EFTA00314991.pdf
dataset_9 pdf 3.9 MB • Feb 3, 2026 • 35 pages
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sere. 2531, 2013 Daily Journal =. 3018
Callahan, Circuit Judge, filed opinion concurring in part,
11 -I KeyCite Yellow Flag - Negative Treatment
dissenting in part, and concurring in the judgment, with whom
Declined to Extend by United States v. Hassanshahi. Clifton, Circuit Judge, joined, and with whom M. Smith,
December I. 2014
Circuit Judge, joined in part.
709 F.3d 952
United States Court of Appeals, M. Smith, Circuit Judge, filed dissenting opinion, with whom
Ninth Circuit. Clifton and Callahan, Circuit Judges, joined in part.
UNITED STATES of America, Plaintiff—Appellant,
v.
West Headnotes (27)
Howard Wesley COTTERMAN,
Defendant—Appellee.
[1] Customs Duties
No. 09-10139. I Argued and Submitted En P- Searches and Seizures
Banc June 19, 2012. I Filed March 8, 2013.
Searches and Seizures
Synopsis iis• Fourth Amendment and reasonableness in
Background: Defendant was charged with production of general
child pornography, transportation and shipping of child Border searches constitute a historically
pornography, receipt of child pornography, possession recognized exception to the Fourth Amendment's
of child pornography, importation of obscene material, general principle that a warrant be obtained,
transportation of obscene material, and unlawful flight but reasonableness remains the touchstone for a
to avoid prosecution. The United States District Court warrantless search. U.S.C.A. Const.Amend. 4.
for the District of Arizona, 2009 WL 465028, Raner C.
Cases that cite this headnote
Collins, J., granted defendant's motion to suppress evidence.
Government filed interlocutory appeal. The Court of Appeals,
637 F.3d 1068. reversed and remanded. The Court of Appeals [2] Criminal Law
granted rehearing en banc. 673 F.3d 1206. Review De Novo
The ultimate question of whether a warrantless
search was reasonable under the Fourth
Holdings: The Court of Appeals, McKeown, Circuit Judge, Amendment is reviewed de novo. U.S.C.A.
held that: Const.Amend. 4.
Cases that cite this headnote
[1 ] extended border search doctrine did not apply to seizure
and forensic examination of defendant's laptop computer;
[3] Criminal Law
[2] forensic examination of defendant's computer that Specification of errors
comprehensively analyzed its hard drive required showing of The Court of Appeals may consider an issue that
reasonable suspicion; and has not been adequately raised on appeal if such
a failure will not prejudice the opposing party.
[3] border agents had reasonable suspicion to conduct initial
search and subsequent forensic examination of defendant's Cases that cite this headnote
computer that comprehensively analyzed hard drive.
[4] Criminal Law
Reversed. P- Specification of errors
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works.
EFTA00314991
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
Government's failure to address issue on appeal more favorably to the government. U.S.C.A.
of whether there was reasonable suspicion for Const.Amend. 4.
border search, after addressing issue before
district court, did not prejudice defendant, and Cases that cite this headnote
thus Court of Appeals could consider issue,
where Court of Appeals called for, and received, [8] Searches and Seizures
supplemental briefs by both parties. U.S.C.A. P- Scope, Conduct, and Duration of
Const.Amend. 4. Warrantless Search
2 Cases that cite this headnote The reasonableness of a search or seizure
depends on the totality of the circumstances,
including the scope and duration of the
[5] Customs Duties deprivation. U.S.C.A. Const.Amend. 4.
4' Searches and Seizures
Searches and Seizures 2 Cases that cite this headnote
Necessity of and preference for warrant,
and exceptions in general [9] Customs Duties
The broad contours of the scope of searches p- Time and distance factors; checkpoints
at international borders are rooted in the long- Extended border search doctrine, which
standing right of the sovereign to protect encompassed any search away from border
itself by stopping and examining persons where entry was not apparent, but where
and property crossing into the country; thus, dual requirements of reasonable certainty of
border searches form a narrow exception to recent border crossing and reasonable suspicion
the Fourth Amendment prohibition against of criminal activity were satisfied, did not
warrantless searches without probable cause. apply to seizure and forensic examination of
U.S.C.A. Const.Amend. 4. defendant's laptop computer after defendant had
been stopped and searched at border; although
4 Cases that cite this headnote
device had been transported and subjected to
extended and extensive examination beyond
[6] Customs Duties border, computer never cleared customs and
P- Searches and Seizures search would have been every bit as intrusive
Because the government's interest in preventing had it been conducted at border. U.S.C.A.
the entry of unwanted persons and effects is Const.Amend. 4.
at its zenith at the international border, border
10 Cases that cite this headnote
searches are generally deemed reasonable simply
by virtue of the fact that they occur at the border.
U.S.C.A. Const.Amend. 4. [10] Customs Duties
4'- Time and distance factors; checkpoints
4 Cases that cite this headnote
The key feature of an extended border search is
that an individual can be assumed to have cleared
[7] Customs Duties the border and thus regained an expectation of
P- Searches and Seizures privacy in accompanying belongings. U.S.C.A.
Even at the border, individual privacy rights Const.Amend. 4.
are not abandoned but balanced against the
2 Cases that cite this headnote
sovereign's interests; that balance is qualitatively
different than in the interior and is struck much
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works. 2
EFTA00314992
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =. 3018
[11] Customs Duties Cases that cite this headnote
4— Time and distance factors; checkpoints
Customs Duties [14] Customs Duties
Airports and airplanes 46... Scope and Nature; Successive or
The "functional equivalent" doctrine effectively Secondary, Searches
extends the border search doctrine to all ports Obscenity
of entry, including airports; a routine customs P- Computers; electronic transmission
search at the "functional equivalent" of the
After seizure at border, forensic examination
border is analyzed as a border search and requires
of defendant's computer that comprehensively
neither probable cause nor reasonable suspicion.
analyzed its hard drive required showing of
U.S.C.A. Const.Amend. 4.
reasonable suspicion; although government had
2 Cases that cite this headnote legitimate concerns about child pornography,
such concerns did not justify unfettered
crime-fighting searches or unregulated assault
[12] Customs Duties on citizens' private information. U.S.C.A.
Time and distance factors; checkpoints Const.Amend. 4.
The extended border search doctrine, which
encompasses any search away from border Cases that cite this headnote
where entry was not apparent, but where dual
requirements of reasonable certainty of recent [15] Searches and Seizures
border crossing and reasonable suspicion of 6'- Persons, Places and Things Protected
criminal activity were satisfied, is best confined
The Fourth Amendment's specific guarantee of
to cases in which, after an apparent border
the people's right to be secure in their "papers"
crossing or functional entry, an attenuation
encompasses financial records, confidential
in the time or the location of conducting a
business documents, medical records, and
search reflects that the subject has regained an
private emails on personal electronic devices.
expectation of privacy. U.S.C.A. Const.Amend.
U.S.C.A. Const.Amend. 4.
4.
Cases that cite this headnote
3 Cases that cite this headnote
[16] Searches and Seizures
[13] Customs Duties
fia Persons. Places and Things Protected
Time and distance factors; checkpoints
The express listing of papers under the Fourth
Under the extended border search doctrine,
Amendment reflects the Founders' deep concern
which encompasses any search away from
with safeguarding the privacy of thoughts
border where entry was not apparent, but where
and ideas, what might be called freedom of
dual requirements of reasonable certainty of
conscience, from invasion by the government;
recent border crossing and reasonable suspicion
these records are expected to be kept private
of criminal activity were satisfied, time and
and this expectation is one that society is
distance become relevant to determining whether
prepared to recognize as reasonable. U.S.C.A.
there is an adequate nexus to a recent border
Const.Amend. 4.
crossing only after the subject or items searched
have entered. U.S.C.A. Const.Amend. 4. Cases that cite this headnote
WeStlaWNPS © 2015 Thomson Reuters. No claim to original U.S. Government Works. 3
EFTA00314993
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
"Reasonable suspicion" is defined as a
[17] Searches and Seizures particularized and objective basis for suspecting
4. Expectation of privacy the particular person stopped of criminal activity.
The uniquely sensitive nature of data on U.S.C.A. Const.Amend. 4.
electronic devices carries with it a significant
expectation of privacy and thus renders an 9 Cases that cite this headnote
exhaustive exploratory search more intrusive
than with other forms of property. U.S.C.A. [21] Arrest
Const.Amend. 4. 0— Collective knowledge
4 Cases that cite this headnote The assessment of reasonable suspicion is to be
made in light of the totality of the circumstances;
even when factors considered in isolation from
[18] Customs Duties each other are susceptible to an innocent
4- Searches and Seizures explanation, they may collectively amount to a
The government's authority to protect the reasonable suspicion. U.S.C.A. Const.Amend. 4.
nation from contraband crossing its borders
may be heightened by national crises, such as 5 Cases that cite this headnote
the smuggling of illicit narcotics, the threat
of international terrorism, and future threats [22] Criminal Law
yet to take shape, but even in the face of 4— Review De Novo
heightened concerns, a court must account for
Criminal Law
the Fourth Amendments rights of travelers.
Evidence wrongfully obtained
U.S.C.A. Const.Amend. 4.
The Court of Appeals reviews reasonable
Cases that cite this headnote suspicion determinations de novo, reviewing
findings of historical fact for clear error and
giving due weight to inferences drawn from
[19] Customs Duties
those facts by resident judges and local law
Scope and Nature; Successive or
enforcement officers. U.S.C.A. Const.Amend. 4.
Secondary Searches
Reasonable suspicion to search personal 2 Cases that cite this headnote
electronic devices at the border requires that
officers make a commonsense differentiation
[23] Customs Duties
between a manual review of files on the
Scope and Nature; Successive or
electronic device and application of computer
Secondary, Searches
software to analyze a hard drive, and utilize the
latter only when they possess a particularized and Obscenity
objective basis for suspecting the person stopped 0. Particular cases
of criminal activity. U.S.C.A. Const.Amend. 4. Border agents had reasonable suspicion to
conduct initial search and subsequent forensic
10 Cases that cite this headnote examination of defendant's computer that
comprehensively analyzed hard drive after
[20] Arrest seizing it at border, where defendant had prior
0. Reasonableness; reason or founded conviction for child molestation, he traveled
suspicion, etc frequently to country associated with sex
tourism, and computer contained password-
protected files; although defendant had offered to
WestlawNexts © 2015 Thomson Reuters. No claim to original U.S. Government Works. 4
EFTA00314994
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
open files, computer contained vacation photos,
and initial examination did not turn up anything Cases that cite this headnote
incriminating, agents appropriately were wary of
offer of assistance due to concerns that defendant [27] Customs Duties
could tamper with computer and reasonable 6*, Scope and Nature; Successive or
suspicion otherwise had not been eliminated. Secondary Searches
U.S.C.A. Const.Amend. 4.
Obscenity
3 Cases that cite this headnote 4- Scope of search
Existence of password•protected files was
relevant to assessing reasonableness of scope and
[24] Arrest
duration of search of defendant's computer after
4- Reasonableness; reason or founded
its seizure at border; search necessarily had been
suspicion, etc
protracted because of password protection that
Although a prior criminal history cannot alone defendant had employed, and after defendant
establish reasonable suspicion, it is permissible refused to provide agents with passwords to
to consider such a fact as part of the total calculus protected files and fled country, it took agent
of information in that determination. U.S.C.A. days to override computer security and open
Const.Amend. 4. image files of child pornography. U.S.C.A.
Const.Amend. 4.
4 Cases that cite this headnote
Cases that cite this headnote
[25] Customs Duties
4'- Particular Objects or Products
Although password protection of files, in
isolation, will not give rise to reasonable Attorneys and Law Firms
suspicion justifying border search, where there
•956 Dennis K. Burke, Christina M. Cabanillas, Carmen
are other indicia of criminal activity, password
F. Corbin, John S. Leonardo, John J. Tuchi, United States
protection of files may be considered in the
Attorney's Office for the District of Arizona, Tucson, AZ, for
totality of the circumstances; to contribute to
Appellant.
reasonable suspicion, encryption or password
protection of files must have some relationship William J. Kirchner, Law Office of Nash & Kirchner, M.
to the suspected criminal activity. U.S.C.A. Tucson, AZ, for Appellee.
Const.Amend. 4.
David M. Porter, Melia N. Brink, National Association
Cases that cite this headnote of Criminal Defense Lawyers, Washington, Michael
Price, Brennan Center for Justice, New York, NY; Hanni
[26] Customs Duties M. Fakhoury, Electronic Frontier Foundation, San Francisco,
P- Particular Objects or Products CA, for Amicus Curiae National Association of Criminal
Defense Lawyers and Electronic Frontier Foundation.
Password protecting an entire device, as opposed
to files within a device, cannot be a factor Christopher T. Handman, Mary Helen Wimberly, Hogan
supporting a reasonable suspicion, such as would Lovells US LLP, Washington, M.; Sharon Bradford
justify border search; using a password on a Franklin, The Constitution Project, Washington, ■., for
device is a basic means of ensuring that the Amicus Curiae The Constitution Project.
device cannot be accessed by another in the event
it is lost or stolen. U.S.C.A. Const.Amend. 4.
WeStlaWNPA" © 2015 Thomson Reuters. No claim to original U.S. Government Works. 5
EFTA00314995
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
requirement and privacy rights in commonly used electronic
Appeal from the United States District Court for the District devices. The question we confront "is what limits there are
of Arizona, Raner C. Collins, District Judge, Presiding. M. upon this power of technology to shrink •957 the realm of
No. 4:07-cr-01207-RCC-CRP-I. guaranteed privacy." Kyllo v. United States, 533 U.S. 27, 34,
121 S.Ct. 2038, 150 L.Ed.2d 94 (2001). More specifically,
Before: ALEX KOZINSKI, Chief Judge, SIDNEY R.
we consider the reasonableness of a computer search that
THOMAS, M. MARGARET McKEOWN, KIM McLANE
began as a cursory review at the border but transformed into
WARDLAW, RAYMOND C. FISHER, RONALD M.
a forensic examination of Cotterman's hard drive.
GOULD, RICHARD R. CLIFTON, CONSUELO M.
CALLAHAN, MILAN D. SMITH, JR., MARY H.
Computer forensic examination is a powerful tool capable
MURGUIA, and MORGAN CHRISTEN, Circuit Judges. I of unlocking password-protected files, restoring deleted
material, and retrieving images viewed on web sites. But
1 Judge Betty B. Fletcher was a member of the en bane while technology may have changed the expectation of
panel but passed away after argument of the case. Judge
privacy to some degree, it has not eviscerated it, and certainly
Wardlaw was drawn as her replacement.
not with respect to the gigabytes of data regularly maintained
as private and confidential on digital devices. Our Founders
were indeed prescient in specifically incorporating "papers"
Opinion by Judge McKEOWN; Partial Concurrence and within the Fourth Amendment's guarantee of "[Otte right of
Partial Dissent by Judge CALLAHAN; Dissent by Judge the people to be secure in their persons, houses, papers, and
MILAN D. SMITH, JR. effects." U.S. Const. amend. IV. The papers we create and
maintain not only in physical but also in digital form reflect
our most private thoughts and activities.
OPINION
McKEOWN, Circuit Judge: [I] Although courts have long recognized that border
searches constitute a "historically recognized exception to
Every day more than a million people cross American the Fourth Amendment's general principle that a warrant be
borders, from the physical borders with Mexico and Canada obtained," United States v. Ramsey, 431 U.S. 606, 621, 97
to functional borders at airports such as Los Angeles (LAX), S.Ct. 1972, 52 L.Ed.2d 617 (1977), reasonableness remains
Honolulu (HNL), New York (JFK, LGA), and Chicago the touchstone for a warrantless search. Even at the border, we
(ORD, MDW). As denizens of a digital world, they carry have rejected an "anything goes" approach. See United States
with them laptop computers, iPhones, iPads, iPods. Kindles, v. Seljan, 547 F.3d 993. 1000 (9th Cir.2008) (en banc).
Nooks, Surfaces, tablets, Blackberries, cell phones, digital
cameras, and more. These devices often contain private and Mindful of the heavy burden on law enforcement to protect
sensitive information ranging from personal, financial, and our borders juxtaposed with individual privacy interests in
medical data to corporate trade secrets. And, in the case of data on portable digital devices, we conclude that, under the
Howard Cotterman, child pornography. circumstances here, reasonable suspicion was required for the
forensic examination of Cotterman's laptop. Because border
Agents seized Cotterrnan's laptop at the U.S.-Mexico border agents had such a reasonable suspicion, we reverse the district
in response to an alert based in part on a fifteen-year- court's order granting Cotterman's motion to suppress the
old conviction for child molestation. The initial search at evidence of child pornography obtained from his laptop.
the border turned up no incriminating material. Only after
Cotterman's laptop was shipped almost 170 miles away and
subjected to a comprehensive forensic examination were I. FACTUAL BACKGROUND AND PROCEDURAL
images of child pornography discovered. HISTORY 2
The facts related here are drawn from the record of the
This watershed case implicates both the scope of the narrow evidentiary hearing held before the magistrate judge.
border search exception to the Fourth Amendment's warrant
WeStlaWNeXt" © 2015 Thomson Reuters. No claim to original U.S. Government Works. 6
EFTA00314996
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sew. 2531, 2013 Daily Journal =. 3018
Howard Cotterman and his wife were driving home to the Agents Brisbine and Riley departed Sells for Lukeville
United States from a vacation in Mexico on Friday morning. at about 1:30 and decided en route to detain the
April 6, 2007, when they reached the Lukeville, Arizona, Port Cottermans' laptops for forensic examination. Upon their
of Entry. During primary inspection by a border agent, the arrival, they gave Cotterman and his wife Miranda warnings
Treasury Enforcement Communication System ("TECS") 3 and interviewed them separately. The interviews revealed
returned a hit for Cotterman. The TECS hit indicated that nothing incriminating. During the interview, Cotterman
Cotterman was a sex offender—he had a 1992 conviction for offered to help the agents access his computer. The agents
two counts of use of a minor in sexual conduct, two counts declined the offer out of concern that Cotterman might be
of lewd and lascivious conduct upon a child, and three counts able to delete files surreptitiously or that the laptop might be
of child molestation—and that he was potentially involved "booby trapped."
in child sex tourism. Because of the hit, Cotterman and his
wife were referred to secondary inspection, where they were The agents allowed the Cottermans to leave the border
instructed to exit their vehicle and leave all their belongings crossing around 6 E., but retained the Cottermans' laptops
in the car. The border agents called the contact person listed and a digital camera. 4 Agent Brisbine drove almost 170 miles
in the TECS entry and, following that conversation, believed from Lukeville to the ICE office in Tucson, Arizona, where
the hit to reflect Cotterman's involvement "in some type of he delivered both laptops and one of the three digital cameras
child pornography." The agents searched the vehicle and to ICE Senior Special Agent & Computer Forensic Examiner
retrieved two laptop computers and three digital cameras. John Owen. Agent Owen began his examination on Saturday,
Officer Antonio Alvarado inspected the electronic devices the following day. He used a forensic program to copy the
and found *953 what appeared to be family and other hard drives of the electronic devices. He determined that the
personal photos, along with several password-protected files. digital camera did not contain any contraband and released
the camera that day to the Cottermans, who had traveled
3 The TECS is an investigative tool of the Department to Tucson from Lukeville and planned to stay there a few
of Homeland Security that keeps track of individuals days. Agent Owen then used forensic software that often
entering and exiting the country and of individuals must run for several hours to examine copies of the laptop
involved in or suspected to be involved in crimes. hard drives. He began his personal examination of the laptops
on Sunday. That evening, Agent Owen found seventy-five
Border agents contacted Group Supervisor Craig Brisbine at
the Immigration and Customs Enforcement ("ICE') office images of child pornography within the unallocated space of
in Sells, Arizona, and informed him about Cotterman's entry Cotterman's laptop. 5
and the fact that he was a sex offender potentially involved
in child sex tourism. The Sells Duty Agent, Mina Riley, 4 The other two cameras were returned to the Cottermans.
also spoke with Officer Alvarado and then contacted the
5 "Unallocated space is space on a hard drive that contains
ICE Pacific Field Intelligence Unit, the office listed on the
TECS hit, to get more information. That unit informed Riley deleted data, usually emptied from the operating system's
trash or recycle bin folder, that cannot be seen or
that the alert was part of Operation Angel Watch, which
accessed by the user without the use of forensic software.
was aimed at combating child sex tourism by identifying
Such space is available to be written over to store new
registered sex offenders in California, particularly those who
information." United States v. Flyer. 633 F.3d 911. 918
travel frequently outside the United States. She was advised (9th Cir.201 I).
to review any media equipment, such as computers, cameras,
Agent Owen contacted the Cottermans on Sunday evening
or other electronic devices, for potential evidence of child
and told them he would need Howard Cotterrnan's assistance
pornography. Riley then spoke again to Alvarado, who told
to access password-protected files he found on Cotterman's
her that he had been able to review some of the photographs
laptop. Cotterman agreed to provide the assistance the
on the Cottermans' computers but had encountered password-
following day, but never showed up. When Agent Brisbine
protected files that he was unable to access.
called again to request Cotterman's help in accessing the
password-protected files, Cotterman responded that the
WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 7
EFTA00314997
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
computer had multiple users and that he would need to we requested supplemental briefing on the issue of whether
check with individuals at the *959 company from which reasonable suspicion existed at the time of the search.
he had retired in order to get the passwords. The agents had
no further contact with Cotterman, who boarded a flight to
Mexico from Tucson the next day, April 9, and then flew H. WAIVER
onward to Sydney, Australia. On April II, Agent Owen The government argued below that the forensic examination
finally managed to open twenty-three password-protected was part of a routine border search not requiring heightened
files on Cotterman's laptop. The files revealed approximately suspicion and, alternatively, that reasonable suspicion
378 images of child pornography. The vast majority of the justified the search. Before the district court, the government
images were of the same girl, approximately 7-10 years of maintained "the facts of this case clearly establish that
age, taken over a two-to three-year period. In many of the there was reasonable suspicion." However, having failed to
images, Cotterman was sexually molesting the child. Over obtain a favorable ruling on that ground, the government did
the next few months, Agent Owen discovered hundreds more not challenge on appeal the conclusion that there was no
pornographic images, stories, and videos depicting children. reasonable suspicion. Rather, it sought a broad ruling that no
suspicion of any kind was required. Cotterman thus argued in
A grand jury indicted Cotterman for a host of offenses his answering brief that the government had waived the issue
related to child pornography. Cotterman moved to suppress —an assertion that the government did not address in its reply
the evidence gathered from his laptop and the fruits of brief. Cotterman contends that the government has abandoned
that evidence. The magistrate judge filed a Report and and conceded the issue of reasonable suspicion and that this
Recommendation finding that the forensic examination court may not address that issue. We disagree.
was an "extended border search" that required reasonable
suspicion. He found that the TECS hit and the existence [21 [3] [4] We review de novo the ultimate question of
of password-protected files on Cotterman's laptop were whether a warrantless search *960 was reasonable under
suspicious, but concluded that those facts did not suffice to the Fourth Amendment. United States v. Johnson, 256 F.3d
give rise to reasonable suspicion of criminal activity. The 895, 905 (9th Cir.200 I ) (en banc). Our review necessarily
district judge adopted the Report and Recommendation and encompasses a determination as to the applicable standard:
granted Cotterman's motion to suppress. no suspicion, reasonable suspicion or probable cause. That
the government may hope for the lowest standard does not
In its interlocutory appeal of that order, the government alter our de novo review, particularly when the issue was fully
characterized the issue as follows: "Whether the authority briefed and argued below. Further, we may consider an issue
to search a laptop computer without reasonable suspicion that has not been adequately raised on appeal if such a failure
at a border point of entry permits law enforcement to take will not prejudice the opposing party. United States v. Ullah.
it to another location to be forensically examined, when it 976 F.2d 509, 514 (9th Cir.1992). Where, as here, we "called
has remained in the continuous custody of the government." for and received supplemental briefs by both parties,"Alcaraz
A divided panel of this court answered that question in v. INS, 384 F.3d 1150, 1161 (9th Cir.2004), the government's
the affirmative and reversed. United States v. Cottertnan. failure to address the issue does not prejudice Cotterman. See
637 F.3d 1068 (9th Cir.20 I I ). The panel concluded that also United States v. Resendiz-Ponce, 549 U.S. 102, 103-04,
reasonable suspicion was not required for the search and 127 S.Ct. 782, 166 L.Ed.2d 591 (2007).
that "[t]he district court erred in suppressing the evidence
lawfully obtained under border search authority." Id. at 1084.
III. THE BORDER SEARCH
In dissent, Judge Betty B. Fletcher wrote that "officers
[5] [6] The broad contours of the scope of searches at our
must have some level of particularized suspicion in order
international borders are rooted in "the long-standing right
to conduct a seizure and search like the one at issue here."
of the sovereign to protect itself by stopping and examining
M. (B. Fletcher, J., dissenting). By a vote of a majority of
persons and property crossing into this countly." Ramsey.
nonrecused active judges, rehearing en banc was ordered. 673
431 U.S. at 616, 97 S.Ct. 1972. Thus, border searches form
F.3d 1206 (9th Cir.2012). Following en banc oral argument,
"a narrow exception to the Fourth Amendment prohibition
WeStlaWNeff © 2015 Thomson Reuters. No claim to original U.S. Government Works. 8
EFTA00314998
Horowitz. Adam 11 24 2015
For Educational Use Only
U.S. v. Cotterman, 709 F.3d 952 (2013)
13 Cal. Daily Op. Sent 2531, 2013 Daily Journal =. 3018
against warrantless searches without probable cause." Seljan,
547 F.3d at 999 (internal quotation marks and citation 6 Although the Arnold decision expressed its conclusion
omitted). Because "[t]he Government's interest in preventing in broad terms, stating that. "reasonable suspicion is
the entry of unwanted persons and effects is at its zenith at not needed for customs officials to search a laptop or
the international border," United States v. Flores-Montano, other personal electronic storage devices at the border."
541 U.S. 149, 152, 124 S.Ct. 1582, 158 L.Ed.2d 311 (2004), Arnold, 533 F.3d at 1008, the facts do not support such
border searches are generally deemed "reasonable simply by an unbounded holding. As an en bane court, we narrow
virtue of the fact that they occur at the border." Ramsey, 431 Arnold to approve only the relatively simple search
U.S. at 616. 97 S.Ct. 1972. at issue in that case, not to countenance suspicionless
forensic examinations. The dissent's extensive reliance
on Arnold is misplaced in the en banc environment.
[71 [8] This does not mean, however, that at the border
"anything goes." Seljan, 547 F.3d at 1000. Even at the
border, individual privacy rights are not abandoned but A. The Forensic Examination Was Not An Extended
Border Search
"[b]alanced against the sovereign's interests." United States
t'. Montoya de Hernandez, 473 U.S. 531, 539, 105 S.Ct. [9] [10] Cotterman urges us to treat the examination as an
3304, 87 L.Ed.2d 381 (1985). That balance "is qualitatively extended border search that requires particularized suspicion.
Although the semantic moniker "extended border search"
different ... than in the interior" and is "struck much more
favorably to the Government." Id. at 538, 540, 105 S.Ct. may at first blush seem applicable here, our jurisprudence
3304. Nonetheless, the touchstone of the Fourth Amendment does not support such a claim. We have "define[d] an
extended border search as any search away from the border
analysis remains reasonableness. Id. at 538, 105 S.Ct. 3304.
The reasonableness of a search or seizure depends on the where entry is not apparent, but where the dual requirements
totality of the circumstances, including the scope and duration of reasonable certainty of a recent border crossing and
reasonable suspicion of criminal activity am satisfied."
of the deprivation. See United States v. Jacobsen, 466 U.S.
109, 124, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984); see also United States v. Guzman-Padilla. 573 F.3d 865, 878-79 (9th
United States v. Duncan, 693 F.2d 971, 977 (9th Cir.1982). Cir.2009) (internal quotation marks and citations omitted).
The key feature of an extended border search is that an
In view of these principles, the legitimacy of the initial search individual can be assumed to have cleared the border and
of Cotterman's electronic devices at the border is not in thus regained an expectation of privacy in accompanying
belongings. See United States v. Abbouchi, 502 F.3d 850, 855
doubt. Officer Alvarado turned on the devices and opened
and viewed image files while the Cottermans waited to enter (9th Cir.2007) ("Bec
Entities
0 total entities mentioned
No entities found in this document
Document Metadata
- Document ID
- 40288506-fc27-4e0c-b704-4cfeb0eea733
- Storage Key
- dataset_9/EFTA00314991.pdf
- Content Hash
- 23e40e1ed5a793d88d38fd608d5fce11
- Created
- Feb 3, 2026