Amici Brief on Laptop Searches at Borders
Amici Brief on Laptop Searches at Borders
06-50581
IN THE
UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT
RANDALL BRATER
Arent Fox LLP
1050 Connecticut Ave., N.W.
Washington, D.C. 20036
Of Counsel:
JOHN M. GURLEY
TIMOTHY P. KANE
Arent Fox LLP
1050 Connecticut Ave., N.W.
Washington, D.C. 20036
202-857-6000
Attorneys for Amici Curiae
TABLE OF CONTENTS
Page
SUMMARY OF ARGUMENT 3
ARGUMENT 4
A. THE SEARCHES 6
CONCLUSION 29
ii
TABLE OF AUTHORITIES
Page(s)
FEDERAL CASES
ACLU v. National Sec. Agency, 438 F. Supp. 2d 754 (E.D. Mich. 2006) 6
Heidy v. U.S. Customs Service, 681 F.Supp. 1445 (C.D. Cal. 1988) 23, 28-29
iii
Stanford v. Texas, 379 U.S. 476 (1965) 11, 22
United States v. Arnold, 454 F. Supp. 2d 999 (C.D. Cal. 2006). passim
United States v. Furukawa, No. 06-145, 2006 WL 3330726 (D. Minn. 2006) 19
Unites States v. Gourde, 440 F.3d 1065 (9th Cir. 2006) (en banc) 12
United States v. Romm, 455 F.3d 990 (9th Cir. 2006) 16, 19
United States v. Schoor, 597 F.2d 1303 (9th Cir. 1979) 21-22
iv
United States v. Soto-Teran, 44 F.Supp.2d 185 (E.D.N.Y. 1996) 14
United States v. U.S. Dist. Ct., 407 U.S. 297 (1972) 23-24, 26-27
MISCELLANEOUS
v
No. 06-50581
IN THE
UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT
Amici are the Association of Corporate Travel Executives (“ACTE”) and the
Virginia.
and consumer rights in the digital age. Founded in 1990, EFF has more than
13,000 members throughout the United States. EFF’s headquarters are located in
Both amici have a keen interest in the privacy rights of travelers entering and
leaving the United States. In the case of ACTE, this interest derives from reports
by some ACTE members that American border officials randomly searched and
Further, ACTE and its members have an interest in the economic health and well-
being of the international travel industry and therefore contest government policies
In the case of EFF, their interest arises from their ongoing efforts to
encourage and challenge government and industry to recognize the threats that new
technologies pose to civil liberties and personal privacy. EFF has special
familiarity with and interest in constitutional privacy issues that arise with new
technologies.
prohibition against unreasonable searches and seizures. Amici also believe that the
2
important limit to the government’s authority to collect electronic information
authority to read, seize, and store all of the information retrievable from the laptop
computers and other electronic devices carried by travelers who cross our national
borders. In seeking this authority from the Court, the government bases its appeal
limitless authority to search and seize anything outside the body. See Gov’t’s
Opening Br. 45-46. The government’s argument is untenable, and the implications
their laptop computers and other electronic devices. Indeed, the government
without regard for the constitutionally protected interests to which travelers are
entitled. As the District Court correctly recognized, laptop computers are quite
different from gas tanks, suitcases, and other closed containers, because laptops
routinely contain vast amounts of the most personal information about people’s
3
lives – not to mention privileged legal communications, reporters’ notes from
confidential sources, trade secrets, and other privileged and valuable information.
United States v. Arnold, 454 F. Supp. 2d 999, 1003-04 (C.D. Cal. 2006).
For the reasons discussed in this brief, the unique nature of electronic
standard that reasonably protects the privacy of our citizens. Further, the
more detail below, invites the government to abuse its power by making an end run
around the Fourth Amendment. This Court should recognize that reasonable
III. ARGUMENT
the government argues that when an American citizen like Mr. Arnold returns
home from abroad, he has the same Fourth Amendment rights in his transported
property as a foreign citizen has in his property in a foreign land; in other words,
Urquidez, 494 U.S. 259, 274-75 (1990) (Fourth Amendment does not apply to
4
foreign citizens in foreign countries; see also In re Guantanamo Detainee Cases,
355 F. Supp. 2d 443, 458-59 (D.D.C. 2005). The government appeal invites the
Court to extend this constitutional vacuum to our borders so that Customs and
Border (“CBP”) agents may continue to randomly search, seize, and copy the
The government claims that, unless border officials are given this unchecked
power, the courts will “seriously undermine the nation’s vital interest in protecting
of choice for electronic contraband.” (Gov’t’s Opening Br. 16.) The government’s
communications between the United States and foreign countries. See, e.g., United
States v. Cavanagh, 807 F.2d 787, 789-91 (9th Cir. 1987) (finding that FISA’s
foreign agents satisfies the Fourth Amendment). Where the executive branch
surveils such communications without cause and without complying with FISA,
the government violates the Fourth Amendment. See ACLU v. National Sec.
contraband is actually the internet itself. A foreign “smuggler” may simply email
information into the United States to avoid a suspicionless search or, easier yet,
5
may simply post the information on the internet. The District Court’s ruling
therefore does not undermine our “nation’s vital interest in protecting its borders”
In the final analysis, the only question before the Court is whether the
government, without any particularized suspicion and without any court oversight,
can review the information stored on laptop computers carried across the border by
international travelers. Amici believe that such searches are patently unreasonable
and thus prohibited by the Fourth Amendment. Amici respectfully request that the
A. The Searches1
Travelers who arrive in the United States from abroad know that they may
regularly inspect travelers’ shoes and luggage, ask routine questions, and review
their laptop computers from carry-on bags so that agents may x-ray the computer
1
In describing these searches, amici rely on media stories, reports by their own
members, and the record in the instant case. Further, the government’s appeal
certainly argues that searches like those described herein are constitutional under
the Fourth Amendment. Thus, regardless of how widespread and well-documented
these suspicionless searches are, this description is relevant to the Court’s analysis.
Indeed, amici believe that Mr. Arnold’s case offers a rare glimpse inside our border
officials’ systematic but unchecked policy of randomly searching, seizing, and
copying the contents of traveler’s laptop computers.
6
A border search, however, takes on an entirely different character when a
CBP agent turns on a traveler’s computer, opens their electronic files, and begins
reviewing the contents. What is your biggest secret? Do you have any
embarrassing health conditions? Have you ever had a family crisis? Often, the
In a typical laptop search, a border agent will turn on (or instruct the traveler
to turn on) the computer and then begin reviewing files on the computer. See Joe
Sharkey, At U.S. Borders, Laptops Have No Right to Privacy, N.Y. TIMES, October
24, 2006, at C8 (“Sharkey I”); Joe Sharkey, To Do List: Rename Laptop Files
II”); see also Arnold, 454 F. Supp. 2d at 1001. If the agents see something of
interest – or even if they see nothing at all of interest – the agents may confiscate
the computer and tell him or her that the computer will be returned by mail when
the agents are done with it. See Sharkey II; Affidavit of John M. Gurley, June 18,
After border authorities confiscate a computer, they may copy its contents
by creating a “mirror image” of the hard drive. See Gurley Aff. ¶ 4. Through this
method, they obtain all of the contents of the computer’s memory, including
deleted files, files implanted unknowingly on the computer via the internet, and
password-protected files. Amici currently do not know whether or how the copied
7
contents of seized computers are reviewed, stored, and shared with other
government agencies.2 But see Gurley Aff. ¶ 4 (explaining that in at least one
instance border agents provided to the U.S. Department of Justice a mirror image
of the hard drive of a traveler’s computer, where the traveler was not suspected of
criminal activity). Within a week or so, border agents mail the computer back.
See id. In some instances, however, the computers are not returned, without
among businesses, individual travelers, and the media during the last year, they
October 2006 survey of business travel managers, ACTE found that only six
percent of the managers knew that border agents randomly search, seize, and copy
the contents travelers’ computers, and only one percent had received reports from
2
In November 2006, Arent Fox LLP submitted a FOIA request to the Department
of Homeland Security (“DHS”) seeking information on these and other issues
pertinent to this amicus brief. In February 2007, DHS provided a “partial”
response to the FOIA request that contained nothing more than general DHS
training materials for law enforcement officers. DHS has not provided any
subsequent information pursuant to the FOIA request.
3
One possible explanation is that CBP simply “loses” some seized computers.
Indeed, a recent report by the Office of the Inspector General found that CBP loses
its own laptop computers and “has not established effective inventory management
for its laptop computers.” Improved Administration Can Enhance U.S. Customs
and Border Protection Laptop Computer Security, OIG-07-16 at 12, 15 (December
2006).
8
travelers that their laptops had in fact been seized by U.S. border officials. See
ACTE Survey Results, attached as Exhibit 2. The survey results reflect that even
very experienced business travelers are completely surprised to learn that the U.S.
Further, these searches give businesses and individuals a reason not to travel
across U.S. borders to conduct business, simply to protect their privacy. Some
that do not contain any saved information. Of course, companies also incur direct
costs when a border agent seizes a laptop computer during a business trip.
computers is unique in its private nature, in its nearly limitless volume, in its
pervasive role in our society, and in its capacity to be quickly copied, saved, and
searched. The questions raised in this appeal thus are not amenable to facile
analogies with file cabinets and gas tanks. As the Fourth Amendment ensures, the
seizures.
9
In balancing this right against the government’s interest in protecting our
borders, the Court should recognize not only the unique nature of these searches
but also the wide ranging implications of the government’s arguments. Indeed,
all of the information contained on every laptop computer, blackberry, and other
electronic device carried across our national borders by every traveler, American or
foreign. The government could then store and search all of this information
without justification and without oversight from the courts. Even in such an
simply does not apply. If accepted, the government’s argument will establish an
end run around the Constitution’s prohibition against unreasonable searches and
seizures.
central principles that must be observed, even in border searches. First, the scope
the Fourth Amendment.” Andresen v. Maryland, 427 U.S. 463, 480 (1976). The
concern is “not that of intrusion per se, but of a general, exploratory rummaging in
a person's belongings.” Id. (internal quotation marks and citation omitted); see
United States v. Ramsey, 431 U.S. 606, 624 (1977) (permitting officers to open
bulky envelopes to search for contraband, but noting that if the envelopes had
10
contained correspondence, a warrant would have been needed to read the
suspicions about contraband); United States v. Price, 472 F.2d 573, 575 (9th Cir.
1973) (customs officials were “not entitled, on the basis of appellant’s nervousness
when no warrant is required. The Supreme Court has relied heavily on statutory
e.g., Ramsey, 431 U.S. at 611 (noting statutory authorization); id. at 612 n.8 (“the
appeal implicitly seeks authorization for general warrantless searches that will not
Stanford v. Texas, 379 U.S. 476, 485 (1965); Marcus v. Search Warrant, 367 U.S.
717 (1961).
computers are virtual extensions of the mind, used to record and share our
11
thoughts, feelings, and activities; indeed, “they are postal services, playgrounds,
personal secretaries, virtual diaries, and more.” Orin Kerr, Searches and Seizures
in a Digital World, 119 Harv. L. Rev. 531, 569 (2005) (“Kerr”). As a result, our
perhaps more.
States v. Adjani, 452 F.3d 1140, 1146 (9th Cir. 2006). Thus, "for most people,
their computers are their most private spaces." Unites States v. Gourde, 440 F.3d
1065, 1077 (9th Cir. 2006) (en banc) (Kleinfeld, J., dissenting); United States v.
expectation of privacy in files stored on hard drive of personal computer left with
Reyes, 922 F. Supp. 818, 832-33 (S.D.N.Y. 1996) (finding reasonable expectation
with others; in so doing, computers record what we think about, what we learn,
what we say to others, and whom we associate with. To treat border searches of
12
personal computers as merely “routine” would permit the government to arbitrarily
Congress has noted that “the law must advance with the technology to
ensure the continued vitality of the fourth amendment. Privacy cannot be left to
today is what limits there are upon [the] power of technology to shrink the realm of
guaranteed privacy.” Kyllo v. United States, 533 U.S. 27, 33-34 (2001) (requiring
a warrant based on probable cause for the government to search a home using
sophisticated thermal imaging technology). That same question is posed here. The
border search doctrine has long authorized extensive, highly discretionary searches
of physical objects carried by travelers. In the past, however, these searches did
not invade every domain of an individual’s life; to the contrary, the searches only
affected physical items that a traveler chose to carry across the border. For
example, a traveler may choose to carry extensive paper files across the border, but
such situations are certainly rare; with computers, the situation is common, not
13
exceptional. Technology now puts massive amounts of personal and proprietary
however, value the privacy of their computers even more precisely because they
These unique circumstances require that this Court evaluate the privacy
interests inherent in laptop border searches with extreme care. Kyllo, 533 U.S. at
36 (“the rule we adopt must take account of more sophisticated systems that are
United States v. Flores-Montano, 541 U.S. at 149, 152, 154-55 (2004); United
States v. Montoya de Hernandez, 473 U.S. 531, 537 (1985); id. at 541 n.4
strip, body cavity, or involuntary x-ray searches”); United States v. Meija, 720 F.2d
1378, 1382 (5th Cir. 1983) (“intrusion is keyed to embarrassment, indignity, and
invasion of privacy”).
already reveal voluminous personal information about the owner. That the
14
government can and does keep such information, makes the problem even more
acute. Further, the invasiveness of these searches will only grow as technology
Kerr, at 569. As a result, computer searches are by their nature uniquely invasive.
F.Supp.2d 185, 191 (E.D.N.Y. 1996) (in the border search context, “a close
such documents could deal with very personal matters, such as a diary or desk
calendar”). Thus, while the nature of the information on personal computers alone
poses serious risks to privacy interests, the risks are magnified by the fact that “[a]
15
laptop and its storage devices have the potential to contain vast amounts of
person’s home could be expected to provide the government with as much private
4. Personal computers often contain information that the individual does not
know about, or has even sought to erase.
information about their owners but “[c]omputers are also remarkable for storing a
tremendous amount of information that most users do not know about and cannot
control.” Kerr, at 542. In essence, a traveler can be searched for material that she
did not know she possessed, or even deliberately sought not to bring across the
border.
For example, files that a user has deleted normally remain on one’s
computer “because marking a file as ‘deleted’ normally does not actually delete the
file.” Id.; see also United States v. Romm, 455 F.3d 990 (9th Cir. 2006). In
addition, internet browsers often retain not only the internet addresses of sites
visited, but actual information, both text and images, accessed during the visit,
even when the user had no intent to copy such information. See Ty Howard, Don’t
Cache out Your Case: Prosecuting Child Pornography Possession Laws Based on
Images Located in Temporary Internet Files, 19 Berkeley Tech. L.J. 1227, 1233–
16
computer, he can find extremely detailed information not only about the computer
owner, but also about anyone else who has used the computer, and anyone with
Camara v. Municipal Court, 387 U.S. 523, 528 (1967); Wolf v. Colorado, 338 U.S.
25, 27 (1949) (“The security of one’s privacy against arbitrary intrusions by the
kind that the English Crown had practiced through “general warrants” and “writs
of assistance.” Payton v. New York, 445 U.S. 573, 583 (1980). The Founders
intrusion into any particular home.” Steagald v. United States, 451 U.S. 204, 220
In Berger v. New York, 388 U.S. 41 (1967), the case that launched the
4
This issue is not theoretical. In businesses and even law firms, “common”
laptops are used during travel by employees who normally use desktop computers.
17
“indiscriminate use of electronic devices” and “actually permits general searches
by electronic devices.” Id. at 58. “By its very nature,” eavesdropping “involves an
when the Supreme Court noted that “a border search might be deemed
out,” Ramsey, 431 U.S. at 618 n.13, it cited a case famous for its condemnation of
general searches. Go-Bart Importing Co. v. United States, 282 U.S. 344, 357
(1931) (the Framers “emphasize[d] the purpose to protect against all general
searches. Since before the creation of our government, such searches have been
be authorizing precisely the kind of general search that the Framers rejected, albeit
through technologies they could never have anticipated. In seizing and searching a
communications, and activities of the computer’s owner, his or her family, and his
18
tend to play an ever greater role in our lives as computer
technologies advance, as they are likely to record and store
increasingly detailed pictures of our daily experience. … These
trends suggest that as time passes, rules created to prevent
general searches for physical evidence may result in the
equivalent of general searches for digital evidence.
Kerr, at 565-566. This concern is amply borne out not only by this case but by
other recent cases. See, e.g., United States v. Park, No. CR-05-375, 2007 WL
of seized computers, looking at documents, deleted files, and Internet caches. E.g.,
Romm, 455 F.3d at 993; United States v. Furukawa, No. 06-145, 2006 WL
3330726 at *3-4 (D. Minn. Nov. 16, 2006). Thus, the laptop search at issue in this
there is great risk that the government will, or will be perceived to, abuse that
power. Amici are thus concerned that the government may access a traveler’s
computer under the border search doctrine as a pretext for reasons unrelated to the
customs laws. Border searches “made solely in the enforcement of Customs laws”
general law enforcement.” Alexander v. United States, 362 F.2d 379, 381 (9th Cir.
1966), cert. denied, 385 U.S. 977 (1966) (“Congress has in effect declared that a
19
search which would be ‘unreasonable’ within the meaning of the Fourth
imports.”)
This Court should not allow the border search doctrine to override the rights
subject to a search of the files on the computer ‘hard drive.’” United States v.
Ickes, 393 F.3d 501, 50607 (4th Cir. 2005); id. at 507 (“Customs agents have
neither the time nor the resources to search the contents of every computer.”).
the government obviously does not search the contents of every laptop computer
carried over the border, the government asserts that it may indeed search the
the number of computers that the government searches and seizes, but on the
justification for its practice. Under the law the government seeks, agents would
have a logical rationale for seizing and searching the contents of the laptop
5
As technology improves so will the governments ability to download computers
and electronic media on a real-time basis.
20
computers carried by the family members of someone under criminal investigation,
Such a search is only one example of what the government asks this Court to
search a traveler’s laptop computer inside the United States, the government may
exploit the border search doctrine by waiting until the person travels
internationally. Given the frequency of international travel in the modern era, and
given the commonness of laptop computers and similar electronic devices, law
border searches of computers will become easier and more commonplace in the
computers may encourage the police to use border search authority to look for
United States v. Schoor, 597 F.2d 1303 (9th Cir. 1979), does not foreclose this
argument. In Schoor, DEA agents who lacked probable cause to search alerted
radio shipments were en route to the United States on a flight from Thailand and
requested that Customs search them, as they might be carrying narcotics. While
this Court noted that “[t]he source of [customs officials’] suspicion is irrelevant in
21
sustaining the search,” id. at 1306 (citation omitted), the search in Schoor did not
involve materials that raise the kinds of privacy concerns at issue in a search of a
laptop computer. Cf. United States v. Alfonso, 759 F.2d 728, 737-38 (9th Cir.
1985) (“a search of the private living quarters of a ship is more intrusive than a
search of other areas. . . . even in the context of a border search, the search of
private living quarters on a ship should require something more than naked
suspicion”).
seizures of presumptively protected material, Lo-Ji Sales, Inc. v. New York, 442
U.S. 319, 326 n.5 (1979), and requires that the Fourth Amendment be applied with
Consequently, the Court has imposed particularized rules applicable to searches for
and seizures of allegedly obscene films, books, and papers. See, e.g., Roaden v.
Kentucky, 413 U.S. 496, 497 (1973) ("seizure of allegedly obscene material,
moreover, must be understood as protecting not only the defendant in this case but
the public at large. See Bursey v. United States, 466 F.2d 1059, 1083 (9th Cir.
1972).
22
In addition, the First Amendment implications of these searches undermine
Indeed, in Heidy v. U.S. Customs Service, 681 F. Supp. 1445 (C.D. Cal. 1988), the
district court explained that “[b]order search cases relaxing fourth amendment
standards solely for the purpose of facilitating detection of physical objects sought
Id. at 1450 (footnote omitted). Thus, “limited reading or perusal of writing that
purpose of identifying the objects themselves,” but “a reading for the purpose of
revealing the intellectual content of the writing requires encroachment upon first
amendment protections far beyond the mere search and seizure of materials.” Id.
This case involves the intellectual content of laptop computers. As soon as border
agents cease looking for physical contraband inside a computer and instead begin
constitutional threshold.
Katz v. United States, 389 U.S. 347, 352 (1967). While physical entry of the home
was the Framers’ main concern, after Katz the “broader spirit” of the Fourth
23
States v. U.S. Dist. Ct., 407 U.S. 297, 313 (1972) (Keith) (“the broad and
(footnote omitted). Along with Berger, Katz reinforced the Fourth Amendment’s
Katz also made clear that constitutional protections must evolve with
communications, the Supreme Court explained: “To read the Constitution more
narrowly is to ignore the vital role that the public telephone has come to play in
private communication.” Katz, 389 U.S. at 352. The same values and logic
underlie the district court’s correct decision here. The personal computer (and
Katz and its progeny, border searches of laptop computers cannot be routine; to do
Personal computers and many other types of personal devices are frequently
used not only to communicate with others via email, instant messenger services,
blogs, chat rooms, and bulletin boards, but also simply to read information from
the Internet, a new and powerful medium of expression that covers a range of
topics “as diverse as human thought." Reno v. ACLU, 521 U.S. 844, 852 (1997); id.
24
at 863 (Internet “is the most participatory form of mass speech yet developed,
omitted).
communications; it extends as well to his or her identity and the identity of his or
interests, the websites he or she reads, and the electronic files that he or she
exemplifies the purpose behind the Bill of Rights, and of the First Amendment in
particular: to protect unpopular individuals from retaliation -- and their ideas from
The Supreme Court has long been vigilant about the potential for
freedoms of expression in general that they are vulnerable to gravely damaging yet
barely visible encroachments.” Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 66
official censorship, which lies “not merely [in] the sporadic abuse of power by the
25
censor but the pervasive threat inherent in its very existence.” Thornhill v.
This concern links the First and Fourth Amendments. Indeed, the Framers
adopted the Bill of Rights “against the background of knowledge that unrestricted
power of search and seizure could also be an instrument for stifling liberty of
therefore poses a grave danger to free speech. “History abundantly documents the
with suspicion those who most fervently dispute its policies.” Keith, 407 U.S. at
at 314.
especially given that the Customs Service is authorized to block the importation of
the United States, or forcible resistance to any law of the United States.” 19
U.S.C. § 1305; see Heidy, 681 F. Supp. at 1450-51 (where Customs targeted
materials regarding political dissent, “no dispute that the reading of the materials in
26
question and the creation and retention of the Records of Non-Violation ‘chill’
judicial authorization based on probable cause and specifying the scope of the
search with particularity. In Katz, the Supreme Court explained that “bypassing a
Fourth Amendment violations only in the discretion of the police.” Katz, 389 U.S.
at 358-359 (internal quotation and citation omitted); Keith, 407 U.S. at 318 (“post-
surveillance review would never reach the surveillances which failed to result in
Accordingly, the Supreme Court has often relied on the judicial check when
Andresen, 427 U.S. 463, 482 n.11 (1976) (“In searches for papers, it is certain that
27
take care to assure that they are conducted in a manner that minimizes unwarranted
When there is no judicial check, as in the border search doctrine, the only
chill speech. Although Ramsey found that border searches of international mailed
letters did not chill speech, it expressly limited that finding to “the existing system
customs laws are being violated prior to the opening of envelopes” and “flatly
search warrant.” 431 U.S. at 623. Ramsey thus avoided the First Amendment
issue based on “the existing statutory and regulatory protection.” Id. at 624
(footnote omitted).
at 159 (Breyer, J., concurring) (“Customs keeps track of the border searches its
agents conduct, including the reasons for the searches. This administrative process
should help minimize concerns that gas tank searches might be undertaken in an
abusive manner.”) (internal citation omitted); see Heidy, 681 F. Supp. at 1453
28
expressional materials as “constitutionally impermissible” because of “chilling
effect of this risk upon the exercise of first amendment rights of law-abiding
citizens”).
carefully drawn policy to protect privacy or First Amendment rights, either for Mr.
Arnold, 454 F. Supp. 2d at 1004 (“the government has not provided the Court with
any record of the search that was completed at or near the time of the incident”).
IV. CONCLUSION
It is clear from the above discussion that the government’s appeal downplays
the constitutional concerns raised when border agents randomly search and seize
fails to acknowledge the logical end of its argument; the government ultimately
assumes that the Fourth Amendment prohibits the federal courts from offering any
constitutional oversight of border searches and seizures that do not involve the
human body. In so arguing, the government fails to accord personal privacy the
In closing, amici emphasize that the District Court here required only
reasonable suspicion of a crime before border agents may properly search the
contents of a traveler’s computer. Amici, like all Americans, greatly value secure
29
national borders, but also urge the Court to require that our borders be policed
Amici respectfully request that the Court affirm the ruling below.
Respectfully Submitted,
________________________
RANDALL BRATER
Arent Fox LLP
1050 Connecticut Ave., N.W.
Washington, D.C. 20036
202-857-6000
Of Counsel:
JOHN M. GURLEY
TIMOTHY P. KANE
Arent Fox LLP
1050 Connecticut Ave., N.W.
Washington, D.C. 20036
202-857-6000
30