MEMORANDUM & ORDER
Since the founding of the republic, the federal government has held broad authority to conduct searches at the border to prevent the entry of dangerous people and goods. In the 21st century, the most dangerous contraband is often contained in laptop computers or other electronic devices, not on. paper. This
Michael Chertoff, Searches Are Legal, Essential, USA Today, July 16, 2008, at A10.
This case involves a challenge to regulations that were adopted by the Department of Homeland Security (“DHS”), of which Mr. Chertoff was then Secretary, to address and regulate the border searches of laptop computers. Specifically, in August 2009, U.S. Immigration and Customs Enforcement (“ICE”) and U.S. Customs and Border Protection (“CBP”) — two components of DHS — issued directives that authorize their agents to inspect any electronic devices that travelers seek to carry across an international border into the United States. See Defs.’ Mot. Dismiss, Ex. A, ICE Directive No. 7-6.1 (Aug. 18, 2009) (“ICE Directive”); Defs.’ Mot. Dismiss, Ex. B, CBP Directive No. 3340-049 (Aug. 20, 2009) (“CBP Directive”). These directives authorize the inspection of any files and images stored on electronic devices, the performance of searches on the electronic devices, the detainment of electronic devices for a reasonable time to perform such searches, and the copying of stored information to facilitate inspection. These activities may be undertaken without reasonable suspicion that the electronic devices contain materials that fall within the jurisdiction of CBP or ICE.
Plaintiffs bring both facial and as-applied challenges to these directives. They allege that the directives purport to authorize unreasonable searches and seizures and operate to chill protected speech. Plaintiffs argue that these searches violate “the constitutional rights of American citizens to keep the private and expressive details of their lives, as well as sensitive information obtained or created in the course of their work, free from unwarranted government scrutiny.” Compl. ¶ 3.
They seek a declaratory judgment that the CBP and ICE policies violate the First and Fourth Amendments. Compl. at 34. They also seek a declaration that the defendants violated the rights of Pascal Abidor, the individual plaintiff. Compl. at 34. Along with this declaratory relief, they seek to enjoin defendants from enforcing their policies of searching, copying, and detaining electronic devices at the international border without reasonable suspicion. Compl. at 34. They seek the same relief on Mr. Abidor’s behalf. Compl. at 34.
The defendants move to dismiss the complaint. They argue, preliminarily, that the individual plaintiff, Mr. Abidor, and the two plaintiff organizations, the National Association of Criminal Defense Lawyers (“NACDL”) and the National Press Photographers Association (“NPPA”), lack standing to bring a facial challenge to the directives. They also argue that plaintiffs’ facial and as-applied challenges fail to state a claim upon which relief can be granted. They rest their argument on the Supreme Court’s holding in United States v. Flores-Montano,
FACTS
A. The CBP Directive Authorizing Border Searches of Electronic Devices
1. Overview
The CBP Directive authorizes CBP officers, “[i]n the course of a border search,
An Officer may detain electronic devices, or copies of information contained therein, for a brief, reasonable period of time to perform a thorough border search. The search may take place on-site or at an off-site location, and is to be completed as expeditiously as possible. Unless extenuating circumstances exist, the detention of devices ordinarily should not exceed five (5) days.
CBP Directive § 5.3.1; Compl. ¶ 15. The ICE Directive requires searches of detained electronic devices to be completed “in a reasonable time given the facts and circumstances of a particular search,” which will generally be within 30 days. ICE Directive § 8.3(1). If the CBP seizes a traveler’s electronic device, the traveler may nonetheless be permitted to enter the country and, if eventually cleared, the device will be sent to the traveler later. CBP Directive § 5.3; Compl. ¶ 16. CBP agents must obtain supervisory approval before they detain an electronic device or make copies of the information contained on it for the purpose of continuing a border search after the traveler leaves the border search site. CBP Directive § 5.3.1.1; Compl. ¶ 16. The ICE Directive does not require supervisory approval before detaining or copying information stored on an electronic device. ICE Directive § 8.2(5).
If the CBP requires technical assistance in order to search the information on the electronic device (for example, if the information is encrypted or written in a foreign language), “[o]fficers may transmit electronic devices or copies of information contained therein to seek technical assistance from other federal agencies, with or without individualized suspicion.” CBP Directive § 5.3.2.2; Compl. ¶ 17. If the CBP requires subject-matter assistance in order to “determine the meaning, context, or value of information contained therein,” “[ojfficers may transmit electronic devices or copies of information contained therein to other federal agencies for the purpose of obtaining subject matter assistance when they have reasonable suspicion of activities in violation of the laws enforced by CBP.” CBP Directive § 5.3.2.3 (emphasis added); Compl. ¶ 17. The ICE directive contains a similar reasonable suspicion requirement. ICE Directive § 8.4(2)(b). Seeking either type of assistance requires supervisory approval. CBP Directive § 5.3.2.4. The Directive provides that, unless otherwise necessary, if a traveler’s electronic device must be transmitted to another agency, a copy should be made of the information stored on it and the copy transmitted instead of the actual device. CBP Directive § 5.3.2.5.
The Directive provides that copies of information from an electronic device may be retained under certain circumstances:
Officers may seize and retain an electronic device, or copies of information from the device, when, based on a review of the electronic device encountered or on other facts and circumstances, they determine there is probable cause to believe that the device, or [a] copy of the contents thereof, contains evidence of or is the fruit of a crime that CBP is authorized to enforce.
CBP Directive § 5.4.1.1 (emphasis added). The Directive specifically requires the destruction of any copies of information contained on a traveler’s electronic device:
Except as noted in section 5.4 or elsewhere in this Directive, if after reviewing the information pursuant to the time frames discussed in section 5.3, there is not probable came to seize it, any copies of the information must be destroyed, and any electronic device must be returned. Upon this determination that there is no value to the information copied from the device, the copy of the information is destroyed as expeditiously as possible, but no later than seven (7) days after such determination unless circumstances require additional time, which must be approved by a supervisor and documented in an appropriate CBP system of records and which must be no later than twenty one (21) days after such determination. The destruction shall be noted in appropriate CBP systems of records.
CBP Directive § 5.3.1.2 (emphasis added); see also CBP Directive § 5.3.3.4 (“Except as noted in section 5.4.1 below or elsewhere in this Directive, if after reviewing information, probable cause to seize the information does not exist, CBP will retain no copies of the information.”); CBP Directive § 5.4.1.6 (“Except as noted in this section or elsewhere in this Directive, if after reviewing information, there exists no probable cause to seize the information, CBP will retain no copies of the information”).
The Directive permits two categories of information to be retained without probable cause. First, “CBP may retain only information relating to immigration, customs, and other enforcement matters if such retention is consistent with the privacy and data protection standards of the system of records in which such information is retained.” CBP Directive § 5.4.1.2. The Directive mentions data collections such as the A-file, Central Index System, TECS, and ENFORCE as possible repositories of such information. Id. Second, “CBP, as a component of DHS, will promptly share any terrorism information encountered in the course of a border search with elements of the federal government responsible for analyzing terrorist threat information.” CBP Directive § 5.4.1.4.
Where the CBP turns an electronic device over to ICE for “analysis and investigation,” “ICE policy will apply once it is received by ICE.” ICE Directive § 6.2; CBP Directive § 2.7. The CBP Directive requires that, “[a]t the conclusion of the requested assistance, all information must be returned to CBP as • expeditiously as possible,” and “the assisting federal agency should destroy all copies of the information transferred to that agency,” unless the assisting agency has independent legal authority to do so. CBP Directive §§ 5.4.2.2-5.4.2.3. The ICE Directive contains similar provisions regarding retaining and sharing information, ICE Directive §§ 8.5(l)(a)-(e), and provides as follows regarding destruction:
Copies of information from electronic devices, or portions thereof, determined to be of no relevance to ICE will be destroyed in accordance with ICE policy governing the particular form of information. Such destruction must be accomplished by the responsible Special Agent within seven business days after conclusion of the border search unless circumstances require additional time, which must be approved by a supervisor and documented in appropriate ICE systems. All destructions must be accomplished no later than 21 calendar days after conclusion of the border search.
ICE Directive § 8.5(e).
2. Review and Handling of Privileged or Other Sensitive Materials
Both the CBP and ICE directives contain special provisions relating to the han
Other “possibly sensitive” information, “such as medical records and work-related information carried by journalists, shall be handled in accordance with any applicable federal law and CBP policy.” CBP Directive § 5.2.2; see also ICE Directive § 8.6(2)(c). Moreover, CBP officers are advised that “[questions regarding the review of these materials shall be directed to the CBP Associate/Assistant Chief Counsel, and this consultation shall be noted in appropriate CBP systems of records.” CBP Directive § 5.2.2; see also ICE Directive § 8.6(2)(c). Finally, “[ojfficers encountering business or commercial information in electronic devices shall treat such information as business confidential information and shall protect that information from unauthorized disclosure.” CBP Directive § 5.2.3; see also ICE Directive § 8.6(2)(a). Specifically, .“[depending on the nature of the information presented, the Trade Secrets Act, the Privacy Act, and other laws, as well as CBP policies, may govern or restrict the handling of the information.” CBP Directive § 5.2.3; see also ICE Directive § 8.6(2)(a).
B. The Border Search of Abidor and His Electronic Devices
On May 1, 2010, Pascal Abidor, a twenty-six-year-old graduate student at the Institute of Islamic Studies at McGill University in Montreal, Canada, was aboard an Amtrak train from Montreal to New York City. Compl. ¶¶ 7, 21, 24. At approximately 11:00 a.m., the train stopped at a United States Customs and Border Patrol inspection point near Service Port-Champlain. Compl. ¶ 25. A CBP officer inspected Abidor’s customs declaration and U.S. passport. Abidor told the CBP officer that he had briefly lived in Jordan and visited Lebanon in the previous year. Compl. ¶¶ 26-28. While Abidor had obtained visas to these two countries, they were not contained in his United States passport. Instead, they were contained in a French passport which was also in Abidor’s possession. Compl. ¶ 28. Abidor was instruct
Among Abidor’s belongings were several electronic devices, including his laptop computer, digital camera, two cellular telephones, and an external computer hard drive. Compl. ¶ 24. The officer removed Abidor’s laptop computer from one of his bags, turned it on, and ordered Abidor to enter his password, which he did without objection. Compl. ¶ 30. The officer inspected the laptop, focusing apparently on certain pictures Abidor had saved that depicted rallies of Hamas and Hezbollah, Compl. ¶ 32, both of which were designated by the State Department as terrorist organizations. See Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2008, Terrorist Organizations, U.S. Dep’t of State (April 30, 2009), http://www.state.gOv/j/d/rls/crt/2008/ 122449.htm. When Abidor was asked why he was interested in these images, “Abidor explained that his specific area of research for his Ph.D. degree is the modern history of Shiites in Lebanon,” Compl. ¶ 32, in which Hezbollah openly operates. Compl. ¶ 82. Even if this may have explained the pictures of Hezbollah, it did not explain why Abidor saved the pictures of Hamas, a terrorist organization not composed of Shiites and not based in Lebanon.
The CBP officer who was interviewing Abidor “ordered [him] to write down his password [to the laptop],” and Abidor complied. Compl. ¶ 33. Abidor alleges, on information and belief, that his laptop was searched during the five hours from the time he was stopped until he was released. Compl. ¶ 41. In particular, he alleges that at a minimum, one movie and a document related to his dissertation were viewed. Compl. ¶ 41. His laptop was retained by CBP for further inspection by ICE. Compl. ¶43. His camera and two cell phones were returned to him at the border search site. Compl. ¶ 44. “One of his cell phones was returned with a scratch on the back of the phone near the battery, suggesting that someone had tried to open it.” Compl. ¶ 44. Abidor’s laptop and external drive were returned to him eleven days later by mail. Compl. ¶ 48. It appeared to him that both the laptop and external drive had been physically opened and that various files on the laptop and external drive had been viewed. Compl. ¶ 49.
Some files opened and examined by the officers included highly private and expressive materials that reveal intimate details about Mr. Abidor’s life, such as his personal photos, a transcript of a chat with his girlfriend, copies of email correspondence, class notes, journal articles, his tax returns, his graduate school transcript, and his resume. At the time his laptop was detained, it was configured to automatically allow access to his online email and social networking accounts, raising the possibility that border agents searched through Mr. Abidor’s stored correspondence and communications as well.
Compl. ¶ 51. The complaint also alleges on information and belief that one or more agencies copied Abidor’s laptop and external drive, transmitted the contents of both devices to other agencies, and retained copies as well. Compl. ¶¶ 52-54.
Abidor claims that he now “self-censors” the information he stores on his computer — including the notes he might otherwise take in connection with his academic research — and warns those he interviews that his notes and any documents they provide to him might be viewed by border officials. Compl. ¶ 62. This has “change[d] the way he conducts research” and caused him to fear that interviewees will be less candid and share less information and fewer documents with him than they would have otherwise. Compl. ¶ 63.
The NACDL alleges that many of its members — criminal defense attorneys resident throughout the country — routinely travel abroad for professional purposes and bring with them electronic devices containing personal, confidential, or privileged information. Compl. ¶¶ 69, 75-76. It contends that the ICE and CBP policies interfere with its members’ ability to represent clients because they must “take seriously the risk that the content of their electronic devices could be reviewed, copied, and detained.” Compl. ¶ 77. This creates an ethical dilemma because NACDL’s members have a duty to safeguard privileged and confidential information, which could be revealed to the federal government (a common litigation adversary for criminal defense attorneys) if their electronic documents are searched at the border. Compl. ¶ 79. NACDL alleges at least one of its member-attorneys was subject to a stop at the border. Compl. ¶¶ 85-95. The complaint alleges that her computer was taken “out of sight for more than 30 minutes, presumably to complete an electronic search.” Compl. ¶ 95. The NACDL member “did not witness the CBP officer’s search,” and the laptop was returned after the 30 minute period. Compl. ¶ 95.
The NPPA is a group of photojournalists who reside throughout the country and abroad and which promotes “freedom of the press in all its forms, especially as that freedom relates to photojournalism.” Compl. ¶¶ 99-101. It alleges that its members routinely travel abroad and report on stories that are of interest to the United States government, which raises the specter of the targeted search and detention of their electronic materials without suspicion. In particular, they communicate with sources who request guarantees of anonymity that they may no longer be able to offer if their electronic devices are subject to search. Compl. ¶¶ 113-14. One photojournalist who was riding his motorcycle was allegedly stopped at the Canadian border. Compl. ¶¶ 122-27. “He had been in Canada to, among other things, take photographs for a piece on lighthouses and to take photos of national parks.” Compl. ¶ 122. The complaint alleges that a CBP agent turned on the individual’s computer, “and peruse[d] the contents of [the] laptop for approximately 15 minutes.” Compl. ¶ 125. “[T]he [laptop’s] password protection was not engaged because the laptop was in hibernate mode.” Compl. ¶ 125. The CBP officer returned the laptop immediately after the alleged search. Compl. ¶ 125.
DISCUSSION
Before proceeding to a discussion of the issues of standing and the merits of the challenge to the CBP and ICE directives, it is important to define terms that are used to describe the challenged searches at issue here. One is a “quick look” and the other is a “comprehensive forensic examination.” See United States v. Cotterman,
A. Standing
Plaintiffs bear the burden of establishing their standing to pursue the relief they seek. See Lujan v. Defenders of Wildlife,
A “threatened injury must be certainly impending to constitute injury in fact, and [ ][a]llegations of possible future injury are not sufficient.” Clapper v. Amnesty Int’l USA, — U.S. -,
Relying on records released by the CBP through the Freedom of Information Act (FOIA), the complaint alleges that 6,500 people, less than 3,000 of whom were U.S.
Statistics compiled and published by the CBP in 2006 indicate that “[o]n a typical day, more than 1.1 million passengers and pedestrians ... are processed at the nation’s borders.” Securing America’s Borders at Ports of Entry, U.S. Customs and Border Protection, 2 (Sept. 2006), https://www.hsdl.org/?view&did=469950.
Care must be taken, however, not to conflate the number of searches at the border with the number of those searches that were undertaken without reasonable suspicion. The figures that the complaint cites overstate the odds of a suspicionless search, which plaintiffs allege violates the Constitution, because there is an even more remote chance that such a .search would take place without suspicion. United States v. Cotterman,
Significantly, while the Ninth Circuit held that reasonable suspicion for the more comprehensive forensic examination was required, it acknowledged that the “government — for now — does not have the time or resources to seize and search the millions of devices that accompany the millions of travelers who cross our borders.” Id. at 966. Even though the regulations authorize such searches to take place without reasonable suspicion, the Ninth Circuit observed that “as a matter of commonsense and resources, it is only when reasonable suspicion is aroused that such searches will take place.” Cotterman,
The Ninth Circuit’s apparent concern was not with an ongoing practice of suspicionless comprehensive forensic computer searches of the kind it held “intrudes upon privacy and dignity interests to a far greater degree than a cursory search at the border.” Id. at 966. Rather, although it acknowledged that “for now” such searches were beyond the government’s resources, it was “the potential unfettered dragnet effect that [was] troublesome.” Id. While the procedural posture of the Cotterman case — an appeal from an order granting the defendant’s motion to suppress — provided an occasion for the Ninth Circuit to address the threshold issue whether reasonable suspicion was required for the search that took place in that case, the procedural posture of the present case makes such consideration inappropriate.
An action for declaratory judgment does not provide an occasion for addressing a claim of alleged injury based on speculation as to conduct which may or may not occur at some unspecified future date. See Lujan v. Defenders of Wildlife,
Baur appears to mark a narrow exception to the rule that probabilistic injury does not provide a basis for Article III standing. As Judge Livingston has observed, “[probabilistic injury” of the kind on which Baur relied, has “never been recognized by the Supreme Court or this Circuit as sufficient as a general matter to constitute injury in fact for the purposes of Article III standing, and for good reason— as the D.C. Circuit has noted, were all purely speculative increased- risks deemed injurious, the entire requirement of actual or imminent injury would be rendered moot, because all hypothesized, non-imminent injuries could be dressed up as increased risk of future injury.” Amnesty Int’l USA v. Clapper,
Moreover, even assuming the allegations in the complaint established standing, closely related principles of declaratory judgment law warrant dismissal. Specifically, “[a] declaratory judgment, like other forms of equitable relief, should be granted only as a matter of judicial discretion, exercised in the public interest. It is always the duty of a court of equity to strike a proper balancé between the needs of the plaintiff and the consequences of giving the desired relief.” Eccles v. Peoples Bank of Lakewood Vill.,
Significantly, in the context of the present case, delaying a decision provides an opportunity for Congress and the Executive Branch to respond to any abuses that should develop as a consequence of the operation of the current CBP and ICE directives — directives which themselves seek to regulate and circumscribe the conduct of searches of electronic devices. See Yule Kim, Cong. Research Serv. RL34404, Border Searches of Laptop Computers and Other Electronic Storage Devices, 13-14 (2009) (describing recent legislative proposals to limit border searches of electronic devices). Indeed, a careful reading of the CBP and ICE directives indicates that these agencies are sensitive to the privacy and confidentiality issues posed by border searches of electronic devices. They constitute efforts to cabin the nature and extent of such searches, and they contain significant precautionary measures to be taken with respect to the handling of privileged and other sensitive materials that are described earlier. CBP Directive § 5.2; ICE Directive § 8.6; see supra discussion at 6-7.
Thus, upon the assertion by an individual that “certain information is protected by attorney-client or attorney work product privilege,” or if it appears that the electronic device contains such material, both the CBP and ICE directives preclude any search of an electronic device without seeking advice from the agency’s Chief Counsel, who must make a record of such consultation in the system of records, and coordinate with the U.S. Attorney’s Office as appropriate. CBP Directive § 5.2.1; see also ICE Directive § 8.6(2)(b). Indeed, I read these particular directives as containing a significant threshold requirement. Specifically, even before consulting legal counsel within the agency, a CBP or ICE officer must suspect that such material constitutes evidence of a crime or otherwise pertains to a determination within the jurisdiction of the CBP or ICE. Id. Moreover, reasonable suspicion and probable cause are required for certain conduct to be undertaken, other than the search itself. See, e.g., CBP Directive § 5.3.2.3, 5.4.1.1; ICE Directive §§ 8.4(2)(b), 8.5(l)(a). Significantly, some of the reported cases indicate that search warrants were obtained for comprehensive forensic searches, even though not required by the directives. See, e.g., United States v. Stewart,
In sum, declaratory relief is not appropriate because is it unlikely that a member of the association plaintiffs will have his electronic device searched at the border, and it is far less likely that a comprehensive forensic search would occur without reasonable suspicion. This is particularly true with respect to electronic devices of lawyers and journalists, among others, who have been singled out for special protection. See CBP Directive § 5.2; ICE Directive § 8.6. Indeed, Pascal Abidor, the only individual plaintiff in the case, who claims to have had his computer subject to a forensic search upon his entry into the United States from Canada, by his own admission travels frequently between the
Nor is there any merit to Abidor’s claim that he has standing “for the additional reason that he seeks expungement of information he believes DHS may have retained from his electronic devices. Pis.’ Br. 18. He argues this is an ongoing injury, and that “the Second Circuit has recognized” a demand for expungement provides a basis for standing. Pis.’ Br. 18. The problem with this argument is that under the regulations he is entitled to have the materials destroyed. CBP § Directive 5.3.2.4. Indeed, the Department of Justice attorney conceded at oral argument that the materials “would have been destroyed but for the fact that cases had been filed,” and that they were being retained as potentially relevant to those cases. Hr’g Tr., 32:4-29 (June 8, 2011). Under these circumstances, the fact that Abidor seeks ex-pungement does not provide a basis to challenge a regulation which provides him with that remedy. See Cherry v. Postmaster Gen.,
Abidor could have established standing in this case by adding a cause of action for damages based on his claim that he was subject to an unreasonable search. Such a cause of action would have provided the occasion for a trial or a motion for summary judgment that would have fully developed the record with respect to both the initial quick look search and subsequent forensic search. No such cause of action is alleged here. Instead, it appears that Abidor was chosen to participate as a co-plaintiff because, unlike any member of the association plaintiffs, his computer was subject to a search pursuant to the directives that are challenged here. Nevertheless, as the Supreme Court held in City of Los Angeles v. Lyons, even given past harm, “[ajbsent a sufficient likelihood that [the plaintiff] will again be wronged in a similar way, [he] is no more entitled to an injunction than any other citizen.”
The individual plaintiff, Pascal Abidor, alleges that he plans to undertake additional travel to conduct research in foreign countries, including Syria and Lebanon, Pis.’ Br. 7, apparently unconcerned about the searches to which his computer may be subject in those countries. He argues that, “at the expense of his educational goals,” he has expended time and money to minimize future searches at the United States border. Pis.’ Br. 7. Thus, “[h]e now travels with less information on his computer, self-censors what photographs he downloads, and backs up onto an external hard drive and then deletes materials he fears that border officials may misconstrue.” Pis.’ Br. 7-8. Moreover, he asserts that [h]e now avoids taking notes for his research and gathering materials of the type that might be misconstrued by border officials and warns research subjects that he cannot guarantee them confidentiality.” Pis.’ Br. at 8.
Because plaintiffs do not face a threat of certainly impending suspicionless border searches of their electronic devices, they cannot establish standing based on the measures they have undertaken to preserve confidentiality of the sensitive information they claim would be compromised as a result of the searches that the challenged directives authorize. See Clapper,
More significantly, however, it is difficult to understand how a threshold requirement of reasonable suspicion significantly alleviates the alleged harm that plaintiffs fear. Reasonable suspicion is a minimal threshold standard for conducting a search. Indeed, in Cotterman, the Ninth Circuit reaffirmed an earlier holding that reasonable suspicion was not required for “a quick look and unobtrusive search of
Plaintiffs must be drinking the Kool-Aid if they think that a reasonable suspicion threshold of this kind will enable them to “guarantee” confidentiality to their sources, Pis.’ Br. 8-9, or to protect privileged information, Pis.’ Br. 8. Nor is this the only consideration that prevents them from guaranteeing confidentiality. The United States border is not the only border that must be crossed by those engaging in international travel. “Carrying an electronic device outside the United States almost always entails carrying it into another country, making it subject to search under that country’s laws.” Cotterman,
This is enough to suggest that it would be foolish, if not irresponsible, for plaintiffs to store truly private or confidential information on electronic devices that are carried and used overseas. There is yet another reason — the risk associated with the loss of laptop computers. A recent comprehensive study of airports and business travelers, sponsored by Dell Inc., reported that “[b]usiness travelers in the U.S., Europe and [the] United Arab Emirates lose or misplace more than 16,000 laptops per week.” Airport Insecurity: The Case of the Lost & Missing Laptops, Ponemon Institute LLC, 3 (July 29, 2008), http:// www.dell.com/downloads/global/services/ delLiost_Japtop_study_emea.pdf. These laptops were either lost or stolen. Id. One of the many suggestions that the Dell study makes to travelers is to “[t]hink twice about the information you carry on your laptop.” Id. at 8. And it concludes with the commonsense query: “Is it really necessary to have so much information accessible to you on your computer?” Id.
B. The Merits
While I do not believe that the plaintiffs have standing, I discuss the merits of their claims in order to complete the record and avoid the possibility of an unnecessary remand in the event that the Court of Appeals should disagree. I agree with the Ninth Circuit that reasonable suspicion is not required to conduct a cursory manual search of an electronic device at the border. Cotterman,
The Fourth Amendment provides that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated----” U.S. Const, amend. IV. Whether a search or seizure is unreasonable “depends upon all of the circumstances surrounding the search or seizure and the nature of the search or seizure itself. The permissibility of a particular law enforcement practice is judged by balancing its intrusion on the individual’s Fourth Amendment interests against its promotion of legitimate governmental interests.” United States v. Montoya de Hernandez,
Border searches ... from before the adoption of the Fourth Amendment, have been considered to be “reasonable” by the single fact that the person or item in question had entered into our country from outside. There has never been any additional requirement that the reasonableness of a border search depended on the existence of probable cause. This longstanding recognition that searches at our borders without probable cause and without a warrant are nonetheless “reasonable” has a history as old as the Fourth Amendment itself.
United States v. Ramsey,
Professor LaFave observes that, “[although it has sometimes been said that mere entry into the United States gives rise to probable cause for a search, this is hardly the case, for certainly the great
The border search doctrine is an example of what is known as an administrative or special needs exception to traditional threshold requirements of probable cause and reasonable suspicion. See, e.g., Nat’l Treasury Emps. Union v. Von Raab,
no ready test for determining reasonableness other than by balancing the need to search against the invasion which the search entails. But we think that a number of persuasive factors combine to support the reasonableness of area code-enforcement inspections. First, such programs have a long history of judicial and public acceptance. Second, the public interest demands that all dangerous conditions be prevented of abated, yet it is doubtful that any other canvassing technique would achieve acceptable results. Many such conditions-faulty wiring is an obvious example-are not observable from outside the building and indeed may not be apparent to the inexpert occupant himself. Finally, because the inspections are neither personal in nature nor aimed at the discovery of evidence of crime, they involve a relatively limited invasion of the urban citizen’s privacy.
Camara,
Border searches, likewise, “have a long history of judicial and public' acceptance.” Id. at 537,
Laptop searches have proven essential to detecting people and materials that should be blocked from entering the United States. Officers have discovered video clips of improvised explosive devices being detonated, a martyrdom video and other violent jihadist materials. In addition, these searches have uncovered scores of instances of child pornography, including a home movie of children being sexually assaulted.
Michael Chertoff, Searches Are Legal, Essential, USA Today, July 16, 2008, at A10.
As in Camara, “it is doubtful that any other canvassing technique would achieve acceptable results.” Camara,
The final consideration in Camara was that the inspection at issue in that case was not aimed at the discovery of evidence, and involved “a relatively limited invasion of ... privacy.” A comprehensive forensic search of a computer, whether a desktop or a laptop, involves a significant invasion of privacy. United States v. Galpin,
The Second Circuit has not addressed the issue of border searches of electronic devices. But in United States v. Irving, No. S3-03-0633,
Inspection of the contents of closed containers comes within the scope of a routine border search and is permissible even in the absence of reasonable suspicion or probable cause. Indeed, the opening of luggage, itself a closed container, is the paradigmatic routine border search. Hence, the agents were entitled to inspect the contents of the diskettes even absent reasonable suspicion. Indeed, any other decision effectively would allow individuals to render graphic contraband, such as child pornography, largely immune to border search simply by scanning images onto a computer disk before arriving at the border.
Id. at *5. Because the Second Circuit upheld the validity of the search on the ground that it was supported by reasonable suspicion, it did not reach the issue resolved by Judge Kaplan. United States v. Irving,
Outside of this circuit, three Courts of Appeals have addressed the question. The Third and Fourth Circuits held that searches of electronic devices constitute routine border searches. United States v. Linarez-Delgado,
Nevertheless, the Ninth Circuit recently held that border searches of electronic devices may require reasonable suspicion in some circumstances. United States v. Cotterman,
The Court of Appeals differentiated between what it referred to as a “forensic examination” and the “quick look” it had previously approved without a suspicion requirement in other cases. Cotterman,
As I have previously observed, the Ninth Circuit acknowledged that its opinion would not have any practical effect on current practices, because the extremely limited resources available to conduct comprehensive forensic searches necessarily limits such searches to situations where some level of suspicion is present. Id. at 967 n. 14. I would agree with the Ninth Circuit that, if suspicionless forensic computer searches at the border threaten to become the norm, then some threshold showing of reasonable suspicion should be required. Now, however, “locking in a particular standard for searches would have a dangerous, chilling effect as officer’s often split-second assessments are second guessed.” Chertoff, Searches Are Legal, Essential.
This leaves one last point— Abidor’s as applied challenge to the quick look and comprehensive forensic searches of his electronic devices. There was reasonable suspicion for those searches. “A reasonable suspicion inquiry simply considers, after taking into account all the facts of a particular case, ‘whether the border official ha[d] a reasonable basis on which to conduct the search.’ ” Irving,
In Abidor’s case, CBP agents observed images of the rallies of designated terrorist groups (Hamas and Hezbollah) on the laptop computer of a traveler who had recently traveled to Lebanon. According to the State Department report in effect at the time of the search, “[Hamas] retains a cadre of leaders and facilitators that conducts diplomatic, fundraising, and arms-smuggling activities in Lebanon, Syria, and other states,” and was “increasing its presence in the Palestinian refugee camps in Lebanon.” See Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2008, Terrorist Organizations, U.S. Dep’t of State (April 30, 2009), http://
Moreover, although Abidor told officers he was living in Canada, he possessed both a U.S. and French passport, Compl. ¶¶ 26, 28, a circumstance which, while perhaps innocent in itself, in combination with other factors may have increased the level of suspicion, especially as the passport containing the visas from Lebanon and Jordan was not produced initially. See United States v. Sokolow,
CONCLUSION
The motion to dismiss is granted.
SO ORDERED.
Notes
. The CBP and ICE directives contain slightly different wording with respect to the sharing of information that is “determined to be protected by law as privileged or sensitive.” CBP Directive § 5.2.4; ICE Directive § 8.6(3). The ICE directive provides that such material "is to be handled consistent with the laws and policies governing such information.” ICE Directive § 8.6(3). The CBP directive provides that such information “will only be shared with federal agencies that have mechanisms in place to protect appropriately such information.” CBP Directive § 5.2.4.
. The suggestion that the computer was "presumably" subject to a complete electronic search during the 30 minute period it was out of her presence is purely speculative. Indeed, such a search would have- violated the CBP directive that absent specified exigent circumstances, such searches must be conducted in the presence of the individual whose information is being examined. CBP Directive § 5.1.4; see also ICE Directive § 8.1(2). I discuss this issue more fully in footnote 4.
. A more relaxed standard may be appropriate where the challenges to the enforcement against a plaintiff of a traditional punitive statute, whether civil or criminal, because of the presumption that the Executive Branch will enforce such laws. See Hedges v. Obama,
. A judge can take judicial notice, on his own, of a fact that "can be accurately and readily determined from sources whose accuracy cannot reasonably be questioned.” Fed. R.Evid. 201(b, c). The Court of Appeals for the Ninth Circuit appears to have done just that in United States v. Cotterman,
. The petition for rehearing in Amnesty Int’l USA v. Clapper was denied by an equally divided vote. Amnesty Int’l USA v. Clapper,
. The circumstances surrounding the last search, which took place December 22, 2010, are not spelled out in the complaint. Instead, they are described in post-complaint declarations by Abidor and Charles Allen, the Supervisory CBP Officer at the Port of Champlain, New York, where the events occurred. Abidor Deck; Allen Decl. Abidor alleges only that “[a]n agent took two cell phones out of sight.” Abidor Decl. ¶ 7. In a reply declaration, Officer Allen acknowledges that the two cell phones were taken pursuant to general "CBP practice with respect to secondary inspection,” that "all electronic devices, including cell phones, are requested of the individuals being inspected at the start of the inspection so that the devices cannot be used during the inspection process.” Allen Decl. ¶¶ 7-9. Allen goes on to say “[a]t no time ... were the cell phones searched, nor was the information contained in them examined or copied in any manner.” Allen Decl. ¶ 11. The only inconsistency between the two affidavits is Allen’s assertion that "the cell phones were simply placed on the secondary work station out of Pascal's and [his father’s] reach but within their plain view.” Allen Decl. ¶ 11. This is consistent with the CBP directive that ”[s]earches of electronic devices should be conducted in the presence of the individual whose information is being examined unless there are national security, law enforcement, or other operational considerations that make it inappropriate to permit the individual to remain present.” CBP Directive § 5.1.4; see also ICE Directive § 8.1(2). Passing over the propriety of the submission of these affidavits in the context of a motion to dismiss, and accepting Abidor’s version of the events, it does not establish that any search occurred. Indeed, the fact that this incident is the only one that plaintiffs have chosen to document during the three years since they filed the complaint, only confirms that it is unlikely that any of the plaintiffs will have their electronic devices searched at the border.
. While the en banc opinion in Cotterman limited the scope of the holding in Arnold regarding the restrictions the Fourth Amendment places on comprehensive forensic searches of electronic devices at the border, Cotterman did not upset the First Amendment holding in Arnold.
. The only recognized exception to this broad holding, which has been carved out by the Courts of Appeals, relates to strip and body cavity searches. See United States v. Asbury,
. "The element of choice is crucial. The fact that border searches occur at fixed times and checkpoints makes them inherently less intrusive; a person ‘with advance notice of the location of a permanent checkpoint has an opportunity to avoid the search entirely, or at least to prepare for, and limit, the intrusion on her privacy.' ” Cotterman,
. The Directive also authorizes CBP agents to copy the information stored on electronic devices to facilitate inspection. See, e.g., CBP Directive § 5.3.1; ICE Directive § 8.1(4)-(5). Plaintiffs argue that merely copying information stored on an electronic device, to permit the information to be inspected, constitutes a separate, invasive search. Pis.’ Br. 26. On the assumption that it is permissible to perform a forensic search of an electronic device, transferring information to a different storage device for the same sort of inspection does not transform the search from routine to non-routine (i.e., highly-intrusive into the dignity and privacy interests of the person searched).
