Vous êtes sur la page 1sur 31

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

Abidor and House: Lost Opportunities to Sync the Border Search Doctrine with Todays Technology
Shannon L. Smith*
ABSTRACT While todays media focuses on National Security Agency (NSA) wiretapping initiatives, international travelers, citizens and visitors alike, are being subjected to privacy invasions from customs agents scrutinizing the digital contents of their electronic devices when entering the country. These searches are neither supported by a warrant nor based on reasonable suspicion. Rather, they are based on criminal records in a database or association with certain groups, nations, or ideasif based on anything at all. On December 12, 2012, Representative Engel of New York reintroduced proposed legislation in the U.S. House of Representatives that sought to impose restrictions on searches of electronic devices and digital media storage at our borders. However, the 112th Congress is not the first Congress in which Representative Engel introduced his bill, and he is not the only member of Congress to propose restrictions for searches of electronic devices conducted at the border. The government has recognized a border exception to the Fourth Amendment warrant requirement since the United States inception; only the exceptions initial rationale of collecting customs duties has shifted to an ambiguous national security rationale. For decades the United States Supreme Court has consistently upheld the authority of various federal agencies, including the Department of Homeland Security, to conduct inspections and searches at ports of entry without probable cause or reasonable suspicion. This authority is based on the Executive Branchs prerogative at vulnerable areas susceptible to national security threats. But the last case the Supreme Court decided on the Fourth Amendments border exception was a decade ago and did not contemplate electronic devices or the data they contain. The circuit courts, absent any other direction from the Court or Congress, have considered laptops and other electronic devices equivalent to a piece of luggage that carries a diminished expectation of privacy. This Note seeks to demonstrate that lap223

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

224

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

tops are different and carry with them a higher expectation of privacy than a suitcase. Small, portable, password-protected laptop computers have replaced the bulky, locking, in-home file cabinets for safeguarding personal information. Given their ability to store massive amounts of data, many computers contain an individuals entire life, so much so that hackers mine personal data and engage in identity theft. While it is true that a thief can take someones suitcase off of the conveyor belt, the consequences are vastly different. Two cases, Abidor v. Napolitano and House v. Napolitano, were poised to provide an opportunity for the United States Supreme Court to bring border exception jurisprudence up to date in the absence of congressional action. However, with the settling of one and dismissal of the other in 2013, both opportunities have been lost. I. INTRODUCTION The Warrant Clause has stood as a barrier against intrusions by officialdom into the privacies of life. But if that barrier were lowered now to permit suspected subversives most intimate conversations to be pillaged then why could not their abodes or mail be secretly searched by the same authority?1 That was the warning heeded by Justice Douglas in 1972 via his concurring opinion in United States v. United States District Court.2 That case, also known as the Keith case, involved electronic surveillance practices engaged in by the United States government. Justice Douglass warning has proved accurate. Today, any international traveler crossing the border into the United States, whether a citizen or visitor, may be subjected to the pillaging of hundreds or thousands of personal documents and images stored on a laptop or other electronic device without any measure of individualized suspicion by law enforcement.3 As was the case in Keith, the esoteric claim of national security often is at play at the border.4 On December 12, 2012, Representative Eliot Engel of New York reintroduced the bill known as the Securing our Borders and our Data Act

* J.D. Candidate, New England Law | Boston (2014); B.A., Political Science, Hunter College (2010). I would like to thank Victor M. Hansen, Associate Dean and Professor of Law, for his guidance and feedback during the writing process, as well as the New England Journal on Criminal and Civil Confinement staff for their dedication and efforts in the publication of this Note. I would like to thank my family and friends for their patience and support. I am especially grateful for the encouragement and guidance from Philip Allen Lacovara. 1. United States v. United States Dist. Court (Keith), 407 U.S. 297, 332 (1972) (Douglas, J., concurring). 2. Id. 3. CBP DIRECTIVE No. 3340-049 5.1.2 (Aug. 2012), available at http://www.dhs.gov/xlibrary/assets/cbp_directive_3340-049.pdf. 4. See, e.g., id. 1.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

225

(SBDA) for the third time.5 The SBDA is a five-page bill intended to impose a reasonable suspicion standard before Immigration and Customs Enforcement (ICE) or Customs and Border Protection (CBP) agents may search international travelers laptops and other electronic devices at the United States border and its functional equivalent, e.g., airports.6 But Eliot Engel is not the only representative in the initiative to reign in the Department of Homeland Security (DHS) and their warrantless searches of electronic devices at the border.7 In fact, several bills have been introduced in the House and Senate since the 110th Congress, ranging from coast to coast and varying in size and scope.8 Apart from those bills, the border search doctrine has not been reexamined since the Supreme Court ruled on United States v. Flores-Montano in 2004a case that involved narcotics trafficking via an automobile gas tank.9 In 2013, two cases were pending in the First and Second Circuits that might have presented the Court with an opportunity to revisit the privacy expectation at the border and consider it in a twenty-first century context. Abidor v. Napolitano and House v. Napolitano were poised to present an opportunity for the Court to clarify which highly intrusive or damaging facts are sufficient to trigger a reasonable suspicion requirement for conducting searches at the border. In September House settled,10 and on the last day of the year Judge Korman of the Second Circuit dismissed Abidor for lack of jurisdiction.11

5. Katie W. Johnson, Legislation to Restrict Warrantless Border Searches of Laptops Reintroduced in House, BNA.COM (Jan. 3, 2013), http://0ediscovery.bna.com.portia.nesl.edu/edrc/7082/split_display.adp?fedfid=28977957&vname=ddeenot allissues&wsn=500290000&searchid=19549114&doctypeid=6&type=oadate4news&mode=doc &split=0&scm=7082&pg=0. 6. See generally id. 7. See generally id. 8. See Securing Our Borders and Our Data Act of 2011, H.R. 6651, 112th Cong. (2011), available at http://beta.congress.gov/bill/112th-congress/house-bill/6651/text; Border Security Search Accountability Act, H.R. 216, 112th Cong. (2011), available at http://www.gpo.gov/fdsys/pkg/BILLS-112hr216ih/pdf/BILLS-112hr216ih.pdf; Electronic Device Privacy Act, H.R. 6588, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS-110hr6588ih/pdf/BILLS-110hr6588ih.pdf; Travelers Privacy Protection Act, S. 3612, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS-110s3612is/pdf/BILLS-110s3612is.pdf. 9. See generally United States v. Flores-Montano, 541 U.S. 149 (2004). 10. Susan Stellin, The Border Is a Back Door for U.S. Device Searches, N.Y. TIMES (Sept. 9, 2013), http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-doorfor-us-device-searches.html?pagewanted=all&_r=0. 11. Abidor v. Napolitano, No. 10-CV-04059 (ERK)(JMA), 2013 WL 6912654, at *13

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

226

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

This Note explores the issue of the heightened privacy expectation in data stored on personal electronic devices. Part II frames this discussion by providing a history of the warrant requirement imposed by the Fourth Amendment and the so-called border exception to that requirement. Part III reviews current jurisprudence involving Fourth Amendment searches and the border exception to the warrant requirement. It also introduces two cases pending in the First and Second Circuits that may present the United States Supreme Court with an opportunity to act absent an act of Congress. Part IV of this Note outlines the various acts of legislation introduced in Congress over the past several years and considers twenty-first century privacy expectations. Part V explains why today is different, making the present a time ripe for change. It poses an alternative approach to considering searches of electronic devices and their digital contents. Finally, this Note concludes by contending that if the Legislature fails to enact legislation limiting DHSs authority, then the Judiciary should act when it has the opportunity to do so. II. DEVELOPMENT OF THE BORDER EXCEPTION A. The Warrant Requirements of the Fourth Amendment The Fourth Amendment to the Constitution provides that:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.12

Fourth Amendment jurisprudence gauges the intrusiveness of a search or seizure by looking at an individuals subjective expectation of privacy and whether that expectation is one that society objectively finds reasonable.13 The Supreme Court has maintained that the Fourth Amendment guarantees these protections to individuals during searches and seizuresunless there

(E.D.N.Y. Dec. 31, 2013) (finding that Association Plaintiffs lacked standing for unlikeliness of having electronic devices searched at border and Abidor was entitled to destruction of electronic materials under the regulation). While this Note does not address Article III standing or the doctrine of prudential standing doctrine, it is interesting that Judge Korman indicated in his opinion that Abidor could have established standing . . . by adding a cause of action for damages based on his claim that he was subject to an unreasonable search. Id. at *12. 12. U.S. CONST. amend. IV. 13. Benjamin J. Rankin, Restoring Privacy at the Border: Extending the Reasonable Suspicion Standard for Laptop Border Searches, 43 COLUM. HUM. RTS. L. REV. 301, 329 (2011) (citing Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring)).

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014] is an exception.14

ABIDOR AND HOUSE

227

B. Origins of the Border Exception The border exception was initially recognized by the First Congresss Act of July 31, 1789, which created the Customs Service.15 The first justifications for the exception were to provide the Customs Service latitude in collecting and enforcing duties and tariffs on imports arriving in the U.S.16 The protected interest behind the First Congresss exception was financial, and it remained so for well over a century.17 Approximately 130 years later, Prohibition shifted the rationale from fiscal protection to one of national self protection.18 Since at least the 1960s, the border exception has also recognized the governments interest in preventing unauthorized immigration into the United States.19 In the 1980s, the War on Drugs reinforced the underlying interest claimed in the early twentieth century, which along with unauthorized immigration, remains the interest todaypreventing the trafficking of contraband into the U.S.20 Todays rationale for border searches, national security or crime prevention, is far different from the trade concerns present in 1789. The September 11, 2001, terrorist attacks ushered in a new wave of terroristic fear, but terrorism is hardly new. Terrorism has existed in its modern form for approximately 200 years, and the idea of terrorism has existed for at least 1,500 years.21 Modern-day warfare and terrorism techniques have called for innovative methods to ensure the United States does not experience another attack like the destruction of the World Trade Center; these innovative methods have undoubtedly led to thwarting terrorist plots

14. See Warden, Maryland Penitentiary v. Hayden, 387 U.S. 294, 310 (1967) (Black, J., concurring); see also Katz v. United States, 389 U.S. 347, 357 (1967). 15. See Victoria Wilson, Laptops and the Border Search Exception to the Fourth Amendment: Protecting the United States Borders from Bombs, Drugs, and the Pictures from Your Vacation, 65 U. MIAMI L. REV. 999, 1003 (2011) (The Act of July 31, 1789 was enacted [t]o regulate the Collection of Duties imposed by law . . . on goods . . . imported into the United States.); Act of July 31, 1789, 1 Stat. 29 (1789). 16. See Wilson, supra note 15. 17. Id. at 1004. 18. Id. at 1003. 19. See, e.g., United States v. Martinez-Fuerte, 428 U.S. 543, 551 (1976) (explaining governments interest in permanent checkpoints north of the international border with Mexico). 20. Wilson, supra note 15, at 1004. 21. Delaware Criminal Justice Council, The History of Terrorism: More than 200 Years of Development, STATE OF DEL., http://cjc.delaware.gov/terrorism/history.shtml (last visited Feb. 25, 2013).

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

228

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

against the United States and some of its allies.22 For example: the East and West Coast airliner plots in 2002 and 2003, the Heathrow Airport plot in 2003,23 and the United Kingdom 2006 liquid explosives plot that resulted in the ban on carrying significant volumes of liquids on planes.24 There are two facts that make any national security argument for searching and seizing laptops without a warrant at the border questionable: first, terrorism is nothing new;25 and second, the destructive plots were not uncovered by seizing and searching individual laptops at the border.26 Rather, they were uncovered through the use of foreign intelligence, which carries greater protections of privacy, even if minimal.27 C. The Border Exception Today The ambiguity of national security is highlighted by the fact that, to date, most of the cases involving DHSs policy for searching laptops involve child pornography.28 In 2008, the Ninth Circuit held in United States v. Arnold that reasonable suspicion is not needed for customs officials to search a laptop or other personal electronic storage devices at the border.29 Arnold was selected for secondary questioning while going through customs at Los Angeles International Airport.30 When he powered on his laptop to demonstrate to customs agents that it was functioning properly, folders entitled Kodak Pictures and Kodak Memories appeared on the desktop.31 Agents clicked on the folders and discovered a photo depicting two nude women, which prompted them to investigate further; eventually
STEPHEN DYCUS ET AL., NATIONAL SECURITY LAW 480 (4th ed. 2007). Id. Airliner Bomb Suspects Bugged, BRITISH BROAD. CORP. (May 6, 2008), http://news.bbc.co.uk/2/hi/uk_news/7386725.stm. 25. See generally United States v. United States Dist. Court (Keith), 407 U.S. 297 (1972). Keith arose from a criminal proceeding in which defendants had been charged with conspiracy to destroy Government property (i.e., domestic terrorism). Id. The Code of Federal Regulations defines terrorism as unlawful use of force and violence against persons or property to intimidate or coerce a government. . .in furtherance of political or social objectives. FBI General Functions, 28 C.F.R. 0.85 (2013). 26. See Airliner Bomb Suspects Bugged, supra note 24. 27. See id.; infra Part V.B.2 (providing examples of privacy protections in foreign intelligence surveillance). 28. Patrick E. Corbett, The Future of the Fourth Amendment in a Digital Evidence Context: Where Would the Supreme Court Draw the Electronic Line at the International Border?, 81 MISS. L.J. 1263, 1270 (2012). 29. United States v. Arnold, 533 F.3d 1003, 1008 (9th Cir. 2008) (debunking Arnolds argument that a laptop is more like a home because it is readily mobile and the border diminishes ones expectation of privacy). 30. Id. at 1005. 31. Id.
22. 23. 24.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

229

they found images of what was believed to be child pornography.32 ICE and CBP, following Arnold, both issued directives that memorialized their unfettered authority to search electronic devices and digital data at the border without reasonable suspicion or probable cause.33 Three years later, the Ninth Circuit expanded customs inspectors authority to search electronic devices absent a warrant and reasonable suspicion at the border to the extended border in United States v. Cotterman.34 An extended border search is one that occurs away from the border where entry is not apparent.35 Extended border searches assume that the individual in question cleared the border and thus regained an expectation of privacy in their possessions.36 Cottermans electronic devices were searched when inspectors at the Mexico-Arizona border checked Cottermans passport against a CBP database and discovered he had been convicted fifteen years earlier for use of a minor in sexual conduct, lewd and lascivious conduct upon a child, and child molestation.37 The initial search of Cottermans laptops and digital cameras did not yield any child pornography.38 However, since many of the files were password protected, ICE agents instructed the border inspectors to detain the laptops for forensic examination.39 Two days later and 170 miles away from the border, forensic technology revealed approximately seventy-five images of child pornography in unallocated space on one of the hard drives.40 The detention and forensic examination of the device was valid because of the border exception doctrine and its application to disallow contraband.41 D. Reactionary Politics and Law Resurface Post 9/11 Prior to September 2001, ICE agents were permitted to only glance at documents; reasonable suspicion was required to review or analyze beyond a glimpse.42 Additional protections also were in place: absent a travelers
Id. See generally Wilson, supra note 15. See United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011) (Cotterman was revisited en banc in 2012.); see infra Part V.B.1. 35. United States v. Cotterman, 709 F.3d 952, 961 (9th Cir. 2013) (citing United States v. Guzman-Padilla, 573 F.3d 865, 878-79 (9th Cir. 2009)). 36. Id. (citing United States v. Abbouchi, 502 F.3d 850, 855 (9th Cir. 2007)). 37. Id. at 1071. 38. Id. 39. Id. 40. Id. at 1070, 1072. 41. See generally id. 42. Analysis of Excerpts from Asian Law CaucusElectronic Frontier Foundation 2008 FOIA Release, at 1, available at https://www.eff.org/document/analysis-foiadocuments (last visited Aug. 14, 2013).
32. 33. 34.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

230

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

consent, probable cause for seizure was required before documents could be copied,43 and reasonable suspicion that a document fell into a certain readability category was required for any third-party translation of documents discovered on electronic devices.44 In the wake of the Ninth Circuits 2008 ruling in Arnold,45 CBP and ICE both issued directives providing guidance and standard operating procedures for searching electronic devices at U.S. borders.46 Both policies authorize agents to review data stored on electronic devices without suspicion; seek assistance from other federal agencies; share information with other federal, state, or foreign agencies; and retain electronic devices for further investigation.47 In addition, customs agents may copy data from such devices to further DHS objectives.48 Between October 1, 2008, and June 2, 2009, close to 3000 searches of laptops and other media were conducted by CBP officers at the border.49 While 3000 may seem insignificant considering how many individuals cross the border each year, erosions of liberty typically start small.50 CBP is well aware of the public sentiment criticizing its extended powers.51 CBP port directors have been notified that searches and seizures of electronic devices have become a hot topic that has reached the White House.52 Further, they have been requested to establish two procedures:
43. 44. 45. 46.

Id. Id. United States v. Arnold, 533 F.3d 1003, 1008 (2008). CBP Directive No. 3340-049 (2009), available at http://www.dhs.gov/xlibrary/assets/cbp_directive_3340-049.pdf; U.S. Immigration and Customs Enforcement Directive No. 7-6.1 (2009), available at http://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf. 47. CBP Directive No. 3340-049 (2009), available at http://www.dhs.gov/xlibrary/assets/cbp_directive_3340-049.pdf; U.S. Immigration and Customs Enforcement Directive No. 7-6.1 (2009), available at http://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf. 48. CBP Directive No. 3340-049 (2009), available at http://www.dhs.gov/xlibrary/assets/cbp_directive_3340-049.pdf; U.S. Immigration and Customs Enforcement Directive No. 7-6.1 (2009), available at http://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf. 49. See Government Data About Searches of International Travelers Laptops and Personal Electronic Devices, ACLU (Aug. 25, 2010), http://www.aclu.org/nationalsecurity/government-data-about-searches-international-travelers-laptops-and-personalelectr. 50. See Jonathan Turley, 10 Reasons the U.S. Is No Longer the Land of the Free, WASH. POST (Jan. 13, 2012), http://articles.washingtonpost.com/2012-0113/opinions/35440628_1_individual-rights-indefinite-detention-citizens. 51. See Analysis of Excerpts from Asian Law Caucus, supra note 42, at 5. 52. Id.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

231

one requiring supervisory approval for searches and port director approval for seizures of electronic devices; the other requiring a port directors or chiefs permission prior to copying electronic media.53 This guidance fails to mention which standard will be used by port directors to determine whether to grant permission to seize and/or copy electronic media.54 It also is silent on any standard required for approval to search. 55 In other words, the CBP instructions miss the pointit permits the unbridled authority of CBP and ICE agents to arbitrarily select electronic devices for search and seizure absent the slightest reasonable suspicion. DHSs policies are reminiscent of reactionary politics from the past. For instance, the Palmer Raids following World War I, in which suspected radicals were deported to Russia,56 and McCarthyism after World War II, where Senator Joseph McCarthy decried hundreds of card-carrying communists for infiltrating the U.S. government.57 The Palmer Raids and Red Scare resulted in the infringement on liberties of many Americans due simply to political affiliation.58 The same discriminatory treatment was cast on Japanese-Americans following the bombing of Pearl Harbor, when the Court upheld the militarys imposition of a curfew on and internment of Japanese-Americans in California.59 Just as the curfew policy then was implemented under the auspices of national security, the border exception doctrine is being used to justify warrantless scrutiny of intimate digital documents and photos. At first blush, it may seem like plausible policy. But in reality, what often occurs is the singling out, absent any reasonable suspicion of criminal activity, of both visitors and citizens of Arab, Middle Eastern, Muslim, and South Asian descent for intrusive questioning [and] invasive searches.60 Such singling out is not limited to the basis of ethnicity, race, or religion; other Americans fall into this category because of their political affiliations and other

Id. See generally id. See generally id. A Byte Out of History: The Palmer Raids, FBI (Dec. 28, 2007), http://www.fbi.gov/news/stories/2007/december/palmer_122807. 57. Arthur Miller, McCarthyism, PBS (Aug. 23, 2006), http://www.pbs.org/wnet/americanmasters/episodes/arthur-miller/mccarthyism/484/. 58. See id. 59. See generally Korematsu v. United States, 323 U.S. 214 (1944) (questioning the constitutionality of a military imposed curfew on Japanese-Americans in California). 60. Hearing on Ten Years After 9/11: Are We Safer?, S. Comm. on Homeland Security and Governmental Affairs, U. S. Senate, at 3 (Sept. 13, 2011) (Statement of Margaret Huang, Rights Working Group), available at http://www.rightsworkinggroup.org/sites/default/files/RWG_StatementfortheRecord_AreW eSafer_091311.pdf.

53. 54. 55. 56.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

232

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

associations.61 ICEs and CBPs invasive searches include rummaging through personal documents stored on laptops and other electronic devices.62 Over time, it has come to pass that the myopic restrictions on liberty following the World Wars were an overreaction by the government.63 California has since enacted the Fred Korematsu Day of Civil Liberties and the Constitution Bill in 2010, which encourages schools to teach Korematsus story and why it remains so relevant today.64 Yet, it seems that story has been forgotten by the Department of Justice who, in 2003, issued guidance to federal law enforcement agencies that provides their officers wider latitude to consider race and ethnicity in matters involving national security and border integrity.65 Allowing DHS the broad authority it has assumed under Arnold may authorize and even encourage arbitrary and discriminatory enforcementthe same conduct the Court has sought to eliminate in other contexts.66 The Palmer Raids, McCarthyism, and Korematsu are prime examples of reactionary politics and law. The present is an opportunity to prevent history from repeating itself. III. U.S. V. FLORES-MONTANO - THE LAST BORDER EXCEPTION CASE DETERMINED BY SCOTUS (NOTHING ELECTRONIC ABOUT IT) It is time for the Supreme Court to make a twenty-first century exception to the border exception. United States v. Flores-Montano was the last case in which the Court issued an opinion on the border exception doctrine.67 In Flores-Montano, the Court held that the warrantless seizure of FloresMontanos gas tank at the international border did not require reasonable suspicion,68 stating that vehicles are not privy to suspicion because they are not the same as highly intrusive searches of the person [having] dignity

61. See generally Complaint, Abidor v. Napolitano, 2010 WL 3477769 (E.D.N.Y. Sept. 7, 2010) (No. CV 10-4059); House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816 (D. Mass. Mar. 28, 2012). 62. Hearing on Ten Years After 9/11, supra note 60. 63. See, e.g., A Byte Out of History: The Palmer Raids, supra note 56. 64. Ling Woo Liu, California Marks the First Fred Korematsu Day, TIME (Jan. 30, 2011), http://www.time.com/time/nation/article/0,8599,2045111,00.html. 65. Memorandum re: Agenda of the Privacy and Civil Liberties Oversight Board, BRENNAN CTR. FOR JUST. (Oct. 26, 2012), http://www.brennancenter.org/analysis/comments-submitted-privacy-and-civil-libertiesoversight-board. 66. City of Chicago v. Morales, 527 U.S. 41, 56 (1999) (holding a city ordinance invalid under the void for vagueness doctrine). 67. See generally United States v. Flores-Montano, 541 U.S. 149 (2004). 68. Id. at 150.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

233

and privacy interests.69 Further, the Court maintained that [t]he Governments interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.70 The Court clearly has left open the notion that some searches at the border will require reasonable suspicion.71 Yet, national security seemingly has permitted the Court to evade the issue of whether the Executive has overreached its authority at the border; however a lot has changed since 2004. Abidor72 and House73 both demonstrated the true concern behind watering down Fourth Amendment protections under the auspices of national security. Instead of being the typical case involving digital child pornography, both of these cases involved electronic documents comprised of an individuals words and thoughts for personal, professional, or educational use.74 Prior to settling in September 2013, House had survived a motion to dismiss and was prepared to move forward; Abidor was still waiting for his day in court. Both cases provided a set of facts that would have allowed the Supreme Court to clarify what searches qualify as highly intrusive searches of the persondignity and privacy interests sufficient to require a heightened standard for searches conducted at the border and its functional equivalent.75 A. House v. Napolitano House was a First Circuit case that involved a laptop search for documents based on the travelers association with an unpopular Army intelligence analyst charged with aiding the enemy.76 On November 3, 2010, Da-

Id. at 152. Id.; see also Wilson, supra note 15, at 1003. Flores-Montano, 541 U.S. at 156 n.2. See Abidor v. Napolitano, No. 10-CV-04059 (ERK)(JMA), 2013 WL 6912654, at *1-2 (E.D.N.Y. Dec. 31, 2013). On September 9, 2013, The New York Times reported that David House settled his claim against DHS. According to the article, documents revealing the governments use of border crossings to circumvent the Fourth Amendment were released to House as part of the settlement. The documents also confirmed that no evidence of any crime committed by House was found on any of his electronic devices seized by CBP. Not surprisingly, CBP declined to comment on its settlement with House and did not answer questions regarding travelers rights at the border. The author finds it curious that DHS would settle a case if it had done no wrong and wonders if DHS will settle future cases to avoid having its practices brought before the Court. Stellin, supra note 10. 73. House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816, at *1-2 (D. Mass. Mar. 28, 2012). 74. See generally id.; Abidor, 2013 WL 6912654. 75. Flores-Montano, 541 U.S. at 152. 76. About Bradley, BRADLEY MANNING SUPPORT NETWORK, http://www.bradleymanning.org/learn-more/bradley-manning (last visited Mar. 30, 2013).

69. 70. 71. 72.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

234

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

vid House returned to the United States from vacation in Mexico.77 Without explanation or a request for consent, House was detained and DHS agents confiscated his laptop computer, video camera, cell phone, and a USB drive as he was preparing to board his connecting flight from Chicago to Boston.78 David House was a founder of The Bradley Manning Support Network, an international grassroots organization created to support the defense of Chelsea Manning (formerly Bradley), the U.S. Army private accused of leaking classified military documents to Wikileaks.79 Manning sought to bring transparency to Americans, something that many of us desire.80 Numerous people believe Mannings actions were deplorable, if not an outright violation of law.81 However, like all reprehensible crimes, that does not deprive him of the right to counsel. Our system is one that provides counsel for those in need, whether through the public or the private sector.82 There is nothing illegal about establishing a non-profit to assist with the financial obligations of such legal representation; in many ways, society has come to depend on itthe ACLU is a prime example.83 A reasonable suspicion of criminal conduct required for searching electronic devices potentially would have prevented House from DHS scrutiny. In May 2011, House filed suit against the Secretary of DHS, as well as the Commissioner of CBP and the Director of ICE, alleging that the search and prolonged detention of his electronic devices violated the First and Fourth Amendments.84 The defendants moved to dismiss the complaint and the Massachusetts District Court denied the motion, finding that with respect to the forty-nine day detention of Houses electronic devices, House had a plausible argument.85 While not exactly a win with respect to conducting the search in the first place, the decision nonetheless indicated that
House, 2012 WL 1038816, at *3. Id. Id. See About Bradley, supra note 76. Manning was found guilty of some of the charges against him on July 30, 2013 and pleaded guilty to others. Ed Pilkington, Bradley Manning Verdict: Cleared of Aiding the Enemy but Guilty of Other Charges, THE GUARDIAN (July 30, 2013), http://www.theguardian.com/world/2013/jul/30/bradley-manning-wikileaks-judgeverdict?INTCMP=SRCH; see Ed Pilkington, Bradley Manning Pleads Guilty to 10 Charges but Denies Aiding the Enemy, THE GUARDIAN (Feb. 28, 2013), http://www.theguardian.com/world/2013/feb/28/bradley-manning-pleads-aiding-enemytrial?INTCMP=SRCH. 82. Miranda v. Arizona, 384 U.S. 436, 471-72 (1966). 83. See How You Can Help, ACLU, http://www.aclu.org/how-you-can-help (last visited Apr. 1, 2013). 84. House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816, at *4 (D. Mass. Mar. 28, 2012). 85. Id.
77. 78. 79. 80. 81.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

235

some courts are not willing to simply dispose of a case under the border exception doctrine. Had Houses case not settled, any decision reached by the First Circuit likely would have been appealed and would have presented an ideal opportunity for the Supreme Court to draw a line at the border with respect to searches of electronic devices. B. Abidor v. Napolitano Abidor was a case pending within the Second Circuit.86 Like House, the facts did not involve child pornography; they involved association with an unpopular religion.87 Pascal Abidor, a U.S.-French citizen, was a Ph.D. student at the Institute of Islamic Studies at McGill University in Canada.88 At the end of the academic year in May 2010, Abidor took an Amtrak train home to New York City.89 When he crossed the border at Quebec, a routine check of boarding passes and passports was conducted.90 The inspecting agent asked Abidor about his travels, to which he replied he was a student of Islamic Studies in Canada.91 He was removed from the train where he was further questioned and CBP agents searched his laptop computer.92 After a few hours, he was released without his laptop and external hard drive.93 Abidors complaint included the National Association of Criminal Defense and the National Press Photographers Association as joint plaintiffs in the case.94 Lisa Wayne was a criminal defense attorney in Colorado. She was involved with the Mexico Legal Reform Project, which required frequent travels across the border.95 Upon returning to the U.S. after one of her trips to Mexico, she was selected for a search by a CBP officer who indicated his awareness that she was a defense lawyer and asked whom she visited in Mexico.96 During the search, Wayne was required to provide the password to her laptop, which was then taken from her and presumably searched.97 The ICE and CBP policies present a special issue for lawyers:

86. See Complaint, Abidor v. Napolitano, No. CV 10-4059, 2010 WL 3477769 (E.D.N.Y. Sept. 7, 2010). 87. Id. at *7. 88. Id. 89. Id. at *24. 90. Id. at *25-26. 91. Id. at *27. 92. See id. at *34-39. 93. See id. at *40-45. 94. See generally id. 95. See id. at *86-88. 96. See id. at *92. 97. See id. at *94-95.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

236

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

broken confidences of clients. Confidentiality is a hallmark of the legal system, so much so that ethical rules prevent disclosure of information shared between lawyers and clients except in extreme situations, and even then confidentiality trumps disclosure.98 The rationale is that justice will not be effectively served if clients do not disclose information with their lawyers, and clients will not disclose information they think may be shared.99 Lisa Waynes case demonstrated the concern for customs agents using their broad authority to step out of boundsneither the CBP nor the ICE directive provides for inquiries as to lawyers cases, yet the CBP officers questioning did exactly that. Prior to December 31, Abidors case provided another potential opportunity for the Supreme Court to revisit the border search doctrine and clarify which searches are considered highly intrusive so as to warrant reasonable suspicion at the border. Its dismissal could lead to yet another decade of waiting for the Court to consider Fourth Amendment searches at the border in todays technological times. Notwithstanding the lost opportunity with respect to Abidor and House, the Supreme Court had an opportunity to change the legal landscape surrounding the border search exception in Cotterman.100 Cotterman petitioned the Court for certiorari in August 2013.101 Cottermans petition was denied on January 13, 2014.102 IV. DEAD IN THE WATER Challenging the Executives authority is a fundamental principal of our tripartite government.103 Under the separation of powers doctrine, the Legislature and Judiciary ensure the Executive does not exploit its power and turn the country into a tyrannical state.104 Several members of Congress have introduced bills since the 110th Congress that would limit the Executives broad reach at the border.105 Unfortunately, the bills never gained the

MODEL RULES OF PROFL CONDUCT R. 1.6 (2009). Id. at R. 1.6 cmt. 2. Cotterman v. United States, 709 F.3d 952 (9th Cir. 2013), petition for cert. filed, 82 U.S.L.W. 3095 (Aug. 5, 2013) (No. 13-186), 2013 WL 4027042. Abidor and House were chosen as the focus of this Note due to the issues underlying both cases, i.e., the facts did not include digital devices containing images of child pornography, rather they brought to the forefront discriminatory issues concerning political, ethnic, and religious affiliations. 101. Id. 102. Cotterman v. United States, 709 F.3d 952 (9th Cir. 2013), cert. denied, 82 U.S.L.W. 3095 (Jan. 13, 2014) (No. 13-186). 103. Buckley v. Valeo, 424 U.S. 1, 122 (1976). 104. Wylene W. Dunbar, The Avoidance of Tyranny: Lessons of the Hudspeth Doctrine, 61 MISS. L.J. 61, 67 (1991). 105. H.R. 1726, 111th Cong. (2009); H.R. 216, 112th Cong. (2011).

98. 99. 100.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

237

popularity needed to make progress.106 A. Proposed Legislation The Securing our Borders and our Data Act (SBDA) was first introduced in the House on July 31, 2008.107 It sought to limit searches of electronic devices based solely on the power of the United States by requiring reasonable suspicion of a person before searching the digital contents of [a travelers] device or media.108 Further, the bill required that the seizure of electronic devices or their digital contents be based on some other constitutional authority beyond executive power.109 Finally, the bill sought to add additional protections by requiring border agents to be trained and searches to be conducted out of the public view.110 In addition, the bill implemented reporting requirements on DHS.111 The SDBA has been introduced in the past three Congresses, and Representative Engel intends to reintroduce it in the current one.112 Representative Lofgren of California introduced the Electronic Device Privacy Act (EDPA) in the same year as the SBDA.113 Ms. Lofgrens proposed legislation, a simple two page bill, sought to impose a general prohibition on searching electronic contents of persons digital devices at the border absent lawful authority other than the power of a sovereign.114 The Travelers Privacy Protection Act (TPPA) was introduced in both chambers of Congress.115 In the bill, Representative Smith and Senator Feingold acknowledged that laptops are [u]nlike any other closed con-

See, e.g., H.R. 1726; H.R. 216. See Securing our Borders and our Data Act of 2008, H.R. 6702, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS-110hr6702ih/pdf/BILLS110hr6702ih.pdf. 108. Id. 109. Id. 110. Id. 2(a)(3). 111. Id. 2(a)(3), (d). 112. Johnson, supra note 5. Compare H.R. 6702 2(a)(3), (d), with Securing our Borders and our Data Act of 2009, H.R. 239, 111th Cong. (2009), available at http://www.gpo.gov/fdsys/pkg/BILLS-111hr239ih/pdf/BILLS-111hr239ih.pdf, and Securing our Borders and our Data Act of 2012, H.R. 6651, 112th Cong., available at http://www.gpo.gov/fdsys/pkg/BILLS-112hr6651ih/pdf/BILLS-112hr6651ih.pdf. 113. Electronic Device Privacy Act, H.R. 6588, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS-110hr6588ih/pdf/BILLS-110hr6588ih.pdf. 114. Id. 115. Travelers Privacy Protection Act, H.R. 7118, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS-110hr7118ih/pdf/BILLS-110hr7118ih.pdf; see also S. 3612, 110th Cong. (2008), available at http://www.gpo.gov/fdsys/pkg/BILLS110s3612is/pdf/BILLS-110s3612is.pdf.

106. 107.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

238

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

tainer that can be transported across the border and introduced 29 pages of legislation aimed at protecting U.S. citizens right to privacy at the border.116 The TPPA would impose a reasonable suspicion requirement defined in the bill as a suspicion that has a particularized and objective basisfor searches of the content of any electronic equipment.117 It would also require a warrant based on probable cause or an order from the Foreign Intelligence Surveillance Court for foreign intelligence information.118 Under the bill, a seizure is the retention of electronic equipment or copies of digital content for more than twenty-four hours.119 Additionally, the TPPA establishes procedures for conducting searches and seizures, prohibiting profiling, imposing reporting requirements, and providing compensation for damage or loss of electronic equipment.120 Finally, there is the Border Search Accountability Act, which Representative Sanchez of California introduced in 2009 and 2011.121 Ms. Sanchezs bill called for DHS to issue a rule and set out guidelines for what that rule must include.122 The aptly named Border Search Accountability Act sought to hold DHS accountable, rather than impose restrictions on its actions.123 Its greatest protection was the requirement that commercial information and information subject to attorney-client privilege, doctorpatient privilege, or another privilege be handled in accordance with laws, rules, and regulations governing the information.124 There was no mention of requiring reasonable suspicion or probable cause to search or seize electronic devices in the bill.125 Notwithstanding the fact that these bills failed to gain traction, they signal that some members of Congress still seek to protect citizens privacy from Big Brothers prying eyes. But the masses tend to be easily persuaded to relinquish civil liberties when they believe doing so will curtail unpopular conduct such as child pornography, narcotics trafficking, and terrorism.126
See H.R. 7118. Id. 3, 4. Id. 4(b)(3). Id. 3(11). See generally id. Border Security Search Accountability Act, H.R. 216, 112th Cong. (2011), available at http://www.gpo.gov/fdsys/pkg/BILLS-112hr216ih/pdf/BILLS-112hr216ih.pdf. 122. Id. 123. See generally id. 124. Id. 125. See id. 126. See generally Darren W. Davis & Brian D. Silver, Civil Liberties vs. Security in the Context of the Terrorist Attacks on America, 48 AM. J. POL. SCI. 28 (2004) (discussing American citizens willingness to trade civil liberties for security, particularly after 9/11).
116. 117. 118. 119. 120. 121.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

239

B. Do Americans Simply Not Have the Same Privacy Expectations in the Electronic World? Despite the addition of social media to the digital world, expectations of privacy with respect to electronic data still exist.127 Firewalls and passwords are indicative of these expectations; as is the choice of Americans to stay abroad in order to avoid having their digital work and other data pillaged by DHS.128 In 2012, the Pew Internet & American Life Project revealed that approximately six out of ten smartphone users chose not to download certain apps due to privacy concerns.129 Facebook is currently the number one social network with nearly 700 million active users as of December 2012.130 In spite of the amount of information users post, Facebook has reported that the vast majority of users apply Facebooks privacy tools.131 There are two prongs to protecting privacy: safeguards implemented by the individual and protections afforded by the government.132 A Privacy International study published in 2007 ranked the U.S. as the worst . . . country in the democratic world for statutory protections of privacy.133 That ranking leaves one wondering whether it is technology that
127. Jim Dempsey, Privacy Policies Dont Trump Expectation of Privacy, CTR. FOR DEMOCRACY & TECH. (Apr. 21, 2011), https://www.cdt.org/blogs/jim-dempsey/privacypolicies-dont-trump-expectation-privacy. 128. Susan Stellin, Border Agents Power to Search Devices Is Facing Increasing Challenges in Court, N.Y. TIMES (Dec. 3, 2012), http://www.nytimes.com/2012/12/04/business/court-cases-challenge-border-searches-oflaptops-and-phones.html?pagewanted=all (referring to Laura Poitras, an American citizen and documentary filmmaker who is estimated to have been detained more than forty times crossing the U.S. border and who has decided to do her editing outside the country). 129. Cecilia Kang, Mobile Users Avoid, Uninstall Apps Over Privacy Concerns: Pew Report, WASH. POST (Sept. 5, 2012, 10:00 AM), http://www.washingtonpost.com/blogs/post-tech/post/mobile-users-avoid-uninstall-appsover-privacy-concerns-pew-report/2012/09/04/00fc4192-f6be-11e1-82533f495ae70650_blog.html. 130. Anthony Wing Kosner, Watch Out Facebook, With Google+ at #2 and YouTube at #3, Google, Inc. Could Catch Up, FORBES (Jan. 26, 2013, 9:33 AM), http://www.forbes.com/sites/anthonykosner/2013/01/26/watch-out-facebook-with-googleat-2-and-youtube-at-3-google-inc-could-catch-up/. 131. Bianca Bosker, Facebook Privacy Study Shows Why You Gave up on Keeping Your Data to Yourself, HUFFINGTON POST (Mar. 6, 2013), http://www.huffingtonpost.com/2013/03/06/facebook-privacy-study-carnegie-mellonuniversity_n_2823535.html. 132. Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring) ([T]here is a two fold requirement, first that a person have exhibited an actual (subjective) expectation of privacy and, second, that the expectation be one that society is prepared to recognize as reasonable.). 133. Dan Farber, U.S. Ranks Near the Bottom in 2007 International Privacy Ranking, BETWEEN THE LINES (Jan. 10, 2008, 3:37 AM), http://www.zdnet.com/blog/btl/u-s-ranks-

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

240

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

has led to a perceived diminishing expectation of privacy or a lack of protection resulting in a thats-just-the-way-it-is mentality. V. SMALL ELECTRONIC DEVICES STORE BIG DETAILS When the Ninth Circuit issued its ruling in Arnold in 2008,134 the trend of digital storage was well under way. But like every new concept, there are many hesitant to jump on board without the waters being tested first by others. Since 2004, when the U.S. Supreme Court last took up the border exception doctrine,135 there has been an evolution in the way data is stored. A. Bulky Metal Filing Cabinets Are an Endangered Species 1. Twenty-First Century Technology: The Devices Keep Getting Smaller One of the challenges with technology is the ability to keep up with it; another is embracing it. Given the nature of how technology trends emerge, there have always been gaps between generations. Sometimes those gaps questionably interfere with the carrying out of justice. For instance, older generations that are not addicted to computers in the way that members of the Millennial Generation are may not view them as the necessity that younger generations do.136 Baby Boomers and their predecessors relied on filing cabinets to store and protect their personal documents; these documents included medical records, tax returns, and financial statements documents not intended for public viewing and incapable of easy transport. Businesses have also come to rely on technology and many have migrated hard-copy business documents to electronic databases. Both personal and business documents have been recognized as private and confidential as is evidenced by regulations put in place to prevent public dissemination of the information they contain. 2. A Brief Refresher of the History of Computers The first general purpose electronic computer was developed in 1946.137 It was intended to help calculate ballistic trajectories, and its use

near-the-bottom-in-2007-international-privacy-ranking/7549. 134. See generally United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008). 135. See supra Part III. 136. See Transcript of Proceedings at 16, Abidor v. Napolitano, 2013 WL 6912654, No. CV 10-4059 (E.D.N.Y. July 8, 2011) (Judge Korman stating he does not travel with a laptop because his generation didnt become addicted to it.). 137. A Brief History of the Computer, TIME, http://www.time.com/time/photogallery/0,29307,1956593_2029011,00.html (last visited Feb. 19, 2013).

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

241

was limited and not available to the general public.138 By 1960, computers began finding their way into the marketplace for business, science, and engineering use.139 Less than ten years later, the modern day routers predecessor was created to keep the governments network of computers alive should the Cold War bring about a nuclear attack.140 A mere forty years after the development of the first computer, computing became personal with IBMs introduction of the IBM 5150.141 IBMs PC carried a price tag of $1565142 and dimensions of twenty inches in width, sixteen inches in depth, and five and one half inches in height.143 The computing landscape has changed methods for producing and storing data. Today, one can create and store a multitude of data on a computer that is less than one inch in height, less than twelve inches in width, less than eight inches in depth, and weighs less than two and a half pounds.144 With prices below $300, computers have become much more accessible in the mainstream.145 Computers have paved the way for globalization and a virtually borderless world has turned trend into necessity.146 Although generally the expectation of privacy diminishes in public, this technological shift, including password protection and document encryption, has made part of that expectation mobile. 3. Its in the Cloud! DHS indeed has a legitimate reason for wanting to ensure that persons entering the country are not bringing with them contraband harmful to the United States and its citizens.147 However, just as technology has created new modes of storing personal data on electronic devices, that same tech-

Id. Id. Id. See id. The Birth of the IBM PC, IBM, http://www03.ibm.com/ibm/history/exhibits/pc25/pc25_birth.html (last visited Aug. 14, 2013); see also A Brief History of the Computer, supra note 137. 143. IBM 5150 Product Fact Sheet, IBM, http://www03.ibm.com/ibm/history/exhibits/pc25/pc25_fact.html (last visited Feb. 19, 2013). 144. Apple 11-inch Macbook Air, APPLE, http://www.apple.com/macbookair/specs.html (last visited Aug. 14, 2013). 145. See Find Laptops, PCWORLD, http://www.pcworld.com/product/pg/directory.html?partnerCategory.pageId=13 (last visited Aug. 14, 2013). 146. See Vineeth Narayanan, Harnessing the Cloud: International Law Implications of Cloud-Computing, 12 CHI. J. INTL L. 783, 783 (2012). 147. Our Mission, DEPT OF HOMELAND SEC., https://www.dhs.gov/our-mission (last visited Jan. 2, 2013).

138. 139. 140. 141. 142.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

242

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

nology has also created a way to store that data elsewherein the Cloud.148 One service provider defines cloud computing as an online service in which computer power, software programs, and data storage are provided whenever and wherever you need it.149 The Cloud essentially is an extension of the Internet.150 It is a cyberspace repository that allows users to listen to music, watch movies, and share photos via the Internet.151 Facebook, Pandora, Shutterfly, and Amazon, amongst many others, use the Cloud to provide these services.152 But the Cloud is not only for movie watching and photo sharing; applications like Dropbox, Google Drive, and SugarSync are used to store documents for access from any electronic device with an Internet connection.153 Aside from users being able to retrieve their data from anywhere in the world and having remote access to that data in case of a computer crash,154 businesses can recognize cost savings and increased productivity through cloud computing.155 Small businesses in particular can benefit from cloud computing through cost savings on computer equipment.156 The World Economic Forum has looked to the Cloud as a way for governments to help emerging economies address major healthcare, education, and other societal issues.157 In November 2011, the National Institute of Standards and Technology prepared a roadmap for the U.S. government to implement cloud-computing technology.158 The purpose behind the roadmap is to foster adoption of cloud computing by federal agencies and support
148. Eric Knorr & Galen Gruman, What Cloud Computing Really Means, INFOWORLD, http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means031?page=0,1 (last visited Jan. 2, 2013). 149. Cloud Computing Your Computing Experience, Anywhere, Anytime, COX COMMCNS, INC., http://ww2.cox.com/myconnection/neworleans/learn/whats-so-hot/cloudcomputing.cox (last visited Aug. 14, 2013). 150. Joanna Stern, What is the Cloud?, ABC NEWS (June 26, 2012), http://abcnews.go.com/Technology/cloud-computing-storage-explained/story?id=16647561. 151. Id. 152. Id. 153. Id. 154. Id. 155. Cloud Computing, CISCO, http://www.cisco.com/web/solutions/trends/cloud/index.html (last visited Aug. 14, 2013). 156. COX COMMCNS, INC., supra note 149. 157. JOANNA GORDON ET AL., EXPLORING THE FUTURE OF CLOUD COMPUTING: RIDING THE NEXT WAVE OF TECHNOLOGY-DRIVEN TRANSFORMATION 2, WORLD ECON. FORUM (2010), available at http://www.weforum.org/reports/exploring-future-cloud-computingriding-next-wave-technology-driven-transformation. 158. See generally LEE BADGER ET AL., U.S. GOVERNMENT CLOUD COMPUTING TECHNOLOGY ROADMAP, VOL. I (2011), available at www.nist.gov/itl/cloud/upload/SP_500_293_volumeI-2.pdf.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

243

the private sector; reduce uncertainty by improving the information available to decision makers; and facilitate the further development of the cloud computing model.159 What does cloud computing mean for DHS and its border security efforts? First, the Cloud is not going anywhere.160 One of the great things about the Cloud is that it fosters innovation and creates jobsimportant concepts to governments of all nations.161 Second, the Cloud renders DHS efforts futile since a traveler who wishes to access potentially destructive data within the U.S.the traveler that DHS is concerned aboutmay do so without a single electronic device ever crossing the border. As more international travelers become aware of the opportunity for DHS (which includes ICE and CBP) to search and potentially seize their electronic devices, travelers are contemplating ways to avoid the exposure, which can potentially have the effect of circumventing exactly what DHS seeks to doeliminate photos, documents, and ideas they do not want in the U.S.162 For example, the University of Texas at Dallas issued an international travel advisory to its [f]aculty, researchers, [and] staff informing them of existing export controls, which fall within ICEs mandate.163 The advisory offers guidance to international travelers, such as [d]ont carry the only copy of data you cant afford to lose, and [h]ave a Plan B if there is data you will need when you reach your destination.164 These guidelines may be innocuous, yet they reiterate the fact that harmful data finds its way in and out of the country in ways that do not require physical transport via electronic device.165 B. The Time is Ripe for Change Several members of Congress have signaled a desire to change the way searches are conducted at the border.166 However, trying to obtain a conId. at 12. See Narayanan, supra note 146. See WORLD ECON. FORUM, supra note 157. Luigi Benetton, How to Secure Your Laptop Before Crossing the Border, CANADIAN BAR ASSN, http://www.cba.org/cba/practicelink/tayp/printhtml.aspx?docid=32818 (last visited Oct. 11, 2013). 163. UT Dallas Travel | Research Compliance, http://www.utdallas.edu/research/orc/export_control/travel/ (last accessed Feb. 21, 2014); U.S. Immigration and Customs Enforcement, Directive No. 7-6.1 4, Border Searches of Documents and Electronic Media (reviewed 2012), available at http://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf. 164. UT DALLAS Travel | Research Compliance, supra note 163. 165. Id. 166. See, e.g., Securing Our Borders and Our Data Act of 2011, H.R. 6651, 112th
159. 160. 161. 162.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

244

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

sensus of 535 individuals has proven to be an inefficient and daunting task.167 Reducing that number to nine Supreme Court Justices is, in theory, much more manageable and at least as effective. 1. Precedent Does Not Include Personal or Professional Electronic Documents When it comes to the international border and its functional equivalent, the Court has long maintained that [t]he Governments interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.168 The Governments broad authority derives from the sovereigns right of control without any need for exigent circumstances.169 However, there are constitutional limitations placed on sovereign power,170 as is indicated by the Courts balancing of Fourth Amendment protection and the public interest.171 The Court has repeatedly left open the question as to whether, and under what circumstances, a border search might be deemed unreasonable because of the particularly offensive manner in which it is carried out.172 Prior to settling and being dismissed, Abidor and House both presented ripe opportunities for the Court to take up that questionis the ability to search through every document stored on an individuals laptop, absent any suspicion particularly offensive enough to deem the search unreasonable? Many think so.173 Flores-Montano was the last case in which the Supreme Court issued a ruling on the border exception doctrine.174 Flores-Montano was decided in 2004 and involved the removal of an automobile gas tank for a narcotics search at the U.S.-Mexico border.175 The Court held that reasonable suspi-

Cong. (2011), H.R. 239, 111th Cong. (2009). 167. Id. (neither bill made it to the floor). 168. United States v. Flores-Montano, 541 U.S. 149, 152 (2004) (citing United States v. Ramsey, 431 U.S. 606, 616 (1977)). 169. United States v. Ramsey, 431 U.S. 606, 620-21 (1977). 170. Id. at 620. 171. United States v. Martinez-Fuerte, 428 U.S. 543, 555 (1976). 172. Flores-Montano, 541 U.S. at 154 n.2 (citing to Ramsey, 431 U.S. at 618 n.13). 173. Christine A. Coletta, Note, Laptop Searches at the United States Borders and the Border Search Exception to the Fourth Amendment, 48 B.C. L. REV. 971, 993-1006 (2007); see THE CONSTITUTION PROJECTS LIBERTY AND SEC. COMM., SUSPICIONLESS BORDER SEARCHES OF ELECTRONIC DEVICES: LEGAL AND PRIVACY CONCERNS WITH THE DEPARTMENT OF HOMELAND SECURITYS POLICY 7-8 (2011), available at http://www.constitutionproject.org/wpcontent/uploads/2012/09/Border_Search_of_Electronic_Devices_0518_2011.pdf. 174. See Flores-Montano, 541 U.S. at 149. 175. Id. at 151 (Flores-Montano attempted to enter at Otay Mesa Port of Entry in southern California).

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

245

cion was not required for customs officials to conduct that kind of search.176 But automobile gas tanks are radically different from laptop computers. The border exception has become a case where the exception [has swallowed] the rule.177 Many of the border search cases involving laptops have come out of the Ninth Circuit.178 While cases involving laptop searches at the border extend back to the 1980s, Arnold has been the seminal case since its decision in 2008.179 Prior to 2008, some measure of suspicion triggered the search of an international travelers electronic device beyond simply powering it up to demonstrate its functionality.180 It was Arnold that ICE and CBP used to justify their directives on carte blanche at the border.181 Significantly, the Ninth Circuit revisited Cotterman en banc in June 2012.182 The court, acknowledging that technology . . . has not eviscerated [the expectation of privacy], considered the question of what limits there are upon this power of technology to shrink the realm of guaranteed privacy.183 The underlying facts in Cotterman are similar to those of Abidor and House: there was an initial search of electronic devices that ultimately
Id. at 150. Florida v. J.L., 529 U.S. 266, 273 (2000) (citing Richards v. Wisconsin, 520 U.S. 385, 393-94 (1997) (declining to create a blanket firearm exception to the reasonable suspicion requirement for a Terry stop and frisk)). 178. See generally United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011) (considering constitutionality of search and seizure of electronic devices for pornographic images); United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008) (holding reasonable suspicion is not required for customs officials to search electronic devices at the border and its functional equivalent); United States v. Romm, 455 F.3d 990 (9th Cir. 2006) (involving search of computer for child pornography images conducted by airport customs officials). 179. See, e.g., United States v. Hilliard, 289 F. Appx 239, 239 (9th Cir. 2008) (stating Hilliards reasonable suspicion argument was squarely rejected in Arnold); United States v. Scott, 334 F. Appx 94, 94 (9th Cir. 2008) (holding Scotts reasonable suspicion argument was foreclosed by Arnold). 180. See Romm, 455 F.3d at 994 (knowing of Romms confessed criminal history and probation status led to Canadian border agents valid questioning in which pornographic websites were discovered in Romms internet history); United States v. Ickes, 393 F.3d 501, 502 (4th Cir. 2005) (telling customs inspector time spent in Canada was vacation when van appeared to contain everything he own[ed] created reasonable suspicion sufficient for further inspection); United States v. Roberts, 274 F.3d 1007, 1009 (5th Cir. 2001) (finding that informants corroborated tip constituted reasonable suspicion necessary to justify search and holding that the border exception extends to both inbound and outbound travel). 181. See Border Searches of Electronic Devices, Directive No. 7-6.1 (U.S. Immigration and Custom Enforcement Aug. 18, 2009); Border Search of Electronic Devices Containing Information, Directive No. 3340-049 (U.S. Customs and Border Protection Aug. 20, 2009). 182. See generally United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), petition for cert. filed, 82 U.S.L.W. 3095 (Aug. 5, 2013) (No. 13-186). 183. Id. at 956-57 (citing Kyllo v. United States, 533 U.S. 27, 34 (2001)).
176. 177.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

246

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

led to prolonged retention of those devices for forensic investigation.184 In Cotterman, the petitioner argued that the search should have been treated as an extended border search, which would have required customs agents to have reasonable suspicion before engaging in a forensic examination of his laptop.185 The Cotterman court recognized the intrusiveness of forensic searches since such searches are akin to a suitcase revealing everything it had ever carried and held that reasonable suspicion is required for a forensic examination of an international travelers electronic device.186 The Ninth Circuits holding is a positive step in acknowledging the modern expectation of privacy in the sensitive and confidential information stored on electronic devices and that a persons digital life ought not be hijacked simply by crossing a border.187 However, it fails to recognize that the expectation of privacy exists prior to a forensic examination and that viewing electronic data as they are stored in real time still provides customs agents with an unfettered dragnet ability.188 2. An Alternative Argument Current precedent has led lower courts to conclude that searching laptops and electronic devices is the equivalent to searching through a piece of luggage and therefore have a diminished expectation of privacy.189 The court views searching electronic devices as analogous to searching containers, but what if instead the court views searching electronic devices at the border as analogous to wiretapping? There are similarities underlying both situations: laptops contain correspondence (the written equivalent of an oral conversation) and the expectation of privacy in documents stored on a laptop is higher, like the privacy expectation in a phone conversation. Further, the rationale is the sameboth wiretapping and laptop searches at the border are conducted under the auspices of protecting national security or national self protection.190 If the Court views laptop searches as akin to wiretapping, a least restrictive means test would be required in the analy-

184. Compare id. at 958, with Complaint 42, Abidor v. Napolitano, No. CV 10-4059, 2010 WL 3477769 (E.D.N.Y. Sept. 7, 2010), and House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816, at *4 (D. Mass. Mar. 28, 2012). 185. Cotterman, 709 F.3d at 961. 186. Id. at 965-66. Ultimately the Ninth Circuit reversed the district courts motion to suppress because it concluded that border agents had a reasonable suspicion to conduct the forensic search. Id. at 957. 187. Id. at 965. 188. Id. at 966. 189. United States v. Arnold, 533 F.3d 1003, 1009 (9th Cir. 2008). 190. E.g., Zweibon v. Mitchell, 516 F.2d 594, 600 (D.C. Cir. 1975); United States v. Montoya de Hernandez, 473 U.S. 531, 551 (1985).

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

247

sis of the constitutionality of electronic devices searched at the border.191 The Ninth Circuit repudiated this test but applied it to border cases in the First Amendment context.192 Three decades ago in Keith, the Court recognized the apparent danger of abuse implicit in the vague concept of protecting the domestic security interest.193 National security is an ambiguous term, often interchanged with national interest.194 In Flores-Montano, the late Chief Justice Rehnquist referenced national self protection as the factor diminishing the privacy expectation at the border.195 The danger in using such terms is that they are over-inclusive. In some way, shape, or form, everything within a nations borders is part of the national interest.196 When these terms are used, they are generally perceived as indicating a grave threat to a nations survival.197 By attaching the national security, national interest, or national self protection label to any government objective, the Executive is able to garner enough support to justify the erosion of liberties.198 Does requiring a warrant to search and/or seize an individuals data, stored on electronic devices when crossing the border into the U.S., unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it?199 Arguably, it does not. The historical judgment of Congress, the judiciary, and the people demonstrated through Fourth Amendment norms finds that unreviewed executive discretion . . . [may] overlook potential invasions of privacy.200 The Court
United States v. United States Dist. Court (Keith), 407 U.S. 297, 314 (1972). Arnold, 533 F.3d at 1008 (citing United States v. Cortez-Rocha, 394 F.3d 1115, 1123 (9th Cir. 2005)). Arnold sought a higher standard of review alleging the search of his electronic device constituted an infringement on his right to free expression. The Court has consistently maintained a separation between First Amendment and Fourth Amendment analyses where search and seizure of expressive material is involved. Id. at 1010. 193. Keith, 407 U.S. at 314 (referring to Senator Harts address in the floor debate on 2511(3)). 194. Norman A. Bailey, National Interest Versus National Security? The Case of Iraq, INST. FOR GLOBAL ECON. GROWTH, http://www.igeg.org/BaileyNationalInterestSecur.html (last visited Mar. 30, 2013) (discussing the use of national security or national interest for justifying military actionthe same terminology is used to justify domestic government action at the border); see also David H. Topol, United States v. Morison: A Threat to the First Amendment Right to Publish National Security Information, 43 S.C. L. REV. 581, 59597 (1992). 195. United States v. Flores-Montano, 541 U.S. 149, 154 (2004) (citing Carroll v. United States, 267 U.S. 132, 154 (1925)). 196. Topol, supra note 194, at 595-96. 197. Id. at 597. 198. See id. at 595. 199. United States v. United States Dist. Court (Keith), 407 U.S. 297, 314 (1972). 200. Id. at 317 (alteration in original).
191. 192.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

248

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

has continuously reaffirmed that a warrant issued by a neutral and detached magistrate is required absent one of few exceptionsexceptions that have been carved out for the safety of law enforcement officers and the general public as well as for the preservation of evidence.201 The border exception is of a different kindit essentially gives the Executive Branch unfettered authority to do as it pleases to protect . . . its territorial integrity.202 While it is true that an electronic device may store data potentially devastating to the well-being of the general public, it is not reasonable to believe that any search beyond a cursory review of electronic devicesfor assurance that the devices are not being used to traffic contraband or detonate a bombis justified absent particularized suspicion. Airlines are required to maintain flight manifests that include the names of every passenger on board.203 Through Secure Flight, a program mandated by the U.S. Government, the names on the flight manifests get compared with the Terrorist Screening Database to ensure terrorists are not aboard flights entering or departing the United States.204 The Court has recognized that [d]ifferent standards may be compatible with the Fourth Amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the protected rights of our citizens.205 When it comes to combating child pornography, thus far the most common crime discovered on laptops at the border, ICE and DHS have programs and mandates in place.206 Operation Peer Pursuit and its predecessor Operation Predator have resulted in several arrests of predatory criminals since 2003.207 These initiatives serve to combat child pornography illegally distributed through peer-to-peer file trafficking computer networks.208 Thus, subjecting international travelers to non-routine searches of their electronic devices absent reasonable suspicion at the border is an unnecessary intrusion upon travelers privacy. Even the Ninth Circuit recognizes that legitimate concerns about child pornography do not justify unfettered
See id. at 318. House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816, at *5 (D. Mass. Mar. 28, 2012). 203. See 49 U.S.C. 44909 (2004). 204. Terrorist Screening Center, Frequently Asked Questions, FBI, http://www.fbi.gov/about-us/nsb/tsc/tsc_faqs (last visited Aug. 15, 2013); see also Barry Steinhardt, An Assessment of the EU-US Travel Surveillance Agreement, PRIVACY INTL (Jan. 3, 2012), https://www.privacyinternational.org/reports/an-assessment-of-the-eu-ustravel-surveillance-agreement/report. 205. Keith, 407 U.S. at 323. 206. Press Release, U.S. Dept of Justice, Law Enforcement Initiative Targets Child Pornography Over Peer-To-Peer Networks (May 14, 2004) (on file with author). 207. Id. 208. Id.
201. 202.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

249

crime-fighting searches via unregulated searches of citizens personal paperselectronic or not.209 Notwithstanding the recognition of the sovereigns interest in protecting its borders, the Supreme Court has recognized limited exceptions to the exception.210 Specifically, the Court has indicated that some level of suspicion may be required in the case of highly intrusive searches, such as cavity or strip searches and for those resulting in destruction of property.211 Counsel for the government in Abidor acknowledged the danger that [ICE or CBP agents] could inadvertently . . . change the file or delete it by looking at it . . . .212 Further, agents make image copies of the data found on seized electronic devices, which increases the risk of dissemination of information not intended for public disclosure.213 This is especially troublesome in the case of traveling attorneys or doctors who may have client or patient information stored on their devices. One may ask: exactly who are the CBP agents searching through travelers electronic devices? An entry level CBP position requires either three years of full-time general work experience or four years of study in any field leading to a bachelors degree.214 There is no requirement that an entrylevel applicant placed at ports of entry have a technological, law enforcement, or legal background for searching travelers electronic devices.215 3. An Overview of Protections Against Unbridled Electronic Surveillance To look at laptops as communication devices subject to wiretapping would provide more safeguards to Americans liberties than applying the usual Fourth Amendment analysis, even in the post 9/11-world. For instance, Title III of the Omnibus Crime Control and Safe Streets Act reUnited States v. Cotterman, 709 F.3d 952, 966 (9th Cir. 2013). House v. Napolitano, No. 11-10852-DJC, 2012 WL 1038816, at *5 (D. Mass. Mar. 28, 2012). 211. Id. 212. Transcript of Record at 34, Abidor v. Napolitano, No. CV 10-4059 (E.D.N.Y. Sept. 7, 2010), 2010 WL 3477769. 213. Id. 214. CBP Officer Frequently Asked Questions (FAQ) Qualifications and Other Requirements, http://www.cbp.gov/linkhandler/cgov/careers/customs_careers/officer/cbpo_qual_req.ctt/cb po_qual_req.pdf. 215. See CBP Officer Frequently Asked Questions (FAQ) Duty Locations Where CBP Officers Are Hired, http://www.cbp.gov/linkhandler/cgov/careers/customs_careers/officer/cbpo_duty_loc.ctt/cb po_duty_loc.pdf (indicating that although not all ports of entry employ entry-level officers, undisclosed ports of entry do).
209. 210.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

250

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

quires the government to obtain a warrant before accessing stored communications (e.g., email).216 The Foreign Intelligence Surveillance Act requires the President to obtain a court order from the Foreign Intelligence Surveillance Court or in certain circumstances authorization from the Attorney General prior to using electronic surveillance for gathering foreign intelligence.217 Electronic surveillance is the acquisition of wire and radio communications sent by or intended for receipt by a U.S. citizen within the U.S.218 When it comes to obtaining intelligence on foreign powersa bona fide protection of the national interestthere are, albeit few, limitations placed on the Executive Branch.219 However, in the case of an individual U.S. citizen traveling abroad, customs inspectors can arbitrarily pick and choose whose electronic devices to search and how far to go within that search.220 In light of the Ninth Circuits recent ruling in Cotterman, there must be reasonable suspicion to conduct a forensic search.221 That is not enough, as private and confidential information is accessible without conducting a forensic search for evidence of data that is encrypted or once existed on the device. The Stored Communications Act (SCA) is another piece of legislation that provides greater privacy protection than the Fourth Amendment at the border. Before law enforcement may intercept a wire, oral, or electronic communication under the SCA, the investigating officer must obtain a warrant supported by probable cause.222 Like most rules, the SCA provides exceptions to the warrant requirement. For instance, if there is a reasonable determination of exigent circumstances involv[ing] (i) immediate danger of death or serious physical injury to any person; (ii) conspiratorial activities threatening the national security interest; or (iii) conspiratorial activities characteristic of organized crime.223 Further, for the exception to apply, there must be grounds upon which an order can be entered under the SCA.224 While the exception would still provide an opportunity to access communications absent a warrant, the narrowness of 2518(7) of the SCA, including national security interests related solely to conspiracy, still provides more comfort in privacy protection than the ICE and CBP directives.

216. STEPHEN DYCUS ET AL., supra note 22, at 493; Omnibus Crime Control and Safe Streets Act, 18 U.S.C. 2518(1) (1998). 217. Foreign Intelligence and Surveillance Act, 50 U.S.C. 1802(a)(1) (2010). 218. Id. 1801(f)(1). 219. See generally id. 1802(a)(1). 220. See supra Part II.C. 221. United States v. Cotterman, 709 F.3d 952, 978 (9th Cir. 2013). 222. Stored Communications Act, 18 U.S.C. 2518(1)-(3) (1998). 223. Id. 2518(7)(a)(i)-(iii). 224. Id. 2518(7).

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE

251

Aside from Title III, the FISA, and the SCA, there are other congressional acts in place to protect privacy interests when it comes to wiretapping. One example is the Electronic Communications Privacy Act (ECPA), which permits the government to collect metadata relating to whom an individual called, emailed, or instant messaged.225 Unlike the ICE and CBP directives, the ECPA imposes a restriction on executive accessa judge must certify a procedural request before telecommunications providers can disclose the information.226 The Wiretap Act also imposes restrictions on government access by requiring probable cause and a warrant before law enforcement can intercept communications.227 Neither ICE nor CBP agents are governed by such restrictions when it comes to searching digital data at the border.228 But just like the rationale behind these legislative acts, border agents act in the interest of national security. There is, of course, one small problem with the preceding actsthey are limited to the protection of communications.229 Electronic devices, by their nature, contain much more data than communications. In addition, communication carries specific definitions in the acts that render them inapplicable to the border cases, absent an amendment to include data that is not communication.230 4. Some Protection is Better than None Civil rights groups argue that the government oversteps its boundaries by being able to review digital communications via electronic surveillance.231 At least, under these Acts there is at minimum one hurdle that

Id. 2516(1). Matt Sledge, Warrantless Electronic Surveillance Surges Under Obama Justice Department, HUFFINGTON POST (Sept. 28, 2012), http://www.huffingtonpost.com/2012/09/28/warrantless-electronic-surveillanceobama_n_1924508.html. 227. Monu Bedi, Facebook and Interpersonal Privacy: Why the Third Party Doctrine Should Not Apply, 54 B.C. L. REV. 1, 32 (2013). 228. See, e.g., Stellin, supra note 128. 229. 18 U.S.C. 2510(1) (2002) (Wire communication means any aural transfer made . . . by the aid of wire, cable, or other like connection.); 50 U.S.C. 1801(l) (2010) (Wire communication means any communication while it is being carried by a wire, cable, or other like connection.). 230. 18 U.S.C. 2510(1) (2002) (Wire communication means any aural transfer made . . . by the aid of wire, cable, or other like connection.); 50 U.S.C. 1801(l) (2010) (Wire communication means any communication while it is being carried by a wire, cable, or other like connection.). 231. See generally International Principles on the Application of Human Rights to Communications Surveillance, NECESSARY & PROPORTIONATE (July 10, 2013), https://necessaryandproportionate.org/text.

225. 226.

SMITH FINAL (DO NOT DELETE)

3/11/2014 5:09 PM

252

CRIMINAL AND CIVIL CONFINEMENT

[Vol. 40:223

must be overcomea warrant or a court order.232 When it comes to DHS and the international border, there are no obstacles imposed by Fourth Amendment standards outside of the border context. This section is not intended to propose that any of the foregoing Acts apply to laptop searches at the border. Rather, its intent is to point out that in other areas of protecting the national interest by methods which use electronic devices, legislation exists to provide at least some protection of citizens and non-citizens privacy in accordance with the Fourth Amendment.233 At least some of that legislation transpired as a result of a Supreme Court ruling.234 C. Absent an Act of Congress, SCOTUS Should Create a New Rule Limiting the Executives Carte Blanche at the Border Since the introduction of the various initiatives beginning in the 110th Congress, Congress has failed to act on limiting DHSs authority.235 The 112th Congress has been reported as the least productive Congress since 1948 and the rottenest Congress in History.236 Predictions for the 113th Congress are lackluster as dj vu is the predicted theme with the new Congress expected to look like the old one.237 If predictions prove true, the Judiciary likely will be left with an opportunity for change. Eventually the question will have to be answered rather than relying on doctrines such as standing and Executive prerogative to skirt the issue. When the time comes, the Supreme Court should seize the moment and bring the border exception doctrine in sync with todays technological society. No matter which way the Court rules, it could be the nudge Congress needs to actually move forward with proposed legislation designed to impose limits on searches at the border and prevent a further erosion of privacy.
Sledge, supra note 226. See Privacy Laws and Regulations, U.S. GEN. SERVS. ADMIN., http://www.gsa.gov/portal/content/104250 (last updated May 20, 2013). Whether such legislation actually works is an entirely different discussion. 234. Foreign Intelligence Surveillance Court, FED. JUD. CTR., http://www.fjc.gov/history/home.nsf/page/courts_special_fisc.html (last visited Mar. 31, 2013) (describing the enactment of FISA and creation of the FISC as result of 1972 Supreme Court decision). 235. William Peacock, DHS Still Okay With Warrantless, Suspicionless Searches at Border, FINDLAW (Feb. 13, 2013, 9:12 AM), http://blogs.findlaw.com/technologist/2013/02/dhs-still-okay-with-warrantlesssuspicionless-searches-at-border.html. 236. Ezra Klein, Good Riddance to Rottenest Congress in History, BLOOMBERG (Jan. 2, 2013), http://www.bloomberg.com/news/print/2013-01-02/good-riddance-to-rottenestcongress-in-history.html. 237. Sarah Binder, Prospects for the 113th Congress, HUFFINGTON POST (Jan. 21, 2013), http://www.huffingtonpost.com/sarah-binder/113thcongress_b_2426574.html?view=print&comm_ref=false.
232. 233.

(10) SMITH (1).DOCX (DO NOT DELETE)

3/11/2014 5:09 PM

2014]

ABIDOR AND HOUSE VI. CONCLUSION

253

Throughout history, policy changes have been implemented as if in accordance with a swinging pendulum. In the first half of the twentieth century, the World Wars and Communism led to the creation of policies seeking to limit citizens liberties. Once the threat of Communism dissipated, liberty restrictions began to loosen, swinging the pendulum back to the side of liberty preservation. Todays post 9/11-world has returned the pendulum back to liberty restrictions. DHS has used national security as an excuse to broaden its power and now has the authority to delve into the deepest realms of citizens privacy for any reason or no reason at all. That is not how the Founding Fathers intended this country to operate, as evidenced by our tripartite government.238 The system created was one of checks and balances to ensure citizens did not become subject to a tyrannical government, like that of the Crown, only to have their liberties stripped away from them. Members of Congress have unsuccessfully attempted to place restrictions on the Executive Branch with respect to electronic device searches conducted at the border. Now is the time for balance to be restored to justice. This Note is not intended to suggest that DHS has no right at all to search electronic devices at the border. Rather, its intent is to suggest that changes in societal norms, especially those brought about by technological advances, call for a rebalancing of the Fourth Amendment analysis. At a minimum, DHS should be required to have some level of suspicion before it can go beyond a cursory review of a travelers electronic device. In other words, DHS agents should be required to articulate objective facts indicating that an international travelers electronic devices are reasonably believed to be the means of executing criminal conduct before they may seize their devices or should require travelers to do more than simply turn the device on to demonstrate functionality. Laptops truly are different from luggage. Justice Douglas warned of powerful hydraulic pressures that give the police the upper hand.239 The broad authority granted to DHS, when it comes to searching electronic devices at the border, illustrates his concern loud and clear. History shows that sometimes it takes an act of the Court before there is an act of Congress.

238. 239.

See BENJAMIN FRANKLIN & WILLIAM TEMPLE FRANKLIN, MEMOIRS Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).

OF THE

LIFE

AND WRITINGS OF BENJAMIN FRANKLIN 270 (1818).

Vous aimerez peut-être aussi