- cross-posted to:
- privacy@lemmy.ml
- technology@lemmy.ml
- cross-posted to:
- privacy@lemmy.ml
- technology@lemmy.ml
https://www.404media.co/man-charged-for-wiping-phone-before-cbp-could-search-it/
A man in Atlanta has been arrested and charged for allegedly deleting data from a Google Pixel phone before a member of a secretive Customs and Border Protection (CBP) unit was able to search it, according to court records and social media posts reviewed by 404 Media. The man, Samuel Tunick, is described as a local Atlanta activist in Instagram and other posts discussing the case. The exact circumstances around the search—such as why CBP wanted to search the phone in the first place—are not known. But it is uncommon to see someone charged specifically for wiping a phone, a feature that is easily accessible in some privacy and security-focused devices. 💡 Do you know anything else about this case? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co. The indictment says on January 24, Tunick “did knowingly destroy, damage, waste, dispose of, and otherwise take any action to delete the digital contents of a Google Pixel cellular phone, for the purpose of preventing and impairing the Government’s lawful authority to take said property into its custody and control.” The indictment itself was filed in mid-November. Tunick was arrested earlier this month, according to a post on a crowd-funding site and court records. “Samuel Tunick, an Atlanta-based activist, Oberlin graduate, and beloved musician, was arrested by the DHS and FBI yesterday around 6pm EST. Tunick’s friends describe him as an approachable, empathetic person who is always finding ways to improve the lives of the people around him,” the site says. Various activists have since shared news of Tunick’s arrest on social media.
The indictment says the phone search was supposed to be performed by a supervisory officer from a CBP Tactical Terrorism Response Team. The American Civil Liberties Union (ACLU) wrote in 2023 these are “highly secretive units deployed at U.S. ports of entry, which target, detain, search, and interrogate innocent travelers.” “These units, which may target travelers on the basis of officer ‘instincts.’ raise the risk that CBP is engaging in unlawful profiling or interfering with the First Amendment-protected activity of travelers,” the ACLU added. The Intercept previously covered the case of a sculptor and installation artist who was detained at San Francisco International Airport and had his phone searched. The report said Gach did not know why, even years later. Court records show authorities have since released Tunick, and that he is restricted from leaving the Northern District of Georgia as the case continues. The prosecutor listed on the docket did not respond to a request for comment. The docket did not list a lawyer representing Tunick.


Does the Rights against self-incrimination and the Right to remain silent help here?
I don’t see something they can really do against it? I am not in the USa so, someone?
Not really, no. You have the right to not give testimony against yourself, including by not providing evidence that would hurt you, but that doesn’t mean you can actively destroy evidence.
Evidence of what exactly? Was a crime previously committed? Was it the officer’s “instincts” that told them so? This is the fun part of authoritarianism, there may have been zero evidence deleted (we don’t know), but now the act of wiping it creates a crime they can charge someone with. Bake him away, toys!
It’s CBP, probably at the airport, so I don’t think you’d find a court saying they exceeded their authority in seizing the phone for search. They have very broad authority.
It’s not ethical at all, of course, but it’s been perfectly legal for decades, under multiple administrations.
They have broad latitude to initiate searches, but if there isn’t a specific crime they’re going after you for, you’re not destroying evidence. If they’re just fishing to see what you have in there, then there isn’t evidence being destroyed because they have no way to know whether you erased stuff because you were doing crimes or just didn’t want them to see your nudes.
The standard for a search at a port of entry is lower. I don’t know how much it’s been tested in court, but that’s how they’re operating right now.
The real question is when the wipe happened. If it happened after he was informed they were taking the phone as evidence, then that’s bad for him.
But otherwise they’d have to convince a jury that he could see the future.
If everything is stored in the cloud, he may not have actually destroyed evidence/data.
All the wipe does is remove one access method to the evidence/data.
I think things are also a bit dicey when CBP is doing it. As they are a fed agency and pretty much all they do is national security.