Caleb Wheeler, PhD Student in International Law, Middlesex University, London
One of Donald Trump’s first actions as president of the United States was to issue an Executive Order banning the citizens of seven Muslim majority countries, Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen from entering the United States for a period of 90 days. He justified the ban on the grounds that it would be detrimental to the United States if citizens of those states were permitted to enter the country while a review was being conducted of the existing screening and vetting procedures utilized to determine whether a person should be issued an entry visa. The implementation of the ban was halted by the issuance of temporary restraining orders by multiple federal district courts, and on 9 February, the Ninth Circuit Court of Appeals refused to stay enforcement of those temporary restraining orders. Unperturbed, President Trump issued a second executive order on 6 March in which he sought to ban citizens from six of the seven countries identified in the first ban (having removed Iraq from the original list) from entering the United States. That executive order was also challenged in Court, and federal district courts in Hawai’i and Maryland again prevented its implementation through the issuance of restraining orders. While much of the attention given to the travel bans focuses on the discriminatory effects they have on Muslims from certain countries, considerably less consideration has been given to the types of screening and vetting procedures the administration wishes to impose and the potential effects these new measures would have on the rights of all travelers to the United States. This blog post will demonstrate that policies requiring foreign travelers to reveal private electronic data are impermissible under United States’ domestic law and international law and should be avoided.
Both bans are titled ‘Executive Order Protecting the Nation from Foreign Terrorist Entry into the United States’ and have the stated purpose of improving “the screening and vetting protocols and procedures associated with the visa-issuance process”. The goal of these improvements is to identify those individuals seeking to fraudulently enter the United States, and those that support terrorism, violent extremism, acts of violence towards any group of people within the United States or who prevent a risk of causing harm following entry. A number of specific techniques have been suggested to promote the proper identification of individuals falling into these categories, including: in-person interviews, the creation of a database of identity documents and amending application forms so as to better identify fraudulent answers. More general methods have also been proposed involving the development of mechanisms to determine whether applicants are not misrepresenting their identities, whether they may commit, aid or support violent terrorist acts after entering the United States and a catch-all category permitting the government to use “any other appropriate means for ensuring the proper collection of all information necessary for a rigorous evaluation of all grounds of inadmissibility”.
It is these latter, more general, categories that cause consternation, particularly in light of recent media reports suggesting that the new screening and vetting requirements could require foreign visitors to reveal their mobile phone contacts, social media passwords and financial data before gaining entry to the country. According to a senior Department of Homeland Security official, the goal of collecting mobile phone contact information is to learn the identities of those individuals who potential visitors are communicating with. Additionally, the secretary of the Department of Homeland Security previously stated that the purpose of demanding that people reveal their passwords is to allow the United States government to “see what they do on the internet.”
These proposals raise significant national and international right to privacy concerns. Domestically, the Fourth Amendment of the United States Constitution prohibits the unreasonable search and seizure of a person’s property and requires that search warrants be supported by probable cause. In 2014, the United States Supreme Court held in Riley v California that the police need a warrant to search the information contained on a mobile phone confiscated during a lawful arrest. That decision was based on a finding that mobile phone owners have a privacy interest in the data contained therein that can only be intruded upon through a valid warrant. Recently introduced bills in the Senate and House of Representatives seek to extend the warrant requirement set out in Riley v. California to searches of “electronic equipment and online accounts” occurring at the United States’ borders. The bills specifically state that there is a reasonable expectation of privacy about a persons’ digital content of their electronic information and online accounts and that it is unreasonable under the Fourth Amendment to permit border agents to access electronic equipment without a warrant. The bills do explicitly limit that right to privacy to “United States Persons” as described in 50 U.S. Code § 1801, a designation which encompasses citizens of the United States, lawful aliens with permanent residence and corporations incorporated in the United States. Despite this limitation, the general proposition remains that the right to privacy limits access to information contained on mobile devices. Further, the Fourteenth Amendment of the Constitution entitles non-citizens to equal protection under the law and the Supreme Court has specifically granted non-citizens the right to challenge government actions infringing on rights delineated in the Constitution. Therefore, any measures requiring individuals to produce that information would be unlawful.
International law also invalidates any argument that the right to privacy only extends to American citizens and other lawful residents. Article 17 of the International Covenant on Civil and Political Rights (ICCPR, or ‘the Covenant’), which the United States ratified in 1992, explicitly forbids the arbitrary or unlawful interference with an individual’s privacy. When delineating what sort of information States Parties must put in their reports to the Human Rights Committee, interference was described as unlawful when it does not comply with the laws of the State seeking to interfere with an individual’s privacy, and it is arbitrary when it does comply with the State’s laws, but where those laws are not in accord with the provisions, aims and objectives of the Covenant. The Committee goes on to find that interference with the right to privacy must be reasonable under the particular circumstances and should only be authorised to the extent that it is essential to the interests of society that such information is disclosed. This is a high bar to clear, and requires a case-by-case inquiry into each situation. Therefore, even if it could be shown that the information sought is essential to the interests of the United States, that it is reasonable to infringe on the right to privacy and that the right to privacy as it is understood in the United States does not prevent access to the information, a blanket demand that all foreign visitors provide contact, password and financial information will fail as it will not comply with the required fact specific inquiry.
In a 2013 resolution, the General Assembly of the United Nations clarified the parameters of the right to privacy as it pertains to digital information. The General Assembly specifically indicated that it was “deeply concerned” about the collection of personal data and its impact on the exercise and enjoyment of civil rights and emphasised that the unlawful or arbitrary collection of personal information is a highly intrusive act that violates the right to privacy. It called upon all states to respect the right to privacy and to establish measures meant to implement their human rights obligations. Although non-binding, this resolution indicates a rejection by the world community of the sort of measures the Trump administration hopes to impose. The General Assembly resolution also requested that the United Nations Commissioner for Human Rights submit a report addressing the right to privacy in the digital age. Although the resulting report primarily focused on information accumulated through mass surveillance programmes, it did clarify that, in addition to the requirements set out by the Human Rights Committee, any limitation on the right to privacy has to comply with other human rights and must not render the right meaningless. Limitations failing to meet these criteria are considered unlawful and/or arbitrary.
Therefore, it is important to examine whether limitations to the right to privacy also impact other human rights. In this instance, the proposed new screening and vetting requirements could act as an infringement on the First Amendment right to free speech. The First Amendment prevents the government from abridging the freedom of speech and allows people to make political statements critical of the government without fear of punishment, unless such statements are meant to incite imminent lawless action or constitute a legitimate threat to the president’s life. Knowing that their private statements could be subject to scrutiny by the United States’ government, and possibly act as a barrier to their entry into the country, could prevent individuals from speaking freely out of fear of the possible repercussions. This is particularly true where, as here, a person can enter the United States is left to the discretion of an individual Customs and Border Protection officer, and entry can be denied even if the traveler possesses a valid visa.
The ICCPR also forbids the infringement of free speech, although it characterizes it as two rights: the freedom of expression and the freedom of opinion. The freedom of opinion, as set out in Article 19, is not subject to any exception or restriction, meaning the government is not permitted to infringe upon it in any way. By comparison, the freedom of expression, which includes any type of dissemination of ideas, can be limited for national security reasons. Therefore, the proposed screening and vetting cannot limit a person’s ability to hold an opinion but they can limit whether the person can express that opinion. However, the standard for implementing such a restriction is high and they will only be found lawful if they are necessary to protect national security and are not overbroad so as to exceed their protective function.
Screening and vetting procedures that require foreign visitors to disclose private digital information raise First Amendment and Fourth Amendment concerns and are of dubious constitutionality. Further, even if these significant Constitutional issues can be overcome, such measures are also impermissible under international law. That is unlikely to act as much of a impediment on President Trump’s attempts to implement these procedures as he has demonstrated hostility towards international human rights law during his presidency. The best hope to avoid this proposed widespread violation of the Constitution is for the Federal Courts to continue to play their important role in upholding the rights of individuals.
*Picture courtesy of usa.gov
Thanks for that important and interesting post , I do agree generally speaking , yet , would reach the same conclusion ( potentially ) in other path or method ( bit more balanced ) :
The author of the post , asserts clearly , that :
” A blanket demand that all foreign visitors provide contact , password and financial information will fail …… ”
End of quotation :
The author insists justifiably , on that differentiation between innocent persons and others , for them, authorities have no probable cause for search and warrant, and of course Vs. those that a search would be justified, due to probable cause, yet:
Whatsoever , screening and searching , occur in borders . It is anyway a ” blanket demand ” even for US citizens . The author presumes , that searching bags , or screening bodies , is legitimate ( as blanket ) while searching digital data , is not !! Why would one consider, the latter, as greater invasion of privacy ?? while basic searches , occurring on daily basis , are a routine , and even with greater invasion to privacy .
So, once we assume , that a person , can’t enter or leave the borders , without a search , whatsoever so , we must focus on rationality . If the rationality , or the purpose is security indeed ( national security ) we must ask ourselves , what is the connection , rational connection , and it would be :
Searching weapon , and explosives . In this regard , traditional and practice existing searchs , is rational , and fit the purpose as such , but :
Why digital data , would fit the purpose ?? Nothing in it, can constitute imminent danger, whatsoever, but vaguely and in the long run. Moreover :
The state , can have other proportional means , for verifying the digital profile of one passenger , without such intrusion :
Simply, if they know or legally obtained , the identity of the person (nationality, full name, number of passport) they can search, by themselves, in social media (Google, NSA and so forth) without intruding the private electronic device and data therein.
For the rest , falling short , out of complications …..
Just clarifying and adding and emphasizing:
By searching, social media profile , a police officer, is exposed (unwittingly even , by the way so ) to many private and intimate items, having nothing to do with social media, and national security anyway (for example, intimate pictures of one passenger). All that, while, whatsoever, social media is caught or can be caught , it is opened and exposed anyway typically to plain view , publically so (like a page on Facebook or twitter account). Yet, not necessarily, other intimate data, exposed to an officer, while in casual (by the way).
just an interesting link in this regard :
A great link that also relates to Mr. Trump, specifically on the Paris Accord: