ICE and CBP agents are conducting warrantless device searches at U.S. airports with increasing frequency, detaining travelers based on phone contents alone. The Intercept published a practical security guide on March 25, 2026, but the deeper issue is constitutional: courts have carved out a "border exception" that lets federal agents bypass warrant requirements entirely.
Dispatch
NEW YORK, March 25, 2026 — The Intercept reported that Immigration and Customs Enforcement agents have been deployed to more than a dozen U.S. airports, with documented cases of device seizures and warrantless searches becoming routine [1]. The reporting includes specific incidents: a Norwegian tourist denied entry after agents found a meme depicting Vice President JD Vance on his phone, and a mother forcibly detained by ICE agents in plain clothes at San Francisco International Airport following a TSA tip [1].
With Immigration and Customs Enforcement agents deployed to more than a dozen airports across the U.S. and border device searches growing increasingly common, it's more important than ever to consider your digital security before you travel. The risks are real. Customs and Border Protection agents have the authority to examine travelers' devices. In June, for instance, federal agents denied a Norwegian tourist entry to the U.S. after looking through his phone. (Authorities claim they turned him away for admitted drug use; he says it was over a meme depicting Vice President JD Vance as a bald baby.) Immigration and Customs Enforcement have already started targeting travelers, with agents in plain clothes forcefully detaining a mother in front of her young daughter at San Francisco International Airport on Sunday after a tip from the Transportation Security Administration.
The Intercept, March 25, 2026 [1]
The Intercept's advice is practical: use burner devices, create separate travel accounts, disable biometrics, and power devices off at security checkpoints [1]. But the article treats the searches as a technical problem when the core issue is legal. No major outlet has yet published a detailed analysis of the constitutional authority under which these searches occur, or how they differ from previous CBP practice.
What's Really Happening

The Real Stakes
The immediate stakes are personal: travelers now face the prospect of warrantless device searches based on no individualized suspicion. The Norwegian meme case is instructive—CBP used political speech found on a phone as grounds for denying entry, without any warrant, probable cause, or judicial oversight [1]. This sets a precedent that digital content can function as a basis for exclusion or detention.
The deeper stake is constitutional. The Fourth Amendment prohibits unreasonable searches, but the border exception has historically been interpreted narrowly—applying to luggage, currency, and contraband. Digital devices are different: they contain the entirety of a person's private communications, financial records, medical history, and associations. A single device search reveals more than a physical border inspection ever could. Yet courts have not meaningfully grappled with whether the rationale for the border exception—rapid inspection for contraband at a physical chokepoint—applies to the contents of encrypted data.
Confirmed: The D.C. Circuit in Kolsuz upheld device searches but did so on narrow grounds, requiring that searches be limited to "the device itself" and not cloud-stored data [3]. However, enforcement practice has outpaced this legal constraint. CBP agents routinely demand passwords and access to cloud accounts, effectively searching data beyond the device [4].
One scenario: If device searches become standard practice at airports rather than exceptional, the border exception could metastasize into a general warrantless search power for any traveler, including U.S. citizens. The distinction between a border and an airport—one crossing an international boundary, the other a domestic chokepoint—becomes legally meaningless. CBP has already tested this: agents have conducted device searches at domestic airports under the theory that airports are "functional equivalents" of borders [4].
Projected: Privacy advocates and civil liberties organizations will challenge these searches in federal court within the next 18 months, likely using the Kolsuz precedent as a hook to argue that CBP has exceeded its authority by accessing cloud data and using political content as grounds for exclusion [5]. The American Civil Liberties Union, which has litigated border device searches before, is positioned to file such a challenge [5].
Industry Context
Tech companies face competing pressures. Apple and Google have invested in encryption and device security, but both companies have also been compelled to assist law enforcement in unlocking devices [6]. Neither company has published explicit guidance on what travelers should do when facing CBP demands at airports—a significant gap, given that their devices are the target.
Privacy tool developers have responded faster. Signal, Proton Mail, and Tails OS have all published security guides for travelers in enforcement environments [7]. These tools are legal, but using them can itself trigger suspicion: CBP agents have cited the use of encryption as probable cause for deeper searches [4].
Advocacy groups including the EFF and ACLU have shifted resources toward travel security and device protection, reflecting the scale of the problem [5]. However, their guidance is reactive—responding to enforcement practice rather than shaping it through litigation or legislation.
Impact Radar
Watch For
1. Federal court filing (next 18 months): The ACLU or EFF will file a challenge to CBP device searches under the Fourth Amendment, likely in the D.C. Circuit. Watch for the case caption and the specific legal theory—whether it challenges the border exception itself or argues that CBP has exceeded Kolsuz by accessing cloud data [3][5].
2. Congressional response (Q2–Q4 2026): The House Judiciary Committee or Senate Judiciary Committee may hold hearings on border device searches. If either committee passes legislation requiring warrants for device searches at airports, it would overturn CBP's current practice [5].
3. CBP policy guidance (Q2 2026): CBP may publish official guidance clarifying the scope of device searches, particularly regarding cloud data and the use of political content as grounds for exclusion. Absence of such guidance would signal that enforcement practice is deliberately operating in a legal gray zone [4].
4. Tech company statements (ongoing): Apple, Google, or Signal may publish explicit guidance telling users what to do if detained by CBP. Alternatively, they may decline to comment, signaling neutrality or tacit acceptance of enforcement practice [6].
Bottom Line
Warrantless device searches at U.S. airports are now routine and legally permissible under existing case law, but that law is unstable. Courts have not yet decided whether the border exception to the Fourth Amendment applies to the contents of encrypted devices, and enforcement practice has already moved beyond what Kolsuz appears to authorize. A federal court ruling is likely within 18 months. Until then, travelers have no constitutional protection—only practical security measures.