Defending Privacy at the Israeli Border: Information for Travelers Carrying Digital Devices
By Jillian C. York and Jonathan Klinger | EFF | June 25, 2012
As we’ve acknowledged before, our lives are increasingly contained on our digital devices, which makes travel—and the decisions we make about what to carry with us—increasingly complicated.
A recent case in which two young travelers to Israel were requested not simply to provide their laptops for arbitrary searches, but to log in to their e-mail accounts and allow Israeli officials to search through their e-mail for specific strings and correspondence highlights the increasing obstacles to privacy that travelers face, as well as the increasingly global nature of security theatre.
In that particular case, the two young women—both of Palestinian origin—complied with officials’ requests but were nonetheless detained overnight before being deported. In another, similar case, a U.S. citizen who refused access to her email was told she was probably hiding something and was refused entry to the country. Israeli security (Shin Bet) told a reporter that “the actions taken by the agents during questioning were within the organization’s authority according to Israeli law.”
Not unlike travelers to the U.S., travelers to Israel face serious privacy challenges at the border. The government generally has broad authority to search through your personal possessions, including your laptop, for any reason at all. When you cross the border to Israel, the Israeli government retains the authority to question you and examine your belongings, which it interprets as also allowing it to go through your electronic devices and computer files. More recently, authorities have also been known to demand user passwords to online accounts.
As we state in our guide to U.S. border searches:
For doctors, lawyers, and many business professionals, these border searches can compromise the privacy of sensitive professional information, including trade secrets, attorney-client and doctor-patient communications, research and business strategies, some of which a traveler has legal and contractual obligations to protect. For the rest of us, searches that can reach our personal correspondence, health information, and financial records are reasonably viewed as an affront to privacy and dignity and inconsistent with the values of a free society.
EFF recently asked Jonathan Klinger, an Israeli attorney, for his thoughts on the law and government practices that apply to searches at the Israeli border, and here is his analysis.
The Situation at the Israeli Border
At the Israeli border, there are some limited legal protections against the search itself. Based on a collection of experiences, however, it seems that mentioning these protections to border officials can be considered antagonism, and can limit your ability to enter Israel. Those concerned about the security and privacy of the information on their devices at the border should therefore use technological measures in an effort to protect their data. They can also choose not to take private data across the border with them at all, and then use technical measures to retrieve it from abroad.
There is, however, little to prevent a scenario in which one’s email is searched, as refusal to allow the search may result in deportation. With that in mind, concerned travelers should think ahead and review their online accounts before traveling.
Why Can My Devices Be Searched at the Border?
Article 7 of Israel’s Basic Statute of Human Dignity and Freedom1 states that every person is entitled to his privacy, and that his property may not be searched, apart from where it is required under legal authority. This generally means that the government has to show probable cause that a crime has been committed and get a warrant before it can search a location or item in which you have a reasonable expectation of privacy; moreover, a recent Supreme Court ruling stated that there is no such thing called consensual search,2 and where there is no probable cause, the state cannot rely on a person’s consent in order to search in his possessions. But searches at places where people enter or leave Israel are subject to different statutes. The two applicable statutes are the Aviation Act (Security in Civil Aviation), 19773and the General Security Service Act, 20024; the two acts altogether provide two different state authorities the right to search on a person’s body and in his property. However, they do not refer to computer searches at all.
The Aviation Act allows security personnel, police officers, soldiers and members of the civil defense forces to search at border crossings if “the search is required, in [the officer’s] opinion, to keep the public’s safety or if he suspects that the person unlawfully carries weapons or explosives, or that the vehicle, the plane or the goods has weapons or explosives.”
Similarly, the General Security Service Act states that in order to prevent unlawful activities, secure persons or any other activity that the government authorized with the approval of the Knesset committee for the Shin Bet5 to perform, any employee of the Shin Bet (the service) may search a person’s body, property, baggage or other goods and collect information, as long as the person is present.
Only in extreme cases, where there is an object that needs to be seized for a vital role in the Shin Bet’s activity, can the Shin Bet also search without a person’s presence.
However, nothing in these acts authorizes computer searches. Recently, the Israeli Justice office proposed a new anti-terror bill,6 which is yet to pass through the legislative process. This Anti-Terror bill does request to correct the current General Security Service act to specifically state that computers may be searched.
How the Government Searches Devices at the Border
There are three government agencies primarily responsible for inspecting travelers and items entering Israel: the General Security Service (Shin Bet), The Customs Authority and the Immigration authority.
The law gives the Shin Bet and other officials a great deal of discretion to inspect items coming into the country. There is no official policy published in respect to border search of electronic devices and accounts. And when recently requested to comment, the Shin Bet stated that its acts are “according to law.”
Recently, the Israeli Foreign Ministry admitted that it used Facebook in order to create a blacklist of activists who were then—along with a number of uninvolved and mistakenly identified individuals—banned entry to the country amidst the Flytilla events. If you are active on one or more social networks and express opinions about Israel, you carry a greater risk of being profiled and selected for search.
Keep in mind that the Shin Bet can keep your computer or copies of your data for “the time required for the seizure.” There is no specific consideration regarding forensic practices and the ways that your computer files may be copied during the seizure. This is unlike the Israeli Criminal Procedure Order (Arrest and Search), 1969,7 which deals specifically with the forensic procedures of copying computer materials and requires two witnesses for any file duplication.
The Israeli Customs Authority, under Article 184,8 allows any customs official to search every person for contraband or drugs given probable cause. Moreover, the customs official may also request urine, blood or saliva samples and request persons to undress. However, nothing in the law allows them to search through computer materials.
In short, border agents have a lot of latitude to search electronic devices at the border or take them elsewhere for further inspection for a short period of time, whether or not they suspect a traveler has done anything wrong.
We do not have the exact numbers or methods of how such searches are handled, and the Shin Bet is exempt from the Israeli Freedom of Information Act.9; However, the frequency of technology-oriented searches at the border may increase in the future. Researchers and vendors are creating tools to make forensic analysis faster and more effective, and, over time, forensic analysis will require less skill and training. Law enforcement agencies may be tempted to use these tools more often and in more circumstances as their use becomes easier.
Travelers should consider taking the same precautions outlined in EFF’s guide to carrying digital devices across the United States border.
Share this:
Related
June 25, 2012 - Posted by aletho | Civil Liberties, Full Spectrum Dominance, Solidarity and Activism, Timeless or most popular | Electronic Frontier Foundation, General Security Service Act, Israel, Israeli Border, Jillian C. York, Jonathan Klinger, Shin Bet
No comments yet.
Featured Video
Bombing Iran Back Into the Stone Age /Lt Col Daniel Davis & Jim Jatras
or go to
Aletho News Archives – Video-Images
From the Archives
The Occupied Mentality Syndrome
Saudi Arabia on the American chessboard – Part 2
By B. J. Sabri | American Herald Tribune | April 19, 2016
Since the Korean War, but particularly since the Iranian Revolution of 1979 until today, the United States has been steadily escalating its military presence in the Persian Gulf. Taking advantage of many colossal events of the past 36 years, [1] the hyper-empire has institutionalized its massive presence on land and sea, and expanded its objectives to include the unambiguous physical control of the area, as well as the clear understanding that local Arab governments should abide by them. The pretext is always the same: in “defense” of the national interests and security of the United States. From observing how the United States has been interacting with the governments of the region, and by judging from the size of its expeditionary force, we could reach a basic conclusion. The United States is occupying, de facto, the entire Arabian Peninsula. (Yemen, devastated by Saudi and American jets is yet to be conquered. Oman? Britain returned not as colonial ruler but as a soft occupying power.)
Under this articulation, Saudi Arabia, Qatar, Kuwait, and the United Arab Emirates are virtually occupied countries. If we compare this type of occupation to the mandate and protectorate regimes of the past, the results might be identical—the nations affected by it lose sovereignty. When Arab governments comply with the objectives of a foreign power that station military forces on their national milieu, then that power controls them in multiple ways including how they react to policy deliberations and what decisions they intend to take on specific issues. A good method to verify the concept of effective occupation is this: take notice of what the United States says and wants, and then compare it to what the gulf rulers do in response. (I shall discuss this detail at some point in the upcoming parts.)
If the presence of US forces or other means of political pressure are a factor in Saudi Arabia’s interventionist Arab wars, then we need to debate this issue. However, from the history of resistance to colonialism, we learnt: if a powerful state imposes its order on a nation by military means or other forms of coercion, and if this nation does not resist that imposition, then a mental subordination to the powerful state will ensue. This is especially true in the case of Saudi Arabia. One single event, 9/11, has transformed it from a US “ally” into an instant political hostage of the American Empire. … continue
Blog Roll
-
Join 2,444 other subscribers
Visits Since December 2009
- 7,436,427 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen Zionism
Aletho News- One Of America’s Leading Neo-Cons Has Turned Against The Iran War And Israel
- Attack in the Bosphorus exposes NATO weaknesses and tensions among allies
- BREAKING: US JET SHOT DOWN OVER IRAN /Lt Col Daniel Davis & Nima Alkhorshid
- Now everyone is dumping US government bonds
- Brazilian Congressman seeks to bar Israeli military personnel from entering Brazil
- Official reveals evidence of Arab states’ involvement in US-Israeli war on Iran
- His Majesty’s head-chopper: Syria’s MI6-backed president bows to King Charles
- Forced to backtrack: ‘Israel’ drops Hezbollah disarmament goal
- Britain’s Lebanon surveillance network: A digital map for war
- Bahrain faces scrutiny for opposition crackdown after detainee killed
If Americans Knew- Israel Is Blocking Palestinians from Easter at Church Where Jesus Resurrected
- Plot to assassinate Palestinian activist follows harassment campaign promoted by Zionist groups and elected officials
- Prominent New York synagogue hosts presentation on why U.S. Jews should support the ethnic cleansing of Gaza
- Tapper vs. Piker: Is the CNN Anchor Auditioning for David Ellison?
- Shouldn’t Democrats Be Able to Condemn Genocide?
- Israel-US kill negotiators, destroy civilian structures, but Iran’s military capabilities still largely intact – Daily Update
- ‘War crime’: Global condemnation as Israeli ministers celebrate death penalty law targeting Palestinian prisoners
- 7 Ways Israel Is Turning Lebanon Into Gaza
- World’s Leading Football Bodies Under Fire Over Israel Policies
- Experts warn of possible use of nukes against Iran
No Tricks Zone- Low Intensity Tornado Wrecks Major Solar Farm, Creating A Potential Toxic Dump
- New Study Finds Warming Saves Lives…Cold Temperatures 12 Times More Deadly Than Excess Heat
- German Science Blog Accuses PIK Climate Institute Of Hallucinating Climate Tipping Points
- Devastating Assessment Of Comirnaty Vaccine By Former Senior Pfizer Europe Toxicologist
- New Study: CO2 Is ‘Effectively Negligible’ As An Explanatory Climate Change Factor Since 2000
- Former Pfizer Toxicologist Dr. Helmut Sterz Tells Bundestag Hearing Pfizer Vaccine Should Have Never Been Approved
- Energy Expert: Germany’s Nuclear Phaseout Was A “500 Billion Euro Mistake”
- New Research: South Australia’s Mid-Holocene Sea Surface Temperatures Were 4°C Warmer Than Today
- Storing Green Energy To Last Germany 10 Days Would Require A 60-Million Tonne Battery
- New Studies: UK Sea Levels Were 4 Meters Higher Than Today During The Mid-Holocene
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment