Computers, Privacy & the Constitution

View   r6  >  r5  ...
RebeccaBonnevieFirstPaper 6 - 26 Apr 2018 - Main.RebeccaBonnevie
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

There is no Spook/Cop distinction at the Border

Line: 9 to 9
 

The history of the border search doctrine

The Congress that created that provision also created an exception to it – to ensure that importers were paying taxes the State could conduct warrantless searches at the international border.(1) This financial interest of the State remained the justification of the border search exception for about a hundred and forty years before it changed. In the 1920s George Carroll and John Kiro drove a van full of whiskey and gin from from Detroit to Grand Rapids and were intercepted on the way. The Court found that a subsequent warrantless search of the van was not in violation of the Fourth Amendment because the agents who had searched them had reasonable belief sufficient for probable cause therefore the liquor could be admitted at trial.(2)

Notes

1 : See Act of July 31, 1789, ch. 5 §§ 23 – 24, 1 Stat. 29, 43

2 : Carrol v. United States, 267 U.S. 132 (1935)


Changed:
<
<
Thus began the chapter of the border search doctrine justified by the State’s interest in stopping contraband cross its borders. Cases in this time include United States v. Ramsey (3) where border agency could open an envelope if there was reasonable belief it contained other than correspondence (though a warrant would be needed to read any correspondence inside the envelope). United States v. Montoya de Hernandez (4), which took place in the escalation of the “war on drugs” relied on Carroll and Ramsey to claim that warrantless suspicionless searches had long been a part of US law. Montoya de Hernandez distinguished between “routine” and “nonroutine” searches. While declining to clarify exactly what fell in each category the Court found that for a routine search of persons and effects no reasonable suspicion, probable cause or warrant was required, whereas for a more intrusive nonroutine search some level of suspicion was required.

Notes

3 : United States v. Ramsey, 431 U.S. 606 (1977)

4 : United States v. Montoya de Hernandez, 473 U.S. 531 (1985)


>
>
Thus began the chapter of the border search doctrine justified by the State’s interest in stopping contraband cross its borders. Cases in this time include United States v. Ramsey (5) where border agency could open an envelope if there was reasonable belief it contained other than correspondence (though a warrant would be needed to read any correspondence inside the envelope). United States v. Montoya de Hernandez (6), which took place in the escalation of the “war on drugs” relied on Carroll and Ramsey to claim that warrantless suspicionless searches had long been a part of US law. Montoya de Hernandez distinguished between “routine” and “nonroutine” searches. While declining to clarify exactly what fell in each category the Court found that for a routine search of persons and effects no reasonable suspicion, probable cause or warrant was required, whereas for a more intrusive nonroutine search some level of suspicion was required.
 

Shifting from evidence collection to information collection

Changed:
<
<
Electronic devices are now ubiquitous and the contraband justification clearly no longer stands up. To paraphrase someone else, electronic contraband does not need to fly into JFK and go through customs to enter a country. (7). The border agencies have shifted from a cop justification – finding evidence of contraband in a situation deemed constitutional because of a State interest “at its zenith” and a low expectation of privacy(8) – to a spook function of accessing, analysing and reviewing information. The purpose of the CBP Directive No. 3340-049A: Border Search of Electronic Devices, issued in January 2018 includes both cop and spook functions, talking about collecting evidence and conducting risk assessment and enhancing “critical information shaing” with elements of the federal government responsible for analyzing terrorist threat information.

Notes

7 : Matthew B Kugler, "The Perceived Intrusiveness of Searching Electronic Devices at the Border: An Empirical Study" (2014) 81:3 U Chicago L Rev 1165, 1209

8 : United States v. Flores-Montano, 541 U.S. 149, 152 (2004)


>
>
Electronic devices are now ubiquitous and the contraband justification clearly no longer stands up. To paraphrase someone else, electronic contraband does not need to fly into JFK and go through customs to enter a country. (9). The border agencies have shifted from a cop justification – finding evidence of contraband in a situation deemed constitutional because of a State interest “at its zenith” and a low expectation of privacy(10) – to a spook function of accessing, analyzing and reviewing information. The purpose of the CBP Directive No. 3340-049A: Border Search of Electronic Devices, issued in January 2018 includes both cop and spook functions, talking about collecting evidence and conducting risk assessment and enhancing “critical information sharing” with elements of the federal government responsible for analyzing terrorist threat information.
 

Effects on the other civil liberties

It could be said that warrantless, suspicionless searches that provide the state access to large swathes of personally revealing data differ little from the notoriously general warrants and writs of assistance that the framers of the Fourth Amendment were trying to prevent. This could have a chilling effect on other civil liberties. One can foresee people abridging their speech out of concern, deleting their contacts for fear of association, and deleting any religious indicators off their electronic devices. And in the ecological scheme of privacy the Spook function at the border could infringe on other people’s constitutional right to be free of unreasonable search and seizure – any information about third parties on the device that is being searched will be seen and analyzed.

Revision 6r6 - 26 Apr 2018 - 14:20:55 - RebeccaBonnevie
Revision 5r5 - 26 Apr 2018 - 12:53:06 - RebeccaBonnevie
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM