Introduction
As it currently stands in the First Circuit, individuals traveling through the United States’ borders may have their electronic devices searched at any time.1See Recent Cases: Fourth Amendment — Border Search Exception — First Circuit Upholds Warrantless, Suspicionless Searches of Electronic Devices at The Border — Alasaad v. Mayorkas, 988 F.3d 8 (1st Cir. 2021), 135 HARV. L. REV. 1464, 1464 (2022), https://perma.cc/N6FQ-J969 [hereinafter Recent Cases]. The Fourth Amendment protects all individuals from unreasonable searches and seizures, meaning probable cause and a warrant are generally required before conducting a search or seizure.2See HILLEL R. SMITH, KELSEY Y. SANTAMARIA & CONG. RSCH. SERV., R46601: SEARCHES AND SEIZURES AT THE BORDER AND THE FOURTH AMENDMENT 12 (2021), https://perma.cc/YS6A-6PYY [hereinafter SMITH ET AL.]. However, numerous exceptions to the Fourth Amendment exist; among them is the border search exception.3 Id. at 25. Under this exception, border patrol officers are given full authority to conduct basic searches of individuals and items crossing the border.4See id. at 3–4. However, controversy has emerged regarding electronic devices at the border, as many believe they should not fall within this exception and a level of suspicion should be required before searching a person’s device.5See generally id. at 45–48 (explaining the nature of the border-search exception with electronic devices).
In Alasaad v. Mayorkas, the First Circuit established its stance within this controversy, which many circuit courts have wrestled with.6988 F.3d 8, 12–13 (1st Cir. 2021). Prior to Alasaad, the scope of basic and advanced searches of electronic devices allowed at the border was not clear in the First Circuit.7See generally id. at 13. The First Circuit ruled in favor of the governmental authority, stating that basic searches require no level of suspicion while advanced searches require only minimal suspicion to search for both contraband and evidence of contraband.8See id. at 18–19. The plaintiffs in Alasaad filed a writ of certiorari on April 23, 2021.9Merchant v. Mayorkas, SCOTUSBLOG, https://perma.cc/MLS2-FKLB (last visited Apr. 25, 2023). On June 28, 2021, the Supreme Court denied this petition and to this day there is no precedent set by the Supreme Court on how electronic devices should be handled at the border.10See id.
This Comment will illustrate that the holding in Alasaad v. Mayorkas should be overruled, since although the interest of the government is at its “zenith” at the border, this ruling infringes on the individual privacy interests afforded by the Fourth Amendment. Part I discusses how the Fourth Amendment evolved over time to include certain warrant exceptions. Part II discusses the facts, procedural history, and First Circuit holding and analysis in Alasaad v. Mayorkas. Part III will argue that basic searches of electronic devices at the border should require reasonable suspicion; although the government has a heightened interest in preventing contraband from entering the country, the Fourth Amendment still requires the government to uphold basic privacy rights of individuals. Part IV will argue that the scope of advanced searches should not include searching for evidence of contraband, as the parameters of such a search are not well-defined and therefore allow for a potential abuse of power by border patrol agents.
I. Background
A. Fourth Amendment Searches and Seizures
The Fourth Amendment of the United States Constitution gives individuals the right to security in their “persons, houses, papers, and effects, against unreasonable searches and seizures . . . .”11U.S. CONST. amend. IV. A Fourth Amendment search occurs when an individual’s reasonable expectation of privacy is infringed.12Soldal v. Cook County, Ill., 506 U.S. 56, 63 (1992). A Fourth Amendment seizure of a person occurs when police conduct would communicate to a reasonable person, taking the circumstances into account, that they are not free to ignore police presence and leave at their own will.13See Terry v. Ohio, 392 U.S. 1, 16–17 (1968). A Fourth Amendment seizure of property occurs when an individual’s possessory interest in that property is in some way inhibited.14See Soldal, 506 U.S. at 61. Additionally, the Fourth Amendment lists the parameters for obtaining a warrant: the requirements of probable cause and a description of what the search will entail.15U.S. CONST. amend. IV. Finally, a warrant is finalized upon approval by a judge or magistrate.16Katz v. United States, 389 U.S. 347, 357 (1967).
In Carroll v. U.S., the Court stated that probable cause “aris[es] out of circumstances known to the seizing officer,” that contraband or evidence of a crime will be found in the vehicle to be searched.17267 U.S. 132, 149 (1925). The standard for probable cause to arrest is described as “whether, at the moment the arrest was made, the officers . . . had reasonably trustworthy information . . . sufficient to warrant a prudent man in believing that the petitioner had committed or was committing an offense.”18Beck v. Ohio, 379 U.S. 89, 91 (1964). The Supreme Court stated that individuals have the right both to their possessions and to control of themselves against unlawful, unreasonable restraint.19Terry v. Ohio, 392 U.S. 1, 9 (1968). It is important to note that the root of the Fourth Amendment requires evaluating how reasonable a search is.20 See SMITH ET AL., supra note 2, at 1.
In Katz v. United States, the defendant was convicted for sending wagering information via telephone.21389 U.S. at 348. During his trial, the government brought in evidence that FBI agents placed a listening and recording device outside the public phone booth the defendant walked into to make phone During his trial, the government brought in evidence that FBI agents placed a listening and recording device outside the public phone booth the defendant walked into to make phone calls.22Id. In a landmark decision, the Supreme Court stated that the government violated the privacy of the defendant when agents listened in on his call.23Id. at 353. This conduct was a search and violated the Fourth Amendment because of (1) use of the recording device prior to establishing probable cause and (2) lack of a warrant.24Id. Justice Harlan articulated a reasonable expectation of privacy test in his concurring opinion.25Id. at 360 (Harlan, J., concurring). This test has two prongs: first, “a person [must] have exhibited an actual (subjective) expectation of privacy”; and second, “the expectation [must] be one that society is prepared to recognize as ‘reasonable.’”26Id. at 361 (Harlan, J., concurring). Justice Harlan noted that “one who occupies [a telephone booth] shuts the door behind him, and pays the toll that permits him to place a call” is may reasonably think that his conversation is truly private and not being intercepted.27See Katz, 389 U.S. at 361 (Harlan, J., concurring). The government argued that Katz did not have a privacy right in the phone booth, because it was made of glass, and he was visible to the public.28Id. at 352. However, Katz did not lose his reasonable expectation of privacy just because he “made his calls from a place where he might be seen” as the concern did not come from the “intruding eye” but rather the “uninvited ear” meaning he intended to prevent the outside world from hearing his conversation inside the phone booth.29Id.
B. Fourth Amendment Exceptions
In general, the Fourth Amendment requires the establishment of probable cause before issuing a warrant for a search or seizure, but exceptions to this rule exist.30See Terry v. Ohio, 392 U.S. 1, 11 (1968). Among them are the Terry stop exception, the search incident to arrest exception, and the border search exception.31See SMITH ET AL, supra note 2, at 1–2. These exceptions make it possible to conduct a search or seizure without a warrant.32See SMITH ET AL, supra note 2, at 1–2.
1. The “Terry Stop” Exception
In Terry v. Ohio, Terry experienced a pat down by a police officer who suspected he intended to commit a robbery.33392 U.S. at 6–7. Ultimately, the officer did not need probable cause; to determine the reasonableness and validity of the search the Court balanced the government’s interest with the intrusion of privacy as a whole.34 Shan Patel, Note, Per Se Reasonable Suspicion: Police Authority to Stop Those Who Flee from Road Checkpoints, 56 DUKE L.J. 1621, 1625 (2007). The officer must “point to specific and articulable facts which, taken together with rational inferences from those facts, reasonably warrant that intrusion.”35Terry, 392 U.S. at 21. The court determined that a pat down—a limited search of the outside of a person’s clothing—is reasonable if an officer can point to unusual conduct that leads him to suspect criminal activity, as the officer is entitled to protect not just himself but the public.36Id. at 24. The Terry stop exception demonstrates a standard less than probable cause known as “reasonable suspicion.”37See Patel, supra note 34, at 1625. This allows the police officer “to conduct a carefully limited search of the outer clothing of such persons in an attempt to discover weapons which might be used to assault him.”38Terry, 392 U.S. at 30.This search is a reasonable search under the Fourth Amendment.39Id. at 31.
2. The Search Incident to Arrest Exception
In U.S. v. Robinson, an officer pulled over the defendant, conducted a pat down, and found heroin in his pocket.40414 U.S. 218, 222–23 (1973). The Supreme Court ruled this a valid Fourth Amendment search as it remained within the scope of the search incident to arrest exception.41Id. at 235. Under this exception, a search is reasonable if it is preceded by an arrest, based on the need to protect the public and discover potential evidence regardless of whether such evidence is found.42See id. at 235–36.
In Riley v. California, after Riley’s arrest police officers searched his phone and found evidence which connected him to an earlier crime.43573 U.S. 373, 373 (2014). The Supreme Court held that in this instance the officers first needed a warrant to search Riley’s phone as “[d]igital data stored on a cell phone cannot itself be used as a weapon to harm an arresting officer or to effectuate the arrestee’s escape.”44Id. at 386–87. An officer can inspect the physical contents of a cell phone to ensure it is not a weapon.45Id. However, a warrant is required before conducting an internal search of the cell phone.46Id
3. The Border Search Exception
The basis of the border search requirement emerged in 1789 when Congress enacted a statute that gave officials at the border the power to search “any ship or vessel, in which they shall have reason to suspect any goods, wares or merchandise subject to duty shall be concealed.”47Nathan Alexander Sales, Run for the Border: Laptop Searches and the Fourth Amendment, 43 U. RICH. L. REV. 1091, 1105 (2009). This exception to the Fourth Amendment applies to any U.S. border which is based on the government’s heightened interest in stopping contraband from entering the country.48See United States v. Montoya de Hernandez, 473 U.S. 531, 537 (1985).
The Supreme Court addressed the issue of border searches in many notable cases.49See generally Ashley Veronica Hart, Note, Electronic Searches at the Border: Reasonable Suspicion or None at All? The Circuit Split and Potential Impact on Higher Education, 54 SUFFOLK U. L. REV. 371, 377–78 (2021) (explaining the instances in which the issue of border searches was addressed by the Supreme Court). In United States v. Flores-Montano, the Court proclaimed: “[t]he government’s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.”50541 U.S. 149, 152 (2004). Here, the government disassembled and searched a car’s fuel tank.51Id. at 150–51. The Court concluded that the government’s significant interest at the border allows it to have authority to conduct searches with no level of suspicion.52See id. at 155–56. In U.S. v. Montoya de Hernandez, the Court noted that the reasonable suspicion needed to detain a traveler at the border, beyond a routine search, is a balance between private and public interests, and is valid if the facts in those circumstances make officials suspect the existence of contraband.53See 473 U.S. at 541.
Many circuit courts have addressed the issue of border searches of electronic devices.54See Hart, supra note 49, at 388–89. The Fifth Circuit permitted a warrantless search of an electronic device at the border.55United States v. Molina-Isidoro, 884 F.3d 287, 293 (5th Cir. 2018). The Fourth Circuit required at least reasonable suspicion to conduct warrantless border searches of electronic devices.56United States v. Kolsuz, 890 F.3d 133, 148 (4th Cir. 2018). The Ninth Circuit required reasonable suspicion for advanced searches of electronic devices at the border.57United States v. Cotterman, 709 F.3d 952, 962 (9th Cir. 2013). Six years later, the Ninth Circuit added to this by arguing that while the border-search exception allows for the warrantless search of a cell phone, it only applies to searching for contraband, not evidence of contraband.58United States v. Cano, 934 F.3d 1002, 1021 (9th Cir. 2019).
C. The Authority of Immigration Agencies at the Border
The Immigration and Nationality Act (“INA”) authorizes immigration officers to conduct searches and seizures at the border.59SMITH ET AL., supra note 2, at 8. The Department of Homeland Security (“DHS”) is an agency whose main obligation is to implement immigration laws.60SMITH ET AL., supra note 2, at 7. DHS works with Customs and Border Protection (“CBP”) as well as Immigration and Customs Enforcement (“ICE”) to enforce these laws at the border.61SMITH ET AL., supra note 2, at 7–8.
CBP Directive No. 3340-049A on border searches of electronic devices provides “guidance and standard operating procedures for searching, reviewing, retaining, and sharing information contained in . . . mobile phones . . . and any other communication, electronic, or digital devices . . . to ensure compliance with customs, immigration, and other laws that CBP is authorized to enforce and administer.”62Border Search of Electronic Devices, Directive No. 3340-049A 1 (CBP Jan. 4, 2018), https://perma.cc/VKS8-ALT9. This CBP policy defines an electronic device as “[a]ny device that may contain information in an electronic or digital form, such as computers, tablets, disks, drives, tapes, mobile phones and other communication devices, cameras, music and other media players.”63Id. at 2. According to CBP, a basic search is any non-advanced search performed without reasonable suspicion.64See id. at 4. An advanced search is “any search in which an officer connects external equipment, through a wired or wireless connection, to an electronic device not merely to gain access to the device, but to review, copy, and/or analyze its contents.”65Id. at 5. Further, advanced searches require supervisory approval and can only be performed in instances “in which there is reasonable suspicion of activity in violation of the laws enforced or administered by the CBP, or in which there is a national security concern . . . .”66Id.
ICE Directive No. 7-6.1 describes ICE policy on searches of electronic devices at the border and is meant to provide guidelines that ICE must follow.67Border Searches of Electronic Devices, Directive No. 7-6.1 1 (ICE Aug. 18, 2009), https://perma.cc/9XXK-W7PE. ICE defines an electronic device as “[a]ny item that may contain information, such as computers, disks, drives, tapes, mobile phones and other communication devices, cameras, music players, and any other electronic or digital devices.”68Id. at 2. ICE policy states that while basic searches do not require suspicion, advanced searches require only a level of reasonable suspicion.69See Alasaad v. Nielsen, 419 F. Supp. 3d 142, 148 (D. Mass. 2019). Additionally, agents can keep electronic devices for a “reasonable time given the facts and circumstances of the particular search.”70Border Searches of Electronic Devices, Directive No. 7-6.1 4 (ICE Aug. 18, 2009), https://perma.cc/9XXK-W7PE. Although both CBP and ICE policies define different types of searches, it is unclear where the line is drawn between a basic and an advanced search.71See SMITH ET AL., supra note 2, at 21.
II. The Court’s Opinion
A. Factual History
A group of plaintiffs filed an initial suit in the District Court of Massachusetts and alleged a violation of their First and Fourth Amendment rights when border patrol agents searched their electronic devices.72Alasaad v. Mayorkas, 988 F.3d 8, 12–13 (1st Cir. 2021). Agents searched each plaintiff’s electronic device at least once, which included smartphones and laptops, and agents searched the electronic devices of five plaintiffs multiple times.73Nielsen, 419 F. Supp. 3d at 149. CBP officers searched Nadia Alasaad’s, the namesake of this lawsuit, electronic devices twice, and these officers did not respect her religious beliefs by ignoring her request to stop looking at photos on her phone that contained images of Alasaad and her daughters without their headscarves on.74Id. at 149. Alasaad noted that a CBP officer noticed a photo on her phone the first time they searched it but did not notice this photo on her phone during the second search.75Id. Merchant, a plaintiff and owner of a media website, also experienced multiple searches of her electronic devices.76Id. at 149–50. Officers not only noticed photos of Merchant without her headscarf on, but read privileged attorney-client communications on her phone.77Id. Another plaintiff, a journalist, stored information regarding his work on his phone.78Alasaad v. Nielsen, 419 F. Supp. 3d 142, 150 (D. Mass. 2019). Yet another plaintiff’s phone, owned by his employer NASA, contained confidential information.<79Id. CBP officers not only conducted searches of the electronic devices, but also made additional “observations or characterizations of the information contained therein,” such as lack of contraband or the contents of a social media post.80Id. One plaintiff noted that CBP “extracted and retained” information from his electronic devices and kept his devices for fifty-six days.81Id.
B. The Court’s Holding
The District Court held that basic and advanced border searches of electronic devices required reasonable suspicion.82Id. at 165–68. The First Circuit agreed with the Ninth and Eleventh Circuits and ruled that routine searches at the border did not need any level of suspicion.83Alasaad v. Mayorkas, 988 F.3d 8, 13 (1st Cir. 2021). They stated that the ruling in Riley did not apply to the border, as the search of an electronic device is different from the search of a person.84See id. at 17. The First Circuit did not agree with the ruling in Cano with regard to searching for evidence of contraband; it determined that the exception encompasses both advanced searches for contraband and evidence of contraband.85Id. at 21 (citing 934 F.3d at 1018). The First Circuit argued that searching for evidence of contraband is important in limiting “who and what may enter the country.”86Id. at 20. Under CBP policy, an officer can “detain electronic devices or copies of information contained therein, for a brief, reasonable period of time to perform a thorough border search.”87Id. at 21. Under ICE policy, officers can apprehend “electronic devices, or copies of information therefrom [for] a reasonable time given the facts and circumstances of the particular search.”88Id. The First Circuit also maintained this holding regarding detention for a reasonable period of time in U.S. v. Montoya de Hernandez.89Alasaad v. Mayorkas, 988 F.3d 8, 21 (1st Cir. 2021).
The major holdings to come out of this First Circuit opinion are that under the border-search exception of the Fourth Amendment, basic searches at the border do not require any level of suspicion, and advanced border searches, which are performed under a minimum of reasonable suspicion, are not limited to the search of contraband but are also extended to searches of evidence of contraband.90Id. at 18-21.
Analysis
III. The First Circuit’s Ruling that Basic Searches of Electronic Devices at the Border Do Not Require Reasonable Suspicion Is Improper as the Basic Privacy Interests of the Persons Being Searched Are Unfairly Outweighed by the Government’s Interest at the Border
A. The Fourth Amendment’s Reasonable Expectation of Privacy in a Person’s Self, House, Papers, and Effects Extends to Electronic Devices, as in the Modern Era Electronic Devices Have Become a Part of One’s Papers and Effects
At the heart of the Fourth Amendment lies the ability to protect an individual from unreasonable searches and seizures.91Hart, supra note 49, at 374–76. As such, a government actor cannot search or seize an individual’s person or property unreasonably, without cause, or without a warrant unless an exception applies.92Hart, supra note 49, at 374–76. Fundamentally, the introduction of the Fourth Amendment allows a person’s papers, compared to their other personal effects, the greatest security from governmental abuse.93See Brief of Constitutional Accountability Center as Amicus Curiae in Support of Petitioners at 3, Alasaad v. Mayorkas, 988 F.3d 8 (1st Cir. 2021), cert. denied sub nom. Merchant v. Mayorkas, 210 L. Ed. 2d 964 (June 28, 2021) (No. 20-1505) [hereinafter Brief of Constitutional Accountability]. Since its conception, a person’s “papers” evolved to mean much more; now it includes personal electronic devices.94See id. at 4. Electronic devices carry a “library of . . . digital papers” which equate in importance to one’s actual, physical papers.95See id. Among these digital papers, individuals store personal and intimate details about their lives not limited to their conversations and photos; financial and medical information; education; debt; and more.96id. Furthermore, individuals also store their professional lives, meaning their work emails, documents, and more, in their electronic devices.97See Sales, supra note 47, at 1100. Allowing the government the ability to search an electronic device at the border with no level of suspicion violates the very nature of the Fourth Amendment itself.98See Sales, supra note 47, at 1100.
Applying the Katz analysis, the plaintiffs in Alasaad all arguably pass the test: these individuals have a reasonable expectation of privacy as they have an actual privacy interest in their electronic device, and this privacy interest is one that society deems reasonable.99Compare Katz v. United States, 389 U.S. 347, 361 (1967), with Alasaad v. Nielsen, 419 F. Supp. 3d 142, 149-50 (D. Mass. 2019). In Alasaad, plaintiffs Alasaad and Merchant both experienced situations where a border patrol agent saw photos of them without their headscarves on.100See generally Nielsen, 419 F. Supp. 3d at 149–50. According to the first part of the Katz test, Alasaad and Merchant held an actual or subjective right to privacy.101Katz, 389 U.S. at 361 (stating the first prong of the reasonable expectation to privacy test is that the person had an actual expectation of privacy). The First Amendment’s Free Exercise clause establishes the right to practice any religion free from governmental interference.102See Your Right to Religious Freedom, ACLU, https://perma.cc/3ZVY-EWRT (last visited Apr. 25, 2023). When border patrol officers went through Alasaad and Merchant’s phones to see photos of the plaintiffs without their headscarves on, they encroached upon the plaintiff’s subjective right to privacy to honor their religious and cultural views. Specifically, Muslim women who wear headscarves have the right not to remove or be seen without their headscarves unless they so choose. Alasaad and Merchant, although vocal about their concerns of the photos on their phone, nonetheless experienced their subjective right to privacy stripped from them when these officers ignored their requests and continued to search their phones.103Compare Nielsen, 419 F. Supp. 3d at 149–50 (stating that two plaintiffs were adamant about not having their phone searched for religious purposes), with Katz v. United States, 389 U.S. 347, 361 (1967) (providing the first prong of the expectation of privacy test).
Alasaad and Merchant not only held a subjective right to privacy, this privacy right is one that society recognizes as reasonable—the second prong of the Katz test.104Compare Nielsen, 419 F. Supp. 3d at 149–50 (explaining that the plaintiffs had their phones searched even though they had photos of themselves without their headscarves on), with Katz, 389 U.S. at 361 (stating the second prong of the expectation of privacy test). Many cases across many courts address the right of Muslim women to wear hijabs in places with a uniform, such as work and school.105See Alvi, supra note 104, at 791–94. In 2015, the Supreme Court ruled on the case of Samantha Elauf, a Muslim woman Abercrombie & Fitch did not employ because she wore a hijab.106E.E.O.C. v. Abercrombie & Fitch Stores, Inc., 575 U.S. 768, 770–71 (2015). The Court ruled that according to protections Title VII offers, “[a]n employer may not make an applicant’s religious practice, confirmed or otherwise, a factor in employment decisions.”107Id. at 773. The right to practice religion, which includes the right to wear a headscarf, is evident not only in Title VII but also in this historic ruling.108Id. at 775 (ruling that the plaintiff who was not hired was wrongfully discriminated against per Title VII). As both legislation and precedent recognize this freedom, it is clear that wearing a headscarf is a privacy right that society views as reasonable.109See generally id. (setting out the importance of one’s right to express their religion without being discriminated against). Under Katz, Alasaad and Merchant both held a subjective privacy interest in the ability to practice their religion, and this religious practice is one that society deems as reasonable.110Compare Alasaad v. Nielsen, 419 F. Supp. 3d 142, 149–50 (D. Mass. 2019), with Katz v. United States, 389 U.S. 347, 361 (1967).
Next, plaintiffs Dupin, Bikkannavar, and Merchant endured their reasonable expectation of privacy under Katz denied when border patrol officers reviewed information relating to their jobs on their electronic devices.111See generally Nielsen, 419 F. Supp. 3d at 142 (showcasing that one plaintiff whose phone was examined was a journalist, and another plaintiff worked for NASA). Applying the first prong of the Katz test, these plaintiffs held a subjective right to privacy.112Katz, 389 U.S. at 361 (Harlan, J., concurring) (stating the first part of the test is that the plaintiff had a subjective right to privacy). As a journalist, Dupin holds a duty to act under the core standards of journalistic integrity.113See generally SPJ Code of Ethics, SOC’Y OF PROF’L. JOURNALISTS, https://perma.cc/TYV8-6D2H (last modified Sept. 6, 2014) (outlining the four principles of ethics in journalism). As such, he must respect secrecy and privacy at all times while in this profession, especially for those individuals he receives information from.<114See generally Declaration of the Rights and Duties of Journalists, ACCOUNTABLE JOURNALISM (November 23-24, 1971), https://perma.cc/Z7YQ-VF9R (listing the duties journalists must uphold while doing their job). As an employee of NASA, Bikkannavar’s subjective right to privacy exists because he works for a company that researches and holds sensitive and highly confidential information.115See generally About NASA, NASA, https://perma.cc/3DG4-X6G7 (last visited Apr. 25, 2023) (explaining that NASA is “the global leader in space exploration” and creates important “space technologies”). As the owner of a media company, Merchant holds a subjective right to privacy because her electronic devices contain privileged attorney-client communications.116Compare Nielsen, 419 F. Supp. 3d at 149–50 (explaining the plaintiffs’ circumstances with the communications they had on their device), with Katz, 389 U.S. at 361 (Harlan, J., concurring) (stating the two-prong expectation of privacy test). One who seeks legal advice enjoys a right to the utmost confidence that their conversation with a lawyer will remain private.117See Jackie Unger, Maintaining the Privilege: A Refresher on Important Aspects of the Attorney-Client Privilege, A.B.A (Oct. 31, 2013), https://perma.cc/DQC7-DVHZ. Therefore, in accordance with the first prong of the Katz analysis, these plaintiffs all held a subjective right to privacy in their electronic devices.118Compare Nielsen, 419 F. Supp. 3d at 149–50, with Katz, 389 U.S. at 361 (Harlan, J., concurring).
These plaintiffs also meet the second prong of the Katz analysis: that the privacy interest is one that society deems as reasonable.119Katz, 389 U.S. at 361 (Harlan, J., concurring). Regarding Dupin’s job as a journalist, laws such as the Newsroom Integrity Statement and the Policy on Confidential Sources require that journalists continue to uphold their ethics and obligations in their field.120See generally Ethical Journalism, N.Y. TIMES, https://perma.cc/4UFF-TC5G (last visited Apr. 25, 2023). Regarding Bikkannavar’s job at NASA, many laws prevent the disclosure of information by an employee of any United States department or agency.121See, e.g., Disclosure of Confidential Information Generally, 18 U.S.C.A. § 1905 (West). There is also Supreme Court precedent that addresses the need for lawyers to have privacy in their work and remain independent from interference or intrusion.122Hickman v. Taylor, 329 U.S. 495, 510–11 (1947). These privacy interests of employee work product of any kind, which society clearly recognizes through legislation and precedent, pass the second prong of the Katz test.123See Katz, 389 U.S. at 361 (Harlan, J., concurring) (explaining the second prong of the Katz test).
The plaintiffs in Alasaad require the privacy interests allotted in Katz.124See Katz, 389 U.S. at 361 (Harlan, J., concurring). These plaintiffs did not lose their reasonable expectation of privacy just because they traveled across the border with their electronic devices.125Compare Alasaad v. Nielsen, 419 F. Supp. 3d 142, 149–50 (D. Mass. 2019), with Katz, 389 U.S. at 361 (Harlan, J., concurring). These devices contained far more information than their person or luggage could ever contain.126Nielsen, 419 F. Supp. 3d at 163. In addition, the plaintiffs themselves requested border patrol agents not to search through their devices, showing their intention of privacy in their items.127Id. at 149–50. Therefore, the plaintiffs in Alasaad experienced their reasonable expectation of privacy infringed when border patrol officers, with no level of suspicion, performed a search of their devices.128See generally Alasaad v. Mayorkas, 988 F.3d 8, 19 (1st Cir. 2021) (stating that reasonable suspicion is not needed for basic border searches).
B. Basic Searches of Electronic Devices at the Border Must Require Reasonable Suspicion as the Scope of a Basic Search of an Electronic Device Is not Clear
Many courts, including the First Circuit, rejected the notion that routine searches of electronic devices at the border are not intrusive in nature and therefore require no level of suspicion.129Hart, supra note 49, at 372–73. However, courts fail to recognize that there is no way to distinguish when a routine or basic search of an electronic device becomes non-routine or advanced.130See SMITH ET AL., supra note 2, at 21. CBP and ICE policy themselves are not clear on where the line is drawn between these two types of searches.131Compare Border Search of Electronic Devices, Directive No. 3340-049A 4-5 (CBP Jan. 4, 2018), https://perma.cc/VKS8-ALT9 (mentioning that border searches detect evidence relating to terrorism or other crimes that threaten national security but no mention of what is looked for when searching for evidence of contraband instead of contraband itself), with Border Searches of Electronic Devices, Directive No. 7-6.1 3 (ICE Aug. 18, 2009), https://perma.cc/9XXK-W7PE (explaining the process ICE should go through if they find evidence of contraband, but not what they should look for when searching for evidence of contraband as opposed to contraband itself). At the border, it is possible to have a routine search of a traveler’s clothing and bags without it becoming a non-routine search.132SMITH ET AL., supra note 2, at 21. A routine search is described as one which “does ‘not pose a serious invasion of privacy’ and ‘embarrass or offend the average traveler.’”133SMITH ET AL., supra note 2, at 22 (citing United States v. Johnson, 991 F.2d 1287, 1291 (7th Cir. 1993)). The factors for whether a search is basic or advanced include: “whether the search results in the exposure of intimate body parts; . . . whether the type of search exposes the suspect to pain or danger; . . . and whether the suspect’s reasonable expectations of privacy, if any, are abrogated by the search.”134SMITH ET AL., supra note 2, at 22 (citing United States v. Braks, 842 F.2d 509, 511–12 (1st Cir. 1988)). In contrast, advanced searches have been identified “as prolonged detentions, strip searches, body cavity searches, or involuntary x-ray searches.”135SMITH ET AL., supra note 2, at 23. While these lines are clearer when it comes to searching a person or their physical belongings at the border (like their backpack or wallet), it is harder to apply these factors to electronic devices.136See Hart, supra note 49, at 386–87.
Attempts to identify where the line is drawn between routine and non-routine searches of electronic devices at the border led courts to explain that, while a brief scroll through a traveler’s electronic device might not require reasonable suspicion because it is a routine search, taking the electronic device away and conducting a more thorough search of the hard drive does require reasonable suspicion because then it becomes non-routine.137See Hart, supra note 49, at 383–84. However, looking at what the First Circuit considers a routine search in Alasaad, it seems that there is more confusion than ever.138See SMITH ET AL., supra note 2, at 49. For example, after the second search by border patrol of Alasaad’s phone, one of the officers inquired about a photograph that they remembered on Alasaad’s phone during the first search but did not notice and assumed deleted by the second search.139Alasaad v. Nielsen, 419 F. Supp. 3d 142, 149 (D. Mass. 2019). The fact that this basic search occurred with no reasonable suspicion of contraband and led to an officer remembering the contents of Alasaad’s photographs proves the intrusive nature of the search, beyond just a basic search.140SeeSMITH ET AL., supra note 2, at 48. Most likely, the same would not occur in a brief search of a person’s backpack or luggage because there is less of a chance that a brief search in that case is intrusive.141See Hart, supra note 49, at 379–80. There is an underlying difference between electronic devices and backpacks due to the nature of sensitive information electronic devices hold.142See Hart, supra note 49, at 383–84.
Electronic devices are not closed containers, even though courts believe they are. The two are not equivalent because closed containers will never reveal as much about a traveler as their electronic device, which could expose years of information in a single brief search.143See id. at 181–82. As such, a requirement of reasonable suspicion for basic searches of electronics would protect the privacy of travelers because they would not have to worry about the exposure of their lives to border patrol simply because they are traveling.144See id. at 182. Searches of electronic devices at the border must balance the interests of both the government and the traveler.145See Hart, supra note 49, at 376.
C. Although Governmental Interest Is at Its Peak at the Border, Reasonable Suspicion to Conduct Basic Searches of Electronic Devices Should Be Required So There Is Both a Balancing of Interests Between the Government’s and a Person’s Fourth Amendment Rights
The border-search exception applies to what a traveler holds on their person, most notably a backpack or suitcase. The border-search exception is designed to catch illegal contraband that poses an immediate danger to the country.146See Hoffman, supra note 145, at 176–77. A routine or basic search of the physical contents of a backpack or suitcase, meaning opening these bags, touching and moving items around, potentially exposes illegal contraband almost immediately.147 See Hoffman, supra note 145, at 182. However, requiring no suspicion when conducting a basic search of electronic devices, which, as discussed above, contain a multitude of personal and professional information, exposes the individual to more privacy intrusion and unfairly weighs in the favor of the governmental interest among all else.148See Brief of Constitutional Accountability, supra note 93, at 17–18. An equitable balancing of the scales must exist among individuals’ and the government’s interests when it comes to basic searches of electronic devices at the border.149See Brief of Constitutional Accountability, supra note 93, at 13–14. Requiring reasonable suspicion of contraband before searching these devices, at the very least, is the correct way to balance these interests.150See Hoffman, supra note 145, at 182.
Comparing the border-search exception to other notable Fourth Amendment exceptions highlights instances where the government’s interest is more clearly balanced; basic searches of electronic devices at the border should mirror these exceptions.151 Compare Alasaad v. Mayorkas, 988 F.3d 8, 15 (1st Cir. 2021) (stating that the purpose of the border search exception is to catch contraband before it enters the country), with Terry v. Ohio, 392 U.S. 1, 23 (1968) (stating that an officer must think there is an immediate harm to himself before searching the person). For example, the Terry Court ruled that an officer must identify “specific and articulable facts, which taken together with rational inferences from those facts, reasonably warrant an intrusion,” meaning a Terry stop requires reasonable suspicion before the stop occurs.152Terry, 392 U.S. at 21. The overarching goal of protecting both the officers and the public is served by requiring reasonable suspicion because it also balances the privacy interests of the individual.153Id. (explaining how the interests of both the government and the individual are protected). Like Terry, requiring reasonable suspicion before conducting basic searches at the border balances both the interests of the government and the individual.154Compare Mayorkas, 988 F.3d at 18, with Terry, 392 U.S. at 21. Furthermore, electronic devices at the border do not present nearly as much of a threat of immediate harm as contraband does.155See generally Riley v. California, 573 U.S. 373, 399 (2014) (explaining that cell phone searches in a non-border setting require a warrant because cell phones were not an immediate danger to police officers). It is easier to bring electronic contraband into the country and bypass the checks and balances at the border, regardless of whether this contraband is seized, by uploading it onto the cloud.156See Hoffman, supra note 145, at 182–83. If this is the case, then requiring no suspicion for basic searches at the border will only serve to invade privacy interests, and not actually catch contraband.157See Hoffman, supra note 145, at 182–83.Therefore, modeling basic searches of electronic devices at the border after Terry is one way to ensure the balance of interests.158Compare Alasaad v. Mayorkas, 988 F.3d 8, 18 (1st Cir. 2021), with Terry, 392 U.S. at 21 (1968).
Another Fourth Amendment exception that the border-search exception could mirror is the search of a cell phone following a search incident to arrest.159See Riley, 573 U.S. at 373. The Ninth Circuit ruled that due to the amount of information a cell phone holds, a warrant is required to uphold protections granted to individuals from the Fourth Amendment.160 A balance between the governmental interests supporting no suspicion and the Ninth Circuit’s reasoning for requiring a warrant is to require reasonable suspicion for a basic search.160Compare id. (explaining that searching electronic devices requires a warrant), with Mayorkas, 988 F.3d at 18 (implying that because governmental interest is at its peak at the border, there is no balance with individual rights). That way, there is a true balancing of two sides that vary in interests.161See Hoffman, supra note 145, at 185. Overall, requiring reasonable suspicion to conduct basic searches at the border is the appropriate way to safeguard both individuals’ privacy interests and the government’s heightened interest in keeping contraband out of the country.162Compare Mayorkas, 988 F.3d at 13 (affirming the government’s interest to keep contraband out of the country), with Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J. concurring) (expressing the importance of maintaining an individual’s reasonable privacy interest).
IV. The First Circuit’s Ruling That Advanced Searches of Electronic Devices at the Border Included Searching for Evidence of Contraband Is Inappropriate as It Sets No Clear Guidelines of What Border Patrol Agents Should Regard as Evidence and Grants These Agents High Discretionary Power Over a Person’s Electronic Device
A. Advanced Searches of Electronic Devices at the Border Should Only Include Searching for Contraband, not “Evidence of Contraband”
Massachusetts law distinguishes “evidence of contraband” by stating that “[e]vidence is an item that is otherwise lawfully possessed but could be used to explain the government’s theory of the case.”163Victoria L. Nadela & Roger Witkin, 42 Mass. Prac., Criminal Defense Motions § 6:4 (5th ed. 2021). Contraband, on the other hand, is something that is always unlawful, such as carrying a switchblade.164Id. Regarding electronic devices, it is unclear what “evidence of contraband” means, as the Ninth Circuit noted a difference between a search for contraband and a search for evidence of contraband.165United States v. Cano, 934 F.3d 1002, 1017 (9th Cir. 2019). Border patrol agents do not have a “general authority to search for crime.”166Id. For example, texts or emails used as evidence for the crime of price fixing are themselves not contraband, but rather evidence of a crime.167Id. In Cano, the defendant’s cell phone contained phone numbers which officers wrote down, and proceeded to call these numbers.168Id. at 1008–09. The court noted they can point to no law that states it is a specific crime to bring in evidence of contraband, as that itself is so broad.169See id. at 1017. The Supreme Court has stated that seizure of goods prohibited at the border is inherently different from seizure of goods which could be used as evidence in prosecuting crimes.170See Boyd v. United States, 116 U.S. 616, 623 (1886). Additionally, the Supreme Court has recognized that “[t]he scope of the search must be ‘strictly tied to and justified by’ the circumstances which rendered its initiation permissible.”171Terry v. Ohio, 392 U.S. 1, 19 (1968).
In the Ninth Circuit, a border patrol agent must stop their search at actual digital contraband, such as child pornography, which is a widely accepted use of the border-search exception.172Kristina Davis, Returning from Travel Abroad? A Court Put Limits on Border Officers Rummaging Through Your Phone, SAN DIEGO UNION-TRIB. (July 24, 2021, 6:00 AM PT), https://perma.cc/N33A-N5TC. However, beyond actual contraband itself, a border patrol agent must obtain a warrant if they want to search for evidence of contraband.173Id. This narrows the scope beyond a search-for-anything approach and sets actual parameters on these advanced searches—no contraband, no more search.174See id. The First Circuit must model its policy on advanced searches at the border to only contain searching for contraband, not evidence of contraband, rather than upholding this broad policy.175See generally id. (stating that the First Circuit did not agree with the “narrow view in Cano”). In addition to the confusion brought about by judicial precedent, CBP and ICE policy themselves do not provide guidelines as to what “evidence of contraband” entails.176Compare Border Search of Electronic Devices, Directive No. 3340-049A 9 (CBP Jan. 4, 2018), https://perma.cc/VKS8-ALT9 (explaining only what type of contraband officers look for, not what evidence of contraband entails), with Border Searches of Electronic Devices, Directive No. 7-6.1 3 (ICE Aug. 18, 2009), https://perma.cc/9XXK-W7PE (analyzing only the process officers go through when finding evidence of contraband).
The First Circuit’s failure to prohibit searches for “evidence of contraband” in electronic devices at the border is a slippery slope: by expanding the already set precedent on only looking for contraband during advanced searches, individuals’ Fourth Amendment rights will be significantly harmed.177Recent Cases supra note 1, at 1468. The First Circuit, or even the Supreme Court, must no longer allow searching for evidence of contraband for this very reason.178See Recent Cases supra note 1, at 1468. If contraband, like child pornography, is not apparent during an advanced search, then the search must stop altogether, with only a warrant allowing it to continue.179Davis, supra note 177. This way, border patrol authority to search electronic devices remains limited at the border.180See Davis, supra note 177.
B. With No Set Guidelines of What “Evidence of Contraband” Entails, There Is a High Probability That Border Patrol Agents Will Abuse Their Power During These Searches and Seizures
The creation of the U.S. Border Patrol is rooted in racism.181KATY MURDZA & WALTER EWING, THE LEGACY OF RACISM WITHIN THE U.S. BORDER PATROL 4 (2021), https://perma.cc/4PHG-EGJ6. While this began with the Chinese Exclusion Act, many other migrants felt inequity while attempting to enter the country.182Id. at 6. There have been many incidents “of agents using racial slurs, sexual comments, and other offensive language.”183Id. at 4. In fact, border patrol agents are required to use racist terms in order to make those trying to cross the border feel less than human.184Id. at 13. Many complaints and lawsuits have been filed against the border patrol for incidents such as targeting migrants because of their skin and hair color, and stopping cars of Black U.S. citizens because of their skin color without giving a legitimate reason for the stop.185Id. at 14. This is another reason to limit the authority of border patrol agents to conduct searches of electronic devices at the border; the system is already so corrupt that only clear parameters will ensure minimal abuse of power.186See generally id. at 5 (explaining that a lot must be done by the Biden Administration in order to change the ways of border patrol).
In general, CBP officers are required to uphold the values of the Fourth Amendment, which precludes unreasonable searches and seizures.187Arrests/Searches & Seizures, HOLD CBP ACCOUNTABLE, https://perma.cc/9JK5-SZVN (last visited Apr. 25, 2023). Since 2010, more than 230 people died at the hands of CBP — their cause of death is unclear as a result of either no media attention or no transparency by border patrol.188Abuse of Power and its Consequences, SOUTHERN BORDER COMMUNITIES COALITION (SBCC), https://perma.cc/5K9S-XRGE (last updated Aug. 11, 2022) [hereinafter Abuse of Power]. Young individuals make up a substantial percentage of those killed — with 15% being between the ages of 18 to 29.189Id. Additionally, CBP specializes in the use of excessive force.190See id. A 2013 investigation into this issue forced CBP to update its use-of-force handbook.191Id. However, data shows that the border patrol agency and its officers still face little to no consequences for their violent actions.192Id. Furthermore, in what’s known as the 100-mile enforcement zone, Border Patrol manages at least one hundred temporary and permanent checkpoints.193Id. At these checkpoints, “drivers can be stopped and questioned to verify their lawful status.”194Id. However, due to the amount of authority Border Patrol holds, a myriad of evidence revealed that these checkpoints not only “violate constitutional rights [but also] lead to abuse.”195Id.
Department of Homeland Security Secretary Alejandro Mayorkas made a commitment to break from Trump’s racist and anti-immigrant policies.196Naureen Shah & Jonathan Blazer, Secretary Mayorkas Pledged to End His Agency’s Anti-Immigrant Abuses. Here’s What He’s Delivered, ACLU (July 21, 2021), https://perma.cc/JS4W-LMB2. While Secretary Mayorkas attempted to stop the abuse of power by ICE by directing the agency to focus its resources on threats to national security, public safety, and distributing guidance on which groups remain a priority for immigration enforcement, he failed to restrict ICE’s authority in many other instances.197Id. ICE agents abuse their power by arresting groups of people who they deem to be priorities, but they are not considered priorities according to the criteria set forth by Secretary Mayorkas.198 See id.
Border patrol agents wide authority to search for evidence of contraband in electronic devices at the border because gives them too much discretion to search electronic devices for whatever they want, and for however long they want.199See generally Abuse of Power, supra note 193 (explaining border authorities’ broad range of power). In Alasaad, Wright, a computer programmer, had his computer extracted and CBP retained the data for a period of 56 days.200Alasaad v. Nielsen, 419 F. Supp. 3d 142, 150 (D. Mass. 2019). It is unclear what border patrol officials thought they would find, but this was potentially an instance of abuse of power by border patrol agents.201Compare Alasaad v. Mayorkas, 988 F.3d 8, 20–21 (1st Cir. 2021) (failing to mention what evidence of contraband is), with Abuse of Power, supra note 193 (stating how border patrol officers regularly abuse their power).
Conclusion
In today’s modern age, electronic devices will only continue to develop, far into the future. There is growing turmoil in the United States on how to handle them at the border. The First Circuit decided in Alasaad v. Mayorkas that basic, routine searches at the border required no reasonable suspicion and that advanced, non-routine searches at the border required reasonable suspicion with an expanded scope of not just searching for contraband, but also evidence of contraband. The First Circuit failed to set precedent to protect both the government’s privacy interests as well as the privacy interests of the people. The First Circuit should have ruled that basic searches of electronic devices at the border require reasonable suspicion. It is clear under the Katz analysis that the plaintiffs in this case held a reasonable expectation of privacy that was taken away from them. Furthermore, the line between basic and advanced searches of electronic devices is so nuanced that some argue that the search of electronic devices in general is an advanced search. If the First Circuit required reasonable suspicion for both basic and advanced searches, it would clear up this confusion. Additionally, there is an unfair balancing of interests; other Fourth Amendment exceptions balance interests between the government and the individual more equally, and the border-search exception for electronic devices should do the same.
Moreover, the First Circuit should have decided that the search of electronic devices at the border stops at searching for contraband and does not extend to evidence of contraband. The term “evidence of contraband” is very unclear (even though some courts have defined it) because the scope of what is searched for or what is regarded as “evidence of contraband” is incredibly ambiguous. It allows for an abuse of power by both CBP and ICE because even when the authority is clear, border patrol agents still abuse their power. As such, “evidence of contraband” should not be included in border searches of electronic devices. Overall, the First Circuit missed a historic opportunity to correctly define the bounds of border searches of electronic devices, and this is the exact reason why the Supreme Court needs to act to correct these wrongs.

