MEMORANDUM OPINION
Defendant is charged in a three-count indictment with (i) attempting to export from the United States various firearms parts on the United States Munitions List (“USML”) without a license, in violation of 22 U.S.C. § 2778, (ii) attempting to smuggle goods from the United States, in violation of 18 U.S.C. § 554(a), and (iii) engaging in a conspiracy to commit those offenses, in violation of 18 U.S.C. § 371.
(i) whether the search of defendant’s cell phone conducted at the airport and the search of defendant’s cell phone conducted at the off-site location qualify as border searches; and
(ii) if so, whether both searches of defendant’s cell phone qualify as routine border searches that do not require a warrant, probable cause, reasonable suspicion, or any level of individualized suspicion.
As the matter has been fully briefed and argued orally, it is now ripe for disposition.
I.
On January 25, 2016, defendant, a Turkish citizen who speaks little English, entered the United States at Miami International Airport on a B2 visitor’s visa.
Thereafter, on February 1, 2016, Charles Reich, the United States Customs and Border Protection (“CBP”) Special Agent assigned to the New York Hoine-land Security Investigations (“HSI”) Field Office, called CBP Supervisory Officer Mike Augustino and Special Agent Jay Culley, who were on duty at Washington Dulles International Airport (“Dulles”), and informed them (i) that defendant had previously been stopped at John F. Kennedy International Airport (“JFK”) attempting to export items on the USML from the United States to the Republic of Turkey without an export license, (ii) that defendant was scheduled to fly from Dulles to Turkey the following day, February 2, 2016, and (iii) that at Dulles, defendant’s checked bags should be searched to determine whether they contained any firearms parts.
Thereafter, Special Agent Reich sent a follow up email to Supervisory Officer Au-gustino and Special Agent Culley, providing them with (i) defendant’s name, date of birth, and Turkish citizenship, (ii) the summary written by the CBP officer who interviewed defendant when he entered the United States on January 25, 2016, and (iii) defendant’s flight itinerary. Gov. Ex. 1, Reich Email. The email also stated, “[n]ot sure how his English is, on 1/08/2013 (2013SZ003360701) he was stopped by CBP exodus team at jfk with gun parts. Had a Turkish speaking [CBP officer] on site.” Id. In the same email, Special Agent Reich again asked Supervisory Officer Au-gustino and Special Agent Culley to examine defendant’s checked bags to look for firearms parts. Special Agent Reich also requested that Supervisory Officer Augus-tino and Special Agent Culley ask defendant various questions.
After reading Special Agent Reich’s email, Supervisory Officer- Colgan reviewed a CBP report summarizing the circumstances involved in the January 8, 2013 stop of defendant at JFK. This report disclosed:
(i) that on January 8, 2013, a search of defendant’s checked luggage revealed a Beretta .380 automatic pistol slide, a barrel, a guide rod, and a recoil spring;
(ii) that the CBP detained the parts and referred’the matter‘to the United States Department of State to determine whether the parts were on the USML; and , ,
(iii) that the parts were seized one week later after CBP was advised by the Department- of .State that the parts were listed on the USML and could not legally be exported from the United States without a license from the United States Department of State Directorate of Defense Trade Controls (“DDTC”).
The CBP report also referred to an incident on December 2, 2012, in which firearms parts listed on the USML were found in defendant’s luggage when he attempted to transport his luggage from the United States, through JFK, to Turkey without an export license from the Departs ment of State. CBP agents seized these firearms parts. In addition to reviewing the CBP report, Supervisory Officer Col-gan also reviewed TECS
On February- 2, 2016, defendant began his return trip to Turkey by checking in at Miami International Airport for a series of flights that would take him and his checked luggage through Cleveland Hopkins -International Airport and Dulles to Istanbul, Turkey. After defendant and his checked luggage arrived at Dulles, defendant’s checked bags were removed from defendant’s inbound United Airlines flight, but at Supervisory Officer Colgan and Officer Budd’s instruction, the checked bags were not loaded onto defendant’s outbound Turkish Airlines flight.
Once Supervisory Officer Colgan and Officer Budd obtained defendant’s two pieces of checked luggage, they performed an outbound customs examination of the luggage and discovered various firearms parts. Specifically, the inspection revealed eighteen handgun barrels, twenty-two 9mm handgun magazines, four ,45 caliber handgun magazines, and one .22 caliber Glock caliber conversion kit.
After Supervisory Officer Colgan and Officer Budd discovered the firearms parts in defendant’s checked luggage, Special Agent Culley arrived at Dulles. Shortly thereafter, Supervisory Officer Colgan, Officer Budd, Supervisory Officer Augustino, and Special Agent Culley conducted an outbound customs inspection of defendant on the jetway as he attempted to board his flight to Istanbul. Although a CBP Turkish translator was not present during the outbound customs inspection, a Turkish Airlines representative acted as a translator.
On the jetway at Dulles, CBP officers took defendant’s iPhone 6 Plus Model #A1524 (“iPhone”) from his person and placed it in defendant’s carry-on luggage. Defendant was then transported — along with his carry-on luggage — to the CBP secondary inspection area. There, Supervisory Officer Colgan used the iPhone’s touch screen to navigate the iPhone’s operating system — which was not password protected — to reveal defendant’s most recent text messages and calls. No further inspection of defendant’s iPhone was conducted at that time. Also in the secondary inspection area, Supervisory Officer Col-gan used the Automated Export System (“AES”), a government database for information related to exports, to ascertain: (i) whether defendant had ever filed an export license with CBP at the time of any export, and (ii) whether defendant was listed as a license registrant with DDTC. The AES revealed no records associated with defendant.
CBP Special Agent Adam Coppolo then read defendant his Miranda
(i) that he entered the United States with the intention of sightseeing in Florida with a friend, Bayram Bulut, whom defendant has known since 2006 or 2007;
(ii) that defendant was in possession of $9,000 in cash when he entered the United States;
(iii) that defendant had visited numerous gun shops, pawn shops, and a gun show while-he was in Florida;
(iv) that defendant had purchased the firearms parts at the gun show in Florida;
(v) that Bulut had not purchased any of the firearms parts;
(vi) that no one had ordered the firearms parts found in his checked luggage; and
(vii) that although Bulut cautioned defendant against purchasing gun parts, defendant did not heed Bulut’s warning.
The agents ended the interview of defendant in the early morning on February 3, 2016. Shortly thereafter, the agents arrested defendant, and Special Agent Coppolo took custody of defendant’s iPhone. The agents also seized handgun barrels, a handgun caliber conversion kit, magazines, laser aiming modules, and two pieces of luggage.
Thereafter, Special Agent Coppolo transported defendant’s iPhone approximately four miles from Dulles to the HSI office in Sterling, Virginia. There, Special Agent Coppolo delivered defendant’s iPhone to HSI Computer Forensic Agent Michael Del Vacchio and asked for his assistance in conducting a forensic search by extracting digital information from defendant’s iPhone. When Forensic Agent Del Vacchio received defendant’s iPhone, it was in airplane mode — meaning it could not access a cellular network or the Internet — and Forensic Agent Del Vacchio did not change this setting. Forensic Agent Del Vacchio connected the iPhone to a Cellebrite Physical Analyzer, a tool that extracts data from electronic devices, and conducted an advanced logical file system extraction, which copied data only from the iPhone’s allocated space — space to which the phone’s operating system had already written files. The Cellebrite software did not access any data stored remotely — or in the “cloud” — and instead accessed only data stored on the iPhone itself. Forensic Agent Del Vacchio did not make a complete bitstream copy of defendant’s iPhone.
Once the logical file system extraction was complete, the Cellebrite Physical Analyzer generated a 896-page report that Forensic Agent Del Vacchio subsequently provided to Special Agent Coppolo. The report includes the defendant’s personal contact lists, photographs, videos, emails, and conversations with others using various messaging applications. The report also contains information from the iPhone’s calendar, web browsing history, call logs, and physical location log, which reflected a history of the iPhone’s precise GPS coordinates.
After reviewing the lengthy report, Special Agent Coppolo prepared a Report of Investigation (“ROI”) regarding the search of defendant’s iPhone. The report states:
(i) that “[f]rom on or after February 2, 2016, to on or about March 3, 2016, a customs border search was conducted on [defendant’s] cell phone”;.
(ii) that Special Agent Coppolo reviewed the Cellebrite report “to conduct a border search of the iPhone in order to search for violations of law, including but not limited to, violations of Title 22 United States Code Section 2778 and Title 18 United States Code Section 554”; ,
(iii) that “[f]rom on or about February 3, 2016 to on or about March 3, 2016, SA Coppolo accessed this [Cellebrite] report pursuant to customs border search authority” and that “[a]mong other things, SA Coppolo reviewed contact lists, emails, messenger conversations (including but not limited to Kik and iChat conversations), photos and videos”; and
(iv) that on March 3, 2016, Special Agent Coppolo confirmed with Forensic Agent Del Vacchio that no other information could be obtained from the iPhone.
Gov. Ex., 7, ROI.
On March 3, 2016, after defendant had already been charged in a Criminal Complaint, a grand jury returned a three-count Indictment against defendant charging him with (i) attempting to export from the United States various firearms parts on the USML without a license, in violation of 22 U.S.C. § 2778, (ii) attempting to smuggle goods from the United States, in violation of 18 U.S.C. § 554(a), and (iii) engaging in a conspiracy to commit those offenses, in violation of 18 U.S.C. § 371. Thereafter, defendant filed a motion to suppress the evidence discovered as a result of the government’s two warrantless searches of defendant’s iPhone, namely (i) the initial search of the iPhone’s recent calls and text messages conducted at the airport, and (ii) the forensic search conducted at the HSI office in Sterling, Virginia.
II.
It is now well-settled that border searches are an exception to the Fourth Amendment requirement that a search be supported by a warrant and probable cause. Specifically, under the border search exception, government agents may conduct “routine” searches and seizures of persons and property at the border without obtaining a warrant or establishing any level of individualized suspicion. United States v. Montoya de Hernandez,
The border search exception applies to the international border and its “functional equivalent,” including international airports. Almeida-Sanchez v. United States,
Accordingly, the question presented here is whether the two warrantless searches of defendant’s iPhone — the initial inspection at the airport and the more sophisticated forensic search conducted off-site at the HSI office — qualify as routine border searches that do not require a warrant or individualized suspicion.
III.
Defendant first contends that the evidence discovered as a result of the government’s second warrantless search of defendant’s iPhone — the search conducted at the HSI office — must be suppressed because that search was not a border search, and therefore under the Supreme Court’s recent decision in Riley v. California, — U.S. -,
Yet, as the government correctly contends, defendant’s argument fails in both respects. To begin with, contrary to defendant’s contention, the fact of arrest does not abrogate the government’s authority to complete a border search. The Fourth Circuit and other circuits have consistently held that the government may conduct a border search after arresting an individual. See United States v. Ickes,
. Moreover, the fact that the forensic search of defendant’s iPhone occurred four miles from Dulles and was not completed until approximately one month after the phone was seized does not alter the conclusion that the search of defendant’s iPhone was a border search. This is so because, .as several courts have held, an off-site forensic search of an electronic device over a
Thus, contrary to defendant’s contention, the post-arrest, off-site forensic search of defendant’s iPhone is not governed by Riley, but is instead a border search, which does not require a warrant supported by probable cause. Importantly, however, this conclusion does not end the analysis. It remains to be resolved whether the two searches of defendant’s iPhone— the initial search conducted at the airport and the forensic search conducted off-site at the HSI office — were routine border searches or nonroutine border searches.
IV.
Defendant next contends that the evidence obtained as a result of searching defendant’s iPhone must be suppressed because both searches of defendant’s iPhone were nonroutine border searches that required some level of individualized suspicion. In response, the government contends (i) that both searches of defendant’s iPhone were routine border searches, and (ii) even assuming the searches were nonroutine, the government had sufficient individualized suspicion to conduct both searches.
A.
The Supreme Court has made clear that under the border search exception, only routine border searches are wholly immune from the typical Fourth Amendment requirements, whereas nonroutine border searches must rest on some degree of particularized suspicion. Montoya de Hernandez,
On the other hand, in United States v. Montoya de Hernandez, the Supreme Court determined that a seizure “beyond the scope of a routine customs search and inspection” occurred when the defendant was detained at the border for sixteen hours after she declined to be x-rayed and to produce a monitored bowel movement because custom officials suspected that defendant had swallowed balloons of cocaine in an effort to smuggle drugs across the border.
Although the Supreme Court has not made pellucid exactly what renders a border search nonroutine — and what level of individualized suspicion is necessary for nonroutine searches — circuit courts have looked to the intrusiveness of the search in distinguishing between routine and non-routine border searches. See, e.g., United States v. Irving,
In this regard, the Fourth Circuit in United States v. Ickes,
Although Ickes clearly stands for the proposition that a manual digital search of an electronic device is a routine border search, that decision does not address whether more sophisticated forensic searches of electronic devices at the border may properly be classified as routine border searches. In this regard, a district court in this circuit recently addressed whether a forensic search of a cell phone is a routine border search. See United States v. Saboonchi,
Although the line between routine and nonroutine border searches remains somewhat indistinct, the juxtaposition of the two searches of defendant’s iPhone well-illustrates where the dividing line exists with respect to the border searches of electronic devices. The first of these searches — the manual inspection of text messages and recent calls on defendant’s iPhone conducted at the aiport — is clearly a routine border search under the Fourth
Importantly, however, Ickes does not dictate the outcome with respect to the second, significantly more extensive forensic search of defendant’s iPhone. Unlike in Ickes, in conducting the forensic search here, government agents (i) seized defendant’s iPhone, (ii). moved the iPhone to an off-site location, (iii) used the Cellebrite Physical Analyzer to perform a logical file system extraction of the hard drive’s allocated space, and (iv) used the Cellebrite Physical Analyzer to generate an 896-page report that includes, inter alia, information from defendant’s contact lists, photographs, videos, emails, web browsing history log, and physical location log. Thus, it remains to be determined whether the off-site forensic search of defendant’s iPhone was a nonroutine border search that required some level of individualized suspicion.
In addressing this question, it is appropriate to consider the Supreme Court’s decision in Riley. Although that decision does not specifically address a search of a cell phone conducted at the border, the Supreme Court in Riley made clear that cell phones are categorically different from other personal effects, such as containers.
Since the Supreme Court’s decision in Riley, at least two district courts — but no circuit courts — have squarely addressed whether the rationale of Riley is relevant in analyzing whether a border search of an electronic device, such as a laptop or a cell phone, is a routine or nonroutine border search. See United States v. Kim,
Although the courts in Kim and Feiten reached different results, both courts agreed that in considering the question whether Riley compels a conclusion that an offsite forensic search of an electronic device was a nonroutine border search, it is appropriate to “assess[], on the one hand, the degree to which [the search] intrudes upon an individual’s privacy, and, on the other, the degree to which it is needed for the promotion of legitimate governmental interest,” and as part of that assessment, it is appropriate to consider whether a particular application of the border search exception would “untether the rule from the justifications underlying the [border search] exception.” Riley,
It is appropriate to apply the same analytical framework here. With respect to the privacy concerns involved, an individual’s privacy interest in the information contained on his cell phone is much greater than an individual’s privacy interest in the contents of his luggage or other personal effects. Indeed, a cell phone cannot fairly be compared to an ordinary container that might be searched at the border because as the Supreme Court in Riley made clear, “[a] phone not only contains in digital form many sensitive records previously found in the home,” but also “a broad array of private information never found in a home in any form — unless the phone is [in the home].” Id. at 2491.
In opposition to the conclusion that an individual has a significant privacy interest
The government, as a sovereign, also has a significant interest at the border in protecting its territory and national security “by stopping and examining persons crossing into this country.” Ramsey,
Moreover, it is worth noting that any digital information contained on a cell phone that is relevant to exporting goods illegally can be easily obtained once a border agent establishes some level of individualized suspicion. And in the absence of some individualized suspicion that an individual seeks to export items illegally, there is little, if any, justification for a forensic search of a cell phone belonging to a traveler exiting the United States. This is especially true where, as here, the government has already arrested the defendant, seized his phone, and transported the phone to a secure location for further analysis.
In sum, although the manual search of defendant’s iPhone conducted at the airport was a routine border search, the subsequent forensic search of defendant’s iPhone conducted at the HSI office in Sterling, Virginia was a nonroutine border search requiring some level of individualized suspicion.
B.
It is next appropriate to consider what level of particularized suspicion is required to conduct a nonroutine border search of a cell phone. Defendant contends that the forensic search of his iPhone required a warrant supported by probable cause. Yet, defendant cites no case — nor have any been found — that stands for the proposition that more than reasonable suspicion is required for a nonroutine border search or seizure of any kind or extent. Indeed, even where physically intrusive body searches have been in issue, courts have consistently held that no more than reasonable suspicion is required.
The Supreme Court has defined reasonable suspicion as “a particularized and objective basis for suspecting the particular person stopped of criminal activity,” United States v. Cortez,
Here; the government had more than reasonable suspicion that defendant was attempting to export weapons parts listed on the USML without a license, in violation of the Arms Export Control Act, 22 U.S.C. § 2778. Specifically, prior to the search of defendant’s iPhone, .Special Agent Reich informed Supervisory Officer Augustino and Special Agent Culley:
(i) of defendant’s name, date of birth, . and citizenship,
(ii) that defendant had previously been stopped at JFK attempting to export items on the USML from the United States to Turkey without a license,
(iii) about the summary that had been written by the CBP officer who interviewed defendant when he entered the United States on January 25, 2016, and
(iv) that defendant was scheduled to take a flight from Dulles to Turkey on February 2, 2016.
Supervisory Officer Colgan and Officer Budd were also aware of this information, as they had reviewed Special Agent Reich’s email. In addition, Supervisory Officer Colgan reviewed the CBP report that summarized the January 8, 2013 stop of defendant at JFK. And Supervisory Officer Colgan reviewed TECS records memorializing the December 2, 2012 and January 8, 2013 stops of defendant at JFK, which disclosed defendant’s prior attempts to export firearms parts without a license. Moreover, prior to both searches of defendant’s iPhone, the outbound customs exam of defendant’s two pieces of checked luggage revealed various firearms parts listed on the USML, and defendant admitted on the jetway that he did not have the requisite DDTC license to export these items.
Given these facts, government agents reasonably suspected that they would discover information on defendant’s iPhone related not only to attempted export violations they had already discovered, but perhaps also information related to other ongoing attempts to export illegally various firearms parts. Specifically, government agents reasonably suspected that defendant’s iPhone contained digital receipts of weapons parts purchases, images of weapons parts, or other information related to items an individual seeks to export illegally. In addition, government agents could have reasonably suspected that defendant’s iPhone contained information that would reveal the identity of co-conspirators, some of whom may have been attempting to smuggle firearms parts out of the country in the imminent future.
Thus, prior to conducting the off-site forensic search of defendant’s iPhone, the border officials clearly had a “particularized and objective basis for suspecting” defendant of attempting to commit an ongoing or imminent crime. Cortez,
In sum, the two searches of defendant’s iPhone were reasonable under the Fourth Amendment because the first search — the manual search conducted at the airport— was a routine border search that did not require any level of individualized suspicion, and the second search — the forensic search conducted at the HSI office — was a nonroutine border search justified by more than reasonable suspicion.
V.
Accordingly, for these reasons, defendant’s motion to suppress the evidence obtained as a result of the government’s two searches of defendant’s iPhone must be denied.
An appropriate Order has already issued.
Notes
. The facts listed here are derived primarily from the parties' joint stipulation of facts and the government’s supporting exhibits. This factual summary also benefits from the credible testimony of United States Customs and Border Protection Special Agent Adam Cop-polo, presented during the April 29, 2016 hearing on defendant’s motion to suppress.
. Specifically, Special Agent Reich asked Supervisory Officer Augustino and Special Agent Culley to ask defendant questions regarding (i) who defendant met in Florida, (ii) whether
. TECS is an internal database that serves as a data repository to support law enforcement "lookouts,” border screening, and reporting of border inspection processes.
. Defendant’s luggage also contained one .357 caliber handgun magazine, but it is unclear whether the CBP officers were aware of that fact at the time of the search.
. The Turkish Airlines representative is not affiliated with CBP in any official manner, but that representative speaks Turkish and English as part of his job and has aided government agents with translation in the past.
. Contraiy to defendant's statements on the jetway, defendant never visited a gun show in Ohio. Although defendant was briefly in Ohio on February 2, 2016, after flying from Miami, Florida to Cleveland Hopkins International Airport, he spent the entirety of his time in Ohio at the Cleveland Hopkins International Airport awaiting the departure of his flight to Dulles.
. Miranda v. Arizona,
. A bitstream copy obtains everything on a phone — including data from the phone’s unallocated space. In other words, a bitsream copy extracts not only files saved and easily accessible on an electronic device, it also extracts residual data of files that have been deleted.
. See, e.g., United States v. Lawson,
. See, e.g., United States v. Calderon-Quinonez,
. See also United States v. Cotterman,
. See also United States v. Braks,
. See, e.g., United States v. Johnson,
. See, e.g., United States v. Uricoechea-Casallas,
. See also United States v. Arnold,
. In this regard, the court in Saboonchi noted (i) that "an integral part of a forensic examination is the use of technology-assisted search methodology, where the computer searches vast amounts of data that would exceed the capacity of a human reviewer to examine in any reasonable amount of time,” and (ii) that "[t]he techniques used during a forensic search can be distinguished from a conventional computer search” — such as the manual search at issue in Ickes — "in which a Customs officer may operate or search an electronic device in much the same way that a typical user would use it." Id. at 547.
. Indeed, the Supreme Court in Riley noted that the suggestion that a data search of a cell phone is ''materially indistinguishable” from searches of physical items was "like saying a ride on horseback is materially indistinguishable from a flight to the moon” because "[m]odern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse.” Id. at 2488-89.
. It is also worth noting that the court in Saboonchi addressed on a motion for reconsideration the question whether the Supreme Court’s decision in Riley affected its prior ruling that a forensic digital search of a cell phone was a nonroutine border search. United States v. Saboonchi,
. Kim,
. In this respect, it is worth noting that to the extent the court in Feiten analyzed cell phone searches at the border by comparing cell phones to containers,
. See, e.g., Montoya de Hernandez,
. This conclusion distinguishes the present case from Feiten, in which the court held that the government's interest in searching the cell phone of a traveler entering the United States was significant because " '[t]he [g]overnment's interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.' ”
. See, e.g., United States v. Boumelhem,
. See, e.g., Uricoechea-Casallas,
