password to    your device. For example, in 2015, a     Pennsylvania court held that you may properly invoke the    Fifth Amendment privilege to avoid giving up your cell phone    passcode  even to an employers phone  because your passcode    is personal in nature and producing it requires you to speak or    testify against yourself.  <\/p>\n<p>    Some courts have been less protective, overriding Fifth    Amendment protections where the information sought is a    so-called foregone conclusion. In 2012, a Colorado    court ordered a defendant to provide the password to her    laptop, only after the government had obtained a search    warrant based on the defendants admission that there was    specific content on her laptop and that the laptop belonged to    her. On appeal, the     Eleventh Circuit clarified that the government \"must    [first] show with some reasonable particularity that it seeks a    certain file and is aware, based on other information, that . .    . the file exists in some specified location\" and that the    individual has access to the desired file or is capable of    decrypting it.  <\/p>\n<p>    So, Fifth Amendment protections do apply at the border, and    they protect your right to refuse to reveal your password in    most circumstances. That said, individuals passing through the    border sometimes choose to surrender their account information    and passwords anyway, in order to     avoid consequences like missing their flight, being made    subject to more constrictive or prolonged detention, or being    denied entry to the US.  <\/p>\n<p>    As we have noted in our     Digital Border Search Whitepaper, the consequences for    refusing to provide your password(s) are different for    different classes of individuals. If you are a U.S. citizen,    CBP cannot detain you indefinitely as you have a right to    re-enter the country. However, agents may escalate the    encounter (for example, by detaining you for more time), or    flag you for heightened screening during future border    crossings. If you are a lawful permanent resident, agents may    also raise complicated questions about your continued status as    a resident. If you are a foreign visitor, agents might deny you    entry to the country entirely.  <\/p>\n<p>    But whatever your status, whether you choose to provide your    passwords or not, border agents may decide to seize your    digital devices. While     CBP guidelines set a five-day deadline for agents to return    detained devices unless a CBP supervisor approves a lengthier    detention, in practice, device detentions commonly last many    months.  <\/p>\n<p>    As always, we want to hear from you if you experience harm or    harassment from CBP for choosing to protect your digital data.    Were still collecting stories of border search abuses at:    <a href=\"mailto:borders@eff.org\">borders@eff.org<\/a>  <\/p>\n<p>    We recommend that you review our pocket guides for Knowing    Your Rights and Protecting    Your Digital Data Privacy at the border for a general    overview or take a look at our     Border Search Whitepaper for a deeper dive into the    potential issues and questions you may face.  <\/p>\n<p>    And join EFF in calling for stronger Constitutional protection    for your digital information     by contacting Congress on this issue today.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2017\/04\/bill-rights-border-fifth-amendment-protections-account-passwords-and-device\" title=\"The Bill of Rights at the Border: Fifth Amendment Protections for ... - EFF\">The Bill of Rights at the Border: Fifth Amendment Protections for ... - EFF<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> This is the third and final installment in our series on the Constitution at the border. Today, well focus on the Fifth Amendment and passwords. Click here for Part 1 on the First Amendment or Part 2 on the Fourth Amendment.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fifth-amendment\/the-bill-of-rights-at-the-border-fifth-amendment-protections-for-eff\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94880],"tags":[],"class_list":["post-188733","post","type-post","status-publish","format-standard","hentry","category-fifth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188733"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=188733"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188733\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=188733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=188733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=188733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}