Texas

Can border agents legally search my phone, social media at Texas checkpoints? What to know

An Apple iPhone. Under federal law, CBP can inspect any person or item entering or leaving the United States, including phones, tablets, laptops, cameras and other electronics.
An Apple iPhone. Under federal law, CBP can inspect any person or item entering or leaving the United States, including phones, tablets, laptops, cameras and other electronics. Photo courtesy of pexels.com

If you’ve ever driven back to Texas from Mexico or flown into a port of entry in Texas, you know the routine: a series of questions, bumper‑to‑bumper traffic, and possible inspections.

You may not expect being asked to unlock your phone or laptop, but U.S Customs and Border Protection officers at Texas checkpoints can do exactly that under their border‑search authority.

Fewer than 0.01 percent of total travelers at the border were subject to device inspections in 2024, according to CBP, but knowing what to expect and how to protect your data can help during such an invasive process.

Here’s what to know before your next trip through a Texas checkpoint.

What can happen during a Texas Inspection Stations search?

Under federal law, CBP can inspect any person or item entering or leaving the United States, including phones, tablets, laptops, cameras and other electronics.

Officers don’t need a warrant to scroll through your device the way they would rummage through luggage, whether at the border itself or at interior checkpoints up to 100 miles inland.

What kinds of electronic searches are there?

The CBP website lists two types of searches: basic and advanced.

A basic search can be conducted with or without any suspicion, as the officer manually browses your unlocked device and views files, photos, messages, and apps you can access on screen.

An advanced search requires reasonable suspicion of a violation (like drug smuggling or national‑security concerns) and written approval from a senior manager. Officers may then connect specialized equipment to copy, extract, or analyze data not visible on the surface.

Am I obligated to provide my electronic device’s password?

Yes. CBP can require you to present any device in an unlocked state. If you refuse or can’t unlock it because of encryption or a forgotten passcode, your device may be detained or seized until officers gain access, delaying your crossing.

U.S. citizens cannot be denied entry for withholding a password, but their device can remain in CBP custody. Foreign nationals who refuse may face admissibility questions or even a denied entry determination.

How can I protect sensitive information on my device?

Crossing the border doesn’t have to mean risking your personal data.

Follow these best practices recommended by cybersecurity firm ProtectStar before you travel:

  • Say goodbye to Face ID and fingerprints: Before you go, switch off any facial‑ or fingerprint‑unlock features. That way, no one can just hold your phone to your face or press your finger on the sensor. A good old‑fashioned passcode is harder to force out of you—and it usually has stronger legal backing.
  • Back everything up: Take a minute to save your photos, contacts, and docs to a secure cloud or an external drive you keep at home. If your device gets lost, damaged, or held, you’ll still have your memories and important files safely tucked away.
  • Delete what you don’t absolutely need: Scroll through your camera roll and file folders, then ditch anything non‑essential—old vacation selfies, private chat logs, browser history, saved passwords, you name it. Offload the rest to an end‑to‑end encrypted cloud, then erase it from your device.
  • Keep critical info in the cloud, not on your phone: Things like boarding passes, hotel reservations, or travel itineraries? Store them in a trusted, encrypted online service instead of saving them locally. If border agents peek at your device, they won’t see those files—plus, you can grab them anytime you have internet access.
  • Bring a burner: If possible, leave your main phone at home and travel with a cheap backup that only has the apps and data you really need. No burner? No problem—just uninstall any personal or sensitive apps (email, banking, social media) and delete private notes and photos so your main device feels almost brand‑new.
  • Trim app permissions: Take a quick tour through your apps and remove any you won’t use. For the ones you keep, dive into settings and turn off permissions you don’t need (like location, camera, or contacts). The less you give an app permission to see, the less data someone can stumble upon.
  • Lock your SIM and check phone services: Give your SIM its own PIN (different from your phone’s passcode) so it can’t be popped into another device. While you’re at it, protect your voicemail and call‑forwarding with a PIN too—unlocked services can leak info you’d rather keep private.
Related Stories from Fort Worth Star-Telegram
Tiffani Jackson
Fort Worth Star-Telegram
Tiffani is a service journalism reporter for the Fort Worth Star-Telegram. She is part of a team of local journalists who answer reader questions about life in North Texas. Tiffani mainly writes about Texas laws and health news.
Get unlimited digital access
#ReadLocal

Try 1 month for $1

CLAIM OFFER