Defending Privacy at the Israeli Border: Information for Travelers Carrying Digital Devices
By Jillian C. York and Jonathan Klinger | EFF | June 25, 2012
As we’ve acknowledged before, our lives are increasingly contained on our digital devices, which makes travel—and the decisions we make about what to carry with us—increasingly complicated.
A recent case in which two young travelers to Israel were requested not simply to provide their laptops for arbitrary searches, but to log in to their e-mail accounts and allow Israeli officials to search through their e-mail for specific strings and correspondence highlights the increasing obstacles to privacy that travelers face, as well as the increasingly global nature of security theatre.
In that particular case, the two young women—both of Palestinian origin—complied with officials’ requests but were nonetheless detained overnight before being deported. In another, similar case, a U.S. citizen who refused access to her email was told she was probably hiding something and was refused entry to the country. Israeli security (Shin Bet) told a reporter that “the actions taken by the agents during questioning were within the organization’s authority according to Israeli law.”
Not unlike travelers to the U.S., travelers to Israel face serious privacy challenges at the border. The government generally has broad authority to search through your personal possessions, including your laptop, for any reason at all. When you cross the border to Israel, the Israeli government retains the authority to question you and examine your belongings, which it interprets as also allowing it to go through your electronic devices and computer files. More recently, authorities have also been known to demand user passwords to online accounts.
As we state in our guide to U.S. border searches:
For doctors, lawyers, and many business professionals, these border searches can compromise the privacy of sensitive professional information, including trade secrets, attorney-client and doctor-patient communications, research and business strategies, some of which a traveler has legal and contractual obligations to protect. For the rest of us, searches that can reach our personal correspondence, health information, and financial records are reasonably viewed as an affront to privacy and dignity and inconsistent with the values of a free society.
EFF recently asked Jonathan Klinger, an Israeli attorney, for his thoughts on the law and government practices that apply to searches at the Israeli border, and here is his analysis.
The Situation at the Israeli Border
At the Israeli border, there are some limited legal protections against the search itself. Based on a collection of experiences, however, it seems that mentioning these protections to border officials can be considered antagonism, and can limit your ability to enter Israel. Those concerned about the security and privacy of the information on their devices at the border should therefore use technological measures in an effort to protect their data. They can also choose not to take private data across the border with them at all, and then use technical measures to retrieve it from abroad.
There is, however, little to prevent a scenario in which one’s email is searched, as refusal to allow the search may result in deportation. With that in mind, concerned travelers should think ahead and review their online accounts before traveling.
Why Can My Devices Be Searched at the Border?
Article 7 of Israel’s Basic Statute of Human Dignity and Freedom1 states that every person is entitled to his privacy, and that his property may not be searched, apart from where it is required under legal authority. This generally means that the government has to show probable cause that a crime has been committed and get a warrant before it can search a location or item in which you have a reasonable expectation of privacy; moreover, a recent Supreme Court ruling stated that there is no such thing called consensual search,2 and where there is no probable cause, the state cannot rely on a person’s consent in order to search in his possessions. But searches at places where people enter or leave Israel are subject to different statutes. The two applicable statutes are the Aviation Act (Security in Civil Aviation), 19773and the General Security Service Act, 20024; the two acts altogether provide two different state authorities the right to search on a person’s body and in his property. However, they do not refer to computer searches at all.
The Aviation Act allows security personnel, police officers, soldiers and members of the civil defense forces to search at border crossings if “the search is required, in [the officer’s] opinion, to keep the public’s safety or if he suspects that the person unlawfully carries weapons or explosives, or that the vehicle, the plane or the goods has weapons or explosives.”
Similarly, the General Security Service Act states that in order to prevent unlawful activities, secure persons or any other activity that the government authorized with the approval of the Knesset committee for the Shin Bet5 to perform, any employee of the Shin Bet (the service) may search a person’s body, property, baggage or other goods and collect information, as long as the person is present.
Only in extreme cases, where there is an object that needs to be seized for a vital role in the Shin Bet’s activity, can the Shin Bet also search without a person’s presence.
However, nothing in these acts authorizes computer searches. Recently, the Israeli Justice office proposed a new anti-terror bill,6 which is yet to pass through the legislative process. This Anti-Terror bill does request to correct the current General Security Service act to specifically state that computers may be searched.
How the Government Searches Devices at the Border
There are three government agencies primarily responsible for inspecting travelers and items entering Israel: the General Security Service (Shin Bet), The Customs Authority and the Immigration authority.
The law gives the Shin Bet and other officials a great deal of discretion to inspect items coming into the country. There is no official policy published in respect to border search of electronic devices and accounts. And when recently requested to comment, the Shin Bet stated that its acts are “according to law.”
Recently, the Israeli Foreign Ministry admitted that it used Facebook in order to create a blacklist of activists who were then—along with a number of uninvolved and mistakenly identified individuals—banned entry to the country amidst the Flytilla events. If you are active on one or more social networks and express opinions about Israel, you carry a greater risk of being profiled and selected for search.
Keep in mind that the Shin Bet can keep your computer or copies of your data for “the time required for the seizure.” There is no specific consideration regarding forensic practices and the ways that your computer files may be copied during the seizure. This is unlike the Israeli Criminal Procedure Order (Arrest and Search), 1969,7 which deals specifically with the forensic procedures of copying computer materials and requires two witnesses for any file duplication.
The Israeli Customs Authority, under Article 184,8 allows any customs official to search every person for contraband or drugs given probable cause. Moreover, the customs official may also request urine, blood or saliva samples and request persons to undress. However, nothing in the law allows them to search through computer materials.
In short, border agents have a lot of latitude to search electronic devices at the border or take them elsewhere for further inspection for a short period of time, whether or not they suspect a traveler has done anything wrong.
We do not have the exact numbers or methods of how such searches are handled, and the Shin Bet is exempt from the Israeli Freedom of Information Act.9; However, the frequency of technology-oriented searches at the border may increase in the future. Researchers and vendors are creating tools to make forensic analysis faster and more effective, and, over time, forensic analysis will require less skill and training. Law enforcement agencies may be tempted to use these tools more often and in more circumstances as their use becomes easier.
Travelers should consider taking the same precautions outlined in EFF’s guide to carrying digital devices across the United States border.
June 25, 2012 Posted by aletho | Civil Liberties, Full Spectrum Dominance, Solidarity and Activism, Timeless or most popular | Electronic Frontier Foundation, General Security Service Act, Israel, Israeli Border, Jillian C. York, Jonathan Klinger, Shin Bet | Leave a comment
Featured Video
Rewriting the risk? Inside the government’s vaccine safety messaging
or go to
Aletho News Archives – Video-Images
Book Review
“Davos Can Really Replace the UN”
Inside the book that maps the architecture behind global governance — from the Epstein files to the Pact for the Future
Lies are Unbekoming | April 1, 2026
On June 13, 2019, the United Nations and the World Economic Forum signed a partnership deal to “accelerate the implementation of the 2030 Agenda for Sustainable Development.” That same evening, WEF president Börge Brende — Norway’s former Foreign Minister — had dinner with Jeffrey Epstein at Epstein’s Manhattan townhouse. The Epstein files, released January 2026, contain an exchange between the two from the previous year. Epstein to Brende: “Davos can really replace the UN. C21, cyber, crypto . genetics… intl coordination.” Brende back to Epstein: “Exactly — we need a new global architecture. World Economic Forum (Davos) is uniquely positioned — public private.”
The next day, the UN General Assembly adopted the framework for restructuring global governance.
That sequence — the partnership signing, the Epstein dinner, the candid admission about replacing the UN with a public-private architecture, and then the formal adoption — opens Jacob Nordangård’s The Digital World Brain. Pages two and three. Footnoted to the UN resolution number, the Epstein files, and the General Assembly record.
I keep coming back to it because it captures what this book does that almost nothing else in the independent research space manages. I’ve followed Jacob’s work for years now and interviewed him about his research. Each book peels back another layer of the same institutional architecture, and each time I think he’s reached the limit of what can be documented, the next one goes further. Nordangård doesn’t speculate. He doesn’t editorialize much. He lays institutional actions next to each other in chronological order and lets the pattern announce itself. … continue
Blog Roll
-
Join 2,444 other subscribers
Visits Since December 2009
- 7,439,062 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen Zionism
Aletho News- Under fire, Moscow and Tehran close ranks
- Iran, US receive Pakistan-mediated plan for ceasefire then final deal
- Iran submits demands for end to war as mediators scramble ahead of Trump deadline
- Iran Threatens Retaliatory Strike on Stargate AI Project in UAE
- US sent ‘a lot’ of arms to Iranian protesters – Trump
- Barak Ravid Launders Deception To Allow Trump To Back Off Of His Power Plant Threat – Again
- REWRITING THE RISK? INSIDE THE GOVERNMENT’S VACCINE SAFETY MESSAGING
- “Davos Can Really Replace the UN”
- NIAID/NIH and USDA Fund Bioengineered Chimeric Influenza Viruses Built Using Pandemic H1N1 Components: Journal ‘Science Advances’
- Hezbollah hits Israeli warship off Lebanon’s coast, sets it aflame
If Americans Knew- Trump poised to “blow everything up” (ie. commit war crimes) in Iran – Daily Update
- In Iran, Israel-US take aim at “reason, research, and freedom of thought” – Daily Update
- US loses planes over Iran, Israel downgrades Lebanon war goals – Daily Update
- Israel Is Blocking Palestinians from Easter at Church Where Jesus Resurrected
- Plot to assassinate Palestinian activist follows harassment campaign promoted by Zionist groups and elected officials
- Prominent New York synagogue hosts presentation on why U.S. Jews should support the ethnic cleansing of Gaza
- Tapper vs. Piker: Is the CNN Anchor Auditioning for David Ellison?
- Shouldn’t Democrats Be Able to Condemn Genocide?
- Israel-US kill negotiators, destroy civilian structures, but Iran’s military capabilities still largely intact – Daily Update
- ‘War crime’: Global condemnation as Israeli ministers celebrate death penalty law targeting Palestinian prisoners
No Tricks Zone- An Inconvenient Tree: Uncovered In Alps… Europe Much Warmer Than Today 6000 Years Ago
- New Study Reports A 60% Slowdown In Greenland’s Ice Loss Rate In The Last Decade
- Low Intensity Tornado Wrecks Major Solar Farm, Creating A Potential Toxic Dump
- New Study Finds Warming Saves Lives…Cold Temperatures 12 Times More Deadly Than Excess Heat
- German Science Blog Accuses PIK Climate Institute Of Hallucinating Climate Tipping Points
- Devastating Assessment Of Comirnaty Vaccine By Former Senior Pfizer Europe Toxicologist
- New Study: CO2 Is ‘Effectively Negligible’ As An Explanatory Climate Change Factor Since 2000
- Former Pfizer Toxicologist Dr. Helmut Sterz Tells Bundestag Hearing Pfizer Vaccine Should Have Never Been Approved
- Energy Expert: Germany’s Nuclear Phaseout Was A “500 Billion Euro Mistake”
- New Research: South Australia’s Mid-Holocene Sea Surface Temperatures Were 4°C Warmer Than Today
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.
