Post details: CA9 (en banc): A forensic search of a computer on crossing the border is unreasonable

03/09/13

Permalink 10:59:19 am, by fourth, 1171 words, 1118 views   English (US)
Categories: General

CA9 (en banc): A forensic search of a computer on crossing the border is unreasonable

An intensive search of defendant's hard drive seized at the border was not reasonable under the border search doctrine. United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013) (en banc).

The introduction:

[More:]

Every day more than a million people cross American borders, from the physical borders with Mexico and Canada to functional borders at airports such as Los Angeles (LAX), Honolulu (HNL), New York (JFK, LGA), and Chicago (ORD, MDW). As denizens of a digital world, they carry with them laptop computers, iPhones, iPads, iPods, Kindles, Nooks, Surfaces, tablets, Blackberries, cell phones, digital cameras, and more. These devices often contain private and sensitive information ranging from personal, financial, and medical data to corporate trade secrets. And, in the case of Howard Cotterman, child pornography.

Agents seized Cotterman's laptop at the U.S.-Mexico border in response to an alert based in part on a fifteen-year-old conviction for child molestation. The initial search at the border turned up no incriminating material. Only after Cotterman's laptop was shipped almost 170 miles away and subjected to a comprehensive forensic examination were images of child pornography discovered.

This watershed case implicates both the scope of the narrow border search exception to the Fourth Amendment's warrant requirement and privacy rights in commonly used electronic devices. The question we confront "is what limits there are upon this power of technology to shrink the realm of guaranteed privacy." Kyllo v. United States, 533 U.S. 27, 34 (2001). More specifically, we consider the reasonableness of a computer search that began as a cursory review at the border but transformed into a forensic examination of Cotterman's hard drive.

Computer forensic examination is a powerful tool capable of unlocking password-protected files, restoring deleted material, and retrieving images viewed on web sites. But while technology may have changed the expectation of privacy to some degree, it has not eviscerated it, and certainly not with respect to the gigabytes of data regularly maintained as private and confidential on digital devices. Our Founders were indeed prescient in specifically incorporating "papers" within the Fourth Amendment's guarantee of "[t]he right of the people to be secure in their persons, houses, papers, and effects." U.S. Const. amend. IV. The papers we create and maintain not only in physical but also in digital form reflect our most private thoughts and activities.

Although courts have long recognized that border searches constitute a "historically recognized exception to the Fourth Amendment's general principle that a warrant be obtained," United States v. Ramsey, 431 U.S. 606, 621 (1977), reasonableness remains the touchstone for a warrantless search. Even at the border, we have rejected an "anything goes" approach. See United States v. Seljan, 547 F.3d 993, 1000 (9th Cir. 2008) (en banc).

Mindful of the heavy burden on law enforcement to protect our borders juxtaposed with individual privacy interests in data on portable digital devices, we conclude that, under the circumstances here, reasonable suspicion was required for the forensic examination of Cotterman's laptop. Because border agents had such a reasonable suspicion, we reverse the district court's order granting Cotterman's motion to suppress the evidence of child pornography obtained from his laptop.

A. The Forensic Examination Was Not An Extended Border Search:

Cotterman urges us to treat the examination as an extended border search that requires particularized suspicion. Although the semantic moniker "extended border search" may at first blush seem applicable here, our jurisprudence does not support such a claim. We have "define[d] an extended border search as any search away from the border where entry is not apparent, but where the dual requirements of reasonable certainty of a recent border crossing and reasonable suspicion of criminal activity are satisfied." United States v. Guzman-Padilla, 573 F.3d 865, 878-79 (9th Cir. 2009) (internal quotation marks and citations omitted). The key feature of an extended border search is that an individual can be assumed to have cleared the border and thus regained an expectation of privacy in accompanying belongings. See United States v. Abbouchi, 502 F.3d 850, 855 (9th Cir. 2007) ("Because the delayed nature of an extended border search ... necessarily entails a greater level of intrusion on legitimate expectations of privacy than an ordinary border search, the government must justify an extended border search with reasonable suspicion that the search may uncover contraband or evidence of criminal activity.") (internal quotation marks omitted) (emphasis added).

Cotterman's case is different. Cotterman was stopped and searched at the border. Although he was allowed to depart the border inspection station after the initial search, some of his belongings, including his laptop, were not. The follow-on forensic examination was not an "extended border search." A border search of a computer is not transformed into an extended border search simply because the device is transported and examined beyond the border.

B. Forensic Examination At The Border Requires Reasonable Suspicion:

It is the comprehensive and intrusive nature of a forensic examination—not the location of the examination—that is the key factor triggering the requirement of reasonable suspicion here. See Cotterman, 637 F.3d at 1086-87 n.6 (B. Fletcher, J., dissenting) (recognizing that "[a] computer search in a forensic lab will always be equivalent to an identical search at the border. The duration of a computer search is not controlled by where the search is conducted. The duration of a computer search is controlled by what one is looking for and how one goes about searching for it.") (emphasis in original). The search would have been every bit as intrusive had Agent Owen traveled to the border with his forensic equipment. Indeed, Agent Owen had a laptop with forensic software that he could have used to conduct an examination at the port of entry itself, although he testified it would have been a more time-consuming effort. To carry out the examination of Cotterman's laptop, Agent Owen used computer forensic software to copy the hard drive and then analyze it in its entirety, including data that ostensibly had been deleted. This painstaking analysis is akin to reading a diary line by line looking for mention of criminal activity—plus looking at everything the writer may have erased.

Notwithstanding a traveler's diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment's reasonableness requirement, which considers the nature and scope of the search. Significantly, the Supreme Court has recognized that the "dignity and privacy interests of the person being searched" at the border will on occasion demand "some level of suspicion in the case of highly intrusive searches of the person." Flores-Montano, 541 U.S. at 152. Likewise, the Court has explained that "some searches of property are so destructive," "particularly offensive," or overly intrusive in the manner in which they are carried out as to require particularized suspicion. Id. at 152, 154 n.2, 155-56; Montoya de Hernandez, 473 U.S. at 541. The Court has never defined the precise dimensions of a reasonable border search, instead pointing to the necessity of a case-by-case analysis. As we have emphasized, "[r]easonableness, when used in the context of a border search, is incapable of comprehensive definition or of mechanical application." Duncan, 693 F.2d at 977 (internal quotation marks and citation omitted).

Pingbacks:

No Pingbacks for this post yet...

FourthAmendment.com

Notes on Use

April 2014
Sun Mon Tue Wed Thu Fri Sat
<< <     
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30      

Search

by John Wesley Hall
Criminal Defense Lawyer and
  Fourth Amendment consultant
Little Rock, Arkansas
Contact / The Book
Search and seizure law consulting
www.johnwesleyhall.com

© 2003-14, online since Feb. 24, 2003

HWC e
URL hits since 2010

~~~~~~~~~~~~~~~~~~~~~~~~~~

Fourth Amendment cases,
citations, and links

Latest Slip Opinions:
U.S. Supreme Court
(Home)
Federal Appellate Courts Opinions
  First Circuit
  Second Circuit
  Third Circuit
  Fourth Circuit
  Fifth Circuit
  Sixth Circuit
  Seventh Circuit
  Eighth Circuit
  Ninth Circuit
  Tenth Circuit
  Eleventh Circuit
  D.C. Circuit
  FDsys: Many district courts
  FDsys: Many federal courts
  FDsys: Other
  Military Courts: C.A.A.F., Army, AF, N-M, CG
State courts (and some USDC opinions)

Google Scholar
Advanced Google Scholar
Google search tips
LexisWeb
LII State Appellate Courts
LexisONE free caselaw
Findlaw Free Opinions
To search Search and Seizure on Lexis.com $

Most recent SCOTUS cases:
2009 to date:

2013-14 Term:
  Riley v. California, granted Jan.17, argued Apr. 29 (ScotusBlog)
  United States v. Wurie, granted Jan.17, argued Apr. 29 (ScotusBlog)
  Plumhoff v. Rickard, granted Nov. 15, argued Mar. 4 (ScotusBlog)
  Stanton v. Sims, 134 S.Ct. 3, 187 L. Ed. 2d 341 (Nov. 4, 2013) (per curiam)
  Navarette v. California, granted Oct.1, argued Jan. 21 (ScotusBlog)
  Fernandez v. California, 134 S.Ct. 1126, 188 L. Ed. 2d 25 (Feb. 25) (ScotusBlog)

2012-13 Term:
  Maryland v. King, 133 S.Ct. 1958, 186 L.Ed.2d 1 (2013) (ScotusBlog)
  Missouri v. McNeeley, 133 S.Ct. 1552, 185 L.Ed.2d 696 (2013) (ScotusBlog)
  Bailey v. United States, 133 S.Ct. 1031, 185 L.Ed.2d 19 (2013) (ScotusBlog)
  Florida v. Harris, 133 S.Ct. 1050, 185 L.Ed.2d 61 (2013) (ScotusBlog)
  Florida v. Jardines, 133 S.Ct. 1409, 185 L.Ed.2d 495 (2013) (ScotusBlog)
  Clapper v. Amnesty International USA, 133 S.Ct. 1138, 185 L.Ed.2d 264 (2013) (ScotusBlog)

2011-12 Term:
  Ryburn v. Huff, 132 S.Ct. 987, 181 L.Ed.2d 966 (2012) (other blog)
  Florence v. Board of Chosen Freeholders, 132 S.Ct. 1510, 182 L.Ed.2d 566 (2012) (ScotusBlog)
  United States v. Jones, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012) (ScotusBlog)
  Messerschmidt v. Millender, 132 S.Ct. 1235, 182 L.Ed.2d 47 (2012) (ScotusBlog)

2010-11 Term:
  Kentucky v. King, 131 S.Ct. 1849, 179 L.Ed.2d 865 (2011) (ScotusBlog)
  Camreta v. Greene, 131 S.Ct. 2020, 179 L.Ed.2d 1118 (2011) (ScotusBlog)
  Ashcroft v. al-Kidd, 131 S.Ct. 2074, 179 L.Ed.2d 1149 (2011) (ScotusBlog)
  Davis v. United States, 131 S.Ct. 2419, 180 L.Ed.2d 285 (2011) (ScotusBlog)

2009-10 Term:

  Michigan v. Fisher, 558 U.S. 45, 130 S.Ct. 546, 175 L.Ed.2d 410 (2009) (per curiam) (ScotusBlog)
  City of Ontario v. Quon, 560 U.S. 746, 130 S.Ct. 2619, 177 L.Ed.2d 216 (2010) (ScotusBlog)

2008-09 Term:
  Herring v. United States, 555 U.S. 135, 129 S.Ct. 695, 172 L.Ed.2d 496 (2009) (ScotusBlog)
  Pearson v. Callahan, 555 U.S. 223, 129 S.Ct. 808, 172 L.Ed.2d 565 (2009) (ScotusBlog)
  Arizona v. Johnson, 555 U.S. 323, 129 S.Ct. 781, 172 L.Ed.2d 694 (2009) (ScotusBlog)
  Arizona v. Gant, 556 U.S. 332, 129 S.Ct. 1710, 173 L.Ed.2d 485 (2009) (ScotusBlog)
  Safford Unified School District #1 v. Redding, 557 U.S. 364, 129 S.Ct. 2633, 174 L.Ed.2d 354 (2009) (ScotusBlog)


Research Links:
  Supreme Court:
  SCOTUSBlog
  S. Ct. Docket
  Solicitor General's site
  SCOTUSreport
  Briefs online (but no amicus briefs) 
  Curiae (Yale Law)
  Oyez Project (NWU)
  "On the Docket"–Medill
  S.Ct. Monitor: Law.com
  S.Ct. Com't'ry: Law.com

  General (many free):
  LexisWeb
  Google Scholar | Google
  LexisOne Legal Website Directory
  Crimelynx
  Lexis.com $
  Lexis.com (criminal law/ 4th Amd) $
  Findlaw.com
  Findlaw.com (4th Amd)
  Westlaw.com $
  F.R.Crim.P. 41
  www.fd.org

  FBI Domestic Investigations and Operations Guide (2008) (pdf)
  DEA Agents Manual (2002) (download)
  DOJ Computer Search Manual (2009) (pdf)

  Congressional Research Service:
    Electronic Communications Privacy Act (2012)
    Overview of the Electronic Communications Privacy Act (2012)
    Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
    Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012)
    Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012)

  ACLU on privacy
  Privacy Foundation
  Electronic Privacy Information Center
  Criminal Appeal (post-conviction) (9th Cir.)
  Section 1983 Blog

"If it was easy, everybody would be doing it. It isn't, and they don't."
—Me

"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud

"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984).

"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence."
Mapp v. Ohio, 367 U.S. 643, 659 (1961).

Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment.
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).

"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today."
Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).

"The great end, for which men entered into society, was to secure their property."
Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)

"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment."
United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)

"The course of true law pertaining to searches and seizures, as enunciated here, has not–to put it mildly–run smooth."
Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).

"A search is a search, even if it happens to disclose nothing but the bottom of a turntable."
Arizona v. Hicks, 480 U.S. 321, 325 (1987)

"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."
Katz v. United States, 389 U.S. 347, 351 (1967)

“Experience should teach us to be most on guard to protect liberty when the Government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding.”
United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)

“Liberty—the freedom from unwarranted intrusion by government—is as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark.”
United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)

"You can't always get what you want / But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards

"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for me–and by that time there was nobody left to speak up."
Martin Niemöller (1945) [he served seven years in a concentration camp]

“You know, most men would get discouraged by now. Fortunately for you, I am not most men!”
Pepé Le Pew

"There is never enough time, unless you are serving it."
Malcolm Forbes

"The point of the Fourth Amendment, which often is not grasped by zealous officers, is not that it denies law enforcement the support of the usual inferences which reasonable men draw from evidence. Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime."
Johnson v. United States, 333 U.S. 10, 13-14 (1948)


Misc

XML Feeds

What is RSS?

Who's Online?

  • illilmbiostus Email
  • gopiestinee Email
  • cyperewly Email
  • vomozigocog Email
  • anndylum Email
  • chaphsiperype Email
  • shourryhego Email
  • spisyfoes Email
  • scargaice Email
  • ketitesetug Email
  • hyncassinny Email
  • immuctiohic Email
  • iteptinenna Email
  • g9amlselva Email
  • oppopezed Email
  • korsjdv Email
  • driertyrord Email
  • essexisalaync Email
  • gypeplaipiz Email
  • emunlinuifofs Email
  • fuhintoneetef Email
  • repflielt Email
  • himbdyday Email
  • vemaddidgetat Email
  • deannydwerm Email
  • sypecrucceeme Email
  • comeensuche Email
  • aerothshiesse Email
  • wearsehem Email
  • jolosizezef Email
  • p7sdzmbtqn Email
  • autociava Email
  • noistnoxolo Email
  • jinonoforse Email
  • excexycheetry Email
  • carpinteyrorma Email
  • Guest Users: 152

powered by
b2evolution