Yavapai Herbal Services

Home | Classifieds | Place an Ad | Public Notices | Galleries | Kudos | Obituaries | Real Estate Search | Subscriber Services | Yellow Pages | Contact Us
Camp Verde Bugle | Camp Verde, Arizona

home : latest news : latest news April 15, 2014


3/12/2013 2:21:00 PM
Court rules 'reasonable suspicion' required for digital searches

Howard Fischer
Capitol Media Services


PHOENIX -- Setting bold new standards for digital searches, a federal appeals court ruled Friday that customs agents need "reasonable suspicion' a crime has occurred before delving into the hidden files on someone's computer.

"A person's digital life ought not be hijacked simply by crossing a border, wrote Judge Margaret McKeown for the majority of the 9th U.S. Circuit Court of Appeals. And she said it's appropriate to have a different standard for computer files than other items.

"When packing traditional luggage, one is accustomed to deciding what papers to take and what to leave behind,' she wrote.

"When carrying a laptop, tablet or other device, however, removing files unnecessary to an impending trip is an impractical solution given the volume and often intermingled nature of the files,' McKeown continued. And McKeown pointed out that, given the nature of digital files, simply "deleting' them from the computer does not make them disappear, as they can remain on the hard drive -- and, as is the case here, be found with a forensic examination of that drive.

Friday's ruling also offers new protection in the era of "cloud computing,' where files are not held within a computer but on a remote server, presents different issues. That makes the computer the access point to that data, with McKeown comparing it to a key to a safe deposit box.

"Notably, although the virtual 'safe deposit box' does not itself cross the border, it may appear as a seamless part of the digital device when presented at the border,' she wrote. "With access to the cloud through forensic examination, a traveler's cache is just a click away from the government.'

McKeown acknowledged that travelers have a "diminished expectation of privacy' at the border. And she said international travelers expect their property will be searched.

"What they do not expect is that, absent some particularized suspicion, agents will mine every last piece of data on their devices or deprive them of their most personal property for days (or perhaps weeks or even months, depending on how long the search takes),' she wrote. "Such a thorough and detailed search of the most intimate details of one's life is a substantial intrusion upon personal privacy and dignity.'

But the ruling, which establishes the legal standards that now apply in Arizona and eight other the Western states within the 9th Circuit, provides no help to Howard Cotterman, whose case the judges were reviewing.

They concluded that Border Patrol agents did in this case have reasonable suspicion to examine his hard drive. And that allows Cotterman, who has been locked up since 2009 -- he had initially fled the country -- to be prosecuted in federal court on charges of child pornography.

His attorney, William Kirchner, said he was studying the ruling on Friday but said he likely will seek review by the U.S. Supreme Court.

Friday's ruling drew fire from Judge Consuelo Callahan who filed a dissent.

"The majority's new limits on the government's border search authority will make it much harder for border agents to do their jobs,' she wrote.

Callahan said it is "common knowledge' that agents at security checkpoints do more thorough searches not only of those who arouse suspicion but also on a random basis.

"Otherwise, a person who appears entirely innocent will have nothing to fear and will not be deterred from carrying something that should not be brought into the country,' the judge wrote. "A checkpoint limited to searches that can be justified by articulable grounds for 'reasonable suspicion' is bound to be less effective.'

And Callahan said the ruling means "criminals now know they can hide their child pornography or terrorist connections in the recesses of their electronic devices' knowing that border agents, faced with this new standard, will avoid conducting searches.

The case involves Howard and Maureen Cotterman who entered the country at Lukeville in 2007.

Following protocol, customs officials checked their names in a national database. There, they found that Cotterman had been convicted in California in 1992 of seven counts related to child molestation. Based on that, they sent the couple to a secondary inspection area.

A search of the vehicle revealed two laptops and three digital cameras. While the inspecting officer found no child pornography, he noted that several files were password protected.

The officers said they refused Cotterman's help fearing he could destroy any files. Instead, they took the laptops to Tucson.

Eventually, a specialist found what he said were 75 images of child pornography on the computer. Cotterman eventually fled to Australia but was indicted, after which he was extradited back to the United States.

U.S. District Court Judge Raner Collins ruled that the images could not be used at trial. He said agents did not have a "reasonably particularized suspicion" of anything improper to conduct an extended search.

McKeown, however, said there was enough in this case to give agents cause to do the forensic search. That included not only his criminal background but also his frequent travels, coming from a country known for sex tourism as well as the password-protected files.

But she cautioned that last factor, by itself, is not enough, calling it "commonplace for business travelers, casual computer users, students and others to password protect their files.' And she specifically said that protecting the entire computer with a password, versus individual files, cannot be a factor in determining whether there is reasonable suspicion to search.

"Using a password on a device is a basic means of ensuring that the device cannot be accessed by another in the event it is lost or stolen,' McKeown wrote.





Article Comment Submission Form
Comments are not posted immediately. Submissions must adhere to our Use of Service Terms of Use agreement. The email and phone info you provide will not be visible to the public. Rambling or nonsensical comments may not be posted. Comments are limited to 1700 characters or less. In order for us to reasonably manage this feature we may limit your comment entries to five(5) per day.
Submit an Article Comment
First Name:
Required
Last Name:
Required
Telephone:
Required
Email:
Required
Comment:
Required
Passcode:
Required
Anti-SPAM Passcode Click here to see a new mix of characters.
This is an anti-SPAM device. It is not case sensitive.
   


Advanced Search

    Recently Commented     Most Viewed
Letter: Ready for some real ideas? (2 comments)
Commentary: Talk radio necessary for free thought (8 comments)
Verde Valley renews push for broadband (1 comment)
Commentary: Pity the plutocrats, victims of the envious mob (1 comment)
Organizer tries again for top-two primary system (1 comment)

HSE - We want to hear from you
Find more about Weather in Camp Verde, AZ
Click for weather forecast





Find It Features Blogs Milestones Extras Submit Other Publications Local Listings
Classifieds | Place an Ad | Galleries | Kudos | Obituaries | Real Estate Search | Subscriber Services | e-News | RSS | Site Map | Contact Us
River Community Fellowship

© Copyright 2014 Western News&Info, Inc.® The Camp Verde Bugle is the information source for Cottonwood and Verde Valley area communities in Northern Arizona. Original content may not be reprinted or distributed without the written permission of Western News&Info, Inc.® Camp Verde Bugle Online is a service of WNI. By using the Site, cvbugle.com ®, you agree to abide and be bound by the Site's terms of use and Privacy Policy, which prohibit commercial use of any information on the Site. Click here to submit your questions, comments or suggestions. Camp Verde Bugle Online is a proud publication of Western News&Info Inc.® All Rights Reserved.

Software © 1998-2014 1up! Software, All Rights Reserved