Alasaad et al v. Duke et al
Filing
34
Judge Denise J. Casper: ORDER entered. MEMORANDUM AND ORDER - The Court DENIES Defendants' motion to dismiss, D. 14.(Hourihan, Lisa)
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 1 of 52
UNITED STATES DISTRICT COURT
DISTRICT OF MASSACHUSETTS
__________________________________________
)
)
GHASSAN ALASAAD, NADIA ALASAAD,
)
SUHAIB ALLABABIDI, SIDD
)
BIKKANNAVAR, JÉRÉMIE DUPIN,
)
AARON GACH, ISMAIL ABDEL-RASOUL
)
a/k/a ISMA’IL KUSHKUSH, DIANE MAYE, )
ZAINAB MERCHANT, MOHAMMED
)
AKRAM SHIBLY and MATTHEW WRIGHT, )
)
Plaintiffs,
)
)
v.
)
No. 17-cv-11730-DJC
)
)
KIRSTJEN NIELSEN, Secretary of the U.S.
)
Department of Homeland Security, in her
)
official capacity; KEVIN McALEENAN,
)
Acting Commissioner of U.S. Customs and
)
Border Protection, in his official capacity; and )
THOMAS HOMAN, Acting Director of U.S.
)
Immigration and Customs Enforcement, in his )
official capacity,
)
)
Defendants.
)
)
)
__________________________________________)
MEMORANDUM AND ORDER
CASPER, J.
I.
May 9, 2018
Introduction
Plaintiffs Ghassan Alasaad, Nadia Alasaad, Suhaib Allababidi (“Allababidi”), Sidd
Bikkannavar (“Bikkannavar”), Jérémie Dupin (“Dupin”), Aaron Gach (“Gach”), Ismail AbdelRasoul a/k/a Isma’il Kushkush (“Kushkush”), Diane Maye (“Maye”), Zainab Merchant
(“Merchant”), Mohammed Akram Shibly (“Shibly”) and Matthew Wright (“Wright”)
1
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 2 of 52
(collectively, “Plaintiffs”) bring this suit against the following persons in their official capacities:
Kirstjen Nielsen (“Nielsen”), Secretary of the U.S. Department of Homeland Security (“DHS”),1
Kevin McAleenan (“McAleenan”), Acting Commissioner of U.S. Customs and Border Protection
(“CBP”), and Thomas Homan (“Homan”), Acting Director of U.S. Immigration and Customs
Enforcement (“ICE”) (collectively, “Defendants”). D. 7 ¶¶ 14-26. Plaintiffs, ten U.S. citizens and
one lawful permanent resident, allege that Defendants’ conduct—searching Plaintiffs’ electronic
devices at ports of entry to the United States and, in some instances, confiscating the electronic
devices being searched, pursuant to CBP and ICE policies—violates the Fourth Amendment
(Counts I and III) and First Amendment (Count II) of the U.S. Constitution. D. 7 ¶¶ 1-10, 168-73.
They seek declaratory and injunctive relief. D. 7 at 40-42. Defendants have now moved to
dismiss. D. 14. For the reasons stated below, the Court DENIES Defendants’ motion to dismiss.
II.
Standard of Review
To survive a motion to dismiss under Fed. R. Civ. P. 12(b)(6), a complaint must include
“enough facts to state a claim to relief that is plausible on its face.” Bell Atl. Corp. v. Twombly,
550 U.S. 544, 570 (2007); García-Catalán v. United States, 734 F.3d 100, 103 (1st Cir. 2013). The
Court “must assume the truth of all well-plead[ed] facts and give the plaintiff the benefit of all
reasonable inferences therefrom.” Ruiz v. Bally Total Fitness Holding Corp., 496 F.3d 1, 5 (1st
Cir. 2007). Plaintiffs “need not demonstrate that [they are] likely to prevail” at this stage, GarcíaCatalán, 734 F.3d at 102, but they must show that the combined allegations state “a plausible, not
a merely conceivable, case for relief.” Sepúlveda-Villarini v. Dep’t of Educ. of P.R., 628 F.3d 25,
29 (1st Cir. 2010).
1
The initial suit was filed against Elaine Duke, then Acting Secretary of DHS, but Nielsen has
been substituted as Secretary of Homeland Security pursuant to Fed. R. Civ. P. 25(d).
2
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 3 of 52
III.
Factual Background
Unless otherwise noted, the following facts are drawn from Plaintiffs’ amended complaint
and accepted as true for the purposes of considering the motion to dismiss. Plaintiffs are
individuals whose electronic devices have been searched by federal officers at U.S. ports of entry
on at least one occasion, and who “regularly travel outside the country with their electronic devices
and intend to continue doing so.” D. 7 ¶ 2. Defendants are the heads of DHS and two of its units,
CBP and ICE. D. 7 ¶ 3.
In the United States, ninety-five percent of adults own a cell phone, seventy-seven percent
own a smart phone and over fifty percent own a tablet computer. D. 7 ¶ 27. “Electronic devices
are often essential to people’s work,” as well as “communication . . . navigation, shopping,
banking, entertainment, news, and photography, among other functions.” D. 7 ¶¶ 36, 27. “Laptops
sold in 2017 can store up to two terabytes” of data, tablet computers can hold up to a terabyte and
“smartphones can store hundreds of gigabytes of data.” D. 7 ¶ 30. This storage capacity “can be
the equivalent of hours of video files, thousands of pictures, or millions of pages of text.” Id.
Electronic devices like these may also be used to access cloud storage—“data located on remote
servers”—as well as email and social media applications. D. 7 ¶¶ 30, 32. Data stored on electronic
devices includes “personal, expressive, and associational information” like communications,
location history, contact lists, internet browsing history, photos, calendars and notes. D. 7 ¶ 31.
Additionally, electronic devices store “historical location information, so-called ‘deleted’ items
that actually remain in digital storage,” “metadata about digital files” and “time stamps or GPS
coordinates created automatically by software on the device.” D. 7 ¶ 33.
According to public CBP data, “CBP conducted 14,993 electronic device searches in the
first half of fiscal year 2017,” putting CBP “on track to conduct approximately 30,000 searches
3
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 4 of 52
this fiscal year, compared to just 8,503 searches in fiscal year 2015.” D. 7 ¶ 38.2 Searches
generally come in two forms: (1) “manual” searches, during which “officers review the contents
of the device by interacting with it as an ordinary user would, through its keyboard, mouse, or
touchscreen interfaces”; and (2) “forensic” searches, during which officers “use sophisticated
tools, such as software programs or specialized equipment, to evaluate information contained on a
device,” typically starting by making a copy of the device’s data. D. 7 ¶¶ 39, 40, 43. Forensic
searches “can capture all active files, deleted files, files in allocated and unallocated storage space,
metadata . . . password-protected or encrypted data, and log-in credentials and keys for cloud
accounts.” D. 7 ¶ 43. On occasion, officers confiscate travelers’ devices for prolonged periods.
D. 7 ¶¶ 50-56.
CBP and ICE have policies that authorize and guide agents’ search of travelers’ electronic
devices at border locations. D. 7 ¶¶ 8, 57-61. Both units’ policies permit searches of electronic
devices without a showing of probable cause or issuance of a search warrant. D. 7 ¶¶ 9, 57.
A.
The Search Policies
The CBP and ICE electronic device search policies detailed below are matters of public
record, published by DHS and available to the public and, accordingly, may be considered by the
Court for the purposes of this motion. See Alt. Energy, Inc. v. St. Paul Fire & Marine Ins. Co, 267
F.3d 30, 33 (1st Cir. 2001). Moreover, neither party challenges that the Court may take judicial
2
See CBP Releases Statistics on Electronic Device Searches, U.S. Customs and Border Protection
(Apr. 11, 2017), http://www.cbp.gov/newsroom/national-media-reliease/cbp-releases-statisticselectronic-device-searches-0. Indeed, according to CBP’s reported statistics postdating Plaintiffs’
amended complaint, CBP’s electronic device search rate remained consistent in the second half of
fiscal year 2017, which ran until September 30, 2017, and the number of travelers whose electronic
devices were searched totaled 30,200. D. 18-2 at 5 n.7; CBP Releases Updated Border Search of
Electronic Device Directive and FY17 Statistics, U.S. Customs and Border Protection (Jan. 5,
2018),
http://www.cbp.gov/newsroom/national-media-release/cbp-releases-updated-bordersearch-electronic-device-directive
4
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 5 of 52
notice of these policies, but rather, request that the Court does so. See D. 18; D. 19 at 13 n.1. The
Court, therefore, takes judicial notice of the following policies: ICE’s directive number 7-6.1,
issued August 18, 2009, titled “Border Searches of Electronic Devices” (“ICE Policy”); CBP
directive number 3340-049, issued August 20, 2009, titled “Border Searches of Electronic Devices
Containing Information” (“2009 CBP Policy”);3 and CBP’s directive number 3340-049A, issued
January 4, 2018, superseding the 2009 CBP Policy, titled “Border Search of Electronic Devices”
(“2018 CBP Policy”), D. 18-1.
1.
The ICE Policy
The ICE Policy establishes procedures “to search, detain, seize, retain, and share
information contained in electronic devices possessed by individuals at the border” and “applies
to . . . all persons arriving in, departing from, or transitioning through the United States.” ICE Pol.
¶ 1.1. It states that “[a]ll electronic devices crossing U.S. borders are subject to border search,”
defining “electronic devices” as “[a]ny item that may contain information, such as computers,
disks, drives, tapes, mobile phones and other communication devices, cameras, music players, and
any other electronic or digital devices.” ICE Pol. ¶¶ 8.6.1, 5.2.
Under the ICE Policy, agents are authorized to search electronic devices “with or without
individualized suspicion.” D. 7 ¶ 58(b); ICE Pol. ¶ 6.1. “To the extent practicable, border searches
should be conducted in the presence of, or with the knowledge of, the traveler.” ICE Pol. ¶ 8.1.2.
The traveler’s consent, however, is not needed for search. ICE Pol. ¶ 8.1.3.
3
As of this opinion’s publication, the 2009 ICE Policy is available at the following online address:
https://www.dhs.gov/xlibrary/assets/ice_border_search_electronic_devices.pdf (“ICE Pol.”). The
2009 CBP Policy is available at https://www.dhs.gov/xlibrary/assets/cbp_directive_3340-049.pdf
(“2009 CBP Pol.”).
5
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 6 of 52
No individualized suspicion is required for officers to confiscate devices or “copies of
information therefrom” for “further review” on- or off-site. ICE Pol. ¶¶ 6.1, 8.1.4; see D. 7 ¶ 61(b).
Additionally, “[a]ssistance to complete a border search may be sought from other Federal agencies
and non-Federal entities, on a case by case basis, as appropriate,” for technical or subject matter
assistance. ICE Pol. ¶¶ 6.1, 8.1.4, 8.4. ICE agents “may create and transmit copies of information”
when seeking assistance. ICE Pol. ¶ 8.4.4. Such assistance “is to be accomplished within a
reasonable period of time.” ICE Pol. ¶ 8.4.5.a. In general, once ICE confiscates a device, ICE
may retain it for “a reasonable time given the facts and circumstances of the particular search,”
generally thirty days, and supervisors may extend this period under “circumstances . . . that warrant
more time.” ICE Pol. ¶ 8.3.1; D. 7 ¶ 61(c).
Regarding written records of searches, “[n]othing in this policy limits the authority of
Special Agents to make written notes or reports or to document impressions relating to a border
encounter in ICE’s paper or electronic recordkeeping systems.” ICE Pol. ¶ 6.3. If ICE confiscates
a device, agents must “provide the traveler with a copy of the applicable chain of custody form or
other appropriate documentation.” ICE Pol. ¶ 8.2.4. ICE agents may seize and retain devices or
copies of information contained therein if they determine there is probable cause of unlawful
activity or, to “the extent authorized by law,” information “relevant to immigration, customs, and
other law enforcement matters.” ICE Pol. ¶¶ 8.5.1.a-b. Copies may be shared with federal, state,
local and foreign law enforcement agencies. ICE Pol. ¶ 8.5.1.c.
The ICE Policy states that copies of information “determined to be of no relevance to ICE
will be destroyed . . . . within seven business days after conclusion of the border search unless
circumstances require additional time” and “no later than 21 calendar days after conclusion of the
border search.” ICE Pol. ¶ 8.5.1.e. Assisting agencies must return devices and data to ICE or
6
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 7 of 52
“certify to ICE that any copies in its possession have been destroyed” unless they have the
independent legal authority to retain copies. ICE Pol. ¶ 8.5.2. Non-federal entities must return all
copies of information “as expeditiously as possible.” ICE Pol. ¶ 8.5.3.
2.
The CBP Policies
Given that Plaintiffs seek injunctive, prospective relief, the Court relies primarily upon the
2018 CBP Policy, as it supersedes the 2009 CBP Policy. See D. 18-1 at 2. For the purposes of
any relief sought to address past harms, however, the Court briefly outlines the 2009 CBP Policy
below to the extent it differs from the 2018 CBP Policy.
a)
The 2018 CBP Policy
The 2018 CBP Policy applies to searches performed by CBP officers, not ICE or Homeland
Security Investigations (“HSI”) agents. D. 18-1 ¶ 2.7. It defines “electronic device” as “[a]ny
device that may contain information in an electronic or digital form, such as computers, tablets,
disks, drives, tapes, mobile phones and other communication devices, cameras, music and other
media players.” D. 18-1 ¶ 3.2.
The 2018 CBP Policy divides electronic device searches into two categories: the basic
search and the advanced search. D. 18-1 ¶ 5.1. An “advanced search” is defined as “any search
in which an Officer connects external equipment . . . to an electronic device not merely to gain
access to the device, but to review, copy, and/or analyze its contents.” D. 18-1 ¶ 5.1.4. It requires
“reasonable suspicion of activity in violation of the laws enforced or administered by CBP” or a
“national security concern,” as well as “supervisory approval,” to justify the search. Id. A
supervisor must also be present during the search. D. 18-1 ¶ 5.1.5. A “basic search,” by contrast,
is “[a]ny border search of an electronic device that is not an advanced search.” D. 18-1 ¶ 5.1.3.
An officer may conduct such a search “with or without suspicion.” Id.
7
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 8 of 52
All electronic device searches are documented. D. 18-1 ¶ 5.1.5. Additionally, all searches
“should be conducted in the presence of the individual whose information is being examined unless
there are national security, law enforcement, officer safety, or other operational considerations that
make it inappropriate to permit the individual to remain present.” D. 18-1 ¶ 5.1.6. Permission to
remain present, however, “does not necessarily mean that the individual shall observe the search
itself.” Id.
The 2018 CBP Policy authorizes “examination of only the information that is resident upon
the device and accessible through the device’s operating system or through other software, tools,
or applications.”
D. 18-1 ¶ 5.1.2.
The policy prohibits an officer’s intentional search of
information stored remotely, directing officers to request that travelers “disable connectivity to
any network” prior to search. Id. According to the policy, “[t]ravelers are obligated to present
electronic devices and the information contained therein in a condition that allows inspection of
the device and its contents,” and “[p]asscodes or other means of access may be requested and
retained as needed to facilitate” the search. D. 18-1 ¶ 5.3.1. If an officer cannot complete an
inspection because of passcode or encryption protection, the officer may “detain the device
pending a determination as to its admissibility, exclusion, or other disposition” or “seek technical
assistance” or “use external equipment” to access the device. D. 18-1 ¶¶ 5.3.3-4.
The 2018 CBP Policy permits officers to “detain electronic devices, or copies of
information contained therein, for a brief, reasonable period of time,” which “ordinarily should
not exceed five (5) days,” on- or off-site, but may be extended with supervisor approval. D. 18-1
¶ 5.4.1. If a device is detained, the officer must issue a custody receipt to the traveler prior to the
traveler’s departure, D. 18-1 ¶ 5.4.1.4, and all transfers of custody must be recorded, D. 18-1 ¶¶
5.4.2.3, 5.6.2. CBP officers may make copies of electronic devices when seeking technical
8
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 9 of 52
assistance—e.g., device access or translation assistance—or subject matter assistance “with
reasonable suspicion or national security concern.” D. 18-1 ¶¶ 5.4.2.1-2. Unless assistance is
sought within CBP or from ICE, requests for assistance require supervisory approval and must be
documented. D. 18-1 ¶ 5.4.2.3.
If after a review of the electronic device an officer determines there is probable cause to
believe it contains evidence of illegal activity, officers “may seize and retain” the device. D. 181 ¶ 5.5.1.1. “Without probable cause . . . CBP may retain only information relating to immigration,
customs, and other enforcement matters if such retention is consistent with the applicable system
of records notice.” D. 18-1 ¶ 5.5.1.2. The 2018 CBP Policy does not limit CBP’s authority to
share information from these devices, “retained in accordance with this Directive, with federal,
state, local, and foreign law enforcement agencies.” D. 18-1 ¶ 5.5.1.3.
If the review does not give rise to “probable cause to seize the device or the information
contained therein, any copies of the information held by CBP must be destroyed, and any electronic
device must be returned” within seven days of such determination, barring special circumstances.
D. 18-1 ¶ 5.4.1.2. Additionally, “[p]asscodes and other means of access obtained during the course
of a border inspection . . . will be deleted or destroyed when no longer needed to facilitate the
search.” D. 18-1 ¶ 5.3.2. To the extent any assistance was provided outside of CBP or ICE, the
assisting agency or entity “should destroy all copies of the information conveyed.” D. 18-1
¶ 5.5.2.2. “The destruction shall be noted in appropriate CBP systems.” D. 18-1 ¶ 5.4.1.2.
b)
The 2009 CBP Policy
Under the 2009 CBP Policy, which was in force at the time of Plaintiffs’ alleged border
device searches, certain policies differed. The 2009 CBP Policy did not distinguish between a
basic and advanced search and no level of suspicion was required for either. D. 7 ¶ 61(a); 2009
9
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 10 of 52
CBP Pol. ¶ 5.1.2. Likewise, the earlier policy permitted confiscation of electronic devices for onor off-site search without any level of suspicion. D. 7 ¶ 61(a); 2009 CBP Pol. ¶ 5.3.1.
B.
The Plaintiffs
1.
The Alasaads
Ghassan and Nadia Alasaad are U.S. citizens and Massachusetts residents whose two
smartphones were searched and retained when they were crossing the border in July 2017 from
Canada to Vermont. D. 7 ¶¶ 14, 62, 70. They were traveling with their eleven-year-old daughter,
who was “ill and had a high fever.” D. 7 ¶ 63. When asked, a CBP supervisor told them they were
being detained and searched because he “simply felt like ordering a secondary inspection.” D. 7
¶ 66. In a secondary inspection room, a CBP officer manually searched Ghassan’s smartphone.
D. 7 ¶ 65. Several hours later, a CBP officer ordered Nadia to provide the password to her locked
phone. D. 7 ¶ 67. After the officer told them that if Nadia did not disclose her password, the
“phone would be confiscated,” she wrote down the password. D. 7 ¶ 68. Nadia “wears a headscarf
in public in accordance with her religious beliefs” and told the officer that a male officer could not
search her phone because it contained photos of her without a headscarf and the officer responded
“that it would take two hours for a female officer to arrive, and then more time to search the
phone.” D. 7 ¶¶ 67, 70. After approximately six hours of detention, the Alasaads departed without
their two phones. D. 7 ¶¶ 70-71. The phones were returned fifteen days later. D. 7 ¶ 72. CBP’s
search and seizure of Ghassan’s phone “damaged its functionality.” Id.
One month later, the Alasaads’ daughter’s locked smartphone was searched when Nadia
and her daughter arrived in New York from Morocco “where they had been visiting family.” D. 7
¶¶ 73, 75. CBP officers directed the two to a secondary inspection area. D. 7 ¶ 74. There, Nadia
informed the officers that she had lost her phone, but when officers searched Nadia’s purse, they
10
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 11 of 52
found her daughter’s smartphone. Id. The officers directed the Alasaads’ daughter to write down
her password, and after she did, an officer “took the phone to another room for approximately 15
minutes.” D. 7 ¶ 75.
2.
Allababidi
In January 2017, Allababidi had his devices searched and confiscated by CBP officers
when returning from a business trip on a flight from Dubai to Dallas. D. 7 ¶¶ 77-80. A U.S. citizen
who lives in Texas and owns and operates a business that sells security technology, Allababidi
carried a locked smartphone “that he used regularly for both personal and business matters” in the
U.S. and an unlocked smartphone that “enabled him to communicate easily while overseas.” D. 7
¶¶ 15, 77. A CBP officer directed Allababidi to a secondary inspection area, where he observed
an officer “seize and manually search his unlocked phone for at least 20 minutes.” D. 7 ¶ 78. The
officer ordered Allababidi to unlock his other phone, and when he declined, officers confiscated
both smartphones. D. 7 ¶ 79. One phone was returned two months later, and the other had not
been returned at the time the amended complaint was filed. D. 7 ¶ 80.
3.
Bikkannavar
Bikkannavar, a U.S. citizen residing in California, returned from a vacation in Chile with
a locked smartphone owned by his employer, NASA’s Jet Propulsion Laboratory, which he used
for work and personal matters. D. 7 ¶¶ 16, 81. CBP officers escorted Bikkannavar to a secondary
inspection area, where an officer gave him a CBP form that Bikkannavar understood to “mean that
CBP was asserting a legal prerogative to search the contents of his phone.” D. 7 ¶ 82. After
initially declining to do so, Bikkannavar disclosed his password, which an officer wrote down and
took, with Bikkannavar’s phone, to another room. D. 7 ¶¶ 82-83. The officer returned about thirty
minutes later, informed Bikkannavar that officers had used “algorithms” to search its contents, and
returned the phone. D. 7 ¶ 84.
11
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 12 of 52
4.
Dupin
Dupin, a journalist, citizen of Haiti and legal permanent resident of the U.S. living in
Massachusetts, was subject to two device searches in December 2016. D. 7 ¶¶ 17, 86-97. In the
first, Dupin connected in Miami, Florida, en route from Port-au-Prince, Haiti to Montreal, Quebec,
where he was visiting his daughter to take her by bus to New York City. D. 7 ¶ 86. A CBP officer
escorted Dupin to a secondary inspection area in Miami, where he waited for over two hours before
being escorted to a smaller room for questioning “about his work as a journalist, including the
names of the organizations and specific individuals within those organizations for whom he had
worked” by three CBP officers. D. 7 ¶ 87. During questioning, officers seized Dupin’s locked
smartphone and ordered him to provide a password, which he did. D. 7 ¶ 88. An officer searched
Dupin’s phone for “about two hours” during which, at certain points, the officer took Dupin’s
phone “into another room,” returning “periodically to ask Mr. Dupin questions about the contents
of the phone.” D. 7 ¶ 90. The officers then returned the phone and permitted him to leave. D. 7
¶ 91.
The next day, December 23, 2016, Dupin and his seven-year-old daughter traveled by bus
from Montreal to New York. D. 7 ¶ 92. At the customs checkpoint “near midnight,” a CBP officer
directed them to a secondary inspection area, where officers asked “some of the same questions
officers had asked in Miami” as his daughter was “[a]sleep in his lap.” D. 7 ¶¶ 93, 95(d). The
officers seized his phone, obtained his password, and took the “phone into another room for about
four hours,” again returning periodically with specific questions about the phone’s contents. D. 7
¶¶ 94, 96. “After approximately seven hours of detention,” on the morning of December 24, 2016,
officers returned the phone to Dupin and told him that he and his daughter could leave. D. 7 ¶ 97.
12
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 13 of 52
5.
Gach
Gach, an artist and U.S. citizen who lives in California, had his locked smartphone searched
on arrival in San Francisco from Belgium, “where he had participated in an art exhibition
displaying works that could be considered critical of the government.” D. 7 ¶ 18, 98-104. He was
questioned “about his work as an artist and the exhibition in Belgium” in a secondary inspection
area, and, when asked for his phone, told the officers that he did not want the officers to search it.
D. 7 ¶ 99. After “[t]he officers told [him]that his phone would be held for an indeterminate amount
of time if he did not disclose his password,” Gach entered his password and handed the officers
his unlocked phone. D. 7 ¶ 100. The officers searched Gach’s phone “behind a dividing wall for
approximately 10 minutes” and then returned the phone to him and permitted him to leave. D. 7
¶¶ 102-04.
6.
Kushkush
Kushkush—a U.S. citizen and freelance journalist from Virginia—had his devices
searched on three occasions between January 2016 and July 2017. D. 7 ¶¶ 19, 105-19. First, in
New York, Kushkush, while returning from conducting research for a master’s thesis in
Stockholm, Sweden, was questioned by CBP officers, who also seized his locked laptop and two
unlocked cell phones. D. 7 ¶¶ 105-07. They searched the devices out of his sight for around
twenty minutes before returning them to him. D. 7 ¶ 107.
In January 2017, Kushkush flew to Washington, D.C. from Israel, where he had completed
an internship with the Associated Press, carrying a “locked smartphone that he used for both
professional and personal matters,” the same locked laptop and unlocked devices including a
digital camera, voice recorder and flash drives. D. 7 ¶ 108. In a secondary inspection area, CBP
officers questioned him “about his reporting activities,” asked for his social media identifiers and
email address, and instructed Kushkush to unlock his phone. D. 7 ¶¶ 109-10. Kushkush
13
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 14 of 52
“reluctantly complied” and observed the officer manually search the phone. D. 7 ¶¶ 110-12.
Officers took the other devices “into another room for approximately 20 minutes.” D. 7 ¶ 112.
The officers returned the devices and he was permitted to leave. D. 7 ¶ 113.
In July 2017, Kushkush returned to the U.S. on a bus from Montreal with fellow students
in a language program, and at the border, he was directed to secondary inspection. D. 7 ¶¶ 11415. Kushkush unlocked his phone for the CBP officer, “stat[ing] that he was doing so against his
will,” and the officer wrote down Kushkush’s password and took the phone out of Kushkush’s
sight “for at least one hour.” D. 7 ¶¶ 115-17. Officers also questioned Kushkush “about his work
as a journalist.” D. 7 ¶ 118. After “approximately three and a half hours,” CBP officers returned
the phone and permitted Kushkush to leave. D. 7 ¶ 119.
7.
Maye
Maye, a U.S. citizen from Florida, assistant professor of homeland security at EmbryRiddle Aeronautical University and former U.S. Air Force captain, flew from vacation in Oslo,
Norway, to Miami with a locked laptop and smartphone. D. 7 ¶¶ 20, 120. In a secondary
inspection area with two CBP officers, Maye unlocked her devices after being ordered to do so.
D. 7 ¶¶ 121-22. Maye observed an officer manually search her unlocked laptop. D. 7 ¶ 123. An
officer also “seized” her “unlocked phone for approximately two hours.” D. 7 ¶ 124.
8.
Merchant
Merchant is a U.S. citizen, founder and editor of a media organization that publishes online
news content and a graduate student in international security and journalism at Harvard University.
D. 7 ¶¶ 21, 125. In March 2017, after visiting her uncle in Toronto, Ontario, Merchant was directed
to a secondary inspection area at a U.S. customs preclearance station in the Toronto airport prior
to her flight home to Orlando. D. 7 ¶¶ 126-27. After CBP officers asked for Merchant’s
smartphone, Merchant—who “wears a headscarf in public in accordance with her religious beliefs”
14
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 15 of 52
and whose phone contains photos of her without her headscarf—told CBP officers she would give
them the phone but not unlock it. D. 7 ¶ 129. CBP officers repeatedly told her she “could choose
to unlock the phone, or have it seized indefinitely.” D. 7 ¶ 129-30. Merchant told the officers she
was traveling alone and needed the phone to communicate and for her work. D. 7 ¶ 130. “In tears,
Ms. Merchant unlocked her phone” and “provided the password to unlock her laptop.” D. 7 ¶ 131.
CBP officers searched Merchant’s laptop and phone out of her sight for approximately one and a
half hours. D. 7 ¶ 135. Officers questioned her about her religious affiliation and certain of her
blog posts. D. 7 ¶ 133. “When the CBP officers returned the phone to Ms. Merchant and she
unlocked it, the Facebook application was open to the ‘friends’ page. It had not been open to that
page when she had given up the phone.” D. 7 ¶ 135.
9.
Shibly
Shibly, a U.S. citizen and filmmaker from Buffalo, New York, had his devices searched on
two occasions in January 2017. D. 7 ¶¶ 22, 136-46. First, returning home by car from Canada,
Shibly was directed to a secondary inspection area at the border in New York, and told to “fill out
a form with information that included . . . his phone’s password.” D. 7 ¶¶ 136-37. An officer then
“ordered” him to provide the password, saying that “if he had nothing to hide, then he should
unlock his phone,” and Shibly “disengaged” the lock on the phone. D. 7 ¶¶ 137-38. Shibly also
provided CBP officers with his social media identifiers. D. 7 ¶ 141. Shibly’s phone was taken out
of his sight for an hour before it was returned and he was permitted to leave. D. 7 ¶¶ 140, 142.
Three days later, Shibly was stopped on the same bridge and directed to a secondary inspection
area. D. 7 ¶¶ 143-44. When he declined to hand over his phone, “[t]hree CBP officers . . . used
physical force to seize his phone.” D. 7 ¶ 145. An officer took the phone—which was still
unlocked from the first search—to a different room. D. 7 ¶¶ 143, 146.
15
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 16 of 52
10.
Wright
Wright, a computer programmer from Colorado, was brought to an inspection area in the
Denver airport after returning home from a trip in Southeast Asia. D. 7 ¶¶ 23, 147-48. A CBP
officer ordered Wright to unlock his laptop and when Wright declined, CBP officers confiscated
the laptop as well as his locked phone and his camera. D. 7 ¶ 148. According to CBP documents
disclosed to Wright in a Freedom of Information Act and Privacy Act (“FOIA”) request, CBP
confiscated Wright’s devices pursuant to instructions from ICE’s Homeland Security
Investigations (“HSI”) division, which sought “further forensic review.” D. 7 ¶ 149. These records
demonstrate that HSI “attempted to image” Wright’s laptop and a CBP forensic scientist extracted
data from Wright’s phone and camera, which he stored on three thumb drives he sent to other CBP
officers. D. 7 ¶ 152. Wright received his devices fifty-six days later. D. 7 ¶ 154. CBP
documentation from Wright’s FOIA request does not reflect destruction of the information
extracted from Wright’s devices. D. 7 ¶ 155c.
IV.
Procedural History
Plaintiffs instituted this action on September 13, 2017. D. 1; D. 7. Defendants now move
to dismiss. D. 14. On April 23, 2018, the Court heard the parties on the pending motion and took
the matter under advisement. D. 33.
V.
Discussion
Defendants argue that Plaintiffs do not have standing to bring this suit, and that even if
they do, they have failed to state a claim on the merits. D. 14. The Court addresses standing as a
threshold inquiry because “[i]f a party lacks standing to bring a matter before the court, the court
lacks jurisdiction to decide the merits of the underlying case.” United States v. AVX Corp., 962
F.2d 108, 113 (1st Cir. 1992).
16
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 17 of 52
A.
Standing
“Standing to sue is a doctrine rooted in the traditional understanding of a case or
controversy” within Article III of the U.S. Constitution, Spokeo, Inc. v. Robins, ___ U.S. ___, 136
S. Ct. 1540, 1547 (2016), and serves to “identify those disputes which are appropriately resolved
through the judicial process,” Whitmore v. Arkansas, 495 U.S. 149, 155 (1990). “The law of
Article III standing, which is built on separation of powers principles, serves to prevent the judicial
process from being used to usurp the powers of the political branches.” Clapper v. Amnesty Int’l
USA, 568 U.S. 398, 408 (2013). To establish Article III standing, Plaintiffs must demonstrate that
they “(1) suffered an injury in fact, (2) that is fairly traceable to the challenged conduct of the
defendant, and (3) that is likely to be redressed by a favorable judicial decision.” Spokeo, 136 S.
Ct. at 1547; see Lujan v. Defs. of Wildlife, 504 U.S. 555, 560-61 (1992). Plaintiffs bear the burden
of establishing standing, but “the same pleading standards apply both to standing determinations
and Rule 12(b)(6) determinations.” Hochendoner v. Genzyme Corp., 823 F.3d 724, 734 (1st Cir.
2016); see Lujan, 504 U.S. at 561; Reddy v. Foster, 845 F.3d 493, 497 (1st Cir. 2017).
“The ‘[f]irst and foremost’ concern in standing analysis is the requirement that the plaintiff
establish an injury in fact . . . .” Reddy, 845 F.3d at 500 (quoting Spokeo, 136 S. Ct. at 1547)
(alteration in original). To do so, “a plaintiff must show that he or she suffered ‘an invasion of a
legally protected interest’ that is ‘concrete and particularized’ and ‘actual or imminent, not
conjectural or hypothetical.’” Spokeo, 136 S. Ct. at 1548 (quoting Lujan, 504 U.S. at 560). “[T]he
imminence concept, while admittedly far reaching, is bounded by its Article III purpose: ‘to ensure
that the alleged injury is not too speculative.’” Berner v. Delahanty, 129 F.3d 20, 24 (1st Cir.
1997) (quoting Lujan, 504 U.S. at 564 n.2). Where, as here, Plaintiffs seek injunctive relief, they
must plausibly allege that “the threatened injury is ‘certainly impending’ or there is a ‘substantial
17
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 18 of 52
risk that the harm will occur.’” Susan B. Anthony List v. Driehaus (“SBA List”), ___ U.S. ___,
134 S. Ct. 2334, 2341 (2014) (quoting Clapper, 568 U.S. at 414, 414 n.5); see Reddy, 845 F.3d at
500. Because we are “[a]t the pleading stage, general factual allegations of injury resulting from
the defendant[s’] conduct may suffice.” Lujan, 504 U.S. at 561; see Hochendoner, 823 F.3d at
731.
“[S]tanding is not dispensed in gross . . . .” Lewis v. Casey, 518 U.S. 343, 358 n.6 (1996).
Rather, the standing inquiry is a “plaintiff-by-plaintiff and claim-by-claim analysis.”
Hochendoner, 823 F.3d at 733. The Court must, therefore, determine “whether each particular
plaintiff is entitled to have a federal court adjudicate each particular claim that he asserts.” Id.
(quoting Pagán v. Calderón, 448 F.3d 16, 26 (1st Cir. 2006)). Defendants argue that Plaintiffs do
not have standing to seek declaratory or injunctive relief for any alleged Fourth or First
Amendment violations and that they also lack standing to seek expungement.4 D. 15 at 15-22.
The Court addresses each claim in turn.
1.
Standing to Seek Injunctive or Declaratory Relief
Plaintiffs allege that they “face a likelihood of future injury caused by the challenged
policies and practices . . . related to searching and seizing electronic devices at the border.” D. 7
¶ 156. Although each Plaintiff has individual reasons for doing so, “[a]ll Plaintiffs have traveled
across the U.S. border with their electronic devices multiple times” and “will continue to do so in
the future.” Id. At the border, “they will be subject to CBP’s and ICE’s policies and practices . .
. . namely, search or seizure of their devices absent a warrant, probable cause or reasonable
4
Defendants also argue that allegations of potentially chilled speech fail to establish standing,
D. 15 at 21-22, but Plaintiffs respond that they do not rely upon “the chill of their First Amendment
rights” as their alleged injury to support standing here, D. 19 at 16 n.3. The Court will not,
therefore, address that theory further.
18
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 19 of 52
suspicion,” and Plaintiffs cannot avoid this harm without “forego[ing] international travel or []
travel[ing] without any electronic devices, which would cause great hardship.” Id. On this basis,
Plaintiffs seek to enjoin Defendants from “searching electronic devices absent a warrant supported
by probable cause that the devices contain” evidence of illegal activity and from “confiscating
travelers’ electronic devices, to effectuate searches of those devices after travelers leave the border,
absent probable cause.” D. 7 at 41-42.
Defendants argue that Plaintiffs’ allegations fail to allege plausibly any “certainly
impending” injury, Clapper, 568 U.S. at 414. D. 15 at 17. As the First Circuit explained recently,
however, the Supreme Court in SBA List—which “both postdated and cited Clapper”—
established a “disjunctive framing of the test: injury is imminent if it is certainly impending or if
there is a substantial risk that harm will occur.” Reddy, 845 F.3d at 500 (emphasis in original).
Thus, even if Plaintiffs do not allege an injury that is “certainly impending,” they may still establish
standing by plausibly alleging a substantial risk that harm will occur. See id.; SBA List, 134 S.
Ct. at 2341.
Defendants contend that Plaintiffs have also failed to satisfy the “substantial risk” inquiry.
D. 15 at 17-19. Plaintiffs allege that CBP data demonstrates that it is on track to conduct
approximately 30,000 searches this fiscal year. D. 7 ¶ 38. Defendants point out, however, that
those searches only amounted to 0.008% of the approximately 189.6 million travelers who arrived
at U.S. borders during this period. D. 15 at 17-18. Defendants argue that this future search
probability—which they characterize as a “slight chance” of search—is not sufficient to establish
standing here. D. 15 at 18.
There is no numerical threshold, however, at which likelihood of harm becomes a
“substantial risk” of harm. See Kerin v. Titeflex Corp., 770 F.3d 978, 983 (1st Cir. 2014) (noting
19
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 20 of 52
that “a small probability of a great harm may be sufficient”). Although 0.008% may be a small
percentage of total travelers, the searches still occur at an average of approximately 2500 searches
per month. D. 7 ¶ 38. In SBA List, the Supreme Court supported its conclusion that there was a
substantial likelihood of future harm with the explanation that proceedings enforcing the statute in
question were “not a rare occurrence,” with twenty to eighty such cases occurring per year. SBA
List, 134 S. Ct. at 2345. Against this backdrop, 30,000 searches per year is not a “rare occurrence,”
even if it makes up a small percentage of total travelers. Moreover, “[e]ven a small probability of
injury is sufficient to create a case or controversy—to take a suit out of the category of
hypothetical—provided of course that the relief sought would, if granted, reduce the probability.”
Massachusetts v. EPA, 549 U.S. 497, 525 n.23 (2007) (quoting Village of Elk Grove Village v.
Evans, 997 F.2d 328, 329 (7th Cir. 1993)); see NRDC v. EPA, 464 F.3d 1, 7 (D.C. Cir. 2006)
(holding 1 in 200,000 odds of developing skin cancer sufficient to support standing). Additionally,
as the Court explains below, that four Plaintiffs here have been subjected to multiple searches, D.
7 ¶¶ 62-76, 86-97, 105-19, 136-46, suggests that the risk of future search is higher for these
plaintiffs than the general population.
Defendants also argue that Plaintiffs’ allegations of future harm are impermissibly “vague”
and speculative. D. 15 at 17-18. They point to Reddy for the proposition that in the First Circuit,
“‘[s]peculation’ that a government actor ‘might in the future take some other and additional action
detrimental to’ Plaintiffs, is ‘not an adequate substitute for a claim of specific present objective
harm or a threat of specific future harm.’” D. 15 at 18 (quoting Reddy, 845 F.3d at 503). In Reddy,
however, the First Circuit held that the plaintiffs’ assertions of standing were speculative as to a
New Hampshire buffer zone statute, emphasizing that the statute had not yet been enforced.
Reddy, 845 F.3d at 496, 503. Here, by contrast, Plaintiffs challenge policies that are in place and
20
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 21 of 52
are being actively enforced. D. 7 ¶¶ 37-38; see SBA List, 134 S. Ct. at 2346 (finding standing to
enjoin enforcement of state statute that had been enforced for decades); Dudley v. Hannaford Bros.
Co., 333 F.3d 299, 306 (1st Cir. 2003) (explaining that a “real and immediate threat” of injury may
be demonstrated through an “offending policy [that] remains firmly in place”). Plaintiffs’ alleged
future injury does not depend upon defendants’ future illegal conduct untethered to a pattern of
past practice, cf. Los Angeles v. Lyons, 461 U.S. 95, 102 (1983) (concluding that plaintiff subject
to illegal arrest procedure made no showing that he was likely to be arrested and subjected to
illegal procedure again), but rather upon recurring conduct authorized by official policies.
That is, Plaintiffs’ subjection to prior searches further bolsters their allegations of likely
future searches. Although “[p]ast exposure to illegal conduct does not in itself show a present case
or controversy regarding injunctive relief,” Lujan, 504 U.S. at 564 (quoting Lyons, 461 U.S. at
102), “[p]ast wrongs [a]re evidence bearing on ‘whether there is a real and immediate threat of
repeated injury,” Lyons, 461 U.S. at 102 (quoting O’Shea v. Littleton, 414 U.S. 488, 496 (1974)).
See, e.g., Morales v. Chadbourne, 996 F. Supp. 2d 19, 37-38 (D.R.I. 2014) (finding standing for
American citizen who had been inappropriately detained by ICE twice and warned that it could
happen again); Thomas v. Cty. of L.A., 978 F.2d 504, 507 (9th Cir. 1992) (explaining that the
“possibility of recurring injury ceases to be speculative when actual repeated incidents are
documented” (quoting Nicacio v. U.S. INS, 797 F.2d 700, 702 (9th Cir. 1985))); cf. Penobscot
Nation v. Mills, 861 F.3d 324, 336-37 (1st Cir. 2017) (denying standing at summary judgment
where there was no evidence of prior enforcement of the policy in question against the plaintiffs).
Here, all Plaintiffs have been subjected to electronics searches at the border and four Plaintiffs
have been subjected to multiple device searches. D. 7 ¶¶ 2, 62-155. Plaintiffs’ theory of standing,
therefore, is sufficiently concrete to plausibly allege injury-in-fact.
21
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 22 of 52
Plaintiffs’ allegations of future harm are no less concrete because they omit specific plans
or dates of future travel. Defendants argue that without such details, Plaintiffs have merely
expressed “some day” intentions to travel, which are not enough to establish actual or imminent
injury. D. 15 at 19 (quoting Lujan, 504 U.S. at 564). In Lujan, the two individuals in question
stated in affidavits that they intended to return to the habitats in question sometime “in the future,”
which was insufficient to establish “at the summary judgment stage, a factual showing of
perceptible harm.” Lujan, 504 U.S. at 563-64, 566. As a result, with plaintiffs “alleg[ing] only an
injury at some indefinite future time,” the Court held that the “imminence” requirement for future
injury had “been stretched beyond the breaking point.” Id. at 564 n.2. As Justice Kennedy
explained in his concurring opinion, the requirement for travel specifics was warranted in that case
because it was “not a case where it [wa]s reasonable to assume that the affiants will be using the
sites on a regular basis . . . nor d[id] the affiants claim to have visited the sites since the projects
commenced.” Id. at 579 (Kennedy, J., concurring) (citation omitted). Plaintiffs argue that their
allegations sufficiently demonstrate a “realistic risk of future exposure to [the] challenged policy,”
Berner, 129 F.3d at 24, through their allegations that they regularly travel outside the U.S. for
work, visiting friends and family, vacation and tourism, D. 19 at 19-20; e.g., D. 7 ¶¶ 2, 62, 73, 77,
81, 86, 105, 114, 126, 143, and will continue to do so in the future, D. 7 ¶ 156.
This case is distinct from Lujan on several bases. First, this case is only at the motion to
dismiss phase, unlike the summary judgment stage in Lujan, 504 U.S. at 561, 566. Second,
exposure to CBP and ICE policy does not require travel to a specific destination, but rather only
requires some international travel and return to the U.S.; it is reasonable to infer from the
allegations in the complaint that these Plaintiffs will engage in international travel again in the
future, cf. id. at 579 (Kennedy, J., concurring), particularly as Plaintiffs allege prior travel abroad
22
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 23 of 52
and professional backgrounds that might warrant future travel. See Lyons, 461 U.S. at 102
(looking to plaintiffs’ prior actions to determine likelihood of future injury); Lujan, 504 U.S. at
592 (Blackmun, J., dissenting). Given this case’s posture, the breadth of activity that would
compel exposure to the policies at issue and Plaintiffs’ allegations of prior travel and professional
activity, Plaintiffs’ allegations in this context are sufficient to allege actual or imminent injury.
Finally, Defendants argue that Plaintiffs have failed to establish standing because their risk
of injury is no greater than that of the general public, rendering their alleged harm a generalized
grievance inappropriate for adjudication. D. 15 at 19. “[A] plaintiff raising only a generally
available grievance about government—claiming only harm to his and every citizen’s interest in
proper application of the Constitution and laws, and seeking relief that no more directly and
tangibly benefits him than it does the public at large—does not state an Article III case or
controversy.” Lujan, 504 U.S. at 573-74. Defendants focus solely upon whether Plaintiffs’ “future
risk of a device search” is greater than that of the general public, D. 15 at 19, but simply that a
harm may be “widely shared” does not eliminate a plaintiff’s standing to sue. Massachusetts, 549
U.S. at 522. Rather, plaintiffs lack standing under the generalized grievance rule when the alleged
injury is “not only widely shared, but is also of an abstract and indefinite nature.” FEC v. Akins,
524 U.S. 11, 23 (1998). Plaintiffs may plausibly allege standing regardless of “how many persons
have been injured by the challenged action” if they plausibly allege that their individual rights have
been or will be infringed in some “concrete and personal way.” Massachusetts, 549 U.S. at 517,
(quoting Lujan, 504 U.S. at 581 (Kennedy, J., concurring)); see Akins, 524 U.S. at 24; Public
Citizen v. U.S. Dep’t of Justice, 491 U.S. 440, 449-50 (1989) (explaining that “[t]he fact that other
citizens or groups of citizens might make the same complaint . . . does not lessen appellants’
23
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 24 of 52
asserted injury”). As the Court has explained, Plaintiffs have plausibly alleged a concrete, personal
injury in the form of violation of their individual rights.
Plaintiffs also argue that their risk of search is higher than that of the general public because
they have been searched before. D. 19 at 20-21. This argument is supported by the multiple
searches of four Plaintiffs, despite the aforementioned low probability of subjection of the general
public to a border search. Plaintiffs argue that Defendants’ policies “alert officers to the past
searches and confiscations, which may increase the likelihood of repeated searches.” D. 19 at 20
(citing Tabbaa v. Chertoff, No. 05-cv-582S, 2005 U.S. Dist. LEXIS 38189, 2005 WL 3531828, at
*9 (W.D.N.Y. Dec. 22, 2005), aff’d, 509 F.3d 89 (2d Cir. 2007)), a contention that may be borne
out by discovery.
For all of these reasons, the Court DENIES Defendants’ motion to dismiss on the basis that
Plaintiffs lack standing, as Plaintiffs have plausibly alleged that they face a substantial risk of
future harm from Defendants’ ongoing enforcement of their border electronics search policies.
2.
Standing to Seek Expungement
Plaintiffs also seek expungement of all data or information “gathered from, or copies made
of, the contents of Plaintiffs’ electronic devices, and all of Plaintiffs’ social media information and
device passwords.” D. 7 at 42. Retention of data illegally obtained by law enforcement may
constitute continued harm sufficient to establish standing to seek expungement. See Tabbaa, 509
F.3d at 96 n.2 (stating that defendants there “properly do not contest that plaintiffs possess Article
III standing based upon their demand for expungement” of data collected during border searches);
Hedgepath v. Wash. Metro. Area Transit Auth., 386 F.3d 1148, 1152 (D.C. Cir. 2004) (holding
plaintiff had standing to seek expungement of arrest record). Defendants challenge Plaintiffs’
standing to seek expungement here. D. 15 at 20-21.
24
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 25 of 52
Defendants argue that, as a factual matter, standing to seek expungement has only been
alleged as to one Plaintiff, Wright, whose information was allegedly extracted and not destroyed
by CBP, as demonstrated through documents he obtained through a FOIA request. D. 15 at 20.
Although Defendants correctly point out that “[n]either conclusory assertions nor unfounded
speculation can supply the necessary heft” to establish standing, D. 15 at 20 (quoting Hochendoner,
823 F.3d at 731), Plaintiffs need not produce FOIA documentation to allege plausibly that
information contained on their devices has been retained by CBP or ICE, especially given—as
explained above—that this is the motion to dismiss stage of litigation.5 Three other Plaintiffs—
the Alasaads and Allababidi—also allege searches involving retention of their electronic devices
for at least two weeks. D. 7 ¶¶ 70-72, 79-80. Six of the remaining seven Plaintiffs allege that
during their “basic” or manual device searches, their devices were searched outside of their
presence for a period of time between ten minutes and four hours.6 D. 7 ¶¶ 84, 90, 96, 102, 107,
112, 117, 135, 140, 146. Given that both ICE and CBP policies in place at the time authorized
conducting advanced searches of electronic devices without any individualized suspicion, D. 7 ¶
58, it is plausible to infer from these facts that advanced searches may have occurred during this
time, see D. 7 ¶ 84 (alleging that agents stated they used “algorithms” to search Bikkannavar’s
phone outside of his presence). These policies, including the 2018 CBP Policy, also sanction
5
Defendants’ argument that the amended complaint only alleges that “CBP retained the
information it extracted from Mr. Wright’s devices,” D. 7 ¶ 155, omitting any allegations of the
same for other Plaintiffs, ignores other allegations in the pleading. D. 32 at 4 n.2. Plaintiffs
explicitly allege that “[o]n information and belief, Plaintiffs are suffering the ongoing harm of CBP
and ICE retaining (a) content copied from their devices or records reflecting content observed
during searches of their devices, (b) content copied from their cloud-based accounts accessed
through their devices or records reflecting” such content, “(c) their social media identifiers, and/or
(d) their device passwords.” D. 7 ¶ 157. Plaintiffs have not, therefore, failed to allege that
information was retained by Defendants.
6
Maye alleges that an officer “seized” her unlocked phone “for approximately two hours,” but the
complaint does not allege that such seizure removed her phone from her presence. See D. 7 ¶ 124.
25
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 26 of 52
creating copies of data contained on the devices during—or to be used for—advanced searches,
ICE Pol. ¶ 8.1.4; D. 18-1 ¶¶ 5.1.4, 5.4.1, or to retain the assistance of other agencies and third
parties, ICE Pol. ¶ 8.4.4; D. 18-1 ¶¶ 5.4.2.1-2. It is plausible, therefore, to infer that data or
information from the devices may have been copied or otherwise documented during these
searches.
Defendants also argue that Plaintiffs do not have standing to seek expungement because
expungement would not redress Plaintiffs’ alleged injury. D. 15 at 20-21. Redressability, the third
standing requirement, see Spokeo, 136 S. Ct. at 1547, requires that Plaintiffs demonstrate “a
likelihood that prevailing in the action will afford some redress for the injury.” City of Bangor v.
Citizens Commc’ns Co., 532 F.3d 70, 92 (1st Cir. 2008) (quoting Me. People’s All. V.
Mallinckrodt, Inc., 471 F.3d 277, 283 (1st Cir. 2006)).
Plaintiffs’ burden to demonstrate
redressability, as with injury, is “relatively modest” at the motion to dismiss stage. Bennett v.
Spear, 520 U.S. 154, 171 (1997). Plaintiffs’ injury “is redressable if the relief sought can
compensate the plaintiff for his losses or ‘eliminate any effects’ caused by a defendant’s challenged
conduct.” Janfeshan v. U.S. Customs & Border Prot., No. 16-cv-6915, 2017 U.S. Dist. LEXIS
151058, 2017 WL 3972461, at *6 (E.D.N.Y. Aug. 21, 2017) (quoting Steel Co. v. Citizens for a
Better Env’t, 523 U.S. 83, 106 (1998)).
Plaintiffs have plausibly demonstrated that expungement of their data would afford some
redress for their alleged injury here.
Plaintiffs argue that retention of their information
“compounds the violations of [their] Fourth Amendment rights, because Defendants remain free
to use and exploit it or share it with other agencies that may do the same.” D. 19 at 24; see Tabbaa,
509 F.3d at 96 n.2; Hedgepath, 386 F.3d at 1152. Defendants argue that expungement “would not
likely result from a favorable resolution of [Plaintiffs’] claims” because “[t]he government’s use
26
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 27 of 52
of ‘evidence obtained in violation of the Fourth Amendment does not itself violate the
Constitution.’” D. 15 at 20 (quoting Pa. Bd. of Prob. & Parole v. Scott, 524 U.S. 357, 362 (1998)).
First, however, Defendants’ argument does not go to redressability, but rather to the merits of the
constitutional claim and remedy sought. Defendants do not argue that expungement would
insufficiently redress Plaintiffs’ alleged injury—continued violation of the Fourth Amendment
through retention of Plaintiffs’ data—but rather suggest that retention of Plaintiffs’ data is not itself
a violation of the Fourth Amendment. D. 15 at 20-21. Indeed, to the extent Plaintiffs’ information
was copied or obtained, subsequently retained and not destroyed by CBP or ICE, the destruction
of these copies or data could redress such injury. See Janfeshan, 2017 WL 3972461, at *7.
Second, where allegations of redressability are stated plausibly, foreclosure of this remedy
to Plaintiffs at this early juncture is not warranted. Expungement is a remedy that falls within the
Court’s equitable discretion. See United States v. Coloian, 480 F.3d 47, 50 (1st Cir. 2007); Reyes
v. Supervisor of DEA, 834 F.2d 1093, 1098 (1st Cir. 1984); Chastain v. Kelley, 510 F.2d 1232,
1235 (D.C. Cir. 1975) (stating that “federal courts are empowered to order the expungement of
Government records where necessary to vindicate rights secured by the Constitution or by
statute”). The availability of the remedy, therefore, depends upon the scope of the Defendants’
ultimate liability here. See Janfeshan, 2017 WL 3972461, at *13 (declining to dismiss the
plaintiff’s “‘claims’ for CBP’s expungement of certain records” before determining the scope of
the defendants’ liability); Hassan v. City of N.Y., 804 F.3d 277, 293-94 (3d Cir. 2015) (explaining
that “the potential avenues for redress depend on how a particular plaintiff’s injury shows itself”
and may fall within a “range of available remedies”).
The Court thus DENIES Defendants’ motion to dismiss on the basis that Plaintiffs lack
standing to seek expungement.
27
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 28 of 52
B.
Plaintiffs’ Fourth Amendment Claims
The Fourth Amendment establishes that “[t]he right of the people to be secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the persons or things to be seized.” U.S.
Const. amend. IV. The Fourth Amendment ensures that “the usual inferences which reasonable
men draw from evidence . . . . be drawn by a neutral and detached magistrate instead of being
judged by the officer engaged in the often competitive enterprise of ferreting out crime.” Johnson
v. United States, 333 U.S. 10, 14 (1948). “The amendment grew out of American colonial
opposition to British search and seizure practices, most notably the use of writs of assistance,
which gave customs officials broad latitude to search houses, shops, cellars, warehouses, and other
places for smuggled goods.” United States v. Wurie, 728 F.3d 1, 3 (2013), aff’d sub. nom., Riley
v. California, ___ U.S. ___, 134 S. Ct. 2473 (2014).
“[T]he ultimate touchstone of the Fourth Amendment is reasonableness,” Riley, 134 S. Ct.
at 2482 (quoting Brigham City v. Stuart, 547 U.S. 398, 403 (2006)), and “reasonableness generally
requires the obtaining of a judicial warrant,” id. (quoting Vernonia School Dist. 47J v. Acton, 515
U.S. 646, 653 (1995)).
“[A] warrantless search is per se unreasonable under the Fourth
Amendment, unless one of ‘a few specifically established and well-delineated exceptions’
applies.” Wurie, 728 F.3d at 3 (quoting Arizona v. Gant, 556 U.S. 332, 338 (2009)). The border
search exception, “grounded in the recognized right of the sovereign to control, subject to
substantive limitations imposed by the Constitution, who and what may enter the country,” is one
such exception. United States v. Ramsey, 431 U.S. 606, 620 (1977).
Although, as an exception to the warrant requirement, border searches “have been
considered to be ‘reasonable’ by the single fact that the person or item in question had entered into
28
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 29 of 52
our country from outside,” id. at 619, the exception is not limitless. Border searches must still be
“reasonable,” and the Court must still—as with searches conducted in the interior—balance “the
sovereign’s interests” with the privacy interests of the individual. United States v. Montoya de
Hernandez, 473 U.S. 531, 539 (1985). Notably, however, the balance of interests is different at
the border: the state has “a paramount interest in protecting[] its territorial integrity,” and an
individual’s “expectation of privacy is less at the border than it is in the interior.” United States v.
Flores-Montano, 541 U.S. 149, 153-54 (2004). That is, CBP and ICE argue that the ‘border is
different’ from any other search context and there is no Fourth Amendment impediment to their
policies.
By contrast, Plaintiffs argue that ‘digital is different.’ See D. 25 at 8.7 They contend that
the border searches at issue here run afoul of the Fourth Amendment due to the unique
characteristics of electronic devices. D. 19 at 25-37. As to the border searches themselves,
Plaintiffs argue that there is no meaningful distinction between basic and advanced (or manual and
forensic) searches articulated in the CBP and ICE policies. D. 19 at 35. In light of the “the great
volume and detail of personal information that electronic devices contain,” even manual searches,
they allege, are “extraordinarily invasive.” D. 7 ¶ 41.
See D. 7 ¶¶ 27-36. Plaintiffs allege (1)
that the warrantless searches of travelers’ electronic devices conducted at the border or
international ports of entry, pursuant to the CBP and ICE policies, violate the Fourth Amendment,
and (2) that the confiscation of devices absent probable cause violates the Fourth Amendment. D.
7 ¶¶ 169, 173. The Court begins by focusing on Plaintiffs’ first Fourth Amendment claim, which
7
An amicus brief filed by the Brennan Center for Justice, the Center for Democracy & Technology,
the R Street Institute and TechFreedom details the extent to which digital devices differ from
containers at issue in prior border search cases given that they “contain great quantities of
extremely sensitive information.” D. 25 at 7.
29
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 30 of 52
applies to all Plaintiffs (Count I), and then addressing Plaintiffs’ confiscation claim which applies
to certain of the Plaintiffs (Count III).
Six years ago, this Court was unpersuaded by the argument that, under Fourth Amendment
jurisprudence, unique characteristics of cell phones and other electronic devices justified requiring
a heightened level of suspicion for searches conducted at the border. House v. Napolitano, No.
11-10852-DJC, 2012 U.S. Dist. LEXIS 42297, 2012 WL 1038816, at *8 (D. Mass. Mar. 28, 2012).
In House, similar to Plaintiffs here, House challenged the constitutionality of officers’ search of
his laptop and other electronic devices at the border under the Fourth Amendment, arguing that
the search was “highly intrusive given the personal nature and quality of information stored on
these devices.” Id. at *6. The Court explained that in the Fourth Amendment context, “[i]t is the
level of intrusiveness of the search that determines whether the search is routine, not the nature of
the device or container to be searched.” Id. at *8 (citing United States v. Giberson, 527 F.3d 882,
888 (9th Cir. 2008)). The Court rejected House’s argument, explaining that a laptop and other
electronic devices are “akin to the search of a suitcase and other closed containers,” which “require
no particularized suspicion,” id. at *7, but declined to dismiss House’s Fourth Amendment claim
because the prolonged detention of his electronic devices for forty-nine days was not “reasonably
related in scope to the circumstances which justified it initially.” Id. at *9 (quoting United States
v. Cotterman, 637 F.3d 1068, 1082 (9th Cir. 2011), rev’d en banc, 709 F.3d 952 (9th Cir. 2013)).
Two years after this Court’s ruling in House, as Plaintiffs point out, D. 19 at 25-31, the
Supreme Court issued Riley, in which the Court held that the search-incident-to-arrest exception
does not extend to cell phones, but rather the Fourth Amendment requires police to obtain a warrant
supported by probable cause to search a phone seized during an arrest. Riley, 134 S. Ct. at 2494-
30
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 31 of 52
95. Moreover, the Supreme Court in Riley affirmed the First Circuit’s ruling in Wurie, 728 F.3d
at 13, which also came after this Court’s ruling in House.
1.
Riley, Wurie and the Search Incident to Arrest Exception
In Riley, the Supreme Court addressed the applicability of the search incident to arrest
exception to cell phones and established a categorical rule requiring that officers obtain search
warrants prior to searching cell phones. Riley, 134 S. Ct. at 2485. Justice Roberts, writing for a
unanimous Court,8 explained that “[a]bsent more precise guidance from the founding era, we
generally determine whether to exempt a given type of search from the warrant requirement ‘by
assessing, on the one hand, the degree to which it intrudes upon an individual’s privacy and, on
the other, the degree to which it is needed for the promotion of legitimate government interests.’”
Riley, 134 S. Ct. at 2484 (quoting Wyoming v. Houghton, 526 U.S. 295, 300 (1999)). The Court
explained that the balancing of interests did not support extending the exception “to modern cell
phones, which are now such a pervasive and insistent part of daily life that the proverbial visitor
from Mars might conclude they were an important feature of human anatomy.” Id.
The Court analyzed the rationales behind the search incident to arrest exception to
determine whether application of the doctrine to “this particular category of effects would ‘untether
the rule from the justifications underlying’” the exception. Id. at 2485 (quoting Gant, 556 U.S. at
343). Although the search incident to arrest exception has been described as “always recognized
under English and American law,” Weeks v. United States, 232 U.S. 383, 392 (1914), it was not
until 1969, in Chimel v. California, that the Supreme Court articulated the rationales behind the
exception: removing weapons to ensure officer safety and preventing the destruction of evidence.
Chimel, 395 U.S. 752, 762-63 (1969). Neither justification, the Riley Court explained, supported
8
Justice Alito concurred in part and concurred in the judgment. Riley, 134 S. Ct. at 2495.
31
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 32 of 52
the application of the exception to cell phones. Riley, 134 S. Ct. at 2485-88. The Court rejected
the government’s arguments that cell phones are “vulnerable to two types of evidence destruction
unique to digital data—remote wiping and data encryption” because “broader concerns about the
loss of evidence are distinct” from the rationale supporting the exception, the Court “ha[d] also
been given little reason to believe that either problem is prevalent,” and it was unclear that the
ability to conduct a cell phone search without a warrant would “make much of a difference.” Id.
at 2486-87.
As to the individual’s privacy interests implicated, “[m]odern cell phones, as a category,
implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet,
or a purse.” Id. at 2488-89. The Supreme Court expounded at length upon the extent to which
“[c]ell phones differ in both a quantitative and a qualitative sense from other objects that might be
kept on an arrestee’s person.” Id. at 2489. Quantitatively, whereas “[m]ost people cannot lug
around every piece of mail they have received for the past several months, every picture they have
taken, or every book or article they have read—nor would they have any reason to attempt to do
so,” cell phones have an “immense storage capacity,” allowing people to carry an amount of data
no longer limited by physical practicability. Id. “The sum of an individual’s private life can be
reconstructed through a thousand photographs labeled with dates, locations, and descriptions”
dating back to the purchase of the phone, or earlier; “the same cannot be said of a photograph or
two of loved ones tucked into a wallet.” Id. Qualitatively, a person’s internet browsing history,
historic location information, and mobile application software (or “apps”) “can form a revealing
montage of the user’s life.” Id. at 2490. Indeed, the Court stated that “a cell phone search would
typically expose to the government far more than the most exhaustive search of a house.” Id. at
2491 (emphasis in original). Moreover, the ease with which a cell phone may be used to access
32
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 33 of 52
remote files illustrates that a cell phone search “might extend well beyond papers and effects in
the physical proximity of an arrestee,” providing “yet another reason that the privacy interests here
dwarf those” in prior search incident to arrest cases. Id.
The Riley court rejected the government’s proposed alternative standards, including that
“from the vehicle context, allowing a warrantless search of an arrestee’s cell phone whenever it is
reasonable to believe that the phone contains evidence of the crime of arrest.” Id. at 2492. The
Supreme Court explained that the exception for warrantless searches of a vehicle’s passenger
compartment carved out in Gant, 556 U.S. at 343, was inapplicable to cell phone searches for
several reasons. Riley, 134 S. Ct. at 2492. First, the circumstances of the vehicle search involved
further “reduced expectation[s] of privacy” and “heightened law enforcement needs” absent with
cell phone searches. Id. (quoting Thornton v. United States, 541 U.S. 615, 632 (2004) (Scalia, J.,
concurring)); see Gant, 556 U.S. at 345. Second, crucially, the “Gant standard would prove no
practical limit at all when it comes to cell phone searches,” given the physical and temporal
limitations present in a Gant scenario that are absent in a Riley scenario. Riley, 134 S. Ct. at 2492.
The Court noted that “[i]t would be a particularly inexperienced or unimaginative law enforcement
officer who could not come up with several reasons to suppose evidence of just about any crime
could be found on a cell phone.” Id. Given the Court’s “general preference to provide clear
guidance to law enforcement through categorical rules,” and avoid “a difficult line-drawing
expedition” for officers and courts alike, the Court rejected the government’s “fallback options”
in favor of a warrant requirement that would apply to all cell phone searches conducted incident
to arrest. Id. at 2491-93; see id. at 2497 (Alito, J., concurring) (explaining that although the Court’s
holding might “lead[] to anomalies,” he did “not see a workable alternative” given that “[l]aw
33
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 34 of 52
enforcement officers need clear rules . . . and it would take many cases and many years for the
courts to develop more nuanced rules”).
It is also worth noting that one of the two cases on appeal in Riley was Wurie, a 2013 First
Circuit opinion reversing the denial of a motion to suppress and holding that cell phones are distinct
from other physical possessions that may be searched incident to arrest without a warrant. Wurie,
728 F.3d at 13-14. The First Circuit pointed to Seventh Circuit case law acknowledging that “[a]t
the touch of a button a cell phone search becomes a house search, and that is not a search of a
‘container’ in any normal sense of that word, though a house contains data.” Id. at 8-9 (quoting
United States v. Flores-Lopez, 670 F.3d 803, 806 (7th Cir. 2012)). Ultimately, however, the First
Circuit parted ways with the Seventh Circuit and a “majority” of jurisdictions that had upheld
warrantless cell phone data searches. Id. at 5, 13. The First Circuit concluded instead that cell
phone searches incident to arrest are not justified by the Chimel rationales, and that the nature and
scope of the search exceeded the purposes of the warrant exception. Id. at 7-12. The court
explained that cell phones store “much more personal information . . . than could ever fit in a
wallet, address book, briefcase, or any of the other traditional containers that the government has
invoked.” Id. at 9.
Adhering to “the Supreme Court’s insistence on bright-line rules in the Fourth Amendment
context,” the First Circuit explained that while some searches of cell phones might be less invasive
than others, “it is necessary for all warrantless cell phone data searches to be governed by the same
rule.” Id. at 12-13. In the court’s view, the government’s desire for warrantless cell phone searches
was “a convenient way for the police to obtain information related to a defendant’s crime of arrest,”
and the court found no Supreme Court jurisprudence sanctioning “such a ‘general evidencegathering search.’” Id. at 13 (quoting Thornton, 541 U.S. at 632 (Scalia, J., concurring)). The
34
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 35 of 52
First Circuit likened the government’s proposed approach to “customs officers in the early colonies
[who] could use writs of assistance to rummage through homes and warehouses, without any
showing of probable cause linked to a particular place or item sought,” the very ill the Founders
sought to eradicate with the Fourth Amendment. Id. at 9. In Riley, the Supreme Court affirmed
the First Circuit’s ruling. Riley, 134 S. Ct. at 2495.
2.
Riley and the Border Search Exception
Defendants argue that Riley does not apply to the border search context. D. 15 at 25-27.
Defendants state that “Riley itself noted that its holding was limited to the search incident to arrest
context” by acknowledging that “‘other case-specific exceptions may still justify a warrantless
search of a particular phone.’” D. 15 at 26 (quoting Riley, 134 S. Ct. at 2492). On that basis,
Defendants contend, the argument that Riley “imposes a warrant requirement” in the border search
context “is without merit and has been repeatedly rejected.” D. 15 at 25. Additionally, and more
substantively, Defendants contend that, unlike the rationales behind the search incident to arrest
exception, the border search exception “serves different and broader purposes” that “apply in full
force to searches of electronic media.” D. 15 at 26-27.
As an initial matter, the Court is not persuaded that Riley’s reasoning is irrelevant here
simply because Riley’s holding was limited to the search incident to arrest exception, see Riley,
134 S. Ct. at 2495. Judicially recognized exceptions to the warrant requirement do not exist in
isolation; rather, they are all part of Fourth Amendment jurisprudence, justified because,
ordinarily, the circumstances surrounding the search and the nature of the search have been deemed
“reasonable.” See id. at 2483; Ramsey, 431 U.S. at 617. In fact, the Supreme Court has referenced
search incident to arrest doctrine within its border search jurisprudence in the past, characterizing
the two exceptions as “similar.” Ramsey, 431 U.S. at 621 (explaining that the border search is “a
longstanding, historically recognized exception to the Fourth Amendment’s general principle that
35
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 36 of 52
a warrant be obtained, and in this respect is like the similar ‘search incident to lawful arrest’
exception”). The reasoning in Riley may, therefore, carry some persuasive weight in the border
search context. See, e.g., United States v. Kolsuz, 185 F. Supp. 3d 843, 856 (E.D. Va. 2016)
(considering scope of privacy interest at border in light of Riley); United States v. Kim, 103 F.
Supp. 3d 32, 54-58 (D.D.C. 2015) (same); cf. United States v. Camou, 773 F.3d 932, 942-43 (9th
Cir. 2014) (extending Riley to the vehicle exception context); United States v. Lara, 815 F.3d 605,
610-12 (9th Cir. 2016) (applying Riley to probation search context); United States v. Henry, 827
F.3d 16, 28 (1st Cir. 2016) (rejecting defendant’s Riley argument in the “plain view” context not
because Riley was categorically irrelevant but because the officers had obtained a warrant prior to
the smart phone search).
Additionally, the cases Defendants reference to argue that Plaintiffs’ Fourth Amendment
claim has been “repeatedly rejected,” D. 15 at 26 n.8, carry limited weight here. The majority of
these cases arose in district courts within the Ninth Circuit, where Cotterman, 709 F.3d at 968, a
Ninth Circuit en banc decision predating Riley, still controls. See, e.g., United States v. Mendez,
240 F. Supp. 3d, 1005, 1008 (D. Ariz. 2017); United States v. Ramos, 190 F. Supp. 3d 992, 100203 (S.D. Cal. 2016); United States v. Lopez, No. 13-CR-2092 WQH, 2016 U.S. Dist. LEXIS
176920, 2016 WL 7370030, at *5 (S.D. Cal. Dec. 20, 2016). In Cotterman, the Ninth Circuit held
that a forensic device search initiated at the border required reasonable suspicion, explaining that
“the uniquely sensitive nature of data on electronic devices carries with it a significant expectation
of privacy and thus renders an exhaustive exploratory search more intrusive than with other forms
of property.” Cotterman, 709 F.3d at 966. Lower courts in the Ninth Circuit are bound by the
Cotterman standard, unable to apply Riley in the border context unless they find the two cases
“clearly irreconcilable,” which, as several courts have explained, they are not. See United States
36
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 37 of 52
v. Caballero, 178 F. Supp. 3d 1008, 1018 (S.D. Cal. 2016) (explaining that “[a]lthough Riley could
be applied to a cell phone search at the border, this Court is bound by Cotterman”); Lopez, 2016
WL 7370030, at * 5.9
Here, the First Circuit has not yet spoken on what level of suspicion is required to justify a
cell phone or other electronic device search at the border. The First Circuit has, however,
acknowledged the significant privacy interests implicated in a cell phone search, explaining that
the information on these devices is “the kind of information one would previously have stored in
one’s home and that would have been off-limits to officers performing a search incident to arrest.”
Wurie, 728 F.3d at 8.
Searches of cell phones are fundamentally different from “the kinds of
reasonable, self-limiting searches that do not offend the Fourth Amendment, even when conducted
without a warrant.” Id. at 9-10. The court also emphasized the necessity behind a bright-line rule
favoring a warrant requirement, explaining that “[a] series of opinions allowing some cell phone
data searches but not others, based on the nature and reasonableness of the intrusion, would create
exactly the ‘inherently subjective and highly fact specific’ set of rules that the Court has warned
against and would be extremely difficult for officers in the field to apply.” Id. at 12-13 (quoting
Thornton, 541 U.S. at 623).
While it is correct that neither the Supreme Court nor the First Circuit have yet held that a
warrant is required for a particular type of search conducted at the border, the Court considers
Plaintiffs’ claim against the current legal backdrop framed by Riley and Wurie and thus turns to
9
Likewise, district courts in the Fourth Circuit are bound by pre-Riley precedent in United States
v. Ickes, in which the Fourth Circuit held that a manual digital search of an electronic device is a
routine border search, requiring no individualized suspicion, Ickes, 393 F.3d 501, 505-06 (4th Cir.
2005). See Kolsuz, 185 F. Supp. 3d at 854-55; United States v. Saboonchi, 990 F. Supp. 2d 536,
560 (D. Md. 2014).
37
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 38 of 52
the merits to determine whether Plaintiffs have plausibly alleged a Fourth Amendment violation
for warrantless border device searches.
The border search exception is widely considered as old as the United States itself. See
Ramsey, 431 U.S. at 616-17. “The Congress which proposed the Bill of Rights, including the
Fourth Amendment, to the state legislatures on September 25, 1789, 1 Stat. 97, had, some two
months prior to that proposal, enacted the first customs statute, Act of July 31, 1789, c. 5, 1 Stat.
29 . . . . grant[ing] customs officials ‘full power and authority’ to enter and search ‘any ship or
vessel, in which they shall have reason to suspect any goods, wares or merchandise subject to duty
shall be concealed.’” Id. at 616. The Supreme Court reiterated in 1886 and 1925 that border
searches are “reasonable” and, therefore, not prohibited by the Fourth Amendment. See Boyd v.
United States, 116 U.S. 616, 623 (1886); Carroll v. United States, 267 U.S. 132, 147 (1925).
As with all Fourth Amendment exceptions, the border search exception is “subject to
substantive limitations imposed by the Constitution.” Ramsey, 431 U.S. at 620. The Court
determines “the permissibility of a particular law enforcement practice . . . by ‘balancing its
intrusion on the individual’s Fourth Amendment interest against its promotion of legitimate
governmental interests.’” Montoya de Hernandez, 473 U.S. at 537 (quoting United States v.
Villamonte-Marquez, 462 U.S. 579, 588 (1983)).
“[T]he Fourth Amendment’s balance of
reasonableness is qualitatively different at the international border than in the interior.” Id. at 538.
Individuals have a reduced expectation of privacy at the international border, while the
government’s “interest in preventing the entry of unwanted persons and effects is at its zenith”
there. Flores-Montano, 541 U.S. at 154, 152.
The border search slate, however, is not unlike the one on which the Supreme Court wrote
in Riley. Like the border search exception’s historical foundation, the search incident to arrest
38
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 39 of 52
exception, as the Court detailed in Riley, was “always recognized under English and American
law,” Riley, 134 S. Ct. at 2482 (quoting Weeks, 232 U.S. at 392). Moreover, with searches incident
to arrest, the balance also tilts favorably toward the government. See id. at 2488 (explaining that
“[t]he search incident to arrest exception rests not only on the heightened government interests at
stake in a volatile arrest situation, but also on an arrestee’s reduced privacy interests upon being
taken into police custody”). The Court nevertheless explained that an arrestee’s “diminished
privacy interests do[] not mean that the Fourth Amendment falls out of the picture entirely.” Id.
Rather, the unique attributes of cell phones so increased the privacy interests of individuals that
the balancing of interests that typically support the search incident to arrest exception no longer
applied. See id. at 2484-85, 2488; Wurie, 728 F.3d at 9.
The border search serves the nation’s “paramount interest in protecting[] its territorial
integrity.” Flores-Montano, 541 U.S. at 153. The rationales supporting the border search
exception are the sovereign’s interest in protecting the “integrity of the border,” by “[r]egulat[ing]
the collection of duties” and “prevent[ing] the introduction of contraband into this country.”
Montoya de Hernandez, 473 U.S. at 538, 537; see Carroll, 267 U.S. at 154 (explaining that
“[t]ravellers may be so stopped . . . because of national self protection reasonably requiring one
entering the country to identify himself as entitled to come in, and his belongings as effects which
may be lawfully brought in”). The Supreme Court has characterized customs officials’ role at the
border as greater than that of “investigative law enforcement,” explaining that customs offers “are
also charged . . . with protecting this Nation from entrants who may bring anything harmful into
this country, whether that be communicable diseases, narcotics, or explosives.” Montoya de
Hernandez, 473 U.S. at 544.
39
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 40 of 52
Plaintiffs argue that “warrantless searches of electronic devices are not sufficiently tethered
to the narrow purposes justifying the border search exception:
immigration and customs
enforcement.” D. 19 at 28-29. If the border exception seeks to enable officers to prevent illicit
“contraband” from entering the country, see Montoya de Hernandez, 473 U.S. at 537, a search of
digital data may not be necessary to achieve that aim. See Kolsuz, 185 F. Supp. 3d at 858
(explaining that digital information “is merely indirect evidence of things an individual seeks to
export illegally—not the things themselves—and therefore the government’s interest in obtaining
this information is less significant than the government’s interest in directly discovering the items
to be exported illegally”); United States v. Molina-Isidoro, 267 F. Supp. 3d 900, 909 n.10 (W.D.
Tex. 2016). Defendants argue that devices “can contain contraband (such as child pornography),
information regarding the inadmissibility of prohibited goods or persons, or material (such as
classified information, malware, or export-controlled material) that, if illicitly transferred beyond
our borders, could pose a direct threat to our national security.” D. 15 at 27. The Court agrees
with Plaintiffs that “information regarding the inadmissibility of prohibited goods or persons,” id.,
is distinct from contraband. D. 19 at 30 n.20; see Boyd, 116 U.S. at 623 (explaining that search
and seizure of “goods liable to duties and concealed to avoid the payment thereof[] are totally
different things from a search for and seizure of a man’s private books and papers for the purpose
of obtaining information therein contained, or of using them as evidence against him”).
Digital contraband like child pornography, however, falls within the ambit of the border
search exception’s rationales. Plaintiffs argue that unlike physical contraband, digital contraband
may also cross borders digitally, through the internet, and need not physically cross the border to
enter the country. D. 19 at 30. Additionally, they argue that to the extent such digital contraband
is truly transported across the border through these devices, the government cannot demonstrate
40
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 41 of 52
that such incidents are “prevalent” enough to justify a categorical rule permitting warrantless
device searches at the border. Id. (quoting Riley, 134 S. Ct. at 2486). The U.S. Sentencing
Commission explained in 2012 that “[t]he vast majority of child pornography offenders today use
the Internet or Internet-related technologies to access and distribute child pornography.” U.S.
Sent’g Comm’n, 2012 Report to the Congress: Federal Child Pornography Offenses 41-42
(2012)10; see id. at 48-56 (describing peer-to-peer file sharing and other platforms enabling file
sharing on the internet). With the limited record before the Court, the prevalence of physical
transfers of illicit digital contraband across the U.S. borders (as opposed to through the internet) is
unclear.
Additionally, although the Court agrees with Defendants that digital contraband is not
“untethered” from the rationales supporting the border search exception, it is unclear at this
juncture the extent to which a warrant requirement would impede customs officers’ ability to ferret
out such contraband.11 “[T]he mere fact that law enforcement may be made more efficient can
never by itself justify disregard of the Fourth Amendment.” Wurie, 728 F.3d at 11 (quoting
Mincey v. Arizona, 437 U.S. 385, 393 (1978)). Indeed, as Justice Roberts pointed out in Riley,
“[r]ecent technological advances similar to those discussed here have, in addition, made the
process of obtaining a warrant itself more efficient.” Riley, 134 S. Ct. at 2493. Although a warrant
might “have an impact on the ability of law enforcement to combat crime,” id., it is unclear—
10
Available online at http://www.ussc.gov/sites/default/files/pdf/news/congressional-testimonyand-reports/sex-offense-topics/201212-federal-child-pornographyoffenses/Full_Report_to_Congress.pdf.
11
One district court explained, prior to Riley, in holding that forensic searches require reasonable
suspicion, such a ruling is not “likely meaningfully to change anything that actually happens at the
border,” because “[c]ustoms officials do not have the time or resources—or, most likely, the
inclination—to perform random or suspicionless forensic searches.” Saboonchi, 990 F. Supp. 2d
at 570. The court was unaware of “any case where a forensic search was performed in the absence
of reasonable suspicion.” Id. (citing cases).
41
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 42 of 52
based on the record before the Court at this time—the extent to which such impediment justifies
applying the border search exception to electronic devices. This is particularly true where the
government’s interests—even if they are not “untethered” to the exception’s rationales—must be
“[w]eighed against the significant privacy implications inherent in cell phone data searches.”
Wurie, 728 F.3d at 11.
On the other side of the scale, where a traveler’s privacy interests are ordinarily reduced,
Riley indicates that electronic devices implicate privacy interests in a fundamentally different
manner than searches of typical containers or even searches of a person. Riley, 134 S. Ct. at 248889, 2494-95; see Wurie, 728 F.3d at 8. The Supreme Court has held that detention of a traveler at
the border “beyond the scope of a routine customs search and inspection” may be justified when
supported by reasonable suspicion that the traveler is smuggling contraband in their “alimentary
canal,” Montoya de Hernandez, 473 U.S. at 541, and that no level of suspicion is required for a
border search in which officers “remove, disassemble, and reassemble a vehicle’s fuel tank,”
Flores-Montano, 541 U.S. at 155. The First Circuit, likewise, has held that reasonable suspicion—
not probable cause—is required to justify certain “nonroutine” border examinations like strip and
body cavity searches. United States v. Braks, 842 F.2d 509, 512-14 (1st Cir. 1988). The First
Circuit and other circuits have adopted the “routine” and “nonroutine” border search distinction
first articulated in Montoya de Hernandez, 473 U.S. at 541 n.4, often distinguishing between the
two by the intrusiveness of the search. See United States v. Molina-Gómez, 781 F.3d 13, 19 (1st
Cir. 2015); United States v. Kelly, 302 F.3d 291, 294 (5th Cir. 2002); United States v. RamosSaenz, 36 F.3d 59, 61 (9th Cir. 1994).12
12
The Supreme Court’s dismissal of the “[c]omplex balancing tests” to determine the “degree of
intrusiveness” as applied to border searches of vehicles, Flores-Montano, 541 U.S. at 152, does
not eliminate the intrusiveness inquiry here. There, the Court explained that the “dignity and
42
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 43 of 52
Riley and Wurie indicate that electronic device searches are, categorically, more intrusive
than searches of one’s person or effects. See Riley, 134 S. Ct. 2489 (explaining that “[b]efore cell
phones, a search of a person was limited by physical realities and tended as a general matter to
constitute only a narrow intrusion on privacy”); Wurie, 728 F.3d at 8-9; United States v. Whiteside,
No. 13-cr-576, 2015 U.S. Dist. LEXIS 84369, 2015 WL 3953477, at *4-5 (S.D.N.Y. June 29,
2015) (suppressing contents of digital camera searched incident to arrest based upon Riley). The
ability to review travelers’ cell phones allows officers to view “nearly every aspect of their lives—
from the mundane to the intimate.” Riley, 134 S. Ct. at 2490. Indeed, certain facts alleged here—
including Nadia Alasaad’s and Merchant’s objections due to their photos on their phones of
themselves without headscarves, D. 7 ¶¶ 67, 129—demonstrate the level of intrusiveness a manual
device search can entail. The Constitutional Accountability Center, in its amicus brief, likens
digital device searches to searches of personal papers, explaining that “personal papers
increasingly take the form of digital files” kept on cell phones, laptops, and other electronic
devices. D. 23 at 8. They argue personal papers require greater protection under the Fourth
Amendment because these searches “‘go[] to the very core of the fourth amendment right of
privacy,’” given the Fourth Amendment’s history and the “inherently ‘personal, private nature of
such papers.’” D. 23 at 18 (quoting James A. McKenna, The Constitutional Protection of Private
Papers: The Role of a Hierarchical Fourth Amendment, 53 Ind. L.J. 55, 68 (1977)); see Craig M.
Bradley, Constitutional Protection for Private Papers, 16 Harv. C.R.-C.L. L. Rev. 461, 483 (1981)
(describing the “psychological intrusion” implicated by searches of personal papers “because the
privacy interests of the person being searched [] simply do not carry over to vehicles.” Id.; see
New York v. Class, 475 U.S. 106, 112-13 (1986) (explaining that vehicles implicate a diminished
expectation of privacy). Under current Supreme Court jurisprudence, the opposite holds true for
cell phones. See Riley, 134 S. Ct. at 2489-90.
43
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 44 of 52
searcher is invading not only the subject’s house but his or her thoughts as well”); Ramsey, 431
U.S. at 623-24 (holding that searches for contraband in international mail did not violate the Fourth
Amendment, repeatedly stressing that statutes forbade reading correspondence in the envelopes).
Moreover, the potential intrusion into individuals’ privacy is of “particular concern” in the border
search context because the permissible scope of customs officers’ investigative search is so broad
and need not “be restrained by any limitations of exigency or relevance to a specific crime.”
Camou, 773 F.3d at 943 (explaining that the broad “allowable scope” of a search pursuant to the
vehicle exception supported extending Riley’s holding to cell phone searches in that context).
Defendants argue that even if device searches necessitate heightened suspicion, no higher
standard could apply here than the reasonable suspicion standard.13 D. 15 at 25; see MolinaGómez, 781 F.3d at 19 (explaining that non-routine searches “require reasonable suspicion”).
Plaintiffs argue, however, that the Supreme Court has never suggested that reasonable suspicion
“is a ceiling for every border search.” D. 19 at 33. Defendants emphasized at oral argument that
First Circuit precedent has never required that strip searches in the border context meet a standard
higher than reasonable suspicion, see Braks, 842 F.2d at 512-14, so holding digital searches to a
higher standard would be incongruous. See D. 32 at 6. Notably, however, reasonable suspicion
generally suffices to justify strip searches in the search incident to arrest context, too. See United
States v. Barnes, 506 F.3d 58, 62 (1st Cir. 2007); Swain v. Spinney, 117 F.3d 1, 7 (1st Cir. 1997).14
13
Reasonable suspicion is generally defined as “a particularized and objective basis for suspecting
the particular person stopped of criminal activity.” United States v. Cortez, 449 U.S. 411, 417-18
(1981); Terry v. Ohio, 392 U.S. 1, 21, 30 (1968) (explaining that the standard is met when officers
can point to “specific and articulable facts” and rational inferences that can be drawn therefrom
indicating that criminal activity “may be afoot”). It is typically viewed within the totality of the
circumstances. See Cortez, 449 U.S. at 417.
14
Notably, in Swain, the First Circuit again connected the search incident to arrest exception with
the border search exception, explaining that the reasonable suspicion standard was appropriate for
44
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 45 of 52
Nevertheless, the Supreme Court rejected the reasonable suspicion standard when it came to cell
phones because it “would prove no practical limit at all when it comes to cell phone searches.”
Riley, 134 S. Ct. at 2492. Digital device searches at the border, perhaps even when supported by
reasonable suspicion, raise the same concerns.
In sum, the Court is not persuaded that Plaintiffs have failed to state a plausible Fourth
Amendment claim here. Although Defendants may be correct that the border is different, see D. 15
at 23-27, the Supreme Court and First Circuit have acknowledged that digital searches are different
too since they “implicate privacy concerns far beyond those implicated” in a typical container
search. Riley, 134 S. Ct. at 2488-89; see Wurie, 728 F.3d at 11. In the absence of controlling
precedent to the contrary, this Court cannot rule that this Fourth Amendment principle would not
extend in some capacity to the border. See Janfeshan, 2017 WL 3972461, at *12 (denying motion
to dismiss Fourth Amendment claim regarding forensic cell phone search at border); Kim, 103 F.
Supp. 3d at 59 (granting motion to suppress where forensic laptop search “was supported by so
little suspicion of ongoing or imminent criminal activity, and was so invasive of Kim’s privacy . .
. that it was unreasonable” under the Fourth Amendment and Riley); United States v. Djibo, 151
F. Supp. 3d 297, 310 (E.D.N.Y. 2015) (granting motion to suppress documents obtained from
warrantless search of phone of outbound passenger under Riley). The Court concludes, therefore,
that Plaintiffs have plausibly alleged a Fourth Amendment claim here.
Plaintiffs also argue that even if Riley does not apply here, “border search precedent
provides a parallel justification for requiring a warrant based on probable cause for border searches
of electronic devices.” D. 19 at 31. Given that the Court has concluded that Riley has some weight
strip and visual body cavity searches in the arrestee context because it was appropriate in other
contexts, including “non-routine border searches.” Swain, 117 F.3d at 7.
45
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 46 of 52
in the border search context and that, on that basis, Plaintiffs have stated a plausible Fourth
Amendment claim, the Court need not reach this further argument.
Defendants’ motion to dismiss Plaintiffs’ Fourth Amendment claim (Count I) is, therefore,
DENIED.
3.
Plaintiffs’ Confiscation Claim
Defendants also seek dismissal of Plaintiffs’ claim that Defendants “violate the Fourth
Amendment by confiscating travelers’ electronic devices, for the purpose of effectuating searches
of those devices after travelers leave the border, absent probable cause” as they are “unreasonable
at their inception, and in scope and duration,” D. 7 ¶ 173. D. 14 at 2; D. 15 at 30-34. Defendants
contend that “[t]he same arguments made with respect to the first cause of action . . . apply equally
here,” arguing that “where the government has authority to search an item at the border, it has
authority to detain that item as necessary to accomplish the search.” D. 15 at 30-31. To the extent
this standard is correct—which the Court does not grant—given this Court’s ruling on Plaintiffs’
Fourth Amendment claim regarding border device searches, and for many of the reasons detailed
above, the Court likewise holds that Plaintiffs have plausibly alleged a Fourth Amendment claim
based upon Defendants’ prolonged detention—or confiscation—of these devices.
The Court notes, moreover, that Plaintiffs’ claim pertaining to confiscations is not
coterminous with Plaintiffs’ border search claim. Unlike border searches, prolonged detentions of
devices—including after travelers have left the border—resemble seizures, and must, therefore, be
reasonable not only at their inception but also for their duration. United States v. Place, 462 U.S.
696, 708-10 (1983) (holding that the ninety-minute detention of luggage was a “seizure” requiring
probable cause); see United States v. Jacobsen, 466 U.S. 109, 124-25 (1984). That is, a device
search that is justified at its inception may nevertheless become unreasonable, giving rise to a
Fourth Amendment claim. See House, 2012 WL 1038816, at *10 (holding that a forty-nine day
46
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 47 of 52
detention of a locked laptop, flash drive and camera raised a plausible Fourth Amendment claim,
despite dismissing claim regarding the search itself); Cotterman, 709 F.3d at 966-67.
Plaintiffs argue that confiscations pursuant to CBP and ICE policies are “excessive” in
scope and duration. D. 7 ¶¶ 56(b)-(c). As this Court has previously explained, “the inquiry into
the reasonableness of the duration of a seizure is . . . an appropriate consideration under the Fourth
Amendment analysis” even at the border. House, 2012 WL 1038816, at *9 (citing Place, 462 U.S.
at 709-10); see United States v. Mitchell, 565 F.3d 1347, 1351-52 (11th Cir. 2009) (holding that a
twenty-one day delay in securing a warrant for a laptop search was unreasonable). Defendants
argue that Plaintiffs’ claim is baseless given that the official policies limit detentions to “a brief,
reasonable period of time.” D. 15 at 34 (quoting D. 18-1 ¶ 5.3.1). The lengths of the detentions
alleged here, however—including ten months for Allababidi and fifty-six days for Wright—
suggest that the Fourth Amendment may require clearer guidance than that. See Riley, 134 S. Ct.
at 2492-93 (reiterating the necessity of “clear guidance” in the Fourth Amendment context).
The Court thus DENIES Defendants’ motion to dismiss Plaintiffs’ Fourth Amendment
claim regarding confiscation of electronic devices pursuant to CBP and ICE policies (Count III).
C.
Plaintiffs’ First Amendment Claim
Finally, Defendants seek dismissal of Plaintiffs’ claim, Count II, that they “violate the First
Amendment by searching electronic devices that contain expressive content and associational
information, absent a warrant supported by probable cause,” D. 7 ¶ 171. D. 14 at 2. The First
Amendment provides that “Congress shall make no law . . . abridging the freedom of speech, or
of the press; or the right of the people peaceably to assemble.” U.S. Const. amend. I. These rights
“are protected not only against heavy-handed frontal attack, but also from being stifled by more
subtle governmental interference.” Bates v. City of Little Rock, 361 U.S. 516, 523 (1960). As the
Supreme Court has explained, “associational rights . . . can be abridged even by government
47
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 48 of 52
actions that do not directly restrict individuals’ ability to associate freely.” Lyng v. Int’l Union,
UAW, 485 U.S. 360, 367 n.5 (1988); see AFL-CIO v. FEC, 333 F.3d 168, 175 (D.C. Cir. 2003)
(explaining that compulsory “disclosure of political affiliations and activities can impose just as
substantial a burden on First Amendment rights as can direct regulation”); Baird v. State Bar of
Ariz., 401 U.S. 1, 6-7 (1971) (explaining that “[w]hen a State seeks to inquire about an individual’s
beliefs and associations a heavy burden lies upon it to show that the inquiry is necessary to protect
a legitimate state interest”).
Plaintiffs argue that warrantless digital device searches substantially burden travelers’
protected rights of freedom of speech and association and chill the exercise of these rights. D. 7
¶ 46; D. 19 at 38-41; see generally D. 26 (amicus brief filed by the Knight First Amendment
Institute at Columbia University and the Reporters Committee for Freedom of the Press). They
explain that the First Amendment rights implicated include the “right to associate with others in
pursuit of a wide variety of political, social, economic, educational, religious, and cultural ends,”
Roberts v. U.S. Jaycees, 468 U.S. 609, 622 (1984); see NAACP v. Alabama, 357 U.S. 449, 460
(1958), the right to publish speech anonymously, see McIntyre v. Ohio Elections Cmm’n, 514 U.S.
334, 351-43; McMann v. Doe, 460 F. Supp. 2d 259, 266 (D. Mass. 2006), and the right to
communicate privately, see Lamont v. Postmaster Gen., 381 U.S. 301, 305 (1965). D. 19 at 38.
Freedom of the press is also implicated here, as with Plaintiffs Dupin and Kushkush. D. 19 at 39;
D. 26 at 11-13; see Bruno & Stilman, Inc. v. Globe Newspaper Co., 633 F.2d 583, 595-96 (1st Cir.
1980).
Plaintiffs argue that to justify digital device searches, “[t]he government must have a
compelling interest in the information and use narrowly tailored means that do not seek more
information than necessary.” D. 19 at 38. The Court is not convinced that such strict scrutiny
48
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 49 of 52
applies here, where CBP and ICE policies are content-neutral, see Asociacion de Educacion
Privada de P.R., Inc. v. Garcia-Padilla, 490 F.3d 1, 15-16 (1st Cir. 2007), and, although potentially
burdening speech, do not prevent anyone from speaking, Sindicato Puertotorriqueño de
Trabajadores v. Fortuño, 699 F.3d 1, 12 (1st Cir. 2012). In general, however, compelled disclosure
of First Amendment protected activity “cannot be justified by a mere showing of some legitimate
governmental interest.” Buckley v. Valeo, 424 U.S. 1, 64 (1976). Rather, “even if any deterrent
effect on the exercise of First Amendment rights arises, not through direct government action, but
indirectly as an unintended but inevitable result of the government’s conduct in requiring
disclosure,” there must be a “‘substantial relation between the governmental interest and the
information required to be disclosed.” Id. at 64-65; see Gibson v. Fla. Legislative Investigation
Comm., 372 U.S. 539, 546 (1963). The Court must, therefore, determine whether the complaint
adequately alleges an interference with First Amendment rights that is “direct and substantial” or
“significant.” House, 2012 WL 1038816, at *12 (quoting Fighting Finest v. Bratton, 95 F.3d 224,
228 (2d Cir. 1996)). Plaintiffs argue that given the technological capacities of electronic devices,
the government’s broad search policies “impose[] a substantial burden on First Amendment rights
without justification.” D. 19 at 41.
Defendants do not argue that warrantless searches would not be a significant or substantial
burden on travelers’ First Amendment rights, nor do they explain their assertion that a heightened
standard is not “required by the First Amendment.” D. 32 at 6 n.4. Rather, Defendants argue that
“the border search doctrine is not subject to a First Amendment exception,” and that if it were, the
consequences would be “staggering.” D. 15 at 29 (quoting Ickes, 393 F.3d at 507, 506). As a
general matter, “[t]hat the initial search and seizure occurred at the border does not strip [Plaintiffs]
of [their] First Amendment rights.” House, 2012 WL 1038816, at *13; Tabbaa, 509 F.3d at 102
49
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 50 of 52
n.4 (explaining that a routine search may constitute a “significant or substantial burden on
plaintiffs’ First Amendment associational rights”).
Moreover, the Court is not persuaded that Ickes, 393 F.3d at 506, upon which Defendants
rely, provides appropriate guidance here. This Court need not carve out an exception for all
expressive material to find a plausible claim has been stated that digital device searches
unjustifiably burden travelers’ First Amendment rights. See House, 2012 WL 1038816, at *13
(holding that the plaintiff stated plausible First Amendment claim for his cell phone search despite
failing to state plausible Fourth Amendment claim). The Supreme Court’s distinction between
cell phones and other expressive materials in Riley, postdating the Fourth Circuit’s ruling in Ickes,
further illustrates this point. See Riley, 135 S. Ct. at 2490. Additionally, in Ickes, the Fourth
Circuit was concerned with the “headaches” such a First Amendment “exception” would bring for
customs officers. Ickes, 393 F.3d at 506. What Plaintiffs seek as a remedy here, however, is
“simple—get a warrant,” Riley, 134 S. Ct. at 2495. D. 19 at 39. Finally, in Ickes, the Fourth
Circuit assured that the defendant’s warning that “any person carrying a laptop computer . . . on
an international flight would be subject to a search of the files on the computer hard drive” was
“far-fetched,” Ickes, 393 F.3d at 506-07. Plaintiffs point to the recent increase in border device
searches and the expanding storage and functioning capacities of electronic devices to suggest
otherwise. D. 7 ¶¶ 30, 38; D. 19 at 41.
Defendants also argue that this Court’s reasoning in House does not apply here. D. 15 at
29. They contend that “the facts of that case are easily distinguished,” where, unlike here, House
alleged he was targeted for investigation because of his specific expressive or associational
activities. Id.; see House 2012 WL 1038816, at *10-11. First, certain Plaintiffs allege facts prior
to their device searches that are not dissimilar to those in House: while Dupin’s phone was being
50
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 51 of 52
searched, he was questioned “about his work as a journalist, including the names of the
organizations and specific individuals within those organizations for whom he had worked”; Gach
was questioned “about his work as an artist” prior to searching his phone; Kushkush was asked
about “his reporting activities”; and Merchant was questioned at secondary inspection about her
“religious affiliation” and her blog. D. 7 ¶¶ 87, 93, 99, 109, 133. One amicus argues that
journalists “are particularly vulnerable to targeted surveillance by means of suspicionless device
searches.” D. 26 at 13. As in House, such allegations are “pertinent” to Plaintiffs’ First
Amendment claim because they suggest that the officers’ “motivation to search and retain
[Plaintiffs’] devices” was to examine expressive or associational material. House, 2012 WL
1038816, at *10.
Second, the reasoning in House was not limited to targeting allegations alone. The Court
explained there that the seizure of House’s laptop and other devices gave the government
possession of confidential lists of organizational members and supporters, as well as emails and
documents detailing House’s organization’s inner workings. House, 2012 WL 1038816, at *12.
Such “[c]ompulsory disclosure . . . ‘can seriously infringe on privacy of association and belief
guaranteed by the first amendment,’ and can ‘have . . . a profound chilling effect.’” Id. (quoting
Buckley, 424 U.S. at 64; Perry v. Schwarzenegger, 591 F.3d 1126, 1135 (9th Cir. 2009)) (internal
citations omitted). Here, the CBP and ICE policies broadly permit suspicionless searches in
pursuit of “information,” ICE Pol. ¶¶ 5.2, 6.1; D. 18-2 ¶ 5.1.3, which could reasonably include
such searches within their ambit. In Ramsey, as Plaintiffs point out, D. 19 at 40, the Supreme
Court held that the statutory scheme permitting warrantless search of incoming international mail
did not violate the constitution because it applied only when there was reason to believe the
envelopes contained physical items and regulations “flatly prohibit[ed], under all circumstances,”
51
Case 1:17-cv-11730-DJC Document 34 Filed 05/09/18 Page 52 of 52
customs officials from reading correspondence without a warrant. Ramsey, 431 U.S. at 623. The
Court did not “decide whether, in the absence of the regulatory restrictions, speech would be
‘chilled,’ or, if it were, whether the appropriate response would be to apply the full panoply of
Fourth Amendment requirements.” Id. at 624 n.18. Here, there are no similar First Amendment
safeguards in the CBP and ICE electronic device policies.
In light of the particular concerns raised by digital devices like cell phones detailed above,
see Riley, 134 S. Ct. at 2489-91, and the limitless search authorizations in the CBP and ICE
policies, Plaintiffs have plausibly alleged that the government’s digital device search policies
substantially burden travelers’ First Amendment rights.15
The Court, therefore, declines to dismiss Plaintiffs’ First Amendment claim (Count II).
VI.
Conclusion
For the foregoing reasons, the Court DENIES Defendants’ motion to dismiss, D. 14.
So Ordered.
/s/ Denise J. Casper
United States District Judge
15
The Court also notes that Plaintiffs’ Fourth and First Amendment claims are closely related. See
Janfeshan, 2017 WL 3972461, at *12 (declining to dismiss plaintiff’s Fourth Amendment claim
after denying dismissal of his Fifth Amendment claim because they were “integrally related,” and
discovery would “involve the same witnesses and w[ould] largely overlap”).
52
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?