Criminal Procedure Recent Case 133 Harv. L. Rev. 2618

United States v. Cano

Ninth Circuit Limits the Scope of Warrantless Cell Phone Searches at the Border.

Comment on: 934 F.3d 1002 (9th Cir. 2019)


Download

Each year, border officials examine tens of thousands of electronic devices as they cross into and out of the United States.1 Although these devices contain staggering amounts of private data,2 the Fourth Amendment affords their owners far less protection than they might imagine3 due to an exception to the warrant requirement that gives government officials broad authority to conduct warrantless searches at the United States’ international border.4 And though many courts have emphasized that there must be some limit on this “border search exception,”5 the circuit courts have sharply divided over the nature of any such limit.6 Recently, in United States v. Cano,7 the Ninth Circuit held that the border search exception authorized warrantless cell phone searches only when directed at finding digital contraband.8 Though on its face Cano increased Fourth Amendment protections for border crossers,9 the court’s permissive application of its newly announced standard on the scope of the border search exception demonstrates the illusory nature of these purported protections.

On July 25, 2016, Miguel Cano attempted to cross from Mexico into the United States at the San Ysidro Port of Entry.10 Customs and Border Protection officers referred Cano to a secondary inspection, which revealed more than thirty pounds of cocaine sealed inside his spare tire.11 The officers arrested Cano.12 While Cano was in custody, Homeland Security Investigations (HSI) agents conducted three searches of his cell phone.13 The agents conducted the first and second searches manually, examining Cano’s text messages and call log, and recording some of the listed phone numbers.14 During the third search, the agents used Cellebrite software to download data from Cano’s phone.15

Before trial, Cano moved to suppress the evidence obtained from the searches, arguing that the HSI agents violated his Fourth Amendment rights by searching his phone without a warrant.16 The district court held that the agents were entitled to conduct the searches under the border search exception.17 The court rejected Cano’s argument that the exception applied only where the purpose of the search was to “prevent[] the entry of unwanted persons or things,”18 determining that “border search cases do not turn on the purpose or motivation behind the search.”19 Instead, the court analyzed the searches exclusively under the two-tiered suspicion framework of United States v. Cotterman,20 which required reasonable suspicion for “forensic” searches, and no suspicion for “manual” searches.21 A forensic search is distinguished from a standard “manual” search by its “comprehensive and intrusive nature” and use of “computer forensic software.”22 The court found even the most intrusive of the searches — the Cellebrite download search — to be justified under the exception,23 because even if it were considered a forensic search, the discovery of cocaine provided the reasonable suspicion24 necessary to forgo the warrant.25 Cano was eventually convicted.26

The Ninth Circuit reversed. Writing for a unanimous panel, Judge Bybee27 vacated Cano’s conviction after determining that the border officials violated Cano’s Fourth Amendment rights and that most of the evidence from their searches should have been suppressed.28 In articulating the appropriate standard for the border search exception, Judge Bybee explicitly extended the Cotterman framework to cell phones, holding that manual border searches of cell phones require no suspicion, while forensic searches require reasonable suspicion.29 The court dismissed the notion that the logic of Riley v. California,30 which established heightened requirements for cell phone searches incident to arrest,31 is equally applicable in the border search context.32 Given the diminished expectation of privacy at the border,33 Judge Bybee reasoned, Riley had not abrogated Cotterman and Cotterman’s two-tiered suspicion framework properly governed the analysis.34

Turning to the proper scope of the border search exception, Judge Bybee found that because “‘every border-search case the Supreme Court has decided involved searches to locate items being smuggled,’ rather than evidence,”35 only searches directed at “determin[ing] whether the phone contains contraband” were permissible under the exception.36 Searches for evidence of contraband or “border-related crimes” were outside the exception’s scope.37 Integrating the scope standard and suspicion framework, the court concluded that border officials could conduct warrantless forensic searches of cell phones only “when they reasonably suspect that the cell phone contains contraband.”38

Under this standard, the court found the first manual search — which verified there were no text messages on the phone — was properly directed at finding contraband, as “[c]hild pornography may be sent via text message.”39 The court found the second manual search, however, to be outside the scope because the “recording of the phone numbers and text messages” had “no connection to ensuring that the phone lack[ed] digital contraband.”40 Nevertheless, the court condoned the perusal of Cano’s call log.41 Noting that “[c]riminals may hide contraband in unexpected places,” Judge Bybee found that such a perusal could be necessary to ensure the log did not contain “surreptitious” digital contraband.42 Finally, the court held that if the third search — the one conducted with Cellebrite software — was a “forensic search,” then it was unreasonable, as the agents could not have reasonably suspected that Cano’s phone contained contraband.43

Having found that at least one of the searches violated the Fourth Amendment, the court held the proper remedy was suppression of the evidence, as the “good faith exception” did not apply.44 The good faith exception allows for the admission of evidence from an improper search when the search was conducted “in objectively reasonable reliance on binding judicial precedent.”45 Judge Bybee determined that because Cotterman involved a direct search for contraband, it could not have justified the search for evidence of future crimes on Cano’s phone.46

Finally, the court rejected Cano’s claim that the government violated his rights under Brady v. Maryland47 and Rule 16 of the Federal Rules of Criminal Procedure by failing to turn over evidence related to his third-party defense theory.48 Because the prosecutors did not have knowledge of, or access to, the documents Cano was requesting, Judge Bybee reasoned, they could not have withheld those documents.49

On its face, Cano’s narrowing of the border search exception’s scope to encompass only cell phone searches directed at finding digital contraband strengthens Fourth Amendment protections.50 Yet the court’s application of the standard to the two manual searches of Cano’s phone reveals that it does little to cabin the practical scope of manual searches, and consequently fails to increase protections for border crossers. Indeed, the interaction of the court’s application of the exception with both existing Fourth Amendment doctrine and new technology could allow officers at the border to continue to conduct nearly limitless manual cell phone searches. And the court’s analysis of the agents’ putatively forensic third search, conducted under the integrated reasonable suspicion of contraband standard, further underscores the lack of protections from manual searches.

The court’s analysis of the first manual search demonstrates the extent to which its scope inquiry is susceptible to evasion by pretext. Neither of the border agents’ subjective motivations for conducting this search — finding “investigative leads” or searching for “evidence of other things coming across the border”51 — comported with the court’s requirement that cell phone searches be directed at finding contraband itself rather than at finding evidence of contraband or other crimes.52 But the reasonableness of a government search is determined under an objective standard,53 meaning that a court must uphold objectively reasonable searches even when border agents admit to subjective search motivations outside the permissible scope.54 As a result, the court eschewed the agents’ subjective motivations and relied instead on its own determination that looking through text messages was objectively within the scope of the exception.55 And because such a determination is the end of the inquiry, the manner in which the court conducts its reasonableness analysis becomes all the more important to future courts tasked with implementing this new scope standard.56 Yet the Cano court provided little explanation for its determination, noting only that text messages are the type of thing that “may” house digital contraband.57 In providing guidance only at such a high level of generality, the court did little to deter future pretextual searches.58

When the Cano court did attempt to draw an administrable line — in its analysis of the second manual search — it did so in a manner that expanded, rather than limited, the universe of rationalizations that could be used to evade the strictures of its scope standard. By finding “record[ing] phone numbers found in the call log” to be outside the scope while allowing officers to “thumb through” the call log,59 the court authorized border agents to manually examine the call log of every person passing through the border — without any quantum of individualized suspicion — on the grounds that such an examination objectively constitutes a search for contraband. This exposes a trove of noncontraband digital content, much of it private in nature,60 to the gaze of any border agent inclined to look.

And by justifying that line drawing with the generalization that “[c]riminals may hide contraband in unexpected places,” the court potentially extended the permissible range of content that can be “thumb[ed] through” to any app on the phone.61 Though Cano did not cite any authority to support this generalization, there is ample evidence that many smartphone users do, in fact, use apps designed to hide digital contraband.62 These “vault apps” can be made to resemble any number of commonplace apps — from calendars to calculators63 — that would never be thought to house contraband.64 Operating under Cano, government officials familiar with vault apps could credibly claim that manually examining the contents of every application on a cell phone was part of a dutiful search for “surreptitious images or videos.”65 Such an outcome, which creates a universal post hoc rationalization for cell phone searches, implicitly authorizes near-boundless searches.

Furthermore, application of the Cano standard could bring the contents of a phone’s call log or other apps into the plain view of a border official, thus paradoxically triggering seizure of noncontraband that, in theory, could not be searched for under Cano’s scope conception.66 Under the plain view doctrine, law enforcement officials may seize plainly viewable evidence to which they have a “lawful right of access,”67 so long as its incriminating nature is “immediately apparent.”68 In United States v. Seljan,69 the Ninth Circuit relied on the plain view doctrine to uphold the seizure of a letter containing “evidence of possible pedophilia” by customs agents searching for undeclared currency.70 Though such a letter — if stored digitally — would be outside the scope of the border search exception under Cano, as it would be merely evidence of contraband,71 the officers would be justified in “thumb[ing] through” it — just as they were in perusing Cano’s call log — and its seizure could still be permitted under the plain view doctrine, just as in Seljan.72

The court’s analysis of the third search, however, shows there is a way to implement a scope standard that is resilient to these doctrinal challenges and that more effectively limits warrantless border searches to those within the exception’s scope. Evaluating the putatively forensic search, the court determined that the agents did not have the reasonable suspicion of contraband necessary to conduct a warrantless search.73 This determination ended the inquiry.74 Tethering the scope standard to the suspicion standard in this way moves the focus of the analysis earlier — to before the initiation of the search. This approach prevents agents not searching for contraband from ever obtaining a “lawful right of access” to the phone’s content, minimizing the chances of an outside-the-scope seizure under the plain view doctrine. And where this tethered analysis ends the inquiry altogether — as it did here — it obviates the need for the pretext-facilitating “objective” analysis of specific search techniques. This approach puts the lack of protection offered by the standard for manual searches — which have no suspicion requirement to which their scope analysis could be tethered75 — into sharp relief.76

The Cano court’s analysis of the first two searches thus demonstrates that its newly announced scope standard provides minimal protection from manual cell phone searches at the border. Without the requirement of reasonable suspicion of contraband, the manual search scope standard is enforced only through the easily circumvented objective purpose analysis. Though the Cano court sought to ensure that “border officials [were] limited to searching for contraband only,”77 Cano’s attempt to implement that command came closer to perpetuating a paradigm where “at the border, anything goes.”78

Footnotes
  1. ^ Laura K. Donohue, Customs, Immigration, and Rights: Constitutional Limits on Electronic Border Searches, 128 Yale L.J.F. 961, 961–62 (2019).

    Return to citation ^
  2. ^ Id. at 1010 (noting that a cell phone search exposes “the traveler’s entire life, as well as significant amounts of others’ private affairs”).

    Return to citation ^
  3. ^ See Matthew B. Kugler, Comment, The Perceived Intrusiveness of Searching Electronic Devices at the Border: An Empirical Study, 81 U. Chi. L. Rev. 1165, 1195 (2014) (finding that, for most types of electronic border searches, less than eleven percent of surveyed Americans believed the searches could be conducted without some articulable suspicion).

    Return to citation ^
  4. ^ The exception to the Fourth Amendment’s warrant requirement is premised on the “longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into [the United States].” United States v. Ramsey, 431 U.S. 606, 616 (1977).

    Return to citation ^
  5. ^ See, e.g., United States v. Alfaro-Moncada, 607 F.3d 720, 729 (11th Cir. 2010) (noting that “[e]ven at the border . . . reasonable suspicion is required for highly intrusive searches”); United States v. Seljan, 547 F.3d 993, 1000 (9th Cir. 2008) (en banc) (declining to hold that “at the border, anything goes”); United States v. De Gutierrez, 667 F.2d 16, 19 (5th Cir. 1982) (holding that reasonable suspicion is required for a strip search by a customs agent).

    Return to citation ^
  6. ^ See Note, The Border Search Muddle, 132 Harv. L. Rev. 2278, 2284–85 (2019) (describing the Fourth Circuit’s position in United States v. Kolsuz, 890 F.3d 133 (4th Cir. 2018), on one hand, and the Eleventh Circuit’s position in United States v. Touset, 890 F.3d 1227 (11th Cir. 2018), on the other, as “representative of the battle lines,” Note, supra, at 2284).

    Return to citation ^
  7. ^ 934 F.3d 1002 (9th Cir. 2019).

    Return to citation ^
  8. ^ Id. at 1007.

    Return to citation ^
  9. ^ See, e.g., Maura Dolan, Ruling Limits Border Agents’ Ability to Search Cellphones, L.A. Times (Aug. 16, 2019, 3:24 PM), https://www.latimes.com/california/story/2019-08-16/9th-circuit-illegal-cellphone-search-border-agents">https://www.latimes.com/california/story/2019-08-16/9th-circuit-illegal-cellphone-search-border-agents">https://www.latimes.com/california/story/2019-08-16/9th-circuit-illegal-cellphone-search-border-agents [https://perma.cc/2PAF-ECYK]; Sophia Cope & Adam Schwartz, Ninth Circuit Goes a Step Further to Protect Privacy in Border Device Searches, Electronic Frontier Found. (Aug. 22, 2019), https://www.eff.org/deeplinks/2019/08/ninth-circuit-goes-step-further-protect-privacy-border-device-searches">https://www.eff.org/deeplinks/2019/08/ninth-circuit-goes-step-further-protect-privacy-border-device-searches">https://www.eff.org/deeplinks/2019/08/ninth-circuit-goes-step-further-protect-privacy-border-device-searches [https://perma.cc/XE46-VEC3]; Tim Cushing, Ninth Circuit Says Warrantless Device Searches at the Border Must Be Limited to Searches for Contraband, Techdirt (Aug. 27, 2019, 3:14 AM), https://www.techdirt.com/articles/20190816/20021742803/ninth-circuit-says-warrantless-device-searches-border-must-be-limited-to-searches-contraband.shtml">https://www.techdirt.com/articles/20190816/20021742803/ninth-circuit-says-warrantless-device-searches-border-must-be-limited-to-searches-contraband.shtml">https://www.techdirt.com/articles/20190816/20021742803/ninth-circuit-says-warrantless-device-searches-border-must-be-limited-to-searches-contraband.shtml [https://perma.cc/P4GN-H997].

    Return to citation ^
  10. ^ Cano, 934 F.3d at 1008.

    Return to citation ^
  11. ^ Id.

    Return to citation ^
  12. ^ Id.

    Return to citation ^
  13. ^ Id.

    Return to citation ^
  14. ^ Id. The agents claimed that the manual searches were easily conducted because Cano’s phone was unlocked. Answering Brief for the United States at 20, Cano, 934 F.3d 1002 (9th Cir. 2019) (No. 17-50151).

    Return to citation ^
  15. ^ Cano, 934 F.3d at 1008. The Cellebrite download allowed access to “text messages, contacts, call logs, media, and application data.” Id. at 1008–09. The agents used the results of this search to probe Cano’s alleged reason for crossing the border — that he was looking for work at a carpet store — and concluded Cano had not, in fact, placed any calls to San Diego–area carpet stores. Id.

    Return to citation ^
  16. ^ United States v. Cano, 222 F. Supp. 3d 876, 878 (S.D. Cal. 2016).

    Return to citation ^
  17. ^ Id. at 882 (citing United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013) (en banc)).

    Return to citation ^
  18. ^ Id. at 879.

    Return to citation ^
  19. ^ Id. at 880.

    Return to citation ^
  20. ^ 709 F.3d 952.

    Return to citation ^
  21. ^ See id. at 967–68.

    Return to citation ^
  22. ^ Id. at 962.

    Return to citation ^
  23. ^ Cano, 222 F. Supp. 3d at 882.

    Return to citation ^
  24. ^ In fact, the court concluded that this discovery not only amounted to reasonable suspicion, but also gave rise to probable cause. Id.

    Return to citation ^
  25. ^ Id. The district court declined to determine whether the third search was “forensic.” Id.

    Return to citation ^
  26. ^ Cano, 934 F.3d at 1010. The first trial resulted in a hung jury and a mistrial; the second trial resulted in a conviction. Id.

    Return to citation ^
  27. ^ Judge Bybee was joined by Judges Graber and Harpool. Judge Harpool, of the Western District of Missouri, was sitting by designation.

    Return to citation ^
  28. ^ Cano, 934 F.3d at 1007.

    Return to citation ^
  29. ^ Id. at 1015–16. Cotterman dealt with searches of a laptop. See United States v. Cotterman, 709 F.3d 952, 956–57 (9th Cir. 2013) (en banc).

    Return to citation ^
  30. ^ 134 S. Ct. 2473 (2014).

    Return to citation ^
  31. ^ Riley required that “officers must generally secure a warrant before conducting such a search.” Id. at 2485.

    Return to citation ^
  32. ^ See Cano, 934 F.3d at 1015.

    Return to citation ^
  33. ^ Id. at 1015 (“[T]he Fourth Amendment’s balance of reasonableness is qualitatively different at the international border than in the interior . . . .” (quoting United States v. Montoya de Hernandez, 473 U.S. 531, 538 (1985))).

    Return to citation ^
  34. ^ See id. at 1015–16.

    Return to citation ^
  35. ^ Id. at 1018 (quoting United States v. Molina-Isidoro, 884 F.3d 287, 295 (5th Cir. 2018) (Costa, J., specially concurring) (emphasis added)).

    Return to citation ^
  36. ^ Id. Elsewhere in the opinion, Judge Bybee clarified that “[a]lthough cell phone data cannot hide physical objects, the data can contain digital contraband.” Id. at 1014 (footnote omitted).

    Return to citation ^
  37. ^ Id. at 1018. The court recognized that this holding created a split with the Fourth Circuit, which had held that the border search exception is “broad enough to accommodate . . . the prevention and disruption of ongoing efforts to export contraband illegally.” Id. at 1017 (emphasis omitted) (quoting United States v. Kolsuz, 890 F.3d 133, 143 (4th Cir. 2018)).

    Return to citation ^
  38. ^ Id. at 1020.

    Return to citation ^
  39. ^ Id. at 1019. In a footnote, Judge Bybee explained that he focused his analysis on child pornography because “[m]ost of the cases have involved child pornography” and “the detection-of-contraband justification would rarely seem to apply to an electronic search of a cell phone outside the context of child pornography.” Id. at 1021 n.13.

    Return to citation ^
  40. ^ Id. at 1019.

    Return to citation ^
  41. ^ Id.

    Return to citation ^
  42. ^ Id.

    Return to citation ^
  43. ^ Id. at 1021. Like the district court, the court declined to pass on whether the search at issue was in fact a forensic search. Id.; see also United States v. Cano, 222 F. Supp. 3d 876, 882 (S.D. Cal. 2016).

    Return to citation ^
  44. ^ Cano, 934 F.3d at 1022.

    Return to citation ^
  45. ^ Id. at 1021 (quoting Davis v. United States, 564 U.S. 229, 239 (2011)).

    Return to citation ^
  46. ^ Id. at 1021–22.

    Return to citation ^
  47. ^ 373 U.S. 83 (1963).

    Return to citation ^
  48. ^ See Cano, 934 F.3d at 1022–24. Cano alleged that his cousin, who was a member of a gang involved in drug trafficking, had access to the car where the cocaine was found. Id. at 1023–24.

    Return to citation ^
  49. ^ Id. at 1026.

    Return to citation ^
  50. ^ See sources cited supra note 9.

    Return to citation ^
  51. ^ Cano, 934 F.3d at 1008 (quoting HSI Agent Petonak).

    Return to citation ^
  52. ^ The court recognized this in a footnote, but dismissed it as part of its broader determination that “Cano’s focus on the officials’ subjective motivations is misplaced.” Id. at 1016 n.9.

    Return to citation ^
  53. ^ Id. (citing Whren v. United States, 517 U.S. 806, 813 (1996)).

    Return to citation ^
  54. ^ Cf. Scott v. United States, 436 U.S. 128, 138 (1978) (“[T]he fact that the officer does not have the state of mind which is hypothecated by the reasons which provide the legal justification for the officer’s action does not invalidate the action taken as long as the circumstances, viewed objectively, justify that action.”).

    Return to citation ^
  55. ^ See Cano, 934 F.3d at 1019.

    Return to citation ^
  56. ^ See Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 526 (2007) (“Fourth Amendment decision making relies heavily on analogies, which means that legal reasoning adopted in one factual setting will tend to be adopted in similar factual settings.”).

    Return to citation ^
  57. ^ Cano, 934 F.3d at 1019 (emphasis added).

    Return to citation ^
  58. ^ At least one scholar has suggested limiting the scope of underlying government powers as a way of deterring pretextual searches. See James B. Haddad, Pretextual Fourth Amendment Activity: Another Viewpoint, 18 U. Mich. J.L. Reform 639, 651–53 (1985) (“A narrowing of police power would restrict opportunity and incentive for abuse.” Id. at 652.). This analysis overlooks a case where — as here — the standard through which the scope is narrowed is itself susceptible to pretext.

    Return to citation ^
  59. ^ Cano, 934 F.3d at 1019.

    Return to citation ^
  60. ^ See Brief of Amicus Curiae Electronic Frontier Foundation in Support of Defendant-Appellant at 4–10, Cano, 934 F.3d 1002 (9th Cir. 2019) (No. 17-50151).

    Return to citation ^
  61. ^ Cano, 934 F.3d at 1019.

    Return to citation ^
  62. ^ See, e.g., Katie Rogers, The Vault Apps that Keep Sexts a Secret, N.Y. Times (Nov. 6, 2015), https://nyti.ms/1kztYJw [https://perma.cc/QT8S-D322] (reporting such apps have been used by teenagers to store nude images and noting one such app had “more than 1,500 individual reviews” and was “the 28th most downloaded photo and video app on the App Store”); Shereen Siewert, Marshfield Man Sentenced to Prison in 2 Separate Child Sex Cases, Wausau Pilot & Rev. (June 12, 2019), https://wausaupilotandreview.com/2019/06/12/marshfield-man-sentenced-to-prison-in-2-separate-child-sex-cases [https://perma.cc/4NTW-MVVL] (noting conviction of man who used a vault app to store child pornography).

    Return to citation ^
  63. ^ Molly McLaughlin, The 9 Best Vault Apps of 2020, Lifewire (Mar. 25, 2020), <a href="https://www.lifewire.com/best-vault-apps-4172048">https://www.lifewire.com/best-vault-apps-4172048">https://www.lifewire.com/best-vault-apps-4172048 [https://perma.cc/36ZD-WKM7].

    Return to citation ^
  64. ^ See Rogers, supra note 62.

    Return to citation ^
  65. ^ Cano, 934 F.3d at 1019.

    Return to citation ^
  66. ^ The plain view doctrine was not a factor in Cano itself. Though the Cano court speculated that the plain view doctrine might have justified the agents’ recording of the phone numbers in Cano’s call log — something the court deemed impermissible under the scope analysis — it declined to pass on this issue, as the government did not raise the argument in its briefs. See id. at 1020 n.11.

    Return to citation ^
  67. ^ Horton v. California, 496 U.S. 128, 137 (1990). Here, the border search exception would provide the right of access. See United States v. Bulacan, 156 F.3d 963, 968 (9th Cir. 1998) (citing Coolidge v. New Hampshire, 403 U.S. 443, 465 (1971) (plurality opinion)) (“The initial intrusion can be justified . . . by one of the recognized exceptions of the warrant requirement.”).

    Return to citation ^
  68. ^ Horton, 496 U.S. at 136 (quoting Coolidge, 403 U.S. at 466 (plurality opinion)).

    Return to citation ^
  69. ^ 547 F.3d 993 (9th Cir. 2008) (en banc).

    Return to citation ^
  70. ^ Id. at 1005.

    Return to citation ^
  71. ^ See Cano, 934 F.3d at 1017.

    Return to citation ^
  72. ^ See Seljan, 547 F.3d at 1005–06 (upholding seizure on the basis of “precedents involving the plain view doctrine,” id. at 1005, given that the officer had a “lawful right of access” to the letter, id. at 1006 (quoting Horton, 496 U.S. at 137), and that its incriminating nature was “immediately apparent,” id. (quoting Bulacan, 156 F.3d at 968)). But cf. United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1179–80 (9th Cir. 2010) (en banc) (Kozinski, C.J., concurring) (offering nonbinding guidance that magistrate judges reviewing warrant applications “should insist that the government waive reliance upon the plain view doctrine in digital evidence cases,” id. at 1180); Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 576–84 (2005) (arguing the plain view doctrine should be narrowed for digital searches).

    Return to citation ^
  73. ^ See Cano, 934 F.3d at 1021 (finding that although the agents “had reason to suspect that Cano’s phone would contain evidence leading to additional drugs, the record does not give rise to any objectively reasonable suspicion that the digital data in the phone contained contraband”).

    Return to citation ^
  74. ^ Id.

    Return to citation ^
  75. ^ Id. at 1016.

    Return to citation ^
  76. ^ Though beyond the scope of this comment, the extent of this disparity lends support for extending the reasonable suspicion of contraband standard to all border searches of cell phones. No circuit has adopted this approach, see United States v. Molina-Isidoro, 884 F.3d 287, 293 (5th Cir. 2018), but the District Court for the District of Massachusetts has embraced a similar standard, see Alasaad v. Nielsen, No. 17-cv-11730, 2019 WL 5899371, at *15 (D. Mass. Nov. 12, 2019) (citing Cano for the proposition that the reasonable suspicion standard must be tethered to the scope of the exception). Given the existing circuit splits over border search doctrine, see Note, supra note 6, and the delicate balancing of privacy and public safety required in this area, it may be that Congress is best suited to the task of sustainably bolstering Cano’s scope limitation. Cf. United States v. Jones, 565 U.S. 400, 429–30 (2012) (Alito, J., concurring in the judgment) (“A legislative body is well situated to gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way.”). In 2018, a bipartisan Senate bill proposed a reasonable suspicion standard for manual searches of electronic devices at the border. S. 2462, 115th Cong. § 2(b) (2018). A revised version, requiring reasonable suspicion of contraband, could be the ideal vehicle to give teeth to the exception’s scope.

    Return to citation ^
  77. ^ Cano, 934 F.3d at 1019.

    Return to citation ^
  78. ^ United States v. Seljan, 547 F.3d 993, 1000 (9th Cir. 2008) (en banc) (declining to hold that “at the border, anything goes”).

    Return to citation ^