|
META TOPICPARENT | name="FirstPaper" |
| | The Supreme Court has never directly engaged the question of whether the border search doctrine extends to data, such as that retrieved from a computer or cell phone. The Fourth Circuit, in United States v. Ickes, found that the “cargo” language extended to a hard drive found in the defendant’s laptop, affirming the right to search through it. The Ninth Circuit, though, has drawn a distinction between “cursory inspection” and the “comprehensive and intrusive nature of a forensic examination.” Cotterman, 709 F.3d at 962. A forensic computer search is a time-intensive process that requires an image of the drive be made and special software be used to search the full contents of the drive. Undoubtedly, were it before the Supreme Court, the act of simply opening up a laptop and looking through the files would merit no Fourth Amendment protections. The thoroughness of a forensic search would, however, demand some protection if the Supreme Court is willing to accept the Ninth Circuit’s rhetoric from Cotterman, where it referred to such searches as “computer strip searches.” I contend that the probing nature of a forensic search—combined with the depth of intimate information that it can yield—demands reasonable suspicion in accordance with the Supreme Court’s prior precedent.
| |
> > |
But reasonable suspicion isn't probable cause, which is the whole point. So, to take the foreseeable question in light of current technical realities, is seizing data at the border so that you can search it later if you develop reasonable suspicion acceptable or not? Your efforts to make all this equivalent to some other form of searching don't help you. You are speculating, merely predicting the behavior of courts. Do you take as a methodological assumption of this process that the courts whose behavior you are predicting will have learned nothing about the facts at hand, and will only reason by narrow analogy to prior unrelated factual situations?
| | The Safeguards of the Fifth Amendment | | Encryption, however, does bring with it other protections. The Fifth Amendment provides protection against self-incrimination. When the government is unable to decrypt files on its own, courts have gone both ways on mandatory key disclosure—that is, whether the government can force someone to decrypt his files. The Eleventh Circuit, for example, has found that unless the government can show knowledge of the specific files it seeks, compelling a defendant to decrypt the files is tantamount to forced self-incrimination. But courts elsewhere have ordered defendants to decrypt their files or be held in contempt of court, even where there is no specific knowledge of specific content. The Eleventh Circuit's interpretation is more consistent with prior Fifth Amendment precedent. But this issue gets even murkier when considering various methods of encryption. What if the data-holder has arranged it such that he has no actual knowledge of the decryption key, which is left in the hands of someone in the United States? Or consider the proposed password pill, an authentication pill being developed by Motorola that transmits an 18-bit signal that could be used to unlock one’s devices. Could a court require a defendant to take a pill for the purpose of decrypting his files? On one hand, it seems like such encryption would offer less Fifth Amendment protection, as one is not giving up the contents of one’s mind. Nonetheless, where the Fourth Amendment falls short, advanced encryption techniques—in conjunction with the Fifth Amendment—would appear to safeguard one’s data at the border. | |
> > |
Is this "would appear" to be a descriptive statement about the discoverable state of law? If so, I missed where the cases were discussed that showed this apparition. If this is a statement of legal speculation, as I believe, does it square with any observed phenomena? What will courts think of seizing a terabyte in data image order to decide later, if more than reasonable suspicion develops, that it would be a good idea not to throw it out after 24 hours, or 30 days, or whatever? It is feasible to ask, in other words, whether if govt detained a small percentage of devices at the border long enough to suck up an image of the data contained (from seconds to hours, depending) in order to have it available for searching if, at a subsequent time, they developed a reason to seek a warrant, that would violate the Fourth Amendment or any other statutory or constitutional rule. If yes, why, given that they can certainly do this with a crate of eggs? If no, what difference does all this other bullshit really make?
On encryption, I think you are still asking yourself an old
question: whether I can be compelled, without offending the Fifth
Amendment, to decrypt my hard drive at the border. Once again, the
question seems to me harder than it is non-obsolete. When I
actually cross a border I am concerned about, whether the US,
Chinese or other, no secret policeman on earth can compel me to
decrypt the hard drive, because I am literally unable to do so. I
could, thirty minutes earlier, on the plane; I will be able to
again, after I have crossed the border, with assistance. But on the
border, do what they will, I cannot. How do I technically achieve
this outcome? Once you have thought that problem through, and have
invented the answer which is simple daily familiarity to me, what is
the rest of that old bullshit really worth, either?
| | |
|