Computers, Privacy & the Constitution

View   r8  >  r7  ...
RebeccaBonnevieFirstPaper 8 - 12 May 2018 - Main.RebeccaBonnevie
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

There is no Spook/Cop distinction at the Border

-- By RebeccaBonnevie – 25 Apr 2018
>
>

Blurred lines: Spook/Cop functions and the Border Search

-- By RebeccaBonnevie – rewrite May 12, 2018
 
Changed:
<
<
In the beginning of the Republic the Founders codified a Spook/Cop distinction into the Fourth Amendment. The role of the cop was to search to collect evidence, and the Fourth Amendment made sure that such searches couldn’t take place “unreasonably”. The Courts considered an "unreasonable" search to mean one without probable cause and a judicial warrant.
>
>
The Fourth Amendment codified the Founders' understanding of what was required to contain thuggery by the state. The role of the cop was to search to collect evidence, and the Fourth Amendment made sure that such searches couldn’t take place “unreasonably”. The "Spook" role, searching to collect information, is a more recent development.
 
Changed:
<
<
Not, however, on the basis of the distinction that came to exist, because the founding legislators of the republic had no real conception of the intelligence function in government independent of the small-scale, bribery-enabled information collection by diplomats and spying in actual warfare. Until 1947, the national intelligence system had no legislative basis.
>
>

The development of the border search doctrine

The Congress that created the Fourth Amendment also created an exception to it – to ensure that importers were paying taxes the State could conduct warrantless searches at the international border.(1) This financial interest of the State remained the justification of the border search exception for about a hundred and forty years. In the 1920s this changed to a contraband justification when the van full of whiskey and gin George Carroll and John Kiro were driving from Detroit to Grand Rapids was intercepted.(2) United States v. Ramsey (3) further recognized this contraband justification. In that case the border agency could open an envelope if there was reasonable belief it contained other than correspondence (though the Court repeatedly stressed a warrant would be needed to read any correspondence inside the envelope).

Notes

1 : See Act of July 31, 1789, ch. 5 §§ 23 – 24, 1 Stat. 29, 43

2 : Carrol v. United States, 267 U.S. 132 (1935)

3 : United States v. Ramsey, 431 U.S. 606 (1977)


 
Changed:
<
<

The history of the border search doctrine

The Congress that created that provision also created an exception to it – to ensure that importers were paying taxes the State could conduct warrantless searches at the international border.(4) This financial interest of the State remained the justification of the border search exception for about a hundred and forty years before it changed. In the 1920s George Carroll and John Kiro drove a van full of whiskey and gin from from Detroit to Grand Rapids and were intercepted on the way. The Court found that a subsequent warrantless search of the van was not in violation of the Fourth Amendment because the agents who had searched them had reasonable belief sufficient for probable cause therefore the liquor could be admitted at trial.(5)

Thus began the chapter of the border search doctrine justified by the State’s interest in stopping contraband cross its borders. Cases in this time include United States v. Ramsey (6) where border agency could open an envelope if there was reasonable belief it contained other than correspondence (though a warrant would be needed to read any correspondence inside the envelope). United States v. Montoya de Hernandez (7), which took place in the escalation of the “war on drugs” relied on Carroll and Ramsey to claim that warrantless suspicionless searches had long been a part of US law. Montoya de Hernandez distinguished between “routine” and “nonroutine” searches. While declining to clarify exactly what fell in each category the Court found that for a routine search of persons and effects no reasonable suspicion, probable cause or warrant was required, whereas for a more intrusive nonroutine search some level of suspicion was required.

Notes

7 : United States v. Montoya de Hernandez, 473 U.S. 531 (1985)


>
>
United States v. Montoya de Hernandez (8), which took place in the escalation of the “war on drugs” relied on Carroll and Ramsey and distinguished between “routine” and “nonroutine” searches. While declining to clarify exactly what fell in each category the Court found that for a routine search of persons and effects no reasonable suspicion, probable cause or warrant was required, whereas for a more intrusive nonroutine search some level of suspicion was required.
 

Shifting from evidence collection to information collection

Changed:
<
<
Electronic devices are now ubiquitous and the contraband justification clearly no longer stands up. To paraphrase someone else, electronic contraband does not need to fly into JFK and go through customs to enter a country. (9). The border agencies have shifted from a cop justification – finding evidence of contraband in a situation deemed constitutional because of a State interest “at its zenith” and a low expectation of privacy(10) – to a spook function of accessing, analyzing and reviewing information. The purpose of the CBP Directive No. 3340-049A: Border Search of Electronic Devices, issued in January 2018 includes both cop and spook functions, talking about collecting evidence and conducting risk assessment and enhancing “critical information sharing” with elements of the federal government responsible for analyzing terrorist threat information.

Notes

9 : Matthew B Kugler, "The Perceived Intrusiveness of Searching Electronic Devices at the Border: An Empirical Study" (2014) 81:3 U Chicago L Rev 1165, 1209

10 : United States v. Flores-Montano, 541 U.S. 149, 152 (2004)


>
>
Electronic devices are now ubiquitous and the contraband justification clearly no longer stands up. Electronic contraband does not need to fly into JFK and go through customs to enter a country. (11). The border agencies have expanded from a cop justification – finding evidence of contraband in a situation deemed constitutional because of a State interest “at its zenith” and a low expectation of privacy(12) – to a spook justifiation of accessing, analyzing and reviewing information. The CBP Directive No. 3340-049A: Border Search of Electronic Devices, issued in January 2018 includes both cop and spook functions. Its purpose talks about collecting evidence, conducting risk assessment and enhancing “critical information sharing” to analyze terrorist threat information.
 

Effects on the other civil liberties

Changed:
<
<
It could be said that warrantless, suspicionless searches that provide the state access to large swathes of personally revealing data differ little from the notoriously general warrants and writs of assistance that the framers of the Fourth Amendment were trying to prevent. This could have a chilling effect on other civil liberties. One can foresee people abridging their speech out of concern, deleting their contacts for fear of association, and deleting any religious indicators off their electronic devices. And in the ecological scheme of privacy the Spook function at the border could infringe on other people’s constitutional right to be free of unreasonable search and seizure – any information about third parties on the device that is being searched will be seen and analyzed.
>
>
It could be said that warrantless suspicionless searches that provide the state access to large swathes of personally revealing data differ little from the notoriously general warrants and writs of assistance that the framers of the Fourth Amendment were trying to prevent. Knowing that Spooks have this border search power to inspect one's electronic data could have a chilling effect on other civil liberties. One can foresee people abridging their speech out of concern, deleting their contacts for fear of association, and deleting any indicators of religion off their electronic devices. In the ecological scheme of privacy the border search infringes on other people’s constitutional right to be free of unreasonable search and seizure – any information about third parties on the device that is being searched will be seen and analyzed.
 
Deleted:
<
<
There are some safeguards on these powers in the Directive. Any forensic search requires approval from higher ranks, but the threshold is reasonable suspicion of a commission of a crime OR a national security concern. Any balance of interests, however, it is weighted heavily in favor of the State.
 

Can you keep the Spook functions out of the border area?

Changed:
<
<
In a nutshell, no. Unless legislation changes to require a reasonable suspicion of a commission of a crime before a search can take place (putting us back in the “evidence collection” zone), the Spook functions are part of the border agency functions. The Courts are beginning to realize that power in an aggregate of electronic data - United States v. Jones (13) and Riley v. California (14) have arguably opened the door to a different way of analyzing of electronic data. However, even if this is so, the border zone will always be viewed as a place of high State interest that puts a heavy thumb on the scale against the privacy interests of the individual.

It is up to the traveler to take measures to protect their data while they cross the border, but I can foresee this creating problems. To paraphrase Eben's comments about social security numbers, if you are the only person not with nothing stored locally on your devices or you cannot produce a functioning passcode, you may well have created the suspicion/concern required for the forensic search.

The Future

It remains to be seen how the 2018 CBP Directive is applied. It has provided slightly more structure than the 2009 Directive, but there is still a lot of discretion for CBP. History tells us it is likely to be applied broadly.

Notes

13 : United States v. Jones, 132 S. Ct. 945 (2012).

14 : Riley v. California, 134 S. Ct 2473 (2014)


>
>
Unless legislation or guidance changes the Spook functions are part of the border agency functions. What could be done, however, is the imposition of more effective limits on the border search function.The Courts have articulated that accessing an aggregate of electronic data in electronic devices is different to traditional searches (United States v. Jones (15) and Riley v. California (16)) and in doing so have arguably opened the door to a different way of analyzing of electronic data.
 
Changed:
<
<

Disclaimer for plagiarism purposes:

Some of these statements have been adapted from a paper on the border search exception for the class "Current Issues in Civil Liberties" but the Spook/Cop angle is unique to here.
>
>
Last September the ACLU filed Alasaad v. Nielsen challenging the constitutionality of the border searches of electronic devices belonging to 11 travelers, including journalists, under the First and Fourth Amendments (ten US citizens and a lawful permanent resident). The government's motion to dismiss was rejected in early May 2018. The Court said that while the border may be different to the interior of a country Riley (and Wurie (17)) indicate that electronic device searches are, categorically, more intrusive than searches of one's person or effects.(18) The Court also found a plausible First Amendment claim: unlike in Ramsey there are no First Amendment safeguards in the CBP (and ICE) electronic device policies that permit suspicionless searches in pursuit of "information".(19)

Notes

17 : United States v. Wurie, 728 F.3d 1 (2013)

18 : Alasaad v. Nielsen, 2018 U.S. Dist. LEXIS 78783, 43 to 45

19 : reference to Directive paragraph 5.1.3. In Ramsey the Supreme Court held that the statutory scheme permitting warrantless search of incoming international mail did not violate the constitution because it applied only when there was reason to believe the envelopes contained physical items and regulations flatly prohibited, under all circumstances, customs officials from reading correspondence without a warrant Ramsey, 431 U.S. at 623


 
Added:
>
>

Final Word

 
Changed:
<
<
Not plagiarism, because you can't falsely assert authorship of that which you have indeed authored yourself. You shouldn't disclaim what you have no reason to deny. As for the double-counting of your effort, it's okay here, because I say it is, but disclosure is appropriate.
>
>
It is up to the traveler to take measures to protect their data while they cross the border. However, if you have nothing stored locally on your devices or you cannot produce a functioning passcode, you may well have created the suspicion/concern required for the forensic search which could lead to the detention of the device. This makes it more important to understand technical ways to keep bits secure and make the device an empty disposable container.
 
Deleted:
<
<
On the substance, I think your account of the situation is correct: on the border, the US behaves as pretty much all other nation states do: it collects information and conducts political scrutiny in addition to collecting taxes and blocking contraband. This is less a change of constitutional theory and more a result of increased cognitive capacity: nations can do more at their borders with 21st-century than with 18th-century technology, and they do so. Whatever law constrains them there is less likely to be their own constitutional arrangements domestically than their external legal commitments to other states. Lacking any international consensus, to put it mildly, for subjecting border control to anti-spook regulation, it won't happen.
 
Added:
>
>

Disclosure:

Some of these statements have been adapted from a paper on the border search exception for the class "Current Issues in Civil Liberties".
 

Revision 8r8 - 12 May 2018 - 04:56:27 - RebeccaBonnevie
Revision 7r7 - 10 May 2018 - 13:36:42 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM