Skip to main content
Skip to content
Case File
dc-749697Court Unsealed

Cotterman Cert Petition

Date
August 8, 2013
Source
Court Unsealed
Reference
dc-749697
Pages
159
Persons
0
Integrity
No Hash Available

Summary

No. 13-186 In the Supreme Court of the United States HOWARD W. COTTERMAN, Petitioner, v. UNITED STATES OF AMERICA, Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the Ninth Circuit PETITION FOR WRIT OF CERTIORARI

Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
NO. In the Supreme Court of the United States HOWARD W. COTTERMAN, v. Petitioner, UNITED STATES OF AMERICA, Respondent. On Petition for Writ of Certiorari to the United States Court of Appeals for the Ninth Circuit PETITION FOR WRIT OF CERTIORARI WILLIAM J. KIRCHNER Counsel of Record Nash & Kirchner, P.C. P.O. Box 2310 Tucson, AZ 85702 (520) 792-1613 bkirchner@azbar.org Counsel for Petitioner Becker Gallagher ? Cincinnati, OH ? Washington, D.C. ? 800.890.5001 i QUESTION PRESENTED This is a landmark case about the sound functioning of appellate procedure, and about the authority of border officials to seize personal property. Here, border officials detained Petitioner Howard Cotterman and his wife over eight hours based on Howard being on a "lookout" list. Agents thoroughly searched the returning vacationers' belongings, interrogated them separately, and did further background checks, all of which dispelled any suspicions, including those that caused Howard to be on the list. Nevertheless, agents took the Cottermans' personal electronics and other belongings almost 200 miles away for analysis. In subsequent testimony no agent claimed to have had reasonable suspicion of wrongdoing at the time of the seizure, instead justifying it on the premise that they did not need any suspicion. The Ninth Circuit has now agreed with that premise, and then has gone further, finding reasonable suspicion was present, even though the prosecution abandoned that issue on appeal. Thus, this case presents the following question: Did the Ninth Circuit violate the Constitution, create circuit splits, contravene this Court's decisions, and subvert the appellate process by replacing the question presented by the parties with an issue that the prosecution deliberately abandoned, and by making a factual finding (i.e. that reasonable suspicion existed) for the first time on appeal that disregarded the factual findings of the district court and agents at the scene, and then by holding that a citizen's personal belongings may be seized at the border with no suspicion of wrongdoing? ii TABLE OF CONTENTS PAGE QUESTION PRESENTED . . . . . . . . . . . . . . . . . . . . i TABLE OF AUTHORITIES . . . . . . . . . . . . . . . . . . vi OPINION BELOW . . . . . . . . . . . . . . . . . . . . . . . . . . 1 STATEMENT OF JURISDICTION . . . . . . . . . . . . . 1 CONSTITUTIONAL PROVISIONS AND RULES INVOLVED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 STATEMENT OF THE CASE . . . . . . . . . . . . . . . . . 2 I. MATERIAL FACTS . . . . . . . . . . . . . . . . . . . . 2 II. PROCEDURAL BACKGROUND . . . . . . . . . 5 REASONS FOR GRANTING THE PETITION . . . 10 THE NINTH CIRCUIT'S EXTRAORDINARY RULING CONTRADICTS THIS C OURT ' S PRECEDENT , CONFLICTS WITH DECISIONS OF OTHER CIRCUITS, AND HAS DEPARTED SO FAR FROM THE ACCEPTED AND USUAL COURSE OF JUDICIAL PROCEEDINGS THAT EXERCISING THIS COURT'S SUPERVISORY POWER IS WARRANTED. . . . . . . . . . . . . . . . . . . . . 10 iii I. THIS RULING ALLOWS BORDER OFFICIALS TO SEIZE THE BELONGINGS OF A MERICAN TRAVELERS FOR INDEFINITE PERIODS OF TIME, AND TAKE THEM UNLIMITED DISTANCES WITHOUT REASONABLE SUSPICION THAT ANY CRIME IS OCCURRING. . . . . . . . . . . . . . . . . . . . 11 A. This Is an Important Case That Has Been Wrongly Decided. . . . . . . . . . . . . . . . . . . 11 B. The Ninth Circuit's Opinion Conflicts With the Precedent of Other Circuits. . . 16 1. Reaching an abandoned issue . . . . . . 16 2. Evasive entry . . . . . . . . . . . . . . . . . . . 17 3. Customs clearance . . . . . . . . . . . . . . . 18 4. Reasonable suspicion instead of probable cause for forensic search . . 19 5. Analyzing a search far from the border as a true border crossing search . . . . 19 C. Misconstruing The Relevance of Customs Clearance Opens A Giant Loophole. . . . . . . . . . . . . . . . . . . . . . . 21 D. Summary . . . . . . . . . . . . . . . . . . . . . . 23 iv II. T H E N I N T H C I R C U I T ' S I M P R O P E R METHODOLOGY FOR FINDING REASONABLE SUSPICION THREATENS THE FREEDOM OF ALL A MERICANS AND U PSETS THE S OUND FUNCTIONING OF APPELLATE PROCEDURE, REQUIRING THE EXERCISE OF THIS COURT'S SUPERVISORY POWERS. . . . . . . . . . . . . . . . . . 23 A. The Ninth Circuit Deviated Markedly from Accepted and Usual Judicial Proceedings by Deciding this Case Based on an Abandoned Issue. . . . . . . . . . . . . . 25 B. The Ninth Circuit Violated This Court's Jurisprudence in Finding Reasonable Suspicion. . . . . . . . . . . . . . . . . . . . . . . . . 33 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 APPENDIX Appendix A: Opinion, in the United States Court of Appeals for the Ninth Circuit (March 8, 2013) . . . . . . . . . . App. 1 Appendix B: Order, in the United States District Court for the District of Arizona (February 24, 2009) . . . . . . App. 86 v Appendix C: Report and Recommendation, in the United States District Court for the District of Arizona (September 12, 2008) . . . . . App. 89 vi TABLE OF AUTHORITIES CASE CITATIONS: PAGE Alcaraz v. INS, 384 F.3d 1150 (9th Cir.2004) . . . . . . . . . . . . . . . 26 Ashwander v. TVA, 297 U.S. 288 (1936) . . . . . . . . . . . . . . . . . . . . . . 27 Brown v. Trustees, 891 F.2d 337 (1st Cir. 1989) . . . . . . . . . . . . . . . 17 Carducci v. Regan, 714 F.2d 171 (D.C.Cir.1983) . . . . . . . . . . . . . . . 28 City of Emeryville v. Robinson, 621 F.3d 1251 (9th Cir. 2010) . . . . . . . . . . . . . . 17 Clemens Trust v. Morgan Stanley, 485 F.3d 840 (6th Cir. 2007) . . . . . . . . . . . . . . . 17 Free Speech Coalition v. Attorney Gen., 677 F.3d 519 (3rd Cir. 2012) . . . . . . . . . . . . . . . 17 Gagnon v. Scarpelli, 411 U.S. 778 (1973) . . . . . . . . . . . . . . . . . . . . . . 33 Mayfield v. NASCAR, 674 F.3d 369 (4th Cir. 2012) . . . . . . . . . . . . . . . 17 Ornelas v. United States, 517 U.S. 690 (1996) . . . . . . . . . . . . . . . . . . . . . . 33 vii Payne v. Tennessee, 501 U.S. 808 (1991) . . . . . . . . . . . . . . . . . . . . . . 31 Powers v. Richards, 549 F.3d 505 (7th Cir. 2008) . . . . . . . . . . . . . . . 17 Raj v. LSU, 714 F.3d 322 (5th Cir. 2013) . . . . . . . . . . . . . . . 17 Soldal v. Cook County, 506 U.S. 56 (1992) . . . . . . . . . . . . . . . . . . . . . . . 14 Storey v. Cello Holdings, 347 F.3d 370 (2d Cir. 2003) . . . . . . . . . . . . . . . . 17 United States v. Aldaco, 477 F.3d 1008 (8th Cir. 2007) . . . . . . . . . . . . . . 17 United States v. Arvizu, 534 U.S. 266 (2002) . . . . . . . . . . . . . 24, 33, 34, 35 United States v. Bilir, 592 F.2d 735 (4th Cir. 1979) . . . . . . . . . . . . . . . 19 United States v. Caicedo-Guarnizo, 723 F.2d 1420 (9th Cir. 1984) . . . . . . . . . . . . . . 23 United States v. Cortez, 449 U.S. 411 (1981) . . . . . . . . . . . . . . . . . . . 33, 35 United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011) . . . . . . . . . . . 1, 6, 7 United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013) . . . . . . . . . . . . . . . . 1 viii United States v. Davis, 430 F.3d 345 (6th Cir. 2005) . . . . . . . . . . . . . . . 13 United States v. Espinoza-Seanez, 862 F.2d 526 (5th Cir. 1988) . . . . . . . . . . . . . . . 19 United States v. Garcia, 672 F.2d 1349 (11th Cir. 1982) . . . . . . . . . . . . . 20 United States v. Johns, 469 US 478 (1985) . . . . . . . . . . . . . . . . . . . . 15, 16 United States v. Johnson, 256 F.3d 895 (9th Cir.2001) . . . . . . . . . . . . . . . . 26 United States v. Levy, 416 F.3d 1273 (11th Cir. 2005) . . . . . . . . . . . . . 17 United States v. Mendoza-Ortiz, 262 F.3d 882 (9th Cir. 2001) . . . . . . . . . . . . . . . 30 United States v. Place, 462 U.S. 696 (1983) . . . . . . . . . . . . . . . . . . . 13, 15 United States v. Ramsey, 431 U.S. 606 (1977) . . . . . . . . . . . . . . . . . . . . . . 13 United States v. Resendiz-Ponce, 549 U.S. 102 (2007) . . . . . . . . . . . . . . . . . . . 27, 28 United States v. Roberts, 274 F.3d 1007 (5th Cir. 2001) . . . . . . . . . . . 16, 19 United States v. Romm, 455 F 3d 990 (9th Cir. 2006) . . . . . . . . . . . . . . . . 4 ix United States v. Ullah, 976 F.2d 509 (9th Cir.1992) . . . . . . . . . . . . . . . . 26 United States v. Wilson, 605 F.3d 985 (D.C. Cir. 2010) . . . . . . . . . . . . . . 17 United States v. Yang, 286 F.3d 940 (7th Cir. 2002) . . . . . . . . . . . . . . . 18 United States v. Yelloweagle, 643 F.3d 1275 (10th Cir. 2011) . . . . . . . . . . . . . 17 United States v. Zermeno, 66 F.3d 1058 (9th Cir. 1995) . . . . . . . . . . . . . . . . 5 RULE CITATIONS: PAGE Fed. R. App. P. 28(a)(9) . . . . . . . . . . . . . . . . . . . . . . 17 STATUTORY CITATIONS: PAGE 18 U.S.C. ? 3231 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 18 U.S.C. ? 3731 . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 28 U.S.C. ? 1291 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 28 U.S.C. ?1254(1) . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 CONSTITUTIONAL CITATIONS: PAGE U.S. Const. amend. IV . . . . . . . . . . . . . . . . . . . passim U.S. Const. amend. V . . . . . . . . . . . . . . . . . . . . . 2, 33 1 Appellee Howard Cotterman respectfully petitions for a writ of certiorari to review the judgment of the United States Court of Appeals for the Ninth Circuit in this case. OPINION BELOW A panel of the Court of Appeals for the Ninth Circuit issued a published opinion in this case reversing the District Court's decision. United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011). An en banc panel subsequently issued the ruling now sought to be reviewed in United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013). The en banc decision is reprinted in the Appendix to this Petition at Appendix (hereinafter "App.") 1-85. STATEMENT OF JURISDICTION Because this case concerns a direct appeal in a federal criminal case, as set forth above, Title 28 U.S.C. ?1254(1) confers jurisdiction on this Court to review the matter on writ of certiorari. The Ninth Circuit Court of Appeals had jurisdiction under 28 U.S.C. ? 1291 from the entry of final judgment by the district court. The United States District Court for the District of Arizona had subject matter jurisdiction of this case under 18 U.S.C. ? 3231 because Defendant Howard Cotterman was charged with federal crimes. This petition is timely because on July 20, 2013 Justice Kennedy extended the time for filing this petition to and including August 5, 2013. 2 CONSTITUTIONAL PROVISIONS AND RULES INVOLVED This case involves violations of the Fourth Amendment to the United States Constitution, which provides that "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . .", and the Fifth Amendment to the United States Constitution, which provides, in relevant part: "No person shall . . . be deprived of life, liberty, or property, without due process of law . . .." STATEMENT OF THE CASE I. MATERIAL FACTS On April 6, 2007 at 10 a.m., the Cottermans entered the United States at Lukeville, Arizona, the main port-of-entry for tourists returning from Puerto Penasco, Mexico. (SER 139.) At the primary inspection point a Treasury Enforcement Communication System ("TECS") notation advised officers to search Howard's belongings for any evidence of sexual contact with a minor. (SER 80.)1 TECS, a database tracking individuals entering and exiting the country, returned a "lookout" under Operation Angel Watch Angel Wings, reporting that Howard was registered in California because of a 1992 sexual misconduct conviction. (SER 78.) 1 "SER" refers to the larger of two volumes of Appellant's Excerpt of Record (mistakenly entitled "Appellee's Supplemental Excerpt of Record") filed in the Ninth Circuit 8/31/09. 3 For two hours, three officers removed the Cottermans' belongings from their vehicle, scrutinized them all, including their personal electronic devices, and copied personal documents. Testimony established that Howard and Maureen each owned a laptop and ordinary digital camera. Maureen also owned a camcorder. (SER 69, 71-72, 82, 100.) The officers found nothing noteworthy except one password-protected file on Howard's computer, which testimony showed to be commonplace among law-abiding computer users. What they did find were typical family vacation pictures of activities such as whale watching. (SER 65, 69, 91.) Nevertheless, the Cottermans were detained at the port of entry all day. Around noon the border officers reported their findings to the ICE duty agent. (SER 87, 98-99.) They were told to discontinue their search and await the arrival of ICE supervising agents. Testimony at the suppression hearing showed that, before arriving at the border, the supervisors had already decided to seize the Cottermans' possessions, no matter what else happened. So the agents could have released the Cottermans without their computers during the noon hour; they chose not to do so, but instead to have the Cottermans wait. They did not send their computer expert, Agent Owen, to the border, although he had been alerted and had a laptop computer for remote analysis that was capable of examining internet history, unallocated space, and performing at the 4 border the tests he eventually performed days later. (SER 126, 132-33.)2 Supervisory agents arrived at the border around 3 p.m. and spent three hours debriefing the inspectors, running additional background checks on Howard, and interrogating the Cottermans separately, none of which revealed anything suspicious. (SER 69, 82-83.) Howard offered to help the agents access the computer, but they declined. (SER 91-92.) When questioned whether there was any evidence of violations of law, the agent in charge summed up the results of the full day border events by testifying "not at the border, no." (SER 173.) Despite the lack of suspicion, the agents seized the laptops, cameras, documents, and other items around sunset, and took them to Tucson, almost two hundred miles away from the border, testifying later that the seizure was justified "as part of ICE policy." (SER 162, 158, 179.) Agt. Owen analyzed Maureen's computer the following day, then examined Howard's computer two days later. His search of Howard's computer revealed photographs sufficient to constitute probable cause in a matter of hours. Six days later, and without a warrant, Owen had obtained enough evidence to indict.3 2 Tests that are customary and practicable at the border are described in United States v. Romm, 455 F 3d 990 (9th Cir. 2006). 3 The Ninth Circuit's Opinion relies on statements not properly in the record regarding the nature of the photographs. (App. 8.) The only citation the prosecution provided for these supposed "facts" was from the Government's own pleading. That is not a proper 5 II. PROCEDURAL BACKGROUND The defense moved to suppress, and the magistrate judge, after holding an evidentiary hearing, found the seizure and subsequent search to have violated the Fourth Amendment as an Extended Border search, which must be supported by reasonable suspicion. He held that the totality of the circumstances established in the hearing did not support a finding that the agents had reasonable suspicion when they seized the Cottermans' belongings. (App. 99-105.) Regarding reasonableness of the seizure, he noted that "no suspicion at all existed as to Mrs. Cotterman's computer, but it was seized anyway, and a copy of that computer memory is still maintained by the Government." (App. 108.) He further found, based on agent testimony, that the seizure was preordained ab initio, irrespective of suspicion. "The government agents in this case, following ICE policy... had been repeatedly and incorrectly instructed no suspicion was necessary." (Id.) On de novo review, the District Court concurred with the Magistrate Judge on all points and ordered the evidence suppressed. "The search could have been done, (while not necessarily to the convenience of the agents) at the border . . .." (App. 87.) "The defendant and his wife waited more than 8 hours at the border to be finally told the computer was going to be taken to source. See e.g. United States v. Zermeno, 66 F.3d 1058, 1062 (9th Cir. 1995) (Government's assertions in its pleadings are not evidence). 6 Tucson even though he offered to help access the computer at the border." (Id.) The prosecution appealed the suppression ruling to the Ninth Circuit, but did not, in its opening brief, challenge the ruling that reasonable suspicion was absent. On the contrary, the prosecution's own framing of the Issue Presented presupposed that the border authorities did not have reasonable suspicion in this case. In its Answering Brief, the defense expressly cited the prosecution's abandonment of the issue, and stated that the defense would therefore not address the issue. In its Reply, the prosecution did not dispute this contention, and still did not argue the issue of reasonable suspicion. Later, when questioned in oral argument before the three-judge panel, the prosecutor specifically stated that the Government "did not rely upon" and was "not pursuing" the issue of reasonable suspicion. A divided three-judge panel agreed with the district court that the border agents did not have reasonable suspicion of wrongdoing in this case, but instead took the property because they believed no suspicion was needed. Circuit Judge Tallman noted the district court's factual findings and that, "whatever abstract suspicious character these facts conveyed, that character was entirely mitigated by the circumstances of this particular case." The panel concluded that the seizure being predetermined "renders any fact other than Cotterman's TECS hit practically irrelevant." Cotterman, 637 F.3d at 1074 n.7. However, two judges on that initial panel held that border officials may 7 lawfully take a traveler's personal belongings far away from the border for days at a time without reasonable suspicion, even though the search they wanted to conduct could have been performed at the border. Thus, the three-judge panel decision effectively created a new doctrine allowing authorities to seize and remove any property that has not yet been officially cleared by Customs. In her dissent, Circuit Judge B. Fletcher asserted: "The 'sticking point' of this case...is whether the Government has authority to seize an individual's property...with no reason to suspect that the property contains contraband." Cotterman 637 F.3d at 1084. The defense sought en banc review. The Constitution Project, Electronic Frontier Foundation, and NACDL filed amicus curiae briefs. The petition and the amici focused on the majority's misreading of border search doctrines leading to unnecessary expansion of the Border Search Exception. The Constitution Project noted that the majority "gets things backwards" by misinterpreting the doctrines and ignoring "the balance struck by the extended border search exception." Constitution Project Amicus Brief at 14-18. The Ninth Circuit granted en banc review. During oral argument the court questioned the prosecution as to whether reasonable suspicion existed for a seizure, and the prosecution once again stated that the Government "did not rely" upon the issue of reasonable suspicion on appeal. However, shortly after oral argument, the en banc Court ordered the parties to submit supplemental briefing on whether the Court could address the issue of reasonable suspicion at that point in the case. It also ordered the parties to brief 8 the question of whether the record supported the district court's finding that there was no reasonable suspicion. Counsel were limited to 5000 words to address these two issues. The prosecution urged the Ninth Circuit to address the issue as it had initially presented it, and not decide the case based on reasonable suspicion. However, complying with the Ninth Circuit's order, it also argued that it was within the Court's power to address reasonable suspicion because so doing would not prejudice the defense. It also repeated its arguments briefed to the District Court that reasonable suspicion was present, ignoring much of the record that dealt with the investigation by the ICE agents at the border. The defense asserted that FRAP 28(a)(9) requires an appellant to raise its issues in its opening brief. The defense emphasized the "universally-accepted proposition that an appellant's failure to raise or adequately argue an issue in its opening brief constitutes abandonment of the issue." The defense further argued that a court may not and should not, at such a late point in the judicial process, replace the controversy properly before it with a non-issue that had been deliberately abandoned by a highly sophisticated litigant such as the United States Government. The defense also contended that the rulings of three courts below were correct that totality of the circumstances here did not support a finding of reasonable suspicion. 9 Almost nine months later4 the en banc court issued a fractionated opinion. The majority held that suspicion of wrongdoing is not required for border officials to take a traveler's personal property far from the border, so long as the search began at the border, and the property never cleared Customs. (App. 15-16.) However, the majority also held that border officials must have reasonable suspicion before conducting a comprehensive "forensic" search of computer equipment. It then went on to address the abandoned issue of reasonable suspicion, holding that the court could address the issue because it needed to resolve the suspicion standard, and the majority claimed the supplemental briefing prevented prejudice to the defense. Then, after three judicial reviews had rejected that claim, the majority held reasonable suspicion to be present at the border, contrary to every argument raised by any party in briefs or oral arguments prior to the Ninth Circuit's order for supplemental briefing. Two vigorous dissents took issue with various parts of these holdings, one implying, and one explicitly recommending, that this Court should grant certiorari in this matter. (App. 55, 56.) 4 One judge on the case, the Honorable Betty Fletcher, passed away during this time period. 10 REASONS FOR GRANTING THE PETITION THE NINTH CIRCUIT'S EXTRAORDINARY RULING CONTRADICTS THIS COURT'S PRECEDENT, CONFLICTS WITH DECISIONS OF OTHER CIRCUITS, AND HAS DEPARTED SO FAR FROM THE ACCEPTED AND USUAL COURSE OF JUDICIAL PROCEEDINGS THAT EXERCISING THIS COURT'S SUPERVISORY POWER IS WARRANTED. The Ninth Circuit, en banc, itself observed that this is a "watershed case." (App. 4.) Indeed, it is. It allows border officials to arbitrarily deprive travelers of the basic right to return home with their personal belongings when there is not even articulable suspicion of crime afoot. In so doing, it conflates seizure with search, and privacy with possessory interests, and generally muddles the Border Search Exception, at points contradicting decades of border search doctrine. Compounding those problems, the Ninth Circuit has resurrected, without reason, a question that one party (the prosecution) deliberately and purposefully abandoned on appeal: whether there was reasonable suspicion of wrongdoing at the time the border officials seized the property. In finding reasonable suspicion, the Ninth Circuit panel has violated long-standing Fourth Amendment jurisprudence by failing to view the totality of the circumstances, and has failed to treat the parties impartially by deciding the case based on the abandoned issue. As the dissent noted, the ruling dispenses with well-settled, sensible, and binding principles, "lifts our anchor, and charts a course for muddy waters." (Dissent, App. 55.) The Ninth Circuit's ruling in this case has departed so far from 11 the accepted and usual course of judicial proceedings that this Court's supervisory power is urgently required. I. THIS RULING ALLOWS BORDER OFFICIALS TO SEIZE THE BELONGINGS OF AMERICAN TRAVELERS FOR INDEFINITE PERIODS OF TIME, AND TAKE THEM UNLIMITED DISTANCES WITHOUT REASONABLE SUSPICION THAT ANY CRIME IS OCCURRING. A. This Is an Important Case That Has Been Wrongly Decided. As noted above, the Ninth Circuit called this a "watershed case." The prosecution's appeal was premised on the claim that authorities may arbitrarily terminate a border search of personal property belonging to returning vacationers, seize their belongings, and move them far away from the border to be searched for an indefinite period, all without a reasonable suspicion that there is any unlawful activity going on, even though an adequate search is practicable the same day at the border. This en banc panel has now held that such arbitrary seizure is fully permissible, based solely on the fact that Customs has withheld clearance of the items. It has held that reasonable suspicion of wrongdoing must be found before the authorities may conduct a forensic search of travelers' personal electronics. These rulings will affect the day-to-day operations of Customs and Border Patrol officials nationwide, as well as the convenience and safety of hundreds, perhaps thousands, of travelers each year. 12 It is not disputed that travelers expect that, when returning to the United States, their possessions may be searched at the border, even though there is no reason to suspect they have done anything wrong. A much smaller number realize that, under a series of cases decided between 2001 and 2008, such a search may include powering up their electronic equipment and letting agents look through the files on it. Petitioner, for purpose of this case, does not take issue with those propositions. However, this case plunges far past border searches, deep into the realm of what no American would expect that our government could lawfully do. It holds that, even if the border officials find nothing amiss after searching a traveler's luggage for hours on end, they may nevertheless seize any item or items they wish, take them anywhere, and hold them for days, even weeks or months, all without any reasonable suspicion that any criminality is occurring. The Ninth Circuit held this despite the fact that the majority itself recognized that international travelers do not expect that they could be treated this way. (App. 27.) It is important to note here that, although the defense moved in this case to suppress the fruits of a search, suppression is required because the search resulted from an unreasonable seizure. Thus, the true issue here is the reasonableness of the seizure, not just the search, which was the basis of the parties' controversy in the Issue Presented to the Ninth Circuit by the prosecution. Of course, as acknowledged throughout this case, there is technically always a Fourth Amendment 13 "seizure" the moment border officials stop travelers and, in some instances, detain them while conducting an inspection. It is well-settled that such detentions are per se reasonable when they occur at the border. E.g. United States v. Ramsey, 431 U.S. 606, 616 (1977). However, just as with Terry stops, there comes a point when the passage of time or other circumstances may transform a seizure that was reasonable at its inception into an unreasonable intrusion. See, e.g., United States v. Place, 462 U.S. 696, 709 (1983) (holding that the 90-minute detention of luggage at an airport to await the arrival of a drug-detecting dog was unreasonable); see also United States v. Davis, 430 F.3d 345, 354 (6th Cir. 2005) ("while a Terry stop may be constitutionally permissible initially, it may become an impermissible 'seizure if it occurs over an unreasonable period of time or under unreasonable circumstances.'" That is what happened here. The initially-reasonable detention of the Cottermans and their household belongings as they crossed the border ripened into an unreasonable seizure when, after eight hours of detention, including hours of searching of their belongings and questioning by border inspectors and eventually ICE investigators, with nothing suspicious being found, the agents nevertheless took away their personal property. It bears repeating that when the agent in charge was questioned whether there was any evidence of wrongdoing, he testified "not at the border, no." At that point the agents nonetheless took the Cottermans' belongings far from the border for an extended period of time, essentially expanding the 14 initial seizure into a second, more prolonged seizure. That unreasonably prolonged second part of the seizure is the issue that was argued throughout the case below, from the magistrate judge, to the district court, to the court of appeals, through the en banc proceedings. Yet, in reading the Ninth Circuit's en banc opinion there is no real analysis of the difference between the search and the seizure in this case. Instead, the court conflated the two concepts into one category: privacy. "Because Cotterman never regained possession of his laptop, the fact that the forensic examination occurred away from the border, in Tucson, did not heighten the interference with his privacy." (App. 15.) (See also App. 3-6, 12, 14-15, 16-17, 19, 21-23, 27.) Privacy, however, was never the main focus here - possession has always been the primary issue. The issues of search and seizure are not identical. A seizure may violate the Fourth Amendment even if the owner's privacy was not invaded. Soldal v. Cook County, 506 U.S. 56, 69 (1992). It is self-evident that travelers wish to retain possession of the property they carry with them, which is why they go to the trouble of carrying it. Very often, they depend upon their belongings personally and professionally, both on the road and at repose during their travels. Sometimes, deprivation of a given item may be a trivial inconvenience; other times it may be more onerous - even life threatening. For example, seizure of a cell phone could prevent a traveler from securing accommodations, or travel connections, or even placing a 911 call. Similarly, laptop computers are important for both leisure and business travel. 15 Indeed, business trips commonly require the use of laptops, and the entire purpose of such trips would often be thwarted by their seizure. It is simply unreasonable to arbitrarily seize personal belongings for indefinite periods. Yet the Ninth Circuit has held that no suspicion of wrongdoing at all is needed for agents to seize and detain travelers' most personal belongings for indefinite periods of time. (App. 14-15.) This Court has declared that a seizure of personal property is "per se unreasonable within the meaning of the Fourth Amendment unless it is accomplished pursuant to a judicial warrant issued upon probable cause and particularly describing the items to be seized." United States v. Place, 462 U.S. 696, 701 (1983). [Where] authorities have probable cause...the Court has interpreted the Amendment to permit seizure of the property pending issuance of a warrant to examine its contents, if the exigencies of the circumstances demand it or some other recognized exception to the warrant requirement is present. (Id.). In border cases, of course, that exception is the border search exception. Thus, while property may be detained for a suspicionless search upon crossing the border, outright seizure and removal demands more: probable cause followed by a warrant. Thus, the defense contends that probable cause is needed for seizure. See also United States v. Johns, 469 US 478, 16 485-88 (1985); United States v. Roberts, 274 F.3d 1007, 1017 (5th Cir. 2001). The en banc court's ruling encourages border officials to act unreasonably, seizing travelers' belongings arbitrarily. Permitting arbitrary seizure assures arbitrary abuse. This Court should grant certiorari to resolve this question of national importance as a part of addressing the question of an appellate court reviving an abandoned issue. B. The Ninth Circuit's Opinion Conflicts With the Precedent of Other Circuits. 1. Reaching an abandoned issue The fact that the Ninth Circuit resolved this case based on an issue that was abandoned by the appellant is discussed separately in Part II of this petition. It also deserves attention here, however, because it conflicts with the case law of other circuits. When an appellant fails to challenge in its opening brief a ruling made by the district court, all federal appellate courts consider the issue abandoned and will not address it 17 under Fed. R. App. P. 28(a)(9).5 This is the normal and accepted course of proceedings. Yet here, the Ninth Circuit has chosen to resurrect an issue that the Government abandoned, and thereby waived, not just once by failing to argue it in its opening brief, but again and again, in its reply brief, in oral argument, in its pleading at the en-banc petition stage, in oral argument before the en banc court, and finally in its supplemental brief, in which it still asked the Ninth Circuit not to address the issue so that the prosecution could get a clear ruling on the issue it first presented. Basing the outcome of a case on an issue that was deliberately abandoned and repeatedly disowned by a knowledgeable litigant for a strategic purpose, and doing so without explanation of why such an extraordinary action is needed, conflicts with the case law of all of the circuits. 2. Evasive entry A second conflict concerns the question of whether the Extended Border search doctrine applies only when 5 See, e.g., Brown v. Trustees, 891 F.2d 337, 352 (1st Cir. 1989); Storey v. Cello Holdings, 347 F.3d 370, 380 n. 6 (2d Cir. 2003); Free Speech Coalition v. Attorney Gen., 677 F.3d 519, 545 (3rd Cir. 2012); Mayfield v. NASCAR, 674 F.3d 369,376-77 (4th Cir. 2012); Raj v. LSU, 714 F.3d 322, 327 (5th Cir. 2013); Clemens Trust v. Morgan Stanley, 485 F.3d 840, 852-53 (6th Cir. 2007); Powers v. Richards, 549 F.3d 505, 512-13 (7th Cir. 2008); United States v. Aldaco, 477 F.3d 1008, 1016, n.3 (8th Cir. 2007); City of Emeryville v. Robinson, 621 F.3d 1251, 1262, n.10 (9th Cir. 2010); United States v. Yelloweagle, 643 F.3d 1275, 1280-84 (10th Cir. 2011); United States v. Levy, 416 F.3d 1273, 1278 (11th Cir. 2005); United States v. Wilson, 605 F.3d 985, 1025 (D.C. Cir. 2010). 18 the persons involved entered the country surreptitiously. The magistrate judge and district court both held that the search in this case was an Extended Border search, requiring reasonable suspicion because it took place so far from the border. (App. 87, 97-99.) In disagreeing with that analysis, the Ninth Circuit discussed the Extended Border doctrine at some length, and in so doing stated that an Extended Border search is "any search away from the border where entry is not apparent, but where the dual requirements of reasonable certainty of a recent border crossing and reasonable suspicion of criminal activity are satisfied." (App.13, emphasis added.) In fact, however, none of the other circuits that have enumerated the hallmarks of an Extended Border search have included a requirement that the entry of the vehicle be evasive or "not apparent." (See, e.g. United States v. Yang, 286 F.3d 940, 945 (7th Cir. 2002) (citing cases) "courts consider whether: (1) there is a reasonable certainty that a border crossing has occurred; (2) there is a reasonable certainty that no change in condition of the luggage has occurred since the border crossing; and (3) there is a reasonable suspicion that criminal activity has occurred.") In short, the Ninth Circuit has redefined the Extended Border doctrine in a way that conflicts with other circuits. 3. Customs clearance A third way in which the decision conflicts with existing jurisprudence is by stating that "the extended border search doctrine does not fit the search here" in part because "Cotterman's computer never cleared customs." (App. 15.) Contrary to the Ninth Circuit's 19 decision, however, the extended border doctrine does not conflict with the fact that the property never formally cleared Customs. That circumstance exists in many cases that are nevertheless analyzed under the Extended Border doctrine. See, e.g., United States v. Bilir, 592 F.2d 735 (4th Cir. 1979); United States v. Espinoza-Seanez, 862 F.2d 526 (5th Cir. 1988). As Judge Smith put it: "The majority asserts that this case cannot be analyzed as an extended border search because Cotterman's computer was never 'cleared' at the border prior to search. The majority is mistaken." (Dissent, App 74, citation omitted.) 4. Reasonable suspicion instead of probable cause for forensic search A fourth way in which this case conflicts with another circuit is in the requirement of reasonable suspicion for border authorities to conduct a "forensic search" of computer equipment at the border. (App. 27.) This is at odds with at least one other circuit, which has upheld a similar search for probable cause, rather than reasonable suspicion. See Roberts, 274 F.3d at 1017 (forensic search of computer taken away from the border was "justified on probable cause grounds.") 5. Analyzing a search far from the border as a true border crossing search A fifth way this case conflicts with the jurisprudence of other circuits is by inventing a new doctrine for circumstances already covered by existing jurisprudence. Over decades this Court and all of the circuits have developed a coherent framework of 20 analysis of border-related searches. Searches at a border crossing are permissible even if they are essentially random - they do not require any suspicion at all. The same is true for those places that serve as the functional equivalent of the border - airports, coastal waters, and shipping hubs for items consigned to common carriers. In those cases a search is not practicable or necessary where the item actually crosses the border (such as an airplane in mid-air), and therefore may be conducted at the first practicable point at which the item first comes to rest within the United States, or at the final destination for common-carrier shipments. Just as with a border crossing search, no suspicion of any kind is needed for those searches, because they are essentially border searches. Finally, there are Extended Border searches - those that take place after the first practicable point at which the conveyance could have been stopped and searched. These require reasonable suspicion. These three doctrines (border crossing, functional equivalent and extended) have heretofore comprised the universe of the border search exception. See United States v. Garcia, 672 F.2d 1349, 1366 (11th Cir. 1982) (analyzing and classifying the doctrines). The instant case fits clearly within the third category because it occurred after the first practicable point for a search. There has been no case cited at any time in this litigation, and there is no case known to counsel undersigned, where such a search was analyzed as a true border crossing search. Yet, the Ninth Circuit has refused to apply the Extended Border doctrine here. Instead, it has created a new doctrine - that the whole country is a "border crossing" so long as the search started at one. Moreover, it has done so needlessly, as 21 the Extended Border search doctrine fits this case neatly. In sum, the majority's analysis here conflicts with the jurisprudence of the other circuits as discussed above. The plethora of conflicts between this case and the holdings of other circuits is further reason to grant certiorari review. C. Misconstruing The Relevance of Customs Clearance Opens A Giant Loophole. The en banc court has held that the Tucson search was simply an extension of the border crossing search itself, and therefore lawful, simply because the property had not cleared Customs. (App. 16.) It is, however, circular reasoning to hold that agents may seize a person's property and move it far away for days on end simply because they themselves have not yet deigned to clear the property through Customs. The mere fact that agents unreasonably withhold clearance of a traveler's luggage for many hours in no way makes it ipso facto reasonable to then withhold clearance even longer to send the items far away for testing that could have been done at the border. The Ninth Circuit has essentially held that agents need no reason at all to withhold clearance of items. (App. 13-17.) This case therefore vests complete discretion in agents to arbitrarily withhold clearance, and thereby qualify any item for seizure and indefinite detention. Ultimately, the "no clearance" precept swallows the entire border exception rule, turning what is supposed to be a narrow exception - searches conducted at or 22 near the border - into ones that can be conducted hundreds, perhaps thousands of miles away, all with no reasonable suspicion of wrongdoing. It effectively makes the entire country, somehow a part of the "border." By labeling this a border search, the majority has conjured a sort of "floating border," whereby any item initially seized at the border, but not cleared there, can be transported thousands of miles away and searched anywhere, and at any time, simply because the government did not find anything (or enough) during its original search at the border. (Dissent, App. 74.) Thus, the border search exception has been bent beyond the breaking point by the Ninth Circuit's needless invention of a new doctrine for personal possessions that border officials seize without particularized suspicion. The ruling not only fails to resolve the real issues in question, it also reaches beyond the parameters of this particular case to turn the border crossing exception into a giant loophole. It allows the government to exploit its enormous border search power, expanding the reach of that power to the whole country, in violation of the Fourth Amendment. 23 D. Summary The Ninth Circuit's ruling is wrongly decided, conflicts with other circuits, and creates a loophole in the Border Search Doctrine that threatens to engulf the entire rule. "The majority dispenses with well-settled, sensible, and binding principles, lifts our anchor, and charts a course for muddy waters." (Dissent, App. 55, emphasis in original.) The ruling also upsets "the sensible balance between the legitimate privacy interests of the individual and society's vital interest in the enforcement of customs laws." United States v. Caicedo-Guarnizo, 723 F.2d 1420, 1423 (9th Cir. 1984). This Court should grant certiorari to correct the many problems and great mischief this case of national importance will cause. II. THE NINTH CIRCUIT'S IMPROPER METHODOLOGY FOR FINDING REASONABLE SUSPICION THREATENS THE FREEDOM OF ALL AMERICANS AND UPSETS THE S OUND F UNCTIONING OF A PPELLATE PROCEDURE, REQUIRING THE EXERCISE OF THIS COURT'S SUPERVISORY POWERS. Compounding the problems explained above, the Ninth Circuit has based the outcome of this case on a question that one party (the prosecution) deliberately and purposefully abandoned on appeal: whether there was reasonable suspicion of wrongdoing at the time the property was seized. In so doing the Ninth Circuit has contravened long-standing Fourth Amendment jurisprudence in several distinct, yet inextricably related ways, portending far-reaching and continuing harm. 24 First, the panel conjured reasonable suspicion where none actually existed according to agent testimony. Both the magistrate judge and the district judge found reasonable suspicion absent. That ruling was not challenged by the prosecution on appeal, and was affirmed by the three-judge appellate panel. Yet, the en banc panel went on to make its own sua sponte finding of reasonable suspicion on the flimsiest of grounds. In his dissent Judge Smith sounded the alarm: [the majority's] determination that reasonable suspicion exists under the exceedingly weak facts of this case undermines the liberties of U.S. citizens generally -- not just at the border, and not just with regard to our digital data -- but on every street corner, in every vehicle, and wherever else we rely on the doctrine of reasonable suspicion to safeguard our legitimate privacy interests. (App. 58.) In order to "find" reasonable suspicion for the first time at the en banc stage of an appeal, the majority has contradicted well-settled review standards, and this Court's precedent and teachings in United States v. Arvizu, 534 U.S. 266 (2002). Thus, the Ninth Circuit's en banc ruling will destabilize the Border Search Exception and raise questions about a variety of common border practices, leading the dissenting judges to point out the need for a "course correction" (App. 55) and to implore this Court to "grant certiorari." (App 56.) 25 A. The Ninth Circuit Deviated Markedly from Accepted and Usual Judicial Proceedings by Deciding this Case Based on an Abandoned Issue. Exercise of this Court's supervisory power is warranted by the Ninth Circuit's departure from the accepted and usual course of judicial proceedings by deciding this case based on an issue (reasonable suspicion) that had been intentionally and repeatedly abandoned by the appellant. The Ninth Circuit's reversal of the district court's order suppressing the evidence is the result of its resurrection of that issue. That issue must therefore be addressed as part and parcel of the issue presented by this case. To reach that conclusion, the en banc court ignored the question presented in the prosecution's opening brief, which was as follows: Whether the Authority to Search a Laptop Computer Without Reasonable Suspicion at a Border Point of Entry Permits Law Enforcement to Take it to Another Location to Be Forensically Examined, When it Has Remained in the Continuous Custody of the Government. Not only did the prosecution not ask the court to determine whether reasonable suspicion existed, it effectively conceded that reasonable suspicion was not present. (See Dissent, app. 72.) As noted above, when an appellant fails to challenge a ruling made by the district court, all appellate courts consider the issue abandoned under FRAP 28(a)(9), and 26 will not address it. (See footnote 5, supra.) Here, however, the en banc court sua sponte ordered both parties to brief the question, and then decided the case on that basis without ever explaining why it chose to do so. This is the Ninth Circuit's entire discussion as to why it was permissible for it to address this abandoned issue: We review de novo the ultimate question of whether a warrantless search was reasonable under the Fourth Amendment. United States v. Johnson, 256 F.3d 895, 905 (9th Cir.2001) (en banc). Our review necessarily encompasses a determination as to the applicable standard: no suspicion, reasonable suspicion or probable cause. That the government may hope for the lowest standard does not alter our de novo review, particularly when the issue was fully briefed and argued below. Further, we may consider an issue that has not been adequately raised on appeal if such a failure will not prejudice the opposing party. United States v. Ullah, 976 F.2d 509, 514 (9th Cir.1992). Where, as here, we "called for and received supplemental briefs by both parties," Alcaraz v. INS, 384 F.3d 1150, 1161 (9th Cir.2004), the government's failure to address the issue does not prejudice Cotterman. (App. 9-10, emphasis added). At first blush this may seem to say that the court's de novo review requires it to decide the issue of reasonable suspicion. However, a closer examination reveals that this is logically false. The first part of this 27 purported "justification" is that determining what standard (i.e. amount of suspicion) is necessary for seizure is a component of the issue of whether a search is lawful. That is correct. However, the abandoned issue here was not the legal standard, but the factual existence or non-existence of reasonable suspicion. Neither the defense nor the prosecution have ever contested that the appellate court may decide the applicable legal standard of suspicion necessary for a search or seizure. Indeed, both sides asked the court to address that issue. In contrast, neither side asked the court to address the factual issue of whether reasonable suspicion existed here. Thus, what appears at first read to be the Court's principal justification for addressing the existence of reasonable suspicion, actually relates to the non-issue of the legal standard for search and seizure. The majority cited in passing United States v. Resendiz-Ponce, 549 U.S. 102 (2007). There this Court granted review of a constitutional issue (i.e. whether a constitutionally deficient indictment is structural error). Resendiz-Ponce, 549 U.S. at 116. This Court subsequently ordered the parties to file supplemental briefs regarding a different question (whether the word "attempt" in an indictment itself sufficiently alleged an overt act). The Court did this to avoid deciding the constitutional question that was originally presented. Resendiz-Ponce, 549 U.S. 102 at 103-04 citing Ashwander v. TVA, 297 U.S. 288, 347 (1936). Resendiz-Ponce is not on point. That case was decided in the context of a petition for certiorari, a discretionary form of review. The instant case was decided in the context of a direct "as of right" appeal. 28 18 U.S.C. ? 3731. In that context, it is not up to the appellate court to "grant" or "deny" review of a certain question, as is the case on discretionary review. Instead, it is the court's job to resolve the issue presented by the parties. "The premise of our adversarial system is that appellate courts do not sit as self-directed boards of legal inquiry and research, but essentially as arbiters of legal questions presented and argued by the parties before them." Carducci v. Regan, 714 F.2d 171, 177 (D.C.Cir.1983) (Scalia, Circuit Judge). Moreover, the situation here was the opposite of that in Resendiz-Ponce. The Ninth Circuit did address a constitutional issue (whether reasonable suspicion is needed before a person's belongings can be moved from the border and subjected to a forensic search). However, it then ordered briefing on an issue not raised by any party: whether reasonable suspicion existed on the facts of this case. Consequently, the reasoning that justified supplemental briefing in Resendiz-Ponce does not apply to this case. The supplemental briefing in Resindiz-Ponce appropriately supplemented the judicial process to decide the case. In this case the supplemental briefing subverted that process and, by so doing, set a precedent of abusing the power of supplemental briefing to revive an abandoned issue. The remainder of the Ninth Circuit's supposed justification can be summarized as follows: an appellate court may base the ultimate outcome of a case on an abandoned issue it if it does not prejudice either party. However, this is flawed as a "justification" for many reasons. 29 First, it is not credible to claim that Mr. Cotterman was not prejudiced here. He was severely prejudiced in a procedural sense in that the sequence of events prevented the defense from making the argument it would have made if the prosecution had contested the reasonable suspicion finding. Had that issue been properly presented in the Opening Brief, the defense strategy would have been fundamentally different. Introducing the reasonable suspicion issue at this late stage rendered irrelevant much of the briefs and oral arguments that preceded it. The defense made clear that the composition of its answering brief was based on the prosecution's abandonment of this issue. (A.B. 20-21.) The defense made numerous strategic choices based upon that abandonment. For example, had the Government raised the reasonable suspicion issue to begin with, the defense would undoubtedly have allocated far more of its Answering Brief to that issue than was available in the supplemental brief, which the Ninth Circuit limited to 5,000 words to cover two distinct and separate questions. Moreover, the defense would have concentrated on other arguments indicating that an even higher standard was required for seizure: probable cause. Instead, given the District Court's ruling and the prosecution's concession that reasonable suspicion was lacking, the defense chose to concede that reasonable suspicion was the applicable standard for a seizure. These kinds of long-range strategic decisions that the defense made years ago were not cured by limited supplemental briefing during the en banc proceedings. Thus, the "no prejudice" exception that the Ninth Circuit relied upon is not applicable here. 30 Howard Cotterman was even more severely prejudiced in a practical sense because, as Judge Smith put it, "the majority's finding of reasonable suspicion is the raison d'?tre for his conviction." (App. 73.) As he went on to state, "[I]t is clear to me that Cotterman has been severely prejudiced, because his conviction is based solely on an issue the government conceded, and that Appellant, and the lower courts, took for granted because it was not needed for a border search." (Id.) Second, there was no need to revive an abandoned issue here. The issue of whether reasonable suspicion was present was neither antecedent to the constitutional issue in this case nor was it jurisdictional. Third, the issue of reasonable suspicion is poorly suited to being the one on which the entire outcome of the case is based, because it was not even the real reason for the seizure. The magistrate judge found that the agents acted "presumptively without even considering whether they had reasonable suspicion to seize any of the electronic equipment that day." (App 102.) This was a factual finding, reviewed only for clear error.6 Moreover, as noted above, the supervisory agents conceded that there was no indication of wrongdoing at the border, even after hours of searching. On the contrary, the agents seized the 6 The Ninth Circuit failed to acknowledge that review of a ruling on a motion to suppress is not simply de novo. The district court's findings of fact should be reviewed for clear error. United States v. Mendoza-Ortiz, 262 F.3d 882, 885 (9th Cir. 2001). Here, the Ninth Circuit failed to identify the factual portions of the District Court's findings, and to apply deferential review to them. 31 Cottermans' property precisely because ICE policy said that they did not need reasonable suspicion to seize personal belongings. Yet the Ninth Circuit has chosen to make the entire case hinge on this hindsight-laden issue. Fourth, addressing an issue that was deliberately abandoned by a sophisticated and well-seasoned party for strategic reasons has adverse consequences for our judicial system. It sends the message that a favored party (i.e. the United States Government) may make a strategic choice in an attempt to strong-arm an appellate court to rule in a certain way, but the court will still protect that party from the consequences of its choice if the decision goes against them. The Government made its choice, and should abide by the consequences thereof, be they good or bad. Finally, the Ninth Circuit's opinion completely fails to explain why that court must or should address this issue, which the government declined to raise on appeal, and urged it not to address all the way through the en-banc stage. Even if a court may do so, if it is going to take such a highly unusual step, it should at least explain why it is doing so, when it and every other circuit refuses to address abandoned issues in just about every case. Since the rule of law depends upon the principle of "stare decisis", departures from past precedent like this one require "special justification," which is nowhere to be found in the majority opinion. See Payne v. Tennessee, 501 U.S. 808, 842 (1991) ("[E]ven constitutional cases, the doctrine [of stare decisis] carries such persuasive force that we have always required a departure from precedent to be supported by some "special justification.") 32 Here, the majority has refused to apply the principle that abandoned arguments are waived, as all circuits have held. Why did the Ninth Circuit feel it had to ignore the Rules of Procedure and the mountain of precedent holding that an abandoned issue will not be addressed on appeal? Why did it need to give the prosecution yet another bite at the apple after it had spurned opportunities to address this issue in its opening brief, reply brief, two different oral arguments, and its response to the petition for rehearing en banc, and still asked the court to resolve the case without such a finding in the supplemental brief it filed pursuant to the court's order? Why reach so deep to save a litigant from its own deliberate choice? The answer is apparent: to manipulate the outcome of the case in a way unfavorable to Mr. Cotterman. The Ninth Circuit's decision was outcome-driven, made only for the purpose of preventing Mr. Cotterman from benefitting from the holding that reasonable suspicion was required for this search. Indeed, Judge Smith, a part of the panel, states that the majority's motivation here included "securing Cotterman's conviction." (Dissent, App. 72.) "It is the majority of our panel, not the government, that prosecuted the reasonable suspicion issue in this case." (Dissent, App. 73.) The majority in no way denied this. It is, therefore clear that the Ninth Circuit's action of resurrecting an abandoned issue violated the court's duty of rendering impartial justice under the law. Consequently, the Ninth Circuit's decision to make the entire case hinge on an issue abandoned by the prosecution was fundamentally unfair, and a radical departure from the usual and accepted course of 33 judicial proceedings. As such it violated the Due Process guarantee of the Fifth Amendment to the United States Constitution. See Gagnon v. Scarpelli, 411 U.S. 778, 790 (1973) (citing fundamental fairness as "the touchstone of due process.") B. The Ninth Circuit Violated This Court's Jurisprudence in Finding Reasonable Suspicion. The Ninth Circuit decision also conflicts with prior decisions of this Court. The majority's finding that reasonable suspicion existed departs sharply from this Court's teachings and case law in two critical ways: it employs a flawed methodology, and it reaches an outcome that effectively redefines reasonable suspicion to be generalized and subjective. This Court has defined reasonable suspicion as "a particularized and objective basis for suspecting the particular person stopped of criminal activity." United States v. Cortez, 449 U.S. 411, 417-18 (1981). This assessment is to be made in light of "the totality of the circumstances." Id. at 417. Lower courts' factual findings underlying reasonable suspicion determinations are reviewed for clear error, giving "due weight to inferences drawn from those facts by resident judges and local law enforcement." Ornelas v. United States, 517 U.S. 690, 699 (1996). In Arvizu, 534 U.S. 266 (2002), this Court addressed "how reviewing courts should make reasonablesuspicion determinations." The reversal of the Ninth Circuit in Arvizu emphasized improper methodology that failed to fully take into account the totality of the 34 circumstances. Under Arvizu, reasonable suspicion analysis cannot cherry-pick which factors to consider. Yet that is just what the Ninth Circuit has done here, once again sending the wrong message to lower courts and law enforcement. Under the guise of a totality of the circumstances analysis, the majority piled on broad and subjective factors, counting multiple times what was really only one factor. The TECS record, the prior conviction, and the "Angel Watch" program are logically all one factor, as Judge Smith explained in his dissent. (See App. 77-78.) Most importantly, however, the panel failed to properly analyze the totality of these circumstances by continuing to rely on factors that had been dispelled by the ICE investigation at the border and the evidentiary hearing testimony. The eight-hour investigation at the border rebutted any concern that the ICE field office in Los Angeles may have had that Howard engaged in "sex tourism" on this trip. The thorough search of the couple's belongings was completely consistent with an ordinary family vacation. Though sex tourism may have been speculated months earlier by the TECS contact in Los Angeles (SER 85), the record contains no such belief on the part of the agents at the scene by the time the property was seized. Yet, the majority wrongly attributes such a belief to the "border agents." (App. 6.) Similarly, the existence of "frequent" international travel by Mr. Cotterman has been misrepresented as objective fact long after being overcome by the investigation at the border. (SER 78-79, 148, 164, 236.) There is nothing in the record regarding details of any previous travel that aroused any suspicion. The characterization of "frequent" is based on no specifics. Yet, the demand for specificity 35 "is the central teaching of this Court's Fourth Amendment jurisprudence." Cortez 449 U.S. at 418 citing Terry at 21 n.18. The majority disparages "nitpick[ing]" and claims to defer to the "agents' observations and experience." (App. 34.) Indeed, the ICE agents were highly experienced investigators. (SER 61-62, 160-61.) It is, however, the agents themselves who lacked suspicion. (SER 87, 98-99, 164, 173.) That conclusion was drawn by the magistrate judge, and affirmed by both the district judge and the initial appellate panel. Yet, at the en banc stage of the appeal, the majority failed to accord the district court and the law enforcement officials the deference they are due, defying this Court's repeated admonitions in Arvizu regarding the totality of the circumstances. As Judge Smith succinctly explained: The relevant inquiry here is what suspicion existed after all of Cotterman's electronics were searched, and he and his wife were interrogated separately, and every piece of evidence obtained corroborated the Cottermans' story about vacationing in Mexico. The only hint of suspicion remaining at that point-after the initial border search and interrogations-was the single password-protected file, which I agree with the majority is insufficient, by itself, to sustain a finding of reasonable suspicion. At the time the border patrol agents commenced the second search, 170 miles away from the border, any suspicions they may have initially harbored against Cotterman would have been largely 36 addressed by their interrogations of Cotterman and his wife, which produced nothing suspicious. (Dissent, App. 84.) The majority also blithely dismissed Mr. Cotterman's offer to help the agents access the computer, which the agents refused for fear he might tamper with it. (App. 32.) This ignored the fact that his offer was still an outward indication that there was nothing illegal in the password-protected file, and it provided a quick and easy way to establish, or dispel, reasonable suspicion at the border. (See Dissent, App., 84: "That the agents were unable to accept Cotterman's offer, however, does not change the reasonable inference that his offer was a genuine one.") Thus, the only basis for "reasonable suspicion" left here boiled down to the TECS alert. The majority almost acknowledged as much, stating that "the nature of the alert on Cotterman, directing agents to review media and electronic equipment for child pornography, justified conducting the forensic examination despite the failure of the first search to yield any contraband." (App. 32-33, emphasis added.) In other words, if you are on a government watch list your belongings can be seized at the border even if the reasons you were put on the list were nullified by an initial search at the border. Thus, the majority pins reasonable suspicion on the TECS alert, dismisses out of hand the numerous factors weighing against reasonable suspicion, and paves the way for a government database to target 'entire categories of people 37 without any individualized suspicion of the particular person to be stopped. (Dissent, App. 77.) In the absence of the requisite "particularized and objective basis," the TECS alert cannot justify an unconstitutional fishing expedition - using the Border Search exception to conduct a search that law enforcement could not do away from the border without violating the Fourth Amendment. Here, the Ninth Circuit has chosen to make the entire case hinge on what is essentially a nunc pro tunc decision by appellate judges substituting their own suspicions (inescapably infused with hindsight) for those of the officers at the scene. To use hindsight in this one case to justify seizures from innocent travelers in the future, sacrifices the very freedoms the Fourth Amendment is meant to protect. This Court should reverse the Ninth Circuit, not only to maintain the integrity of the "totality of the circumstances" analysis, but also to clarify what authorities may, and may not, do at the border. 38 CONCLUSION For the foregoing reasons this Court should grant this petition for a writ of certiorari and reverse the decision of the Ninth Circuit Court of Appeals. RESPECTFULLY SUBMITTED this 5th day of August, 2013. William J. Kirchner Counsel of Record Law Offices of Nash & Kirchner P.O. Box 2310 Tucson, AZ 85702 Phone: (520) 792-1613 FAX: (520) 628-1079 bkirchner@azbar.org Attorney for Howard Cotterman i APPENDIX TABLE OF CONTENTS Appendix A: Opinion, in the United States Court of Appeals for the Ninth Circuit (March 8, 2013) . . . . . . . . . . App. 1 Appendix B: Order, in the United States District Court for the District of Arizona (February 24, 2009) . . . . . . App. 86 Appendix C: Report and Recommendation, in the United States District Court for the District of Arizona (September 12, 2008) . . . . . App. 89 App. 1 APPENDIX A FOR PUBLICATION No. 09-10139 D.C. No. 4:07-cr-01207-RCC-CRP-1 UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT [Filed March 8, 2013] _________________________________ UNITED STATES OF AMERICA, ) Plaintiff-Appellant, ) ) v. ) ) HOWARD WESLEY COTTERMAN, ) Defendant-Appellee. ) _________________________________) OPINION Appeal from the United States District Court for the District of Arizona Raner C. Collins, District Judge, Presiding Argued and Submitted En Banc June 19, 2012--Pasadena, California Filed March 8, 2013 App. 2 Before: Alex Kozinski, Chief Judge, Sidney R. Thomas, M. Margaret McKeown, Kim McLane Wardlaw, Raymond C. Fisher, Ronald M. Gould, Richard R. Clifton, Consuelo M. Callahan, Milan D. Smith, Jr., Mary H. Murguia, and Morgan Christen, Circuit Judges.1 Opinion by Judge McKeown; Partial Concurrence and Partial Dissent by Judge Callahan; Dissent by Judge Milan D. Smith, Jr. *** [Court Staff Summary Section Omitted for Purposes of this Appendix] COUNSEL Dennis K. Burke, Christina M. Cabanillas, Carmen F. Corbin, John S. Leonardo, John J. Tuchi, United States Attorney's Office for the District of Arizona, Tucson, Arizona, for Appellant. William J. Kirchner, Law Office of Nash & Kirchner, P.C., Tucson, Arizona, for Appellee. David M. Porter, Malia N. Brink, National Association of Criminal Defense Lawyers, Washington, D.C.; Michael Price, Brennan Center for Justice, New York, New York; Hanni M. Fakhoury, Electronic Frontier 1 Judge Betty B. Fletcher was a member of the en banc panel but passed away after argument of the case. Judge Wardlaw was drawn as her replacement. App. 3 Foundation, San Francisco, California, for Amicus Curiae National Association of Criminal Defense Lawyers and Electronic Frontier Foundation. Christopher T. Handman, Mary Helen Wimberly, Hogan Lovells US LLP, Washington, D.C.; Sharon Bradford Franklin, The Constitution Project, Washington, D.C., for Amicus Curiae The Constitution Project. OPINION McKEOWN, Circuit Judge: Every day more than a million people cross American borders, from the physical borders with Mexico and Canada to functional borders at airports such as Los Angeles (LAX), Honolulu (HNL), New York (JFK, LGA), and Chicago (ORD, MDW). As denizens of a digital world, they carry with them laptop computers, iPhones, iPads, iPods, Kindles, Nooks, Surfaces, tablets, Blackberries, cell phones, digital cameras, and more. These devices often contain private and sensitive information ranging from personal, financial, and medical data to corporate trade secrets. And, in the case of Howard Cotterman, child pornography. Agents seized Cotterman's laptop at the U.S.Mexico border in response to an alert based in part on a fifteen-year-old conviction for child molestation. The initial search at the border turned up no incriminating material. Only after Cotterman's laptop was shipped almost 170 miles away and subjected to a comprehensive forensic examination were images of child pornography discovered. App. 4 This watershed case implicates both the scope of the narrow border search exception to the Fourth Amendment's warrant requirement and privacy rights in commonly used electronic devices. The question we confront "is what limits there are upon this power of technology to shrink the realm of guaranteed privacy." Kyllo v. United States, 533 U.S. 27, 34 (2001). More specifically, we consider the reasonableness of a computer search that began as a cursory review at the border but transformed into a forensic examination of Cotterman's hard drive. Computer forensic examination is a powerful tool capable of unlocking password-protected files, restoring deleted material, and retrieving images viewed on web sites. But while technology may have changed the expectation of privacy to some degree, it has not eviscerated it, and certainly not with respect to the gigabytes of data regularly maintained as private and confidential on digital devices. Our Founders were indeed prescient in specifically incorporating "papers" within the Fourth Amendment's guarantee of "[t]he right of the people to be secure in their persons, houses, papers, and effects." U.S. Const. amend. IV. The papers we create and maintain not only in physical but also in digital form reflect our most private thoughts and activities. Although courts have long recognized that border searches constitute a "historically recognized exception to the Fourth Amendment's general principle that a warrant be obtained," United States v. Ramsey, 431 U.S. 606, 621 (1977), reasonableness remains the touchstone for a warrantless search. Even at the border, we have rejected an "anything goes" approach. App. 5 See United States v. Seljan, 547 F.3d 993, 1000 (9th Cir. 2008) (en banc). Mindful of the heavy burden on law enforcement to protect our borders juxtaposed with individual privacy interests in data on portable digital devices, we conclude that, under the circumstances here, reasonable suspicion was required for the forensic examination of Cotterman's laptop. Because border agents had such a reasonable suspicion, we reverse the district court's order granting Cotterman's motion to suppress the evidence of child pornographyobtained from his laptop. I. FACTUAL BACKGROUND HISTORY2 AND PROCEDURAL Howard Cotterman and his wife were driving home to the United States from a vacation in Mexico on Friday morning, April 6, 2007, when they reached the Lukeville, Arizona, Port of Entry. During primary inspection by a border agent, the Treasury Enforcement Communication System ("TECS")3 returned a hit for Cotterman. The TECS hit indicated that Cotterman was a sex offender--he had a 1992 conviction for two counts of use of a minor in sexual conduct, two counts of lewd and lascivious conduct 2 The facts related here are drawn from the record of the evidentiary hearing held before the magistrate judge. 3 The TECS is an investigative tool of the Department of Homeland Security that keeps track of individuals entering and exiting the country and of individuals involved in or suspected to be involved in crimes. App. 6 upon a child, and three counts of child molestation--and that he was potentially involved in child sex tourism. Because of the hit, Cotterman and his wife were referred to secondary inspection, where they were instructed to exit their vehicle and leave all their belongings in the car. The border agents called the contact person listed in the TECS entry and, following that conversation, believed the hit to reflect Cotterman's involvement "in some type of child pornography." The agents searched the vehicle and retrieved two laptop computers and three digital cameras. Officer Antonio Alvarado inspected the electronic devices and found what appeared to be family and other personal photos, along with several password-protected files. Border agents contacted Group Supervisor Craig Brisbine at the Immigration and Customs Enforcement ("ICE") office in Sells, Arizona, and informed him about Cotterman's entry and the fact that he was a sex offender potentially involved in child sex tourism. The Sells Duty Agent, Mina Riley, also spoke with Officer Alvarado and then contacted the ICE Pacific Field Intelligence Unit, the office listed on the TECS hit, to get more information. That unit informed Riley that the alert was part of Operation Angel Watch, which was aimed at combating child sex tourism by identifying registered sex offenders in California, particularly those who travel frequently outside the United States. She was advised to review any media equipment, such as computers, cameras, or other electronic devices, for potential evidence of child pornography. Riley then spoke again to Alvarado, who told her that he had been able to review some of the photographs on the Cottermans' computers but had App. 7 encountered password-protected files that he was unable to access. Agents Brisbine and Riley departed Sells for Lukeville at about 1:30 p.m. and decided en route to detain the Cottermans' laptops for forensic examination. Upon their arrival, they gave Cotterman and his wife Miranda warnings and interviewed them separately. The interviews revealed nothing incriminating. During the interview, Cotterman offered to help the agents access his computer. The agents declined the offer out of concern that Cotterman might be able to delete files surreptitiously or that the laptop might be "booby trapped." The agents allowed the Cottermans to leave the border crossing around 6 p.m., but retained the Cottermans' laptops and a digital camera.4 Agent Brisbine drove almost 170 miles from Lukeville to the ICE office in Tucson, Arizona, where he delivered both laptops and one of the three digital cameras to ICE Senior Special Agent & Computer Forensic Examiner John Owen. Agent Owen began his examination on Saturday, the following day. He used a forensic program to copy the hard drives of the electronic devices. He determined that the digital camera did not contain any contraband and released the camera that day to the Cottermans, who had traveled to Tucson from Lukeville and planned to stay there a few days. Agent Owen then used forensic software that often must run for several hours to examine copies of the laptop hard drives. He began his personal examination 4 The other two cameras were returned to the Cottermans. App. 8 of the laptops on Sunday. That evening, Agent Owen found seventy-five images of child pornography within the unallocated space of Cotterman's laptop.5 Agent Owen contacted the Cottermans on Sunday evening and told them he would need Howard Cotterman's assistance to access password-protected files he found on Cotterman's laptop. Cotterman agreed to provide the assistance the following day, but never showed up. When Agent Brisbine called again to request Cotterman's help in accessing the passwordprotected files, Cotterman responded that the computer had multiple users and that he would need to check with individuals at the company from which he had retired in order to get the passwords. The agents had no further contact with Cotterman, who boarded a flight to Mexico from Tucson the next day, April 9, and then flew onward to Sydney, Australia. On April 11, Agent Owen finally managed to open twenty-three password-protected files on Cotterman's laptop. The files revealed approximately 378 images of child pornography. The vast majority of the images were of the same girl, approximately 7-10 years of age, taken over a two-to three-year period. In many of the images, Cotterman was sexually molesting the child. Over the next few months, Agent Owen discovered hundreds more pornographic images, stories, and videos depicting children. 5 "Unallocated space is space on a hard drive that contains deleted data, usually emptied from the operating system's trash or recycle bin folder, that cannot be seen or accessed by the user without the use of forensic software. Such space is available to be written over to store new information." United States v. Flyer, 633 F.3d 911, 918 (9th Cir. 2011). App. 9 A grand jury indicted Cotterman for a host of offenses related to child pornography. Cotterman moved to suppress the evidence gathered from his laptop and the fruits of that evidence. The magistrate judge filed a Report and Recommendation finding that the forensic examination was an "extended border search" that required reasonable suspicion. He found that the TECS hit and the existence of passwordprotected files on Cotterman's laptop were suspicious, but concluded that those facts did not suffice to give rise to reasonable suspicion of criminal activity. The district judge adopted the Report and Recommendation and granted Cotterman's motion to suppress. In its interlocutory appeal of that order, the government characterized the issue as follows: "Whether the authority to search a laptop computer without reasonable suspicion at a border point of entry permits law enforcement to take it to another location to be forensically examined, when it has remained in the continuous custody of the government." A divided panel of this court answered that question in the affirmative and reversed. United States v. Cotterman, 637 F.3d 1068 (9th Cir. 2011). The panel concluded that reasonable suspicion was not required for the search and that "[t]he district court erred in suppressing the evidence lawfully obtained under border search authority." Id. at 1084. In dissent, Judge Betty B. Fletcher wrote that "officers must have some level of particularized suspicion in order to conduct a seizure and search like the one at issue here." Id. (B. Fletcher, J., dissenting). By a vote of a majority of nonrecused active judges, rehearing en banc was ordered. 673 F.3d 1206 (9th Cir. 2012). Following en banc oral argument, we requested supplemental App. 10 briefing on the issue of whether reasonable suspicion existed at the time of the search. II. WAIVER The government argued below that the forensic examination was part of a routine border search not requiring heightened suspicion and, alternatively, that reasonable suspicion justified the search. Before the district court, the government maintained "the facts of this case clearly establish that there was reasonable suspicion." However, having failed to obtain a favorable ruling on that ground, the government did not challenge on appeal the conclusion that there was no reasonable suspicion. Rather, it sought a broad ruling that no suspicion of any kind was required. Cotterman thus argued in his answering brief that the government had waived the issue--an assertion that the government did not address in its reply brief. Cotterman contends that the government has abandoned and conceded the issue of reasonable suspicion and that this court may not address that issue. We disagree. We review de novo the ultimate question of whether a warrantless search was reasonable under the Fourth Amendment. United States v. Johnson, 256 F.3d 895, 905 (9th Cir. 2001) (en banc). Our review necessarily encompasses a determination as to the applicable standard: no suspicion, reasonable suspicion or probable cause. That the government may hope for the lowest standard does not alter our de novo review, particularly when the issue was fully briefed and argued below. Further, we may consider an issue that has not been adequately raised on appeal if such a App. 11 failure will not prejudice the opposing party. United States v. Ullah, 976 F.2d 509, 514 (9th Cir. 1992). Where, as here, we "called for and received supplemental briefs by both parties," Alcarez v. INS, 384 F.3d 1150, 1161 (9th Cir. 2004), the government's failure to address the issue does not prejudice Cotterman. See also United States v. Resendiz-Ponce, 549 U.S. 102, 103-04 (2007). III. THE BORDER SEARCH The broad contours of the scope of searches at our international borders are rooted in "the long-standing right of the sovereign to protect itself by stopping and examining persons and property crossing into this country." Ramsey, 431 U.S. at 616. Thus, border searches form "a narrow exception to the Fourth Amendment prohibition against warrantless searches without probable cause." Seljan, 547 F.3d at 999 (internal quotation marks and citation omitted). Because "[t]he Government's interest in preventing the entry of unwanted persons and effects is at its zenith at the international border," United States v. FloresMontano, 541 U.S. 149, 152 (2004), border searches are generally deemed "reasonable simply by virtue of the fact that they occur at the border." Ramsey, 431 U.S. at 616. This does not mean, however, that at the border "anything goes." Seljan, 547 F.3d at 1000. Even at the border, individual privacy rights are not abandoned but "[b]alanced against the sovereign's interests." United States v. Montoya de Hernandez, 473 U.S. 531, 539 (1985). That balance "is qualitatively different . . . than in the interior" and is "struck much more favorably to App. 12 the Government." Id. at 538, 540. Nonetheless, the touchstone of the Fourth Amendment analysis remains reasonableness. Id. at 538. The reasonableness of a search or seizure depends on the totality of the circumstances, including the scope and duration of the deprivation. See United States v. Jacobsen, 466 U.S. 109, 124 (1984); see also United States v. Duncan, 693 F.2d 971, 977 (9th Cir. 1982). In view of these principles, the legitimacy of the initial search of Cotterman's electronic devices at the border is not in doubt. Officer Alvarado turned on the devices and opened and viewed image files while the Cottermans waited to enter the country. It was, in principle, akin to the search in Seljan, where we concluded that a suspicionless cursory scan of a package in international transit was not unreasonable. 547 F.3d at 1004. Similarly, we have approved a quick look and unintrusive search of laptops. United States v. Arnold, 533 F.3d 1003, 1009 (9th Cir. 2008) (holding border search reasonable where "CBP officers simply 'had [traveler] boot [the laptop] up, and looked at what [he]had inside.'") (second alteration in original).6 Had the search of Cotterman's laptop ended with Officer Alvarado, we would be inclined to conclude it was 6 Although the Arnold decision expressed its conclusion in broad terms, stating that, "reasonable suspicion is not needed for customs officials to search a laptop or other personal electronic storage devices at the border," Arnold, 533 F.3d at 1008, the facts do not support such an unbounded holding. As an en banc court, we narrow Arnold to approve only the relatively simple search at issue in that case, not to countenance suspicionless forensic examinations. The dissent's extensive reliance on Arnold is misplaced in the en banc environment. App. 13 reasonable even without particularized suspicion. See id. But the search here transformed into something far different. The difficult question we confront is the reasonableness, without a warrant, of the forensic examination that comprehensively analyzed the hard drive of the computer. A. The Forensic Examination Was Not An Extended Border Search Cotterman urges us to treat the examination as an extended border search that requires particularized suspicion. Although the semantic moniker "extended border search" may at first blush seem applicable here, our jurisprudence does not support such a claim. We have "define[d] an extended border search as any search away from the border where entry is not apparent, but where the dual requirements of reasonable certainty of a recent border crossing and reasonable suspicion of criminal activity are satisfied." United States v. Guzman-Padilla, 573 F.3d 865, 878-79 (9th Cir. 2009) (internal quotation marks and citations omitted). The key feature of an extended border search is that an individual can be assumed to have cleared the border and thus regained an expectation of privacy in accompanying belongings. See United States v. Abbouchi, 502 F.3d 850, 855 (9th Cir. 2007) ("Because the delayed nature of an extended border search . . . necessarily entails a greater level of intrusion on legitimate expectations of privacy than an ordinary border search, the government must justify an extended border search with reasonable suspicion that the search may uncover contraband or evidence of criminal activity.") (internal quotation marks omitted) (emphasis added). App. 14 Cotterman's case is different. Cotterman was stopped and searched at the border. Although he was allowed to depart the border inspection station after the initial search, some of his belongings, including his laptop, were not. The follow-on forensic examination was not an "extended border search." A border search of a computer is not transformed into an extended border search simply because the device is transported and examined beyond the border. To be sure, our case law has not always articulated the "extended border search" doctrine with optimal clarity. But the confusion has come in distinguishing between facts describing a functional border search and those describing an extended border search, not in defining the standard for a search at the border. See, e.g., United States v. Cardona, 769 F.2d 625, 628 (9th Cir. 1985) ("We have recently recognized the difficulty of making sharp distinctions between searches at the functional equivalent of the border and extended border searches."). The "functional equivalent" doctrine effectively extends the border search doctrine to all ports of entry, including airports. See AlmeidaSanchez v. United States, 413 U.S. 266, 273 (1973). A routine customs search at the "functional equivalent" of the border is "analyzed as a border search" and requires neither probable cause nor reasonable suspicion. Seljan, 547 F.3d at 999. This case involves a search initiated at the actual border and does not encounter any of the difficulties surrounding identification of a "functional" border. As to the extended border search doctrine, we believe it is best confined to cases in which, after an apparent border crossing or functional entry, an attenuation in the time App. 15 or the location of conducting a search reflects that the subject has regained an expectation of privacy.7 In his dissent, Judge Smith advocates applying the extended border search doctrine because the forensic examination occurred 170 miles from the border and days after Cotterman's entry. Moving the laptop to a specialized lab at a distant location might highlight that the search undertaken there was an extensive one, but it is not the dispositive factor here. Because Cotterman never regained possession of his laptop, the fact that the forensic examination occurred away from the border, in Tucson, did not heighten the interference with his privacy. Time and distance become relevant to determining whether there is an adequate nexus to a recent border crossing only after the subject or items searched have entered. See Villasenor, 608 F.3d at 471 (explaining that reasonableness of extended border search depends on "whether the totality of the surrounding circumstances, including the time and distance elapsed" establish that items to be searched have recently entered the country) (internal quotation marks omitted). Cotterman's computer never cleared customs so entry was never effected. In short, the 7 This characterization is consistent with how our circuit and others have articulated the doctrine. See, e.g., United States v. Villasenor, 608 F.3d 467, 471-72 (9th Cir. 2010); United States v. Yang, 286 F.3d 940, 945-46 (7th Cir. 2002); United States v. Hyde, 37 F.3d 116, 120 n.2 (3d Cir. 1994); United States v. Santiago, 837 F.2d 1545, 1548 (11th Cir. 1988); United States v. Gaviria, 805 F.2d 1108, 1112 (2d Cir. 1986); United States v. Niver, 689 F.2d 520, 526 (5th Cir. 1982); United States v. Bilir, 592 F.2d 735, 739-40 (4th Cir. 1979). App. 16 extended border search doctrine does not fit the search here. B. Forensic Examination At The Border Requires Reasonable Suspicion It is the comprehensive and intrusive nature of a forensic examination--not the location of the examination--that is the key factor triggering the requirement of reasonable suspicion here.8 See Cotterman, 637 F.3d at 1086-87 n.6 (B. Fletcher, J., dissenting) (recognizing that "[a] computer search in a forensic lab will always be equivalent to an identical search at the border. The duration of a computer search is not controlled by where the search is conducted. The duration of a computer search is controlled by what one is looking for and how one goes about searching for it.") (emphasis in original). The search would have been every bit as intrusive had Agent Owen traveled to the border with his forensic equipment. Indeed, Agent Owen had a laptop with forensic software that he could have used to conduct an examination at the port of entry itself, although he testified it would have been a more time-consuming effort. To carry out the examination of Cotterman's laptop, Agent Owen used computer forensic software to copy the hard drive and then analyze it in its entirety, including data that ostensibly had been deleted. This painstaking analysis is akin to reading a diary line by 8 The concurrence goes to great lengths to "refute any such notion" that location and duration contributed to our holding reasonable suspicion required here. Concurrence at 40-43. We see no reason for such an exegesis; our opinion is clear on the point that these factors are not at issue. App. 17 line looking for mention of criminal activity--plus looking at everything the writer may have erased.9 Notwithstanding a traveler's diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment's reasonableness requirement, which considers the nature and scope of the search. Significantly, the Supreme Court has recognized that the "dignity and privacy interests of the person being searched" at the border will on occasion demand "some level of suspicion in the case of highly intrusive searches of the person." Flores-Montano, 541 U.S. at 152. Likewise, the Court has explained that "some searches of property are so destructive," "particularly offensive," or overly intrusive in the manner in which they are carried out as to require particularized suspicion. Id. at 152, 154 n.2, 155-56; Montoya de Hernandez, 473 U.S. at 541. The Court has never defined the precise dimensions of a reasonable border search, instead pointing to the necessity of a case-by-case analysis. A s w e h a v e emphasized, "[r]easonableness, when used in the context of a border search, is incapable of comprehensive definition or of mechanical application." Duncan, 693 F.2d at 977 (internal quotation marks and citation omitted). 9 Agent Owen used a software program called EnCase that exhibited the distinctive features of computer forensic examination. The program copied, analyzed, and preserved the data stored on the hard drive and gave the examiner access to far more data, including password-protected, hidden or encrypted, and deleted files, than a manual user could access. App. 18 Over the past 30-plus years, the Supreme Court has dealt with a handful of border cases in which it reaffirmed the border search exception while, at the same time, leaving open the question of when a "particularly offensive" search might fail the reasonableness test. The trail begins with United States v. Ramsey, where the Court reserved judgment on this question: "We do not decide whether, and under what circumstances, a border search might be deemed 'unreasonable' because of the particularly offensive manner in which it is carried out." 431 U.S. at 618 n.13. Of note, the Court cited two cases, albeit nonborder cases, as examples: Kremen v. United States, 353 U.S. 346, 347-48 (1957) (holding unconstitutional an exhaustive warrantless search of a cabin and seizure of its entire contents that were moved 200 miles away for examination) and Go-Bart Importing Co. v. United States, 282 U.S. 344, 358 (1931) (condemning as "lawless invasion of the premises and a general exploratory search" a warrantless "unlimited search, ransackingthe desk, safe, filing cases and other parts of [an] office"). Less than ten years later, in 1985, the Court observed that it had "not previously decided what level of suspicion would justify a seizure of an incoming traveler for purposes other than a routine border search" and then went on to hold in the context of an alimentary canal search that reasonable suspicion was required for "the detention of a traveler at the border, beyond the scope of a routine customs search and inspection." Montoya de Hernandez, 473 U.S. at 540-41. The Court's reference to "routine border search" was parsed in a later case, Flores-Montano, where the Court explained that "the reasons that might App. 19 support a requirement of some level of suspicion in the case of highly intrusive searches of the person--dignity and privacy interests of the person being searched--simply do not carry over to vehicles," and, more specifically, to the gas tank of a car. 541 U.S. at 152. Accordingly, the Court rejected a privacy claim vis-a-vis an automobile gas tank. We are now presented with a case directly implicating substantial personal privacy interests. The private information individuals store on digital devices--their personal "papers" in the words of the Constitution--stands in stark contrast to the generic and impersonal contents of a gas tank. See, e.g., United States v. Jones, 132 S. Ct. 945, 957 (2012) (Sotomayor, J., concurring) (expressing "doubt that people would accept without complaint the warrantless disclosure to the Government of a list of every Web site they had visited in the last week, or month, or year"). We rest our analysis on the reasonableness of this search, paying particular heed to the nature of the electronic devices and the attendant expectation of privacy. The amount of private information carried by international travelers was traditionally circumscribed by the size of the traveler's luggage or automobile. That is no longer the case. Electronic devices are capable of storing warehouses full of information. The average 400-gigabyte laptop hard drive can store over 200 million pages--the equivalent of five floors of a typical academic library. See Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 542 (2005) (explaining that an 80 GB hard drive is equivalent to 40 million pages or one floor of an App. 20 academic library); see also LexisNexis, How Many Pages in a Gigabyte?, http://www.lexisnexis.com/ applieddiscovery/lawlibrary/whitePapers/ADI_FS_Pa gesInAGigabyte.pdf. Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.10 The nature of the contents of electronic devices differs from that of luggage as well. Laptop computers, iPads and the like are simultaneously offices and personal diaries. They contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails. This type of material implicates the Fourth Amendment's specific guarantee of the people's right to be secure in their "papers." U.S. Const. amend. IV. The express listing of papers "reflects the Founders' deep concern with safeguarding the privacy of thoughts and ideas--what we might call freedom of conscience--from invasion by the government." Seljan, 547 F.3d at 1014 (Kozinski, C.J., dissenting); see also New York v. P.J. Video, Inc., 475 U.S. 868, 873 (1986). These records are expected to be kept private and this expectation is "one that society is prepared to recognize 10 We are puzzled by the dissent's speculation about "how many gigabytes of storage [one must] buy to secure the guarantee that reasonable suspicion will be required before one's devices are searched." Dissent at 68. We discuss the typical storage capacity of electronic devices simply to highlight the features that generally distinguish them from traditional baggage. Indeed, we do not and need not determine whether Cotterman's laptop possessed unusually large or simply "average" capacity in order to resolve that the forensic examination of it required reasonable suspicion. App. 21 as 'reasonable.'" Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring).11 Electronic devices often retain sensitive and confidential information far beyond the perceived point of erasure, notably in the form of browsing histories and records of deleted files. This quality makes it impractical, if not impossible, for individuals to make meaningful decisions regarding what digital content to expose to the scrutiny that accompanies international travel. A person's digital life ought not be hijacked simply by crossing a border. When packing traditional luggage, one is accustomed to deciding what papers to take and what to leave behind. When carrying a laptop, tablet or other device, however, removing files unnecessary to an impending trip is an impractical solution given the volume and often intermingled nature of the files. It is also a time-consuming task that may not even effectively erase the files. The present case illustrates this unique aspect of electronic data. Agents found incriminating files in the unallocated space of Cotterman's laptop, the space where the computer stores files that the user ostensibly deleted and maintains other "deleted" files retrieved from web sites the user has visited. Notwithstanding the attempted erasure of material or the transient 11 The dissent's discussion about Facebook and other platforms where the user voluntarily transmits personal data over the Internet, often oblivious to privacy issues, Dissent at 65-66, is a red herring. Of course, willful disclosure of electronic data, like disclosure of other material, undercuts an individual's expectation of privacy. But there was no such disclosure here. Nor does the border search implicate such an affirmative disclosure. App. 22 nature of a visit to a web site, computer forensic examination was able to restore the files. It is as if a search of a person's suitcase could reveal not only what the bag contained on the current trip, but everything it had ever carried. With the ubiquity of cloud computing, the government's reach into private data becomes even more problematic.12 In the "cloud," a user's data, including the same kind of highly sensitive data one would have in "papers" at home, is held on remote servers rather than on the device itself. The digital device is a conduit to retrieving information from the cloud, akin to the key to a safe deposit box. Notably, although the virtual "safe deposit box" does not itself cross the border, it may appear as a seamless part of the digital device when presented at the border. With access to the cloud through forensic examination, a traveler's cache is just a click away from the government. As Justice Scalia wrote, "It would be foolish to contend that the degree of privacy secured to citizens 12 "The term 'cloud computing' is based on the industry usage of a cloud as a metaphor for the ethereal internet. . . . An external cloud platform is storage or software access that is essentially rented from (or outsourced to) a remote public cloud service provider, such as Amazon or Google. . . . By contrast, an internal or private cloud is a cluster of servers that is networked behind an individual or company's own firewall." David A. Couillard, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 Minn. L. Rev. 2205, 2216 (2009) (internal citations omitted). App. 23 by the Fourth Amendment has been entirely unaffected by the advance of technology." Kyllo, 533 U.S. at 33-34. Technology has the dual and conflicting capability to decrease privacy and augment the expectation of privacy. While the thermal imaging device in Kyllo threatened to expose the hour at which "the lady of the house" took her daily "sauna and bath," id. at 38, digital devices allow us to carry the very papers we once stored at home. The point is technology matters. The Department of Homeland Security has acknowledged as much in the context of international travelers: Where someone may not feel that the inspection of a briefcase would raise significant privacy concerns because the volume of information to be searched is not great, that same person may feel that a search of their laptop increases the possibility of privacy risks due to the vast amount of information potentially available on electronic devices. DHS, Privacy Impact Assessment for the Border Searches of Electronic Devices 2 (Aug. 25, 2009), available at http://www.dhs.gov/xlibrary/assets/privacy /privacy_pia_cbp_laptop.pdf. This is not to say that simply because electronic devices house sensitive, private information they are off limits at the border. The relevant inquiry, as always, is one of reasonableness. But that reasonableness determination must account for differences in property. See Samson v. California, 547 U.S. 843, 848 (2006) ("Under our general Fourth App. 24 Amendment approach, we examine the totality of the circumstances to determine whether a search is reasonable . . . .") (internal quotation marks, citation, and alterations omitted) (emphasis added). Unlike searches involving a reassembled gas tank, FloresMontano, 541 U.S. at 150, or small hole in the bed of a pickup truck, United States v. Chaudhry, 424 F.3d 1051, 1054 (9th Cir. 2005), which have minimal or no impact beyond the search itself--and little implication for an individual's dignity and privacy interests--the exposure of confidential and personal information has permanence. It cannot be undone. Accordingly, the uniquely sensitive nature of data on electronic devices carries with it a significant expectation of privacy and thus renders an exhaustive exploratory search more intrusive than with other forms of property. After their initial search at the border, customs agents made copies of the hard drives and performed forensic evaluations of the computers that took days to turn up contraband. It was essentially a computer strip search. An exhaustive forensic search of a copied laptop hard drive intrudes upon privacy and dignity interests to a far greater degree than a cursory search at the border. It is little comfort to assume that the government--for now--does not have the time or resources to seize and search the millions of devices that accompany the millions of travelers who cross our borders. It is the potential unfettered dragnet effect that is troublesome. We recognize the important security concerns that prevail at the border. The government's authority to protect the nation from contraband is well established and may be "heightened" by "national cris[e]s," such as App. 25 the smuggling of illicit narcotics, Montoya de Hernandez, 473 U.S. at 538, the current threat of international terrorism and future threats yet to take shape. But even in the face of heightened concerns, we must account for the Fourth Amendments rights of travelers. Id. at 539. The effort to interdict child pornography is also a legitimate one. But legitimate concerns about child pornography do not justify unfettered crime-fighting searches or an unregulated assault on citizens' private information. Reasonable suspicion is a modest, workable standard that is already applied in the extended border search, Terry stop,13 and other contexts. Its application to the forensic examination here will not impede law enforcement's ability to monitor and secure our borders or to conduct appropriate searches of electronic devices. Nor does applying this standard impede the deterrent effect of suspicionless searches, which the dissent contends is critical to thwarting savvy terrorists and other criminals. Dissent at 63. The Supreme Court has never endorsed the proposition that the goal of deterring illegal contraband at the border suffices to justify any manner of intrusive search. Rather, reasonableness remains the touchstone and the Court has expressed support for the deterrence value of suspicionless searches of a routine nature, such as vehicle checkpoints near the border. See United States v. Martinez-Fuerte, 428 U.S. 543, 556 (1976) ("We note here only the substantiality of the public interest in the 13 Terry v. Ohio, 392 U.S. 1, 30 (1983). App. 26 practice of routine stops for inquiry at permanent checkpoints, a practice which the Government identifies as the most important of the traffic-checking operations.") (emphasis added). In practical terms, suspicionless searches of the type approved in Arnold will continue; border officials will conduct further, forensic examinations where their suspicions are aroused by what they find or by other factors. Reasonable suspicion leaves ample room for agents to draw on their expertise and experience to pick up on subtle cues that criminal activity may be afoot. See United States v. Tiong, 224 F.3d 1136, 1140 (9th Cir. 2000).14 We have confidence in the ability of law enforcement to distinguish a review of computer files from a forensic examination. We do not share the 14 The greatest obstacle to ferreting out contraband at the border has always been the sheer number of international travelers. Any contention that national security will be critically hampered by stripping border agents of a critical law enforcement tool--suspicionless forensic examinations of electronics--is undermined by the fact that, as a matter of commonsense and resources, it is only when reasonable suspicion is aroused that such searches typically take place. See, e.g., Chaudhry, 424 F.3d at 1054 (B. Fletcher, J., concurring) ("As a practical matter, border agents are too busy to do extensive searches (removing gas tanks and door panels, boring holes in truck beds) unless they have suspicion."). As Judge Callahan acknowledges in her separate opinion, the record suggests that "remote and/or intensive searches of electronic devices crossing the border do not occur all that often." Concurrence at 50 n.11. The reference that only a small fraction of travelers at the border have their devices searched simply reinforces our point--our ruling will not place an undue burden on border agents who already rely on a degree of suspicion in referring travelers to secondary inspection. App. 27 alarm expressed by the concurrence and the dissent that the standard we announce will prove unmanageable or give border agents a "Sophie's choice" between thorough searches and Bivens actions. Concurrence at 48-49; Dissent at 65. Determining whether reasonable suspicion is required does not necessitate a "complex legal determination[]" to be made on a "moment-by-moment basis." Dissent at 61. Rather, it requires that officers make a commonsense differentiation between a manual review of files on an electronic device and application of computer software to analyze a hard drive, and utilize the latter only when they possess a "particularized and objective basis for suspecting the person stopped of criminal activity." Tiong, 224 F.3d at 1140 (internal quotation marks omitted). International travelers certainly expect that their property will be searched at the border. What they do not expect is that, absent some particularized suspicion, agents will mine every last piece of data on their devices or deprive them of their most personal property for days (or perhaps weeks or even months, depending on how long the search takes). United States v. Ramos-Saenz, 36 F.3d 59, 61 n.3 (9th Cir. 1994) ("Intrusiveness includes both the extent of a search as well as the degree of indignity that may accompany a search."). Such a thorough and detailed search of the most intimate details of one's life is a substantial intrusion upon personal privacy and dignity. We therefore hold that the forensic examination of Cotterman's computer required a showing of reasonable suspicion, a modest requirement in light of the Fourth Amendment. App. 28 IV. REASONABLE SUSPICION Reasonable suspicion is defined as "a particularized and objective basis for suspecting the particular person stopped of criminal activity." United States v. Cortez, 449 U.S. 411, 417-18 (1981). This assessment is to be made in light of "the totality of the circumstances." Id. at 417. "[E]ven when factors considered in isolation from each other are susceptible to an innocent explanation, they may collectively amount to a reasonable suspicion." United States v. Berber-Tinoco, 510 F.3d 1083, 1087 (9th Cir. 2007). We review reasonable suspicion determinations de novo, reviewing findings of historical fact for clear error and giving "due weight to inferences drawn from those facts by resident judges and local law enforcement officers." Ornelas v. United States, 517 U.S. 690, 699 (1996). In the district court and in supplemental briefing, the government argued that the border agents had reasonable suspicion to conduct the initial search and the forensic examination of Cotterman's computer. We agree. The objective facts reflect that both the agents at the border and the agents who arrived later from Sells based their decision to search Cotterman's belongings on the TECS hit. Officer Alvarado was told by those in charge of administering the TECS database that he should search Cotterman's property because the TECS hit indicated "that [Cotterman] appeared to [have] been involved in some type of child pornography." Agent Riley also looked up Cotterman's criminal record and understood that he had a prior conviction for child pornography. As it turned out, Cotterman's previous App. 29 conviction was not for pornography, but for child molestation. Nonetheless, the agents' understanding of the objective facts, albeit mistaken, is the baseline for determining reasonable suspicion. See Liberal v. Estrada, 632 F.3d 1064, 1077 (9th Cir. 2011) ("Even if an officer makes a mistake of fact, that mistake 'will not render a stop illegal, if the objective facts known to the officer gave rise to a reasonable suspicion that criminal activity was afoot.'" (quoting United States v. Mariscal, 285 F.3d 1127, 1131 (9th Cir. 2002))). By itself, Cotterman's 1992 conviction for child molestation does not support reasonable suspicion to conduct an extensive forensic search of his electronic devices. "Although a prior criminal history cannot alone establish reasonable suspicion . . . it is permissible to consider such a fact as part of the total calculus of information in th[at] determination[]." Burrell v. McIlroy, 464 F.3d 853, 858 n.3 (9th Cir. 2006). The TECS alert was not based merely on Cotterman's conviction--the agents were aware that the alert targeted Cotterman because he was a sex offender "who travel[ed] frequently out of the country" and who was "possibly involved in child sex tourism." Further, Agent Riley testified that an examination of Cotterman's passport confirmed that he had traveled in and out of the country frequently since his conviction in 1992. In further support of reasonable suspicion, the government asserts that Mexico, from which the Cottermans were returning, is "a country associated App. 30 with sex tourism."15 The ICE field office specifically informed Agent Riley that the alert was part of Operation Angel Watch, which targeted individuals potentially involved in sex tourism and alerted officials to be on the lookout for laptops, cameras and other paraphernalia of child pornography. See 156 Cong. Rec. S9581-03 (daily ed. Dec. 14, 2010) (describing Operation Angel Watch as a program "help[ing] ICE [to] identify travel patterns of convicted sex offenders who may attempt to exploit children in foreign countries"). Cotterman's TECS alert, prior childrelated conviction, frequent travels, crossing from a country known for sex tourism, and collection of electronic equipment, plus the parameters of the Operation Angel Watch program, taken collectively, gave rise to reasonable suspicion of criminal activity. To these factors, the government adds another--the existence of password-protected files on Cotterman's computer.16 We are reluctant to place much weight on this factor because it is commonplace for business travelers, casual computer users, students and others to password protect their files. Law enforcement 15 It is ironic that the dissent expresses concern that, by factoring in the incidence of crime in particular countries, "thousands of individuals . . . will now be forced to reconsider traveling to entire countries . . . or will need to leave all their electronic equipment behind, to avoid arousing a 'reasonable' suspicion," Dissent at 78, when, if forensic examination of those travelers' electronics occurs at the border, the dissent would require no suspicion at all. 16 Agent Riley testified that Alvarado told her that he had "encounter[ed] some files that were password protected," while Agent Alvarado testified that he found one file. App. 31 "cannot rely solely on factors that would apply to many law-abiding citizens," Berber-Tinoco, 510 F.3d at 1087, and password protection is ubiquitous. National standards require that users of mobile electronic devices password protect their files. See generally United States Department of Commerce, Computer Security Division, National Institute of Standards and Technology, Computer Security (2007) (NIST Special Publication 800-111). Computer users are routinely advised--and in some cases, required by employers--to protect their files when traveling overseas. See, e.g., Michael Price, National Security Watch, 34-MAR Champion 51, 52 (March 2010) ("[T]here is one relatively simple thing attorneys can do [when crossing the border] to protect their privacy and the rights of their clients: password-protect the computer login and any sensitive files or folders."). Although password protection of files, in isolation, will not give rise to reasonable suspicion, where, as here, there are other indicia of criminal activity, password protection of files may be considered in the totality of the circumstances.17 To contribute to reasonable suspicion, encryption or password protection of files must have some relationship to the suspected criminal activity. Here, making illegal files difficult to access makes perfect sense for a suspected holder of child pornography. When combined with the 17 We do not suggest that password protecting an entire device--as opposed to files within a device--can be a factor supporting a reasonable suspicion determination. Using a password on a device is a basic means of ensuring that the device cannot be accessed by another in the event it is lost or stolen. App. 32 other circumstances, the fact that Officer Alvarado encountered at least one password protected file on Cotterman's computer contributed to the basis for reasonable suspicion to conduct a forensic examination. The existence of the password-protected files is also relevant to assessing the reasonableness of the scope and duration of the search of Cotterman's computer. The search was necessarily protracted because of the password protection that Cotterman employed. After Cotterman failed to provide agents with the passwords to the protected files and fled the country, it took Agent Owen days to override the computer security and open the image files of child pornography. Although we must take into account factors weighing both in favor and against reasonable suspicion, Cotterman's innocent explanation does not tip the balance. See Tiong, 224 F.3d at 1140 (recognizing that "innocent possibilities . . . do not undermine reasonable suspicion"). The dissent suggests that Cotterman's offer at the border "to help the agents access his computer" counsels against a finding of reasonable suspicion. Dissent at 80. The agents were appropriately wary of such an offer due to concerns that Cotterman could tamper with the devices. Nor did the agents' discovery of vacation photos eliminate the suspicion that Cotterman had engaged in criminal activity while abroad or might be importing child pornography into the country. Because the first examination of Cotterman's laptop, by Officer Alvarado, turned up nothing incriminating, Cotterman urges that any suspicion prompted by the TECS alert was dispelled by this initial failure. But the nature of the alert on Cotterman, directing agents to review App. 33 media and electronic equipment for child pornography, justified conducting the forensic examination despite the failure of the first search to yield any contraband. Collectors of child pornography can hardly be expected to clearly label such files and leave them in readily visible and accessible sections of a computer's hard drive, particularly when they are traveling through border crossings, where individuals ordinarily anticipate confronting at least a cursory inspection. Officer Alvarado, who was responsible for conducting the initial search, was specifically looking for photographs as described in the TECS hit but testified that he had only a slightly above-average familiarity with laptops. He could do no more than open a file, look at it and see if he could access it. He testified that "[i]f [he] encountered something that [he] could not access, then [he] would reference it to somebody that may have that ability to look at [it]." That is precisely what occurred here. Officer Alvarado came across passwordprotected files but, unable to open them, moved on to other files. Alvarado told Agent Riley about the password protection, and she and Agent Brisbine decided to seize the computers for further examination. The border agents "certainly had more than an inchoate and unparticularized suspicion or hunch" of criminal activity to support their decision to more carefully search for evidence of child pornography. Montoya de Hernandez, 473 U.S. at 542 (internal quotation marks and citation omitted). An alert regarding possession of this type of criminal contraband justified obtaining additional resources, here available in Tucson, to properly determine whether illegal files were present. App. 34 Unlike the dissent, we credit the agents' observations and experience in acting upon significant myriad factors that support reasonable suspicion. It is not our province to nitpick the factors in isolation but instead to view them in the totality of the circumstances. For the above reasons, we conclude that the examination of Cotterman's electronic devices was supported by reasonable suspicion and that the scope and manner of the search were reasonable under the Fourth Amendment. Cotterman's motion to suppress therefore was erroneously granted. REVERSED. CALLAHAN, Circuit Judge, concurring in part, dissenting in part, and concurring in the judgment, with whom CLIFTON, Circuit Judge, joins, and with whom M. SMITH, Circuit Judge, joins as to all but Part II.A: Whether it is drugs, bombs, or child pornography, we charge our government with finding and excluding any and all illegal and unwanted articles and people before they cross our international borders. Accomplishing that Herculean task requires that the government be mostly free from the Fourth Amendment's usual restraints on searches of people and their property. Today the majority ignores that reality by erecting a new rule requiring reasonable suspicion for any thorough search of electronic devices entering the United States. This rule flouts more than a century of Supreme Court precedent, is unworkable and unnecessary, and will severely hamstring the government's ability to protect our borders. App. 35 I therefore dissent from Part III of the majority's opinion. I concur in Parts I, II, and IV, and in particular the majority's conclusion in Part IV that the government had reasonable suspicion to conduct the forensic examination of Howard Cotterman's electronic devices. I therefore also concur in the judgment. I. Over the last 125 years, the Supreme Court has explained that the United States and its people have a "paramount interest" in national self-protection and an "inherent" right to exclude illegal and "unwanted persons and effects." United States v. Flores-Montano, 541 U.S. 149, 152-53 (2004); see also United States v. Montoya de Hernandez, 473 U.S. 531, 537-40 (1985); United States v. Ramsey, 431 U.S. 606, 616-18 (1977); United States v. Thirty-Seven (37) Photographs, 402 U.S. 363, 376 (1971); Carroll v. United States, 267 U.S. 132, 154 (1925); Boyd v. United States, 116 U.S. 616, 623 (1886). Accordingly, "[t]he Government's interest in preventing the entry of unwanted persons and effects is at its zenith at the international border." Flores-Montano, 541 U.S. at 152. To effectuate this interest, the Supreme Court has recognized a broad exception to the Fourth Amendment's requirement of probable cause or a warrant for searches conducted at the border. Under that exception, searches of people and their property at the United States borders and their functional equivalents are per se reasonable, meaning that they typically do not require a warrant, probable cause, or even reasonable suspicion. Montoya de Hernandez, 473 U.S. at 538; see also Flores-Montano, 541 U.S. at App. 36 152-53; Ramsey, 431 U.S. at 616-18; United States v. Seljan, 547 F.3d 993, 999-1000 (9th Cir. 2008) (en banc), cert. denied, 129 S. Ct. 1368 (2009). In the long time that the Court has recognized the border search doctrine, the Court has found just one search at the border that required reasonable suspicion. See Montoya de Hernandez, 473 U.S. at 541 (upholdingthe 24-hour detention of a woman suspected of smuggling illegal drugs in her digestive system, followed by a pregnancy test and rectal examination, based on reasonable suspicion). In the remaining cases, the Court consistently has described the government's border search authority in very broad terms1 and 1 See, e.g., Flores-Montano, 541 U.S. at 152 ("The Government's interest in preventing the entry of unwanted persons and effects is at its zenith at the international border."); id. at 153 ("It is axiomatic that the United States, as sovereign, has the inherent authority to protect, and a paramount interest in protecting, its territorial integrity."); Ramsey, 431 U.S. at 617 ("This interpretation, that border searches were not subject to the warrant provisions of the Fourth Amendment and were 'reasonable' within the meaning of that Amendment, has been faithfully adhered to by this Court."); id. at 620 ("The bordersearch exception is grounded in the recognized right of the sovereign to control, subject to substantive limitations imposed by the Constitution, who and what may enter the country."); ThirtySeven (37) Photographs, 402 U.S. at 376 ("[A traveler's] right to be let alone neither prevents the search of his luggage nor the seizure of unprotected, but illegal, materials when his possession of them is discovered during such a search. Customs officers characteristically inspect luggage and their power to do so is not questioned in this case; it is an old practice and is intimately associated with excluding illegal articles from the country."); Carroll, 267 U.S. at 154 ("Travelers may be so stopped in crossing an international boundary because of national self-protection App. 37 overturned the lower courts' attempts to cabin that authority.2 The Court also repeatedly has gone out of its way to explain that border searches generally are exempt from the limits it imposes on domestic searches. See, e.g., Flores-Montano, 541 U.S. at 154 ("[O]n many occasions, we have noted that the expectation of privacy is less at the border than it is in the interior."); Montoya de Hernandez, 473 U.S. at 539-40 ("But not only is the expectation of privacy less at the border than in the interior, the Fourth Amendment balance between the interests of the Government and the privacy right of the individual is also struck much more favorably to the Government at the border." (internal and external citations omitted)); United States v. 12 200-Foot Reels of Super 8mm. Film, 413 U.S. 123, 125 (1973) ("Import restrictions and searches of persons or packages at the national borders reasonably requiring one entering the country to identify himself as entitled to come in, and his belongings as effects which may be lawfully brought in."). Even in Montoya de Hernandez the Court described the government's border search authority expansively. See 473 U.S. at 539-40, 542-44. 2 See, e.g., Flores-Montano, 541 U.S. at 152-55 (overturning the Ninth Circuit's conclusion that the border search of a gas tank required reasonable suspicion); Ramsey, 431 U.S. at 616-22 (overturning the D.C. Circuit's conclusion that the search of international mail required probable cause); Thirty-Seven (37) Photographs, 402 U.S. at 376 (relying in part on border search doctrine to overturn lower court's decision that statute barring the importation of obscene material was unconstitutional). App. 38 rest on different considerations and different rules of constitutional law from domestic regulations.").3 II. It is against this legal backdrop that we must assess the constitutionality of the government's search in this case. As with all searches subject to Fourth Amendment review, the constitutionality of a border search turns on whether it is reasonable. See Brigham City, Utah v. Stuart, 547 U.S. 398, 403 (2006) ("[T]he ultimate touchstone of the Fourth Amendment is 'reasonableness.'"). Under the border search doctrine, suspicionless border searches are per se reasonable. However, the Supreme Court has identified three situations in which they might not be per se reasonable, i.e., at least reasonable suspicion is required: 3 See also City of Indianapolis v. Edmond, 531 U.S. 32, 47-48 (2000) (explaining that decision barring domestic drug interdiction checkpoints "does not affect the validity of border searches or searches at places like airports"); United States v. Ross, 456 U.S. 798, 823 (1982) (explaining that while the Fourth Amendment gives protection to containers in domestic vehicles,"[t]he luggage carried by a traveler entering the country may be searched at random by a customs officer"); Torres v. Puerto Rico, 442 U.S. 465, 472-74 (1979) (distinguishing between United States-Puerto Rico border and international borders in holding unconstitutional the search of a traveler's luggage without "articulable suspicion"); United States v. Brignoni-Ponce, 422 U.S. 873, 884 (1975) ("Except at the border and its functional equivalents, officers on roving patrol may stop vehicles" only with reasonable suspicion they contain illegal aliens); Almeida-Sanchez v. United States, 413 U.S. 266, 272-76 (1973) (distinguishing searches of vehicles at the border from a search that occurred 25 miles away); Carroll, 267 U.S. at 151-54 (distinguishing between interior and border searches of vehicles and persons). App. 39 (1) "highly intrusive searches of the person;" (2) destructive searches of property; and (3) searches conducted in a "particularly offensive" manner. FloresMontano, 541 U.S. at 152-56 & n.2. Although its opinion is not entirely clear, the majority appears to rely on the first and third exceptions to hold that the search at issue in this case required reasonable suspicion. (There is no claim that the government damaged or destroyed Cotterman's property.) But the exception for "highly intrusive searches of the person," Flores-Montano, 541 U.S. at 152, cannot apply here; "papers," even private ones in electronic format, are not a "person." See id. ("The reasons that might support a requirement of some level of suspicion in the case of highly intrusive searches of the person--dignity and privacy interests of the person being searched--simply do not carry over to vehicles."). That leaves the exception for searches conducted in a "particularly offensive" manner. Id. at 154 n.2. The majority relies primarily on the notion that electronic devices are special to conclude that reasonable suspicion was required. Majority at 20-28. The majority is mistaken. A. The majority correctly concludes that the government's forensic search in Tucson was not an extended border search, as the border agents retained custody of Cotterman's laptop.4 Id. at 9, 14-15. The 4 I agree with the majority that this case does not involve an extended border search. Unlike a border search, an extended App. 40 majority also states that "[i]t is the comprehensive and intrusive nature of a forensic examination--not the location of the examination--that is the key factor triggering the requirement of reasonable suspicion here." Majority at 17. The inclusion of the word "key" might be read to imply that some other factor, such as the location and duration of the search, contributed to its purported unreasonableness. I write to refute any such notion. First consider the facts. The border agents took Cotterman's electronic devices to the nearest computing center (to Tucson, where Cotterman and his wife were already traveling), before clearing them for entry into the United States. The computer specialist moved the search ahead of his other work and border search takes place at a location "away from the border where entry is not apparent, but where the dual requirements of reasonable certainty of a recent border crossing and reasonable suspicion of criminal activity are satisfied." United States v. Guzman-Padilla, 573 F.3d 865, 878-79 (9th Cir. 2009) (internal quotation marks and citation omitted), cert. denied, 131 S. Ct. 67 (2010). Reasonable suspicion is required precisely because the individual has regained an expectation of privacy by moving away from the border. See United States v. Villasenor, 608 F.3d 467, 471-72 (9th Cir.), cert. denied, 131 S. Ct. 547 (2010); United States v. Whiting, 781 F.2d 692, 695 (9th Cir. 1986). Here, there was no attenuation between Cotterman's border crossing and the forensic search of his electronic property; the government conducted that search before clearing the property for entry and before Cotterman could regain an expectation of privacy in that property. See 19 U.S.C. ? 1499 (providing that imported goods are permitted entry only after Customs clears them); United States v. Alfonso, 759 F.2d 728, 734 (9th Cir. 1985) ("Extended border searches occur after the actual entry has been effected and intrude more on an individual's normal expectation of privacy."). App. 41 conducted it over the weekend. Although the forensic search lasted five days, it took only 48 hours to discover the initial 75 images of child pornography. The agents were reasonably reluctant to rely on Cotterman's offer to help, since he might have deleted or otherwise made unrecoverable any contraband that his devices contained. The agents returned the devices as soon as they cleared them. Now consider the law. The Supreme Court has upheld the constitutionality of a police search of packages retrieved from an automobile, even though the police conducted their search three days after the police stopped the vehicle and at the police station. United States v. Johns, 469 U.S. 478, 485-88 (1985). The Court rejected the argument that "searches of containers discovered in the course of a vehicle search are subject to temporal restrictions not applicable to the vehicle search itself." Id. at 485. Although Johns involved a domestic automobile search based on probable cause, it still stands for the proposition, equally applicable to this case, that "the legality of the search was determined by reference to the [applicable] exception to the warrant requirement." Id. In the border search context, the Supreme Court, in upholding the lengthy detention of a person reasonably suspected of smuggling drugs in her digestive system at an airport, addressed whether that detention was "reasonably related in scope to the circumstances which justified it initially." Montoya de Hernandez, 473 U.S. at 542. The Court explained that: (1) "courts should not indulge in unrealistic second-guessing" when answering this question, as "[a]uthorities must be allowed to graduate their response to the demands of App. 42 any particular situation;" (2) the Court consistently has "refused to charge police with delays in investigatory detention attributable to the suspect's evasive actions;" and (3) "we have also consistently rejected hard-andfast time limits." Id. at 542-43 (quotation marks and citations omitted). The Court emphasized that, at the international border, "the Fourth Amendment balance of interests leans heavily to the Government" because the government is charged not just with investigating crime but with "protecting this Nation from entrants who may bring anything harmful into this country." Id. at 544. Finally, any "length" or "discomfort" associated with a border search does not offend the Fourth Amendment when it "result[s] solely from the method by which [a traveler] cho[oses] to smuggle [contraband] into this country." Id. Any suggestion that the government's search here was "particularly offensive" due to the location and duration of the search runs counter to the Supreme Court's admonitions in Johns and Montoya de Hernandez. It also effectively requires the government to supply every port of entry with the equipment and staff needed to conduct forensic electronic searches, or at least to have such equipment and staff waiting at a nearby location. Such a requirement is unreasonable, particularly since the record in this case suggests that a forensic search of Cotterman's electronic devices at the border station would have taken longer than the search at the Tucson computing center.5 See United 5 The district court found that the government could have conducted the forensic search at the Lukeville border station. United States v. Cotterman, No. CR 07-1207-TUC-RCC, 2009 WL App. 43 States v. Hill, 459 F.3d 966, 974-75 (9th Cir. 2006), cert. denied, 127 S. Ct. 1863 (2007) (discussing problems inherent in requiring police to bringwith them equipment to search electronic media); cf. Johns, 469 U.S. at 486-87 (explaining that requiring police officers to immediately inspect all packages "would be of little benefit to the person whose property is searched"). B. The majority's opinion turns primarily on the notion that electronic devices deserve special consideration because they are ubiquitous and can store vast quantities of personal information. That idea is fallacious and has no place in the border search context. The Supreme Court has been willing to distinguish only between border searches of people and property, not between different types of property. In 2004, in Flores-Montano, the Court explained that 465028, at *1 (D. Ariz. Feb. 24, 2009). The court presumably based this finding on testimony that the computer specialist who conducted the forensic examination had a specially-equipped laptop. However, the specialist testified that using his laptop at the border station, rather than transporting Cotterman's electronic devices to the Tucson computer center, would have taken "a lot longer" because the laptop was "not nearly as extensive as what I have in my lab," the "processor in my laptop is much slower" than the lab equipment, and "I could only do one computer at a time with the laptop." Technical difficulties also could have slowed down an examination conducted at the border station. App. 44 the reasons that might support a requirement of some level of suspicion in the case of highly intrusive searches of the person--dignity and privacy interests of the person being searched--simply do not carry over to vehicles. Complex balancing tests to determine what is a "routine" search of a vehicle, as opposed to a more "intrusive" search of a person, have no place in border searches of vehicles. 541 U.S. at 152. We have since applied Flores-Montano to hold that any distinction between "routine" and "nonroutine" searches does not apply to searches of property, and that there can be no "least restrictive means" test for border searches. United States v. Chaudhry, 424 F.3d 1051, 1054 (9th Cir. 2005), cert. denied, 547 U.S. 1083 (2006); United States v. CortezRocha, 394 F.3d 1115, 1122-23 (9th Cir. 2004), cert. denied, 546 U.S. 849 (2005).6 Put another way, the Supreme Court--and, reluctantly, this court--have refused to adopt a sliding "intrusiveness" scale for border searches of property. Thus, the Court has all but 6 In 1985, the Supreme Court wrote about the government's "plenary authority to conduct routine searches and seizures at the border." Montoya de Hernandez, 473 U.S. at 537 (emphasis added); see also id. at 541 n.4 ("Because the issues are not presented today we suggest no view on what level of suspicion, if any, is required for nonroutine border searches such as strip, body-cavity, or involuntary x-ray searches.") (emphasis added). We unfortunately seized on the word "routine" to establish a sliding scale of intrusiveness, with more intrusive (i.e., less "routine") searches requiring reasonable suspicion. See, e.g., United States v. MolinaTarazon, 279 F.3d 709, 711-13 (9th Cir. 2002). Flores-Montano plainly repudiated that approach. App. 45 held that property that crosses the border, whatever it is, does not merit Fourth Amendment protection. Of course, Flores-Montano, Chaudhry, and CortezRocha involved vehicles or parts of vehicles, not electronic devices, and the other border search cases that have reached the Supreme Court all involved containers of some sort. See, e.g., Ramsey, 431 U.S. at 616-22 (mail); Thirty-Seven (37) Photographs, 402 U.S. at 376 (luggage). And yes, the Court has left open the possibility that a border search might be "''unreasonable' because of the particularly offensive manner in which it is carried out.'" Flores-Montano, 541 U.S. at 154 n.2 (quoting Ramsey, 431 U.S. at 618 n.13). But is the mere fact that Cotterman chose to save his child pornography electronically, rather than print it out on paper, enough to invoke that exception? The two courts of appeals--including this court--that have had occasion to address whether electronic devices deserve special consideration have correctly concluded that they do not. In United States v. Arnold, 533 F.3d 1003, 1008-10 (9th Cir. 2008), cert. denied, 555 U.S. 1176 (2009), we held that laptops are like other property, relying on the reasoning and language in Flores-Montano, Chaudhry, and CortezRocha discussed above (among other cases). Similarly, in United States v. Ickes, 393 F.3d 501, 503-07 (4th Cir. 2005), the Fourth Circuit upheld an extensive border search of the defendant's laptop that revealed child pornography. Notably, the court held that the border agents had reasonable suspicion to search the defendant's laptop, but explained why that did not matter: App. 46 The agents did not inspect the contents of Ickes's computer until they had already discovered marijuana paraphernalia, photo albums of child pornography, a disturbing video focused on a young ball boy, and an outstanding warrant for Ickes's arrest. As a practical matter, computer searches are most likely to occur where--as here--the traveler's conduct or the presence of other items in his possession suggest the need to search further. However, to state the probability that reasonable suspicions will give rise to more intrusive searches is a far cry from enthroning this notion as a matter of constitutional law. The essence of border search doctrine is a reliance upon the trained observations and judgments of customs officials, rather than upon constitutional requirements applied to the inapposite context of this sort of search. Id. at 507. Thus, the Fourth Circuit has recognized what the majority does not: electronic devices are like any other container that the Supreme Court has held may be searched at the border without reasonable suspicion.7 Though we are not bound by Arnold nor Ickes in this en banc proceeding, we are bound by what the Supreme Court has said: in the unique context of border searches, property is property and we may not chip away at the government's authority to search it by adopting a sliding scale of intrusiveness. It's the border, not the technology, that "matters." Majority at 7 I agree with Judge Smith that the majority's opinion appears to create an imprudent split with the Fourth Circuit. See Dissent at 58. App. 47 24; cf. Ramsey, 431 U.S. at 620 ("It is clear that there is nothing in the rationale behind the border-search exception which suggests that the mode of entry will be critical."). Logic and commonsense, not just Supreme Court precedent, reveal the flaws in the majority's opinion. The fact that electronic devices are capable of storing a lot of personal information does not make an extensive search of them "particularly offensive." We have squarely rejected the idea that the "intrusiveness" of a search depends in whole or in part on the nature of the property being searched. In United States v. Giberson, 527 F.3d 882 (9th Cir. 2008), we specifically rebuffed the argument that computers are special for Fourth Amendment purposes by virtue of how much information they store; "neither the quantity of information, nor the form in which it is stored, is legally relevant in the Fourth Amendment context." Id. at 888; see also California v. Carney, 471 U.S. 386, 393-94 (1985) (rejecting applying Fourth Amendment protection to property (a mobile home) that is "capable of functioning as a home" simply on account of the property's size or "worth[iness]" as a container); United States v. Payton, 573 F.3d 859, 864 (9th Cir. 2009) ("Giberson held that computers were not entitled to a special categorical protection of the Fourth Amendment."); Kyllo v. United States, 533 U.S. 27, 41(2001) (Stevens, J., dissenting) (explaining that Fourth Amendment exceptions and distinctions based solely on a type of technology are "unwise[ ] and inconsistent with the Fourth Amendment"). While Giberson and Carney involved domestic searches, their reasoning applies equally in the border App. 48 search context. If the government may search the contents of a briefcase, car, or mobile home that transits the border, there is no reason it should not also be able to search the contents of a camera, tablet, or laptop that enters the country. All of those things are capable of storing, and often do store, private information. See Ross, 456 U.S. at 823 ("The luggage carried by a traveler entering the country may be searched at random by a customs officer; the luggage may be searched no matter how great the traveler's desire to conceal the contents may be." (emphasis added)). The majority points out that electronic devices can and usually do store much more private information than their non-electronic counterparts. Majority at 17-24. But "a port of entry is not a traveler's home," Thirty-Seven (37) Photographs, 402 U.S. at 376, even if a traveler chooses to carry a home's worth of personal information across it.8 Moreover, a 8 The element of choice is crucial. The fact that border searches occur at fixed times and checkpoints makes them inherently less intrusive; a person "with advance notice of the location of a permanent checkpoint has an opportunity to avoid the search entirely, or at least to prepare for, and limit, the intrusion on her privacy." Mich. Dep't of State Police v. Sitz, 496 U.S. 444, 463 (1990) (Stevens, J., dissenting); see also Montoya de Hernandez, 473 U.S. at 544 ("Respondent's detention was long, uncomfortable, indeed, humiliating; but both its length and its discomfort resulted solely from the method by which she chose to smuggle illicit drugs into this country."). The element of choice goes to the more fundamental issue of whether someone can have any reasonable expectation of privacy when he or she voluntarily carries electronic equipment across the border. Border officers are permitted to examine a written diary, and someone who wants to keep the contents of a diary secret App. 49 bright-line rule distinguishing electronic from nonelectronic devices--of the sort the Supreme Court has made clear has no place in Fourth Amendment jurisprudence, Ohio v. Robinette, 519 U.S. 33, 39 (1996)--is arbitrary; there is no reason someone carrying a laptop should receive greater privacy protection than someone who chooses (or can only afford) to convey his or her personal information on paper. In short, today the court erects a new bright-line rule: "forensic examination" of electronic devices "at the border requires reasonable suspicion." Majority at 17; see also id. at 21 n.10. The majority never defines "forensic," leaving border agents to wonder exactly what types of searches are off-limits.9 Even if the majority means to require reasonable suspicion for any type of digital forensic border search, no court has ever should know not to take it across the border. The same should be true for personal data stored on a laptop or other electronic device rather than a written diary. Moreover, the fact that the Fourth Amendment does not apply in foreign countries further weakens any claim to a reasonable expectation of privacy in property that crosses the United States border. Carrying an electronic device outside the United States almost always entails carrying it into another country, making it subject to search under that country's laws. Travelers expect these intrusions, or at least their possibility. 9 See Darrin J. Behr, Anti-Forensics: What it Does and Why You Need to Know, 255 N.J. Law. 9, 10 (Dec. 2008) ("Due to the fact that there are hundreds of digital forensic investigation procedures developed all over the world, digital forensics has yet to be defined."). App. 50 erected so categorical a rule, based on so general a type of search or category of property, and the Supreme Court has rightly slapped down anything remotely similar. The majority invites--indeed, requires--the Court to do so again.10 III. The majority's holding contravenes Supreme Court precedent, defies logic and commonsense, and is unworkable. It is also unnecessary and will impair the federal government's ability to protect our borders. As Judge Smith points out in his dissent, "[b]order patrol agents process hundreds of thousands of travelers each day and conduct thousands of searches on electronic devices each year." Dissent at 61-62 (citation omitted). All the evidence in this case suggests that the government does not have the resources--time, personnel, facilities, or technology--to exhaustively search every (or even a majority) of the electronic devices that cross our borders. Cf. Ickes, 393 F.3d at 507. Unless we somehow manage to solve our fiscal problems, and unless the government somehow manages to acquire better technology at a faster pace than the rest of us, these restraints will continue. That means border agents must prioritize who, what, and how they search. By and large, border agents will conduct forensic electronic searches of people who, like 10 I note that a case currently pending in the Sixth Circuit appears to raise similar issues as this case. See United States v. Stewart, No. 12-1427 (6th Cir. filed Apr. 5, 2012); see also United States v. Stewart, 715 F. Supp. 2d 750 (E.D. Mich. 2010). App. 51 Howard Cotterman, the agents reasonably suspect may be trying to carry illegal articles into, or themselves illegally enter, the country.11 That agents typically will have reasonable suspicion is, of course, "a far cry from enthroning this notion as a matter of constitutional law." Ickes, 393 F.3d at 507. The majority finds this reality check to be of "little comfort[;] [i]t is the potential unfettered dragnet effect that is troublesome." Majority at 25. But that abstract risk, which exists with any exception to the Fourth Amendment, does not justify a bright-line rule requiring reasonable suspicion for any thorough search of electronic devices entering the United States. See Robinette, 519 U.S. at 39 ("[W]e have consistently eschewed bright-line rules, instead emphasizing the 11 Testimony from the suppression hearing in this case suggests that remote and/or intensive searches of electronic devices crossing the border do not occur all that often. For example, the computer specialist who conducted the forensic search of Cotterman's laptop testified that the search was the first one he was asked to conduct in his 18 months on the job at the Tucson computer center. (He added that at his previous post at San Francisco International Airport, forensic searches were done right at the airport.) Similarly, one of the border agents testified that this was the first case he was aware of in which electronic devices were turned over to Immigrations and Customs Enforcement for forensic examination, and that even cursory reviews of laptops for information about illegal drug trading occurred "no more than five" times during agent's three-plus years at the Lukeville border station. See Michael Chertoff, Secretary of Homeland Security, Searches Are Legal, Essential, USA Today, July 16, 2008 ("Of the approximately 400 million travelers who entered the country last year, only a tiny percentage were referred to secondary baggage inspection for a more thorough examination. Of those, only a fraction had electronic devices that may have been checked."). App. 52 fact-specific nature of the reasonableness inquiry."); see also Lyng v. Nw. Indian Cemetery Protective Ass'n, 485 U.S. 439, 445 (1988) ("A fundamental and longstanding principle of judicial restraint requires that courts avoid reaching constitutional questions in advance of the necessity of deciding them."). Moreover, border agents are not free to undertake "unfettered crime-fighting searches or an unregulated assault on citizens' private information." Majority at 26. As I explained in my concurrence in Seljan, Congress and the Executive Branch have (and have exercised) the authority to restrict when and how border agents conduct searches. See Seljan, 547 F.3d at 1012 (Callahan, J., concurring) (citing, e.g., 19 U.S.C. ? 1583; 19 C.F.R. ? 145.3(b)-(c)); see also Yule Kim, Cong. Research Serv. RL34404, Border Searches of Laptop Computers and Other Electronic Storage Devices, 13-14 (2009) (describing recent legislative proposals to limit border searches of electronic devices). In a similar vein, Justice Breyer has noted that "Customs keeps track of the border searches its agents conduct, including the reasons for the searches. This administrative process should help minimize concerns that [border] searches might be undertaken in an abusive manner." Flores-Montano, 541 U.S. at 156 (Breyer, J., concurring) (internal citation omitted).12 12 See also U.S. Customs & Border Protection, Directive No. 3340049, Border Search of Electronic Devices Containing Information, 3-9 (2009) (describing procedures for, and limits on, border searches of electronic devices). App. 53 Apart from being unnecessary, the majority's new limits on the government's border search authority will make it much harder for border agents to do their jobs, for at least two reasons. First, it is common knowledge that border agents at security checkpoints conduct more thorough searches not simply of those persons who arouse suspicion but also of a percentage of travelers on a random basis. Otherwise, a person who appears entirely innocent will have nothing to fear and will not be deterred from carrying something that should not be brought into the country. A checkpoint limited to searches that can be justified by articulable grounds for "reasonable suspicion" is bound to be less effective. Second, courtesy of the majority's decision, criminals now know they can hide their child pornography or terrorist connections in the recesses of their electronic devices, while border agents, fearing Fourth Amendment or Bivens actions, will avoid conducting the searches that could find those illegal articles. The result will be that people and things we wish to keep out of our country will get in--a result hardly in keeping with our "inherent authority to protect, and a paramount interest in protecting," the "territorial integrity" of the United States. FloresMontano, 541 U.S. at 153. The border search doctrine must account for the fact that border agents may need time and forensics to bypass "evasive actions" a criminal has taken to hide contraband or other illegal articles from plain view. Montoya de Hernandez, 473 U.S. at 542-43. I would rather leave those difficult decisions "to the discretion of the officers in the field who confront myriad circumstances we can only begin to imagine from the relative safety of our chambers." App. 54 United States v. Williams, 419 F.3d 1029, 1034 (9th Cir.), cert. denied, 546 U.S. 1081 (2005).13 IV. The border search exception to the Fourth Amendment may be just that--an exception--but it is, and must be, a mighty one. The government's right and duty to protect our nation's territorial integrity demand that the government have clear authority to exclude--and thus to find--those people and things we have decided are offensive, threatening, or otherwise unwanted. Recognizing this, the Supreme Court has only once required reasonable suspicion for border searches in the 125 years it has been reviewing them. In the remaining cases, the Court has eschewed bright13 The majority insists that reasonable suspicion is a "modest, workable standard" that is applied in domestic stops of automobiles "and other contexts," and that still allows "agents to draw on their expertise and experience." Majority at 26, 27 n.14. The majority is wrong for at least three reasons. First, in making this argument, the majority reveals that it does not appreciate the crucial differences between domestic and border searches, despite those differences being spelled out in a century of case law. Those differences range from the legitimate expectation of privacy that people have in their property to the constraints government officials face in searching it. Second, a reasonable suspicion standard injects unnecessary judicial review where previously it was absent. Third, just because border agents could apply the reasonable suspicion standard does not mean they are, or should be, constitutionally compelled to do so. See Ickes, 393 F.3d at 507; cf. Seljan, 547 F.3d at 1011 (Callahan, J. concurring) (explaining that requiring border agents to apply a First Amendment exception to border searches "would require them to engage in the sort of decision-making process that the Supreme Court wished to avoid in sanctioning expansive border searches"). App. 55 line rules, balancing tests, and sliding intrusiveness scales, alluding to the possibility of, but never finding, a "particularly offensive" search. The fact that electronic devices can store large amounts of private information, or that the government can search them forensically, does not make a thorough search of such devices "particularly offensive." Rather, the Supreme Court and this court have wisely avoided making the reasonableness of a search turn on the nature of the property being searched, for the many reasons discussed above. The result has been a clear, wellunderstood, efficient, and effective rule that border searches are per se reasonable. Regrettably the majority, dispensing with these well-settled, sensible, and binding principles, lifts our anchor and charts a course for muddy waters. Now border agents, instead of knowing that they may search any and all property that crosses the border for illegal articles, must ponder whether their searches are sufficiently "comprehensive and intrusive," Majority at 17, to require reasonable suspicion, and whether they have such suspicion. In most cases the answer is going to be as clear as, well, mud. We're due for another course correction. M. SMITH, Circuit Judge, dissenting, with whom CLIFTON and CALLAHAN, Circuit Judges, join with respect to Part I: I respectfully dissent. Until today, federal courts have consistently upheld suspicionless searches of electronic storage devices at the border. See United States v. Arnold, 533 F.3d 1003, 1008 (9th Cir. 2008), cert. denied, 555 U.S. 1176 (2009) ("[R]easonable App. 56 suspicion is not needed for customs officials to search a laptop or other personal electronic storage devices at the border."); see also United States v. Ickes, 393 F.3d 501, 507 (4th Cir. 2005) (no finding of reasonable suspicion required to search personal computers and disks at border); United States v. Linarez-Delgado, 259 Fed. Appx. 506, 508 (3d Cir. 2007); United States v. McAuley, 563 F. Supp. 2d 672, 677-78 (W.D. Tex. 2008); United States v. Bunty, 617 F. Supp. 2d 359, 365 (E.D. Pa. 2008). Yet the majority ignores these cases, rewrites long standing Fourth Amendment jurisprudence, and, in narrowing Arnold, creates a circuit split. While I share some of the majority's concerns about the steady erosion of our personal privacy in this digital age, the majority's decision to create a reasonable suspicion requirement for some property searches at the border so muddies current border search doctrine that border agents will be left to divine on an ad hoc basis whether a property search is sufficiently "comprehensive and intrusive" to require reasonable suspicion, or sufficiently "unintrusive" to come within the traditional border search exception. Requiring border patrol agents to determine that reasonable suspicion exists prior to performing a basic forensic examination of a laptop or other electronic devices discourages such searches, leaving our borders open to electronically savvy terrorists and criminals who may hereafter carry their equipment and data across our borders with little fear of detection. In fact, the majority opinion makes such a legal bouillabaisse out of the previously unambiguous border search doctrine, that I sincerely hope the Supreme Court will grant certiorari, and reverse the holding in this case App. 57 regarding the level of suspicion necessary to search electronic devices at the border, for the sake of our national security, and the consistency of our national border search law. The Supreme Court rejected our last attempt to narrow the border search exception, cautioning us not to create "complex balancing tests" for border searches of property except in the rarest of cases, where the search is "so destructive as to require" reasonable suspicion. United States v. Flores-Montano, 541 U.S. 149, 152, 156 (2004) (rejecting our proposed reasonable suspicion requirement in United States v. MolinaTarazon, 279 F.3d 709, 713-17 (9th Cir. 2002)). "Time and again" the Court has concluded that border searches are "'reasonable simply by virtue of the fact that they occur at the border.'" Id. at 152-53 (quoting United States v. Ramsey, 431 U.S. 606, 616 (1977)). Despite the Court's clear ruling on the issue, the majority again seeks to whittle away at the border search exception, this time by conjuring a reasonable suspicion requirement for border searches that employ computer software to search an electronic storage device. Why the use of computer software to analyze a hard drive triggers a reasonable suspicion requirement while a "manual review" of the same hard drive requires no suspicion, is left unexplained. Although technology may serve as a useful proxy for the intrusiveness of a search today, in the future even cursory searches might be more efficiently conducted by the use of such technology. Under the majority's reasonable suspicion standard, individuals' privacy rights are only as secure as the sophistication of the government's current search mechanism. App. 58 Moreover, the task of distinguishing these "comprehensive and intrusive" laptop searches from the "unintrusive search" of a laptop affirmed in Arnold, 533 F.3d at 1008, or the search of a private letter affirmed in United States v. Seljan, 547 F.3d 993, 1003 (9th Cir. 2008) (en banc), leaves border patrol officers with a difficult choice: either protect our nation from those who mean us harm, or risk their own jobs and livelihood in a Bivens action, or disciplinary proceedings. Apart from being administratively impractical, the majority's reasonable suspicion requirement disregards well established border search jurisprudence, and undermines vital national security interests. Ironically, the majority did not even need to consider the border search doctrine in this case because the search at issue in this case did not occur at the border. Separately, but importantly, the majority's application of the reasonable suspicion requirement to Cotterman is also troubling. The majority purports to be concerned with travelers' "personal privacy and dignity," but its determination that reasonable suspicion exists under the exceedingly weak facts of this case undermines the liberties of U.S. citizens generally--not just at the border, and not just with regard to our digital data--but on every street corner, in every vehicle, and wherever else we rely on the doctrine of reasonable suspicion to safeguard our legitimate privacy interests. I. The Border Search Doctrine The majority heralds this as a "watershed" case that requires a narrowing of the border search exception to App. 59 accommodate the privacy interests allegedly created by new technologies. Yet despite the majority's attempts to avoid the fact, the border search exception is clear and inflexible. The Supreme Court has repeatedly affirmed the breadth of the border search doctrine, extending a reasonable suspicion requirement only to: (1) "highly intrusive searches of the person"; (2) "searches of property [that] are so destructive as to require" reasonable suspicion; and (3) searches carried out in a "particularly offensive manner"--of which the Court has yet to find an example. Flores-Montano, 541 U.S. at 152, 154 n.2, 156 (quotations and citations omitted) (emphasis added). The majority misconstrues these narrowly-defined exceptions, reading Flores-Montano to require reasonable suspicion whenever a search of property is deemed "overly intrusive." Majority at 18-19. Yet, the exceptions articulated in Flores-Montano are far more circumscribed--applying not to "overly intrusive" searches of property, like the search of Cotterman's computer, but only to "highly intrusive searches of the person." Flores-Montano, 541 U.S. at 152 (emphasis added). The majority's adoption of a reasonable suspicion requirement to "comprehensive forensic examination[s]" of property is irreconcilable with Flores-Montano. Majority at 6. We have consistently rejected a reasonable suspicion requirement for border searches of expressive materials, such as papers and their modern-day equivalent--the data contained on electronic storage devices. See, e.g., Seljan, 547 F.3d at 1003 ("An envelope containing personal correspondence is not uniquely protected from search at the border."); Arnold, App. 60 533 F.3d at 1008 ("[R]easonable suspicion is not needed for customs officials to search a laptop or other personal electronic storage devices at the border."). The majority states that its en banc decision narrows Arnold to permit only "relatively simple" border searches of laptops, and "not to countenance suspicionless forensic examinations." Majority at 14 n.6. In narrowing Arnold, however, the court creates a circuit split regarding the application of reasonable suspicion to border searches of electronic devices. See United States v. Ickes, 393 F.3d 501 (4th Cir. 2005); see also United States v. Linarez-Delgado, 259 Fed. Appx. 506, 508 (3d Cir. 2007). For instance, in Ickes (as in Arnold) the defendantappellant argued that a reasonable suspicion requirement was necessary for laptop searches at the border because otherwise "any person carrying a laptop computer [] on an international flight would be subject to a search of the files on the computer hard drive." Ickes, 393 F.3d at 506-07. The Fourth Circuit rejected this argument, noting that "[a]s a practical matter, computer searches are most likely to occur where--as here--the traveler's conduct or the presence of other items in his possession suggest the need to search further. However, to state the probability that reasonable suspicions will give rise to more intrusive searches is a far cry from enthroning this notion as a matter of constitutional law. The essence of border search doctrine is a reliance upon the trained observations and judgments of customs officials, rather than upon constitutional App. 61 requirements applied to the inapposite context of this sort of search." Id. at 507 (emphasis added). The Third Circuit similarly rejected a reasonable suspicion requirement for border searches of electronic data, albeit in an unpublished opinion. See United States v. LinarezDelgado, 259 Fed. Appx. 506, 508 (3d Cir. 2007) ("Data storage media and electronic equipment, such as films, computer devices, and videotapes, may be inspected and viewed during a reasonable border search.") (citing Ickes, 393 F.3d 501). Because the majority has narrowed our holding in Arnold that "reasonable suspicion is not needed for customs officials to search a laptop or other personal electronic storage devices at the border," Arnold, 533 F.3d at 1008, the Ninth Circuit stands alone, as it so often does. The majority likens the search of Cotterman's laptop to a "computer strip search," Majority at 25, and proceeds to conflate the law regarding property searches with that regarding "highly intrusive searches of the person." Flores-Montano, 541 U.S. at 152. However, the "reasons that might support a requirement of some level of suspicion in the case of highly intrusive searches of the person--dignity and privacy interests of the person being searched--simply do not carry over" to laptops, which know no dignity or shame, and thus have neither of those interests. FloresMontano, 541 U.S. at 152 (emphasis added). Moreover, even genuine strip searches do not necessarily require reasonable suspicion at the border. See United States v. Montoya de Hernandez, 473 U.S. 531, 541 n.4 (1985) (expressly declining to decide "what level of suspicion, App. 62 if any, is required for . . . strip, body cavity, or involuntary x-ray searches") (emphasis added). The majority's decision to insulate electronic storage devices from the border search exception unsettles the border search doctrine, places inappropriate burdens on law enforcement, reduces deterrence, and raises serious national security concerns. It also ignores the realities of electronic data transmission and the reduced privacy expectations that accompany much of this data, particularly at the border where "[t]he government's interest in preventing the entry of unwanted persons and effects is at its zenith." FloresMontano, 541 U.S. at 152. A. Burdens on Law Enforcement The majority's holding cripples law enforcement at the border by depriving border patrol agents of the clear administrative guidance they need to carry out core law enforcement activities. "Officers who interact with those suspected of violating the law have an essential interest in readily administrable rules." Florence v. Bd. of Chosen Freeholders of Cnty. of Burlington, 132 S. Ct. 1510, 1522 (2012). Yet the majority's holding requires border patrol agents to determine on a case-by-case and moment-by-moment basis whether a search of digital data remains "unintrusive," a la Arnold, or has become "comprehensive and intrusive," a la Cotterman. Majority at 14, 17. Requiring law enforcement to make such complex legal determinations on the spot, and in the face of potentially grave national security threats, strips agents of their necessary discretion and deprives them of an efficient and administrable rule. App. 63 The majority dismisses the burden its reasonable suspicion requirement places on law enforcement, asserting that agents can simply "draw on their expertise and experience" to make the necessary judgment calls. Majority at 26. Yet rather than actually deferring to this expertise and experience, the majority forces border patrol agents to justify their decisions under a heightened standard that has never before been applied to border searches of property. Border patrol agents process hundreds of thousands of travelers each day and conduct thousands of searches on electronic devices each year.1 Identifying national security and criminal threats at the border requires a high level of experience and discretion in order to recognize and respond to the ever-changing tactics of those who seek to enter our country with nefarious intent. In recognition of these crucial interests, the border search exception provides law enforcement with broad discretion to conduct border searches of property without resorting to case-by-case determinations of reasonable suspicion-- determinations border patrol agents are ill-equipped to handle. See generally Florence, 132 S. Ct. at 1522 (rejecting reasonable suspicion requirement for prison strip-searches under this rationale). Moreover, as a practical matter, suspicionless border searches of property make sense, in light of the sheer number of individuals crossing the border with electronic devices each day. See United States v. Martinez-Fuerte, 428 U.S. 543, 557 (1976) (requiring reasonable suspicion for 1 Department of Homeland Security Privacy Office, Annual Report to Congress 54 (2009). App. 64 vehicle checkpoints near the Mexican border "would be impractical because the flow of traffic tends to be too heavy to allow the particularized study of a given car"). Given these realities of law enforcement at the border, a reasonable suspicion requirement for all "overly intrusive" electronic searches is simply not practicable. B. National Security Concerns The majority's decision to insulate electronic devices from search at the border creates serious national security concerns. An "ever present threat exists from the potential for terrorists to employ the same s m uggling and transportation netw or k s , infrastructure, drop houses, and other support" as other illegal aliens. U.S. Customs and Border Protection, National Border Patrol Strategy 5 (2005). The Department of Homeland Security has found that border searches of electronic storage devices are "essential" for "detect[ing] evidence relating to terrorism and other national security matters."2 Terrorists rely on electronic storage devices, for example, to copy and alter passports and other travel documents.3 By providing special privacy protections for electronic devices at the border, the majority eliminates the powerful deterrent of suspicionless searches and significantly aids technologically savvy 2 U.S. Customs and Border Protection, Border Search of Electronic Devices Containing Information, CBP Directive No. 3340-049 ? 1 (2009). 3 Thomas R. Eldridge, et al., 9/11 and Terrorist Travel: Staff Report of the National Commission on Terrorist Attacks Upon the United States 60 (2004). App. 65 terrorists and criminals who rely on encryption and other surreptitious forms of data storage in their efforts to do harm. See Martinez-Fuerte, 428 U.S. at 557 (rejecting reasonable suspicion requirement for vehicle checkpoints near the Mexican border because to hold otherwise "would largely eliminate any deterrent to the conduct of well-disguised smuggling operations"). The majority contends that the goal of deterrence does not justify "any manner of intrusive search" at the border. Majority at 26. Although I certainly agree with the majority that a policy objective like deterrence cannot justify an otherwise unconstitutional "highly intrusive search[] of the person" at the border, FloresMontano, 541 U.S. at 152, the crucial role of deterrence cannot, and should not, be understated. In fact, the Supreme Court recently affirmed the importance of deterrence in upholding suspicionless strip searches--the apotheosis of an intrusive search. Florence, 132 S. Ct. at 1516 (rejecting reasonable suspicion requirement for prison strip searches and reasoning that "deterring the possession of contraband depends in part on the ability to conduct searches without predictable exceptions"). The suspicionless strip search upheld in Florence, which included a close visual inspection of "the buttocks or genital areas," was unquestionably more intrusive than the so-called "computer strip search" at issue here. Id. at 1515. The majority contends that the deterrence function of suspicionless searches will not be hampered by the requirement of reasonable suspicion because, "as a matter of commonsense and resources, it is only when reasonable suspicion is aroused that such searches typically take place." Majority at 27 n.14. This is, of App. 66 course, the very argument rejected by the Fourth Circuit in Ickes. See Ickes, 393 F.3d at 507 ("As a practical matter, computer searches are most likely to occur where--as here--the traveler's conduct or the presence of other items in his possession suggest the need to search further. However, to state the probability that reasonable suspicions will give rise to more intrusive searches is a far cry from enthroning this notion as a matter of constitutional law."). In addition to undermining deterrence, a reasonable suspicion requirement will likely disincentivize agents to conduct laptop searches in close cases. See Florence, 132 S. Ct. at 1522 ("To avoid liability" if required to find reasonable suspicion, "officers might be inclined not to conduct a thorough search in any close case, thus creating unnecessary risk for the entire jail population."). Border patrol agents accused of conducting an "unreasonable" search face very real consequences--as federal officials, for example, they may be sued in their individual capacities for civil damages, as part of a Bivens4 action. See Ronald J. Sievert, Meeting the Twenty-First Century Terrorist Threat Within the Scope of Twentieth Century Constitutional Law, 37 Hous. L. Rev. 1421, 1424 (2000). The majority's reasonable suspicion requirement saddles border patrol agents with a "Sophie's choice" between securing our nation, and protecting their own livelihoods. These misaligned incentives create unnecessary risk, not just for a prison 4 Bivens v. Six Unknown Fed. Narcotics Agents, 403 U.S. 388 (1971). App. 67 population, as in Florence, 132 S. Ct. at 1522, but for our entire nation. C. Expectation of Privacy in Electronic Data at the Border The majority suggests that travelers at the border have a heightened expectation of privacy in their electronic storage devices, due to the "uniquely sensitive nature of [this] data." Majority at 25. There is no question that searches of electronic data are protected by the Fourth Amendment, but we have never found this data to be immune from the border search exception. In fact, these electronic storage devices are hardly a bastion of privacy. When connected to the Internet, they transmit a massive amount of intimate data to the public on an almost constant basis, rendering it unremarkable that they can be searched at the border, where "[t]he government's interest in preventing the entry of unwanted persons and effects is at its zenith." FloresMontano, 541 U.S. at 152. Indeed, Facebook, for example, now has more than 500 million users, who share more than 25 billion pieces of data each month.5 Those who opt out of social networking sites are no less susceptible to the ubiquitous Internet cookie, which collects data on users' Internet activities to share or sell with other 5 Jeffrey Rosen, The Deciders: Facebook, Google, and the Future of Privacy and Free Speech, in Constitution 3.0: Freedom and Technological Change (Constitution 3.0) 76 (Jeffrey Rosen & Benjamin Wittes eds., Brookings Institution Press 2011). App. 68 organizations. Max Stul Oppenheimer, Consent Revisited, 13 No. 12 J. Internet L. 3, 4 (2010). Until recently, a federally funded data accumulation system allowed clients to "search tens of billions of data records on individuals and businesses in mere seconds."6 Considering the steady erosion of our privacy on the Internet, searches of electronic storage devices may be increasingly akin to a well-placed Internet search. Ironically, the majority creates a zone of privacy in electronic devices at the border that is potentially greater than that afforded the Google searches we perform in our own homes, and elsewhere. The majority muses that "[a] person's digital life ought not be hijacked simply by crossing the border," Majority at 22, but it fails to explain why electronic data deserves special protections when we have never extended such protections to the same data in written form. See Seljan, 547 F.3d at 1003 ("An envelope containing personal correspondence is not uniquely protected from search at the border."); see also United States v. Tsai, 282 F.3d 690, 696 (9th Cir. 2002) (no reasonable suspicion needed to search a traveler's briefcase); United States v. Grayson, 597 F.2d 1225, 1228-29 (9th Cir. 1979) (no reasonable suspicion needed to search papers found in a shirt pocket); Henderson v. United States, 390 F.2d 805, 808 (9th Cir. 1967) (no reasonable suspicion needed to search a traveler's "purse, wallet, or pockets"). The documents 6 Christopher Slobogin, Is the Fourth Amendment Relevant?, in Constitution 3.0 18 (citing Laura K. Donohue, Anglo-American Privacy and Surveillance, 96 J. Crim. L. & Criminology 1059, 1150-51 (2006)). App. 69 carried on today's smartphones and laptops are different only in form, but not in substance, from yesterday's papers, carried in briefcases and wallets. The majority contends that electronic devices hold data of a "uniquely sensitive nature" and that, inexplicably, these devices have the "capability to . . . augment the expectation of privacy." Majority at 23, 25. Under the majority's reasoning, the mere process of digitalizing our diaries and work documents somehow increases the "sensitive nature" of the data therein, providing travelers with a greater expectation of privacy in a diary that happens to be produced on an iPad rather than a legal pad. Such artificial and arbitrary distinctions cannot serve as a reasonable basis for determining privacy rights at the border. The majority attempts to distinguish electronic devices from papers by the vast amount of data they can hold, noting that "[a] car full of packed suitcases . . . cannot hold a candle to the sheer, and everincreasing, capacity of digital storage." Majority at 21. Yet, "case law does not support a finding that a search which occurs in an otherwise ordinary manner, is 'particularly offensive' simply due to the storage capacity of the object being searched." Arnold, 533 F.3d at 1010. The majority contends that it "discuss[es] the typical storage capacity of electronic devices simply to highlight the features that generally distinguish them from traditional baggage." Majority at 21 n.10. Yet why the majority would bother to distinguish between the storage capacities of electronic devices and traditional luggage is a mystery, unless to support its enhanced protections for electronic devices based on their greater storage capacity. App. 70 Mapping our privacy rights by the amount of information we carry with us leads to unreasonable and absurd results. Under the majority's reasoning, a Mini Cooper filled with documents is entitled to less privacy protection at the border than a stretch RollsRoyce filled with documents; a pickup truck filled with documents is entitled to less protection than an 18 wheeler filled with documents. It appears that those who cannot afford a 64 gigabyte iPad, or the "average" 400 gigabyte hard drive discussed by the majority, Majority at 20, will alone be subject to suspicionless searches. The majority's reasoning also protects the rich (who can generally afford more sophisticated devices) to a greater extent than the poor (who are presumably less able to afford those more capable devices.) See United States v. Ross, 456 U.S. 798, 822 (1982) ("[A] traveler who carries a toothbrush and a few articles of clothing in a paper bag or knotted scarf claim[s] an equal right to conceal his possessions from official inspection as the sophisticated executive with the locked attache case."). If our privacy interests are to be dictated by the quantity of data we possess, the question then becomes, how many gigabytes of storage must one buy to secure the guarantee that reasonable suspicion will be required before one's devices are searched? The majority gives us no firm basis for deciding how much storage space is necessary--32 gigabytes? 64 gigabytes? 400 gigabytes? Who knows? Moreover, the majority's test must constantly change to accommodate the everincreasing capacity of electronic storage and new technologies. Before we know it, today's "average" 400 gigabyte hard drive will look like yesterday's diary next to tomorrow's "average" 2 terabyte hard drive. App. 71 The majority asserts that our "reasonableness determination must account for differences in property." Majority at 24. This assertion has no basis in law, however, since Flores-Montano distinguished not between types of property, but between searches of property and "searches of the person." Flores-Montano, 541 U.S. at 152 (emphasis added). In any event, it appears that the majority's reasonableness requirement accounts not for "differences in property," as it suggests, but rather for differences in the intrusiveness of a particular property search. As discussed supra, however, these intrusiveness-based tests have no place in border searches of property and have been explicitly rejected by the Supreme Court as "[c]omplex balancing tests." Flores-Montano, 541 U.S. at 152. The majority additionally speculates about the privacy implications of searching an external cloud platform, which may "includ[e] the same kind of highly sensitive data one would have in 'papers' at home." Majority at 23. I share the majority's keen interest in the Fourth Amendment implications of this burgeoning technology, but the reasonableness of cloud computing has no bearing on the case at hand, absent any facts that Cotterman utilized such a platform, or that such a platform was searched. II. Waiver There is another important issue in this case that is separate from the majority's new standard for border searches. Specifically, I refer to the majority's finding that there was reasonable suspicion to search Cotterman's computer and other electronic devices, App. 72 miles from the border. In its zeal to cripple the application of the current border search doctrine, while still securing Cotterman's conviction, the majority turns on their heads all the parties' arguments about reasonable suspicion as to Cotterman, and the findings made by the lower courts concerning that suspicion. First, the majority now stakes its holding on a finding of reasonable suspicion--despite the fact that the government knowingly and unequivocally conceded on appeal any argument that the computer search was supported by reasonable suspicion. Second, the majority's determination that reasonable suspicion was required under the border search exception is contrary to every argument raised by either party in its briefs prior to our request for supplemental briefing. Third, even the majority seems to concede that the search of Cotterman's own computer that actually occurred at the border did not involve a computer with sufficient storage capacity, and was not sufficiently intrusive, to require reasonable suspicion, under its "new" border search doctrine. Thus, it need not have treated, nor altered, the current border search exception. Fourth, the Magistrate Judge's Report and Recommendation, adopted by the District Judge, did not conclude that reasonable suspicion was required under the border search exception. Despite all the above, the majority upholds Cotterman's conviction on grounds that the government had reasonable suspicion to extensively search his computer 170 miles from the border. Being mindful that the government has the burden of proof in this case, not the majority of our panel, I would have heeded the government's strategic, good faith decision App. 73 to abandon on appeal its argument that reasonable suspicion existed.7 The majority claims that Cotterman has not been prejudiced--despite the fact that the majority's finding of reasonable suspicion is the raison d'?tre for his conviction--because Cotterman was allowed to file a supplemental brief on the matter after oral argument. Although I concede that what the majority did is technically permissible, see U.S. Nat'l Bank of Oregon v Indep. Ins. Agents of Am., Inc., 508 U.S. 439, 446 (1993) ("When an issue or claim is properly before the court, the court is not limited to the particular legal theories advanced by the parties, but rather retains the independent power to identify and apply the proper construction of governing law") (citations and quotations omitted), it is clear to me that Cotterman has been severely prejudiced, because his conviction is based solely on an issue the government conceded, and that Appellant, and the lower courts, took for granted because it was not needed for a border search. It is the majority of our panel, not the government, that prosecuted the reasonable suspicion issue in this case. III. Extended Border Search The extended border search doctrine applies to "searches that do not occur at the time of entry or in the immediate vicinity of the border." United States v. Alfonso, 759 F.2d 728, 735 (9th Cir. 1985). Because 7 When asked during oral argument why it failed to argue reasonable suspicion on appeal, the government acknowledged that the issue was a "close" one. App. 74 these searches "intrude more on an individual's normal expectation of privacy," reasonable suspicion is required. Id. at 734. The majority's mutation of the border search exception is especially unnecessary given that this search did not occur at the border, but rather 170 miles away from the border and five days after the border was crossed. Indeed, the majority concedes that the government could have performed the forensic computer search at the border, but instead chose to transport Cotterman's electronics more than 170 miles away. By labeling this a border search, the majority has conjured a sort of "floating border," whereby any item initially seized at the border, but not cleared there, can be transported thousands of miles away and searched anywhere, and at any time, simply because the government did not find anything (or enough) during its original search at the border. Because the search at issue occurred neither "at the time of entry or in the immediate vicinity of the border," it is more appropriately analyzed as an extended border search. See Alfonso, 759 F.2d at 735. The majority asserts that this case cannot be analyzed as an extended border search because Cotterman's computer was never "cleared" at the border prior to search. Majority at 15. The majority is mistaken. In United States v. Cardona, 769 F.2d 625, 628 (9th Cir. 1985), we applied the extended border search doctrine to a search of a Federal Express package that occurred twenty-four hours before the scheduled border crossing, and 3,000 miles from the border. See 769 F.2d at 628 ("Considering the distance and time factors of the present case, we conclude that App. 75 the facts of this case should be analyzed under the extended border search doctrine."). While this case presents issues we have not yet addressed in the context of an extended border search, United States v. Alfonso is squarely on point. In Alfonso, the government conducted an initial, cursory search of a ship upon its arrival at the Los Angeles harbor. Alfonso, 759 F.2d at 732. Thirty-six hours later, while still docked at the port, officials conducted a second, more intrusive search. Id. Tasked with determining whether the second search was an extended border search or a search at the functional equivalent of the border, we noted that "the instant case illustrates the difficulty of making sharp distinctions in this area." Id. at 735. We determined that "[a]lthough we have no difficulty in relating this site with the border, we shall, because of the time factor--the lapse of thirty-six hours in conducting the searches--examine the facts under the rules of extended border search." Id. at 734. The majority suggests that cases like Alfonso are distinguishable from the case at issue because those cases wrestled with distinguishing between a functional border search and an extended border search, whereas this case involves distinguishing between a traditional border search and an extended border search. This is a distinction without a difference since, as the majority acknowledges, there is no operative difference between border searches and searches that occur at the functional equivalent of the border, at least for purposes of determining whether a search is an extended border search. App. 76 I would hold that the search which took place 170 miles from the border, five days after crossing--a much greater lapse than the thirty-six hours in Alfonso--requires this case to be analyzed as an extended border search. Additionally, the reasonable suspicion requirement already applies to extended border searches, in recognition of the fact that such searches "intrude more on an individual's normal expectation of privacy." Id. As such, the extended border search doctrine is aptly suited to address the privacy expectations at issue in this case. IV. Reasonable Suspicion Irrespective of the government's concession of the issue, the evidence in this case falls woefully short of reasonable suspicion. "[R]easonable suspicion exists when an officer is aware of specific, articulable facts which, when considered with objective and reasonable inferences, form a basis for particularized suspicion." United States v. Montero-Camargo, 208 F.3d 1122, 1129 (9th Cir. 2000) (en banc). We assess reasonable suspicion under the totality of the circumstances, "tak[ing] into account both factors weighing for and against reasonable suspicion." United States v. ManzoJurado, 457 F.3d 928, 938 (9th Cir. 2006). We "will defer to officers' inferences only when such inferences rationally explain how the objective circumstances 'aroused a reasonable suspicion that the particular person being stopped had committed or was about to commit a crime.'" Manzo-Jurado, 457 F.3d at 934-35 (quoting Montero-Camargo, 208 F.3d at 1129) (alterations omitted). "Reasonable suspicion may not be based on broad profiles which cast suspicion on entire categories of people without any individualized App. 77 suspicion of the particular person to be stopped." United States v. Sigmond-Ballesteros, 285 F.3d 1117, 1121 (9th Cir. 2001) (internal quotations and citations omitted). I agree with the majority that reasonable suspicion was not needed to conduct the initial search of Cotterman's computer at the border, and that we analyze reasonable suspicion only as to the second search (the majority would say a continuation of the initial search,) which took place 170 miles from the border and several days after the border crossing. The majority's reasonable suspicion finding appears to be based solely on the TECS alert: it states that "the nature of the alert on Cotterman, directing agents to review media and electronic equipment for child pornography, justified conducting the forensic examination despite the failure of the first search to yield any contraband." Majority at 33. Thus, the majority pins reasonable suspicion on the TECS alert, dismisses out of hand the numerous factors weighing against reasonable suspicion, and paves the way for a government database to target "entire categories of people without any individualized suspicion of the particular person to be stopped." Sigmond-Ballesteros, 285 F.3d at 1121 (internal quotations and citations omitted) (emphasis added). The majority considers the TECS alert to be a sufficient basis for reasonable suspicion, but in reality, it is nothing more than a mechanism that automatically flags all individuals who are registered sex offenders in California--no matter the nature of the sex offense or how old the App. 78 conviction--who travel frequently.8 California is home to more than 106,000 sex offenders.9 Some of these individuals are required to register as sex offenders for life. Depending on how many of them travel frequently, a TECS hit could affect tens of thousands of Californians--many with decades-old convictions. The TECS database clearly hits on "a very large category of presumably innocent travelers, who would be subject to virtually random seizures were the Court to conclude that as little foundation as there was in this case could justify a seizure." Reid v. Georgia, 448 U.S. 438, 441 (1980). By allowing reasonable suspicion to rest entirely on the TECS alert, the majority rules that a decades-old conviction can serve as a basis to deprive a person of his or her property for an indefinite period, so that a "border search" may be conducted hundreds of miles from the border. The majority suggests that the TECS alert informed border patrol agents of the nature of Cotterman's 8 The TECS alert is part of Operation Angel Watch, a program that targets California residents who are registered sex offenders based on the suspicion that those individuals who travel internationally are engaging in child sex tourism. The majority at one point improperly lists "the parameters of the Operation Angel Watch program" as an independent factor supporting reasonable suspicion. Majority at 30-31. We must look solely at the underlying facts supporting reasonable suspicion--i.e., Cotterman's status as a sex offender and his frequent travel--rather than the database or mechanisms used to deliver that information. 9 Press Release, National Center for Missing and Exploited Children, Number of Registered Sex Offenders in the US Nears Three-Quarters of a Million (Jan. 23, 2012). App. 79 conviction. In fact, the TECS hit did not state the nature of Cotterman's conviction, although one agent mistakenly recollected that "it stated that [Cotterman] appeared to [sic] been involved in some type of child pornography." Curiously, another agent stated that a criminal history check on Cotterman revealed that "that he had a prior conviction pertaining to child pornography." In fact, and despite the erroneous contentions of the referenced agents, Cotterman had no prior child pornography conviction; he had a 15-yearold conviction for sexual conduct with a minor. While we generally give "due weight to inferences drawn" by law enforcement, Ornelas v. United States, 517 U.S. 690, 699 (1996), the case for deference is questionable here in the absence of any rational explanation as to how the officers could have read the TECS alert and criminal history check, neither of which listed a conviction for child pornography, and come away thinking that Cotterman was guilty of that offense. See Manzo-Jurado, 457 F.3d at 934-35 ("[W]e will defer to officers' inferences only when such inferences rationally explain how the objective circumstances aroused a reasonable suspicion."); see also Liberal v. Estrada, 632 F.3d 1064, 1078 (9th Cir. 2011) (mistake of fact must be reasonable). All things considered, the fact that an individual with a 15-year-old sex conviction was also a frequent traveler appears to be a rather weak lynchpin for reasonable suspicion. Yet, other than Cotterman's prior conviction and travels, the factors cited by the majority are far too generalized to provide even an indicia of suspicion that Cotterman was involved in sex tourism. For instance, the majority considers Cotterman's "collection of electronic equipment" to be a factor App. 80 supporting reasonable suspicion. In today's world, the fact that Cotterman and his wife each carried a laptop and digital camera when traveling internationally, as well as one video camera between them,10 is no more evidence of "sex tourism" than of any other kind of tourism. Similarly, the fact that Cotterman was returning from Mexico fails to support a finding of reasonable suspicion. Mexico is a popular travel destination for Californians, including those who travel to Mexico for its beaches, culture and weather, and not for its sex tourism. Travel to Mexico simply does not support reasonable suspicion without more specific evidence that Cotterman traveled to a particular establishment, city, or even region, associated with sex tourism. See United States v. Irving, 452 F.3d 110, 114, 124 (2d Cir. 2006) (finding reasonable suspicion based on knowledge that suspect, a convicted pedophile and the subject of criminal investigation, had visited an orphanage in Mexico and had luggage with children's books and drawings). According to the Department of Justice, American sex tourism is a problem not only in Mexico, but also in Southeast Asia, Central and South America, and, to a lesser extent, Eastern Europe.11 Under the majority's application of reasonable suspicion, an individual who committed a sex offense 30 years ago cannot visit the Charles Bridge in Prague, the Cristo Redentor in Rio de Janeiro, or even the "lost 10 11 The video camera was apparently Mrs. Cotterman's. U.S. Department of Justice, The National Strategy for Child Exploitation Prevention and Interdiction, A Report to Congress 36 (2010). App. 81 city" of Machu Picchu, without arousing a "reasonable" suspicion of sex tourism. Someone who was convicted of tax evasion 15 years ago, or any other kind of conviction listed on a federal database, and particularly one that involved the use of a computer, should also probably avoid visiting Switzerland or Luxemburg under the majority's new standard. The bottom line is that thousands of individuals--many with decades-old convictions--will now be forced to reconsider traveling to entire countries or even continents, or will need to leave all their electronic equipment behind, to avoid arousing a "reasonable" suspicion. Perhaps the most concerning aspect of the majority's opinion, especially given its stated stance on privacy rights at the border, is its readiness to strip former sex offenders and others convicted of past crimes (and who are, theoretically, entitled to be presumption of innocence) of even the most basic of privacy rights, such as the right to password-protect their electronic devices. The majority acknowledges that "it is commonplace for business travelers, casual computer users, students and others to password protect their files" and that "password protection is ubiquitous." Majority at 31. It avers that "[n]ational standards require that users of mobile electronic devices password protect their files," and that "[c]omputer users are routinely advised--and in some cases, required by employers--to protect their files when traveling overseas." Majority at 31 (emphasis added). Yet because border patrol agents encountered a single password-protected file on Cotterman's computer, the majority considers password protection App. 82 a factor contributing to reasonable suspicion.12 Worse still, the majority contends that it is justified in considering the password-protected file because "making illegal files difficult to access makes perfect sense for a suspected holder of child pornography." Majority at 32. I fail to see how the agents had reasonable suspicion that Cotterman's computer contained "illegal files" based solely on his 15-year-old sex offense, travel to Mexico with his wife, and the "ubiquitous" act of password-protection. Indeed, as the majority acknowledges, making legal files difficult to access makes "perfect sense" for anyone, even former sex offenders. I would find a password-protected file to be not at all suspicious, unless we want to start basing reasonable suspicion on locked diaries and briefcases. Registered sex offenders face numerous consequences as a result of their convictions, but the law has never before punished them for using "ubiquitous" and "commonplace" password-protection. Yet under the majority's analysis, an individual traveling to Southeast Asia for business, who happens to be subject to one of TECS's broad-based alerts, and who follows his company's security protocols, should expect to have his electronic equipment seized and transported hundreds of miles away.13 12 The unequivocal testimony of Agent Antonio Alvarado confirms that only a single password-protected file was discovered on Cotterman's computer at the border. 13 The majority finds ironic my concern about the expansiveness of its reasonable suspicion standard, since at the border, I would advocate for no suspicion at all. The majority is correct that at the App. 83 Moreover, the majority fails to consider reasonable suspicion in light of the totality of the circumstances because it dismisses without explanation numerous factors that weigh against a finding of reasonable suspicion in this case. See Manzo-Jurado, 457 F.3d at 938 (the reasonable suspicion determination must "take[] into account both factors weighing for and against reasonable suspicion.") (emphasis added). At the time the border patrol agents commenced the second search, 170 miles away from the border, any suspicions they may have initially harbored against Cotterman would have been largely addressed by their interrogations of Cotterman and his wife, which produced nothing suspicious. An initial search of Cotterman's computer and the digital cameras turned up nothing more than a single password protected file and photos of "whale hunting and various excursions," all of which corroborated Cotterman's story about vacationing in Mexico. Also during this initial search, one of the border patrol agents did a records check and discovered that Cotterman's conviction for the sex offense had occurred more than 15 years ago. Cotterman was fully cooperative and even offered to help the agents access his computer. The majority contends that Cotterman's offer to help does not weigh against a finding of reasonable suspicion because the agents declined Cotterman's offer based on the possibility--however slight--that Cotterman could border, my concern is simply with following Flores-Montano and maintaining national security. I view the majority's application of its reasonable suspicion requirement as a separate issue, and my concern there is that the majority has so diluted the reasonable suspicion requirement as to undermine the rights of U.S. citizens generally. App. 84 "booby trap" the devices. That the agents were unable to accept Cotterman's offer, however, does not change the reasonable inference that his offer was a genuine one. Accordingly, it is irrelevant whether there was reasonable suspicion for the initial search, because I agree with the majority that reasonable suspicion was not required. The relevant inquiry here is what suspicion existed after all of Cotterman's electronics were searched, and he and his wife were interrogated separately, and every piece of evidence obtained corroborated the Cottermans' story about vacationing in Mexico. The only hint of suspicion remaining at that point--after the initial border search and interrogations--was the single password-protected file, which I agree with the majority is insufficient, by itself, to sustain a finding of reasonable suspicion. See Manzo-Juardo, 457 F.3d at 935 ("[T]o establish reasonable suspicion, an officer cannot rely solely on generalizations that, if accepted, would cast suspicion on large segments of the lawabiding population."). V. Conclusion Reasonable suspicion has no place in property searches at the border, as the Supreme Court has consistently held. See Flores-Montano, 541 U.S. at 152-53 ("Time and time again, we have stated that searches made at the border, pursuant to the longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into this country, are reasonable simply by virtue of the fact that they occur at the border."). Imposing a reasonable suspicion requirement here forces courts App. 85 and border patrol agents to engage in just the "sort of decision-making process that the Supreme Court wished to avoid in sanctioning expansive border searches." Seljan, 547 F.3d at 1011 (citation omitted) (Callahan, J. concurring). Rather than rewrite the border search exception, as the majority does, I would affirm the district court's application of the extended border search doctrine to Cotterman's case, which appears most appropriate given the extensive lapse in distance and time between the first and the second search. Additionally, I would hold the government to its burden of proof in determining that reasonable suspicion was absent here. Under the doctrine of this case, the majority sweeps in thousands of innocent individuals whose electronic equipment can now be taken away from the border and searched indefinitely, under the border search exception. I respectfully dissent. App. 86 APPENDIX B IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA CR 07-1207-TUC-RCC [Filed February 24, 2009] ___________________________ United States of America, ) ) Plaintiff, ) ) vs. ) ) Howard Wesley Cotterman, ) ) Defendant. ) ___________________________) ORDER This case presents a unique challenge to the concept of a border search. The magistrate did an excellent job in analyzing the facts of this case. This court has reviewed the entire case de novo and comes to the following conclusions. 1. The search can only be justified by way of a border search because there was no probable cause at all to allow the search of the computer. App. 87 2. The decision to search was based upon a TECS hit out of California that was based upon the fact that the defendant had a 15 year old child molestation conviction, and something called Operation Angel Watch directed the search. 3. The search could have been done, (while not necessarily to the convenience of the agents) at the border because the technician could have traveled down from Tucson with his laptop computer to do the analysis. 4. The defendant and his wife waited more than 8 hours at the border to be finally told that the computer was going to be taken to Tucson even though he offered to help access the computer at the border. This offer was declined by the agents. 5. The search of the computer took at least 48 hours to yield results. 6. It cannot be said in this case that Tucson became the functional equivalent of the border. 7. Because Tucson did not become the functional equivalent of the border some 170 miles away, the Court agrees with the Magistrate Judge that the evidence should be suppressed, and adopts the Report and Recommendation. Therefore, IT IS ORDERED ADOPTING the Magistrate Judge's Report and Recommendation (#58). App. 88 IT IS FURTHER ORDERED AS FOLLOWS: 1. GRANTING Defendant's Motion to Suppress (#17) 2. The Government shall return the copy of Mrs. Cotterman's computer and retain no copy of it. 3. The Government shall return the copies of the Cotterman's personal papers that were photocpied at the border and retain no copies. DATED this 23rd day of February, 2009. /s/ Raner C. Collins Raner C. Collins United States District Judge App. 89 APPENDIX C IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA No. CR 07-1207-TUC-RCC (CRP) [Filed September 12, 2008] ____________________________________ UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) ) HOWARD WESLEY COTTERMAN, ) ) Defendant. ) ____________________________________) REPORT AND RECOMMENDATION Defendant has filed a Motion to Suppress Evidence (Doc 17) seeking to suppress all evidence seized from him by Customs Inspections at the Lukeville Port of Entry. The Government opposes the Motion. (Doc 39). This Court recommends that the District Judge, after his independent review and consideration, enter an order GRANTING the Motion for the reasons set forth in this Report. App. 90 STATEMENT OF FACTS Howard and Maureen Cotterman entered the Lukeville Port of Entry ("POE") seeking admission to the United States on April 6, 2007 at 9:57 a.m. In primary, a Treasury Enforcement Communication System ("TECS") hit was observed based on Mr. Cotterman's convictions for child sex crimes in 1992. Based on the TECS hit, the Cottermans were referred to secondary. At secondary, the Cottermans were told to exit the car, leave all their belongings in the car and they were not to touch those belongings until they were allowed to leave. (TR 31). The Cottermans were told to wait in the small lobby at the POE. They were not handcuffed, but since they could not access their car, for pragmatic purposes they were not free to leave. Two border inspectors searched the contents of the Cotterman's car for one and a half to two hours. Among other things, they found three cameras and two laptop computers which they turned over to Agent Alvarado for inspection. The inspectors also found personal papers, possibly financial records or time-share information, which they photocopied. Those photocopies are still maintained in the case agent's file. (TR 29). Agent Alvarez examined the cameras and laptops, but was unable to discover any contraband. However, on one of the computers, certain files were password protected. Agent Alvarez then went on to attend to other duties. App. 91 The TECS hit was referred through the ICE chain of command and finally assigned to Sells duty agent Mina Riley. Agent Riley and her supervisor, Agent Craig Brisbine, traveled to Lukeville, arriving about 3:30 p.m. At Lukeville, Ms. Riley interviewed Mr. and Mrs. Cotterman separately. Mr. Cotterman offered to assist in accessing his computer, but Agent Riley declined due to concerns that Mr. Cotterman might be able to sabotage the computer. (TR 38, 50). Two computers and one camera were seized. Agent Brisbine drove the laptop computers and camera to Tucson, arriving between 10:30 p.m. and 11:00 p.m. He turned the equipment over to John Owen for forensic evaluation, which Owen began immediately. The Cottermans were finally allowed to leave Lukeville at approximately 6:00 p.m. Owen continued the forensic examination on Saturday and Sunday. On Saturday he determined there was no contraband on the camera, and it was returned that day to the Cottermans. On Sunday it was determined that there was no contraband on Mrs. Cotterman's laptop. However, 75 images of child pornography were found on Mr. Cotterman's laptop in unallocated space. Mrs. Cotterman's laptop was returned Monday morning. However, a copy of the laptop was made by Owen and is still in his file, even though nothing illicit was found on her computer. (TR 63). Mr. Cotterman was asked to come to the Tucson ICE office and provide the passwords. Mr. Cotterman indicated he would have to call some business associates to get the App. 92 password(s), and would be in later. Actually, at noon on Monday, Howard Cotterman boarded a plane for Mexico, ultimately traveling to first Japan, and then Australia. As of Monday morning, Agent Brisbine did not believe he had probably cause to arrest Howard Cotterman. (TR 37). Agent Riley testified that she determined before she arrived in Lukeville that the Cotterman's computers would be taken to Tucson for forensic evaluation. (TR 40). Agent Alvarado believed he was required to turn over the computers to the ICE agents to be taken for forensic evaluation because of the instructions from Pacific Intel in connection with the TECS hit. (TR 100-101). Agent Brisbine determined that "one way or another" those computers were going to Tucson because ICE field guidelines, Exhibit L, required it. (TR 115). Forensic specialist Owen was at work in Tucson on April 6, 2007, and was notified at work sometime around lunch that the laptop computers would be brought in. (TR 73). He was not asked to travel to Lukeville. POSITIONS OF THE PARTIES Defendant argues that the search of his laptop 170 miles from the port of entry over a period of four days is a non-routine border search requiring reasonable suspicion. (Motion, p 4). Defendant argues that searching a laptop is the equivalent of a body cavity search because a laptop is likely to hold an individual's most private thoughts and information. Defendant also argues First Amendment interests are implicated. (Motion, p 5). Defendant also argues that the statutory App. 93 authority for customs officers to seize contraband, 19 U.S.C. ? 482, requires that the officer find contraband before making the seizure. (Motion, p 7). Additionally, Defendant argues that a search warrant should have been obtained prior to conducting the forensic exam of the laptops. (Motion, p 9). The Government's primary argument is that this was a border search and thus no individualized suspicion was required to conduct the search of the camera and computers. (Response, pp 9-10). The Government argues that the border search authority justified the warrantless forensic exam of the computers without reasonable suspicion. (Response, pp 11-13). The Government offers several other arguments that are circular or not supported by the facts. For instance, the Government argues that once the items were properly seized they can be searched: Here by statute and case law, the agents had a duty to seize the items for further examination. Once properly seized, the further forensic exam of these items was proper and the evidence found is admissible. (Response, p 14.) This argument begs the question, were the items properly seized? The Government also argues that exigent circumstances justified the seizure and forensic examination of the computers. The exigent circumstance was the need to identify the victim and ensure her safety. (Response, p 17). Here again, the App. 94 Government puts the cart before the horse. The Government had no information that there was a potential victim until after several days of computer forensic examination. The Government also argues that after the agents found contraband, they were authorized by statute to secure the items for trial. (Response, p 18). This is correct, but once again avoids the issue raised by Defendant's Motion, did the agents discover the contraband without violating the Defendant's Constitutional rights? Finally, the Government argues that Defendant abandoned the compact discs ("cds") and laptop computer when he fled to Australia. Having abandoned the property, the Government argues he has no standing to bring this motion. ANALYSIS Border Search Requirements In United States v. Arnold, 523 F.3d 941 (9th Cir. 2008), the Ninth Circuit Court of Appeals held that reasonable suspicion was not required to search a laptop computer belonging to an international traveler arriving at Los Angeles International Airport. The Court noted that "searches of closed containers and their contents can be conducted at the border without particularized suspicion under the Fourth Amendment." Arnold, 523 F.3d at 945. The Fourth Circuit came to the same conclusion. United States v. Ickes, 393 F.3d 501 (4th Cir. 2005). Two other similar cases supported the legal doctrine that under the App. 95 border search exception, a computer or computer diskettes ("cds") could be searched at an international border, or its functional equivalent without probable cause, reasonable suspicion, or a warrant. United States v. Romm, 455 F.3d 990 (9th Cir. 2006); United States v. Roberts, 274 F.3d 1007 (5th Cir. 2001). All four of these cases are distinguished from this case because evidence of child pornography was discovered physically at the border within a few hours of examining the laptop. In Arnold, ICE agents questioned Arnold for several hours and "examined the computer equipment and found numerous images depicting what they believed to be child pornography." Arnold, 523 F.3d at 943. They released Arnold, seized the laptop and memory devices, and two weeks later obtained a search warrant, presumably to justify a full computer forensic examination. Id. In Ickes, customs officers discovered video footage of a tennis match that focused excessively on a young ball boy, as well as photo albums of nude, or semi-nude, provocatively posed prepubescent boys. While in custody at the port of entry, Ickes admitted he stored child pornography on the computer. Ickes, 393 F.3d at 503. In Romm, Canadian border agents discovered child pornography on Romm's laptop and excluded him from entry into Canada. Romm was detained until he could be put on the next flight to Seattle. Canadian border agents informed U.S. Customs of when Romm would be arriving and what contraband he had in his possession. ICE conducted a preliminary analysis of Romm's laptop App. 96 at Seattle-Tacoma International Airport and discovered 10 images of child pornography. Thereafter, while still at Sea-Tac Airport, Romm confessed to downloading child pornography on the computer in question. Romm, 455 F.3d at 994-995. In Roberts, customs agents in Houston were advised by customs agents in Lake Charles, Louisiana and a sheriff's deputy from Natchitoches, Louisiana, that Roberts would be traveling from the international airport in Houston to Paris, and that Roberts would be carrying cds containing child pornography in his shaving kit. At a preliminary inspection at the Houston airport, customs investigators found six cds in Roberts' shaving kit. Roberts soon thereafter admitted there was child pornography on the computer diskettes. Roberts, 274 F.3d at 1009-1010. In all four of these cases, evidence of child pornography was found at the border inspection station or the international airport and within a matter of hours. In this case, the first evidence of child pornography was discovered 170 miles from the Lukeville port of entry, and at least two days afer the Cottermans entered the United States. This case poses the question, can the government seize property at the border, move it far away from the border and hold the property for days, weeks or months without any heightened scrutiny? Under those circumstances, the law requires the Government to have reasonable suspicion before extending the search in both distance and time away from the border. App. 97 The Government argues that the search was neither offensive nor unreasonable, so reasonable suspicion is not required. It is true that the conduct of the officers was reasonable and in fact responsive to ICE field guidelines. (Exhibit L. Response, p 16). Moreover, there was no destruction of Defendant's property. This is not a case of a body cavity search where reasonable suspicion would be required because of the personal intrusiveness of the search. United States v. Montoya deHernandez, 473 U.S. 531, 105 S.Ct. 3304 (1985). Defendant argues that searching his laptop is the equivalent of a more intrusive search that requires reasonable suspicion, because the First Amendment is implicated by this incursion into his most private matters. (Motion, p 5). However, in Ickes, the Court reasoned there was no First Amendment exception to the border search doctrine. Ickes, 393 F.3d at 506. The Court in Arnold, found this reasoning persuasive. Arnold, 523 F.3d at 941. The Government's position is that under the facts of this case, the search of Defendant's laptop required no suspicion at all under the border search exception. In oral argument at the end of the evidentiary hearing, AUSA Mihok warned the Court that a time and distance restriction on border searches would be establishing new law. Given the parties' briefing, the Court assumed that to be correct. It is not. Extended Border Searches Under certain circumstances, searches that take place away from the border or remote in time from the initial inspection can still be considered border App. 98 searches. This involves two related doctrines: the functional equivalent of the border and the extended border search doctrine. United States v. Alfonso, 759 F.2d 728, 734 (9th Cir. 1985). The most common example of the functional equivalent of a border search is at airports for flights arriving directly from or traveling directly to a foreign country. Almeida-Sanchez v. United States, 413 U.S. 266, 273, 93 S.Ct. 2535, 2539, 37 L.Ed.2d 596 (1973); United States v. Duncan, 693 F.2d 971, 977 (9th Cir. 1982). A search at the functional equivalent of a border requires no warrant, probable cause or any suspicion. Id. When a search is removed in time and place from the border, the courts have repeatedly held that this represents a greater intrusion on the person requiring that under the totality of the circumstances, customs officers had reasonable suspicion of criminal activity in order to justify the search, the so-called "extended border search." United States v. Whiting, 781 F.2d 692, 695 (9th Cir. 1986); United States v. Cardona, 769 F.2d 625, 628 (9th Cir. 1985); United States v. Alfonso, 759 F.2d 728, 734 (9th Cir. 1985); United States v. Bilir, 592 F.2d 735, 740-741 (9th Cir. 1979). As the Court in Alfonso stated: We recognize, of course, that time and place are relevant, since the level of suspicion for extended border searches is stricter than the standard for ordinary border searches. Extended border searches occur after the actual entry has been effected and intrude more on an individual's normal expectation of privacy. Therefore, App. 99 extended border searches must be justified by "reasonable suspicion" that the subject of the search was involved in criminal activity, rather than simply mere suspicion or no suspicion. Alfonso, 759 F.2d at 734. In Alfonso, the search took place thirty-six hours after the ship docked at Los Angeles harbor. At some point, the discrepancy in time and distance will become so great that it is no longer an extended border search, thus requiring probable cause and a warrant. Again, there is no bright line test, but an examination of the totality of circumstances, including time, distance and law enforcement efforts is required. Alfonso, 759 F.2d at 736; United States v. Sahanaja, 430 F.3d 1049, 1054-1055 (9th Cir. 2005). For instance, had the forensic examiner in this case placed the Cottermans electronics equipment at the end of the queue, conducting the examination in a month or two, it could be argued the search was so removed in time as to no longer be an extended border search. We need not reach that question here, where the facts show reasonable diligence and speed in conducting the computer forensic examination. Therefore, the Government need only show reasonable suspicion, not probable cause, to justify the search in this case. Reasonable Suspicion Reasonable suspicion is more than mere suspicion, but less than probable cause. Reasonable suspicion exists when an officer is aware of specific, articulable facts, which together with objective and reasonable inferences, form a basis for suspecting that the App. 100 particular person to be detained has committed or is about to commit a crime. United States v. Salinas, 940 F.2d 393, 394 (9th Cir. 1991), See also Terry v. Ohio, 392 U.S. 1, 21 (1968) (To justify a warrantless search, "the police officer must be able to point to specific and articulable facts which, taken together with rational inferences from those facts, reasonably warrant that intrusion.") The determination whether reasonable suspicion exists must be based on "the totality of the circumstances - the whole picture." United States v. Cortez, 449 U.S. 411, 417 (1981). The facts are to be interpreted in light of a trained officer's experience, and the whole picture must be taken into account. United States v. Sokolow, 490 U.S. 1, 8 (1989). In a motion to suppress the Government bears the burden of proving a warrantless search satisfies the constitutional protections of the Fourth Amendment against unreasonable searches and seizures. Vale v. Louisiana, 399 U.S. 30, 34 (1970). To protect against unreasonable searches and seizures the Government must prove probable cause to a judge or magistrate prior to the search or it must prove the warrantless search fell within "a few specifically established and well-delineated exceptions". Mincey v. Arizona, 437 U.S. 385, 390 (1978). In Alfonso, reasonable suspicion was based on a confidential informant's information, which was confirmed in part by a federal wiretap, thirty-six hours of extensive surveillance of suspicious activity by people connected with the ship, and two separate stops of people leaving the ship with containers holding large amounts of cocaine. Alfonso, 759 F.2d at 731-733. In Sahanaja, ICE agents suspected a package contained App. 101 contraband because the described contents were different from what the package appeared to hold, an odor coming from the package, the fact that the mail carriers who handled the package became nauseated, the ostensible recipient's refusal to open the package in the presence of postal employees and the multiple inquiries by different people who were not the addressee concerning the package. Sahanaja, 430 F.3d at 1054. In this case, there are only two circumstances that support any suspicion; the TECS hit reflecting Howard Cotterman's 1992 conviction for child molestation and the existence of password protected files on his laptop computer. After almost two hours of searching the Cotterman's car and electronic equipment, no basis for suspicion was determined, other than the existence of the password protected files. Using password protection can be for legitimate purposes as well as nefarious purposes. In fact, the witnesses at the hearing conceded that legitimate use of password protection on laptop computers was commonplace. It is clear that the TECS hit alone does not establish reasonable suspicion. The fact that password protection has innocent explanations does not necessarily negate this from being considered in determining reasonable suspicion. However, in this case, the additional fact of password protected files on Howard Cotterman's computer does not amount to reasonable suspicion for three reasons. First, it is undisputed that Howard Cotterman offered to open the files at the Lukeville port of entry. Second, the facts App. 102 show that Officer Riley had determined that she was taking both laptops in for a forensic evaluation before she left Sells to travel to Lukeville. (TR 40; p See also Exhibit B, Kelly Witness Statement, p 12) ("[Riley] informed us she and another agent were in route to our Port, and would be there in approximately two hours to interview subjects and taken (sic) into custody the laptops.") Third, perhaps most importantly, the customs officers also seized Mrs. Cotterman's laptop, which was not password protected. That these officers acted so presumptively, without even considering whether they had reasonable suspicion to seize any of the electronic equipment that day, is consistent with ICE field guidelines, reenforced by the boilerplate on the Custom and Border Protection Witness Statements. Exhibit L, admitted without objection, is a March 15, 2007, Memorandum to field special agents from Marcy M. Foreman, Director, Office of Investigations for ICE. The subject of the memo is "Field Guidance on Handling Detained or Seized Electronic Media from Persons of National Security Interest at Ports of Entry." The memo makes clear that electronic media may be seized at the border without any individualized suspicion. ICE may review, copy, image, detain or seize, and disseminate electronic media if a violation of law is immediately evident, if further review by ICE is needed to make such a determination, or if technical assistance (e.g. translation services) is deemed necessary ... An ICE JTTF duty agent and/or ICE Computer Forensics Agent ("CFA") may conduct App. 103 a cursory search of the subjects' electronic media and detain or image the electronic media to conduct a more thorough search. Exhibit L, p 2. The guidelines do not advise that a search remote in time or distance from the border entry requires, at a minimum, reasonable suspicion.1 Rather the memo emphasizes use of the authority to conduct border searches without particularized suspicion. Here, the agents responded in compliance with the field guidelines. Riley, the JTFF duty agent, seized the laptops to be transported to CFA Owens for computer forensic analysis at a remote location. In addition to the field guidelines relying on border search authority, the CBP Witness Statement form emphasizes Border Search Authority in boilerplate at the end of each statement. See Exhibits A and B. Moreover, Agent Alvarado testified the TECS hit alone meant the digital media would be taken to Tucson. (TR 100-101). Certainly, Pacific Intel had no information other than the 15 year old criminal conviction. The Government's disregard of the Fourth Amendment in connection with border searches of electronic media is emphasized by the Government's continued possession of a copy of Mrs. Cotterman's hard drive. At the hearing, Mr. Owen suggested some vague, speculative ways in which the hard drive could possibly, but apparently not actually, contain probative 1 On the first page of Exhibit L is reference to the statutory authority for warrantless search if "there is a reasonable cause to suspect a basis for denying admission to the United States." Exclusion was never an issue as the Cottermans were U.S. citizens with valid passports. App. 104 information. (TR, pp 76-77, 79). If there is probative information on the hard rive, seventeen months is more than enough time to determine that. The Government apparently believes that returning Mrs. Cotterman's laptop eliminates the intrusion on her privacy. Obviously, keeping a copy of the hard drive with no viable basis does violate Mrs. Cotterman's privacy interests as well as the field guidelines directive that the electronic media seized "shall not be retained by ICE longer than is necessary to determine its relevance to furthering the law enforcement mission of ICE." Exhibit L, p 2. At this point in time, any incriminating evidence found now on the copy of Mrs. Cotterman's hard drive would be inadmissible because that hard drive was not subject to seizure for containing contraband. United States v. Cardona, 769 F.2d at 629 (cashier's checks, not in bearer form, found in valid extended border search were not seized because they were not contraband, but were photocopied because the checks were not subject to seizure the photocopies were inadmissible).2 In this case there is no evidence to support a determination of reasonable suspicion to seize any equipment. Nor did any government agent involved in this case ever consider whether reasonable suspicion existed, since they believed ICE policy and the TECS hits required the computers be sent to Tucson for forensic evaluation. Because the agents did not have 2 Photocopies were made of the Cottermans personal records found in their vehicle and are maintained in the agency file to this day despite not being related in any way to child pornography. (TR 29). App. 105 reasonable suspicion to seize any of the Cotterman's property, unless the abandonment argument prevails, the motion to suppress should be granted. Additionally, the Government should be ordered to return the copy of Mrs. Cotterman's hard drive and the copies of the Cotterman's personal documents. Abandonment The Government argues that Mr. Cotterman abandoned his property on September 9, 2007 when he fled to Australia. While it is not clear, the Government appears to argue, or perhaps more correctly, imply that a case of computer discs was abandoned by the Defendant. The Government's main argument is that Howard Cotterman abandoned the laptop when he fled the jurisdiction Monday, April 9, 2007 at noon. The case for this proposition is United States v. Garcia, 516 F.2d 318 (9th Cir. 1975), in which Garcia, after being referred to secondary at a fixed checkpoint, sped up and drove away in an attempt to elude law enforcement. The Court in Garcia held that even if the initial stop and referral to secondary was illegal, Garcia's flight from law enforcement was an adequate basis for his arrest and the search of the car. Id. at 319-320. The Garcia decision has no relevance to this case. In this case, the laptop computer was seized from Mr. Cotterman at the border on April 6, 2007, and transported to Tucson that same day. Prior to Cotterman fleeing to Australia, the Government found 75 images of child pornography in the unallocated hard App. 106 drive space of the computer on Sunday afternoon. At that point in time, the computer was contraband, was required to be seized, and could not be returned. The Government's argument that Howard Cotterman's flight from the jurisdiction deprived him of standing to bring this motion fails. The Government's second argument is that "10 additional CDs that there left at the Lukeville POE by the Cotterman's (sic) were located shortly after their departure on April 6, 2007, and held at the DHS-CBP/ICE office in Lukeville." (Response, p 6). Those CDs were referred to Agent Riley in July of 2007, and subsequently forwarded to Agent Owen. Id. During his examination of the CDs, Owen found child pornography on one of the ten CDs. Defendant describes this as an "uncontroverted fact" that establishes Cotterman has no standing to challenge the CDs as evidence. (Response, p 15). The entire factual presentation by the Government on this point is as follows: Q (By Assistant United States Attorney): Was there also a case with CDs? A (By Agent Riley): Yes, there was. Q (By Assistant United States Attorney): And where was that? A (By Agent Riley): That case was located a couple of months after the incident by one of the inspectors at the port of entry in the bathroom. Q (By Assistant United States Attorney): And were those items - was - was that case with CDs also forwarded for - forwarded to you eventually? App. 107 A (By Agent Riley): Yes, it was. The items were forwarded to me from the inspectors at the port of entry, and at that time I immediately turned them over to John Owen for forensic review. (TR 17). On cross-examination, Agent Riley conceded that she did not know who discovered the CDs, how they were discovered or how the CDs got there. (TR 42-44). Moreover, there were two different versions of where the CDs were found, one stating in the bathroom and the other stating in a drawer. Id. Far from being an uncontroverted fact, the Government has fallen well short of satisfying its burden of proof that the Cottermans abandoned the CDs. The facts more likely establish that one or more government agents mishandled and misplaced the CDs at the border. After all, there was no testimony that the agents tried to return the CDs. For these reasons, the Government's arguments that the CDs and laptops were abandoned should be rejected. RECOMMENDATION In a border search, time and distance do matter. In the Alfonso case, thirty-six hours was too long. Certainly, 170 miles is too far. Therefore, based on both extended time and distance, the computer forensic search in this case was an extended border search requiring reasonable suspicion of criminal activity before taking the computers away from the port of entry. The government agents in this case, following App. 108 ICE policy to the letter, never considered whether reasonable suspicion existed because they had been repeatedly and incorrectly instructed no suspicion was necessary. No suspicion at all existed as to Mrs. Cotterman's computer, but it was seized anyway, and a copy of that computer memory is still maintained by the Government. No reasonable suspicion existed as to Mr. Cotterman's computer. The only suspicion was Mr. Cotterman's 15 year old child sex crime conviction and password protection on certain files, which he offered to access. Moreover, the Government has not factually established that the Cottermans abandoned any of the property in issue. For these reasons, it is the Report and Recommendation of this Court that District Judge Collins, after his independent review and consideration, enter an order as follows: 1. The Motion to Suppress Evidence be GRANTED. (Doc 17). 2. The Government be ordered to return the copy of Mrs. Cotterman's computer and retain no copy of it. 3. The Government be ordered to return the copies of the Cotterman's personal papers that were photocopied at the border and retain no copies. Pursuant to 28 U.S.C. ? 636(b), any party may serve and file written objections within ten days of being served with a copy of the Report and Recommendation. If objections are not timely filed, they may be deemed waived. The parties are advised that any objections App. 109 filed are to be identified with the following case number: cr-07-1207-RCC. The Clerk is directed to mail a copy of the Report and Recommendation to Plaintiff and counsel for Defendant. DATED this 12th day of September, 2008. /s/ Charles R. Pyle CHARLES R. PYLE UNITED STATES MAGISTRATE JUDGE

Related Documents (6)

Court UnsealedDepositionFeb 5, 2026

P009747-020326-001-335

March 19, 2025 Mr. Russell Brown Executive Director Washington Association of Prosecuting Attorneys 206 10th Ave SE Olympia WA 98501 Subject: Update - Potential Disclosures concerning Government Witness – CVEO 1 Leonardo J. Bobadilla, Badge Number X807 Dear Mr. Brown: On April 17, 2024, the Washington State Patrol (WSP) provided notification regarding the above￾named employee: “It is alleged CVEO 1 coerced and/or assaulted his ex-girlfriend. It is also alleged CVEO 1 engaged in acts of child

335p
Dept. of JusticeAug 22, 2017

17 August 16 through August 31 2016_Redacted.pdf

Kristen M. Simkins From: Sent: To: Subject: Attachments: Juan Mendez Tuesday, August 16, 2016 1:10 AM Brenda A. McKinley; C. Kay Woodring; Caitlyn D. Neff; Danielle Minarchick; Eric A. Lockridge; Jeffrey T. Hite; Jonathan M. Millinder; Julie A. Simoni; Kevin T. Jeirles; Larry L. Lidgett; Lee R. Sheaffer; Lorinda L. Brown; Matthew T. Fisher; Melanie L. Gordon; Michael S. Woods; Richard C. Smith; Stephanie D. McGhee; Thomas S. Allen, Jr.; Walter E. Jeirles Calendar and Status Report 8/16/2016 20

1846p
DOJ Data Set 10CorrespondenceUnknown

EFTA Document EFTA01658816

0p
DOJ Data Set 10OtherUnknown

EFTA01658816

39p
Court UnsealedDepositionJul 21, 2025

P009111-071325-001-265

March 19, 2025 Mr. Russell Brown Executive Director Washington Association of Prosecuting Attorneys 206 10th Ave SE Olympia WA 98501 Subject: Update - Potential Disclosures concerning Government Witness – CVEO 1 Leonardo J. Bobadilla, Badge Number X807 Dear Mr. Brown: On April 17, 2024, the Washington State Patrol (WSP) provided notification regarding the above￾named employee: “It is alleged CVEO 1 coerced and/or assaulted his ex-girlfriend. It is also alleged CVEO 1 engaged in acts of child

265p
DOJ Data Set 10CorrespondenceUnknown

EFTA Document EFTA01658338

0p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.