"Unlock Your Phone." What Do You Do?
The coerced-access scenario, what the law actually allows by citizenship status, and how duress modes and dead man's switches work in practice.
In January 2017, a NASA Jet Propulsion Laboratory engineer named Sidd Bikkannavar landed at Houston's George Bush Intercontinental Airport after returning from a trip to Chile. Bikkannavar is a U.S.-born citizen and a Global Entry holder — a program that is supposed to expedite border processing. He was stopped at the border, taken to a room, and told that agents needed to search his phone. He asked whether he had a choice. He was told he did not. He unlocked the phone.
The case became part of the Alasaad v. Mayorkas litigation, which wound through federal courts for years before the First Circuit upheld CBP's authority to conduct suspicionless manual searches in 2021. But the Bikkannavar episode endures as a clear illustration of what the coerced-access scenario actually looks like in practice — not a dramatic confrontation, but a quiet room, a request framed as a requirement, and a traveler who did not know what he was legally entitled to refuse.
This is the scenario most people are least prepared for, because most people assume they would simply say no and walk away. In practice, the legal landscape, the power dynamics, and the practical consequences of refusal are all more complicated than that.
What the law actually allows — and doesn't
The legal right to refuse a border device search exists, in a limited and impractical form.
U.S. citizens cannot be denied entry to the United States for refusing to unlock a device. This is the clearest protection: your citizenship cannot be revoked at the border, and border agents cannot legally bar you from your own country because you declined to hand over your passcode.
What they can do is detain you for additional questioning, seize the device for further examination, and create a record of your refusal that may affect future crossings. CBP policy states that device detentions should generally not exceed five days absent exceptional circumstances. Whether that limitation is consistently honored is a separate question.
For lawful permanent residents — green-card holders — the right to enter is generally protected, but the situation is more legally complex. Princeton's guidance notes that a hearing before an immigration judge might be required in some circumstances. For visa holders and travelers on the Visa Waiver Program, the situation is starker: refusal to cooperate can result in denial of admission. You can be turned around.
The biometric versus passcode distinction is frequently cited and frequently misunderstood. The conventional argument is that a memorized passcode is "testimonial" — communicating something from your mind — and therefore protected by the Fifth Amendment against self-incrimination in a way that a fingerprint or face scan is not. Courts have split on this, and no definitive national rule exists. The practical guidance from CPJ and EFF is consistent: before a crossing, disable Face ID and Touch ID, and rely on your passcode. A passcode at least creates a legal question; a biometric may not.
What actually happens when you refuse
The documented cases are instructive.
In the Bikkannavar case, the officer did not explain that refusal was an option. The framing was that unlocking was required. Bikkannavar, aware that he was holding a JPL-issued phone with potentially sensitive material, unlocked because he felt he had no choice. His phone was taken out of his sight for about thirty minutes.
In April 2025, The Guardian reported on the case of Amir Makled, a Lebanese American attorney detained at Detroit Metro Airport. Makled said he was pressured to unlock his phone and concerned about privileged client communications on the device. CBP described the search as routine and said consent was given in writing. The gap between those two accounts — routine and voluntary versus pressured and concerned about privilege — illustrates how these encounters actually unfold.
In Australia, The Guardian reported the account of a dual national referred to as "Chris" whose device was retained by Australian Border Force officers. He said he was told his device would be held indefinitely unless he provided his passcode. ABF materials indicate officers cannot legally compel passcode disclosure — but in the room, the practical dynamic was compulsion.
The duress scenario and plausible deniability
The more sophisticated threat model — relevant particularly for journalists, lawyers, researchers, and travelers crossing into authoritarian jurisdictions — is not just that you might be asked to unlock your phone, but that you might be asked to unlock a specific application or show specific content.
This is where plausible deniability becomes a meaningful concept rather than a spy-movie trope.
The idea is that if an officer can see a functioning, unremarkable version of your device without seeing the sensitive content that actually lives there, the encounter ends without damage. A decoy state — a second version of your vault or your device that looks real, looks used, and contains nothing sensitive — satisfies a cursory or even moderately thorough inspection.
This is not a new concept. Physical security has used it for decades: a small amount of cash in a visible wallet, the real money elsewhere. The digital version requires technical implementation.
UltraLocked's duress code feature is built for exactly this scenario. There are two codes: your real code opens your actual vault. A second code — the duress code — opens a separate, pre-populated decoy vault that looks like a functioning file vault but contains nothing sensitive. When the duress code is entered, two things happen simultaneously: the decoy vault opens convincingly, and UltraLocked destroys the local key material required to decrypt the real vault. The files are not merely hidden; without that key material, the encrypted contents are intended to be unrecoverable. An officer looking at the device after the duress code has been entered sees a functional vault with staged or empty content, and the real vault's contents are gone.
The dead man's switch feature addresses a different but related scenario: a device that is seized and not returned promptly. If UltraLocked is not unlocked with the real code within a configured window — say, five days — it wipes itself. A device returned after being held for a week arrives back with the vault already cleared.
These features are not guarantees. A sufficiently resourced adversary with physical possession of the device and forensic capabilities might find evidence that a vault existed even after keys are destroyed. But the realistic threat at most border crossings is not a sufficiently resourced adversary conducting a deep forensic investigation — it is an officer conducting a visual inspection with a manual search or a basic extraction tool. Against that realistic threat, duress modes provide meaningful, practical protection.
What CPJ and EFF actually recommend
The Committee to Protect Journalists publishes explicit guidance for journalists crossing U.S. borders, updated in 2025. The recommendations relevant to this scenario:
Disable biometric access before crossing. Use the longest alphanumeric passcode you can reliably remember. If you unlock your device, type the passcode yourself rather than handing the device to an officer — you are not required to hand over your PIN. Ask for the officer's name and badge number. Ask to remain present during any device examination, even though officers may remove the device from your view. Do not lie to border officials.
EFF's guidance adds: do not volunteer information, and note that you may be asked to sign a form consenting to the search. You can ask what you are signing before you sign it.
Neither organization advises outright refusal as a blanket approach, because the consequences of refusal vary significantly by citizenship status, destination, and context. What they both emphasize is understanding your position before you arrive at the checkpoint, so you are not making decisions in the moment without any frame of reference.
The worst time to decide what you will do if asked to unlock your phone is when an agent is standing in front of you asking.
Previously: Part 3 — The clean phone strategy.
Next: Part 5 — It's not your photos you should worry about. Auditing what's actually on your device before you cross.