Can ICE or CBP legally demand my phone passcode in public without a warrant?

Checked on January 12, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

CBP and ICE operate under the longstanding “border search” exception, which generally permits warrantless searches of travelers and their belongings at ports of entry and similar locations, and agency policy explicitly contemplates examining electronic devices and using passcodes given by travelers to facilitate those searches [1] [2]. The constitutional and statutory limits on compelling a person to disclose a passcode are unsettled and litigated—courts have split over how far warrantless device searches can go, and plaintiffs and civil‑liberties groups continue to challenge CBP/ICE practices [3] [4] [5].

1. Legal baseline: the border search exception gives broad warrantless authority

The basic legal rule is that searches at international borders and their “functional equivalent” may be conducted without a warrant or probable cause under the border search exception, and federal courts and agencies have long treated electronic device inspection as falling within that doctrine when conducted at ports of entry [1] [6]. CBP and ICE have both relied on that principle in drafting policies that allow officers to inspect phones, laptops, and other devices presented by travelers entering or leaving the country [2] [6].

2. What CBP and ICE policies actually say about passcodes and access

CBP’s public guidance states travelers are “obligated to present their electronic devices and the information resident on the device in a condition that allows for the examination,” and if a device is locked by passcode or encryption it “may be subject to exclusion, detention, or other appropriate action or disposition,” while any passcodes provided will be used as needed and then deleted when no longer needed [2]. Agency policies distinguish between “basic” manual inspections and more intrusive “advanced” or forensic searches that use external extraction tools; both agencies retain authority to seize and copy devices and to share results with other law enforcement [7] [3].

3. Courts are split—and the Supreme Court has not resolved the line

While some federal decisions and commentary accept CBP’s authority to inspect devices without individualized suspicion, other courts have limited forensic, expansive searches and required higher showing—creating a patchwork where outcomes depend on jurisdiction and the type of search [8] [4]. District and circuit rulings have applied lessons from Riley v. California (which banned warrantless cellphone searches incident to arrest) in different ways, with some courts finding agency device policies “go beyond routine border searches” and others upholding broad powers pending congressional action [3] [4].

4. Refusing to provide a passcode: consequences differ by status and setting

Practical consequences of refusal vary: non‑citizens can be denied entry or face immigration consequences if they refuse to unlock devices, while U.S. citizens generally cannot be denied re‑entry but may have devices seized and subject to inspection or prolonged detention for secondary screening [9] [10] [5]. Civil‑liberties advocates warn that asserting refusal may not prevent CBP from seizing a device and that records or notes from the encounter can be retained, whereas agencies point to national‑security and immigration enforcement rationales for demanding access [5] [11].

5. Where the law is unsettled, and what that means for rights and reform efforts

Legal doctrine is unsettled on whether agents can compel the passcode itself (compulsion implicates Fifth Amendment issues) and on how Riley’s privacy reasoning applies at borders; scholars, the ACLU, and pending litigation argue for tighter limits, while CBP maintains its policies and safeguards on use/retention of information [10] [5] [7]. The result is a practical rule: at ports of entry CBP/ICE claim authority to demand access and can take adverse administrative steps for non‑cooperation, but the constitutional boundaries—especially for compelled disclosure of passcodes and forensic copying—remain contested in courts and may vary by circuit until higher courts or Congress set a uniform rule [3] [4].

Want to dive deeper?
What have federal courts ruled about forensic vs. manual searches of phones at U.S. borders?
Can the Fifth Amendment protect a traveler from being compelled to disclose a smartphone passcode at a border stop?
What policies and safeguards does CBP claim it uses to protect sensitive data discovered during device searches?