UPDATE – Your Rights Under Attack: What A Difference Judical Review Makes

Stock Photo of the Consitution of the United States and Feather Quillby Gene Howington, Guest Blogger

Recently we discussed the DHS’s self-approval of their draconian and arguably unconstitutional and unquestionably outrageous policy on searching computers within 100 miles of the border (Your Rights Under Attack: What A Difference 100 Miles Makes). This week, a ruling from the 9th Circuit Court of Appeals not only showed the DHS was legally wrong in their self-approval of a policy that runs afoul of the 4th Amendment, but also illustrated the true value of the checks and balances created by the Separation of Powers Doctrine that so many in the Executive seem eager to trample these days. The case at bar was U.S. v. Cotterman.  In a breath of good news for civil libertarians, the 9th Circuit Court of Appeals en banc ruling held that the 4th Amendment does apply at the border despite DHS contention to the contrary.

Let’s look at this case and ruling. Bear with the long restatement of facts as they are relevant to the holding.


fn. 2 – The facts related here are drawn from the record of the evidentiary hearing held before the magistrate judge.

[Ed. Note: Other footnotes omitted. See link to original below for full cite.]

Howard Cotterman and his wife were driving home to the United States from a vacation in Mexico on Friday morning, April 6, 2007, when they reached the Lukeville, Arizona, Port of Entry. During primary inspection by a border agent, the Treasury Enforcement Communication System (‘TECS’) returned a hit for Cotterman. The TECS hit indicated that Cotterman was a sex offender–he had a 1992 conviction for two counts of use of a minor in sexual conduct, two counts of lewd and lascivious conduct upon a child, and three counts of child molestation–and that he was potentially involved in child sex tourism. Because of the hit, Cotterman and his wife were referred to secondary inspection, where they were instructed to exit their vehicle and leave all their belongings in the car. The border agents called the contact person listed in the TECS entry and, following that conversation, believed the hit to reflect Cotterman’s involvement “in some type of child pornography.” The agents searched the vehicle and retrieved two laptop computers and three digital cameras. Officer Antonio Alvarado inspected the electronic devices and found what appeared to be family and other personal photos, along with several password-protected files.

Border agents contacted Group Supervisor Craig Brisbine at the Immigration and Customs Enforcement (‘ICE’) office in Sells, Arizona, and informed him about Cotterman’s entry and the fact that he was a sex offender potentially involved in child sex tourism. The Sells Duty Agent, Mina Riley, also spoke with Officer Alvarado and then contacted the ICE Pacific Field Intelligence Unit, the office listed on the TECS hit, to get more information. That unit informed Riley that the alert was part of Operation Angel Watch, which was aimed at combating child sex tourism by identifying registered sex offenders in California, particularly those who travel frequently outside the United States. She was advised to review any media equipment, such as computers, cameras, or other electronic devices, for potential evidence of child pornography. Riley then spoke again to Alvarado, who told her that he had been able to review some of the photographs on the Cottermans’ computers but had encountered password protected files that he was unable to access.

Agents Brisbine and Riley departed Sells for Lukeville at about 1:30 p.m. and decided en route to detain the Cottermans’ laptops for forensic examination. Upon their arrival, they gave Cotterman and his wife Miranda warnings and interviewed them separately. The interviews revealed nothing incriminating. During the interview, Cotterman offered to help the agents access his computer. The agents declined the offer out of concern that Cotterman might be able to delete files surreptitiously or that the laptop might be “booby trapped.”

The agents allowed the Cottermans to leave the border crossing around 6 p.m., but retained the Cottermans’ laptops and a digital camera. Agent Brisbine drove almost 170 miles from Lukeville to the ICE office in Tucson, Arizona, where he delivered both laptops and one of the three digital cameras to ICE Senior Special Agent & Computer Forensic Examiner John Owen. Agent Owen began his examination on Saturday, the following day. He used a forensic program to copy the hard drives of the electronic devices. He determined that the digital camera did not contain any contraband and released the camera that day to the Cottermans, who had traveled to Tucson from Lukeville and planned to stay there a few days. Agent Owen then used forensic software that often must run for several hours to examine copies of the laptop hard drives. He began his personal examination of the laptops on Sunday.That evening, Agent Owen found seventy-five images of child pornography within the unallocated space of Cotterman’s laptop.

Agent Owen contacted the Cottermans on Sunday evening and told them he would need Howard Cotterman’s assistance to access password-protected files he found on Cotterman’s laptop. Cotterman agreed to provide the assistance the following day, but never showed up. When Agent Brisbine called again to request Cotterman’s help in accessing the password-protected files, Cotterman responded that the computer had multiple users and that he would need to check with individuals at the company from which he had retired in order to get the passwords. The agents had no further contact with Cotterman, who boarded a flight to Mexico from Tucson the next day, April 9, and then flew onward to Sydney, Australia. On April 11, Agent Owen finally managed to open twenty-three password-protected files on Cotterman’s laptop. The files revealed approximately 378 images of child pornography. The vast majority of the images were of the same girl, approximately 7-10 years of age, taken over a two to three-year period. In many of the images, Cotterman was sexually molesting the child. Over the next few months, Agent Owen discovered hundreds more pornographic images, stories, and videos depicting children.

A grand jury indicted Cotterman for a host of offenses related to child pornography. Cotterman moved to suppress the evidence gathered from his laptop and the fruits of that evidence. The magistrate judge filed a Report and Recommendation finding that the forensic examination was an ‘extended border search’ that required reasonable suspicion. He found that the TECS hit and the existence of password-protected files on Cotterman’s laptop were suspicious, but concluded that those facts did not suffice to give rise to reasonable suspicion of criminal activity. The district judge adopted the Report and Recommendation and granted Cotterman’s motion to suppress.

In its interlocutory appeal of that order, the government characterized the issue as follows: ‘Whether the authority to search a laptop computer without reasonable suspicion at a border point of entry permits law enforcement to take it to another location to be forensically examined, when it has remained in the continuous custody of the government.’ A divided panel of this court answered that question in the affirmative and reversed. United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011). The panel concluded that reasonable suspicion was not required for the search and that ‘[t]he district court erred in suppressing the evidence lawfully obtained under border search authority.’ Id. at 1084. In dissent, Judge Betty B. Fletcher wrote that ‘officers must have some level of particularized suspicion in order to conduct a seizure and search like the one at issue here.’ Id. (B. Fletcher, J., dissenting). By a vote of a majority of nonrecused active judges, rehearing en banc was ordered. 673 F.3d 1206 (9th Cir. 2012). Following en banc oral argument, we requested supplemental briefing on the issue of whether reasonable suspicion existed at the time of the search.”

U.S. v. Cotterman, No. 09-10139, pp. 7-11.

All of the facts here hinge on reasonable suspicion as a higher standard required to search. When the government went to argue the case against the motion of suppress, they based their argument on the premise that “the forensic examination was part of a routine border search not requiring heightened suspicion and, alternatively, that reasonable suspicion justified the search.”  Id., p. 12. The government asserted to the district court that “the facts of this case clearly establish that there was reasonable suspicion.” Id. The district court disagreed and found against the prosecution. Oddly enough, after having failed to obtain a favorable ruling on that ground, the government did not challenge it directly on appeal but instead sought a broad ruling that no suspicion of any kind was required. A pretty gutsy contention but in line with the hubris shown by the DHS in rubber-stamping their own policies as legal as if they were the judiciary instead of part of the executive.  Cotterman in his answering brief argued that the government had waived the issue contending that the government “abandoned and conceded the issue of reasonable suspicion” and consequently that the Court of Appeals may not address that issue.

The Court of Appeals disagreed.

They chose to “review de novo the ultimate question of whether a warrantless search was reasonable under the Fourth Amendment.”  Id., (cite omitted). Stating that their “review necessarily encompasses a determination as to the applicable standard: no suspicion, reasonable suspicion or probable cause. That the government may hope for the lowest standard does not alter our de novo review, particularly when the issue was fully briefed and argued below. Further, we may consider an issue that has not been adequately raised on appeal if such a failure will not prejudice the opposing party. Where, as here, we ‘called for and received supplemental briefs by both parties,’ the government’s failure to address the issue does not prejudice Cotterman.” Id., pp. 12-13 (cites omitted).

The court goes on to define the traditional scope of border searches under the light of precedent. They note that although border searches are rooted in “‘the long-standing right of the sovereign to protect itself by stopping and examining persons and property crossing into this country.’ Thus, border searches form ‘a narrow exception to the Fourth Amendment prohibition against warrantless searches without probable cause.’ Because ‘[t]he Government’s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border’, border searches are generally deemed ‘reasonable simply by virtue of the fact that they occur at the border.’  This does not mean, however, that at the border ‘anything goes.’ Even at the border, individual privacy rights are not abandoned but ‘[b]alanced against the sovereign’s interests.’  That balance ‘is qualitatively different . . . than in the interior’ and is ‘struck much more favorably to the Government.’ Nonetheless, the touchstone of the Fourth Amendment analysis remains reasonableness. The reasonableness of a search or seizure depends on the totality of the circumstances, including the scope and duration of the deprivation.” Id., p. 13 (cites omitted) [emphasis added].  Applying these principles, the court found that Officer Alvardo’s initial cursory inspection was reasonable and the search would have remained reasonable if it had ended there.

The problem arises when “the search here transformed into something far different. The difficult question we confront is the reasonableness, without a warrant, of the forensic examination that comprehensively analyzed the hard drive of the computer.” Id. p. 14.

In other words, given the totality of the circumstances, was the lower court wrong to grant Cotterman’s motion to suppress based on lack of reasonable suspicion in the search given that reasonable suspicion is indeed required? The 9th Circuit chose to overrule the district court and allow the evidence as part of a reasonable search. There was no problem with Officer Alvardo’s initial cursory inspection. The later forensic search was deemed based upon reasonable suspicion because of the circumstance of the TECS hit on Cotterman’s previous convictions.

Of particular interest is the court’s finding that being secure in your electronic devices is analogous to being secure in your papers under the 4th Amendment.

The amount of private information carried by international travelers was traditionally circumscribed by the size of the traveler’s luggage or automobile. That is no longer the case. Electronic devices are capable of storing warehouses full of information. The average 400-gigabyte laptop hard drive can store over 200 million pages—the equivalent of five floors of a typical academic library…. Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.

The nature of the contents of electronic devices differs from that of luggage as well. Laptop computers, iPads and the like are simultaneously offices and personal diaries. They contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails. This type of material implicates the Fourth Amendment’s specific guarantee of the people’s right to be secure in their “papers.” The express listing of papers ‘reflects the Founders’ deep concern with safeguarding the privacy of thoughts and ideas–what we might call freedom of conscience–from invasion by the government.’ These records are expected to be kept  private and this expectation is ‘one that society is prepared to recognize as “reasonable.”‘

Electronic devices often retain sensitive and confidential information far beyond the perceived point of erasure, notably in the form of browsing histories and records of deleted files. This quality makes it impractical, if not impossible, for individuals to make meaningful decisions regarding what digital content to expose to the scrutiny that accompanies international travel. A person’s digital life ought not be hijacked simply by crossing a border. When packing traditional luggage, one is accustomed to deciding what papers to take and what to leave behind. When carrying a laptop, tablet or other device, however, removing files unnecessary to an impending trip is an impractical solution given the volume and often intermingled nature of the files. It is also a time-consuming task that may not even effectively erase the files.”

Id., pp. 21-22, (cites and footnotes omitted).

Another important holding in this case revolves around password-protected files. The government argued that the mere existence of password-protected files merited reasonable suspicion.

To these factors, the government adds another–the existence of password-protected files on Cotterman’s computer. We are reluctant to place much weight on this factor because it is commonplace for business travelers, casual computer users, students and others to password protect their files. Law enforcement ‘cannot rely solely on factors that would apply to many law-abiding citizens’ and password protection is ubiquitous. National standards require that users of mobile electronic devices password protect their files. See generally United States Department of Commerce, Computer Security Division, National Institute of Standards and Technology, Computer Security (2007) (NIST Special Publication 800-111). Computer users are routinely advised–and in some cases, required by employers–to protect their files when traveling overseas. See, e.g., Michael Price, National Security Watch, 34-MAR Champion 51, 52 (March 2010) (‘[T]here is one relatively simple thing attorneys can do [when crossing the border] to protect their privacy and the rights of their clients: password-protect the computer login and any sensitive files or folders.’). Although password protection of files, in isolation, will not give rise to reasonable suspicion, where, as here, there are other indicia of criminal activity, password protection of files may be considered in the totality of the circumstances. (fn. 17) To contribute to reasonable suspicion, encryption or password protection of files must have some relationship to the suspected criminal activity. Here, making illegal files difficult to access makes perfect sense for a suspected holder of child pornography. When combined with the other circumstances, the fact that Officer Alvarado encountered at least one password protected file on Cotterman’s computer contributed to the basis for reasonable suspicion to conduct a forensic examination. The existence of the password-protected files is also relevant to assessing the reasonableness of the scope and duration of the search of Cotterman’s computer. The search was necessarily protracted because of the password protection that Cotterman employed. After Cotterman failed to provide agents with the passwords to the protected files and fled the country, it took Agent Owen days to override the computer security and open the image files of child pornography. Although we must take into account factors weighing both in favor and against reasonable suspicion, Cotterman’s innocent explanation does not tip the balance. See Tiong, 224 F.3d at 1140 (recognizing that ‘innocent possibilities . . . do not undermine reasonable suspicion’).

Fn. 17 – We do not suggest that password protecting an entire device–as opposed to files within a device– can be a factor supporting a reasonable suspicion determination. Using a password on a device is a basic means of ensuring that the device cannot be accessed by another in the event it is lost or stolen’.”

Id., pp. 31-32 (cites and some footnotes omitted).

So a border search of your electronics is protected by the 4th Amendment and simply having password protection does not create the presumption of reasonable suspicion absent other circumstances considered in their totality.  The wisdom of the checks and balances created by the Separation of Powers Doctrine made manifest by the courts reigning in the abuses of the executive while maintaining legal justice against the vile child pornographer Cotterman. Although this is good news for civil liberties and civil libertarians, there are questions remaining.

Should this case be appealed to the Supreme Court and granted certiorari, do you think the current SCOTUS dominated by the Gang of Five (Scalia, Alito, Roberts, Thomas and Kennedy) will uphold the 9th’s ruling or overrule? Does this example of checks and balances working as they should restore your faith in the wisdom of the Separation of Powers Doctrine? Do you think DHS will comply with the ruling or ignore it and do as they please? Does this ruling do anything to assuage your concerns for your privacy and the trampling of your 4th Amendment and other Constitutional rights?  What do you think?

Source(s): Techdirt, U.S. v. Cotterman, No. 09-10139 (.pdf)

~submitted by Gene Howington, Guest Blogger

59 thoughts on “UPDATE – Your Rights Under Attack: What A Difference Judical Review Makes

  1. I do not think that DHS will follow any part of this ruling. Why should they? Unless a citizen has the time and the money to litigate this issue outside of a criminal prosecution it is likely that many innocent travelers can expect to enjoy this exciting possibility as they cross the border. Will it always happen? Of course not but they can and that is enough.

    While I am happy the 9th Circuit has tried to set limits on the DHS it gives me no comfort at all.

    SCOTUS wont be so solicitous of human’s Constituional rights should they have an opportunity to weigh in.

  2. Nice job Gene. I would worry about the Supremes handling any 4th Amendment case. Especially on the border where they can try to hide behind the old national security boogie man. I also don’t think the Supremes will uphold the 9th circuit’s allowance of password protecting the entire computer. I hope I am wrong.

  3. Seriously, I know it’s a dense piece, but considering the totality of circumstances was critical in the reasoning behind the ruling, they had to be considered in the presentation of the holding. If I were writing for the mainstream media, I’d have put “9th Circuit Court of Appeals upholds Constitution, that electronics are analogous to your papers and using passwords isn’t alone sufficient cause for the reasonable suspicion required to do a search” and left everyone to figure out why on their own.

  4. The most disturbing thing is that the little girl that was undoubtedly abused will not likely see true justice. What we are talking about in the article is theoretical application of the principles of constitutional law (blah blah blah) and their application vis a vis a warrantless search without reasonable suspicion, etc etc.

    What we know is that there is a little girl who was repeatedly raped and violated, abused in the worst way by Cottermonster. . .

    It occurs to me that he was suspected of wrong doing because of his history and criminal convictions, it WAS a reasonable suspicion, clearly, they found record of criminal activity. I love our constitution, but I hate when it is used against victims to protect monsters. YES, I get that we are all protected by the same laws, but when I know that the little girl is not likely to get justice-I wouldn’t mind ripping up any document that keeps people from hanging such a man from the nearest tree. However, I am a person who actually obeys the law, so what do I know?

  5. “I love our constitution, but I hate when it is used against victims to protect monsters.”

    It wasn’t explicitly stated, but Cotterman wasn’t being protected from his crimes. He was charged related to the child pornography. All of this comes from his appeals which found the lower court erred in excluding evidence and that the search used to obtain the evidence against Cotterman was legally obtained under the 4th Amendment and the relevant jurisprudence all the while denying the contention of the DHS that they didn’t need any suspicion to search anyone. And while Cotterman, like all child molesters, is unquestionably a monster, even monsters are due a fair trial under the terms of the Constitution.

    No one is using anything against the victim.

  6. Gene,
    I have mentioned this before. Some people buy a cell phone exclusively for travel use. Nothing on it, no pictures, no speed dial, nothing. Simple flip phone that will do two things. Make and receive phone calls. One activist who knew he was on a watch list took an international trip recently. At the checkpoint, the inspector wanted to look at his cell phone. He replied that his cell phone was at his home and he did not travel with it. He said he would buy a throwaway phone when he got to his destination if he needed a phone. The inspector appeared angry, but there was nothing they could do.

    Several people I know tell me they use an inexpensive laptop for travel that has virtually nothing on it. Critical files can be kept on a server at their home or office, or stored on a file storing service for access as needed once the destination is reached. Encrypt everything. There are a number of excellent encryption programs, PCP being one of the better ones. If the traveler has anything at all to do with health care, the computer comes under HIPAA, and there are draconian penalties for having unprotected files. Our office uses the same type file protection as the local medical school.

    Also, if one buys a used computer (always a bad idea) or even a new one, it is a good idea to get an expert in computer security to make sure there is nothing on the computer that should not be there. There have been a few instances reported of new computers coming out of the box with material installed on the hard drive that should not be there. Our office computer guy started out with the military and later went to work for one of those alphabet agencies in Washington. He tells me that with proper forensic software, he can burrow down through as many as seven layers of deletions and overwrites. Any content that deep will be fragmented, but can be reassembled enough to make out what it is.

  7. Should this case be appealed to the Supreme Court and granted certiorari, do you think the current SCOTUS dominated by the Gang of Five (Scalia, Alito, Roberts, Thomas and Kennedy) will uphold the 9th’s ruling or overrule?

    Traditionally the odds are high for a reversal of the 9th Circuit when the S.Ct. grants certiorari.

    I read your entire post Gene H, and I think it was an important enough case, en banc, on a critical issue, that the facts needed to be perused carefully.

    I still think the District Court opinion was correct.

  8. PS. Sorry to hear Judge Fletcher passed away.

    PPS The Ninth Circuit Opinion is a good one for 4th Amendment jurisprudence even though I thought the District Court opinion was also correct.

  9. good news

    What could possibly be on a laptop computer that is discoverable by customs and border protection agent given their expertise in contraband software, that could possibly endanger the citizens of the united states if it is brought in illegally?

    That’s a pretext search if I ever saw one.

  10. Gene H.
    Innocent people don’t need Due Process Rights and Warrants because they have nothing to hide… And most law abiding citizens aren’t hiding anything… While we already know it’s only those who refuse to obey who are subject to suspicion… Because after all, what could they be hiding?

    1984 logic

  11. Gene: I read everything you wrote. It wasn’t that dense, I’m not sure why anybody would have a problem with it.

    Rachel: Yes, we all hate it when criminals use their rights to escape justice.

    However, on balance we believe less harm is done to people when we control how much the government can do. Making exceptions for those we “know” are guilty is the ultimate slippery slope, and soon enough the government doesn’t have to prove anything anymore, they can just put citizens in jail without charges, without trial, forever, and just assure us those people are the worst of the worst. Or perhaps they will just send the CIA or a drone to assassinate them.

    Hooray for the ruling, it is a battle won in a war we are losing.

  12. Gene, I don’t think you need to worry about ever writing for mainstream media! They do NOT like people who tell the truth!

    My prediction is the Supremes will take cert. Then they will redefine a word or two. Then they will gave the agency the power to do anything they please, just like they have with all the other agencies.

    Kind of funny that no one brought up the new agency that keeps track of every keystroke we make on our computer. I’m sure they would have all his pictures anyway; passwords don’t stop them.

    OS, a friend of mine bought a brand new computer (made in China). It had had a virus installed on it when it was made. Fortunately, she was smart enough to check it right away.

    Rachel, I am 55, and one thing I heard when I was 14 has stuck with me all these years; it really made an impression on me. During my Civics class in 9th grade, some of us were going on about how with such and such going on, bad people got away with stuff that they did. I will never forget my teacher’s explanation, or his face and the sound of his voice when he answered us.

    ”Our founding fathers felt that it was better for 10 guilty men to be let off scottfree, than for ONE innocent man to suffer unjustly.”

    Our prosecutors and policemen and judges and juries are not God, to make a perfect decision and determination and tell who’s lying and who isn’t. Things were set up the best way they could be to their way of thinking. And yes, there will be bad guys who get away with bad stuff. But unfortunately now, the innocent people are being made to suffer for things they shouldn’t. As examples, look at what the TSA does to good people at airports. To old ladies and small children and the handicapped. And look what our schools are now doing to innocent children who don’t bite their pop tarts into the correct shape. Look at how our veterans are being treated, and how collateral damage babies don’t even rate a who cares from our government. Look at what happens to one courageous senator who stands up for our rights of not having drones attack us in our own country, and is called a wacko by people in his own party.


  13. Great article, Gene.

    So the computer searches within 100 miles of the border require reasonable suspicion. Oh, wait. This is for “at the border” searches. Guess if you’re within 100 miles of the border you must be suspicious. Why else would you be there?

    The Supremes have said strip searches are ok for everyone in jail. TCA sexual assualts are ok. So why not complete computer searches?

  14. Gene,

    Thank you for the follow-up. (Lots of Scrabble potential to be used henceforth).

    “Guess if you’re within 100 miles of the border you must be suspicious. Why else would you be there?” (bettykath)

    Great … either the Canadians will invade and get me ’cause I am weaponless or DHC will investigate ’cause they suspect I’m not weaponless. (is that a double negative … not and weaponless?)

    On the whole though this ruling by the 9th is a spot of good news in an otherwise ugly situation.

  15. If I decide to go onto smuggling … lots of little coves, inlets and caves along my shoreline that were well used during prohibition … what is it the Canadians have that we might want?

  16. Excellent article. Well done. I sure hope our courts start to reign in our Federal government on many fronts. However, I am left with a feeling that too many of our citizens don’t care. Too many people think that if you have nothing to hide, let them open everything and read it. I’m sure our founding fathers roll over in their graves when they hear stuff like this. This web site is rife with examples of police abusing citizens all the time. Isn’t it time the courts start to take the citizens side?

  17. Good work, Gene. Now to your point. Does previous criminal involvement of the type mentioned here justify an intensive border search of a person’s private papers reduced to electronic form on his laptop computer? I think it does under the particular circumstances here. Defendant Cotterman is a convicted child abuser and suspected of child sex tourism. He was traveling with a laptop which is a customary depository of child pornography. Further, he had some password protected files which could conceivably hold the type of contraband for which the agents were searching. Border searches do not require the same 4th Amendment scrutiny as domestic searches given the sovereigns manifest interest in protecting itself and its citizens from contraband and for all the other reasons detailed in your recitation of the proceedings. A man’s history travels with him even to Mexico and it is a valid consideration for the more intrusive border search conducted.

    I say good police work and sayonara Mr. Cotterman.

  18. Blouise,

    It’s hard to mount an operation that utilizes back bacon, whisky, skunky beer, tuques and Rush or April Wine CDs.

  19. Thanks, mespo. I too was pleased with the outcome and the reasoning in this case. The 4th Amendment line was drawn at the appropriate place. What appalled me was the DHS contention that no heightened suspicion was required. The hubris, arrogance and raw unconstitutionality behind that line of legal reasoning is both staggering a frightfully fascist/authoritarian in nature. However, when cooler heads prevailed, the standards found in the jurisprudence still yielded the just outcome and protected our rights sufficiently by requiring both reasonable suspicion and considering the totality of the circumstances in “stretching” the border search.

  20. Gene: Very good presentation of this case. Borders create a hazardous field for Constitutional lawyers to tread. The right to privacy is what I would characterize as a fundamental human right and a natural right which precedes our Constitution. But if a perp comes across a border with a box of photos of child porn which can be readily seen because they are photographs on paper, does he have an expectation of privacy? If there is no expectation of privacy then one has not right thereto. The perp would not have the right to say show his private parts to those waiting in the waiting room at the border crossing. Bringing in illegal child porn is beyond the Paletinate so to speak. Now the fact that the child porn photos are not on hard paper copies but are nestled inside his cute little laptop does not make much difference.
    What I would do in this case if I was lawyer for child perp and it goes to the Supreme Court is go to a fall back position and say that the border cops had to go to get a warrant to bust into the computer. The next question is can they seize it and hold it pending warrant application? What was the probable cause for obtaining the warrant? The fact that the perp has a record for being a perp? On these facts if Bill Clinton came across the border with cigars they might say that he had used them illicitly on a Monica somewhere and seize his cigars utnil they pass a smell test. Slippery slope.

  21. It is a well writeen opinion by the 9th Circuit. I dont think that the Supreme Court will take the case. Antonin Scalia has no precedent from the days of the Framers of the Constitution — meaning the Original Framers had no knowledge of computers and very little of child porn. Without that Original Intent the Scalia guy will not wish to pontificate, especially while the Conclave is in session in Rome.

  22. Blouise,
    My granddaughter is engaged to a Canadian. They have been traveling back and forth for the past three years. The rules are mind-numbing. When they cross the border, they are grilled like criminals. The US customs is worse than the Canadian side, according to both of them.. Also, both of them tell me that coming through Detroit is the worst border crossing of all the ones they use.

    Her fiance told me the Canadian government was more laid back about it until several American politicians started making remarks such as Mexico being more trustworthy than Canada. A tit-for-tat began to follow. They really want to get married and settle down, but immigration laws have become so draconian, a young couple just starting out find it extremely difficult on both sides of the border.

  23. raff,
    On one trip through, one of the customs people was giving my granddaughter a hard time about being engaged to a Canadian. The agent demanded (not asked) to know how and where she met her boyfriend. She told the agent her little brother introduced them after they met at a computer game convention. She said the agent, very sarcastically, asked how old her little brother was, his name and where did he live. She told the agent his name, that he died of cancer right after his 17th birthday, and began to cry. She said for the first time, the customs agent looked stunned and literally had nothing to say. She was waved on through.

  24. raff, The choices were the confrontation that he was itching for or the tears that trumped his arrogance. Nothing like using some of your own emotions and tears to knock down a bit of arrogance. Let’s hope he learned a lesson that will make him a bit nicer to others passing through.

    OS, I’m so sorry that she had that kind of story to tell.

  25. Raff,
    They seem to enjoy giving 20 year old girls a hard time. How horrible it is that two young adults might get married. She is one of those young people who was brought up to be polite, and she is eager to please. It is beside the point that she is intellectually gifted, speaks three languages, and is learning Japanese. I thought the chances of her ever meeting a young man her intellectual equal was next to zero, but by George, she did.

    The younger of my two sons was not quite so easily intimidated. He was traveling with a handmade shaman drum. He had befriended an Inuit medicine man who made the drum for him as a gift. The drum was ringed with feathers, and the goatskin head was hand painted with a pretty scary looking mask. The drum hoop had feathers attached around the outside. He was carrying it wrapped in tissue paper in an extra large pizza box. He told the inspector to be very careful; that the contents were fragile. She grabbed the tissue paper and yanked it off. When she did a feather attachment broke off and the feather went flying. He looked at the damage, raised one eyebrow, and said in a soft voice, “NOW look what you’ve done.”

    He described the inspector getting very wide eyed, and started having a panic attack. He said he had never seen a look of such abject terror. She knew what she had done. SHE BROKE A MEDICINE MAN’S DRUM!

    A supervisor came and led her away. No one else wanted to touch that drum and he was waved through. One thing you do NOT do on a checkpoint in Alaska is break a medicine drum.

  26. Regarding that Alaska checkpoint. It probably did not hurt that my younger son was 6’6″ tall and weighed 300 pounds. He was a vet who had seen some bad stuff as well as having worked in law enforcement himself. He had the ability to stare a hole through you. I have trouble envisioning someone even coming close to intimidating him. I wish I had been there.

  27. OS,

    Aha … my first smuggling customers.

    Seriously, Tex and I used to travel to Canada regularly … at least 2 times a year … but have heard so many horror stories from friends about the customs officials that we no longer even think of going there. All of our friends have stopped going too. We are all too old to put up with the aggravation of wigged out bully-boys disguised as customs agents. It’s a shame for Canada really was a marvelous place to vacation.

  28. Seems like half the time I go through US customs I get the third degree.

    I can’t even imagine what would happen if I told them I am a dual citizen.

  29. Gene H.
    1, March 10, 2013 at 6:00 pm
    You’re a lazy reader?

    Let’s look at this case and ruling. Bear with the long restatement of facts as they are relevant to the holding.
    What is the holding? Isn’t it always subjective?

  30. Argument by non-sequitur.

    I can only show you something, Matt. I can not learn from it for you. At its barest level, learning is a lonely business.

  31. Gene H.
    1, March 11, 2013 at 2:47 pm
    Argument by non-sequitur.

    I can only show you something, Matt. I can not learn from it for you. At its barest level, learning is a lonely business.
    Sometimes you don’t understand.

  32. I understand that the ruling in this case is spelled out above and that no one else seems to have a problem getting its meaning. Of course, those people read the article and you, by your own admission, didn’t. So you’re right about one thing: I don’t understand the nature of your complaint. Failure to understand the holding by failing to read it strikes me – and most reasonable people – as exactly what you earned from your choice not to read. You can’t have “learned” without “earned”.

  33. Then maybe you should re-read from this point on . . .

    “In other words, given the totality of the circumstances, was the lower court wrong to grant Cotterman’s motion to suppress based on lack of reasonable suspicion in the search given that reasonable suspicion is indeed required? The 9th Circuit chose to overrule the district court and allow the evidence as part of a reasonable search. There was no problem with Officer Alvardo’s initial cursory inspection. The later forensic search was deemed based upon reasonable suspicion because of the circumstance of the TECS hit on Cotterman’s previous convictions.” [emphasis added]

    Everything from that point on is the holding, highlighting the parts of it pertaining to electronics and passwords.

  34. “In other words, given the totality of the circumstances, was the lower court wrong to grant Cotterman’s motion to suppress based on lack of reasonable suspicion in the search given that reasonable suspicion is indeed required?
    Um, I don’t think the search was required.

  35. Irrelevant.

    The initial search by Officer Alvardo was a permissible cursory border inspection. The later forensic search was permissible with reasonable suspicion, the level of heightened suspicion the 4th Amendment requires.

    Your personal approval was not required.

  36. Umm, you do all realize that the 100-mile zone is also applied to the U.S. “borders” that run along the Pacific & Atlantic & Caribbean coasts, right? So, because of where I live, 300 miles from the Canadian border, but less than 100 miles from the Pacific Coast, technically I could be stopped on my way to the grocery store or the public library branch closest to my home, and demanded to show the contents of my iPod that I carry in my purse…

  37. chimene,
    if you read Gene’s earlier post about the 100 mile zone, it is worse that you are suggesting. As I recall, even in far suburban chicagoland, I am less than 100 miles from Lake Michigan and/or Ohare airport and I fall within the 100 mile zone. You don’t have to be near the costs or borders for the 100 mile limit to kick in.

Comments are closed.