UNITED STATES of America v. Shantia HASSANSHAHI, also known as Shantia Hassan Shahi, also known as Shahi, also known as Shantia Haas, also known as Sean Haas, and Hasston, Inc., Defendants.
Criminal Action No. 13-0274 (RC)
United States District Court, District of Columbia.
Signed December 1, 2014
Although the Court remains deeply concerned about the potential for Dr. Rausser‘s credibility to be a distraction from the ultimate issue of whether the class should be certified, the Court will not set aside all prior briefing and expert reports in this case. The Court has been persuaded by the defendants’ arguments that starting over would be extremely prejudicial to defendants, particularly given the considerable length and cost of the class certification proceedings to date. See, e.g., Nov. 13 Hrg. at 27-35, 53-55.
IV. CONCLUSION
For the foregoing reasons, it is hereby ORDERED that plaintiffs’ motion for leave to file a supplemental expert report [Dkt. No. 742] is GRANTED; it is
FURTHER ORDERED that plaintiffs shall file a supplemental expert report on or before April 1, 2015; it is
FURTHER ORDERED that by April 15, 2015, defendants shall notify the Court whether they intend to file an additional expert report in response and propose a date by which they will do so; and it is
FURTHER ORDERED that by April 22, 2015, the parties shall jointly propose a schedule for defendants’ deposition of plaintiffs’ supplemental expert, the deposition of defendants’ expert, if necessary, and further briefing, if necessary.
SO ORDERED.
Mir Saied Kashani, Los Angeles, CA, John Patrick Pierce, Themis PLLC, Washington, DC, for Defendants.
MEMORANDUM OPINION
Re Document No.: 28
RUDOLPH CONTRERAS, United States District Judge
DENYING DEFENDANT‘S MOTION TO SUPPRESS
I. INTRODUCTION
Defendant Shantia Hassanshahi is charged with one count of conspiracy to violate the International Economic Emergency Powers Act,
II. FACTUAL BACKGROUND1
On August 16, 2011, Homeland Security Investigations (“HSI“) received an unsolicited e-mail from a source indicating that the source had received an e-mail from an Iranian known as M. Sheikhi who, on behalf of his Iranian company, sought the source‘s assistance in procuring protection relays for an Iranian power project. See Akronowitz Aff., ECF No. 37-1 (“2d Akronowitz Aff.“) at ¶ 2. The e-mail from Sheikhi to the source contained an Iranian business telephone number and the address for Sheikhi‘s company in Tehran, Iran. See id. An HSI agent used the telephone number associated with Sheikhi to search an “HSI-accessible law enforcement database” in the hope of identifying potential U.S.-based targets engaged in the sale or export of protection relays for use in Iran. See id. ¶ 3. The HSI agent‘s search returned a single telephone record indicating one call between Sheikhi‘s telephone number and a telephone number with an “818” area code (the “818 number“), which is the area code for Los Angeles, California. See id. ¶ 4.
After discovering that the 818 number was assigned to Google/Google Voice, see id. ¶ 13, HSI prepared and served on Google an Administrative Export Enforcement Control Subpoena (“AEEC Subpoena“). See id. ¶ 14. In response, Google provided information that identified Hassanshahi as the person to whom the 818 number was registered, and Google also provided an e-mail address registered to Hassanshahi. See id. ¶ 15. In addition, Google provided call log information for the period between September 6, 2011, and October 6, 2011, which showed that the 818 number had received one telephone call from an unknown Iranian phone number on October 5, 2011. See id.; Revised Akronowitz Aff., ECF No. 42-1 (“3d Akronowitz Aff.“) at ¶ 15. The Google call log information also revealed one missed call between Hassanshahi‘s 818 number and an unknown Iranian cell phone number on September 19, 2011. See 2d Akronowitz Aff. ¶ 15.
On October 18, 2011, the HSI agent searched the Department of Homeland Security‘s (“DHS“) TECS database for additional information about Hassanshahi.2 See id. ¶ 16. TECS led the agent to discover that Hassanshahi was involved in a prior federal law enforcement investigation into potential violations of the Iran trade embargo.3 See id. ¶ 16a. Specifically, the
investigation occurred in 2003 through an HSI office in California, and the investigation uncovered that Hassanshahi and two partners had established an American company for the purpose of entering into an agreement with a Chinese company to build a computer production facility in Iran. See id. Hassanshahi‘s American company later filed a breach-of-contract claim against the Chinese company in California state court, and that lawsuit was dismissed in part because the contract was unenforceable as against public policy since it involved doing business in Iran, a clear violation of U.S. law. See id. The Department of Justice did not file criminal charges against Hassanshahi for his role in this venture. See id.
The TECS search also revealed a number of earlier instances in which Hassanshahi reentered the U.S. after traveling to the Middle East, including: an incident in 2005 when Hassanshahi was questioned by U.S. Customs and Border Protection (“CBP“) agents after returning from Dubai with $15,000 in cash; an incident in 2006 when Hassanshahi returned from Tehran with a travel companion; and four other returns from Tehran—two in 2008, one in 2010, and one in May 2011. See id. ¶¶ 16c-e. In addition, HSI learned through TECS that Hassanshahi presently was outside the U.S., so HSI supplemented the existing TECS information by entering instructions that HSI should be alerted and Hassanshahi should be referred for secondary screening the next time he returned to the U.S. See id. ¶ 17.
Around December 20, 2011, HSI served Google with a second AEEC Subpoena, this time seeking subscriber information and recent Internet protocol (“IP“) logs for Hassanshahi‘s Google e-mail account. See id. ¶ 18. In response, Google provided information indicating that Hassanshahi‘s e-mail account was accessed from an Iran IP address twenty-four times between December 8, 2011, and December 15, 2011. See id. The information provided by Google also showed, however, that Hassanshahi‘s e-mail account was accessed from a U.S. IP address on the same day it apparently was accessed from an Iran IP address, including sometimes within just a few minutes of each other. See Def.‘s Reply Supp. Mot. Dismiss Ex. 1 at 27 (Google Subscriber Information). And on another occasion, Hassanshahi‘s e-mail account apparently was accessed on the same day from an Iran IP address, a Germany IP address, and a U.S. IP address, occasionally alternating between the countries within minutes. See id. at 30.
On January 11, 2012, HSI was alerted that Hassanshahi would be returning to the U.S. the next day through Los Angeles International Airport (“LAX“). See 2d Akronowitz Aff. ¶ 19. When Hassanshahi
Now before the Court is Hassanshahi‘s motion to suppress the evidence discovered during the forensic examination of his laptop. Hassanshahi asserts two arguments in support of his motion. First, he argues that the law enforcement database through which HSI initially obtained his 818 number constituted an unconstitutional search, and under the fruit of the poisonous tree doctrine, the forensic laptop examination was the direct result of that unlawful search such that the laptop evidence was tainted and must be suppressed. Second and alternatively, Hassanshahi argues that this Court should follow two recent court decisions from other federal jurisdictions that concluded that the Fourth Amendment required reasonable suspicion to conduct a forensic examination of an electronic device after an international border stop.5 Hassanshahi then argues that the laptop evidence must be suppressed here because the Government lacked reasonable suspicion for the search. The Court addresses these arguments below.
III. ANALYSIS
Hassanshahi‘s motion to suppress requires the Court to analyze two important areas of Fourth Amendment jurisprudence: the fruit of the poisonous tree doctrine and international border searches. As to the first issue, it is well settled that evidence secured as the result of an illegal search or seizure is tainted fruit of a poisonous tree that must be suppressed, unless intervening events or other attenuating circumstances sufficiently dissipated the taint of the initial illegality. The Court ultimately finds that such attenuating circumstances existed here, and the exclusionary rule therefore does not require suppression of the evidence found on Hassanshahi‘s laptop. Second, the Court finds that reasonable suspicion existed for the forensic examination of Hassanshahi‘s laptop after it was seized during the international border stop at LAX. Finally, because the Court reaches this conclusion as to reasonable suspicion, it need not—and
, cert. denied, --- U.S. ---, 134 S. Ct. 899, 187 L. Ed. 2d 833 (2014), reh‘g denied, --- U.S. ---, 134 S. Ct. 1512, 188 L. Ed. 2d 390 (2014); United States v. Saboonchi, 990 F. Supp. 2d 536 (D. Md. 2014), reconsideration denied, No. CRIM. PWG-13-100, 48 F. Supp. 3d 815, 2014 WL 3741141 (D. Md. July 28, 2014).A. Legal Standard For Motion To Suppress
Generally, “[t]he proponent of a motion to suppress has the burden of establishing that his own Fourth Amendment rights were violated by the challenged search or seizure.” Rakas v. Illinois, 439 U.S. 128, 130 n.1 (1978) (citations omitted). However, when, like here, ““a defendant produces evidence that he was arrested or subjected to a search without a warrant, the burden shifts to the government to justify the warrantless arrest or search.“” United States v. Jones, 374 F. Supp. 2d 143, 147 (D.D.C. 2005) (quoting United States v. de la Fuente, 548 F.2d 528, 533 (5th Cir. 1977)); see also United States v. Jeffers, 342 U.S. 48, 51 (1951) (“[T]he burden is on those seeking the exemption to show the need for it[.]” (citation omitted)); United States v. Mangum, 100 F.3d 164, 169 (D.C. Cir. 1996) (“The government carries the burden of showing that the measures employed during the stop were justified.“).
B. Fruit Of The Poisonous Tree And Attenuation
The Fourth Amendment protects “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”
The fruit of the poisonous tree doctrine was developed within the context of the Supreme Court‘s exclusionary rule jurisprudence. Under the doctrine, an illegal search or seizure requires the exclusion at trial of not only the evidence seized in violation of the Fourth Amendment, but also any evidence obtained as a result of that seizure if the “seizure is a but-for cause of the discovery of the evidence (a necessary condition), and if the causal chain has not become ‘too attenuated to justify exclusion,‘” United States v. Brodie, 742 F.3d 1058, 1062-63 (D.C. Cir. 2014) (quoting Hudson v. Michigan, 547 U.S. 586, 592 (2006)), “or, to put the same point with another metaphor, if circumstances have
1. Existence Of An Initial Unlawful Search Or Seizure
The Court‘s preliminary inquiry is whether an unlawful search or seizure occurred. Hassanshahi argues that the law enforcement database in which the HSI agent ran a search using Sheikhi‘s business telephone number must be either the National Security Agency‘s (“NSA“) bulk telephony metadata program or an equivalent telephony database. See Def.‘s Mem. Supp. Mot. Suppress 18-30. Hassanshahi then relies on Judge Leon‘s opinion in Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013), appeal pending, No. 14-5004 (D.C. Cir.), to establish the facial unconstitutionality of the NSA telephony program or, by implication, the unconstitutionality of the unknown equivalent database allegedly used by HSI here.
In response, the Government sidesteps Hassanshahi‘s argument by taking the position that although the NSA telephony database was not used, the Court nevertheless should assume arguendo that the law enforcement database HSI did use was unconstitutional. See Gov‘t‘s Mem. Opp‘n Mot. Suppress 12. Consistent with this position, the Government refuses to provide details about its law enforcement database on the basis that such information is irrelevant once the Court accepts the facial illegality of the database. See id. at 11-12. Regrettably, the Court therefore starts its analysis from the posture that HSI‘s initial search of the mysterious law enforcement database, which uncovered one call between Sheikhi‘s business telephone number and the 818 number linked to Hassanshahi, was unconstitutional.
2. But-For Causation
Next, the Court finds that the existence of but-for causation between the law enforcement database search and the forensic laptop examination is quite plain. See Brodie, 742 F.3d at 1062-63 (explaining that “but-for” causation is a “necessary condition” in the fruit of the poisonous tree analysis); see also Owens v. Republic of Sudan, 412 F. Supp. 2d 99, 111 (D.D.C. 2006) (but-for causation asks: “were the act removed from the sequence of events leading up to the injury, would the injury have occurred as it did?“). Here, the law enforcement database search revealed the 818 number, which led HSI to subpoena Google, through which HSI learned that the 818 number was registered to Hassanshahi. HSI then investigated Hassanshahi through TECS and by issuing a second subpoena to Google, which together led HSI to place an alert in TECS requiring CBP officers to refer Hassanshahi for secondary screening the next time he returned to the U.S. Finally, when Hassanshahi arrived at LAX, CBP officers followed the TECS instruction by referring Hassanshahi to secondary screening, and Hassanshahi‘s laptop then was seized and sent to Virginia for the forensic examination. As such, the Court easily concludes that “but for” the initial law enforcement database search, the forensic laptop examination would not have occurred.
3. Attenuation And The Exclusionary Rule
“[N]ot... all evidence is ‘fruit of the poisonous tree’ simply because it would not have come to light but for the illegal actions of the police.” Wong Sun, 371 U.S. at 487-88. Instead, exclusion is not required when “the government proves... that the evidence would have been discovered inevitably, was discovered through independent means, or that its discovery was so attenuated from the illegal search or seizure that the taint of the unlawful government conduct was dissipated.” United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007) (citations omitted). Here, the Government argues that attenuation existed, and the Supreme Court has identified three factors for courts to consider when determining attenuation: (1) the amount of time between the illegality and the discovery of the evidence, i.e., temporal proximity; (2) the presence of intervening circumstances; and (3) the purpose and flagrancy of the illegal conduct. See Brodie, 742 F.3d at 1063 (citing Brown v. Illinois, 422 U.S. 590, 603-04 (1975)). The Government bears the burden of proving attenuation by a preponderance of the evidence. See Holmes, 505 F.3d at 1293; United States v. Wood, 981 F.2d 536, 541 (D.C. Cir. 1992).
a. Temporal Proximity
The Court first considers the temporal proximity between the illegality and the discovery of the evidence. See Brodie, 742 F.3d at 1063. The Government‘s affidavit shows that more than four months passed between the unconstitutional law enforcement database search on August 24, 2011, and the forensic laptop examination on January 17, 2012. See 2d Akronowitz Aff. ¶¶ 13, 21. Though “there is no ‘bright-line’ test for temporal proximity” within the attenuation analysis, see United States v. Reed, 349 F.3d 457, 463 (7th Cir. 2003), the Court finds that this several month gap—during which the Government continued to investigate Hassanshahi through unrelated sources, including the use of preexisting evidence in TECS and the issuance of lawful subpoenas to Google—weighs in favor of not suppressing the laptop evidence. Compare United States v. Gross, 662 F.3d 393, 402 (6th Cir. 2011) (finding that two month gap between the unlawful seizure and defendant‘s voluntary confession suggests attenuation as to the confession), United States v. Roberts, No. 11-CR-0018, 2012 WL 1033515, at *7 (E.D. Pa. Mar. 28, 2012) (finding that the “temporal proximity” factor weighed against suppression when over two months elapsed between the initial unlawful search and defendant‘s consent to a second search that revealed incriminating evidence), and United States v. Lawrence, No. CRIM.05-333, 2006 WL 752920, at *6 (D. Minn. Mar. 23, 2006) (finding attenuation in part because four months passed between the illegal search and arrest and the later incriminating statements made by defendant), with United States v. Miller, 146 F.3d 274, 280 (5th Cir. 1998) (finding that the ninety second time period between the illegal stop and the search did not support the government‘s attenuation claim), United States v. Green, 111 F.3d 515, 521 (7th Cir. 1997) (explaining that the fact that only five minutes elapsed between the illegal stop and the search of the car weighed against attenuation), and United States v. Cebal-los, 812 F.2d 42, 50 (2d Cir. 1987) (finding that “the [consent] to search and the statements given were too closely connected in context and time... to break the chain of illegality” when only a few minutes had elapsed).
b. Intervening Circumstances
The Court next considers whether there were intervening circumstances sufficient to break the causal chain and lessen the taint of the initial illegality. See Brodie, 742 F.3d at 1062-63. Often, the intervening circumstance that most strongly dissipates the evidentiary taint is a “voluntary act by the defendant.” Green, 111 F.3d at 522; see also United States v. Jackson, No. A04-141 CR, 2005 WL 1115466, at *17 (D. Alaska May 10, 2005) (“A defendant may himself commit an intervening independent act that will be sufficient in relation to other events for attenuation purposes.” (citing United States v. Sprinkle, 106 F.3d 613, 619 (4th Cir. 1997))). In opposition to Hassanshahi‘s motion to suppress, the Government offers two intervening events: HSI‘s investigative steps following discovery of the 818 number, which itself was just a minor lead in the case; and Hassanshahi‘s voluntary appearance at LAX after arriving on an international flight. See Gov‘t‘s Mem. Opp‘n Mot. Suppress 13.
i. Hassanshahi‘s Arrival At LAX
Starting with the latter event, the Court finds that Hassanshahi‘s voluntary arrival at LAX was a relevant intervening circumstance, but at the same time, the Court is uncertain how much weight to give this event. Because Hassanshahi‘s arrival at LAX on an inbound international flight provided the Government with justification to conduct a border search, this situation is somewhat analogous to the more common instance in which a defendant, through new conduct following an unlawful search or seizure, gives the police a fresh basis for conducting a legal search or seizure. For example, in United States v. Sprinkle, 106 F.3d 613 (4th Cir. 1997), the Fourth Circuit held that when the defendant fled from and fired a gun at an officer while resisting an unjustified investigative stop, the defendant committed a new crime that “purged the taint of the prior illegal stop” and provided the officer with probable cause to arrest the defendant and then seize a gun that was in plain view at the scene of the new crime. Id. at 619.
Similarly, in United States v. Jackson, No. A04-141 CR, 2005 WL 1115466 (D. Alaska May 10, 2005), the district court held that when the defendant disobeyed an order by a uniformed officer during an unlawful stop and fled down the street, the officer acquired new and sufficient justification to pursue the fleeing defendant, seize the defendant, and then conduct a pat-down search of the defendant, which revealed contraband in the defendant‘s possession. Id. at *14-16; see also United States v. Allen, 619 F.3d 518, 526 (6th Cir. 2010) (“Here, there was an initial attempt at a traffic stop, which [the defendant] claims to have been illegal, followed by an attempt to escape from the police by leading the officers on a high-speed chase.... [T]he act of fleeing from police officers constituted a new, distinct crime that rendered evidence subsequently seized admissible.“); United States v. Hooker, No. 94-5863, 54 F.3d 774, *2 (4th Cir. 1995) (finding that defendant‘s “voluntary action” of coming out of her home, approaching the officers, and stating that her “conscience” was bothering her and the officers thus could enter and search her home were adequate intervening circumstances to purge taint of the earlier unlawful seizure and search of defendant‘s car).
As these cases illustrate, a voluntary act by a person following initial unlawful law enforcement conduct can provide an officer with new grounds for conducting a lawful search or seizure such that the exclusionary rule does not apply to any newly recovered evidence. This concept, however, may get the Government only so far: though Hassanshahi‘s arrival at LAX provided justification to conduct a border search, Hassanshahi argues that the forensic laptop examination went beyond a routine suspicionless border search and
ii. The 818 Number “Lead” And The Need For Further Investigation
Federal courts consistently have held that the exclusionary rule does not apply to subsequently discovered evidence when an initial limited piece of information—typically the name of a potential target for investigation—is obtained through an illegal search or seizure because substantial intervening investigative steps still are required to uncover the necessary incriminating evidence. The seminal case on this “unlawful lead” principle came from Judge Friendly in United States v. Friedland, 441 F.2d 855 (2d Cir. 1971). There, federal officers illegally bugged the offices of the defendant‘s acquaintance, and those officers then informed other agents that the defendant should be investigated based on conversations the officers illicitly overheard. See id. at 854-57. In refusing to suppress inculpatory evidence about the defendant that was discovered through further lawful investigation, the court held that it “would stretch the exclusionary rule beyond tolerable bounds” to “grant lifelong immunity from investigation and prosecution simply because a violation of the Fourth Amendment first indicated to the police that a man was not the law-abiding citizen he purported to be.” Id. at 861.
Other courts have taken a similar approach since Friedland by refusing to apply the exclusionary rule to suppress evidence that was discovered during a later investigation following the initial unlawful discovery of evidence that merely pointed law enforcement in the defendant‘s direction. For instance, in United States v. Carter, 573 F.3d 418 (7th Cir. 2009), the court explained that “[f]ew cases, if any, applying the attenuation exception hold that evidence separately uncovered through completely lawful means is inadmissible because an illegal search first made a particular person a suspect in a criminal investigation.” Id. at 423. The court then concluded that an out-of-court identification was admissible under the attenuation exception even though law enforcement‘s original interest in the defendant arose through the discovery of an “Inmate ID Card” bearing the defendant‘s name during a prior unlawful search. Id. at 420, 423.
Similarly, in United States v. Watson, 950 F.2d 505 (8th Cir. 1991), the court held that when “a law enforcement officer merely recommends investigation of a particular individual based on suspicions arising serendipitously from an illegal search, the causal connection is sufficiently attenuated so as to purge the later investigation of any taint from the original illegality.” Id. at 508. The court then concluded that
The circumstances here even more strongly compel finding attenuation than in the above cases because the law enforcement database search revealed only the slimmest of leads: the 818 number. HSI thus was required to take an additional investigative step just to find a name associated with the 818 number, as compared to the typical “unlawful lead” case in which the defendant‘s full identify is discovered through the illegal search or seizure. In addition, HSI acted lawfully by subpoenaing Google for information about the owner of the 818 number, and HSI‘s four month investigation between obtaining the 818 number and conducting the forensic laptop examination primarily involved the use of information in TECS that existed before the initial database search, which further shows that the 818 number, at most, “tipped off the [G]overnment... to the probable identity of the perpetrator.” United States v. Smith, 155 F.3d 1051, 1063 (9th Cir. 1998); cf. United States v. Crews, 445 U.S. 463, 475 (1980) (“The exclusionary rule... does not reach backward to taint information that was in official hands prior to any illegality.“). Accordingly, the Court concludes that the discovery of the laptop evidence occurred only through substantial and essential intervening events following the “unlawful lead” that was the 818 number, and this factor therefore weighs strongly in favor of not excluding that evidence.
c. Purpose And Flagrancy Of The Illegal Conduct
Lastly, the Court considers the “purpose” and “flagrancy” of the illegal law enforcement conduct. See Brodie, 742 F.3d at 1063. As a rule, courts generally “favor suppression” only “if law enforcement officials conducted the illegal search with the purpose of extracting evidence against the defendant, or if they flagrantly broke the law in conducting the search.” United States v. Washington, 387 F.3d 1060, 1075 (9th Cir. 2004) (citation omitted); see also Davis, --- U.S. ---, 131 S. Ct. at 2427 (“When the police exhibit ‘deliberate,’ ‘reckless,’ or ‘grossly negligent’ disregard for Fourth Amendment rights, the benefits of exclusion tend to outweigh the costs.” (citation omitted)). In contrast, when law enforcement officials acted with an “objectively reasonable good-faith belief that their conduct is lawful, or when their conduct involves only simple, isolated negligence, the deterrent value of suppression is diminished, and exclusion cannot ‘pay its way.‘” Davis, 131 S. Ct. at 2427 (citations omitted); see also, e.g., United States v. Boone, 62 F.3d 323, 325 (10th Cir. 1995) (noting that “a mistaken belief” that the defendant “had consented to the search... rises to the level of a Fourth Amendment violation, [but] it does not qualify as flagrant misconduct that would tilt the scales against attenuation“); United States v. Ramos, 42 F.3d 1160, 1164 (8th Cir. 1994) (holding that attenuation existed when, among other considerations, the “officer‘s conduct was in good faith” and “not flagrant“); United States v. Richard, 994 F.2d 244, 252 (5th Cir. 1993) (holding that attenuation existed when, among other considerations, “both agents reasonably
The Court, however, is left slightly in the dark regarding the flagrancy element because the Government has strategically refused to provide details about the law enforcement database it used. Based on the Government‘s affidavits and briefing on the motion to suppress, the Court knows only that the database was accessible to HSI and that this database was not the NSA program discussed in Klayman. The Court may surmise, though, that the law enforcement database operates fairly similarly to the NSA program, at least insofar as the database also appears to include a repository of aggregated telephone records for calls made into the U.S. from abroad. Cf. Klayman, 957 F. Supp. 2d at *14-19 (describing the NSA‘s bulk telephony program). The Court can reach this conclusion because HSI used the database to search retrospectively for telephone calls between Sheikhi‘s Iranian telephone number and any U.S. number, which suggests that the database includes, at a minimum, a collection of past telephone calls from foreign numbers into the U.S.
Such ambiguity, however, leaves the Court in a difficult position. For example, if the Court treats the HSI law enforcement database as functionally equivalent to the NSA telephony program, the Court likely would conclude that HSI acted in good faith because federal courts generally have approved of the NSA program, with the exception being Judge Leon‘s opinion in Klayman, which itself is on appeal before the D.C. Circuit. See Gov‘t‘s Mem. Opp‘n Mot. Suppress 19 n.5 (citing cases upholding the NSA program). Further, even if the Court accepts Klayman as the authoritative statement on the NSA program‘s legality, Klayman was not decided until 2013, while the HSI database search occurred in 2011, at which time it appears that no federal court had deemed the program unconstitutional. See Davis, 131 S. Ct. at 2429 (“Evidence obtained during a search conducted in reasonable reliance on binding precedent is not subject to the exclusionary rule.“).
But, at the same time, the Court does not know with certainty whether the HSI database actually involves the same public interests, characteristics, and limitations as the NSA program such that both databases should be regarded similarly under the Fourth Amendment. In particular, the NSA program was specifically limited to being used for counterterrorism purposes, see Klayman, 957 F. Supp. 2d at 15-16, and it remains unclear if the database that HSI searched imposed a similar counterterrorism requirement. If the HSI database did have such a limitation, that might suggest some level of flagrancy by HSI because it was clear that neither Sheikhi nor Hassanshahi was involved in terrorism activities. With so many caveats, the Government‘s litigation posture leaves the Court in a difficult, and frustrating, situation. Yet, even assuming that the HSI database was misused to develop the lead into Hassanshahi, HSI‘s conduct appears no more flagrant than law enforcement conduct in other “unlawful lead” cases, which still held that the attenuation exception applied nonetheless.6 Cf. Carter, 573 F.3d at 421 (admitting evidence after
The Court is more certain, though, that HSI did not search the law enforcement database for the purpose of “extracting evidence against the defendant.” Washington, 387 F.3d at 1075 (citation omitted). When it executed the database search using Sheikhi‘s business telephone number, HSI had no inclination that Hassanshahi was involved with Sheikhi or his company; indeed, the agency used the law enforcement database to cast a wide net for potential U.S.-based suspects for the very reason that it had no leads into U.S. suspects at the time. Thus, although that net eventually ensnared Hassanshahi, the lack of initial targeting compels the Court to conclude that HSI did not act purposefully or in bad faith to violate Hassanshahi‘s constitutional rights.
4. United States v. Scios and United States v. Najjar Do Not Compel A Different Result
Finally, the Court must address two arguments raised through Hassanshahi‘s reply memorandum. First, Hassanshahi argues that the D.C. Circuit‘s en banc decision in United States v. Scios, 590 F.2d 956 (D.C. Cir. 1978), is directly on point and compels against finding attenuation. See Def.‘s Reply Supp. Mot. Suppress 20-19. In Scios, law enforcement agents illegally searched sixty file folders located in the defendant‘s home after the defendant had been arrested. See id. at 958. One of the folders contained various papers, including a credit card receipt for a motel bearing the defendant‘s name and an itemized bill from the same motel indicating that “Mr. Massa” had registered for the room. See id. The agents issued a subpoena to require Massa to appear before a grand jury regarding the defendant‘s possible unlawful activity, namely wiretapping. See id. Massa initially refused to testify, but he later agreed after the prosecutor granted him immunity and threatened contempt for any further refusal. See id. at 958-59. After the defendant was indicted, he moved to suppress Massa‘s testimony as fruit of the illegal seizure of the credit card receipt. See id. at 959. The en banc court held that Massa‘s testimony was inadmissible because his decision to testify was “made solely to avoid being jailed for contempt.” Id. at 961. The court also noted that the taint from the illegal search had not dissipated because the agents were unaware of Massa‘s existence prior to the search, and because Massa agreed to testify only in response to official pressure, not through his own volition. Id. at 963-64.
The Court finds that Scios is inapplicable to the instant case. Scios involved applying the fruit of the poisonous tree doctrine to testimony from a witness whose identity was uncovered through a search that violated the defendant‘s Fourth Amendment rights. Thus, in Scios, and in other cases relying on Scios since then, the question was whether a witness voluntarily had chosen to testify such that the testimony may be considered attenuated from the prior unlawful search. See Scios, 590 F.2d at 960 (“In certain circumstances, the attenuation doctrine has been applied where the witness who has been located as the result of an illegal search or seizure has voluntarily decided to testify.” (citations omitted)); id. (“Turning to the case before us, we examine first the claim that the taint of the illegal seizure was attenuated by a voluntary decision to testify.“); see also United States v. Stevens, 612 F.2d 1226, 1230 (10th Cir. 1979)
Here, there is no witness testimony against Hassanshahi, and even stretching Scios to its plausible limits, Hassanshahi has not, and cannot, demonstrate how any relevant physical evidence against him might be considered “coerced” like the witness in Scios. Cf. Scios, 590 F.2d at 961 (“[I]t is plain that Massa‘s giving of testimony before the grand jury, and presumably at the trial is purely and simply a product of coercion.“). Instead, the unlawful law enforcement database search allowed HSI to uncover the identity of Hassanshahi—the defendant, not a witness and not evidence in and of itself—by linking him to the 818 number through the Google subpoena; the 818 number then led HSI to other physical evidence, such as that in TECS, not any witness testimony.
Accordingly, the scenario here is both factually and legally distinct from Scios. The correct analysis, in fact, involves the “wrongful lead” cases, discussed above, in which a limited piece of illegally obtained evidence directs law enforcement to focus its subsequent lawful investigation on the defendant, not on involuntary witness testimony cases like Scios.7
Second, Hassanshahi suggests through his reply memorandum that United States v. Najjar, 300 F.3d 466 (4th Cir. 2002), requires the Court to find a lack of attenuation here. See Def.‘s Reply Supp. Mot. Suppress 23-25. Not so. In Najjar, the defendant argued that the district court erred by admitting evidence obtained through two search warrants when much of the evidence used to obtain those two warrants came from the execution of an earlier warrant in 1995 that later was invalidated. See id. at 475. In affirming the district court‘s decision, the Fourth Circuit explained that the officer‘s “investigation was not a simple matter of looking at salvage certificates obtained in the 1995 search and obtaining new evidence from their use, rather it was a substantial investigative effort unconnected to the seized documents themselves[.]” Id. at 479. The court then relied on a theory similar to the “wrongful lead” doctrine by explaining that “it is not enough that the original certificates may have triggered [the officer‘s] suspicion or gave impetus or direction toward what is to be focused on by
Though HSI‘s investigation into Hassanshahi lasted several months rather than two years, the conclusion in Najjar is consistent with the Court‘s decision here because of the significant investigative steps HSI took between the database search and the forensic examination, as well as the limited probative value of the unlawfully discovered 818 number. To distinguish the cases, Hassanshahi asserts that “no time at all passed between the illegal search (accessing the telephony database) and when the agent ordered the computer search when and if Hassanshahi returned to the U[.]S.” Def.‘s Reply Supp. Mot. Suppress 25. But Hassanshahi‘s argument misstates the facts of the case and therefore focuses on the wrong timeframe. In reality, the HSI agent did not order the forensic examination “when and if Hassanshahi returned to the U[.]S.” Id. Instead, on November 29, 2011, the agent “augmented the existing TECS records regarding Hassanshahi by entering instructions that [the agent] should be alerted if and when [Hassanshahi] returned to the United States, and that [Hassanshahi] should be referred for secondary screening by [CBP] officers when he returned to the U.S.” 2d Akronowitz Aff. ¶ 17. There is no support in the record for Hassanshahi‘s claim that the forensic examination also was ordered on November 29 or, for that matter, at any other time prior to Hassanshahi‘s arrival at LAX on January 12, 2012. Indeed, the record does not reflect any evidence that law enforcement had any way of knowing which devices, if any, Hassanshahi would possess when he eventually crossed the border at a then-unknown date.
Alternatively, even if the Court used November 29, 2011, as the relevant date, most of the key investigative steps leading to the forensic examination already had occurred between then and the August 24, 2011, database search such that the same temporal proximity analysis should apply. Thus, Hassanshahi‘s suggestion that “[t]here was no time for any independent investigation” during this two month period, see Def.‘s Reply Supp. Mot. Suppress 25, is not supported by the undisputed facts in the record, which show that HSI did conduct an independent investigation in this period by using, for example, TECS and a Google subpoena.8 Lastly, Hassanshahi asserts that Najjar is distinguishable because the circuit court there agreed with the district court‘s finding that the original violation was not purposeful or flagrant. See id. As this Court has explained, however, it reaches the same conclusion as Najjar about the lack of purposefulness or flagrancy with regard to the database search. Simply put, then, nothing in Najjar requires a different conclusion here.9
In sum, the Court finds that all three attenuation factors compel in favor of finding that the initial taint of illegality from the law enforcement database search was purged. Accordingly, the Court concludes that the “causal chain” leading to the discovery of laptop evidence was “too attenuated to justify exclusion.” Brodie, 742 F.3d at 1063 (citation and quotation omitted). The Court therefore refuses to suppress the laptop evidence on this basis.
C. Reasonable Suspicion Existed For The Forensic Laptop Examination
The broad power of the Government to conduct searches at the international borders is rooted in “the longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into this country.”10 United States v. Ramsey, 431 U.S. 606, 621 (1977). The Supreme Court therefore has explained that “[t]he Government‘s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.” United States v. Flores-Montano, 541 U.S. 149, 152 (2004). Given the strong interests at stake, the Supreme Court has “[t]ime and again... stated that ‘searches made at the border... are reasonable simply by virtue of the fact that they occur at the border.‘” Id. at 152-53 (quoting Ramsey, 431 U.S. at 616). Notwithstanding this sweeping language about the Government‘s expansive border search power, the Supreme Court has suggested over the years that the Fourth Amendment may impose some limits even at the nation‘s borders, though the Court has not always spoken definitively on that subject, nor has it clearly defined such limits, if any. Cf. Flores-Montano, 541 U.S. at 152-53, 155-56 (noting that there are “reasons that might support a requirement of some level of suspicion in the case of highly intrusive searches of the person-dignity and privacy interests of the person being searched,” as well as in the case of searches of property that are “destructive“); United States v. Montoya de Hernandez, 473 U.S. 531, 541 & n.4 (1985) (noting that the Court has “not previously decided what level of suspicion would justify a seizure of an incoming traveler for purposes other than a routine border search“); Ramsey, 431 U.S. at 618 n.13 (leaving open the question of “whether, and under what circumstances, a border search might be deemed ‘unreasonable’ because of the particularly offensive manner in which it is carried out“). Indeed, “the ultimate touchstone of the Fourth Amendment is ‘reasonableness,” Brigham City, Utah v. Stuart, 547 U.S. 398, 403 (2006), so it appears only logical that some circumstance might arise at the border when the Government‘s conduct nudges into unreasonableness territory.
Hassanshahi now argues that this Court should recognize one such limit to the border search power by following two recent federal court decisions—United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013),
1. Reasonable Suspicion Standard
Reasonable suspicion exists when a law enforcement officer has “specific and articulable facts,” which, considered together with rational inferences from those facts, indicate that criminal activity “may be afoot.” Terry v. Ohio, 392 U.S. 1, 21, 30 (1968). When making the reasonable suspicion determination, courts are instructed to view the “totality of the circumstances” and not engage in a “divide-and-conquer analysis” in which courts consider whether each fact is “susceptible to an innocent explanation.” United States v. Arvizu, 534 U.S. 266, 274 (2002). Thus, “[a] determination that reasonable suspicion exists... need not rule out the possibility of
innocent conduct.” Id. at 274 (citation omitted).
In addition, officers may “draw on their own experience and specialized training to make inferences from and deductions about the cumulative information available to them that ‘might well elude an untrained person.‘” Id. at 273 (quoting United States v. Cortez, 449 U.S. 411, 418 (1981)); see also Ornelas v. United States, 517 U.S. 690, 699 (1996) (reviewing court must give “due weight” to factual inferences drawn by law enforcement officers). Though an officer‘s reliance on a mere “inchoate and unparticularized suspicion or ‘hunch‘” is insufficient to establish reasonable suspicion, see Terry, 392 U.S. at 27, the likelihood of criminal activity need not rise to the level required for probable cause, nor even to the preponderance of the evidence standard. See United States v. Sokolow, 490 U.S. 1, 7 (1989).
Before turning to the reasonable suspicion analysis, the Court notes that it must exclude from the calculus evidence of the one telephone call between Sheikhi‘s business phone number and Hassanshahi‘s 818 number because this evidence was the clear and direct result of an unconstitutional search, as conceded by the Govern-
2. Hassanshahi‘s Criminal History And Frequent Travel To Iran
Prior to conducting the forensic examination, HSI conducted research on Hassanshahi in TECS, which led HSI to discover details about a 2003 federal investigation into Hassanshahi‘s participation in a conspiracy to establish an American company for the purpose of entering into an agreement with a Chinese company to build a computer production facility in Iran.12 Federal circuit courts have consistently held, however, that a person‘s criminal history is insufficient to create reasonable suspicion by itself. See, e.g., United States v. Johnson, 482 Fed. Appx. 137, 148 (6th Cir. 2012) (“The fact that [defendant] had committed crimes in the past, while it has a place in the reasonable-suspicion analysis, is not, without more, strong evidence of criminal activity in the present.“); United States v. Walden, 146 F.3d 487, 490 (7th Cir. 1998) (“Reasonable suspicion of criminal activity cannot be based solely on a person‘s prior criminal record.“). But, at the same time, “criminal history contributes powerfully to the reasonable suspicion calculus,” United States v. Santos, 403 F.3d 1120, 1132 (10th Cir. 2005), and an officer‘s “knowledge of the individual‘s criminal history help[s] to dispel any likeli-
Here, HSI‘s 2003 investigation into Hassanshahi‘s scheme to violate the Iran trade embargo was relevant for more than just establishing Hassanshahi‘s general history with law enforcement, as his past activity in Iran also negatively colored the perception of any future travel by him to that specific country. Thus, Hassanshahi‘s travel to Iran after 2003 should not be measured as general travel abroad to a foreign country like another person‘s travel might, but rather as him returning to the specific “scene of the crime,” for lack of a better term. Travel to Iran, then, becomes a particularized and objective fact potentially indicative of ongoing criminal activity by Hassanshahi because one quite reasonable explanation for his ongoing presence in Iran was that he continued to conduct business involving that country, similar to what he did in 2003. Cf. Reid v. Georgia, 448 U.S. 438, 440-41 (1980) (finding no reasonable suspicion in large part because defendant‘s arrival “from Fort Lauderdale, which the agent testified is a principal place of origin of cocaine sold elsewhere in the country[,]... describe[d] a very large category of presumably innocent travelers, who would be subject to virtually random seizures were the Court to conclude that as little foundation as there was in this case could justify a seizure.“); Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (criticizing the majority for finding reasonable suspicion based in large part on defendant recently traveling to Mexico, a country broadly associated with “sex tourism,” because using such a generic fact to support reasonable suspicion potentially means that “thousands of individuals—many with decades-old convictions—will now be forced to reconsider traveling to entire countries or even continents, or will need to leave all their electronic equipment behind, to avoid arousing a ‘reasonable’ suspicion.“).
In addition, TECS revealed not only that Hassanshahi was in Iran for some period of time between late 2011 and early 2012, but also that he had returned from Iran in 2006, twice in 2008, once in 2010, and once again in May 2011. Given Hassanshahi‘s history in acting to violate the Iran trade embargo, these frequent trips potentially were suggestive of a continuous illegal business relationship with someone in Iran, or with the country‘s government itself. Cf. United States v. Glover, 353 Fed. Appx. 314, 317 (11th Cir. 2009) (finding that defendant‘s multiple “trips to Trinidad, which was known to be a high drug trafficking location,” were indicative of drug smuggling and helped support reasonable suspicion); Hurn v. United States, 221 F. Supp. 2d 493, 503 (D.N.J. 2002) (finding that defendant‘s “repeated, prior trips to Jamaica,” a “known drug source country,” were indicative of drug smuggling and helped support reasonable suspicion); United States v. Clymore, 515 F. Supp. 1361, 1367 (E.D.N.Y. 1981) (evidence that defendant was returning from a trip to Pakistan, a country known as a source of narcotics; that defendant had made a number of other trips to the Middle East; and that defendant previously had been arrested for attempted smuggling supported finding reasonable suspicion to conduct invasive strip search at airport).
This possibility was reinforced by the fact that in 2005, Hassanshahi was stopped, questioned, and then released by CBP officers after he returned from Dubai with $15,000 in cash, an act that also might suggest continued business activity in the Middle East following the 2003 investigation. Further, when Hassanshahi landed at LAX on January 12, 2012, he had approximately $7,000 in cash in his posses-
3. Accessing E-Mail Account In Iran And Telephone Calls From Iran
HSI also understood that Hassanshahi‘s e-mail account was accessed twenty-four times from an Iran IP address between December 8, 2011, and December 15, 2011. At the same time, however, this account was accessed from IP addresses in multiple other countries within minutes of apparently being accessed in Iran, which may suggest that other users had access to the account. Nonetheless, a “determination that reasonable suspicion exists... need not rule out the possibility of innocent conduct,” Arvizu, 534 U.S. at 277, 122 S. Ct. 744, and Hassanshahi‘s seemingly frequent use of e-mail while in Iran suggests that he may have been conducting business while traveling to that country, especially in light of the 2003 investigation.
In addition, HSI possessed evidence that around the same time Hassanshahi traveled to Iran, he also made contact with one Iranian telephone number and received a missed call from another Iranian number. Though it certainly is possible that these two telephone calls were nothing more than innocent conduct by Hassanshahi, it also is plausible that the calls further indicated Hassanshahi‘s continued involvement in prohibited activities inside Iran. Again, as the Supreme Court and the D.C. Circuit have explained, “that an individual‘s conduct is ‘ambiguous and susceptible of an innocent explanation’ does not mean that it may not be grounds for suspicion: ‘Terry recognized that... officers could detain [such] individuals to resolve the ambiguity.” United States v. Brown, 334 F.3d 1161, 1168 (D.C. Cir. 2003) (quoting Illinois v. Wardlow, 528 U.S. 119, 125-26 (2000)) (alteration in Brown).
4. Possession Of Multiple Electronic Devices At LAX
Finally, one additional fact weighs in favor of reasonable suspicion existing before the forensic laptop examination. When Hassanshahi landed at LAX, he possessed multiple electronic devices and data storage accessories, including a laptop computer, multimedia cards, thumb drives, a camcorder, SIM cards, and a cell phone. See 1st Akronowitz Aff. ¶ 19. Though it generally is unremarkable nowadays for a person traveling abroad to bring a computer, camcorder, or cell phone with them, Hassanshahi‘s possession of multiple data storage devices appears to be inconsistent with just personal use while traveling. Instead, one reasonable inference was that
5. Totality Of The Circumstances And Reasonable Suspicion
Judicial review of the Government‘s argument for reasonable suspicion is “not a rubber stamp.” United States v. Freeman, 735 F.3d 92, 103 (2d Cir. 2013). At the same time, however, the Court is mindful that reasonable suspicion sets a “low threshold,” United States v. Rivera, 353 Fed. Appx. 535, 537 (2d Cir. 2009), and requires only a “minimal level of objective justification.” United States v. Edmonds, 240 F.3d 55, 59 (D.C. Cir. 2001) (quoting INS v. Delgado, 466 U.S. 210, 217 (1984)). Further, though the contemporaneous evidence against Hassanshahi was, in a vacuum, innocent—travel to Iran; telephone calls from and e-mail activity in Iran; possession of legal electronic and data storage devices while traveling abroad—“the question of whether reasonable suspicion existed can only be answered by considering the totality of the circumstances as the officer on the scene experienced them.” Id. at 59-60 (citations omitted). Indeed, “[a]n officer‘s training and experiences enable him to draw[ ] inferences and make[ ] deductions’ from seemingly innocuous facts—‘inferences and deductions that might well elude an untrained person.‘” Id. at 60 (quoting Cortez, 449 U.S. at 418) (alteration in Edmonds).
Here, HSI Special Agent Akronowitz, who was in communication with the CBP officers who detained Hassanshahi at LAX, had several years of experience working for HSI, including specific experience with criminal investigations into the illegal exportation of goods from the U.S to Iran. See 1st Akronowitz Aff. ¶ 1; 2d Akronowitz Aff. ¶ 1. The Court also must consider the innocuous facts known about Hassanshahi not only for what they suggest taken together, but also for what they suggest in the context of the 2003 HSI criminal investigation. This investigation established a clear precedent of Hassanshahi attempting to violate the Iran trade embargo, and such evidence “contributes powerfully to the reasonable suspicion calculus.” Santos, 403 F.3d at 1132. Indeed, as one circuit court has explained, law enforcement’s “knowledge of the individual’s criminal history” can “help[ ] to dispel any likelihood that the observed conduct actually was innocent.” Monteiro, 447 F.3d at 47.
Ultimately, based on Hassanshahi’s recent contacts with Iran—including the latest trip to Iran following a series of other visits to Iran in the past few years and the recent telephone calls from Iran—the large quantity of electronic devices and cash in Hassanshahi’s possession when he returned from Iran in January 2012, and the 2003 criminal investigation into what may have been similar illegal conduct, the Court finds that law enforcement possessed “specific and articulable facts,” which, considered together with rational inferences from those facts, indicated that Hassanshahi may have been up to his old tricks by again conducting business in violation of the Iran trade embargo. See Terry, 392 U.S. at 21, 88 S. Ct. 1868; see also Wayne R. LaFave et al., Criminal Procedure § 3.8 (5th ed. 2009) (“The Terry reference to when ‘criminal activity may be afoot’ strongly suggests that though the arrest standard may sometimes require that guilt be more probable than not, this is never the case as to a stopping for
Other cases in which federal courts have found reasonable suspicion based on similar or lesser evidence are instructive. For example, in United States v. Massi, 761 F.3d 512 (5th Cir. 2014), the circuit court affirmed the district court‘s finding of reasonable suspicion to justify an investigatory inspection of an airplane based on the following: the plane‘s “suspicious” flight path and frequent refueling stops between Orlando and Las Vegas; the registered owner of the plane having been convicted of drug trafficking approximately twenty years prior; and a passenger on the plane having recently crossed from Tijuana, Mexico, “a known hub of the illegal drug trade,” into the U.S. See id. at 518, 522-23. Similarly here, Hassanshahi had a history of illegal conduct directly relevant to the crime for which he now was suspected. In addition, Hassanshahi had recently traveled to Iran, a suspicious country that might be considered the “hub” of his illegal activity given the 2003 investigation, and he also had made multiple trips to Iran in recent years, which together could be considered a suspicious travel history given that Iran is not a common destination for U.S. citizens.
As another example, the district court in United States v. Bunty, 617 F. Supp. 2d 359 (E.D. Pa. 2008), considered the defendant‘s motion to suppress evidence that was found on his computer equipment during a search after he arrived at a Philadelphia airport on a flight from London. See id. at 363-64. After concluding that reasonable suspicion was not required for the search, the district court went on to consider whether such suspicion existed anyway. See id. at 365. In doing so, the court found that reasonable suspicion did exist for the computer search based on the following: the defendant had been arrested for the sexual abuse of a child and recently had pled guilty to corrupting the morals of a minor in that case; the defendant possessed a letter from his probation officer giving him permission to travel to England; the defendant possessed two laptop computers, a digital camera, a cell phone, and a variety of electronic storage devices, including several compact discs, movie DVDs, flash drives, and floppy disks that could not be used with his computers; and the defendant had a history of “extensive international travel.”13 See id.
Similarly here, Hassanshahi had a criminal history relevant to the crime for which he now was suspected—there, possession of child pornography; here, violating the Iran trade embargo. In addition, Hassanshahi had recently traveled abroad, and he also had entered the U.S. with a variety of electronic devices and data storage accessories that could have been used in furtherance of the suspected illegal activity. Indeed, unlike the defendant in Bunty, who had just returned from London, which itself was not especially associated with criminal activity as to the defendant or in general, Hassanshahi had traveled to Iran, which was exactly where his prior relevant bad conduct had occurred.
Finally, in United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), a case on which Hassanshahi heavily relies, the Ninth Circuit‘s en banc majority found reasonable suspicion to conduct a forensic examination of the defendant‘s computer following a border stop at LAX based on the following: the defendant‘s 1992 conviction for child molestation; the defendant‘s recent travel to Mexico, a “country associ-
The Court finds that for several reasons, the facts supporting reasonable suspicion here are significantly more probative of ongoing criminal activity than the facts in Cotterman. First, Hassanshahi‘s criminal history was only eight years-old at the time of the forensic examination, whereas Cotterman‘s conviction was fifteen-years old when the examination of his devices occurred. See id. at 957. Second, Cotterman‘s recent travel to Mexico, a “country associated with sex tourism,” falls very close to the category of evidence that the Supreme Court has cautioned against using for reasonable suspicion because it “describe[s] a very large category of presumably innocent travelers,” Reid, 448 U.S. at 441, while Hassanshahi traveled on multiple occasions to the specific country at issue in the 2003 criminal investigation, thus making his travel far more probative of criminal conduct.14 Third, Cotterman and his wife each carried a laptop and digital camera when traveling to Mexico, as well as one video camera between them, which altogether does not appear particularly remarkable for international tourists. Cf. Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (“In today‘s world, the fact that Cotterman and his wife each carried a laptop and digital camera when traveling internationally, as well as one video camera between them, is no more evidence of ‘sex tourism’ than of any other kind of tourism.“). Hassanshahi, on the other hand, possessed a laptop computer, multimedia cards, thumb drives, a camcorder, SIM cards, and a cell phone, which together suggest a person engaged in business while traveling to Iran, not tourism. Finally, while the Ninth Circuit majority relied on Cotterman having password-protected files on his computer as the last fact supporting reasonable suspicion, several much more probative facts were known about Hassanshahi, such as the two recent telephone calls from Iran, the 2005 questioning by CBP officers after Hassanshahi returned from Dubai with $15,000 in cash, Hassanshahi‘s multiple other trips to Iran in recent years, and Hassanshahi‘s possession of $7,000 in cash when he arrived at LAX in January 2012.15
The D.C. Circuit has held that “even though a single factor might not itself be sufficiently probative of wrongdoing to give rise to a reasonable suspicion, the combination of several factors—especially when viewed through the eyes of an experienced officer—may.” Edmonds, 240 F.3d at 60. That is exactly the case here. Through the combination of multiple factors, none of which individually constituted direct evidence of criminal activity but all of which were consistent with the scheme uncovered during the 2003 HSI investigation, the Court finds that reasonable suspicion existed to conduct the forensic examination of Hassanshahi‘s laptop. Having reached this conclusion, the Court need not address whether reasonable suspicion was required as a matter of law because that question is rendered moot.
IV. CONCLUSION
For the foregoing reasons, the motion to suppress is denied. An order consistent with this Memorandum Opinion is separately and contemporaneously issued.
RUDOLPH CONTRERAS
United States District Judge
Oleg MERKULOV, Plaintiff, v. UNITED STATES PARK POLICE, Defendant.
Civil Action No. 14-0854 (BAH)
United States District Court, District of Columbia.
Signed December 1, 2014
