EFTA00314991.pdf
PDF Source (No Download)
Extracted Text (OCR)
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sere. 2531, 2013 Daily Journal =.
3018
11 -I KeyCite Yellow Flag - Negative Treatment
Declined to Extend by
United States v. Hassanshahi.
December I. 2014
709 F.3d 952
United States Court of Appeals,
Ninth Circuit.
UNITED STATES of America, Plaintiff—Appellant,
v.
Howard Wesley COTTERMAN,
Defendant—Appellee.
No. 09-10139.
I
Argued and Submitted En
Banc June 19, 2012.
I
Filed March 8, 2013.
Synopsis
Background: Defendant was charged with production of
child pornography, transportation and shipping of child
pornography, receipt of child pornography, possession
of child pornography, importation of obscene material,
transportation of obscene material, and unlawful flight
to avoid prosecution. The United States District Court
for the District of Arizona, 2009 WL 465028, Raner C.
Collins, J., granted defendant's motion to suppress evidence.
Government filed interlocutory appeal. The Court of Appeals,
637 F.3d 1068. reversed and remanded. The Court of Appeals
granted rehearing en banc. 673 F.3d 1206.
Holdings: The Court of Appeals, McKeown, Circuit Judge,
held that:
[1 ] extended border search doctrine did not apply to seizure
and forensic examination of defendant's laptop computer;
[2] forensic examination of defendant's computer that
comprehensively analyzed its hard drive required showing of
reasonable suspicion; and
[3] border agents had reasonable suspicion to conduct initial
search and subsequent forensic examination of defendant's
computer that comprehensively analyzed hard drive.
Reversed.
Callahan, Circuit Judge, filed opinion concurring in part,
dissenting in part, and concurring in the judgment, with whom
Clifton, Circuit Judge, joined, and with whom M. Smith,
Circuit Judge, joined in part.
M. Smith, Circuit Judge, filed dissenting opinion, with whom
Clifton and Callahan, Circuit Judges, joined in part.
West Headnotes (27)
[1]
Customs Duties
P- Searches and Seizures
Searches and Seizures
iis• Fourth Amendment and reasonableness in
general
Border
searches constitute
a
historically
recognized exception to the Fourth Amendment's
general principle that a warrant be obtained,
but reasonableness remains the touchstone for a
warrantless search. U.S.C.A. Const.Amend. 4.
Cases that cite this headnote
[2]
Criminal Law
Review De Novo
The ultimate question of whether a warrantless
search was reasonable under the Fourth
Amendment is reviewed de novo. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
[3]
Criminal Law
Specification of errors
The Court of Appeals may consider an issue that
has not been adequately raised on appeal if such
a failure will not prejudice the opposing party.
Cases that cite this headnote
[4]
Criminal Law
P- Specification of errors
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
EFTA00314991
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
Government's failure to address issue on appeal
of whether there was reasonable suspicion for
border search, after addressing issue before
district court, did not prejudice defendant, and
thus Court of Appeals could consider issue,
where Court of Appeals called for, and received,
supplemental briefs by both parties. U.S.C.A.
Const.Amend. 4.
2 Cases that cite this headnote
[5]
Customs Duties
4' Searches and Seizures
Searches and Seizures
Necessity of and preference for warrant,
and exceptions in general
The broad contours of the scope of searches
at international borders are rooted in the long-
standing right of the sovereign to protect
itself by stopping and examining persons
and property crossing into the country; thus,
border searches form a narrow exception to
the Fourth Amendment prohibition against
warrantless searches without probable cause.
U.S.C.A. Const.Amend. 4.
4 Cases that cite this headnote
[6]
Customs Duties
P- Searches and Seizures
Because the government's interest in preventing
the entry of unwanted persons and effects is
at its zenith at the international border, border
searches are generally deemed reasonable simply
by virtue of the fact that they occur at the border.
U.S.C.A. Const.Amend. 4.
4 Cases that cite this headnote
[7]
Customs Duties
P- Searches and Seizures
Even at the border, individual privacy rights
are not abandoned but balanced against the
sovereign's interests; that balance is qualitatively
different than in the interior and is struck much
more favorably to the government. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
[8]
Searches and Seizures
P- Scope, Conduct, and Duration of
Warrantless Search
The reasonableness of a search or seizure
depends on the totality of the circumstances,
including the scope and duration of the
deprivation. U.S.C.A. Const.Amend. 4.
2 Cases that cite this headnote
[9]
Customs Duties
p- Time and distance factors; checkpoints
Extended
border
search
doctrine,
which
encompassed any search away from border
where entry was not apparent, but where
dual requirements of reasonable certainty of
recent border crossing and reasonable suspicion
of criminal activity were satisfied, did not
apply to seizure and forensic examination of
defendant's laptop computer after defendant had
been stopped and searched at border; although
device had been transported and subjected to
extended and extensive examination beyond
border, computer never cleared customs and
search would have been every bit as intrusive
had it been conducted at border. U.S.C.A.
Const.Amend. 4.
10 Cases that cite this headnote
[10]
Customs Duties
4'- Time and distance factors; checkpoints
The key feature of an extended border search is
that an individual can be assumed to have cleared
the border and thus regained an expectation of
privacy in accompanying belongings. U.S.C.A.
Const.Amend. 4.
2 Cases that cite this headnote
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
2
EFTA00314992
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
[11]
Customs Duties
4— Time and distance factors; checkpoints
Customs Duties
Airports and airplanes
The "functional equivalent" doctrine effectively
extends the border search doctrine to all ports
of entry, including airports; a routine customs
search at the "functional equivalent" of the
border is analyzed as a border search and requires
neither probable cause nor reasonable suspicion.
U.S.C.A. Const.Amend. 4.
2 Cases that cite this headnote
[12]
Customs Duties
Time and distance factors; checkpoints
The extended border search doctrine, which
encompasses any search away from border
where entry was not apparent, but where dual
requirements of reasonable certainty of recent
border crossing and reasonable suspicion of
criminal activity were satisfied, is best confined
to cases in which, after an apparent border
crossing or functional entry, an attenuation
in the time or the location of conducting a
search reflects that the subject has regained an
expectation of privacy. U.S.C.A. Const.Amend.
4.
3 Cases that cite this headnote
[13]
Customs Duties
Time and distance factors; checkpoints
Under the extended border search doctrine,
which encompasses any search away from
border where entry was not apparent, but where
dual requirements of reasonable certainty of
recent border crossing and reasonable suspicion
of criminal activity were satisfied, time and
distance become relevant to determining whether
there is an adequate nexus to a recent border
crossing only after the subject or items searched
have entered. U.S.C.A. Const.Amend. 4.
Cases that cite this headnote
[14]
Customs Duties
46... Scope and Nature; Successive or
Secondary, Searches
Obscenity
P- Computers; electronic transmission
After seizure at border, forensic examination
of defendant's computer that comprehensively
analyzed its hard drive required showing of
reasonable suspicion; although government had
legitimate concerns about child pornography,
such concerns did not justify unfettered
crime-fighting searches or unregulated assault
on citizens' private information. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
[15]
Searches and Seizures
6'- Persons, Places and Things Protected
The Fourth Amendment's specific guarantee of
the people's right to be secure in their "papers"
encompasses financial records, confidential
business documents, medical records, and
private emails on personal electronic devices.
U.S.C.A. Const.Amend. 4.
Cases that cite this headnote
[16]
Searches and Seizures
fia Persons. Places and Things Protected
The express listing of papers under the Fourth
Amendment reflects the Founders' deep concern
with safeguarding the privacy of thoughts
and ideas, what might be called freedom of
conscience, from invasion by the government;
these records are expected to be kept private
and this expectation is one that society is
prepared to recognize as reasonable. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
3
EFTA00314993
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
[17]
Searches and Seizures
4. Expectation of privacy
The uniquely sensitive nature of data on
electronic devices carries with it a significant
expectation of privacy and thus renders an
exhaustive exploratory search more intrusive
than with other forms of property. U.S.C.A.
Const.Amend. 4.
4 Cases that cite this headnote
[18]
Customs Duties
4- Searches and Seizures
The government's authority to protect the
nation from contraband crossing its borders
may be heightened by national crises, such as
the smuggling of illicit narcotics, the threat
of international terrorism, and future threats
yet to take shape, but even in the face of
heightened concerns, a court must account for
the Fourth Amendments rights of travelers.
U.S.C.A. Const.Amend. 4.
Cases that cite this headnote
[19]
Customs Duties
Scope and Nature; Successive or
Secondary Searches
Reasonable
suspicion to
search
personal
electronic devices at the border requires that
officers make a commonsense differentiation
between a manual review of files on the
electronic device and application of computer
software to analyze a hard drive, and utilize the
latter only when they possess a particularized and
objective basis for suspecting the person stopped
of criminal activity. U.S.C.A. Const.Amend. 4.
10 Cases that cite this headnote
[20]
Arrest
0. Reasonableness; reason or founded
suspicion, etc
"Reasonable suspicion" is defined as
a
particularized and objective basis for suspecting
the particular person stopped of criminal activity.
U.S.C.A. Const.Amend. 4.
9 Cases that cite this headnote
[21]
Arrest
0— Collective knowledge
The assessment of reasonable suspicion is to be
made in light of the totality of the circumstances;
even when factors considered in isolation from
each other are susceptible to an innocent
explanation, they may collectively amount to a
reasonable suspicion. U.S.C.A. Const.Amend. 4.
5 Cases that cite this headnote
[22]
Criminal Law
4— Review De Novo
Criminal Law
Evidence wrongfully obtained
The Court of Appeals reviews reasonable
suspicion determinations de novo, reviewing
findings of historical fact for clear error and
giving due weight to inferences drawn from
those facts by resident judges and local law
enforcement officers. U.S.C.A. Const.Amend. 4.
2 Cases that cite this headnote
[23]
Customs Duties
Scope and Nature; Successive or
Secondary, Searches
Obscenity
0. Particular cases
Border agents had reasonable suspicion to
conduct initial search and subsequent forensic
examination of defendant's computer that
comprehensively analyzed hard drive after
seizing it at border, where defendant had prior
conviction for child molestation, he traveled
frequently to country associated with sex
tourism, and computer contained password-
protected files; although defendant had offered to
WestlawNexts © 2015 Thomson Reuters. No claim to original U.S. Government Works.
4
EFTA00314994
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
open files, computer contained vacation photos,
and initial examination did not turn up anything
incriminating, agents appropriately were wary of
offer of assistance due to concerns that defendant
could tamper with computer and reasonable
suspicion otherwise had not been eliminated.
U.S.C.A. Const.Amend. 4.
3 Cases that cite this headnote
[24]
Arrest
4- Reasonableness; reason or founded
suspicion, etc
Although a prior criminal history cannot alone
establish reasonable suspicion, it is permissible
to consider such a fact as part of the total calculus
of information in that determination. U.S.C.A.
Const.Amend. 4.
4 Cases that cite this headnote
[25]
Customs Duties
4'- Particular Objects or Products
Although password protection of files, in
isolation, will not give rise to reasonable
suspicion justifying border search, where there
are other indicia of criminal activity, password
protection of files may be considered in the
totality of the circumstances; to contribute to
reasonable suspicion, encryption or password
protection of files must have some relationship
to the suspected criminal activity. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
[26]
Customs Duties
P- Particular Objects or Products
Password protecting an entire device, as opposed
to files within a device, cannot be a factor
supporting a reasonable suspicion, such as would
justify border search; using a password on a
device is a basic means of ensuring that the
device cannot be accessed by another in the event
it is lost or stolen. U.S.C.A. Const.Amend. 4.
Cases that cite this headnote
[27]
Customs Duties
6*, Scope and Nature; Successive or
Secondary Searches
Obscenity
4- Scope of search
Existence of password•protected files was
relevant to assessing reasonableness of scope and
duration of search of defendant's computer after
its seizure at border; search necessarily had been
protracted because of password protection that
defendant had employed, and after defendant
refused to provide agents with passwords to
protected files and fled country, it took agent
days to override computer security and open
image files of child pornography. U.S.C.A.
Const.Amend. 4.
Cases that cite this headnote
Attorneys and Law Firms
•956 Dennis K. Burke, Christina M. Cabanillas, Carmen
F. Corbin, John S. Leonardo, John J. Tuchi, United States
Attorney's Office for the District of Arizona, Tucson, AZ, for
Appellant.
William J. Kirchner, Law Office of Nash & Kirchner, M.
Tucson, AZ, for Appellee.
David M. Porter, Melia N. Brink, National Association
of Criminal Defense Lawyers, Washington,
Michael
Price, Brennan Center for Justice, New York, NY; Hanni
M. Fakhoury, Electronic Frontier Foundation, San Francisco,
CA, for Amicus Curiae National Association of Criminal
Defense Lawyers and Electronic Frontier Foundation.
Christopher T. Handman, Mary Helen Wimberly, Hogan
Lovells US LLP, Washington, M.; Sharon Bradford
Franklin, The Constitution Project, Washington, ■., for
Amicus Curiae The Constitution Project.
WeStlaWNPA" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
5
EFTA00314995
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
Appeal from the United States District Court for the District
of Arizona, Raner C. Collins, District Judge, Presiding. M.
No. 4:07-cr-01207-RCC-CRP-I.
Before: ALEX KOZINSKI, Chief Judge, SIDNEY R.
THOMAS, M. MARGARET McKEOWN, KIM McLANE
WARDLAW, RAYMOND C. FISHER, RONALD M.
GOULD, RICHARD R. CLIFTON, CONSUELO M.
CALLAHAN, MILAN D. SMITH, JR., MARY H.
MURGUIA, and MORGAN CHRISTEN, Circuit Judges. I
1
Judge Betty B. Fletcher was a member of the en bane
panel but passed away after argument of the case. Judge
Wardlaw was drawn as her replacement.
Opinion by Judge McKEOWN; Partial Concurrence and
Partial Dissent by Judge CALLAHAN; Dissent by Judge
MILAN D. SMITH, JR.
OPINION
McKEOWN, Circuit Judge:
Every day more than a million people cross American
borders, from the physical borders with Mexico and Canada
to functional borders at airports such as Los Angeles (LAX),
Honolulu (HNL), New York (JFK, LGA), and Chicago
(ORD, MDW). As denizens of a digital world, they carry
with them laptop computers, iPhones, iPads, iPods. Kindles,
Nooks, Surfaces, tablets, Blackberries, cell phones, digital
cameras, and more. These devices often contain private and
sensitive information ranging from personal, financial, and
medical data to corporate trade secrets. And, in the case of
Howard Cotterman, child pornography.
Agents seized Cotterrnan's laptop at the U.S.-Mexico border
in response to an alert based in part on a fifteen-year-
old conviction for child molestation. The initial search at
the border turned up no incriminating material. Only after
Cotterman's laptop was shipped almost 170 miles away and
subjected to a comprehensive forensic examination were
images of child pornography discovered.
This watershed case implicates both the scope of the narrow
border search exception to the Fourth Amendment's warrant
requirement and privacy rights in commonly used electronic
devices. The question we confront "is what limits there are
upon this power of technology to shrink •957 the realm of
guaranteed privacy." Kyllo v. United States, 533 U.S. 27, 34,
121 S.Ct. 2038, 150 L.Ed.2d 94 (2001). More specifically,
we consider the reasonableness of a computer search that
began as a cursory review at the border but transformed into
a forensic examination of Cotterman's hard drive.
Computer forensic examination is a powerful tool capable
of unlocking password-protected files, restoring deleted
material, and retrieving images viewed on web sites. But
while technology may have changed the expectation of
privacy to some degree, it has not eviscerated it, and certainly
not with respect to the gigabytes of data regularly maintained
as private and confidential on digital devices. Our Founders
were indeed prescient in specifically incorporating "papers"
within the Fourth Amendment's guarantee of "[Otte right of
the people to be secure in their persons, houses, papers, and
effects." U.S. Const. amend. IV. The papers we create and
maintain not only in physical but also in digital form reflect
our most private thoughts and activities.
[I]
Although courts have long recognized that border
searches constitute a "historically recognized exception to
the Fourth Amendment's general principle that a warrant be
obtained," United States v. Ramsey, 431 U.S. 606, 621, 97
S.Ct. 1972, 52 L.Ed.2d 617 (1977), reasonableness remains
the touchstone for a warrantless search. Even at the border, we
have rejected an "anything goes" approach. See United States
v. Seljan, 547 F.3d 993. 1000 (9th Cir.2008) (en banc).
Mindful of the heavy burden on law enforcement to protect
our borders juxtaposed with individual privacy interests in
data on portable digital devices, we conclude that, under the
circumstances here, reasonable suspicion was required for the
forensic examination of Cotterman's laptop. Because border
agents had such a reasonable suspicion, we reverse the district
court's order granting Cotterman's motion to suppress the
evidence of child pornography obtained from his laptop.
I. FACTUAL BACKGROUND AND PROCEDURAL
HISTORY 2
The facts related here are drawn from the record of the
evidentiary hearing held before the magistrate judge.
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
6
EFTA00314996
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
Howard Cotterman and his wife were driving home to the
United States from a vacation in Mexico on Friday morning.
April 6, 2007, when they reached the Lukeville, Arizona, Port
of Entry. During primary inspection by a border agent, the
Treasury Enforcement Communication System ("TECS") 3
returned a hit for Cotterman. The TECS hit indicated that
Cotterman was a sex offender—he had a 1992 conviction for
two counts of use of a minor in sexual conduct, two counts
of lewd and lascivious conduct upon a child, and three counts
of child molestation—and that he was potentially involved
in child sex tourism. Because of the hit, Cotterman and his
wife were referred to secondary inspection, where they were
instructed to exit their vehicle and leave all their belongings
in the car. The border agents called the contact person listed
in the TECS entry and, following that conversation, believed
the hit to reflect Cotterman's involvement "in some type of
child pornography." The agents searched the vehicle and
retrieved two laptop computers and three digital cameras.
Officer Antonio Alvarado inspected the electronic devices
and found *953 what appeared to be family and other
personal photos, along with several password-protected files.
3
The TECS is an investigative tool of the Department
of Homeland Security that keeps track of individuals
entering and exiting the country and of individuals
involved in or suspected to be involved in crimes.
Border agents contacted Group Supervisor Craig Brisbine at
the Immigration and Customs Enforcement ("ICE') office
in Sells, Arizona, and informed him about Cotterman's entry
and the fact that he was a sex offender potentially involved
in child sex tourism. The Sells Duty Agent, Mina Riley,
also spoke with Officer Alvarado and then contacted the
ICE Pacific Field Intelligence Unit, the office listed on the
TECS hit, to get more information. That unit informed Riley
that the alert was part of Operation Angel Watch, which
was aimed at combating child sex tourism by identifying
registered sex offenders in California, particularly those who
travel frequently outside the United States. She was advised
to review any media equipment, such as computers, cameras,
or other electronic devices, for potential evidence of child
pornography. Riley then spoke again to Alvarado, who told
her that he had been able to review some of the photographs
on the Cottermans' computers but had encountered password-
protected files that he was unable to access.
Agents Brisbine and Riley departed Sells for Lukeville
at about 1:30
and decided en route to detain the
Cottermans' laptops for forensic examination. Upon their
arrival, they gave Cotterman and his wife Miranda warnings
and interviewed them separately. The interviews revealed
nothing incriminating. During the interview, Cotterman
offered to help the agents access his computer. The agents
declined the offer out of concern that Cotterman might be
able to delete files surreptitiously or that the laptop might be
"booby trapped."
The agents allowed the Cottermans to leave the border
crossing around 6 E., but retained the Cottermans' laptops
and a digital camera. 4 Agent Brisbine drove almost 170 miles
from Lukeville to the ICE office in Tucson, Arizona, where
he delivered both laptops and one of the three digital cameras
to ICE Senior Special Agent & Computer Forensic Examiner
John Owen. Agent Owen began his examination on Saturday,
the following day. He used a forensic program to copy the
hard drives of the electronic devices. He determined that the
digital camera did not contain any contraband and released
the camera that day to the Cottermans, who had traveled
to Tucson from Lukeville and planned to stay there a few
days. Agent Owen then used forensic software that often
must run for several hours to examine copies of the laptop
hard drives. He began his personal examination of the laptops
on Sunday. That evening, Agent Owen found seventy-five
images of child pornography within the unallocated space of
Cotterman's laptop. 5
4
5
The other two cameras were returned to the Cottermans.
"Unallocated space is space on a hard drive that contains
deleted data, usually emptied from the operating system's
trash or recycle bin folder, that cannot be seen or
accessed by the user without the use of forensic software.
Such space is available to be written over to store new
information." United States v. Flyer. 633 F.3d 911. 918
(9th Cir.201 I).
Agent Owen contacted the Cottermans on Sunday evening
and told them he would need Howard Cotterrnan's assistance
to access password-protected files he found on Cotterman's
laptop. Cotterman agreed to provide the assistance the
following day, but never showed up. When Agent Brisbine
called again to request Cotterman's help in accessing the
password-protected files, Cotterman responded that the
WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works.
7
EFTA00314997
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
computer had multiple users and that he would need to
check with individuals at the *959 company from which
he had retired in order to get the passwords. The agents had
no further contact with Cotterman, who boarded a flight to
Mexico from Tucson the next day, April 9, and then flew
onward to Sydney, Australia. On April II, Agent Owen
finally managed to open twenty-three password-protected
files on Cotterman's laptop. The files revealed approximately
378 images of child pornography. The vast majority of the
images were of the same girl, approximately 7-10 years of
age, taken over a two-to three-year period. In many of the
images, Cotterman was sexually molesting the child. Over
the next few months, Agent Owen discovered hundreds more
pornographic images, stories, and videos depicting children.
A grand jury indicted Cotterman for a host of offenses
related to child pornography. Cotterman moved to suppress
the evidence gathered from his laptop and the fruits of
that evidence. The magistrate judge filed a Report and
Recommendation finding that the forensic examination
was an "extended border search" that required reasonable
suspicion. He found that the TECS hit and the existence
of password-protected files on Cotterman's laptop were
suspicious, but concluded that those facts did not suffice to
give rise to reasonable suspicion of criminal activity. The
district judge adopted the Report and Recommendation and
granted Cotterman's motion to suppress.
In its interlocutory appeal of that order, the government
characterized the issue as follows: "Whether the authority
to search a laptop computer without reasonable suspicion
at a border point of entry permits law enforcement to take
it to another location to be forensically examined, when it
has remained in the continuous custody of the government."
A divided panel of this court answered that question in
the affirmative and reversed. United States v. Cottertnan.
637 F.3d 1068 (9th Cir.20 I I ). The panel concluded that
reasonable suspicion was not required for the search and
that "[t]he district court erred in suppressing the evidence
lawfully obtained under border search authority." Id. at 1084.
In dissent, Judge Betty B. Fletcher wrote that "officers
must have some level of particularized suspicion in order
to conduct a seizure and search like the one at issue here."
M. (B. Fletcher, J., dissenting). By a vote of a majority of
nonrecused active judges, rehearing en banc was ordered. 673
F.3d 1206 (9th Cir.2012). Following en banc oral argument,
we requested supplemental briefing on the issue of whether
reasonable suspicion existed at the time of the search.
H. WAIVER
The government argued below that the forensic examination
was part of a routine border search not requiring heightened
suspicion and, alternatively, that reasonable suspicion
justified the search. Before the district court, the government
maintained "the facts of this case clearly establish that
there was reasonable suspicion." However, having failed to
obtain a favorable ruling on that ground, the government did
not challenge on appeal the conclusion that there was no
reasonable suspicion. Rather, it sought a broad ruling that no
suspicion of any kind was required. Cotterman thus argued in
his answering brief that the government had waived the issue
—an assertion that the government did not address in its reply
brief. Cotterman contends that the government has abandoned
and conceded the issue of reasonable suspicion and that this
court may not address that issue. We disagree.
[21
[3]
[4] We review de novo the ultimate question of
whether a warrantless search *960 was reasonable under
the Fourth Amendment. United States v. Johnson, 256 F.3d
895, 905 (9th Cir.200 I ) (en banc). Our review necessarily
encompasses a determination as to the applicable standard:
no suspicion, reasonable suspicion or probable cause. That
the government may hope for the lowest standard does not
alter our de novo review, particularly when the issue was fully
briefed and argued below. Further, we may consider an issue
that has not been adequately raised on appeal if such a failure
will not prejudice the opposing party. United States v. Ullah.
976 F.2d 509, 514 (9th Cir. 1992). Where, as here, we "called
for and received supplemental briefs by both parties,"Alcaraz
v. INS, 384 F.3d 1150, 1161 (9th Cir.2004), the government's
failure to address the issue does not prejudice Cotterman. See
also United States v. Resendiz-Ponce, 549 U.S. 102, 103-04,
127 S.Ct. 782, 166 L.Ed.2d 591 (2007).
III. THE BORDER SEARCH
[5]
[6] The broad contours of the scope of searches at our
international borders are rooted in "the long-standing right
of the sovereign to protect itself by stopping and examining
persons and property crossing into this countly." Ramsey.
431 U.S. at 616, 97 S.Ct. 1972. Thus, border searches form
"a narrow exception to the Fourth Amendment prohibition
WeStlaWNeff © 2015 Thomson Reuters. No claim to original U.S. Government Works.
8
EFTA00314998
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
against warrantless searches without probable cause." Seljan,
547 F.3d at 999 (internal quotation marks and citation
6
omitted). Because "[t]he Government's interest in preventing
the entry of unwanted persons and effects is at its zenith at
the international border," United States v. Flores-Montano,
541 U.S. 149, 152, 124 S.Ct. 1582, 158 L.Ed.2d 311 (2004),
border searches are generally deemed "reasonable simply by
virtue of the fact that they occur at the border." Ramsey, 431
U.S. at 616. 97 S.Ct. 1972.
[71
[8] This does not mean, however, that at the border
"anything goes." Seljan, 547 F.3d at 1000. Even at the
border, individual privacy rights are not abandoned but
"[b]alanced against the sovereign's interests." United States
t'. Montoya de Hernandez, 473 U.S. 531, 539, 105 S.Ct.
3304, 87 L.Ed.2d 381 (1985). That balance "is qualitatively
different ... than in the interior" and is "struck much more
favorably to the Government." Id. at 538, 540, 105 S.Ct.
3304. Nonetheless, the touchstone of the Fourth Amendment
analysis remains reasonableness. Id. at 538, 105 S.Ct. 3304.
The reasonableness of a search or seizure depends on the
totality of the circumstances, including the scope and duration
of the deprivation. See United States v. Jacobsen, 466 U.S.
109, 124, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984); see also
United States v. Duncan, 693 F.2d 971, 977 (9th Cir.1982).
In view of these principles, the legitimacy of the initial search
of Cotterman's electronic devices at the border is not in
doubt. Officer Alvarado turned on the devices and opened
and viewed image files while the Cottermans waited to enter
the country. It was, in principle, akin to the search in Seljan,
where we concluded that a suspicionless cursory scan of a
package in international transit was not unreasonable. 547
F.3d at 1004. Similarly, we have approved a quick look
and unintrusive search of laptops. United States v. Arnold.
533 F.3d 1003, 1009 (9th Cir.2008) (holding border search
reasonable where "CBP officers simply 'had [traveler] boot
[the laptop] up, and looked at what [he] had inside.' ") (second
alteration in original). 6 *961 Had the search of Cotterman's
laptop ended with Officer Alvarado, we would be inclined
to conclude it was reasonable even without particularized
suspicion. See id. But the search here transformed into
something far different. The difficult question we confront
is the reasonableness, without a warrant, of the forensic
examination that comprehensively analyzed the hard drive of
the computer.
Although the Arnold decision expressed its conclusion
in broad terms, stating that. "reasonable suspicion is
not needed for customs officials to search a laptop or
other personal electronic storage devices at the border."
Arnold, 533 F.3d at 1008, the facts do not support such
an unbounded holding. As an en bane court, we narrow
Arnold to approve only the relatively simple search
at issue in that case, not to countenance suspicionless
forensic examinations. The dissent's extensive reliance
on Arnold is misplaced in the en banc environment.
A. The Forensic Examination Was Not An Extended
Border Search
[9]
[10] Cotterman urges us to treat the examination as an
extended border search that requires particularized suspicion.
Although the semantic moniker "extended border search"
may at first blush seem applicable here, our jurisprudence
does not support such a claim. We have "define[d] an
extended border search as any search away from the border
where entry is not apparent, but where the dual requirements
of reasonable certainty of a recent border crossing and
reasonable suspicion of criminal activity am satisfied."
United States v. Guzman-Padilla. 573 F.3d 865, 878-79 (9th
Cir.2009) (internal quotation marks and citations omitted).
The key feature of an extended border search is that an
individual can be assumed to have cleared the border and
thus regained an expectation of privacy in accompanying
belongings. See United States v. Abbouchi, 502 F.3d 850, 855
(9th Cir.2007) ("Because the delayed nature of an extended
border search ... necessarily entails a greater level of intrusion
on legitimate expectations of privacy than an ordinary border
search, the government must justify an extended border
search with reasonable suspicion that the search may uncover
contraband or evidence of criminal activity.") (internal
quotation marks omitted) (emphasis added).
Cotterman's case is different. Cotterman was stopped and
searched at the border. Although he was allowed to depart
the border inspection station after the initial search, some of
his belongings, including his laptop, were not. The follow•on
forensic examination was not an "extended border search."
A border search of a computer is not transformed into
an extended border search simply because the device is
transported and examined beyond the border.
WeStlaWNP5 © 2015 Thomson Reuters. No claim to original U.S. Government Works.
EFTA00314999
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
[11]
[12]
To be sure, our case law has not always border crossing only after the subject or items searched
articulated the "extended border search" doctrine with
optimal clarity. But the confusion has come in distinguishing
between facts describing a functional border search and
those describing an extended border search, not in defining
the standard for a search at the border. See, e.g., United
States v. Cardona, 769 F.2d 625, 628 (9th Cir.1985) ("We
have recently recognized the difficulty of making sharp
distinctions between searches at the functional equivalent of
the border and extended border searches."). The "functional
equivalent" doctrine effectively extends the border search
doctrine to all ports of entry, including airports. See Ahneida—
Sanchez v. United States, 413 U.S. 266, 273, 93 S.Ct. 2535,
37 L.Ed.2d 596 (1973). A routine customs search at the
"functional equivalent" of the border is "analyzed as a border
search" and requires neither probable cause nor reasonable
suspicion. Seljan, 547 F.3d at 999. This case involves a
search initiated at the actual border and does not encounter
any of the difficulties *962 surrounding identification of
a "functional" border. As to the extended border search
doctrine, we believe it is best confined to races in which, after
an apparent border crossing or functional entry, an attenuation
in the time or the location of conducting a search reflects that
the subject has regained an expectation of privacy.7
7
This characterization is consistent with how our circuit
and others have articulated the doctrine. See, e.g.,
United States v. Villasenor. 608 F.3d 467. 471-72 (9th
Cir.2010); United Stales v. Yang, 286 F.3d 940.945-46
(7th Cir.2002); United States v. Hyde, 37 F.3d 116. 120
n. 2 (3d Cit 1994); United States v. Santiago, 837 F.2d
1545. 1548 (11th Cir.1988); United States V. Gaviria,
805 F.2d 1108, 1112 (2d Cir.1986); United States v.
Niver, 689 F.2d 520, 526 (5th Cir.1982); United States V.
Mr, 592 F.2d 735, 739-40 (4th Cir.1979).
[13]
In his dissent, Judge Smith advocates applying
the extended border search doctrine because the forensic
examination occurred 170 miles from the border and days
after Cotterman's entry. Moving the laptop to a specialized lab
at a distant location might highlight that the search undertaken
there was an extensive one, but it is not the dispositive factor
here. Because Cotterman never regained possession of his
laptop, the fact that the forensic examination occurred away
from the border, in Tucson, did not heighten the interference
with his privacy. Time and distance become relevant to
determining whether there is an adequate nexus to a recent
have entered. See Villasenor, 608 F.3d at 471 (explaining
that reasonableness of extended border search depends on
"whether the totality of the surrounding circumstances,
including the time and distance elapsed" establish that
items to be searched have recently entered the country)
(internal quotation marks omitted). Cotterman's computer
never cleared customs so entry was never effected. In short,
the extended border search doctrine does not fit the search
here.
B. Forensic Examination At The Border Requires
Reasonable Suspicion
[141
It is the comprehensive and intrusive nature of a
forensic examination—not the location of the examination—
that is the key factor triggering the requirement of reasonable
suspicion here.8 See Cotterman, 637 F.3d at 1086-87 n. 6
(B. Fletcher, J., dissenting) (recognizing that "[al computer
search in a forensic lab will always be equivalent to an
identical search at the border. The duration of a computer
search is not controlled by where the search is conducted.
The duration of a computer search is controlled by what one
is looking for and how one goes about searching for it.")
(emphasis in original). The search would have been every
bit as intrusive had Agent Owen traveled to the border with
his forensic equipment. Indeed, Agent Owen had a laptop
with forensic software that he could have used to conduct an
examination at the port of entry itself, although he testified
it would have been a more time consuming effort. To carry
out the examination of Cotterman's laptop, Agent Owen used
computer forensic software to copy the hard drive and then
analyze it in its entirety, including data that ostensibly had
been deleted. This painstaking analysis is akin to reading
a diary line by line looking for mention *963 of criminal
activity—plus looking at everything the writer may have
erased. 9
8
9
The concurrence goes to great lengths to "refute any
such notion" that location and duration contributed to our
holding reasonable suspicion required here. Concurrence
at 974-75. We see no reason for such an exegesis; our
opinion is clear on the point that these factors are not at
issue.
Agent Owen used a software program called EnCase
that exhibited the distinctive features of computer
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
10
EFTA00315000
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
forensic examination. The program copied. analyzed.
and preserved the data stored on the hard drive and
gave the examiner access to far more data. including
password-protected. hidden or encrypted. and deleted
files. than a manual user could access.
Notwithstanding a traveler's diminished expectation of
privacy at the border, the search is still measured against
the Fourth Amendment's reasonableness requirement, which
considers the nature and scope of the search. Significantly,
the Supreme Court has recognized that the "dignity and
privacy interests of the person being searched" at the border
will on occasion demand "some level of suspicion in the
case of highly intrusive searches of the person." Flores-
Montano, 541 U.S. at 152, 124 S.CI. 1582. Likewise, the
Court has explained that "some searches of property are
so destructive," "particularly offensive," or overly intrusive
in the manner in which they are carried out as to require
particularized suspicion. Id. at 152, 154 n. 2, 155-56,
124 S.Ct. 1582; Montoya de Hernandez, 473 U.S. at 541.
105 S.Ct. 3304. The Court has never defined the precise
dimensions of a reasonable border search, instead pointing
to the necessity of a case-by-case analysis. As we have
emphasized, "[deasonableness, when used in the context of a
border search, is incapable of comprehensive definition or of
mechanical application." Duncan, 693 F.2d at 977 (internal
quotation marks and citation omitted).
Over the past 30-plus years, the Supreme Court has dealt with
a handful of border cases in which it reaffirmed the border
search exception while, at the same time, leaving open the
question of when a "particularly offensive" search might fail
the reasonableness test. The trail begins with United States v.
Ramsey, where the Court reserved judgment on this question:
"We do not decide whether, and under what circumstances,
a border search might be deemed 'unreasonable' because of
the particularly offensive manner in which it is carried out."
431 U.S. at 618 n. 13, 97 S.Ct. 1972. Of note, the Court
cited two cases, albeit non-border cases, as examples: Kremen
v. United States, 353 U.S. 346. 347-48, 77 S.Ct. 828, 1
L.Ed.2d 876 (1957) (holding unconstitutional an exhaustive
warrantless search of a cabin and seizure of its entire contents
that were moved 200 miles away for examination) and Go-
Bart Importing Co. v. United States, 282 U.S. 344, 358. 51
S.Ct. 153, 75 L.Ed. 374 (1931) (condemning as "lawless
invasion of the premises and a general exploratory search"
a warrantless "unlimited search, ransacking the desk, safe,
filing cases and other parts of [an] office").
Less than ten years later, in 1985, the Court observed that it
had "not previously decided what level of suspicion would
justify a seizure of an incoming traveler for purposes other
than a routine border search" and then went on to hold in
the context of an alimentary canal search that reasonable
suspicion was required for "the detention of a traveler at
the border, beyond the scope of a routine customs search
and inspection." Montoya de Hernandez, 473 U.S. at 540-
41. 105 S.Ct. 3304. The Court's reference to "routine border
search" was parsed in a later case, Flores—Montano, where
the Court explained that "the reasons that might support
a requirement of some level of suspicion in the case of
highly intrusive searches of the person—dignity and privacy
interests of the person being searched—simply do not carry
over to vehicles," and, more specifically, to the gas tank of a
car. 541 U.S. at 152, 124 S.CI. 1582. Accordingly, the Court
*964 rejected a privacy claim vis-a-vis an automobile gas
tank.
We are now presented with a case directly implicating
substantial
personal
privacy
interests.
The
private
information individuals store on digital devices—their
personal -papers" in the words of the Constitution—stands
in stark contrast to the generic and impersonal contents
of a gas tank. See, e.g., United States v. Jones, —
U.S. —, 132 S.Ct. 945, 957, 181 L.Ed.2d 911 (2012)
(Sotomayor, J., concurring) (expressing "doubt that people
would accept without complaint the warrantless disclosure to
the Government of a list of every Web site they had visited in
the last week, or month, or year"). We rest our analysis on the
reasonableness of this search, paying particular heed to the
nature of the electronic devices and the attendant expectation
of privacy.
The amount of private information carried by international
travelers was traditionally circumscribed by the size of the
traveler's luggage or automobile. That is no longer the case.
Electronic devices are capable of storing warehouses full of
information. The average 400—gigabyte laptop hard drive can
store over 200 million pages—the equivalent of five floors
of a typical academic library. See Orin S. Kerr, Searches
and Seizures in a Digital World, 119 Harv. L.Rev. 531, 542
(2005) (explaining that an 80 GB hard drive is equivalent
to 40 million pages or one floor of an academic library);
see also LexisNexis, How Many Pages in a Gigabyte?.
http:/Avww.lexisnexis.
corn/applieddiscovery/lawlibrary/
WeSflaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
11
EFTA00315001
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
whitePapers/ADI_FS_PageslnAGigabyte.pdf. Even a car full
of packed suitcases with sensitive documents cannot hold a
candle to the sheer, and ever-increasing, capacity of digital
storage. to
10
We are puzzled by the dissent's speculation about "how
many gigabytes of storage [one must! buy to secure
the guarantee that reasonable suspicion will be required
before one's devices are searched." Dissent at 987.
We discuss the typical storage capacity of electronic
devices simply to highlight the features that generally
distinguish them from traditional baggage. Indeed, we do
not and need not determine whether Cotterman's laptop
possessed unusually large or simply "average" capacity
in order to resolve that the forensic examination of it
required reasonable suspicion.
[15]
[16] The nature of the contents of electronic devices
differs from that of luggage as well. Laptop computers,
iPads and the like are simultaneously offices and personal
diaries. They contain the most intimate details of our lives:
financial records, confidential business documents, medical
records and private emails. This type of material implicates
the Fourth Amendment's specific guarantee of the people's
right to be secure in their "papers." U.S. Const. amend. IV.
The express listing of papers "reflects the Founders' deep
concern with safeguarding the privacy of thoughts and ideas
—what we might call freedom of conscience—from invasion
by the government." Seljan, 547 F.3d at 1014 (Kozinski, C.J.,
dissenting); see also New York v.
Video, Inc., 475 U.S.
868, 873, 106 S.Ct. 1610, 89 L.Ed.2d 871 (1986). These
records are expected to be kept private and this expectation
is "one that society is prepared to recognize as `reasonable.'
" Katz v. United States, 389 U.S. 347, 361, 88 S.Ct. 507, 19
L.Ed.2d 576 (1967) (Harlan, J., concurring). II
1I
The dissent's discussion about Facebook and other
platforms where the user voluntarily transmits personal
data over the Internet. often oblivious to privacy
issues. Dissent at 65-66. is a red herring. Of course.
willful disclosure of electronic data. like disclosure of
other material, undercuts an individual's expectation of
privacy. But there was no such disclosure here. Nor
does the border search implicate such an affirmative
disclosure.
•965
Electronic devices often retain sensitive and
confidential information far beyond the perceived point of
erasure, notably in the form of browsing histories and records
of deleted files. This quality makes it impractical, if not
impossible, for individuals to make meaningful decisions
regarding what digital content to expose to the scrutiny
that accompanies international travel. A person's digital life
ought not be hijacked simply by crossing a border. When
packing traditional luggage, one is accustomed to deciding
what papers to take and what to leave behind. When carrying
a laptop, tablet or other device, however, removing files
unnecessary to an impending trip is an impractical solution
given the volume and often intermingled nature of the files.
It is also a time-consuming task that may not even effectively
erase the files.
The present case illustrates this unique aspect of electronic
data. Agents found incriminating files in the unallocated
space of Cotterman's laptop, the space where the computer
stores files that the user ostensibly deleted and maintains
other "deleted" files retrieved from web sites the user has
visited. Notwithstanding the attempted erasure of material or
the transient nature of a visit to a web site, computer forensic
examination was able to restore the files. It is as if a search of a
person's suitcase could reveal not only what the bag contained
on the current trip, but everything it had ever carried.
With the ubiquity of cloud computing, the government's reach
into private data becomes even more problematic. 12 In the
"cloud," a user's data, including the same kind of highly
sensitive data one would have in "papers" at home, is held
on remote servers rather than on the device itself. The digital
device is a conduit to retrieving information from the cloud,
akin to the key to a safe deposit box. Notably, although the
virtual "safe deposit box" does not itself cross the border,
it may appear as a seamless part of the digital device when
presented at the border. With access to the cloud through
forensic examination, a traveler's cache is just a click away
from the government.
12
"The term 'cloud computing' is based on the industry
usage of a cloud as a metaphor for the ethereal
internat.... An external cloud platform is storage or
software access that is essentially rented from (or
outsourced to) a remote public cloud service provider.
such as Amazon or Google.... By contrast, an internal
or private cloud is a cluster of servers that is networked
behind an individual or company's own firewall.- David
A. Couillard. Defogging the Cloud: Applying Fourth
WeStlaWNeff © 2015 Thomson Reuters. No claim to original U.S. Government Works.
12
EFTA00315002
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
Amendment Principles to Evolving Privacy Expectations
in Cloud Computing, 93 Minn. L.Rev. 2205. 2216 (2009)
(internal citations omitted).
As Justice Scalia wrote. "It would be foolish to contend
that the degree of privacy secured to citizens by the
Fourth Amendment has been entirely unaffected by the
advance of technology." Kyllo, 533 U.S. at 33-34, 121 S.Ct.
2038. Technology has the dual and conflicting capability to
decrease privacy and augment the expectation of privacy.
While the thermal imaging device in Kyllo threatened to
expose the hour at which "the lady of the house" took her daily
"sauna and bath," id. at 38, 121 S.Ct. 2038, digital devices
allow us to carry the very papers we once stored at home.
The point is technology matters. The Department of
Homeland Security has acknowledged as much in the context
of international travelers:
Where someone may not feel that the
inspection of a briefcase would raise
significant privacy concerns because
the volume of information to be
searched is not great, that same person
may feel *966 that a search of
their laptop increases the possibility of
privacy risks due to the vast amount
of information potentially available on
electronic devices.
DHS, Privacy Impact
Assessment
for
the Border
Searches of Electronic Devices 2 (Aug. 25, 2009),
available at http://www.dhs. govlxlibrarylassets/privacy/
privacy_pia_cbp_laptop.pdf.
[17]
This is not to say that simply because electronic
devices house sensitive, private information they are off
limits at the border. The relevant inquiry, as always, is one of
reasonableness. But that reasonableness determination must
account for differences in property. See Samson v. California,
547 U.S. 843, 848, 126 S.Ct. 2193, 165 L.Ed.2d 250
(2006) ("Under our general Fourth Amendment approach,
we examine the totality of the circumstances to determine
whether a search is reasonable....") (internal quotation marks,
citation, and alterations omitted) (emphasis added). Unlike
searches involving a reassembled gas tank, Flores-Montana
541 U.S. at 150, 124 S.Ct. 1582, or small hole in the bed of a
pickup truck, United States v. Chaudhry, 424 F.3d 1051, 1054
(9th Cir.2005), which have minimal or no impact beyond
the search itself—and little implication for an individual's
dignity and privacy interests—the exposure of confidential
and personal information has permanence. It cannot be
undone. Accordingly, the uniquely sensitive nature of data
on electronic devices carries with it a significant expectation
of privacy and thus renders an exhaustive exploratory search
more intrusive than with other forms of property.
After their initial search at the border, customs agents made
copies of the hard drives and performed forensic evaluations
of the computers that took days to turn up contraband. It was
essentially a computer strip search. An exhaustive forensic
search of a copied laptop hard drive intrudes upon privacy and
dignity interests to a far greater degree than a cursory search
at the border. It is little comfort to assume that the government
—for now—does not have the time or resources to seize and
search the millions of devices that accompany the millions of
travelers who cross our borders. It is the potential unfettered
dragnet effect that is troublesome.
[18]
We recognize the important security concerns that
prevail at the border. The government's authority to protect
the nation from contraband is well established and may be
"heightened" by "national crisiels," such as the smuggling
of illicit narcotics, Montoya de Hernandez, 473 U.S. at 538,
105 S.Ct. 3304, the current threat of international terrorism
and future threats yet to take shape. But even in the face
of heightened concerns, we must account for the Fourth
Amendments rights of travelers. Id. at 539, 105 S.Ct. 3304.
The effort to interdict child pornography is also a legitimate
one. But legitimate concerns about child pornography do not
justify unfettered crime-fighting searches or an unregulated
assault on citizens' private information. Reasonable suspicion
is a modest, workable standard that is already applied in the
extended border search, Terry stop, 13 and other contexts. Its
application to the forensic examination here will not impede
law enforcement's ability to monitor and secure our borders
or to conduct appropriate searches of electronic devices.
13
Terry v. Ohio, 392 U.S. 1, 30.88 S.Ct. 1868.20 L.Ed.2d
889 (1968).
Nor does applying this standard impede the deterrent effect of
suspicionless searches, which the dissent contends is *967
critical to thwarting savvy terrorists and other criminals.
WeStlaWNPid" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
13
EFTA00315003
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Serv. 2531, 2013 Daily Journal =.
3018
Dissent at 985. The Supreme Court has never endorsed
the proposition that the goal of deterring illegal contraband
at the border suffices to justify any manner of intrusive
search. Rather, reasonableness remains the touchstone and
the Court has expressed support for the deterrence value of
suspicionless searches of a routine nature, such as vehicle
checkpoints near the border. See United States v. Maninez—
Fuerte, 428 U.S. 543, 556, 96 S.Ct. 3074, 49 L.Ed.2d
1116 (1976) ("We note here only the substantiality of
the public interest in the practice of routine stops for
inquiry at permanent checkpoints, a practice which the
Government identifies as the most important of the traffic-
checking operations.") (emphasis added). In practical terms,
suspicionless searches of the type approved in Arnold will
continue; border officials will conduct further, forensic
examinations where their suspicions are aroused by what they
find or by other factors. Reasonable suspicion leaves ample
room for agents to draw on their expertise and experience
to pick up on subtle cues that criminal activity may be
afoot. See United States v. Tiong, 224 F.3d 1136, 1140 (9th
Cir.?000). 14
14
The greatest obstacle to ferreting out contraband at the
border has always been the sheer number of international
travelers. Any contention that national security will
be critically hampered by stripping border agents of
a critical law enforcement tool—suspicionless forensic
examinations of electronics—is undermined by the fact
that, as a matter of commonsense and resources, it is only
when reasonable suspicion is aroused that such searches
typically take place. See. e.g.. Chaudhry. 424 F.3d at
1054 (B. Fletcher. J.. concurring) ("As a practical matter.
border agents are too busy to do extensive searches
(removing gas tanks and door panels, boring holes in
truck beds) unless they have suspicion."). As Judge
Callahan acknowledges in her separate opinion, the
record suggests that "remote and/or intensive searches
of electronic devices crossing the border do not occur
all that often." Concurrence at 978 n. 11. The reference
that only a small fraction of travelers at the border have
their devices searched simply reinforces our point—our
ruling will not place an undue burden on border agents
who already rely on a degree of suspicion in referring
travelers to secondary inspection.
[19] We have confidence in the ability of law enforcement
to distinguish a review of computer files from a forensic
examination. We do not share the alarm expressed by the
concurrence and the dissent that the standard we announce
will prove unmanageable or give border agents a "Sophie's
choice" between thorough searches and Bivens actions.
Concurrence at 977-78; Dissent at 986. Determining whether
reasonable suspicion is required does not necessitate a
"complex legal determination[ ]" to be made on a "moment-
by-moment basis." Dissent at 984. Rather, it requires that
officers make a commonsense differentiation between a
manual review of files on an electronic device and application
of computer software to analyze a hard drive, and utilize the
latter only when they possess a "particularized and objective
basis for suspecting the person stopped of criminal activity."
Tiong, 224 F.3d at 1140 (internal quotation marks omitted).
International travelers certainly expect that their property
will be searched at the border. What they do not expect is
that, absent some particularized suspicion, agents will mine
every last piece of data on their devices or deprive them
of their most personal property for days (or perhaps weeks
or even months, depending on how long the search takes).
United States v. Ramos—Saenz, 36 F.3d 59, 61 n. 3 (9th
Cir.1994) ("Intrusiveness includes both the extent of a search
as well as the degree of indignity that may accompany a
search."). •968 Such a thorough and detailed search of the
most intimate details of one's life is a substantial intrusion
upon personal privacy and dignity. We therefore hold that
the forensic examination of Cotterman's computer required
a showing of reasonable suspicion, a modest requirement in
light of the Fourth Amendment.
IV. REASONABLE SUSPICION
[20]
[21]
[22]
Reasonable suspicion is defined as
particularized and objective basis for suspecting the particular
person stopped of criminal activity." United States v. Cortez,
449 U.S. 411. 417-18, 101 S.Ct. 690, 66 L.Ed.2d 621 (1981).
This assessment is to be made in light of "the totality of
the circumstances." Id. at 417, 101 S.Ct. 690. "[Elven when
factors considered in isolation from each other are susceptible
to an innocent explanation, they may collectively amount
to a reasonable suspicion." United States v. Berber—Tinoco,
510 F.3d 1083, 1087 (9th Cir.2007). We review reasonable
suspicion determinations de novo, reviewing findings of
historical fact for clear error and giving "due weight to
inferences drawn from those facts by resident judges and local
law enforcement officers." Ornelas v. United States, 517 U.S.
690. 699, 116 S.Ct. 1657, 134 L.Ed.2d 911 (1996).
WeStlaWNP5 © 2015 Thomson Reuters. No claim to original U.S. Government Works.
14
EFTA00315004
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
[23] In the district court and in supplemental briefing, the
government argued that the border agents had reasonable
suspicion to conduct the initial search and the forensic
examination of Cotterman's computer. We agree.
The objective facts reflect that both the agents at the
border and the agents who arrived later from Sells based
their decision to search Cotterman's belongings on the
TECS hit. Officer Alvarado was told by those in charge
of administering the TECS database that he should search
Cotterman's property because the TECS hit indicated "that
[Cotterman] appeared to [have] been involved in some type of
child pornography." Agent Riley also looked up Cotterman's
criminal record and understood that he had a prior conviction
for child pornography. As it turned out, Cotterman's previous
conviction was not for pornography, but for child molestation.
Nonetheless, the agents' understanding of the objective facts,
albeit mistaken, is the baseline for determining reasonable
suspicion. See Liberal v. Estrada, 632 F.3d 1064, 1077 (9th
Cir.20 II) ("Even if an officer makes a mistake of fact, that
mistake `will not render a stop illegal, if the objective facts
known to the officer gave rise to a reasonable suspicion
that criminal activity was afoot.' " (quoting United States v.
Morisco!, 285 F.3d 1127, 1131 (9th Cir.2002))).
[24]
By itself, Cotterman's 1992 conviction for child
molestation does not support reasonable suspicion to conduct
an extensive forensic search of his electronic devices.
"Although a prior criminal history cannot alone establish
reasonable suspicion ... it is permissible to consider such
a fact as part of the total calculus of information in ti[al]
determination
1." Burrell v. Mcllroy, 464 F.3d 853, 858
n. 3 (9th Cir.2006). The TECS alert was not based merely
on Cotterman's conviction—the agents were aware that the
alert targeted Cotterman because he was a sex offender
"who travel[ed] frequently out of the country" and who was
"possibly involved in child sex tourism." Further, Agent
Riley testified that an examination of Cotterman's passport
confirmed that he had traveled in and out of the country
frequently since his conviction in 1992.
In further support of reasonable suspicion, the government
asserts that Mexico, from which the Cottermans were
returning, is "a country associated with sex
*969
tourism.. IS The ICE field office specifically informed Agent
Riley that the alert was part of Operation Angel Watch, which
targeted individuals potentially involved in sex tourism and
alerted officials to be on the lookout for laptops, cameras and
other paraphernalia of child pornography. See 156 Cong. Rec.
S9581-03 (daily ed. Dec. 14, 2010) (describing Operation
Angel Watch as a program "helplingl ICE [to] identify travel
patterns of convicted sex offenders who may attempt to
exploit children in foreign countries"). Cotterman's TECS
alert, prior child-related conviction, frequent travels, crossing
from a country known for sex tourism, and collection of
electronic equipment, plus the parameters of the Operation
Angel Watch program, taken collectively, gave rise to
reasonable suspicion of criminal activity.
15
It is ironic that the dissent expresses concern that, by
factoring in the incidence of crime in particular countries.
"thousands of individuals ... will now be forced to
reconsider traveling to entire countries ... or will need
to leave all their electronic equipment behind, to avoid
arousing a 'reasonable' suspicion." Dissent at 78. when.
if forensic examination of those travelers' electronics
occurs at the border. the dissent would require no
suspicion or all.
To these factors, the government adds another—the existence
of password-protected files on Cotterman's computer. 16
We are reluctant to place much weight on this factor
because it is commonplace for business travelers, casual
computer users, students and others to password protect
their files. Law enforcement "cannot rely solely on factors
that would apply to many law-abiding citizens," Berber-
Tinoco, 510 F.3d at 1087, and password protection is
ubiquitous. National standards require that users of mobile
electronic devices password protect their files. See generally
United States Department of Commerce, Computer Security
Division, National Institute of Standards and Technology,
Computer Security (2007) (NISI Special Publication 800-
1l l). Computer users are routinely advised—and in some
cases, required by employers—to protect their files when
traveling overseas. See, e.g., Michael Price, National Security
Watch, 34-MAR Champion 51, 52 (March 2010) ("[T]here
is one relatively simple thing attorneys can do [when
crossing the border] to protect their privacy and the rights
of their clients: password-protect the computer login and any
sensitive files or folders.").
WeStlaWNPiff" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
15
EFTA00315005
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
16
Agent Riley testified that Alvarado told her that he had
"encounterfed] some files that were password protected."
while Agent Alvarado testified that he found one file.
[25]
[26]
Although password protection of files, in
isolation, will not give rise to reasonable suspicion, where,
as here, there are other indicia of criminal activity,
password protection of files may be considered in the
totality of the circumstances. 17 To contribute to reasonable
suspicion, encryption or password protection of files must
have some relationship to the suspected criminal activity.
Here, making illegal files difficult to access makes perfect
sense for a suspected holder of child pornography. When
combined with the other circumstances, the fact that Officer
Alvarado encountered at least one password protected file on
Cotterman's computer contributed to the basis for reasonable
suspicion to conduct a forensic examination.
17
We do not suggest that password protecting an entire
device—as opposed to files within a device—can be a
factor supporting a reasonable suspicion determination.
Using a password on a device is a basic means of
ensuring that the device cannot be accessed by another
in the event it is lost or stolen.
[27]
The existence of the password-protected files is also
relevant to assessing *970 the reasonableness of the scope
and duration of the search of Cotterman's computer. The
search was necessarily protracted because of the password
protection that Cotterman employed. After Cotterman failed
to provide agents with the passwords to the protected files
and fled the country, it took Agent Owen days to override
the computer security and open the image files of child
pornography.
Although we must take into account factors weighing both in
favor and against reasonable suspicion, Cotterman's innocent
explanation does not tip the balance. See Tiong, 224 F.3d
at 1140 (recognizing that "innocent possibilities ... do not
undermine reasonable suspicion"). The dissent suggests that
Cotterman's offer at the border "to help the agents access his
computee' counsels against a finding of reasonable suspicion.
Dissent at 993. The agents were appropriately wary of
such an offer due to concerns that Cotterman could tamper
with the devices. Nor did the agents' discovery of vacation
photos eliminate the suspicion that Cotterman had engaged
in criminal activity while abroad or might be importing child
pornography into the country. Because the first examination
of Cotterman's laptop, by Officer Alvarado, turned up nothing
incriminating, Cotterman urges that any suspicion prompted
by the TECS alert was dispelled by this initial failure. But the
nature of the alert on Cotterman, directing agents to review
media and electronic equipment for child pornography,
justified conducting the forensic examination despite the
failure of the first search to yield any contraband.
Collectors of child pornography can hardly be expected to
clearly label such files and leave them in readily visible and
accessible sections of a computer's hard drive, particularly
when they are traveling through border crossings, where
individuals ordinarily anticipate confronting at least a cursory
inspection. Officer Alvarado, who was responsible for
conducting the initial search, was specifically looking for
photographs as described in the TECS hit but testified that he
had only a slightly above-average familiarity with laptops. He
could do no more than open a file, look at it and see if he could
access it. He testified that "IiIf [he] encountered something
that Ihel could not access, then [he] would reference it to
somebody that may have that ability to look at [it]." That is
precisely what occurred here. Officer Alvarado came across
password-protected files but, unable to open them, moved on
to other files. Alvarado told Agent Riley about the password
protection, and she and Agent Brisbine decided to seize
the computers for further examination. The border agents
"certainly had more than an inchoate and unparticularized
suspicion or hunch" of criminal activity to support their
decision to more carefully search for evidence of child
pornography. Montoya de Hernandez, 473 U.S. at 542, 105
&Ct. 3304 (internal quotation marks and citation omitted). An
alert regarding possession of this type of criminal contraband
justified obtaining additional resources, here available in
Tucson, to properly determine whether illegal files were
present.
Unlike the dissent, we credit the agents' obsen'ations and
experience in acting upon significant myriad factors that
support reasonable suspicion. It is not our province to nitpick
the factors in isolation but instead to view them in the totality
of the circumstances. For the above reasons, we conclude
that the examination of Cotterman's electronic devices was
supported by reasonable suspicion and that the scope and
manner of the search were reasonable under the Fourth
Amendment. Cotterman's motion to suppress therefore was
erroneously granted.
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
16
EFTA00315006
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
REVERSED.
*971 CALLAHAN, Circuit Judge, concurring in part,
dissenting in part, and concurring in the judgment, with whom
CLIFTON, Circuit Judge, joins, and with whom M. SMITH,
Circuit Judge, joins as to all but Part II.A:
Whether it is drugs, bombs, or child pornography, we charge
our government with finding and excluding any and all
illegal and unwanted articles and people before they cross
our international bothers. Accomplishing that Herculean task
requires that the government be mostly free from the Fourth
Amendment's usual restraints on searches of people and their
property. Today the majority ignores that reality by erecting
a new rule requiring reasonable suspicion for any thorough
search of electronic devices entering the United States. This
rule flouts more than a century of Supreme Court precedent,
is unworkable and unnecessary, and will severely hamstring
the government's ability to protect our bothers.
I therefore dissent from Part III of the majority's opinion. I
concur in Parts I, II, and IV, and in particular the majority's
conclusion in Part IV that the government had reasonable
suspicion to conduct the forensic examination of Howard
Cotterman's electronic devices. I therefore also concur in the
judgment.
I.
Over the last 125 years, the Supreme Court has explained that
the United States and its people have a "paramount interest"
in national self-protection and an "inherent" right to exclude
illegal and "unwanted persons and effects." United States
v. Flores-Montano, 541 U.S. 149, 152-53, 124 S.Ct. 1582,
158 L.Ed.2d 311 (2004); see also United States v. Montoya
de Hernandez, 473 U.S. 531, 537-40, 105 S.Ct. 3304, 87
L.Ed.2d 381 (1985); United States v. Ramsey, 431 U.S. 606,
616-18, 97 S.Ct. 1972, 52 L.Ed.2d 617 (1977); United States
v. Thirty—Seven (37) Photographs, 402 U.S. 363, 376, 91
S.Ct. 1400, 28 L.Ed.2d 822 (1971); Carroll v. United States.
267 U.S. 132, 154, 45 S.Ct. 280, 69 L.Ed. 543 (1925); Boyd
v. United States, 116 U.S. 616, 623, 6 S.Ct. 524, 29 L.Ed.
746 (1886). Accordingly, "Etlhe Government's interest in
preventing the entry of unwanted persons and effects is at its
zenith at the international border." Flores—Montano, 541 U.S.
at 152, 124 S.Ct. 1582.
To effectuate this interest, the Supreme Court has recognized
a broad exception to the Fourth Amendment's requirement
of probable cause or a warrant for searches conducted at the
border. Under that exception, searches of people and their
property at the United States borders and their functional
equivalents are per se reasonable, meaning that they typically
do not require a warrant, probable cause, or even reasonable
suspicion. Montoya de Hernandez, 473 U.S. at 538, 105
S.Ct. 3304; see also Flores-Montano, 541 U.S. at 152-
53, 124 S.Ct. 1582; Ramsey, 431 U.S. at 616-18, 97 S.Ct.
1972; United States v. Seljan, 547 F.3d 993, 999-1000 (9th
Cir.2008) (en banc), cen. denied, 555 U.S. 1195, 129 S.Ct.
1368, 173 L.Ed.2d 627 (2009).
In the long time that the Court has recognized the border
search doctrine, the Court has found just one search at the
border that required reasonable suspicion. See Montoya de
Hernandez, 473 U.S. at 541, 105 S.Ct. 3304 (upholding the
24—hour detention of a woman suspected of smuggling illegal
drugs in her digestive system, followed by a pregnancy test
and rectal examination, based on reasonable suspicion). In
the remaining cases, the Court consistently has described the
government's *972 border search authority in very broad
terms t and overturned the lower courts' attempts to cabin
that authority. 2 The Court also repeatedly has gone out of its
way to explain that border searches generally are exempt from
the limits it imposes on domestic searches. See, e.g., Flores—
Montano, 541 U.S. at 154, 124 S.Ct. 1582 ("[Oln many
occasions, we have noted that the expectation of privacy is
less at the border than it is in the interior."); Montoya de
Hernandez, 473 U.S. at 539-40, 105 S.Ct. 3304 ("But not
only is the expectation of privacy less at the border than in the
interior, the Fourth Amendment balance between the interests
of the Government and the privacy right of the individual
is also struck much more favorably to the Government at
the border." (internal and external citations omitted)); United
States v. 12 200-Foot Reels of Super 8mm. Film, 413 U.S.
123, 125, 93 S.Ct. 2665, 37 L.Ed.2d 500 (1973) ("Import
restrictions and searches of persons or packages at the
national borders rest on different considerations and different
rules of constitutional law from domestic regulations."). 3
WestlawNext" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
17
EFTA00315007
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
1
See, e.g., Flores-Montano. 541 U.S. at 152, 124 5.0.
1582 (-The Government's interest in preventing the entry
of unwanted persons and effects is at its zenith at the
international border."); id. at 153. 124 S.Ct. 1582 ("It is
axiomatic that the United States, as sovereign. has the
inherent authority to protect, and a paramount interest in
protecting, its territorial integrity."); Ramsey, 431 U.S.
at 617. 97 S.Ct. 1972 ("This interpretation, that border
searches were not subject to the warrant provisions of
the Fourth Amendment and were 'reasonable' within
the meaning of that Amendment, has been faithfully
adhered to by this Court.- ); id. at 620. 97 S.Ct.
1972 (-The border-search exception is grounded in the
recognized right of the sovereign to control, subject
to substantive limitations imposed by the Constitution.
who and what may enter the country."); Thirty-Seven
(37) Photographs, 402 U.S. at 376. 91 S.Ct. 1400 ("IA
traveler's] right to be let alone neither prevents the
search of his luggage nor the seizure of unprotected.
but illegal. materials when his possession of them
is discovered during such a search. Customs officers
characteristically inspect luggage and their power to
do so is not questioned in this case: it is an old
practice and is intimately associated with excluding
illegal articles from the country."); Carroll, 267 U.S.
at 154, 45 S.Ct. 280 ("Travelers may be so stopped in
crossing an international boundary because of national
self-protection reasonably requiring one entering the
country to identify himself as entitled to come in. and
his belongings as effects which may be lawfully brought
in."). Even in Montoya de Hernandez the Coun described
the government's border search authority expansively.
See 473 U.S. at 539-40. 542-44, 105 S.Ct. 3304.
3
See, e.g.. Flores-Montano. 541 U.S. at 152-55. 124
S.Ct. 1582 (overturning the Ninth Circuit's conclusion
that the border search of a gas tank required reasonable
suspicion): Ramsey, 431 U.S. at 616-22.97 S.Ct. 1972
(overturning the ■. Circuit's conclusion that the search
of international mail required probable cause): Thirty—
Seven (37) Photographs. 402 U.S. at 376. 91 5.0. 1400
(relying in pan on border search doctrine to overturn
lower court's decision that statute barring the importation
of obscene material was unconstitutional).
See also City of Indianapolis v. Edmond, 531
U.S. 32. 47-48. 121 S.Ct. 447. 148 L.Ed.2d 333
(2000) (explaining that decision barring domestic
drug interdiction checkpoints "does not affect the
validity of border searches or searches at places like
airports"): United States v. Ross. 456 U.S. 798. 823.
102 &Ct. 2157, 72 L.Ed.2d 572 (1982) (explaining
that while the Fourth Amendment gives protection
to containers in domestic vehicles, "(tjhe luggage
carried by a traveler entering the country may be
searched at random by a customs officer"); Torres v.
Puerto Rico. 442 U.S. 465. 472-74. 99 S.Ct. 2425.
61 L.Ed.2d 1 (1979) (distinguishing between United
States—Puerto Rico border and international borders
in holding unconstitutional the search of a traveler's
luggage without "aniculable suspicion"): United States
v. Brignoni—Ponce, 422 U.S. 873. 884. 95 S.Ct. 2574.
45 L.Ed.2d 607 (1975) ("Except at the border and its
functional equivalents, officers on roving patrol may stop
vehicles" only with reasonable suspicion they contain
illegal aliens): Almeida—Sanchez v. United States, 413
U.S. 266.272-76, 93 S.Ct. 2535, 37 L.Ed.2d 596 (1973)
(distinguishing searches of vehicles at the border from a
search that occurred 25 miles away); Carroll. 267 U.S.
at 151-54.45 S.Ct. 280 (distinguishing between interior
and border searches of vehicles and persons).
•973 II.
It is against this legal backdrop that we must assess the
constitutionality of the government's search in this case. As
with all searches subject to Fourth Amendment review, the
constitutionality of a border search turns on whether it is
reasonable. See Brigham City, Utah v. Swan, 547 U.S. 398,
403. 126 S.Ct. 1943, 164 L.Ed.2d 650 (2006) ("ITIhe ultimate
touchstone of the Fourth Amendment is 'reasonableness.'
"). Under the border search doctrine, suspicionless border
searches are per se reasonable. However, the Supreme Court
has identified three situations in which they might not
be per se reasonable, i.e., at least reasonable suspicion is
required: (1) "highly intrusive searches of the person;" (2)
destructive searches of property; and (3) searches conducted
in a "particularly offensive" manner. Flores—Montano, 541
U.S. at 152-56 & n. 2, 124 S.Ct. 1582.
Although its opinion is not entirely clear, the majority appeals
to rely on the first and third exceptions to hold that the
search at issue in this case required reasonable suspicion.
(There is no claim that the government damaged or destroyed
Cotterman's property.) But the exception for "highly intrusive
searches of the person?' Flores—Montano, 541 U.S. at 152,
124 S.Ct. 1582, cannot apply here; "papers," even private
ones in electronic format, are not a "person." See id. ('The
reasons that might support a requirement of some level of
WeStlaWNeXi © 2015 Thomson Reuters. No claim to original U.S. Government Works.
18
EFTA00315008
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
suspicion in the case of highly intrusive searches of the person
—dignity and privacy interests of the person being searched
—simply do not carry over to vehicles."). That leaves the
exception for searches conducted in a "particularly offensive"
manner. Id. at 154 n. 2, 124 S.Ct. 1582. The majority relies
primarily on the notion that electronic devices are special to
conclude that reasonable suspicion was required. Majority at
963-68. The majority is mistaken.
A.
The majority correctly concludes that the government's
forensic search in Tucson was not an extended border search,
as the border agents retained custody of Cotterman's laptop. 4
Id. at 958, 960-61. The majority also states that lilt is the
comprehensive and intrusive nature of a forensic examination
—not the location of the *974 examination—that is the
key factor triggering the requirement of reasonable suspicion
here." Majority at 962. The inclusion of the word "key"
might be read to imply that some other factor, such as
the location and duration of the search, contributed to its
purported unreasonableness. I write to refute any such notion.
4
I agree with the majority that this case does not involve
an extended border search. Unlike a border search, an
extended border search takes place at a location "away
from the border where entry is not apparent. but where
the dual requirements of reasonable certainty of a recent
border crossing and reasonable suspicion of criminal
activity are satisfied." United States v. Guzman-Padilla.
573 F.3d 865, 878-79 (9th Cir.2009) (internal quotation
marks and citation omitted), ten. denied, — U.S.
—. 131 S.Ct. 67, 178 L.Ed.2d 245 (2010). Reasonable
suspicion is required precisely because the individual
has regained an expectation of privacy by moving away
from the border. See United Slates v. Villasenor. 608
F.3d 467.471-72 (9th Cir.), cert. denied, —U.S.,
131 S.Ct. 547. 178 L.Ed.2d 401 (2010); United States v.
Whiting. 781 F.2d 692.695 (9th Cir.1986). Here, there
was no attenuation between Cotterman's border crossing
and the forensic search of his electronic property: the
government conducted that search before clearing the
property for entry and before Cotterman could regain an
expectation of privacy in that property. See 19 U.S.C.
§ 1499 (providing that imported goods are permitted
entry only after Customs clears them); United States v.
Alfonso, 759 F.2d 728. 734 (9th Cir.1985) ("Extended
border searches occur after the actual entry has been
effected and intrude more on an individual's normal
expectation of privacy.").
First consider the facts. The border agents took Cotterman's
electronic devices to the nearest computing center (to Tucson,
where Cotterman and his wife were already traveling), before
clearing them for entry into the United States. The computer
specialist moved the search ahead of his other work and
conducted it over the weekend. Although the forensic search
lasted five days, it took only 48 hours to discover the initial
75 images of child pornography. The agents were reasonably
reluctant to rely on Cotterman's offer to help, since he
might have deleted or otherwise made unrecoverable any
contraband that his devices contained. The agents returned the
devices as soon as they cleared them.
Now consider the law. The Supreme Court has upheld the
constitutionality of a police search of packages retrieved
from an automobile, even though the police conducted their
search three days after the police stopped the vehicle and
at the police station. United States v. Johns, 469 U.S. 478,
485-88, 105 S.Ct. 881, 83 L.Ed.2d 890 (1985). The Court
rejected the argument that "searches of containers discovered
in the course of a vehicle search are subject to temporal
restrictions not applicable to the vehicle search itself." Id.
at 485. 105 S.Ct. 881. Although Johns involved a domestic
automobile search based on probable cause, it still stands
for the proposition, equally applicable to this case, that "the
legality of the search was determined by reference to the
[applicable] exception to the warrant requirement." Id.
In the border search context, the Supreme Court, in upholding
the lengthy detention of a person reasonably suspected
of smuggling drugs in her digestive system at an airport,
addressed whether that detention was "reasonably related
in scope to the circumstances which justified it initially."
Montoya de Hernandez, 473 U.S. at 542, 105 S.Ct. 3304.
The Court explained that: (1) "courts should not indulge in
unrealistic second-guessing" when answering this question,
as "[aluthorities must be allowed to graduate their response
to the demands of any particular situation;" (2) the Court
consistently has "refused to charge police with delays in
investigatory detention attributable to the suspect's evasive
actions•;" and (3) "we have also consistently rejected hard-
and-fast time limits."Id. at 542-43, 105 S.Ct. 3304 (quotation
marks and citations omitted). The Court emphasized that,
at the international border. "the Fourth Amendment balance
WeStlaWNeff © 2015 Thomson Reuters. No claim to original U.S. Government Works.
19
EFTA00315009
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
of interests leans heavily to the Government" because the
government is charged not just with investigating crime but
with "protecting this Nation from entrants who may bring
anything harmful into this country." Id. at 544, 105 S.Ct.
3304. Finally, any "length" or "discomfort" associated with a
border search does not offend the Fourth Amendment when
it "result's] solely from the method by which [a traveler] cho
roses) to smuggle [contraband] into this country." Id.
Any suggestion that the government's search here was
"particularly offensive" due to the location and duration of
the search runs counter to the Supreme Court's admonitions
in Johns and Montoya de Hernandez. It also effectively
requires the government to supply every port of entry with
the equipment and staff needed to conduct forensic electronic
searches, or at least to have such equipment and staff
waiting at a nearby location. *975 Such a requirement
is unreasonable, particularly since the record in this case
suggests that a forensic search of Cotterman's electronic
devices at the border station would have taken longer than the
search at the Tucson computing center. 5 See United States
v. Hill, 459 F.3d 966, 974-75 (9th Cir.2006), cert. denied,
549 U.S. 1299, 127 S.Ct. 1863, 167 L.Ed.2d 353 (2007)
(discussing problems inherent in requiring police to bring
with them equipment to search electronic media); cf. Johns,
469 U.S. at 486-87, 105 S.Ct. 881 (explaining that requiring
police officers to immediately inspect all packages "would be
of little benefit to the person whose property is searched").
5
The district coon found that the government could have
conducted the forensic search at the Lukeville border
station. United States v. Conerman. No. CR 07-1207—
TUC—RCC 2009 WL 465028. at *I (=.
Feb. 24.
2009). The court presumably based this finding on
testimony that the computer specialist who conducted the
forensic examination had a specially-equipped laptop.
However, the specialist testified that using his laptop at
the border station. rather than transporting Cotterman's
electronic devices to the Tucson computer center, would
have taken "a lot longer" because the laptop was "not
nearly as extensive as what I have in my lab." the
"processor in my laptop is much slower" than the lab
equipment. and "I could only do one computer at a time
with the laptop." Technical difficulties also could have
slowed down an examination conducted at the border
station.
B.
The majority's opinion turns primarily on the notion that
electronic devices deserve special consideration because they
are ubiquitous and can store vast quantities of personal
information. That idea is fallacious and has no place in the
border search context.
The Supreme Court has been willing to distinguish only
between border searches of people and property, not between
different types of property. In 2004, in Flores-Montano, the
Court explained that
the reasons that might support a
requirement of some level of suspicion
in the case of highly intrusive searches
of the person—dignity and privacy
interests of the person being searched
—simply do not carry over to vehicles.
Complex balancing tests to determine
what is a "routine" search of a vehicle,
as opposed to a more "intrusive"
search of a person, have no place in
border searches of vehicles.
541 U.S. at 152, 124 S.Ct. 1582. We have since applied
Flores-Montano to hold that any distinction between
"routine" and "nonroutine" searches does not apply to
searches of property, and that there can be no "least restrictive
means" test for border searches. United States v. Chaudhry,
424 F.3d 1051, 1054 (9th Cir.2005), cert. denied, 547 U.S.
1083, 126 S.Ct. 1803, 164 L.Ed.2d 540 (2006); United States
v. Cortez-Rocha, 394 F.3d 1115, 1122-23 (9th Cir.2004),
cert. denied, 546 U.S. 849, 126 S.Ct. 105, 163 L.Ed.2d
118 (2005).6 Put another way, the Supreme Court—and,
reluctantly, this court—have refused to *976 adopt a sliding
"intrusiveness" scale for border searches of property. Thus,
the Court has all but held that property that crosses the border,
whatever it is, does not merit Fourth Amendment protection.
6
In 1985. the Supreme Court wrote about the
government's "plenary authority to conduct routine
searches and seizures at the border." Montoya de
Hernandez, 473 U.S. at 537, 105 S.Ct. 3304 (emphasis
added): see also id. at 541 n. 4, 105 S.Ct. 3304 ("Because
the issues are nor presented today we suggest no view
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
20
EFTA00315010
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent. 2531, 2013 Daily Journal =.
3018
on what level of suspicion, if any. is required for
nonroutine border searches such as strip, body-cavity.
or involuntary x-ray searches.") (emphasis added). We
unfortunately seized on the word "routine" to establish a
sliding scale of intrusiveness, with more intrusive (Le.,
less "routine") searches requiring reasonable suspicion.
See, e.g.. United States v. Molina—Tarazon. 279 F.3d
709. 711-13 (9th Cir.2002). Flares—Montana plainly
repudiated that approach.
Of course, Flores-Montano, Chaudhry, and Cortez-Rocha
involved vehicles or parts of vehicles, not electronic devices,
and the other border search cases that have reached the
Supreme Court all involved containers of some sort. See, e.g.,
Ramsey, 431 U.S. at 616-22, 97 S.Ct. 1972 (mail); Thirty—
Seven (37) Photographs, 402 U.S. at 376, 91 S.Ct. 1400
(luggage). And yes, the Court has left open the possibility
that a border search might be "
"unreasonable" because
of the particularly offensive manner in which it is carried
out.' " Flores-Montano, 541 U.S. at 154 n. 2, 124 S.Ct. 1582
(quoting Ramsey, 431 U.S. at 618 n. 13, 97 S.Ct. 1972).
But is the mere fact that Cotterman chose to save his child
pornography electronically, rather than print it out on paper,
enough to invoke that exception?
The two courts of appeals—including this court—that have
had occasion to address whether electronic devices deserve
special consideration have correctly concluded that they do
not. In United States v. Arnold, 533 F.3d 1003, 1008-10
(9th Cir.2008), cert. denied, 555 U.S. 1176, 129 S.Ct. 1312.
173 L.Ed.2d 595 (2009), we held that laptops are like other
property, relying on the reasoning and language in Flores—
Montano, Chaudhry, and Cortez—Rocha discussed above
(among other cases). Similarly, in United States v. Ickes, 393
F.3d 501, 503-07 (4th Cir.2005), the Fourth Circuit upheld an
extensive border search of the defendant's laptop that revealed
child pornography. Notably, the court held that the border
agents had reasonable suspicion to search the defendant's
laptop, but explained why that did not matter:
The agents did not inspect the
contents of Ickes's computer until
they had already discovered marijuana
paraphernalia, photo albums of child
pornography,
a
disturbing
video
focused on a young ball boy, and
an outstanding warrant for Ickes's
arrest. As a practical matter, computer
searches are most likely to occur where
—as here—the traveler's conduct
or the presence of other items in
his possession suggest the need to
search further. However, to state the
probability that reasonable suspicions
will give rise to more intrusive
searches is a far cry from enthroning
this notion as a matter of constitutional
law. The essence of border search
doctrine is a reliance upon the
trained observations and judgments of
customs officials, rather than upon
constitutional requirements applied to
the inapposite context of this sort of
search.
/d. at 507. Thus, the Fourth Circuit has recognized what
the majority does not: electronic devices are like any other
container that the Supreme Court has held may be searched
at the border without reasonable suspicion. 7 Though we are
not bound by Arnold nor Ickes in this en banc proceeding, we
are bound by what the Supreme Court has said: in the unique
context of border searches, property is property and we may
not chip away at the government's authority to search it by
adopting a sliding scale of intrusiveness. It's the border, not
the technology, that "matters." Majority at 965; cf. Ramsey,
431 U.S. at 620, 97 S.Ct. 1972 ("It is clear that there is nothing
in the rationale behind the border-search exception which
•977 suggests that the mode of entry will be critical.").
7
I agree with Judge Smith that the majority's opinion
appears to create an imprudent split with the Fourth
Circuit. See Dissent at 982.
Logic and commonsense, not just Supreme Court precedent,
reveal the flaws in the majority's opinion. The fact that
electronic devices are capable of storing a lot of personal
information does not make an extensive search of them
"particularly offensive." We have squarely rejected the idea
that the "intrusiveness" of a search depends in whole or
in part on the nature of the property being searched. In
United States v. Giberson, 527 F.3d 882 (9th Cir.2008), we
specifically rebuffed the argument that computers are special
for Fourth Amendment purposes by virtue of how much
information they store; "neither the quantity of information,
nor the form in which it is stored, is legally relevant in the
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
21
EFTA00315011
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
Fourth Amendment context" Id. at 888; see also California
v. Carney, 471 U.S. 386,393-94, 105 S.Ct. 2066, 85 L.Ed.2d
406 (1985) (rejecting applying Fourth Amendment protection
to property (a mobile home) that is "capable of functioning
as a home" simply on account of the property's size or
"worth[inessl" as a container); United States v. Payton, 573
F.3d 859, 864 (9th Cir.2009) ("Giberson held that computers
were not entitled to a special categorical protection of the
Fourth Amendment."); Kyllo v. United States, 533 U.S. 27.
41, 121 S.Ct. 2038, 150 L.Ed.2d 94 (2001) (Stevens, J.,
dissenting) (explaining that Fourth Amendment exceptions
and distinctions based solely on a type of technology are
"unwise[ ] and inconsistent with the Fourth Amendment").
While Giberson and Carney involved domestic searches,
their reasoning applies equally in the border search context.
If the government may search the contents of a briefcase, car,
or mobile home that transits the border, there is no reason it
should not also be able to search the contents of a camera,
tablet, or laptop that enters the country. All of those things
are capable of storing, and often do store, private information.
See Ross, 456 U.S. at 823, 102 S.Ct. 2157 ("The luggage
carried by a traveler entering the country may be searched at
random by a customs officer; the luggage may be searched no
matter how great the traveler's desire to conceal the contents
may be." (emphasis added)). The majority points out that
electronic devices can and usually do store much more private
information than their non-electronic counterparts. Majority
at 962-65. But "a port of entry is not a traveler's home,"
Thirty—Seven (37) Photographs, 402 U.S. at 376, 91 S.Ct.
1400, even if a traveler chooses to carry a home's worth
of personal information across it. 8 Moreover, a bright-line
rule distinguishing electronic from non-electronic devices—
of the *978 sort the Supreme Court has made clear has no
place in Fourth Amendment jurisprudence, Ohio v. Robinette,
519 U.S. 33, 39, 1 l7 S.Ct. 417, 136 L.Ed.2d 347 (1996)—is
arbitrary; there is no reason someone carrying a laptop should
receive greater privacy protection than someone who chooses
(or can only afford) to convey his or her personal information
on paper.
8
The element of choice is crucial. The fact that border
searches occur at fixed times and checkpoints makes
them inherently less intrusive: a person "with advance
notice of the location of a permanent checkpoint has
an opportunity to avoid the search entirely. or at least
to prepare for, and limit, the intrusion on her privacy."
Mich. Delft of State Police v. Sitz. 496 U.S. 444. 463.
110 S.Ct. 2481, 110 L.Ed.2d 412 (1990) (Stevens, J..
dissenting): see also Montoya de Hernandez, 473 U.S.
at 544. 105 S.Ct. 3304 ("Respondent's detention was
long, uncomfortable, indeed, humiliating: but both its
length and its discomfort resulted solely from the method
by which she chose to smuggle illicit drugs into this
country.- ).
The element of choice goes to the more fundamental
issue of whether someone can have any reasonable
expectation of privacy when he or she voluntarily
canes electronic equipment across the border. Border
officers are permitted to examine a written diary. and
someone who wants to keep the contents of a diary
secret should know not to take it across the border.
The same should be true for personal data stored on a
laptop or other electronic device rather than a written
diary.
Moreover, the fact that the Fourth Amendment
does not apply in foreign countries further weakens
any claim to a reasonable expectation of privacy
in property that crosses the United States border.
Carrying an electronic device outside the United States
almost always entails carrying it into another country.
making it subject to search under that country's laws.
Travelers expect these intrusions, or at least their
possibility.
In short, today the court erects a new bright-line rule:
"forensic examination" of electronic devices "at the border
requires reasonable suspicion." Majority at 962; see also id.
at 964 n. 10. The majority never defines "forensic," leaving
border agents to wonder exactly what types of searches are
off-limits.9 Even if the majority means to require reasonable
suspicion for any type of digital forensic border search, no
court has ever erected so categorical a rule, based on so
general a type of search or category of property, and the
Supreme Court has rightly slapped down anything remotely
similar. The majority invites—indeed, requires—the Court to
do so again. 10
9
See Darrin J. Behr. Anti-Forensics: What it Does and
Why You Need to Know, 255
Law. 9. 10 (Dec.
2008) ("Due to the fact that there are hundreds of digital
forensic investigation procedures developed all over the
world. digital forensics has yet to be defined.").
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
22
EFTA00315012
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
10
I note that a case currently pending in the Sixth Circuit
appears to raise similar issues as this case. See United
States v. Stewart, No. 12-1427 (6th Cir. filed Apr. 5.
24342): see also United States p. Stewart, 715 F.Supp.2d
750 (2010).
The
majority's holding contravenes Supreme Court
precedent, defies logic and commonsense, and is unworkable.
It is also unnecessary and will impair the federal government's
ability to protect our borders.
As Judge Smith points out in his dissent, Iblorder patrol
agents process hundreds of thousands of travelers each day
and conduct thousands of searches on electronic devices each
year." Dissent at 61-62 (citation omitted). All the evidence
in this case suggests that the government does not have
the resources—time, personnel, facilities, or technology—
to exhaustively search every (or even a majority) of the
electronic devices that cross ow borders. Cf. Ickes, 393 F.3d
at 507. Unless we somehow manage to solve our fiscal
problems, and unless the government somehow manages
to acquire better technology at a faster pace than the rest
of us, these restraints will continue. That means border
agents must prioritize who, what, and how they search. By
and large, border agents will conduct forensic electronic
searches of people who, like Howard Cotterman, the agents
reasonably suspect may be trying to carry illegal articles
into, or themselves illegally enter, the country. II That
agents typically will have reasonable suspicion is, *979 of
course, "a far cry from enthroning this notion as a matter of
constitutional law." Ickes, 393 F.3d at 507.
11
Testimony from the suppression hearing in this case
suggests that remote and/or intensive searches of
electronic devices crossing the border do not occur all
that often. For example. the computer specialist who
conducted the forensic search of Cotterman's laptop
testified that the search was the first one he was asked
to conduct in his 18 months on the job at the Tucson
computer center. (He added that at his previous post at
San Francisco International Airport. forensic searches
were done right at the airport.) Similarly, one of the
border agents testified that this was the first case he was
aware of in which electronic devices were turned over
to Immigrations and Customs Enforcement for forensic
examination, and that even cursory reviews of laptops for
information about illegal drug trading occurred "no more
than five" times during agent's three-plus years at the
Lukeville border station. See Michael Chenoff. Secretary
of Homeland Security. Searches Are Legal. Essential.
USA Today. July 16. 2008 ("Of the approximately 400
million travelers who entered the country last year. only
a tiny percentage were referred to secondary baggage
inspection for a more thorough examination. Of those.
only a fraction had electronic devices that may have been
checked.").
The majority finds this reality check to be of "little
comfort(;( lilt is the potential unfettered dragnet effect that is
troublesome." Majority at 966. But that abstract risk, which
exists with any exception to the Fourth Amendment, does
not justify a bright-line rule requiring reasonable suspicion
for any thorough search of electronic devices entering the
United States. See Robinette, 519 U.S. at 39, 117 S.Ct. 417
("(W'e have consistently eschewed bright-line rules, instead
emphasizing the fact-specific nature of the reasonableness
inquiry."); see also Lyng v. My. Indian Cemetery Protective
485 U.S. 439, 445, 108 S.Ct. 1319, 99 L.Ed.2d
534 (1988) ("A fundamental and longstanding principle
of judicial restraint requires that courts avoid reaching
constitutional questions in advance of the nrreccity of
deciding them.").
Moreover, border agents are not free to undertake "unfettered
crime-fighting searches or an unregulated assault on citizens'
private information." Majority at 966. As I explained in my
concurrence in Seljan, Congress and the Executive Branch
have (and have exercised) the authority to restrict when and
how border agents conduct searches. See Seljan, 547 F.3d at
1012 (Callahan, J.. concurring) (citing, e.g., 19 U.S.C. § 1583;
19 C.F.R. § 145.3(b)-(c)); see also Yule Kim, Cong. Research
Serv. RL34404, Border Searches of Laptop Computers and
Other Electronic Storage Devices, 13-14 (2009) (describing
recent legislative proposals to limit border searches of
electronic devices). In a similar vein, Justice Breyer has
noted that "Customs keeps track of the border searches its
agents conduct, including the reasons for the searches. This
administrative process should help minimize concerns that
[border' searches might be undertaken in an abusive manner."
Flores-Montano, 541 U.S. at 156, 124 S.Ct. 1582 (Breyer, J.,
concurring) (internal citation omitted). 12
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
23
EFTA00315013
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
12
See also U.S. Customs & Border Protection.
Directive No. 3340-049. Border Search of Electronic
Devices Containing Information, 3-9 (2009) (describing
procedures for, and limits on. border searches of
electronic devices).
Apart from being unnecessary, the majority's new limits on
the government's border search authority will make it much
harder for border agents to do their jobs, for at least two
reasons. First, it is common knowledge that border agents
at security checkpoints conduct more thorough searches not
simply of those persons who arouse suspicion but also of
a percentage of travelers on a random basis. Othenvise, a
person who appears entirely innocent will have nothing to
fear and will not be deterred from carrying something that
should not be brought into the country. A checkpoint limited
to searches that can be justified by articulable grounds for
"reasonable suspicion" is bound to be less effective.
Second, courtesy of the majority's decision, criminals now
know they can hide their child pornography or terrorist
connections in the recesses of their electronic devices, while
border agents, fearing Fourth Amendment or Bivens actions,
will avoid conducting the searches that could find those illegal
articles. The result *980 will be that people and things we
wish to keep out of our country will get in—a result hardly
in keeping with our "inherent authority to protect, and a
paramount interest in protecting," the "territorial integrity"
of the United States. Flores-Montano, 541 U.S. at 153, 124
S.Ct. 1582. The border search doctrine must account for the
fact that border agents may need time and forensics to bypass
"evasive actions" a criminal has taken to hide contraband or
other illegal articles from plain view. Montoya de Hernandez.
473 U.S. at 542-43, 105 5.0. 3304. I would rather leave
those difficult decisions "to the discretion of the officers in
the field who confront myriad circumstances we can only
begin to imagine from the relative safety of our chambers."
United States v. Williams, 419 F.3d 1029, 1034 (9th Cir.),
cert. denied, 546 U.S. 1081, 126 S.Ct. 840, 163 L.Ed.2d 715
(2005). 13
13
The majority insists that reasonable suspicion is a
"modest, workable standard" that is applied in domestic
stops of automobiles "and other contexts." and that
still allows "agents to draw on their expertise and
experience." Majority at 967. 967 n. 14. The majority
is wrong for at least three reasons. First, in making this
argument. the majority reveals that it does not appreciate
the crucial differences between domestic and border
searches, despite those differences being spelled out in
a century of case law. Those differences range from the
legitimate expectation of privacy that people have in
their property to the constraints government officials face
in searching it. Second. a reasonable suspicion standard
injects unnecessary judicial review where previously
it was absent. Third, just because border agents could
apply the reasonable suspicion standard does not mean
they are, or should be. constitutionally compelled to do
so. See Ickes. 393 F.34 at 507: cf. Seljan. 547 F.34 at
1011 (Callahan. J. concurring) (explaining that requiring
border agents to apply a First Amendment exception
to border searches "would require them to engage in
the son of decision-making process that the Supreme
Court wished to avoid in sanctioning expansive border
searches").
Iv.
The border search exception to the Fourth Amendment
may be just that—an exception—but it is, and must be, a
mighty one. The government's right and duty to protect ow
nation's territorial integrity demand that the government have
clear authority to exclude—and thus to find—those people
and things we have decided are offensive, threatening, or
otherwise unwanted. Recognizing this, the Supreme Court
has only once required reasonable suspicion for border
searches in the 125 years it has been reviewing them.
In the remaining cases, the Court has eschewed bright-
line rules, balancing tests, and sliding intrusiveness scales,
alluding to the possibility of, but never finding, a "particularly
offensive" search. The fact that electronic devices can store
large amounts of private information, or that the government
can search them forensically, does not make a thorough
search of such devices "particularly offensive." Rather, the
Supreme Court and this court have wisely avoided making
the reasonableness of a search turn on the nature of the
property being searched, for the many reasons discussed
above. The result has been a clear, well-understood, efficient,
and effective rule that border searches are per se reasonable.
Regrettably the majority, dispensing with these well-settled,
sensible, and binding principles, lifts our anchor and charts
a course for muddy waters. Now border agents, instead of
knowing that they may search any and all property that
WeStlaWNW © 2015 Thomson Reuters. No claim to original U.S. Government Works.
24
EFTA00315014
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
crosses the border for illegal articles, must ponder whether
their searches are sufficiently "comprehensive and intrusive,"
Majority at 962, to require reasonable suspicion, and whether
they have such suspicion. In *981 most cases the answer
is going to be as clear as, well, mud. We're due for another
course correction.
M. SMITH, Circuit Judge, dissenting, with whom CLIFTON
and CALLAHAN, Circuit Judges, join with respect to Part I:
I respectfully dissent. Until today, federal courts have
consistently upheld suspicionless searches of electronic
storage devices at the border. See United States v. Arnold,
533 F.3d 1003, 1008 (9th Cir.2008) cert. denied, 555 U.S.
1176, 129 S.Ct. 1312. 173 L.Ed.2d 595 (2009) ("[R]easonable
suspicion is not needed for customs officials to search a
laptop or other personal electronic storage devices at the
border."); see also United States v. Ickes, 393 F.3d 501, 507
(4th Cir.2005) (no finding of reasonable suspicion required to
search personal computers and disks at border); United States
t'. Linarez—Delgado, 259 Fed.Appx. 506, 508 (3d Cir.2007);
United States v. McAuley, 563 F.Supp.2d 672, 677-78
.2008); United States v. Bunty, 617 F.Supp.2d 359,
365 (
.2008). Yet the majority ignores these cases,
rewrites long standing Fourth Amendment jurisprudence,
and, in narrowing Arnold, creates a circuit split.
While I share some of the majority's concerns about the
steady erosion of our personal privacy in this digital age.
the majority's decision to create a reasonable suspicion
requirement for some property searches at the border so
muddies current border search doctrine that border agents will
be left to divine on an ad hoc basis whether a property search
is sufficiently "comprehensive and intrusive" to require
reasonable suspicion, or sufficiently "unintrusive" to come
within the traditional border search exception. Requiring
border patrol agents to determine that reasonable suspicion
exists prior to performing a basic forensic examination of a
laptop or other electronic devices discourages such searches,
leaving our borders open to electronically savvy terrorists
and criminals who may hereafter carry their equipment and
data across our borders with little fear of detection. In fact,
the majority opinion makes such a legal bouillabaisse out
of the previously unambiguous border search doctrine, that
I sincerely hope the Supreme Court will grant certiorari,
and reverse the holding in this case regarding the level of
suspicion necessary to search electronic devices at the border,
for the sake of our national security, and the consistency of
our national border search law.
The Supreme Court rejected our last attempt to narrow
the border search exception, cautioning us not to create
"complex balancing tests" for border searches of property
except in the rarest of cases, where the search is "so
destructive as to require" reasonable suspicion. United States
v. Flores—Montano, 541 U.S. 149, 152, 156, 124 S.Ct. 1582,
158 L.Ed.2d 311 (2004) (rejecting our proposed reasonable
suspicion requirement in United States v. Molina-Tarazon,
279 F.3d 709, 713-17 (9th Cir.2002)). "Time and again" the
Court has concluded that border searches are " 'reasonable
simply by virtue of the fact that they occur at the border.' "
Id. at 152-53 (quoting United States v. Ramsey, 431 U.S. 606,
616, 97 S.Ct. 1972, 52 L.Ed.2d 617 (1977)).
Despite the Court's clear ruling on the issue, the majority
again seeks to whittle away at the border search exception,
this time by conjuring a reasonable suspicion requirement for
border searches that employ computer software to search an
electronic storage device. Why the use of computer software
to analyze a hard drive triggers a reasonable suspicion
requirement while a "manual review" of the same hard
drive requires no suspicion, is left unexplained. Although
technology may *982 serve as a useful proxy for the
intrusiveness of a search today, in the future even cursory
searches might be more efficiently conducted by the use of
such technology. Under the majority's reasonable suspicion
standard, individuals' privacy rights are only as secure as the
sophistication of the government's current search mechanism.
Moreover, the task of distinguishing these "comprehensive
and intrusive" laptop searches from the "unintrusive search"
of a laptop affirmed in Arnold, 533 F.3d at 1008, or the
search of a private letter affirmed in United States v. Seljan,
547 F.3d 993, 1003 (9th Cir.2008) (en bane), leaves border
patrol officers with a difficult choice: either protect our nation
from those who mean us harm, or risk their own jobs and
livelihood in a Bivens action, or disciplinary proceedings.
Apart from being administratively impractical, the majority's
reasonable suspicion requirement disregards well established
border search jurisprudence, and undermines vital national
security interests. Ironically, the majority did not even need
to consider the border search doctrine in this case because the
search at issue in this case did not occur at the border.
WestlawNexts © 2015 Thomson Reuters. No claim to original U.S. Government Works.
25
EFTA00315015
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
Separately, but importantly, the majority's application of
the reasonable suspicion requirement to Cotterman is
also troubling. The majority purports to be concerned
with travelers' "personal privacy and dignity," but its
determination that reasonable suspicion exists under the
exceedingly weak facts of this case undermines the liberties
of U.S. citizens generally—not just at the border, and not just
with regard to our digital data—but on every street corner,
in every vehicle, and wherever else we rely on the doctrine
of reasonable suspicion to safeguard our legitimate privacy
interests.
I. The Border Search Doctrine
The majority heralds this as a "watershed" case that requires
a narrowing of the border search exception to accommodate
the privacy interests allegedly created by new technologies.
Yet despite the majority's attempts to avoid the fact, the
border search exception is clear and inflexible. The Supreme
Court has repeatedly affirmed the breadth of the border search
doctrine, extending a reasonable suspicion requirement only
to: ( I ) "highly intrusive searches of the person"; (2) "searches
of property [that] are so destructive as to require" reasonable
suspicion; and (3) searches carried out in a "particularly
offensive manner"—of which the Court has yet to find an
example. Flores-Montano. 541 U.S. at 152, 154 n. 2, 156,
124 S.Ct. 1582 (quotations and citations omitted) (emphasis
added).
The
majority
misconstrues
these
narrowly-defined
exceptions, reading Flores—Montano to require reasonable
suspicion whenever a search of property is deemed "overly
intrusive." Majority at 18-19. Yet, the exceptions articulated
in Flores—Montano are far more circumscribed—applying
not to "overly intrusive" searches of property, like the
search of Cotterman's computer, but only to "highly intrusive
searches of the person." Flores-Montano, 541 U.S. at 152,
124 S.Ct. 1582 (emphasis added). The majority's adoption
of a reasonable suspicion requirement to "comprehensive
forensic examination[s]" of property is irreconcilable with
Flores-Montano. Majority at 956.
We have consistently rejected a reasonable suspicion
requirement for border searches of expressive materials,
such as papers and their modem•day equivalent—the data
contained on electronic storage devices. See, e.g., Seljan.
547 F.3d at 1003 ("An envelope containing personal
correspondence is not uniquely protected from *983 search
at the border."); Arnold, 533 F.3d at 1008 ("[R]easonable
suspicion is not needed for customs officials to search a
laptop or other personal electronic storage devices at the
border."). The majority states that its en bane decision
narrows Arnold to permit only "relatively simple" border
searches of laptops. and "not to countenance suspicionless
forensic examinations." Majority at 14 n.6. In narrowing
Arnold, however, the court creates a circuit split regarding
the application of reasonable suspicion to border searches of
electronic devices. See United States v. Ickes, 393 F.3d 501
(4th Cir.2005); see also United States v. Linarez—Delgado.
259 Fed.Appx. 506, 508 (3d Cir.2007).
For instance, in Ickes (as in Arnold ) the defendant•appellant
argued that a reasonable suspicion requirement was necessary
for laptop searches at the border because otherwise "any
person carrying a laptop computer
on an international flight
would be subject to a search of the files on the computer hard
drive." Ickes. 393 F.3d at 506-07. The Fourth Circuit rejected
this argument, noting that
"Ns a practical matter, computer
searches are most likely to occur where
—as here—the travelers conduct
or the presence of other items in
his possession suggest the need to
search further. However, to state the
probability that reasonable suspicions
will give rise to more intrusive
searches is a far cry from enthroning
this notion as a matter of constitutional
law. The essence of border search
doctrine is a reliance upon the
trained observations and judgments of
customs officials, rather than upon
constitutional requirements applied to
the inapposite context of this son of
search."
Id. at 507 (emphasis added). The Third Circuit similarly
rejected a reasonable suspicion requirement for border
searches of electronic data, albeit in an unpublished opinion.
See United States v. Linarez—Delgado, 259 Fed.Appx. 506,
508 (3d Cir.2007) ("Data storage media and electronic
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
26
EFTA00315016
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
equipment, such as films, computer devices, and videotapes,
may be inspected and viewed during a reasonable border
search.") (citing Ickes, 393 F.3d 501). Because the majority
has narrowed ow holding in Arnold that "reasonable
suspicion is not needed for customs officials to search a laptop
or other personal electronic storage devices at the border,"
Arnold, 533 F.3d at 1008, the Ninth Circuit stands alone, as
it so often does.
The majority likens the search of Cotterman's laptop to
a "computer strip search," Majority at 966, and proceeds
to conflate the law regarding property searches with that
regarding "highly intrusive searches of the person." Flores-
Montano, 541 U.S. at 152, 124 5.0. 1582. However, the
"reasons that might support a requirement of some level
of suspicion in the case of highly intrusive searches of the
person—dignity and privacy interests of the person being
searched—simply do not carry over" to laptops, which
know no dignity or shame, and thus have neither of those
interests. Flores—Montano, 541 U.S. at 152, 124 set. 1582
(emphasis added). Moreover, even genuine strip searches do
not necessarily require reasonable suspicion at the border. See
United States v. Montoya de Hernandez, 473 U.S. 531.541 n.
4. 105 S.Ct. 3304, 87 L.Ed.2d 381 (1985) (expressly declining
to decide "what level of suspicion, if any, is required for ...
strip, body cavity, or involuntary x-ray searches") (emphasis
added).
The majority's decision to insulate electronic storage devices
from the border search exception unsettles the border search
doctrine, places inappropriate burdens on law enforcement,
reduces deterrence, *984 and raises serious national security
concerns. It also ignores the realities of electronic data
transmission and the reduced privacy expectations that
accompany much of this data, particularly at the border
where "[tlhe government's interest in preventing the entry
of unwanted persons and effects is at its zenith." Flores—
Montano, 541 U.S. at 152, 124 S.Ct. 1582.
A. Burdens on Law Enforcement
The majority's holding cripples law enforcement at the border
by depriving border patrol agents of the clear administrative
guidance they need to carry out core law enforcement
activities. "Officers who interact with those suspected of
violating the law have an essential interest in readily
administrable rules." Florence v. Bd. of Chosen Freeholders
of Cnty. of Burlington, — U S —, 132 S.Ct. 1510,
1522, 182 L.Ed.2d 566 (2012). Yet the majority's holding
requires border patrol agents to determine on a case-by-case
and moment-by-moment basis whether a search of digital
data remains "unintrusive," a la Arnold, or has become
"comprehensive and intrusive," a la Cottennan. Majority at
960. 962. Requiring law enforcement to make such complex
legal determinations on the spot, and in the face of potentially
grave national security threats, strips agents of their necessary
discretion and deprives them of an efficient and administrable
rule.
The majority dismisses the burden its reasonable suspicion
requirement places on law enforcement, asserting that agents
can simply "draw on their expertise and experience" to make
the necessary judgment calls. Majority at 967. Yet rather
than actually deferring to this expertise and experience, the
majority forces border patrol agents to justify their decisions
under a heightened standard that has never before been
applied to border searches of property.
Border patrol agents process hundreds of thousands of
travelers each day and conduct thousands of searches on
electronic devices each year. I Identifying national security
and criminal threats at the border requires a high level of
experience and discretion in order to recognize and respond
to the ever-changing tactics of those who seek to enter
our country with nefarious intent. In recognition of these
crucial interests, the border search exception provides law
enforcement with broad discretion to conduct border searches
of property without resorting to case-by-case determinations
of reasonable suspicion—determinations border patrol agents
are ill-equipped to handle. See generally Florence, 132 S.Ct.
at 1522 (rejecting reasonable suspicion requirement for prison
strip-searches under this rationale). Moreover, as a practical
matter. suspicionless border searches of property make sense,
in light of the sheer number of individuals crossing the
border with electronic devices each day. See United States
R Martinez—Fuerte, 428 U.S. 543, 557, 96 &Ct. 3074, 49
L.Ed.2d 1116 (1976) (requiring reasonable suspicion for
vehicle checkpoints near the Mexican border "would be
impractical because the flow of traffic tends to be too heavy
to allow the particularized study of a given car"). Given
these realities of law enforcement at the border, a reasonable
WeStlaWNPid" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
27
EFTA00315017
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
suspicion requirement for all "overly intrusive" electronic
searches is simply not practicable.
1
Department of Homeland Security Privacy Office.
Annual Report to Congress 54 (2009).
B. National Security Concerns
The majority's decision to insulate electronic devices from
search at the border creates serious national security concerns.
An "ever present threat exists from the *985 potential for
terrorists to employ the same smuggling and transportation
networks. infrastructure, drop houses, and other support" as
other illegal aliens. U.S. Customs and Border Protection,
National Border Patrol Strategy 5 (2005). The Department
of Homeland Security has found that border searches of
electronic storage devices are "essential" for "detect[ing]
evidence relating to terrorism and other national security
matters."2 Terrorists rely on electronic storage devices,
for example, to copy and alter passports and other travel
documents. 3 By providing special privacy protections for
electronic devices at the border, the majority eliminates the
powerful deterrent of suspicionless searches and significantly
aids technologically savvy terrorists and criminals who
rely on encryption and other surreptitious forms of data
storage in their efforts to do harm. See Martinez-Fuerte, 428
U.S. at 557, 96 S.Ct. 3074 (rejecting reasonable suspicion
requirement for vehicle checkpoints near the Mexican
border because to hold otherwise "would largely eliminate
any deterrent to the conduct of well-disguised smuggling
operations").
2
3
U.S. Customs and Border Protection. Border Search
of Electronic Devices Containing Information. CBP
Directive No. 3340-049 § 1 (2009).
Thomas R. Eldridge. et at.. 9/11 and Terrorist Travel:
Staff Report of the National Commission on Terrorist
Attacks Upon the United States 60 (2004).
The majority contends that the goal of deterrence does
not justify "any manner of intrusive search" at the border.
Majority at 967. Although I certainly agree with the majority
that a policy objective like deterrence cannot justify an
otherwise unconstitutional "highly intrusive search'
of
the person " at the border, Flores-Montano, 541 U.S.
at 152. 124 S.Ct. 1582, the crucial role of deterrence
cannot, and should not, be understated. In fact, the Supreme
Court recently affirmed the importance of deterrence in
upholding suspicionless strip searches—the apotheosis of
an intrusive search. Florence, 132 S.Ct. at 1516 (rejecting
reasonable suspicion requirement for prison strip searches
and reasoning that "deterring the possession of contraband
depends in part on the ability to conduct searches without
predictable exceptions"). The suspicionless strip search
upheld in Florence. which included a close visual inspection
of "the buttocks or genital areas," was unquestionably more
intrusive than the so-called "computer strip search" at issue
here. Id. at 1515.
The majority contends that the deterrence function of
suspicionless searches will not be hampered by the
requirement of reasonable suspicion because, "as a matter
of commonsense and resources, it is only when reasonable
suspicion is aroused that such searches typically take place."
Majority at 967 n. 14. This is, of course, the very argument
rejected by the Fourth Circuit in Ickes. See Ickes, 393 F.3d
at 507 ("As a practical matter, computer searches are most
likely to occur where—as here—the traveler's conduct or
the presence of other items in his possession suggest the
need to search further. However, to state the probability
that reasonable suspicions will give rise to more intrusive
searches is a far cry from enthroning this notion as a matter
of constitutional law.").
In addition to undermining deterrence, a reasonable suspicion
requirement will likely disincentivize agents to conduct
laptop searches in close cases. See Florence, 132 S.Ct. at 1522
(- To avoid liability" if required to find reasonable suspicion,
"officers might be inclined not to conduct a thorough search
in any close case, thus creating unnecessary risk for the
entire jail population."). Border patrol agents *986 accused
of conducting an -unreasonable" search face very real
consequences—as federal officials, for example, they may
be sued in their individual capacities for civil damages, as
part of a Bivens4 action. See Ronald J. Sievert. Meeting
the Twenty-First Century Terrorist Threat Within the Scope
of Twentieth Century Constitutional Law, 37 Hous. L.Rev.
1421, 1424 (2000). The majority's reasonable suspicion
requirement saddles border patrol agents with a "Sophie's
choice" between securing our nation, and protecting their own
livelihoods. These misaligned incentives create unnecessary
WeStlaWNPid" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
28
EFTA00315018
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
risk, not just for a prison population, as in Florence, 132 S.Ct.
at 1522, but for our entire nation.
4
Bivens v. Six Unknown Fed. Narcotics Agents, 403 U.S.
388.91 S.Ct. 1999.29 L.Ed.2d 619 (1971).
C. Expectation of Privacy in Electronic Data at the
Border
The majority suggests that travelers at the border have a
heightened expectation of privacy in their electronic storage
devices, due to the "uniquely sensitive nature of [this] data."
Majority at 966. There is no question that searches of
electronic data are protected by the Fourth Amendment, but
we have never found this data to be immune from the border
search exception. In fact, these electronic storage devices are
hardly a bastion of privacy. When connected to the Internet,
they transmit a massive amount of intimate data to the public
on an almost constant basis, rendering it unremarkable that
they can be searched at the border, where "[t]he government's
interest in preventing the entry of unwanted persons and
effects is at its zenith." Flores—Montano, 541 U.S. at 152, 124
S.Ct. 1582.
Indeed, Facebook, for example, now has more than 500
million users, who share more than 25 billion pieces of data
each month. 5 Those who opt out of social networking sites
are no less susceptible to the ubiquitous Internet cookie,
which collects data on users' Internet activities to share or sell
with other organizations. Max Stul Oppenheimer, Consent
Revisited, 13 No. 12 J. Internet L. 3, 4 (2010). Until recently,
a federally funded data accumulation system allowed clients
to "search tens of billions of data records on individuals
and businesses in mere seconds..6 Considering the steady
erosion of our privacy on the Internet, searches of electronic
storage devices may be increasingly akin to a well-placed
Internet search. Ironically, the majority creates a zone of
privacy in electronic devices at the border that is potentially
greater than that afforded the Google searches we perform in
our own homes, and elsewhere.
5
Jeffrey Rosen. The Deciders: Facebook. Google, and the
Future of Privacy and Free Speech. in Constitution 10:
Freedom and Technological Change (Constitution 3.0)
76 (Jeffrey Rosen & Benjamin Wittes Ms.. Brookings
Institution Press 2011).
6
Christopher Slobogin. Is the Fourth Amendment
Relevant?, in Constitution 3.0 18 (citing Laura K.
Donohue. Anglo-American Privacy and Surveillance. 96
J.Critn. L. & Criminology 1059. 1150-51 (2006)).
The majority muses that "[a] person's digital life ought not
be hijacked simply by crossing the border," Majority at 22,
but it fails to explain why electronic data deserves special
protections when we have never extended such protections
to the same data in written form. See Seljan, 547 F.3d at
1003 ("An envelope containing personal correspondence is
not uniquely protected from search at the border."); see also
United States v. Tsai, 282 F.3d 690, 696 (9th Cir.2002) (no
reasonable suspicion needed to search a traveler's briefcase);
*987 United States v. Grayson, 597 F.2d 1225, 1228-29
(9th Cir.1979) (no reasonable suspicion needed to search
papers found in a shirt pocket); Henderson v. United States.
390 F.2d 805, 808 (9th Cir.1967) (no reasonable suspicion
needed to search a traveler's "purse, wallet, or pockets"). The
documents carried on today's smart phones and laptops are
different only in form, but not in substance, from yesterday's
papers, carried in briefcases and wallets. The majority
contends that electronic devices hold data of a "uniquely
sensitive nature" and that, inexplicably, these devices have
the "capability to ... augment the expectation of privacy."
Majority at 965, 966. Under the tnajority's reasoning, the
mere process of digitalizing our diaries and work documents
somehow increases the "sensitive nature" of the data therein,
providing travelers with a greater expectation of privacy in
a diary that happens to be produced on an iPad rather than
a legal pad. Such artificial and arbitrary distinctions cannot
serve as a reasonable basis for determining privacy rights at
the border.
The majority attempts to distinguish electronic devices from
papers by the vast amount of data they can hold, noting that
"[a] car full of packed suitcases ... cannot hold a candle to
the sheer, and ever-increasing, capacity of digital storage."
Majority at 964. Yet, "case law does not support a finding
that a search which occurs in an otherwise ordinary manner.
is `particularly offensive' simply due to the storage capacity
of the object being searched." Arnold, 533 F.3d at 1010.
The majority contends that it "discuss[es] the typical storage
capacity of electronic devices simply to highlight the features
that generally distinguish them from traditional baggage."
Majority at 964 n. 10. Yet why the majority would bother
to distinguish between the storage capacities of electronic
WeStlaWNEd" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
29
EFTA00315019
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
devices and traditional luggage is a mystery, unless to support
its enhanced protections for electronic devices based on their
greater storage capacity.
Mapping our privacy rights by the amount of information
we carry with us leads to unreasonable and absurd results.
Under the majority's reasoning, a Mini Cooper filled with
documents is entitled to less privacy protection at the border
than a stretch Rolls—Royce filled with documents; a pickup
truck filled with documents is entitled to less protection than
an 18 wheeler filled with documents. It appears that those
who cannot afford a 64 gigabyte iPad, or the "average" 400
gigabyte hard drive discussed by the majority, Majority at
964, will alone be subject to suspicionless searches. The
majority's reasoning also protects the rich (who can generally
afford more sophisticated devices) to a greater extent than
the poor (who are presumably less able to afford those more
capable devices.) See United States v. Ross, 456 U.S. 798.
822, 102 S.Ct. 2157, 72 L.Ed.2d 572 (1982) ("[A] traveler
who carries a toothbrush and a few articles of clothing in a
paper bag or knotted scarf claimis] an equal right to conceal
his possessions from official inspection as the sophisticated
executive with the locked attache case.").
If our privacy interests are to be dictated by the quantity
of data we possess, the question then becomes, how many
gigabytes of storage must one buy to secure the guarantee that
reasonable suspicion will be required before one's devices are
searched? The majority gives us no firm basis for deciding
how much storage space is necessary-32 gigabytes? 64
gigabytes? 400 gigabytes? Who knows? Moreover, the
majority's test must constantly change to accommodate
the ever-increasing capacity of electronic storage and new
technologies. Before we know it, today's "average" 400
gigabyte hard drive will look like *988 yesterday's diary
next to tomorrow's "average" 2 terabyte hard drive.
The majority asserts that our "reasonableness determination
must account for differences in property." Majority at
966. This assertion has no basis in law, however, since
Flores-Montano distinguished not between types of property,
but between searches of property and "searches of the
person." Flores-Montano, 541 U.S. at 152, 124 S.Ct. 1582
(emphasis added). In any event, it appears that the majority's
reasonableness requirement accounts not for "differences in
property," as it suggests, but rather for differences in the
intrusiveness of a particular property search. As discussed
supra, however, these intrusiveness-based tests have no place
in border searches of property and have been explicitly
rejected by the Supreme Court as Iclomplex balancing
tests." Flores—Montano, 541 U.S. at 152, 124 S.Ct. 1582.
The majority additionally speculates about the privacy
implications of searching an external cloud platform,
which may "includIel the same kind of highly sensitive
data one would have in 'papers' at home." Majority at
965. I share the majority's keen interest in the Fourth
Amendment implications of this burgeoning technology, but
the reasonableness of cloud computing has no bearing on the
case at hand, absent any facts that Cotterman utilized such a
platform, or that such a platform was searched.
II. Waiver
There is another important issue in this case that is
separate from the majority's new standard for border
searches. Specifically, I refer to the majority's finding
that there was reasonable suspicion to search Cotterman's
computer and other electronic devices, miles from the
border. In its zeal to cripple the application of the current
border search doctrine, while still securing Cotterman's
conviction, the majority turns on their heads all the parties'
arguments about reasonable suspicion as to Cotterman, and
the findings made by the lower courts concerning that
suspicion. First, the majority now stakes its holding on
a finding of reasonable suspicion—despite the fact that
the government knowingly and unequivocally conceded on
appeal any argument that the computer search was supported
by reasonable suspicion. Second, the majority's determination
that reasonable suspicion was required under the border
search exception is contrary to every argument raised by
either party in its briefs prior to our request for supplemental
briefing. Third, even the majority seems to concede that the
search of Cotterman's own computer that actually occurred
at the border did not involve a computer with sufficient
storage capacity, and was not sufficiently intrusive, to require
reasonable suspicion, under its "new" border search doctrine.
Thus, it need not have treated, nor altered, the current border
search exception. Fourth, the Magistrate Judge's Report
and Recommendation, adopted by the District Judge, did
not conclude that reasonable suspicion was required under
the border search exception. Despite all the above, the
majority upholds Cotterman's conviction on grounds that the
WestlawNext' © 2015 Thomson Reuters. No claim to original U.S. Government Works.
30
EFTA00315020
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
government had reasonable suspicion to extensively search
his computer 170 miles from the border. Being mindful
that the government has the burden of proof in this case.
not the majority of our panel, I would have heeded the
government% strategic, good faith decision to abandon on
appeal its argument that reasonable suspicion existed. 7
7
When asked during oral argument why it failed to
argue reasonable suspicion on appeal. the government
acknowledged that the issue was a "close" one.
*989 The majority claims that Cotterman has not been
prejudiced—despite the fact that the majority's finding of
reasonable suspicion is the raison
for his conviction—
because Cotterman was allowed to file a supplemental brief
on the matter after oral argument. Although I concede that
what the majority did is technically permissible, see U.S. Nat'!
Bank of Oregon v. Indep. Ins. Agents of Am., Inc., 508 U.S.
439, 446, 113 S.Ct. 2173, 124 L.Ed.2d 402 (1993) ("When
an issue or claim is properly before the court, the court is not
limited to the particular legal theories advanced by the parties,
but rather retains the independent power to identify and apply
the proper construction of governing law") (citations and
quotations omitted), it is clear to me that Cotterman has been
severely prejudiced, because his conviction is based solely on
an issue the government conceded, and that Appellant, and
the lower courts, took for granted because it was not needed
for a border search. It is the majority of our panel, not the
government, that prosecuted the reasonable suspicion issue in
this case.
III. Extended Border Search
The extended border search doctrine applies to "searches
that do not occur at the time of entry or in the immediate
vicinity of the border." United States v. Alfonso, 759 F.2d 728,
735 (9th Cir.1985). Because these searches "intrude more on
an individual's normal expectation of privacy," reasonable
suspicion is required. Id. at 734.
The majority's mutation of the border search exception is
especially unnecessary given that this search did not occur
at the border, but rather 170 miles away from the border and
five days after the border was crossed. Indeed, the majority
concedes that the government could have performed the
forensic computer search at the border, but instead chose to
transport Cotterman's electronics more than 170 miles away.
By labeling this a border search, the majority has conjured a
sort of "floating border," whereby any item initially seized at
the border, but not cleared there, can be transported thousands
of miles away and searched anywhere, and at any time, simply
because the government did not find anything (or enough)
during its original search at the border. Because the search at
issue occurred neither "at the time of entry or in the immediate
vicinity of the border," it is more appropriately analyzed as
an extended border search. See Alfonso. 759 F.2d at 735.
The majority asserts that this case cannot be analyzed as an
extended border search because Cotterman's computer was
never "cleared" at the border prior to search. Majority at 961.
The majority is mistaken. In United States v. Cardona, 769
F.2d 625. 628 (9th Cir.1985), we applied the extended border
search doctrine to a search of a Federal Express package
that occurred twenty-four hours before the scheduled border
crossing, and 3,000 miles from the border. See 769 F.2d
at 628 ("Considering the distance and time factors of the
present case, we conclude that the facts of this case should be
analyzed under the extended border search doctrine.").
While this case presents issues we have not yet addressed
in the context of an extended border search, United States
v. Alfonso is squarely on point. In Alfonso. the government
conducted an initial, cursory search of a ship upon its arrival at
the LOS Angeles harbor. Alfonso, 759 F.2d at 732. Thirty-six
hours later, while still docked at the port, officials conducted
a second, more intrusive search. Id. Tasked *990 with
determining whether the second search was an extended
border search or a search at the functional equivalent of the
border, we noted that "the instant case illustrates the difficulty
of making sharp distinctions in this area." Id. at 735. We
determined that "rallthough we have no difficulty in relating
this site with the border, we shall, because of the time factor
—the lapse of thirty-six hours in conducting the searches—
examine the facts under the rules of extended border search."
Id. at 734. The majority suggests that cases like Alfonso are
distinguishable from the case at issue because those cases
wrestled with distinguishing between a functional border
search and an extended border search, whereas this case
involves distinguishing between a traditional border search
and an extended border search. This is a distinction without
a difference since, as the majority acknowledges, there is no
operative difference between border searches and searches
that occur at the functional equivalent of the border, at least
WestlawNext" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
31
EFTA00315021
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
for purposes of determining whether a search is an extended
border search.
I would hold that the search which took place 170 miles from
the border, five days after crossing—a much greater lapse
than the thirty-six hours in Alfonso—requires this case to
be analyzed as an extended border search. Additionally, the
reasonable suspicion requirement already applies to extended
border searches, in recognition of the fact that such searches
"intrude more on an individual's normal expectation of
privacy." Id. As such, the extended border search doctrine is
aptly suited to address the privacy expectations at issue in this
case.
IV. Reasonable Suspicion
Irrespective of the government's concession of the issue,
the evidence in this case falls woefully short of reasonable
suspicion. 1121easonable suspicion exists when an officer is
aware of specific, articulable facts which, when considered
with objective and reasonable inferences, form a basis
for particularized suspicion." United States v. Montero-
Cantors°, 208 F.3d 1122, 1129 (9th Cir.2000) (en banc).
We assess reasonable suspicion under the totality of the
circumstances, "takfingl into account both factors weighing
for and against reasonable suspicion." United States v.
Manzo-Jurado, 457 F.3d 928, 938 (9th Cir.2006). We "will
defer to officers' inferences only when such inferences
rationally explain how the objective circumstances 'aroused a
reasonable suspicion that the particular person being stopped
had committed or was about to commit a crime.' " Manzo-
Jurado. 457 F.3d at 934-35 (quoting Montero-Camargo, 208
F.3d at 1129) (alterations omitted). "Reasonable suspicion
may not be based on broad profiles which cast suspicion
on entire categories of people without any individualized
suspicion of the particular person to be stopped." United
States v. Sigmond—Ballesteros, 285 F.3d 1117. 1121 (9th
Cir.2001) (internal quotations and citations omitted).
I agree with the majority that reasonable suspicion was not
needed to conduct the initial search of Cotterman's computer
at the border, and that we analyze reasonable suspicion
only as to the second search (the majority would say a
continuation of the initial search,) which took place 170 miles
from the border and several days after the border crossing.
The majority's reasonable suspicion finding appears to be
based solely on the TECS alert: it states that "the nature
of the alert on Cotterman, directing agents to review media
and electronic equipment for child pornography, justified
conducting the forensic examination despite the failure of
the first search to yield any contraband." Majority at 33.
Thus, the majority pins reasonable suspicion on the TECS
alert, dismisses out of *991 hand the numerous factors
weighing against reasonable suspicion, and paves the way
for a government database to target "entire categories of
people without any individualized suspicion of the particular
person to be stopped." Sigmond—Ballesteros, 285 F.3d at
1121 (internal quotations and citations omitted) (emphasis
added). The majority considers the TECS alert to be a
sufficient basis for reasonable suspicion, but in reality, it is
nothing more than a mechanism that automatically flags all
individuals who are registered sex offenders in California
—no matter the nature of the sex offense or how old the
conviction—who travel frequently. 8 California is home to
more than 106,000 sex offenders. 9 Some of these individuals
are required to register as sex offenders for life. Depending
on how many of them travel frequently, a TECS hit could
affect tens of thousands of Californians—many with decades-
old convictions. The TECS database clearly hits on "a very
large category of presumably innocent travelers, who would
be subject to virtually random seizures were the Court to
conclude that as little foundation as there was in this case
could justify a seizure." Reid v. Georgia, 448 U.S. 438,
441. 100 S.Ct. 2752, 65 L.Ed.2d 890 (1980). By allowing
reasonable suspicion to rest entirely on the TECS alert, the
majority rules that a decades-old conviction can serve as
a basis to deprive a person of his or her property for an
indefinite period, so that a "border search" may be conducted
hundreds of miles from the border.
8
The TECS alert is part of Operation Angel Watch.
a program that targets California residents who are
registered sex offenders based on the suspicion that those
individuals who travel internationally are engaging in
child sex tourism. The majority at one point improperly
lists -the parameters of the Operation Angel Watch
program" as an independent factor supporting reasonable
suspicion. Majority at 968-49. We must look solely at the
underlying facts supporting reasonable suspicion—i.e..
Cotterman's status as a sex offender and his frequent
travel—rather than the database or mechanisms used to
deliver that information.
WestlawNexts © 2015 Thomson Reuters. No claim to original U.S. Government Works.
32
EFTA00315022
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
9
Press Release. National Center for Missing and
Exploited Children. Number of Registered Sex
Offenders in the U.S. Nears Three—Quarters of a Million
(Jan. 23. 2012).
The majority suggests that the TECS alert informed border
patrol agents of the nature of Cotterman's conviction. In
fact, the TECS hit did not state the nature of Cotterman's
conviction, although one agent mistakenly recollected that "it
stated that [Cotterman) appeared to [sic] been involved in
some type of child pornography." Curiously, another agent
stated that a criminal history check on Cotterman revealed
that "that he had a prior conviction pertaining to child
pornography." In fact, and despite the erroneous contentions
of the referenced agents, Cotterman had no prior child
pornography conviction; he had a 15-year-old conviction for
sexual conduct with a minor. While we generally give "due
weight to inferences drawn" by law enforcement, Omelas
v. United States, 517 U.S. 690, 699, 116 S.Ct. 1657. 134
L.Ed.2d 911 (19%), the case for deference is questionable
here in the absence of any rational explanation as to how
the officers could have read the TECS alert and criminal
history check, neither of which listed a conviction for child
pornography, and come away thinking that Cotterman was
guilty of that offense. See Manzo-Jurado, 457 F.3d at 934-
35 ("[Wie will defer to officers' inferences only when such
inferences rationally explain how the objective circumstances
aroused a reasonable suspicion."); see also Liberal v. Estrada.
632 F.3d 1064, 1078 (9th Cir.2011) (mistake of fact must be
reasonable).
All things considered, the fact that an individual with a 15—
year—old sex conviction *992 was also a frequent traveler
appears to be a rather weak lynchpin for reasonable suspicion.
Yet, other than Cotterman's prior conviction and travels, the
factors cited by the majority are far too generalized to provide
even an indicia of suspicion that Cotterman was involved in
sex tourism. For instance, the majority considers Cotterman's
"collection of electronic equipment" to be a factor supporting
reasonable suspicion. In today's world, the fact that Cotterman
and his wife each carried a laptop and digital camera when
traveling internationally, as well as one video camera between
them, 10 is no more evidence of "sex tourism" than of any
other kind of tourism.
10
The video camera was apparently Mrs. Cotterman's.
Similarly, the fact that Cotterman was returning from Mexico
fails to support a finding of reasonable suspicion. Mexico is
a popular travel destination for Californians, including those
who travel to Mexico for its beaches, culture and weather,
and not for its sex tourism. Travel to Mexico simply does not
support reasonable suspicion without more specific evidence
that Cotterman traveled to a particular establishment, city,
or even region, associated with sex tourism. See United
States v. Irving, 452 F.3d 110. 114, 124 (2d Cir.2006)
(finding reasonable suspicion based on knowledge that
suspect, a convicted pedophile and the subject of criminal
investigation, had visited an orphanage in Mexico and had
luggage with children's books and drawings). According
to the Department of Justice, American sex tourism is a
problem not only in Mexico, but also in Southeast Asia,
Central and South America, and, to a lesser extent, Eastern
Europe. I I Under the majority's application of reasonable
suspicion, an individual who committed a sex offense 30
years ago cannot visit the Charles Bridge in Prague, the
Cristo Redentor in Rio de Janeiro, or even the "lost city"
of Machu Picchu, without arousing a -reasonable" suspicion
of sex tourism. Someone who was convicted of tax evasion
15 years ago, or any other kind of conviction listed on a
federal database, and particularly one that involved the use of
a computer, should also probably avoid visiting Switzerland
or Luxemburg under the majority's new standard. The bottom
line is that thousands of individuals—many with decades-
old convictions—will now be forced to reconsider traveling
to entire countries or even continents, or will need to leave
all their electronic equipment behind, to avoid arousing a
"reasonable" suspicion.
11
U.S. Department of Justice. The National Strategy for
Child Exploitation Prevention and Interdiction. A Report
to Congress 36 (2010).
Perhaps the most concerning aspect of the majority's opinion,
especially given its stated stance on privacy rights at the
border, is its readiness to strip former sex offenders and
others convicted of past crimes (and who are, theoretically,
entitled to be presumption of innocence) of even the most
basic of privacy rights, such as the right to password-protect
their electronic devices. The majority acknowledges that
"it is commonplace for business travelers, casual computer
users, students and others to password protect their files"
and that "password protection is ubiquitous." Majority at
970. It avers that "Inlational standards require that users
WeStlaWNPA" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
33
EFTA00315023
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =.
3018
of mobile electronic devices password protect their files,"
and that Iclomputer users are routinely advised—and in
some cases, required by employers—to protect their files
when traveling overseas." Majority at 31 (emphasis added).
Yet because border patrol agents encountered a single
password- *993 protected file on Cotterman's computer, the
majority considers password protection a factor contributing
to reasonable suspicion. 12 Worse still, the majority contends
that it is justified in considering the password-protected file
because "making illegal files difficult to access makes perfect
sense for a suspected holder of child pornography." Majority
at 969. I fail to see how the agents had reasonable suspicion
that Cotterman's computer contained "illegal files" based
solely on his 15—year—old sex offense, travel to Mexico with
his wife, and the "ubiquitous" act of password-protection.
Indeed, as the majority acknowledges, making legal files
difficult to access makes "perfect sense" for anyone, even
former sex offenders.
12
The unequivocal testimony of Agent Antonio Alvarado
confirms that only a single password-protected file was
discovered on Cotterman's computer at the border.
I would find a password-protected file to be not at all
suspicious, unless we want to start basing reasonable
suspicion on locked diaries and briefe9ws. Registered
sex offenders face numerous consequences as a result of
their convictions, but the law has never before punished
them for using "ubiquitous" and "commonplace" password-
protection. Yet under the majority's analysis, an individual
traveling to Southeast Asia for business, who happens to be
subject to one of TECS's broad-based alerts, and who follows
his company's security protocols, should expect to have his
electronic equipment seized and transported hundreds of
miles away. 13
13
The majority finds ironic my concern about the
expansiveness of its reasonable suspicion standard, since
at the border. I would advocate for no suspicion at all.
The majority is correct that at the border, my concern is
simply with following Flores-Montano and maintaining
national security. I view the majority's application of its
reasonable suspicion requirement as a separate issue, and
my concern there is that the majority has so diluted the
reasonable suspicion requirement as to undermine the
rights of U.S. citizens generally.
Moreover, the majority fails to consider reasonable suspicion
in light of the totality of the circumstances because it
dismisses without explanation numerous factors that weigh
against a finding of reasonable suspicion in this case. See
Manzo—Jurado, 457 F.3d at 938 (the reasonable suspicion
determination must "take[
into account both factors
weighing for and against reasonable suspicion.") (emphasis
added). At the time the border patrol agents commenced
the second search, 170 miles away from the border,
any suspicions they may have initially harbored against
Cotterman would have been largely addressed by their
interrogations of Cotterman and his wife, which produced
nothing suspicious. An initial search of Cotterman's computer
and the digital cameras turned up nothing more than a single
password protected file and photos of "whale hunting and
various excursions," all of which corroborated Cotterman's
story about vacationing in Mexico. Also during this initial
search, one of the border patrol agents did a records check
and discovered that Cotterman's conviction for the sex offense
had occurred more than 15 years ago. Cotterman was fully
cooperative and even offered to help the agents access his
computer. The majority contends that Cotterman's offer to
help does not weigh against a finding of reasonable suspicion
because the agents declined Cotterman's offer based on the
possibility—however slight—that Cotterman could "booby
trap" the devices. That the agents were unable to accept
Cotterman's offer, however, does not change the reasonable
inference that his offer was a genuine one.
Accordingly, it is irrelevant whether there was reasonable
suspicion for the initial *994 search, because I agree with
the majority that reasonable suspicion was not required.
The relevant inquiry here is what suspicion existed after
all of Cotterman's electronics were searched, and he and
his wife were interrogated separately, and every piece of
evidence obtained corroborated the Cottermans' story about
vacationing in Mexico. The only hint of suspicion remaining
at that point-after the initial border search and interrogations
—was the single password-protected file, which I agree with
the majority is insufficient, by itself, to sustain a finding
of reasonable suspicion. See Manzo—Jurado, 457 F.3d at
935 ("Mo establish reasonable suspicion, an officer cannot
rely solely on generalizations that, if accepted, would cast
suspicion on large segments of the lawabiding population.").
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
34
EFTA00315024
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =.
3018
V. Conclusion
Reasonable suspicion has no place in property searches at
the border, as the Supreme Court has consistently held. See
Flores-Montano, 541 U.S. at 152-53, 124 S.Ct. 1582 ("Time
and time again, we have stated that searches made at the
border, pursuant to the longstanding right of the sovereign
to protect itself by stopping and examining persons and
property crossing into this country, are reasonable simply by
virtue of the fact that they occur at the border.•"). Imposing
a reasonable suspicion requirement here forces courts and
border patrol agents to engage in just the "sort of decision•
making process that the Supreme Court wished to avoid in
sanctioning expansive border searches." Seljan, 547 F.3d at
1011 (citation omitted) (Callahan, J. concurring). Rather than
rewrite the border search exception, as the majority does, I
would affirm the district court's application of the extended
border search doctrine to Cotterman's case, which appears
most appropriate given the extensive lapse in distance and
time between the first and the second search. Additionally,
I would hold the government to its burden of proof in
determining that reasonable suspicion was absent here. Under
the doctrine of this case, the majority sweeps in thousands of
innocent individuals whose electronic equipment can now be
taken away from the border and searched indefinitely, under
the border search exception.
I respectfully dissent.
All Citations
709 F.3d 952, 13 Cal. Daily Op. Serv. 2531, 2013 Daily
Journal =.
3018
End of Document
O2015 Thomson Reuters. No claim to original U.S. Government Works.
WeStiaWNPA" © 2015 Thomson Reuters. No claim to original U.S. Government Works.
35
EFTA00315025
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA00314991.pdf |
| File Size | 3990.1 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 167,556 characters |
| Indexed | 2026-02-11T13:27:21.084958 |