We have to inspect the devices. We ask that the device be able to be powered on. That's what we want to verify, and that's a check to make sure that it's.... If it's a phone, and you can turn it on, you verify that it's a phone.
Our concern is not whether there is data on it. Our concern is whether there is a threat item hidden in the phone. We're looking for, say, explosives.