Can ICE access encrypted apps on my phone at the border without a warrant?

Checked on December 16, 2025
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

This fact-check may be outdated. Consider refreshing it to get the most current information.

Executive summary

Border agents and ICE have broad technical means to access phone data at or near the border, including tools that can read encrypted app content after compromising a device; reporting says some spyware (Paragon/Graphite) can "open and read information held on encrypted applications" and can be triggered remotely by a message [1] [2]. Legal and policy questions remain unresolved in reporting: news outlets and civil‑liberties groups say it is unclear when and whether ICE obtains warrants before using such tools [3] [2].

1. What reporters and advocates say agents can do: modern spyware that defeats app encryption

Multiple outlets report that contractors sell spyware to U.S. immigration agencies that can take control of phones and extract messages, photos and location — including content from end‑to‑end encrypted apps such as WhatsApp or Signal — by compromising the device itself [1] [2] [4]. NPR and The Guardian describe Graphite/Paragon‑class tools that can “start monitoring a phone — including encrypted messages — just by sending a message to the number” or otherwise remotely implanting code [2] [1].

2. What government policy and practice reporting shows: capability exists, oversight murky

Reporting documents ICE and DHS procurement of new surveillance tech — facial recognition apps, cell‑site simulators, and contracts linked to spyware — and shows that agencies have integrated mobile surveillance into investigative workflows [5] [6] [7]. Coverage and watchdogs repeatedly note a lack of public detail about how those tools are deployed and supervised, leaving open whether warrant practices fully cover spyware use [2] [3] [6].

3. The warrant question in the public record: uncertainty, lawsuits, and FOIA fights

Journalists and privacy groups report they do not know whether ICE secures warrants before deploying intrusive mobile hacking tools. NPR says ICE did not answer questions about whether its Paragon contract covers Graphite or if warrants are used [2]. The Post and civil‑liberties lawyers quoted in reporting say “we don't know if law enforcement or ICE are getting search warrants to deploy this spyware” [3]. Advocacy groups have filed lawsuits and FOIA requests seeking records about cell‑site simulators and other capabilities [8] [9].

4. Border search law and its gaps in reporting: what sources mention and what they don’t

Sources here document long‑standing broad powers for border searches of electronic devices and agency directives that permit device inspection without individualized suspicion in some cases, but the provided reporting does not include a definitive legal timeline or a court ruling saying ICE can use remote phone‑hacking at the border without a warrant (available sources do not mention a definitive court decision allowing or forbidding Paragon/Graphite use at the border). News coverage emphasizes capability and secrecy rather than establishing a clear, public legal standard [2] [8].

5. How technology sidesteps "encryption": device compromise vs. cryptographic breaking

The journalism distinguishes two paths into encrypted content: breaking encryption (computationally infeasible for modern end‑to‑end systems) and compromising the device itself so the phone reveals plaintext — spyware does the latter, giving access to encrypted apps by reading messages after they are decrypted on the device [1] [2]. Reports state Paragon‑class tools effectively "take control" of phones and consequently can access app content and location data [1].

6. Conflicting viewpoints: agency statements vs. civil liberties concerns

ICE/DHS materials cited in reporting claim new biometric and field‑ID tools include encryption and access controls; civil‑liberties groups and reporters counter that those safeguards are insufficient without statutory limits, audits, and transparency [7] [3]. The Guardian, NPR and nonprofit analyses present surveillance expansion as both technically feasible and legally opaque; DHS/ICE official claims about controls appear in the record but are criticized as inadequate [7] [2] [1].

7. Practical takeaways and unresolved questions

Reporting shows ICE has access to powerful mobile‑hacking and mobile‑surveillance tools that can render app encryption moot by compromising phones, and journalism and advocates say whether warrants are obtained for such hacks remains unclear [2] [1] [3]. Key unresolved items in the available reporting: definitive public rules or court rulings on warrant requirements for spyware at the border, the frequency of spyware use, and full contract details — these remain subject to FOIA and litigation [2] [9] [3].

Limitations: This analysis uses only the provided reporting. It does not assert legal conclusions beyond what those sources state; it highlights the technical capabilities reported and the transparency gaps that make the warrant question unsettled in public records [2] [1] [3].

Want to dive deeper?
Can U.S. Customs and Border Protection or ICE search my phone without a warrant at land, air, and sea ports of entry?
What Supreme Court rulings govern device searches at the border and how do they apply to encrypted apps?
What legal tools do ICE agents use to bypass phone encryption (forensic tools, extracted backups, biometrics)?
How can travelers protect encrypted data and communications when crossing U.S. borders (best practices and legal options)?
Are there recent bills or policy changes (2024–2025) affecting government access to encrypted devices at the border?