People v. Endacott

164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907, 2008 Cal. App. LEXIS 1068
CourtCalifornia Court of Appeal
DecidedJuly 16, 2008
DocketB199122
StatusPublished

This text of 164 Cal. App. 4th 1346 (People v. Endacott) is published on Counsel Stack Legal Research, covering California Court of Appeal primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People v. Endacott, 164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907, 2008 Cal. App. LEXIS 1068 (Cal. Ct. App. 2008).

Opinion

Opinion

GILBERT, P. J.

Defendant arrives at Los Angeles International Airport on a plane from a foreign country. Without probable cause, customs officials seize defendant’s laptop computers and view their files. This “border search” does not violate the Fourth Amendment.

Drew Michael Endacott was charged with 10 counts of possession or control of child pornography. (Pen. Code, § 311.11.) The evidence was discovered during a routine suspicionless border search of Endacott’s computers and other digital media. Endacott’s motion to suppress the evidence pursuant to Penal Code section 1538.5 was denied. He pled no contest to one count of possession or control of child pornography. We conclude the search was valid and affirm.

FACTS

On September 29, 2006, Endacott landed at Los Angeles International Airport on a flight from Thailand. He proceeded with his luggage to the customs area of the international terminal.

David Tolentino, a United States Customs and Border Protection employee, encountered Endacott in the customs inspection area. He asked Endacott the purpose of his travel to Thailand and how long he had stayed. Endacott *1348 replied that he went to Thailand to rest, to visit a friend and to seek employment. Endacott said he stayed for four months.

Tolentino noticed that Endacott had among his luggage several plastic cases, like tool cases. He also noticed that Endacott was wearing a leather jacket and weight-lifter-type gloves. Tolentino said it was unusual for a person to vacation in Thailand for four months, to have plastic cases among his luggage and to come from a place as hot as Thailand wearing a leather jacket and gloves. He sent Endacott for secondary inspection.

Customs Officer Robert Williams greeted Endacott at the secondary inspection area. Williams obtained a “binding declaration” from Endacott confirming that all the items in his possession belonged to him.

Endacott had two laptop computers in his possession. Williams said that when someone presents a laptop to him, he usually powers it up and conducts a query for pictures and videos. He conducted such an inquiry in this case because Endacott was coming from Thailand and Thailand is considered to be a high risk for child pornography.

Williams’s query of Endacott’s laptop showed a screen full of nude females who appeared to be preadolescent. Williams asked Endacott about the images. Endacott replied that the screen showed pictures of models. When Williams asked how old the models were, Endacott replied they were about 14 years old. Endacott told Williams that the images were legal because he got them from a legal Web site.

Williams called Special Agent Lynn Phelan to view the results of the computer query. Phelan saw the picture of a nude young girl with exposed vaginal lips. Williams discovered other digital media in Endacott’s belongings that might contain similar images. Phelan decided to retain the computers and other digital media. She asked for and received Endacott’s consent to search the computers and other digital media. Endacott left the customs area.

Two days later another special agent searched Endacott’s computers and digital media. One laptop contained 6,071 images of pubescent and prepubescent girls in various states of undress. An external hard drive contained 3,961 such images and another external hard drive contained 7,386 such images.

The trial court concluded the search was without probable cause or even a reasonable suspicion. But the court upheld the search as a border search.

*1349 DISCUSSION

I

Endacott contends the search of his laptop computer violated the Fourth Amendment because it was done without reasonable suspicion. Endacott believes his computer is entitled to greater protection than other items that may be searched at the border because it contains expressive materials.

In United States v. Flores-Montano (2004) 541 U.S. 149, 152-153 [158 L.Ed.2d 311, 124 S.Ct. 1582], the Supreme Court reiterated the well-established rule that, “ ‘searches made at the border, pursuant to the longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into this country, are reasonable simply by virtue of the fact that they occur at the border.’ ” (Quoting United States v. Ramsey (1977) 431 U.S. 606, 616 [52 L.Ed.2d 617, 97 S.Ct. 1972].) The court held that the government did not need reasonable suspicion to remove, disassemble, and inspect a vehicle’s fuel tanks at the border. (Flores-Montano, at p. 155.)

In U.S. v. Ickes (4th Cir. 2005) 393 F.3d 501, the court upheld a suspicionless border search of the defendant’s computer. In so doing, the court rejected the defendant’s argument that his computer deserved greater protection from border searches than other items because it may contain expressive materials. (Id. at pp. 505-507.) The court noted that expressive materials could include terrorist communications. (Id. at p. 506.) Creating an exception for expressive materials would defeat the purpose of the border search doctrine, which is to allow the sovereign to protect itself. (Ibid.) Other federal cases not involving border searches have treated computers the same as any other container for the purposes of search and seizure law. (See, e.g., Trulock v. Freeh (4th Cir. 2001) 275 F.3d 391, 403 [password-protected computer files are analogous to locked footlocker]; U.S. v. Al-Marri (S.D.N.Y. 2002) 230 F.Supp.2d 535, 541 [“Courts have uniformly agreed that computers should be treated as if they were closed containers.”].)

The lone dissenting voice is U.S. v. Arnold (C.D.Cal. 2006) 454 F.Supp.2d 999. There the court analogized a computer search to a strip search or body cavity search that requires reasonable suspicion. (Id. at pp. 1002-1003.) The court reasoned, “[0]pening and viewing confidential computer files implicates dignity and privacy interests. Indeed, some may value the sanctity of private thoughts memorialized on a data storage device above physical privacy.” (Id. at p. 1003.)

Arnold was recently overturned on appeal. (U.S. v. Arnold (9th Cir. 2008) 523 F.3d 941.) The appeals court stated it was error for the district court to *1350 rely on cases involving the search of a person. The court of appeals concluded that no suspicion is needed to search a computer at the border.

Indeed, the human species has not yet, at least, become so robotic that opening a computer is similar to a strip search or body cavity search.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Ramsey
431 U.S. 606 (Supreme Court, 1977)
United States v. Montoya De Hernandez
473 U.S. 531 (Supreme Court, 1985)
United States v. Flores-Montano
541 U.S. 149 (Supreme Court, 2004)
United States v. Doe
61 F.3d 107 (First Circuit, 1995)
United States v. John Woodward Ickes, Jr.
393 F.3d 501 (Fourth Circuit, 2005)
United States v. Arnold
454 F. Supp. 2d 999 (C.D. California, 2006)
United States v. Al-Marri
230 F. Supp. 2d 535 (S.D. New York, 2002)
United States v. Arnold
523 F.3d 941 (Ninth Circuit, 2008)

Cite This Page — Counsel Stack

Bluebook (online)
164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907, 2008 Cal. App. LEXIS 1068, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-v-endacott-calctapp-2008.