UPDATE – Your Rights Under Attack: What A Difference Judical Review Makes

Stock Photo of the Consitution of the United States and Feather Quillby Gene Howington, Guest Blogger

Recently we discussed the DHS’s self-approval of their draconian and arguably unconstitutional and unquestionably outrageous policy on searching computers within 100 miles of the border (Your Rights Under Attack: What A Difference 100 Miles Makes). This week, a ruling from the 9th Circuit Court of Appeals not only showed the DHS was legally wrong in their self-approval of a policy that runs afoul of the 4th Amendment, but also illustrated the true value of the checks and balances created by the Separation of Powers Doctrine that so many in the Executive seem eager to trample these days. The case at bar was U.S. v. Cotterman.  In a breath of good news for civil libertarians, the 9th Circuit Court of Appeals en banc ruling held that the 4th Amendment does apply at the border despite DHS contention to the contrary.

Let’s look at this case and ruling. Bear with the long restatement of facts as they are relevant to the holding.


fn. 2 – The facts related here are drawn from the record of the evidentiary hearing held before the magistrate judge.

[Ed. Note: Other footnotes omitted. See link to original below for full cite.]

Howard Cotterman and his wife were driving home to the United States from a vacation in Mexico on Friday morning, April 6, 2007, when they reached the Lukeville, Arizona, Port of Entry. During primary inspection by a border agent, the Treasury Enforcement Communication System (‘TECS’) returned a hit for Cotterman. The TECS hit indicated that Cotterman was a sex offender–he had a 1992 conviction for two counts of use of a minor in sexual conduct, two counts of lewd and lascivious conduct upon a child, and three counts of child molestation–and that he was potentially involved in child sex tourism. Because of the hit, Cotterman and his wife were referred to secondary inspection, where they were instructed to exit their vehicle and leave all their belongings in the car. The border agents called the contact person listed in the TECS entry and, following that conversation, believed the hit to reflect Cotterman’s involvement “in some type of child pornography.” The agents searched the vehicle and retrieved two laptop computers and three digital cameras. Officer Antonio Alvarado inspected the electronic devices and found what appeared to be family and other personal photos, along with several password-protected files.

Border agents contacted Group Supervisor Craig Brisbine at the Immigration and Customs Enforcement (‘ICE’) office in Sells, Arizona, and informed him about Cotterman’s entry and the fact that he was a sex offender potentially involved in child sex tourism. The Sells Duty Agent, Mina Riley, also spoke with Officer Alvarado and then contacted the ICE Pacific Field Intelligence Unit, the office listed on the TECS hit, to get more information. That unit informed Riley that the alert was part of Operation Angel Watch, which was aimed at combating child sex tourism by identifying registered sex offenders in California, particularly those who travel frequently outside the United States. She was advised to review any media equipment, such as computers, cameras, or other electronic devices, for potential evidence of child pornography. Riley then spoke again to Alvarado, who told her that he had been able to review some of the photographs on the Cottermans’ computers but had encountered password protected files that he was unable to access.

Agents Brisbine and Riley departed Sells for Lukeville at about 1:30 p.m. and decided en route to detain the Cottermans’ laptops for forensic examination. Upon their arrival, they gave Cotterman and his wife Miranda warnings and interviewed them separately. The interviews revealed nothing incriminating. During the interview, Cotterman offered to help the agents access his computer. The agents declined the offer out of concern that Cotterman might be able to delete files surreptitiously or that the laptop might be “booby trapped.”

The agents allowed the Cottermans to leave the border crossing around 6 p.m., but retained the Cottermans’ laptops and a digital camera. Agent Brisbine drove almost 170 miles from Lukeville to the ICE office in Tucson, Arizona, where he delivered both laptops and one of the three digital cameras to ICE Senior Special Agent & Computer Forensic Examiner John Owen. Agent Owen began his examination on Saturday, the following day. He used a forensic program to copy the hard drives of the electronic devices. He determined that the digital camera did not contain any contraband and released the camera that day to the Cottermans, who had traveled to Tucson from Lukeville and planned to stay there a few days. Agent Owen then used forensic software that often must run for several hours to examine copies of the laptop hard drives. He began his personal examination of the laptops on Sunday.That evening, Agent Owen found seventy-five images of child pornography within the unallocated space of Cotterman’s laptop.

Agent Owen contacted the Cottermans on Sunday evening and told them he would need Howard Cotterman’s assistance to access password-protected files he found on Cotterman’s laptop. Cotterman agreed to provide the assistance the following day, but never showed up. When Agent Brisbine called again to request Cotterman’s help in accessing the password-protected files, Cotterman responded that the computer had multiple users and that he would need to check with individuals at the company from which he had retired in order to get the passwords. The agents had no further contact with Cotterman, who boarded a flight to Mexico from Tucson the next day, April 9, and then flew onward to Sydney, Australia. On April 11, Agent Owen finally managed to open twenty-three password-protected files on Cotterman’s laptop. The files revealed approximately 378 images of child pornography. The vast majority of the images were of the same girl, approximately 7-10 years of age, taken over a two to three-year period. In many of the images, Cotterman was sexually molesting the child. Over the next few months, Agent Owen discovered hundreds more pornographic images, stories, and videos depicting children.

A grand jury indicted Cotterman for a host of offenses related to child pornography. Cotterman moved to suppress the evidence gathered from his laptop and the fruits of that evidence. The magistrate judge filed a Report and Recommendation finding that the forensic examination was an ‘extended border search’ that required reasonable suspicion. He found that the TECS hit and the existence of password-protected files on Cotterman’s laptop were suspicious, but concluded that those facts did not suffice to give rise to reasonable suspicion of criminal activity. The district judge adopted the Report and Recommendation and granted Cotterman’s motion to suppress.

In its interlocutory appeal of that order, the government characterized the issue as follows: ‘Whether the authority to search a laptop computer without reasonable suspicion at a border point of entry permits law enforcement to take it to another location to be forensically examined, when it has remained in the continuous custody of the government.’ A divided panel of this court answered that question in the affirmative and reversed. United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011). The panel concluded that reasonable suspicion was not required for the search and that ‘[t]he district court erred in suppressing the evidence lawfully obtained under border search authority.’ Id. at 1084. In dissent, Judge Betty B. Fletcher wrote that ‘officers must have some level of particularized suspicion in order to conduct a seizure and search like the one at issue here.’ Id. (B. Fletcher, J., dissenting). By a vote of a majority of nonrecused active judges, rehearing en banc was ordered. 673 F.3d 1206 (9th Cir. 2012). Following en banc oral argument, we requested supplemental briefing on the issue of whether reasonable suspicion existed at the time of the search.”

U.S. v. Cotterman, No. 09-10139, pp. 7-11.

All of the facts here hinge on reasonable suspicion as a higher standard required to search. When the government went to argue the case against the motion of suppress, they based their argument on the premise that “the forensic examination was part of a routine border search not requiring heightened suspicion and, alternatively, that reasonable suspicion justified the search.”  Id., p. 12. The government asserted to the district court that “the facts of this case clearly establish that there was reasonable suspicion.” Id. The district court disagreed and found against the prosecution. Oddly enough, after having failed to obtain a favorable ruling on that ground, the government did not challenge it directly on appeal but instead sought a broad ruling that no suspicion of any kind was required. A pretty gutsy contention but in line with the hubris shown by the DHS in rubber-stamping their own policies as legal as if they were the judiciary instead of part of the executive.  Cotterman in his answering brief argued that the government had waived the issue contending that the government “abandoned and conceded the issue of reasonable suspicion” and consequently that the Court of Appeals may not address that issue.

The Court of Appeals disagreed.

They chose to “review de novo the ultimate question of whether a warrantless search was reasonable under the Fourth Amendment.”  Id., (cite omitted). Stating that their “review necessarily encompasses a determination as to the applicable standard: no suspicion, reasonable suspicion or probable cause. That the government may hope for the lowest standard does not alter our de novo review, particularly when the issue was fully briefed and argued below. Further, we may consider an issue that has not been adequately raised on appeal if such a failure will not prejudice the opposing party. Where, as here, we ‘called for and received supplemental briefs by both parties,’ the government’s failure to address the issue does not prejudice Cotterman.” Id., pp. 12-13 (cites omitted).

The court goes on to define the traditional scope of border searches under the light of precedent. They note that although border searches are rooted in “‘the long-standing right of the sovereign to protect itself by stopping and examining persons and property crossing into this country.’ Thus, border searches form ‘a narrow exception to the Fourth Amendment prohibition against warrantless searches without probable cause.’ Because ‘[t]he Government’s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border’, border searches are generally deemed ‘reasonable simply by virtue of the fact that they occur at the border.’  This does not mean, however, that at the border ‘anything goes.’ Even at the border, individual privacy rights are not abandoned but ‘[b]alanced against the sovereign’s interests.’  That balance ‘is qualitatively different . . . than in the interior’ and is ‘struck much more favorably to the Government.’ Nonetheless, the touchstone of the Fourth Amendment analysis remains reasonableness. The reasonableness of a search or seizure depends on the totality of the circumstances, including the scope and duration of the deprivation.” Id., p. 13 (cites omitted) [emphasis added].  Applying these principles, the court found that Officer Alvardo’s initial cursory inspection was reasonable and the search would have remained reasonable if it had ended there.

The problem arises when “the search here transformed into something far different. The difficult question we confront is the reasonableness, without a warrant, of the forensic examination that comprehensively analyzed the hard drive of the computer.” Id. p. 14.

In other words, given the totality of the circumstances, was the lower court wrong to grant Cotterman’s motion to suppress based on lack of reasonable suspicion in the search given that reasonable suspicion is indeed required? The 9th Circuit chose to overrule the district court and allow the evidence as part of a reasonable search. There was no problem with Officer Alvardo’s initial cursory inspection. The later forensic search was deemed based upon reasonable suspicion because of the circumstance of the TECS hit on Cotterman’s previous convictions.

Of particular interest is the court’s finding that being secure in your electronic devices is analogous to being secure in your papers under the 4th Amendment.

The amount of private information carried by international travelers was traditionally circumscribed by the size of the traveler’s luggage or automobile. That is no longer the case. Electronic devices are capable of storing warehouses full of information. The average 400-gigabyte laptop hard drive can store over 200 million pages—the equivalent of five floors of a typical academic library…. Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.

The nature of the contents of electronic devices differs from that of luggage as well. Laptop computers, iPads and the like are simultaneously offices and personal diaries. They contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails. This type of material implicates the Fourth Amendment’s specific guarantee of the people’s right to be secure in their “papers.” The express listing of papers ‘reflects the Founders’ deep concern with safeguarding the privacy of thoughts and ideas–what we might call freedom of conscience–from invasion by the government.’ These records are expected to be kept  private and this expectation is ‘one that society is prepared to recognize as “reasonable.”‘

Electronic devices often retain sensitive and confidential information far beyond the perceived point of erasure, notably in the form of browsing histories and records of deleted files. This quality makes it impractical, if not impossible, for individuals to make meaningful decisions regarding what digital content to expose to the scrutiny that accompanies international travel. A person’s digital life ought not be hijacked simply by crossing a border. When packing traditional luggage, one is accustomed to deciding what papers to take and what to leave behind. When carrying a laptop, tablet or other device, however, removing files unnecessary to an impending trip is an impractical solution given the volume and often intermingled nature of the files. It is also a time-consuming task that may not even effectively erase the files.”

Id., pp. 21-22, (cites and footnotes omitted).

Another important holding in this case revolves around password-protected files. The government argued that the mere existence of password-protected files merited reasonable suspicion.

To these factors, the government adds another–the existence of password-protected files on Cotterman’s computer. We are reluctant to place much weight on this factor because it is commonplace for business travelers, casual computer users, students and others to password protect their files. Law enforcement ‘cannot rely solely on factors that would apply to many law-abiding citizens’ and password protection is ubiquitous. National standards require that users of mobile electronic devices password protect their files. See generally United States Department of Commerce, Computer Security Division, National Institute of Standards and Technology, Computer Security (2007) (NIST Special Publication 800-111). Computer users are routinely advised–and in some cases, required by employers–to protect their files when traveling overseas. See, e.g., Michael Price, National Security Watch, 34-MAR Champion 51, 52 (March 2010) (‘[T]here is one relatively simple thing attorneys can do [when crossing the border] to protect their privacy and the rights of their clients: password-protect the computer login and any sensitive files or folders.’). Although password protection of files, in isolation, will not give rise to reasonable suspicion, where, as here, there are other indicia of criminal activity, password protection of files may be considered in the totality of the circumstances. (fn. 17) To contribute to reasonable suspicion, encryption or password protection of files must have some relationship to the suspected criminal activity. Here, making illegal files difficult to access makes perfect sense for a suspected holder of child pornography. When combined with the other circumstances, the fact that Officer Alvarado encountered at least one password protected file on Cotterman’s computer contributed to the basis for reasonable suspicion to conduct a forensic examination. The existence of the password-protected files is also relevant to assessing the reasonableness of the scope and duration of the search of Cotterman’s computer. The search was necessarily protracted because of the password protection that Cotterman employed. After Cotterman failed to provide agents with the passwords to the protected files and fled the country, it took Agent Owen days to override the computer security and open the image files of child pornography. Although we must take into account factors weighing both in favor and against reasonable suspicion, Cotterman’s innocent explanation does not tip the balance. See Tiong, 224 F.3d at 1140 (recognizing that ‘innocent possibilities . . . do not undermine reasonable suspicion’).

Fn. 17 – We do not suggest that password protecting an entire device–as opposed to files within a device– can be a factor supporting a reasonable suspicion determination. Using a password on a device is a basic means of ensuring that the device cannot be accessed by another in the event it is lost or stolen’.”

Id., pp. 31-32 (cites and some footnotes omitted).

So a border search of your electronics is protected by the 4th Amendment and simply having password protection does not create the presumption of reasonable suspicion absent other circumstances considered in their totality.  The wisdom of the checks and balances created by the Separation of Powers Doctrine made manifest by the courts reigning in the abuses of the executive while maintaining legal justice against the vile child pornographer Cotterman. Although this is good news for civil liberties and civil libertarians, there are questions remaining.

Should this case be appealed to the Supreme Court and granted certiorari, do you think the current SCOTUS dominated by the Gang of Five (Scalia, Alito, Roberts, Thomas and Kennedy) will uphold the 9th’s ruling or overrule? Does this example of checks and balances working as they should restore your faith in the wisdom of the Separation of Powers Doctrine? Do you think DHS will comply with the ruling or ignore it and do as they please? Does this ruling do anything to assuage your concerns for your privacy and the trampling of your 4th Amendment and other Constitutional rights?  What do you think?

Source(s): Techdirt, U.S. v. Cotterman, No. 09-10139 (.pdf)

~submitted by Gene Howington, Guest Blogger

59 thoughts on “UPDATE – Your Rights Under Attack: What A Difference Judical Review Makes”

  1. Gene H.
    1, March 10, 2013 at 6:00 pm
    You’re a lazy reader?

    Let’s look at this case and ruling. Bear with the long restatement of facts as they are relevant to the holding.
    What is the holding? Isn’t it always subjective?

  2. Seems like half the time I go through US customs I get the third degree.

    I can’t even imagine what would happen if I told them I am a dual citizen.

  3. OS,

    Aha … my first smuggling customers.

    Seriously, Tex and I used to travel to Canada regularly … at least 2 times a year … but have heard so many horror stories from friends about the customs officials that we no longer even think of going there. All of our friends have stopped going too. We are all too old to put up with the aggravation of wigged out bully-boys disguised as customs agents. It’s a shame for Canada really was a marvelous place to vacation.

  4. Regarding that Alaska checkpoint. It probably did not hurt that my younger son was 6’6″ tall and weighed 300 pounds. He was a vet who had seen some bad stuff as well as having worked in law enforcement himself. He had the ability to stare a hole through you. I have trouble envisioning someone even coming close to intimidating him. I wish I had been there.

  5. Raff,
    They seem to enjoy giving 20 year old girls a hard time. How horrible it is that two young adults might get married. She is one of those young people who was brought up to be polite, and she is eager to please. It is beside the point that she is intellectually gifted, speaks three languages, and is learning Japanese. I thought the chances of her ever meeting a young man her intellectual equal was next to zero, but by George, she did.

    The younger of my two sons was not quite so easily intimidated. He was traveling with a handmade shaman drum. He had befriended an Inuit medicine man who made the drum for him as a gift. The drum was ringed with feathers, and the goatskin head was hand painted with a pretty scary looking mask. The drum hoop had feathers attached around the outside. He was carrying it wrapped in tissue paper in an extra large pizza box. He told the inspector to be very careful; that the contents were fragile. She grabbed the tissue paper and yanked it off. When she did a feather attachment broke off and the feather went flying. He looked at the damage, raised one eyebrow, and said in a soft voice, “NOW look what you’ve done.”

    He described the inspector getting very wide eyed, and started having a panic attack. He said he had never seen a look of such abject terror. She knew what she had done. SHE BROKE A MEDICINE MAN’S DRUM!

    A supervisor came and led her away. No one else wanted to touch that drum and he was waved through. One thing you do NOT do on a checkpoint in Alaska is break a medicine drum.

  6. raff, The choices were the confrontation that he was itching for or the tears that trumped his arrogance. Nothing like using some of your own emotions and tears to knock down a bit of arrogance. Let’s hope he learned a lesson that will make him a bit nicer to others passing through.

    OS, I’m so sorry that she had that kind of story to tell.

  7. raff,
    On one trip through, one of the customs people was giving my granddaughter a hard time about being engaged to a Canadian. The agent demanded (not asked) to know how and where she met her boyfriend. She told the agent her little brother introduced them after they met at a computer game convention. She said the agent, very sarcastically, asked how old her little brother was, his name and where did he live. She told the agent his name, that he died of cancer right after his 17th birthday, and began to cry. She said for the first time, the customs agent looked stunned and literally had nothing to say. She was waved on through.

  8. Blouise,
    My granddaughter is engaged to a Canadian. They have been traveling back and forth for the past three years. The rules are mind-numbing. When they cross the border, they are grilled like criminals. The US customs is worse than the Canadian side, according to both of them.. Also, both of them tell me that coming through Detroit is the worst border crossing of all the ones they use.

    Her fiance told me the Canadian government was more laid back about it until several American politicians started making remarks such as Mexico being more trustworthy than Canada. A tit-for-tat began to follow. They really want to get married and settle down, but immigration laws have become so draconian, a young couple just starting out find it extremely difficult on both sides of the border.

  9. The Supremes like to pick on the Ninth Circuit. I think that they will grant cert.

  10. It is a well writeen opinion by the 9th Circuit. I dont think that the Supreme Court will take the case. Antonin Scalia has no precedent from the days of the Framers of the Constitution — meaning the Original Framers had no knowledge of computers and very little of child porn. Without that Original Intent the Scalia guy will not wish to pontificate, especially while the Conclave is in session in Rome.

  11. Gene: Very good presentation of this case. Borders create a hazardous field for Constitutional lawyers to tread. The right to privacy is what I would characterize as a fundamental human right and a natural right which precedes our Constitution. But if a perp comes across a border with a box of photos of child porn which can be readily seen because they are photographs on paper, does he have an expectation of privacy? If there is no expectation of privacy then one has not right thereto. The perp would not have the right to say show his private parts to those waiting in the waiting room at the border crossing. Bringing in illegal child porn is beyond the Paletinate so to speak. Now the fact that the child porn photos are not on hard paper copies but are nestled inside his cute little laptop does not make much difference.
    What I would do in this case if I was lawyer for child perp and it goes to the Supreme Court is go to a fall back position and say that the border cops had to go to get a warrant to bust into the computer. The next question is can they seize it and hold it pending warrant application? What was the probable cause for obtaining the warrant? The fact that the perp has a record for being a perp? On these facts if Bill Clinton came across the border with cigars they might say that he had used them illicitly on a Monica somewhere and seize his cigars utnil they pass a smell test. Slippery slope.

  12. Thanks, mespo. I too was pleased with the outcome and the reasoning in this case. The 4th Amendment line was drawn at the appropriate place. What appalled me was the DHS contention that no heightened suspicion was required. The hubris, arrogance and raw unconstitutionality behind that line of legal reasoning is both staggering a frightfully fascist/authoritarian in nature. However, when cooler heads prevailed, the standards found in the jurisprudence still yielded the just outcome and protected our rights sufficiently by requiring both reasonable suspicion and considering the totality of the circumstances in “stretching” the border search.

  13. Blouise,

    It’s hard to mount an operation that utilizes back bacon, whisky, skunky beer, tuques and Rush or April Wine CDs.

  14. Good work, Gene. Now to your point. Does previous criminal involvement of the type mentioned here justify an intensive border search of a person’s private papers reduced to electronic form on his laptop computer? I think it does under the particular circumstances here. Defendant Cotterman is a convicted child abuser and suspected of child sex tourism. He was traveling with a laptop which is a customary depository of child pornography. Further, he had some password protected files which could conceivably hold the type of contraband for which the agents were searching. Border searches do not require the same 4th Amendment scrutiny as domestic searches given the sovereigns manifest interest in protecting itself and its citizens from contraband and for all the other reasons detailed in your recitation of the proceedings. A man’s history travels with him even to Mexico and it is a valid consideration for the more intrusive border search conducted.

    I say good police work and sayonara Mr. Cotterman.

  15. Excellent article. Well done. I sure hope our courts start to reign in our Federal government on many fronts. However, I am left with a feeling that too many of our citizens don’t care. Too many people think that if you have nothing to hide, let them open everything and read it. I’m sure our founding fathers roll over in their graves when they hear stuff like this. This web site is rife with examples of police abusing citizens all the time. Isn’t it time the courts start to take the citizens side?

  16. If I decide to go onto smuggling … lots of little coves, inlets and caves along my shoreline that were well used during prohibition … what is it the Canadians have that we might want?

Comments are closed.