UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
UNITED STATES OF AMERICA :
:
v. :
: Criminal Action No.: 13-0274 (RC)
SHANTIA HASSANSHAHI, :
also known as Shantia Hassan Shahi, : Re Document No.: 28
also known as Shahi, :
also known as Shantia Haas, :
also known as Sean Haas, :
:
and :
:
HASSTON, INC., :
:
Defendants. :
MEMORANDUM OPINION
DENYING DEFENDANT’S MOTION TO SUPPRESS
I. INTRODUCTION
Defendant Shantia Hassanshahi is charged with one count of conspiracy to violate the
International Economic Emergency Powers Act, 50 U.S.C. § 1705, and the Iranian Transactions
and Sanctions Regulations, 31 C.F.R. §§ 560.203-204, commonly referred to as the United
States’ trade embargo against Iran. Now before the Court is Hassanshahi’s motion to suppress
evidence uncovered during a forensic examination of his laptop following an international border
stop at Los Angeles International Airport on the basis that the laptop examination violated the
Fourth Amendment. Upon consideration of Hassanshahi’s motion and the opposition thereto, the
Court reaches two conclusions: first, the exclusionary rule does not require suppressing the
laptop evidence as fruit of the poisonous tree because discovery of that evidence was sufficiently
attenuated from the initial unlawful telephone database search; and second, reasonable suspicion
existed for conducting the forensic examination after Hassanshahi landed at the airport.
Accordingly, the Court will deny Hassanshahi’s motion to suppress.
II. FACTUAL BACKGROUND 1
On August 16, 2011, Homeland Security Investigations (“HSI”) received an unsolicited
e-mail from a source indicating that the source had received an e-mail from an Iranian known as
M. Sheikhi who, on behalf of his Iranian company, sought the source’s assistance in procuring
protection relays for an Iranian power project. See Akronowitz Aff., ECF No. 37-1 (“2d
Akronowitz Aff.”) at ¶ 2. The e-mail from Sheikhi to the source contained an Iranian business
telephone number and the address for Sheikhi’s company in Tehran, Iran. See id. An HSI agent
used the telephone number associated with Sheikhi to search an “HSI-accessible law
enforcement database” in the hope of identifying potential U.S.-based targets engaged in the sale
or export of protection relays for use in Iran. See id. ¶ 3. The HSI agent’s search returned a
single telephone record indicating one call between Sheikhi’s telephone number and a telephone
number with an “818” area code (the “818 number”), which is the area code for Los Angeles,
California. See id. ¶ 4.
1
The United States of America (the “Government”) provides the following facts
through affidavits submitted by HSI Special Agent Akronowitz. At oral argument, Hassanshahi
objected to the Government’s provision of the Akronowitz affidavits by arguing that the
affidavits were internally inconsistent and, by implication, unreliable or simply untruthful. The
Court is satisfied, however, by the Government’s explanation that the first Akronowitz affidavit
was prepared to support the criminal complaint and the second, more detailed Akronowitz
affidavit was prepared to support the Government’s opposition to the motion to suppress.
Hassanshahi has provided no legal basis for why the Government was not entitled to submit a
supplemental affidavit in response to the motion to suppress, and the Court finds that there is
nothing internally inconsistent between the affidavits — the second affidavit merely provides
more information about the HSI investigation than the first affidavit, which is not surprising
given the different purposes. Finally, the fact that the Government later provided a third,
corrected Akronowitz affidavit does not render the earlier affidavits defective or unreliable in
their entirety.
2
After discovering that the 818 number was assigned to Google/Google Voice, see id. ¶
13, HSI prepared and served on Google an Administrative Export Enforcement Control
Subpoena (“AEEC Subpoena”). See id. ¶ 14. In response, Google provided information that
identified Hassanshahi as the person to whom the 818 number was registered, and Google also
provided an e-mail address registered to Hassanshahi. See id. ¶ 15. In addition, Google provided
call log information for the period between September 6, 2011, and October 6, 2011, which
showed that the 818 number had received one telephone call from an unknown Iranian phone
number on October 5, 2011. See id.; Revised Akronowitz Aff., ECF No. 42-1 (“3d Akronowitz
Aff.”) at ¶ 15. The Google call log information also revealed one missed call between
Hassanshahi’s 818 number and an unknown Iranian cell phone number on September 19, 2011.
See 2d Akronowitz Aff. ¶ 15.
On October 18, 2011, the HSI agent searched the Department of Homeland Security’s
(“DHS”) TECS database for additional information about Hassanshahi. 2 See id. ¶ 16. TECS led
the agent to discover that Hassanshahi was involved in a prior federal law enforcement
investigation into potential violations of the Iran trade embargo. 3 See id. ¶ 16a. Specifically, the
2
TECS is a database that serves as a data repository to support law enforcement
“lookouts,” border screening, and reporting for DHS’s primary and secondary border inspection
processes. See http://www.dhs.gov/xlibrary/assets/privacy/privacy-pia-cbp-tecs-sar-update.pdf.
3
The HSI agent’s affidavit does not state that this information about the 2003
investigation actually was written in TECS. Instead, the affidavit merely provides that after
“conduct[ing] research on Hassanshahi in TECS,” the HSI agent “discovered” the information
about the 2003 investigation. See 2d Akronowitz Aff. ¶ 16. At oral argument on the motion to
suppress, counsel for the Government suggested that the HSI agent discovered the information
about the investigation through a telephone call with another agent, a call that is not referenced
anywhere in the affidavit. The affidavit also does not specify if or when the HSI agent reviewed
HSI’s investigative file from the 2003 investigation. In fact, counsel for the Government stated
at oral argument that the 2003 HSI investigative file had not yet been produced to Hassanshahi as
part of discovery in this criminal case. As such, it remains somewhat ambiguous and open for
further clarification how the HSI agent learned the information about the 2003 investigation that
he put in his affidavit, as well as how much the HSI agent actually knew about this investigation
3
investigation occurred in 2003 through an HSI office in California, and the investigation
uncovered that Hassanshahi and two partners had established an American company for the
purpose of entering into an agreement with a Chinese company to build a computer production
facility in Iran. See id. Hassanshahi’s American company later filed a breach-of-contract claim
against the Chinese company in California state court, and that lawsuit was dismissed in part
because the contract was unenforceable as against public policy since it involved doing business
in Iran, a clear violation of U.S. law. See id. The Department of Justice did not file criminal
charges against Hassanshahi for his role in this venture. See id.
The TECS search also revealed a number of earlier instances in which Hassanshahi
reentered the U.S. after traveling to the Middle East, including: an incident in 2005 when
Hassanshahi was questioned by U.S. Customs and Border Protection (“CBP”) agents after
returning from Dubai with $15,000 in cash; an incident in 2006 when Hassanshahi returned from
Tehran with a travel companion; and four other returns from Tehran — two in 2008, one in
2010, and one in May 2011. See id. ¶¶ 16c-e. In addition, HSI learned through TECS that
Hassanshahi presently was outside the U.S., so HSI supplemented the existing TECS information
by entering instructions that HSI should be alerted and Hassanshahi should be referred for
secondary screening the next time he returned to the U.S. See id. ¶ 17.
Around December 20, 2011, HSI served Google with a second AEEC Subpoena, this
time seeking subscriber information and recent Internet protocol (“IP”) logs for Hassanshahi’s
Google e-mail account. See id. ¶ 18. In response, Google provided information indicating that
Hassanshahi’s e-mail account was accessed from an Iran IP address twenty-four times between
before ordering the forensic examination in January 2012. Nonetheless, for the purposes of the
motion to suppress, the Court accepts that the HSI agent knew the details about the 2003
investigation that he provides in the affidavit.
4
December 8, 2011, and December 15, 2011. See id. The information provided by Google also
showed, however, that Hassanshahi’s e-mail account was accessed from a U.S. IP address on the
same day it apparently was accessed from an Iran IP address, including sometimes within just a
few minutes of each other. See Def.’s Reply Supp. Mot. Dismiss Ex. 1 at 27 (Google Subscriber
Information). And on another occasion, Hassanshahi’s e-mail account apparently was accessed
on the same day from an Iran IP address, a Germany IP address, and a U.S. IP address,
occasionally alternating between the countries within minutes. See id. at 30.
On January 11, 2012, HSI was alerted that Hassanshahi would be returning to the U.S.
the next day through Los Angeles International Airport (“LAX”). See 2d Akronowitz Aff. ¶ 19.
When Hassanshahi arrived at LAX on January 12, he was referred for secondary screening, at
which time CBP agents seized several electronic devices in Hassanshahi’s possession —
including a laptop computer, multimedia cards, thumb drives, a camcorder, SIM cards, and a cell
phone — and sent those devices to the HSI agent in Sterling, Virginia, for further analysis. 4 See
id. ¶ 20; Arkonowitz Aff., ECF No. 1-1 (“1st Arkonowitz Aff.”) at ¶ 19. When the devices
arrived in Virginia a few days later, HSI conducted a forensic examination of the laptop and
discovered numerous documents relating to Hassanshahi’s apparent business activities in Iran,
see 2d Arkonowitz Aff. ¶ 21, including documents showing that in 2009, Hassanshahi, through
his company, purchased approximately $6,000,000 in goods that were exported to Armenia and
then transshipped to Iran, see 1st Arkonowitz Aff. ¶ 22, as well as a September 5, 2011, letter
from Hassanshahi to the Iranian Minister of Energy in which Hassanshahi asked the Iranian
government for payment for “protective relays for transmission lines.” See id.
4
Hassanshahi also possessed “approximately” $7,000 in cash when he arrived at
LAX on January 12, 2012. See Def.’s Reply Supp. Mot. Suppress Ex. 1 at 48.
5
Now before the Court is Hassanshahi’s motion to suppress the evidence discovered
during the forensic examination of his laptop. Hassanshahi asserts two arguments in support of
his motion. First, he argues that the law enforcement database through which HSI initially
obtained his 818 number constituted an unconstitutional search, and under the fruit of the
poisonous tree doctrine, the forensic laptop examination was the direct result of that unlawful
search such that the laptop evidence was tainted and must be suppressed. Second and
alternatively, Hassanshahi argues that this Court should follow two recent court decisions from
other federal jurisdictions that concluded that the Fourth Amendment required reasonable
suspicion to conduct a forensic examination of an electronic device after an international border
stop. 5 Hassanshahi then argues that the laptop evidence must be suppressed here because the
Government lacked reasonable suspicion for the search. The Court addresses these arguments
below.
III. ANALYSIS
Hassanshahi’s motion to suppress requires the Court to analyze two important areas of
Fourth Amendment jurisprudence: the fruit of the poisonous tree doctrine and international
border searches. As to the first issue, it is well settled that evidence secured as the result of an
illegal search or seizure is tainted fruit of a poisonous tree that must be suppressed, unless
intervening events or other attenuating circumstances sufficiently dissipated the taint of the
initial illegality. The Court ultimately finds that such attenuating circumstances existed here, and
the exclusionary rule therefore does not require suppression of the evidence found on
5
See generally United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), cert.
denied, 134 S. Ct. 899 (2014), reh’g denied, 134 S. Ct. 1512 (2014); United States v. Saboonchi,
990 F. Supp. 2d 536 (D. Md. 2014), reconsideration denied, No. CRIM. PWG-13-100, 2014 WL
3741141 (D. Md. July 28, 2014).
6
Hassanshahi’s laptop. Second, the Court finds that reasonable suspicion existed for the forensic
examination of Hassanshahi’s laptop after it was seized during the international border stop at
LAX. Finally, because the Court reaches this conclusion as to reasonable suspicion, it need not
— and does not — take a position regarding whether, as a matter of law, the Fourth Amendment
required the Government to possess reasonable suspicion before conducting the forensic
examination.
A. Legal Standard For Motion To Suppress
Generally, “[t]he proponent of a motion to suppress has the burden of establishing that
his own Fourth Amendment rights were violated by the challenged search or seizure.” Rakas v.
Illinois, 439 U.S. 128, 130 n.1 (1978) (citations omitted). However, when, like here, “‘a
defendant produces evidence that he was arrested or subjected to a search without a warrant, the
burden shifts to the government to justify the warrantless arrest or search.’” United States v.
Jones, 374 F. Supp. 2d 143, 147 (D.D.C. 2005) (quoting United States v. de la Fuente, 548 F.2d
528, 533 (5th Cir. 1977)); see also United States v. Jeffers, 342 U.S. 48, 51 (1951) (“[T]he
burden is on those seeking the exemption to show the need for it[.]” (citation omitted)); United
States v. Mangum, 100 F.3d 164, 169 (D.C. Cir. 1996) (“The government carries the burden of
showing that the measures employed during the stop were justified.”).
B. Fruit Of The Poisonous Tree And Attenuation
The Fourth Amendment protects “[t]he right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures.” U.S. Const. amend. IV.
By its text, the Amendment “‘contains no provision expressly precluding the use of evidence
obtained in violation of its commands.’” Herring v. United States, 555 U.S. 135, 139 (2009)
(quoting Arizona v. Evans, 514 U.S. 1, 10 (1995)). Supreme Court decisions, however, have
7
“establish[ed] an exclusionary rule that, when applicable, forbids the use of improperly obtained
evidence at trial,” see id., in order “to ‘compel respect for the constitutional guaranty.’” Davis v.
United States, 131 S. Ct. 2419, 2426 (2011) (quoting Elkins v. United States, 364 U.S. 206, 217
(1960)). Furthermore, though the Supreme Court “has applied the exclusionary rule to certain
Fourth Amendment violations[,]” it “‘has never … interpreted’” that rule as “‘proscrib[ing] the
introduction of illegally seized evidence in all proceedings or against all persons.’” United
States v. Spencer, 530 F.3d 1003, 1006 (D.C. Cir. 2008) (quoting United States v. Leon, 468 U.S.
897, 906 (1984)). Rather, the exclusionary rule is designed to safeguard Fourth Amendment
rights through its deterrent effect, and the rule therefore only applies when it results in
“appreciable deterrence.” See Herring, 555 U.S. at 139-41.
The fruit of the poisonous tree doctrine was developed within the context of the Supreme
Court’s exclusionary rule jurisprudence. Under the doctrine, an illegal search or seizure requires
the exclusion at trial of not only the evidence seized in violation of the Fourth Amendment, but
also any evidence obtained as a result of that seizure if the “seizure is a but-for cause of the
discovery of the evidence (a necessary condition), and if the causal chain has not become ‘too
attenuated to justify exclusion,’” United States v. Brodie, 742 F.3d 1058, 1062-63 (D.C. Cir.
2014) (quoting Hudson v. Michigan, 547 U.S. 586, 592 (2006)), “or, to put the same point with
another metaphor, if circumstances have not ‘purged [the evidence] of the primary taint.’” Id. at
1063 (alteration in original) (quoting Wong Sun v. United States, 371 U.S. 471, 488 (1963)). In
the motion to suppress, Hassanshahi argues that the evidence on his laptop should be excluded as
tainted fruit because its discovery resulted directly from the initial law enforcement database
search that uncovered the 818 number.
8
1. Existence Of An Initial Unlawful Search Or Seizure
The Court’s preliminary inquiry is whether an unlawful search or seizure occurred.
Hassanshahi argues that the law enforcement database in which the HSI agent ran a search using
Sheikhi’s business telephone number must be either the National Security Agency’s (“NSA”)
bulk telephony metadata program or an equivalent telephony database. See Def.’s Mem. Supp.
Mot. Suppress 18-30. Hassanshahi then relies on Judge Leon’s opinion in Klayman v. Obama,
957 F. Supp. 2d 1 (D.D.C. 2013), appeal pending, No. 14-5004 (D.C. Cir.), to establish the facial
unconstitutionality of the NSA telephony program or, by implication, the unconstitutionality of
the unknown equivalent database allegedly used by HSI here.
In response, the Government sidesteps Hassanshahi’s argument by taking the position
that although the NSA telephony database was not used, the Court nevertheless should assume
arguendo that the law enforcement database HSI did use was unconstitutional. See Gov’t’s
Mem. Opp’n Mot. Suppress 12. Consistent with this position, the Government refuses to provide
details about its law enforcement database on the basis that such information is irrelevant once
the Court accepts the facial illegality of the database. See id. at 11-12. Regrettably, the Court
therefore starts its analysis from the posture that HSI’s initial search of the mysterious law
enforcement database, which uncovered one call between Sheikhi’s business telephone number
and the 818 number linked to Hassanshahi, was unconstitutional.
2. But-For Causation
Next, the Court finds that the existence of but-for causation between the law enforcement
database search and the forensic laptop examination is quite plain. See Brodie, 742 F.3d at 1062-
63 (explaining that “but-for” causation is a “necessary condition” in the fruit of the poisonous
tree analysis); see also Owens v. Republic of Sudan, 412 F. Supp. 2d 99, 111 (D.D.C. 2006) (but-
9
for causation asks: “were the act removed from the sequence of events leading up to the injury,
would the injury have occurred as it did?”). Here, the law enforcement database search revealed
the 818 number, which led HSI to subpoena Google, through which HSI learned that the 818
number was registered to Hassanshahi. HSI then investigated Hassanshahi through TECS and by
issuing a second subpoena to Google, which together led HSI to place an alert in TECS requiring
CBP officers to refer Hassanshahi for secondary screening the next time he returned to the U.S.
Finally, when Hassanshahi arrived at LAX, CBP officers followed the TECS instruction by
referring Hassanshahi to secondary screening, and Hassanshahi’s laptop then was seized and sent
to Virginia for the forensic examination. As such, the Court easily concludes that “but for” the
initial law enforcement database search, the forensic laptop examination would not have
occurred.
3. Attenuation And The Exclusionary Rule
“[N]ot … all evidence is ‘fruit of the poisonous tree’ simply because it would not have
come to light but for the illegal actions of the police.” Wong Sun, 371 U.S. at 487-88. Instead,
exclusion is not required when “the government proves … that the evidence would have been
discovered inevitably, was discovered through independent means, or that its discovery was so
attenuated from the illegal search or seizure that the taint of the unlawful government conduct
was dissipated.” United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007) (citations
omitted). Here, the Government argues that attenuation existed, and the Supreme Court has
identified three factors for courts to consider when determining attenuation: (1) the amount of
time between the illegality and the discovery of the evidence, i.e., temporal proximity; (2) the
presence of intervening circumstances; and (3) the purpose and flagrancy of the illegal conduct.
See Brodie, 742 F.3d at 1063 (citing Brown v. Illinois, 422 U.S. 590, 603-04 (1975)). The
10
Government bears the burden of proving attenuation by a preponderance of the evidence. See
Holmes, 505 F.3d at 1293; United States v. Wood, 981 F.2d 536, 541 (D.C. Cir. 1992).
a. Temporal Proximity
The Court first considers the temporal proximity between the illegality and the discovery
of the evidence. See Brodie, 742 F.3d at 1063. The Government’s affidavit shows that more
than four months passed between the unconstitutional law enforcement database search on
August 24, 2011, and the forensic laptop examination on January 17, 2012. See 2d Akronowitz
Aff. ¶¶ 3, 21. Though “there is no ‘bright-line’ test for temporal proximity” within the
attenuation analysis, see United States v. Reed, 349 F.3d 457, 463 (7th Cir. 2003), the Court
finds that this several month gap — during which the Government continued to investigate
Hassanshahi through unrelated sources, including the use of preexisting evidence in TECS and
the issuance of lawful subpoenas to Google — weighs in favor of not suppressing the laptop
evidence. Compare United States v. Gross, 662 F.3d 393, 402 (6th Cir. 2011) (finding that two
month gap between the unlawful seizure and defendant’s voluntary confession suggests
attenuation as to the confession), United States v. Roberts, No. 11-CR-0018, 2012 WL 1033515,
at *7 (E.D. Pa. Mar. 28, 2012) (finding that the “temporal proximity” factor weighed against
suppression when over two months elapsed between the initial unlawful search and defendant’s
consent to a second search that revealed incriminating evidence), and United States v. Lawrence,
No. CRIM.05-333, 2006 WL 752920, at *6 (D. Minn. Mar. 23, 2006) (finding attenuation in part
because four months passed between the illegal search and arrest and the later incriminating
statements made by defendant), with United States v. Miller, 146 F.3d 274, 280 (5th Cir. 1998)
(finding that the ninety second time period between the illegal stop and the search did not
support the government’s attenuation claim), United States v. Green, 111 F.3d 515, 521 (7th Cir.
11
1997) (explaining that the fact that only five minutes elapsed between the illegal stop and the
search of the car weighed against attenuation), and United States v. Ceballos, 812 F.2d 42, 50
(2d Cir. 1987) (finding that “the [consent] to search and the statements given were too closely
connected in context and time … to break the chain of illegality” when only a few minutes had
elapsed).
b. Intervening Circumstances
The Court next considers whether there were intervening circumstances sufficient to
break the causal chain and lessen the taint of the initial illegality. See Brodie, 742 F.3d at 1062-
63. Often, the intervening circumstance that most strongly dissipates the evidentiary taint is a
“voluntary act by the defendant.” Green, 111 F.3d at 522; see also United States v. Jackson, No.
A04-141 CR, 2005 WL 1115466, at *17 (D. Alaska May 10, 2005) (“A defendant may himself
commit an intervening independent act that will be sufficient in relation to other events for
attenuation purposes.” (citing United States v. Sprinkle, 106 F.3d 613, 619 (4th Cir. 1997)). In
opposition to Hassanshahi’s motion to suppress, the Government offers two intervening events:
HSI’s investigative steps following discovery of the 818 number, which itself was just a minor
lead in the case; and Hassanshahi’s voluntary appearance at LAX after arriving on an
international flight. See Gov’t’s Mem. Opp’n Mot. Suppress 13.
i. Hassanshahi’s Arrival At LAX
Starting with the latter event, the Court finds that Hassanshahi’s voluntary arrival at LAX
was a relevant intervening circumstance, but at the same time, the Court is uncertain how much
weight to give this event. Because Hassanshahi’s arrival at LAX on an inbound international
flight provided the Government with justification to conduct a border search, this situation is
somewhat analogous to the more common instance in which a defendant, through new conduct
12
following an unlawful search or seizure, gives the police a fresh basis for conducting a legal
search or seizure. For example, in United States v. Sprinkle, 106 F.3d 613 (4th Cir. 1997), the
Fourth Circuit held that when the defendant fled from and fired a gun at an officer while resisting
an unjustified investigative stop, the defendant committed a new crime that “purged the taint of
the prior illegal stop” and provided the officer with probable cause to arrest the defendant and
then seize a gun that was in plain view at the scene of the new crime. Id. at 619.
Similarly, in United States v. Jackson, No. A04-141 CR, 2005 WL 1115466 (D. Alaska
May 10, 2005), the district court held that when the defendant disobeyed an order by a uniformed
officer during an unlawful stop and fled down the street, the officer acquired new and sufficient
justification to pursue the fleeing defendant, seize the defendant, and then conduct a pat-down
search of the defendant, which revealed contraband in the defendant’s possession. Id. at *14-16;
see also United States v. Allen, 619 F.3d 518, 526 (6th Cir. 2010) (“Here, there was an initial
attempt at a traffic stop, which [the defendant] claims to have been illegal, followed by an
attempt to escape from the police by leading the officers on a high-speed chase…. [T]he act of
fleeing from police officers constituted a new, distinct crime that rendered evidence subsequently
seized admissible.”); United States v. Hooker, No. 94-5863, 54 F.3d 774, *2 (4th Cir. 1995)
(finding that defendant’s “voluntary action” of coming out of her home, approaching the officers,
and stating that her “conscience” was bothering her and the officers thus could enter and search
her home were adequate intervening circumstances to purge taint of the earlier unlawful seizure
and search of defendant’s car).
As these cases illustrate, a voluntary act by a person following initial unlawful law
enforcement conduct can provide an officer with new grounds for conducting a lawful search or
seizure such that the exclusionary rule does not apply to any newly recovered evidence. This
13
concept, however, may get the Government only so far: though Hassanshahi’s arrival at LAX
provided justification to conduct a border search, Hassanshahi argues that the forensic laptop
examination went beyond a routine suspicionless border search and therefore required reasonable
suspicion. Accepting arguendo that reasonable suspicion in fact was required, Hassanshahi’s
arrival at LAX would be one factor in the reasonable suspicion calculus, but landing at LAX, by
itself, would not have created reasonable suspicion for the forensic examination. As such, the
circumstances here would be distinguishable from the typical case in which the intervening
voluntary conduct provided all the cause or suspicion that was required for the second search or
seizure. On the other hand, if the Court rejects Hassanshahi’s argument that reasonable
suspicion was required, his arrival at LAX alone would have justified the forensic examination,
thus making the arrival a more significant, and perhaps even dispositive, attenuating
circumstance. The Court ultimately need not resolve this issue, however, because the
Government’s other intervening circumstance argument unambiguously weighs heavily in favor
of not suppressing the laptop evidence.
ii. The 818 Number “Lead” And The Need For Further Investigation
Federal courts consistently have held that the exclusionary rule does not apply to
subsequently discovered evidence when an initial limited piece of information — typically the
name of a potential target for investigation — is obtained through an illegal search or seizure
because substantial intervening investigative steps still are required to uncover the necessary
incriminating evidence. The seminal case on this “unlawful lead” principle came from Judge
Friendly in United States v. Friedland, 441 F.2d 855 (2d Cir. 1971). There, federal officers
illegally bugged the offices of the defendant’s acquaintance, and those officers then informed
other agents that the defendant should be investigated based on conversations the officers illicitly
14
overheard. See id. at 854-57. In refusing to suppress inculpatory evidence about the defendant
that was discovered through further lawful investigation, the court held that it “would stretch the
exclusionary rule beyond tolerable bounds” to “grant life-long immunity from investigation and
prosecution simply because a violation of the Fourth Amendment first indicated to the police that
a man was not the law-abiding citizen he purported to be.” Id. at 861.
Other courts have taken a similar approach since Friedland by refusing to apply the
exclusionary rule to suppress evidence that was discovered during a later investigation following
the initial unlawful discovery of evidence that merely pointed law enforcement in the
defendant’s direction. For instance, in United States v. Carter, 573 F.3d 418 (7th Cir. 2009), the
court explained that “[f]ew cases, if any, applying the attenuation exception hold that evidence
separately uncovered through completely lawful means is inadmissible because an illegal search
first made a particular person a suspect in a criminal investigation.” Id. at 423. The court then
concluded that an out-of-court identification was admissible under the attenuation exception
even though law enforcement’s original interest in the defendant arose through the discovery of
an “Inmate ID Card” bearing the defendant’s name during a prior unlawful search. Id. at 420,
423.
Similarly, in United States v. Watson, 950 F.2d 505 (8th Cir. 1991), the court held that
when “a law enforcement officer merely recommends investigation of a particular individual
based on suspicions arising serendipitously from an illegal search, the causal connection is
sufficiently attenuated so as to purge the later investigation of any taint from the original
illegality.” Id. at 508. The court then concluded that the grand jury’s use of the defendant’s
name and alias did not taint a later investigation, despite the court assuming arguendo the
illegality of the prior search that uncovered records containing the defendant’s identifying
15
information. See id.; see also Hoonsilapa v. INS, 575 F.2d 735, 738 (9th Cir. 1978) (“[T]he mere
fact that [a] Fourth Amendment illegality directs attention to a particular suspect does not require
exclusion of evidence subsequently unearthed from independent sources.” (citation omitted).
The circumstances here even more strongly compel finding attenuation than in the above
cases because the law enforcement database search revealed only the slimmest of leads: the 818
number. HSI thus was required to take an additional investigative step just to find a name
associated with the 818 number, as compared to the typical “unlawful lead” case in which the
defendant’s full identify is discovered through the illegal search or seizure. In addition, HSI
acted lawfully by subpoenaing Google for information about the owner of the 818 number, and
HSI’s four month investigation between obtaining the 818 number and conducting the forensic
laptop examination primarily involved the use of information in TECS that existed before the
initial database search, which further shows that the 818 number, at most, “tipped off the
[G]overnment … to the probable identity of the perpetrator.” United States v. Smith, 155 F.3d
1051, 1063 (9th Cir. 1998); cf. United States v. Crews, 445 U.S. 463, 475 (1980) (“The
exclusionary rule … does not reach backward to taint information that was in official hands prior
to any illegality.”). Accordingly, the Court concludes that the discovery of the laptop evidence
occurred only through substantial and essential intervening events following the “unlawful lead”
that was the 818 number, and this factor therefore weighs strongly in favor of not excluding that
evidence.
c. Purpose And Flagrancy Of The Illegal Conduct
Lastly, the Court considers the “purpose” and “flagrancy” of the illegal law enforcement
conduct. See Brodie, 742 F.3d at 1063. As a rule, courts generally “favor suppression” only “if
law enforcement officials conducted the illegal search with the purpose of extracting evidence
16
against the defendant, or if they flagrantly broke the law in conducting the search.” United
States v. Washington, 387 F.3d 1060, 1075 (9th Cir. 2004) (citation omitted); see also Davis v.
United States, 131 S. Ct. 2419, 2427 (2011) (“When the police exhibit ‘deliberate,’ ‘reckless, or
‘grossly negligent’ disregard for Fourth Amendment rights, the benefits of exclusion tend to
outweigh the costs.” (citation omitted)). In contrast, when law enforcement officials acted with
an “objectively reasonable good-faith belief that their conduct is lawful, or when their conduct
involves only simple, isolated negligence, the deterrent value of suppression is diminished, and
exclusion cannot ‘pay its way.’” Davis, 131 S. Ct. at 2427 (citations omitted); see also, e.g.,
United States v. Boone, 62 F.3d 323, 325 (10th Cir. 1995) (noting that “a mistaken belief” that
the defendant “had consented to the search … rises to the level of a Fourth Amendment
violation, [but] it does not qualify as flagrant misconduct that would tilt the scales against
attenuation”); United States v. Ramos, 42 F.3d 1160, 1164 (8th Cir. 1994) (holding that
attenuation existed when, among other considerations, the “officer’s conduct was in good faith”
and “not flagrant”); United States v. Richard, 994 F.2d 244, 252 (5th Cir. 1993) (holding that
attenuation existed when, among other considerations, “both agents reasonably believed that they
had consent to search” defendant’s motel room).
The Court, however, is left slightly in the dark regarding the flagrancy element because
the Government has strategically refused to provide details about the law enforcement database it
used. Based on the Government’s affidavits and briefing on the motion to suppress, the Court
knows only that the database was accessible to HSI and that this database was not the NSA
program discussed in Klayman. The Court may surmise, though, that the law enforcement
database operates fairly similarly to the NSA program, at least insofar as the database also
appears to include a repository of aggregated telephone records for calls made into the U.S. from
17
abroad. Cf. Klayman, 957 F. Supp. 2d at *14-19 (describing the NSA’s bulk telephony
program). The Court can reach this conclusion because HSI used the database to search
retrospectively for telephone calls between Sheikhi’s Iranian telephone number and any U.S.
number, which suggests that the database includes, at a minimum, a collection of past telephone
calls from foreign numbers into the U.S.
Such ambiguity, however, leaves the Court in a difficult position. For example, if the
Court treats the HSI law enforcement database as functionally equivalent to the NSA telephony
program, the Court likely would conclude that HSI acted in good faith because federal courts
generally have approved of the NSA program, with the exception being Judge Leon’s opinion in
Klayman, which itself is on appeal before the D.C. Circuit. See Gov’t’s Mem. Opp’n Mot.
Suppress 19 n.5 (citing cases upholding the NSA program). Further, even if the Court accepts
Klayman as the authoritative statement on the NSA program’s legality, Klayman was not decided
until 2013, while the HSI database search occurred in 2011, at which time it appears that no
federal court had deemed the program unconstitutional. See Davis, 131 S. Ct. at 2429
(“Evidence obtained during a search conducted in reasonable reliance on binding precedent is
not subject to the exclusionary rule.”).
But, at the same time, the Court does not know with certainty whether the HSI database
actually involves the same public interests, characteristics, and limitations as the NSA program
such that both databases should be regarded similarly under the Fourth Amendment. In
particular, the NSA program was specifically limited to being used for counterterrorism
purposes, see Klayman, 957 F. Supp. 2d at 15-16, and it remains unclear if the database that HSI
searched imposed a similar counterterrorism requirement. If the HSI database did have such a
limitation, that might suggest some level of flagrancy by HSI because it was clear that neither
18
Sheikhi nor Hassanshahi was involved in terrorism activities. With so many caveats, the
Government’s litigation posture leaves the Court in a difficult, and frustrating, situation. Yet,
even assuming that the HSI database was misused to develop the lead into Hassanshahi, HSI’s
conduct appears no more flagrant than law enforcement conduct in other “unlawful lead” cases,
which still held that the attenuation exception applied nonetheless. 6 Cf. Carter, 573 F.3d at 421
(admitting evidence after illegal search of defendant’s residence); Smith, 155 F.3d at 1059
(admitting evidence resulting from an “illegally intercepted wire communication”); Friedland,
441 F.2d at 856 (admitting evidence after the “FBI unlawfully installed electronic ‘bugs’” in an
office).
The Court is more certain, though, that HSI did not search the law enforcement database
for the purpose of “extracting evidence against the defendant.” Washington, 387 F.3d at 1075
(citation omitted). When it executed the database search using Sheikhi’s business telephone
number, HSI had no inclination that Hassanshahi was involved with Sheikhi or his company;
indeed, the agency used the law enforcement database to cast a wide net for potential U.S.-based
suspects for the very reason that it had no leads into U.S. suspects at the time. Thus, although
that net eventually ensnared Hassanshahi, the lack of initial targeting compels the Court to
conclude that HSI did not act purposefully or in bad faith to violate Hassanshahi’s constitutional
rights.
6
The Government’s silence regarding the nature of the law enforcement database
has made the Court’s analysis more complex than it should be. Although the Court still
concludes that the attenuation exception applies in large part based on the “unlawful lead” line of
cases, the Court will order that the Government provide the Court with an ex parte declaration
summarizing the contours of the mysterious law enforcement database used by HSI, including
any limitations on how and when the database may be used.
19
4. United States v. Scios and United States v. Najjar Do Not Compel A Different Result
Finally, the Court must address two arguments raised through Hassanshahi’s reply
memorandum. First, Hassanshahi argues that the D.C. Circuit’s en banc decision in United
States v. Scios, 590 F.2d 956 (D.C. Cir. 1978), is directly on point and compels against finding
attenuation. See Def.’s Reply Supp. Mot. Suppress 20-19. In Scios, law enforcement agents
illegally searched sixty file folders located in the defendant’s home after the defendant had been
arrested. See id. at 958. One of the folders contained various papers, including a credit card
receipt for a motel bearing the defendant’s name and an itemized bill from the same motel
indicating that “Mr. Massa” had registered for the room. See id. The agents issued a subpoena
to require Massa to appear before a grand jury regarding the defendant’s possible unlawful
activity, namely wiretapping. See id. Massa initially refused to testify, but he later agreed after
the prosecutor granted him immunity and threatened contempt for any further refusal. See id. at
958-59. After the defendant was indicted, he moved to suppress Massa’s testimony as fruit of
the illegal seizure of the credit card receipt. See id. at 959. The en banc court held that Massa’s
testimony was inadmissible because his decision to testify was “made solely to avoid being jailed
for contempt.” Id. at 961. The court also noted that the taint from the illegal search had not
dissipated because the agents were unaware of Massa’s existence prior to the search, and because
Massa agreed to testify only in response to official pressure, not through his own volition. Id. at
963-64.
The Court finds that Scios is inapplicable to the instant case. Scios involved applying the
fruit of the poisonous tree doctrine to testimony from a witness whose identity was uncovered
through a search that violated the defendant’s Fourth Amendment rights. Thus, in Scios, and in
other cases relying on Scios since then, the question was whether a witness voluntarily had
20
chosen to testify such that the testimony may be considered attenuated from the prior unlawful
search. See Scios, 590 F.2d at 960 (“In certain circumstances, the attenuation doctrine has been
applied where the witness who has been located as the result of an illegal search or seizure has
voluntarily decided to testify.” (citations omitted)); id. (“Turning to the case before us, we
examine first the claim that the taint of the illegal seizure was attenuated by a voluntary decision
to testify.”); see also United States v. Stevens, 612 F.2d 1226, 1230 (10th Cir. 1979) (comparing
Scios and affirming the district court’s decision to admit witness testimony when the witness
“offered to testify” in part due to “a desire ‘to change his life-style and stay out of trouble,’” not
due to the threat of contempt or other penalties like in Scios); United States v. Davis, No. CRIM.
10-339, 2011 WL 1655549, at *5-6 (D. Or. May 2, 2011) (comparing Scios and admitting
witness testimony when the witness “made an independent and voluntary decision to speak with
the officers several months after she was identified as a result of an illegal search,” such that
attenuation existed).
Here, there is no witness testimony against Hassanshahi, and even stretching Scios to its
plausible limits, Hassanshahi has not, and cannot, demonstrate how any relevant physical
evidence against him might be considered “coerced” like the witness in Scios. Cf. Scios, 590
F.2d at 961 (“[I]t is plain that Massa’s giving of testimony before the grand jury, and presumably
at the trial is purely and simply a product of coercion.”). Instead, the unlawful law enforcement
database search allowed HSI to uncover the identity of Hassanshahi — the defendant, not a
witness and not evidence in and of itself — by linking him to the 818 number through the
Google subpoena; the 818 number then led HSI to other physical evidence, such as that in TECS,
not any witness testimony. Accordingly, the scenario here is both factually and legally distinct
from Scios. The correct analysis, in fact, involves the “wrongful lead” cases, discussed above, in
21
which a limited piece of illegally obtained evidence directs law enforcement to focus its
subsequent lawful investigation on the defendant, not on involuntary witness testimony cases
like Scios. 7
Second, Hassanshahi suggests through his reply memorandum that United States v.
Najjar, 300 F.3d 466 (4th Cir. 2002), requires the Court to find a lack of attenuation here. See
Def.’s Reply Supp. Mot. Suppress 23-25. Not so. In Najjar, the defendant argued that the
district court erred by admitting evidence obtained through two search warrants when much of
the evidence used to obtain those two warrants came from the execution of an earlier warrant in
1995 that later was invalidated. See id. at 475. In affirming the district court’s decision, the
Fourth Circuit explained that the officer’s “investigation was not a simple matter of looking at
salvage certificates obtained in the 1995 search and obtaining new evidence from their use,
rather it was a substantial investigative effort unconnected to the seized documents
themselves[.]” Id. at 479. The court then relied on a theory similar to the “wrongful lead”
doctrine by explaining that “it is not enough that the original certificates may have triggered [the
officer’s] suspicion or gave impetus or direction toward what is to be focused on by the
government.” Id. (internal citation and quotation omitted). Thus, the court concluded that
“[e]ven if the original illegal search in some slight way was a but-for cause of the later searches,
7
Even ignoring this fundamental difference, Scios still does not compel a different
result here. There is no doubt that in the case of both Messa’s testimony in Scios and the
forensic examination of Hassanshahi’s laptop, “but for” the initial unlawful search, law
enforcement would not have uncovered the relevant evidence, thus making both pieces of
evidence “fruit” of the poisonous tree. Cf. Def.’s Reply Supp. Mot. Suppress 22 (arguing that
“[j]ust like Massa’s testimony in Scios, the computer search in this case is fruit of the poisonous
tree and should be suppressed”). But unlike in Scios, where the D.C. Circuit found no
attenuation primarily due to a lack of voluntariness by Messa, all three attenuation factors in this
case suggest that the illegal taint from the database search was purged by the time of the forensic
examination. Hassanshahi fails to appreciate that merely having “but-for” causation does not
require suppression when other attenuating factors are at play.
22
[the officer’s] two-year investigation and the intervening circumstances were sufficient to break
the causal link between any primary illegality and later obtained evidence.” Id.
Though HSI’s investigation into Hassanshahi lasted several months rather than two years,
the conclusion in Najjar in consistent with the Court’s decision here because of the significant
investigative steps HSI took between the database search and the forensic examination, as well
as the limited probative value of the unlawfully discovered 818 number. To distinguish the
cases, Hassanshahi asserts that “no time at all passed between the illegal search (accessing the
telephony database) and when the agent ordered the computer search when and if Hassanshahi
returned to the U[.]S.” Def.’s Reply Supp. Mot. Suppress 25. But Hassanshahi’s argument
misstates the facts of the case and therefore focuses on the wrong timeframe. In reality, the HSI
agent did not order the forensic examination “when and if Hassanshahi returned to the U[.]S.”
Id. Instead, on November 29, 2011, the agent “augmented the existing TECS records regarding
Hassanshahi by entering instructions that [the agent] should be alerted if and when [Hassanshahi]
returned to the United States, and that [Hassanshahi] should be referred for secondary screening
by [CBP] officers when he returned to the U.S.” 2d Akronowitz Aff. ¶ 17. There is no support
in the record for Hassanshahi’s claim that the forensic examination also was ordered on
November 29 or, for that matter, at any other time prior to Hassanshahi’s arrival at LAX on
January 12, 2012. Indeed, the record does not reflect any evidence that law enforcement had any
way of knowing which devices, if any, Hassanshahi would possess when he eventually crossed
the border at a then-unknown date.
Alternatively, even if the Court used November 29, 2011, as the relevant date, most of
the key investigative steps leading to the forensic examination already had occurred between
then and the August 24, 2011, database search such that the same temporal proximity analysis
23
should apply. Thus, Hassanshahi’s suggestion that “[t]here was no time for any independent
investigation” during this two month period, see Def.’s Reply Supp. Mot. Suppress 25, is not
supported by the undisputed facts in the record, which show that HSI did conduct an independent
investigation in this period by using, for example, TECS and a Google subpoena. 8 Lastly,
Hassanshahi asserts that Najjar is distinguishable because the circuit court there agreed with the
district court’s finding that the original violation was not purposeful or flagrant. See id. As this
Court has explained, however, it reaches the same conclusion as Najjar about the lack of
purposefulness or flagrancy with regard to the database search. Simply put, then, nothing in
Najjar requires a different conclusion here. 9
* * *
In sum, the Court finds that all three attenuation factors compel in favor of finding that
the initial taint of illegality from the law enforcement database search was purged. Accordingly,
the Court concludes that the “causal chain” leading to the discovery of laptop evidence was “too
attenuated to justify exclusion.” Brodie, 742 F.3d at 1063 (citation and quotation omitted). The
Court therefore refuses to suppress the laptop evidence on this basis.
8
Hassanshahi also argues that “there was no independent source of information”
linking Hassanshahi to Sheikhi. See Def.’s Reply Supp. Mot. Suppress 25. Though true that the
database search provided the only link between Hassanshahi and Sheikhi, Hassanshahi does not
explain why this fact is relevant to the attenuation analysis.
9
It appears to the Court that Hassanshahi actually may be arguing about the
independent discovery exception to the fruit of the poisonous tree doctrine, not attenuation. Cf.
United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007) (explaining that inevitable
discovery, discovery through independent means, and attenuation are alternative methods for
dissipating the taint from an unlawful search or seizure). If that is the case, Hassanshahi presents
a straw man argument because the Government never suggested that it discovered the laptop
evidence through independent means.
24
C. Reasonable Suspicion Existed For The Forensic Laptop Examination
The broad power of the Government to conduct searches at the international borders is
rooted in “the long-standing right of the sovereign to protect itself by stopping and examining
persons and property crossing into this country.” 10 United States v. Ramsey, 431 U.S. 606, 621
(1977). The Supreme Court therefore has explained that “[t]he Government’s interest in
preventing the entry of unwanted persons and effects is at its zenith at the international border.”
United States v. Flores-Montano, 541 U.S. 149, 152 (2004). Given the strong interests at stake,
the Supreme Court has “[t]ime and again … stated that ‘searches made at the border … are
reasonable simply by virtue of the fact that they occur at the border.’” Id. at 152-53 (quoting
Ramsey, 431 U.S. at 616).
Notwithstanding this sweeping language about the Government’s expansive border
search power, the Supreme Court has suggested over the years that the Fourth Amendment may
impose some limits even at the nation’s borders, though the Court has not always spoken
definitively on that subject, nor has it clearly defined such limits, if any. Cf. Flores-Montano,
541 U.S. at 152-53, 155-56 (noting that there are “reasons that might support a requirement of
some level of suspicion in the case of highly intrusive searches of the person-dignity and privacy
interests of the person being searched,” as well as in the case of searches of property that are
“destructive”); United States v. Montoya de Hernandez, 473 U.S. 531, 541 & n.4 (1985) (noting
that the Court has “not previously decided what level of suspicion would justify a seizure of an
incoming traveler for purposes other than a routine border search”); Ramsey, 431 U.S. at 618
n.13 (leaving open the question of “whether, and under what circumstances, a border search
10
As a threshold issue, it is well settled that searches of passengers on incoming
international flights at a U.S. airport are considered the “functional equivalent of a border
search” for Fourth Amendment purposes. Almeida-Sanchez v. United States, 413 U.S. 266, 273
(1973).
25
might be deemed ‘unreasonable’ because of the particularly offensive manner in which it is
carried out”). Indeed, “the ultimate touchstone of the Fourth Amendment is ‘reasonableness,’”
Brigham City, Utah v. Stuart, 547 U.S. 398, 403 (2006), so it appears only logical that some
circumstance might arise at the border when the Government’s conduct nudges into
unreasonableness territory.
Hassanshahi now argues that this Court should recognize one such limit to the border
search power by following two recent federal court decisions — United States v. Cotterman, 709
F.3d 952 (9th Cir. 2013), and United States v. Saboonchi, 990 F. Supp. 2d 536 (D. Md. 2014) —
and holding that the Fourth Amendment required reasonable suspicion to conduct the forensic
examination of Hassanshahi’s laptop following the border stop. Before reaching the legal merits
of this position, however, the Court first must determine whether reasonable suspicion did in fact
exist. And because the Court ultimately concludes that there was reasonable suspicion for the
forensic examination of Hassanshahi’s laptop, the constitutional question of whether that
examination required reasonable suspicion becomes moot. 11
11
Interestingly, both Cotterman, 709 F.3d at 970 (“[W]e conclude that the
examination of Cotterman’s electronic devices was supported by reasonable suspicion and that
the scope and manner of the search were reasonable under the Fourth Amendment.”), and
Saboonchi, 990 F. Supp. 2d at 571 (“All of this is more than sufficient to give rise to reasonable,
particularized suspicion — if not probable cause — that Saboonchi was involved in violations of
export restrictions on Iran.”), found reasonable suspicion for the respective forensic computer
examinations, yet both courts spent considerable space addressing a constitutional question that
had no practical effect on the final disposition of the case. By contrast, this Court finds that
engaging in such an exercise would be imprudent unless reasonable suspicion was found not to
exist. See Stillman v. CIA, 319 F.3d 546, 548 (D.C. Cir. 2003) (holding that the district court
abused its discretion by “unnecessarily” deciding a First Amendment question and explaining
that “‘[a] fundamental and longstanding principle of judicial restraint requires that courts avoid
reaching constitutional questions in advance of the necessity of deciding them.’” (quoting Lyng
v. Nw. Indian Cemetery Protective Ass’n, 485 U.S. 439, 445 (1988)).
26
1. Reasonable Suspicion Standard
Reasonable suspicion exists when a law enforcement officer has “specific and articulable
facts,” which, considered together with rational inferences from those facts, indicate that
criminal activity “may be afoot.” Terry v. Ohio, 392 U.S. 1, 21, 30 (1968). When making the
reasonable suspicion determination, courts are instructed to view the “totality of the
circumstances” and not engage in a “divide-and-conquer analysis” in which courts consider
whether each fact is “susceptible to an innocent explanation.” United States v. Arvizu, 534 U.S.
266, 274 (2002). Thus, “[a] determination that reasonable suspicion exists … need not rule out
the possibility of innocent conduct.” Id. at 274 (citation omitted).
In addition, officers may “draw on their own experience and specialized training to make
inferences from and deductions about the cumulative information available to them that ‘might
well elude an untrained person.’” Id. at 273 (quoting United States v. Cortez, 449 U.S. 411, 418
(1981)); see also Ornelas v. United States, 517 U.S. 690, 699 (1996) (reviewing court must give
“due weight” to factual inferences drawn by law enforcement officers). Though an officer’s
reliance on a mere “inchoate and unparticularized suspicion or ‘hunch’” is insufficient to
establish reasonable suspicion, see Terry, 392 U.S. at 27, the likelihood of criminal activity need
not rise to the level required for probable cause, nor even to the preponderance of the evidence
standard. See United States v. Sokolow, 490 U.S. 1, 7 (1989).
Before turning to the reasonable suspicion analysis, the Court notes that it must exclude
from the calculus evidence of the one telephone call between Sheikhi’s business phone number
and Hassanshahi’s 818 number because this evidence was the clear and direct result of an
unconstitutional search, as conceded by the Government. See, e.g., United States v. Karo, 468
U.S. 705, 719 (1984) (explaining that “if sufficient untainted evidence was presented in the
27
warrant affidavit to establish probable cause, the warrant was nevertheless valid” (citation
omitted)); United States v. Pina-Aboite, 109 F. App’x 227, 234 (10th Cir. 2004) (explaining that
because the officer violated the Fourth Amendment by extending the scope of a traffic stop after
finding no traffic violation, incriminating statements made later during the stop were tainted and
could not contribute retrospectively to establishing reasonable suspicion for the prolonged stop);
United States v. Eustaquio, 198 F.3d 1068, 1071-72 (8th Cir. 1999) (“As the touching of the
defendant’s midriff area was violative of the Fourth Amendment, any evidence resulting
therefrom is inadmissible and cannot be used to determine whether there was a reasonable
suspicion to detain or search her.”). The Court next turns to the remaining evidence known
about Hassanshahi prior to the forensic examination.
2. Hassanshahi’s Criminal History And Frequent Travel To Iran
Prior to conducting the forensic examination, HSI conducted research on Hassanshahi in
TECS, which led HSI to discover details about a 2003 federal investigation into Hassanshahi’s
participation in a conspiracy to establish an American company for the purpose of entering into
an agreement with a Chinese company to build a computer production facility in Iran. 12 Federal
12
In his reply memorandum, Hassanshahi suggests that the probative value of the
2003 HSI investigation is significantly lessened because he was “cleared” of any criminal
misconduct. The decision not to file criminal charges, however, does not automatically equate to
him having been cleared of all wrongdoing, and anyway, it is the facts uncovered about
Hassanshahi’s role in the scheme to violate the Iran export embargo that are probative of a
potential new scheme to violate the same laws in 2011, not the ultimate decision not to file
charges. Indeed, according to the California state court decision dismissing Hassanshahi’s
breach of contract claim as against public policy, Hassanshahi and his co-plaintiffs specifically
alleged that “they and defendants [Chinese companies] agreed to establish an Iranian corporation
to manufacture notebook computers in [Iran’s] free trade zone and to sell that product in Iran and
in neighboring countries.” Kashani v. Tsann Kuen China Enter. Co., 118 Cal. App. 4th 531,
537-38 (Cal. App. 2d Dist. 2004). Plaintiffs also alleged that as part of this agreement, they
“traveled to Iran to begin setting up the plant,” “secured the necessary governmental
cooperation,” and “invested considerable funds, time and resources into the project to find the
land, plan the facility, and other expensive preparations … [and to] make certain commitments,
28
circuit courts have consistently held, however, that a person’s criminal history is insufficient to
create reasonable suspicion by itself. See, e.g., United States v. Johnson, 482 F. App’x 137, 148
(6th Cir. 2012) (“The fact that [defendant] had committed crimes in the past, while it has a place
in the reasonable-suspicion analysis, is not, without more, strong evidence of criminal activity in
the present.”); United States v. Walden, 146 F.3d 487, 490 (7th Cir. 1998) (“Reasonable
suspicion of criminal activity cannot be based solely on a person’s prior criminal record.”). But,
at the same time, “criminal history contributes powerfully to the reasonable suspicion calculus,”
United States v. Santos, 403 F.3d 1120, 1132 (10th Cir. 2005), and an officer’s “knowledge of
the individual’s criminal history help[s] to dispel any likelihood that the observed conduct
actually was innocent.” United States v. Monteiro, 447 F.3d 39, 47 (1st Cir. 2006).
Here, HSI’s 2003 investigation into Hassanshahi’s scheme to violate the Iran trade
embargo was relevant for more than just establishing Hassanshahi’s general history with law
enforcement, as his past activity in Iran also negatively colored the perception of any future
travel by him to that specific country. Thus, Hassanshahi’s travel to Iran after 2003 should not
be measured as general travel abroad to a foreign country like another person’s travel might, but
rather as him returning to the specific “scene of the crime,” for lack of a better term. Travel to
Iran, then, becomes a particularized and objective fact potentially indicative of ongoing criminal
activity by Hassanshahi because one quite reasonable explanation for his ongoing presence in
Iran was that he continued to conduct business involving that country, similar to what he did in
2003. Cf. Reid v. Georgia, 448 U.S. 438, 440-41 (1980) (finding no reasonable suspicion in
large part because defendant’s arrival “from Fort Lauderdale, which the agent testified is a
including [with] the government [of Iran].” Id. at 548 (internal citations and quotation marks
omitted). Given Hassanshahi’s own admissions in the civil lawsuit, the assertion that no criminal
charges were filed may be true, but that does not negate the reality of the underlying events.
29
principal place of origin of cocaine sold elsewhere in the country[,] … describe[d] a very large
category of presumably innocent travelers, who would be subject to virtually random seizures
were the Court to conclude that as little foundation as there was in this case could justify a
seizure.”); Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (criticizing the majority for finding
reasonable suspicion based in large part on defendant recently traveling to Mexico, a country
broadly associated with “sex tourism,” because using such a generic fact to support reasonable
suspicion potentially means that “thousands of individuals — many with decades-old convictions
— will now be forced to reconsider traveling to entire countries or even continents, or will need
to leave all their electronic equipment behind, to avoid arousing a ‘reasonable’ suspicion.”).
In addition, TECS revealed not only that Hassanshahi was in Iran for some period of time
between late 2011 and early 2012, but also that he had returned from Iran in 2006, twice in 2008,
once in 2010, and once again in May 2011. Given Hassanshahi’s history in acting to violate the
Iran trade embargo, these frequent trips potentially were suggestive of a continuous illegal
business relationship with someone in Iran, or with the country’s government itself. Cf. United
States v. Glover, 353 F. App’x 314, 317 (11th Cir. 2009) (finding that defendant’s multiple “trips
to Trinidad, which was known to be a high drug trafficking location,” were indicative of drug
smuggling and helped support reasonable suspicion); Hurn v. United States, 221 F. Supp. 2d
493, 503 (D.N.J. 2002) (finding that defendant’s “repeated, prior trips to Jamaica,” a “known
drug source country,” were indicative of drug smuggling and helped support reasonable
suspicion); United States v. Clymore, 515 F. Supp. 1361, 1367 (E.D.N.Y. 1981) (evidence that
defendant was returning from a trip to Pakistan, a country known as a source of narcotics; that
defendant had made a number of other trips to the Middle East; and that defendant previously
30
had been arrested for attempted smuggling supported finding reasonable suspicion to conduct
invasive strip search at airport).
This possibility was reinforced by the fact that in 2005, Hassanshahi was stopped,
questioned, and then released by CBP officers after he returned from Dubai with $15,000 in
cash, an act that also might suggest continued business activity in the Middle East following the
2003 investigation. Further, when Hassanshahi landed at LAX on January 12, 2012, he had
approximately $7,000 in cash in his possession. Cf. United States v. Chandler, 437 F. App’x
420, 428 (6th Cir. 2011) (noting that “while the mere possession of currency is innocent
behavior, the large amount of currency possessed by [defendant] was unusual” and indicative of
a recent narcotics transaction) (emphasis in original); United States v. Green, 599 F.3d 360, 376
(4th Cir. 2010) (holding that the incriminating nature of a large sum of money could be
“immediately inferred” when defendant was suspected of drug-related activities); United States
v. Whitney, 391 F. App’x 277, 279, 282 (4th Cir. 2010) (discovery of roughly $3,000 in cash in
defendant’s pockets during a traffic stop was an important fact for justifying reasonable
suspicion); United States v. Chhien, 266 F.3d 1, 8-9 (1st Cir. 2001) (discovery of $2,000 in cash
during a traffic stop helped support determination of reasonable suspicion and justified a brief
period of further detention); Conrod v. Davis, 120 F.3d 92, 97-98 (8th Cir. 1997) (discovery of
$6,000 in cash in individual’s pocket and $4,000 in suitcase helped establish reasonable
suspicion). Together, these events further add to the pile of evidence known to HSI which
suggested that Hassanshahi had maintained ongoing business dealings in the Middle East, and
Iran in particular.
31
3. Accessing E-Mail Account In Iran And Telephone Calls From Iran
HSI also understood that Hassanshahi’s e-mail account was accessed twenty-four times
from an Iran IP address between December 8, 2011, and December 15, 2011. At the same time,
however, this account was accessed from IP addresses in multiple other countries within minutes
of apparently being accessed in Iran, which may suggest that other users had access to the
account. Nonetheless, a “determination that reasonable suspicion exists … need not rule out the
possibility of innocent conduct,” Arvizu, 534 U.S. at 277, and Hassanshahi’s seemingly frequent
use of e-mail while in Iran suggests that he may have been conducting business while traveling
to that country, especially in light of the 2003 investigation.
In addition, HSI possessed evidence that around the same time Hassanshahi traveled to
Iran, he also made contact with one Iranian telephone number and received a missed call from
another Iranian number. Though it certainly is possible that these two telephone calls were
nothing more than innocent conduct by Hassanshahi, it also is plausible that the calls further
indicated Hassanshahi’s continued involvement in prohibited activities inside Iran. Again, as the
Supreme Court and the D.C. Circuit have explained, “that an individual’s conduct is ‘ambiguous
and susceptible of an innocent explanation’ does not mean that it may not be grounds for
suspicion: ‘Terry recognized that … officers could detain [such] individuals to resolve the
ambiguity.’” United States v. Brown, 334 F.3d 1161, 1168 (D.C. Cir. 2003) (quoting Illinois v.
Wardlow, 528 U.S. 119, 125-26 (2000)) (alteration in Brown).
4. Possession Of Multiple Electronic Devices At LAX
Finally, one additional fact weighs in favor of reasonable suspicion existing before the
forensic laptop examination. When Hassanshahi landed at LAX, he possessed multiple
electronic devices and data storage accessories, including a laptop computer, multimedia cards,
32
thumb drives, a camcorder, SIM cards, and a cell phone. See 1st Arkonowitz Aff. ¶ 19. Though
it generally is unremarkable nowadays for a person traveling abroad to bring a computer,
camcorder, or cell phone with them, Hassanshahi’s possession of multiple data storage devices
appears to be inconsistent with just personal use while traveling. Instead, one reasonable
inference was that these data storage devices, and thus perhaps the corresponding electronic
devices as well, were necessary for conducting business while Hassanshahi was in Iran. This
inference then further supports the possibility that Hassanshahi traveled to Iran to engage in the
same type of business activity for which he was investigated in 2003.
5. Totality Of The Circumstances And Reasonable Suspicion
Judicial review of the Government’s argument for reasonable suspicion is “not a rubber
stamp.” United States v. Freeman, 735 F.3d 92, 103 (2d Cir. 2013). At the same time, however,
the Court is mindful that reasonable suspicion sets a “low threshold,” United States v. Rivera,
353 F.App’x 535, 537 (2d Cir. 2009), and requires only a “‘minimal level of objective
justification.’” United States v. Edmonds, 240 F.3d 55, 59 (D.C. Cir. 2001) (quoting INS v.
Delgado, 466 U.S. 210, 217 (1984)). Further, though the contemporaneous evidence against
Hassanshahi was, in a vacuum, innocent — travel to Iran; telephone calls from and e-mail
activity in Iran; possession of legal electronic and data storage devices while traveling abroad —
“the question of whether reasonable suspicion existed can only be answered by considering the
totality of the circumstances as the officer on the scene experienced them.” Id. at 59-60
(citations omitted). Indeed, “[a]n officer’s training and experiences enable him to ‘draw[]
inferences and make[] deductions’ from seemingly innocuous facts — ‘inferences and
deductions that might well elude an untrained person.’” Id. at 60 (quoting Cortez, 449 U.S. at
418) (alteration in Edmonds).
33
Here, HSI Special Agent Arkonowitz, who was in communication with the CBP officers
who detained Hassanshahi at LAX, had several years of experience working for HSI, including
specific experience with criminal investigations into the illegal exportation of goods from the
U.S to Iran. See 1st Arkonowitz Aff. ¶ 1; 2d Arkonowitz Aff. ¶ 1. The Court also must consider
the innocuous facts known about Hassanshahi not only for what they suggest taken together, but
also for what they suggest in the context of the 2003 HSI criminal investigation. This
investigation established a clear precedent of Hassanshahi attempting to violate the Iran trade
embargo, and such evidence “contributes powerfully to the reasonable suspicion calculus.”
Santos, 403 F.3d at 1132. Indeed, as one circuit court has explained, law enforcement’s
“knowledge of the individual’s criminal history” can “help[] to dispel any likelihood that the
observed conduct actually was innocent.” Monteiro, 447 F.3d at 47.
Ultimately, based on Hassanshahi’s recent contacts with Iran — including the latest trip
to Iran following a series of other visits to Iran in the past few years and the recent telephone
calls from Iran — the large quantity of electronic devices and cash in Hassanshahi’s possession
when he returned from Iran in January 2012, and the 2003 criminal investigation into what may
have been similar illegal conduct, the Court finds that law enforcement possessed “specific and
articulable facts,” which, considered together with rational inferences from those facts, indicated
that Hassanshahi may have been up to his old tricks by again conducting business in violation of
the Iran trade embargo. See Terry, 392 U.S. at 21; see also Wayne R. LeFave et al., Criminal
Procedure § 3.8 (5th ed. 2009) (“The Terry reference to when ‘criminal activity may be afoot’
strongly suggests that though the arrest standard may sometimes require that guilt be more
probable than not, this is never the case as to a stopping for investigation, where the very purpose
is to clarify an ambiguous situation.” (footnote omitted; emphasis in original)).
34
Other cases in which federal courts have found reasonable suspicion based on similar or
lesser evidence are instructive. For example, in United States v. Massi, 761 F.3d 512 (5th Cir.
2014), the circuit court affirmed the district court’s finding of reasonable suspicion to justify an
investigatory inspection of an airplane based on the following: the plane’s “suspicious” flight
path and frequent refueling stops between Orlando and Las Vegas; the registered owner of the
plane having been convicted of drug trafficking approximately twenty years prior; and a
passenger on the plane having recently crossed from Tijuana, Mexico, “a known hub of the
illegal drug trade,” into the U.S. See id. at 518, 522-23. Similarly here, Hassanshahi had a
history of illegal conduct directly relevant to the crime for which he now was suspected. In
addition, Hassanshahi had recently traveled to Iran, a suspicious country that might be
considered the “hub” of his illegal activity given the 2003 investigation, and he also had made
multiple trips to Iran in recent years, which together could be considered a suspicious travel
history given that Iran is not a common destination for U.S. citizens.
As another example, the district court in United States v. Bunty, 617 F. Supp. 2d 359
(E.D. Pa. 2008), considered the defendant’s motion to suppress evidence that was found on his
computer equipment during a search after he arrived at a Philadelphia airport on a flight from
London. See id. at 363-64. After concluding that reasonable suspicion was not required for the
search, the district court went on to consider whether such suspicion existed anyway. See id. at
365. In doing so, the court found that reasonable suspicion did exist for the computer search
based on the following: the defendant had been arrested for the sexual abuse of a child and
recently had pled guilty to corrupting the morals of a minor in that case; the defendant possessed
a letter from his probation officer giving him permission to travel to England; the defendant
possessed two laptop computers, a digital camera, a cell phone, and a variety of electronic
35
storage devices, including several compact discs, movie DVDs, flash drives, and floppy disks
that could not be used with his computers; and the defendant had a history of “extensive
international travel.” 13 See id.
Similarly here, Hassanshahi had a criminal history relevant to the crime for which he now
was suspected — there, possession of child pornography; here, violating the Iran trade embargo.
In addition, Hassanshahi had recently traveled abroad, and he also had entered the U.S. with a
variety of electronic devices and data storage accessories that could have been used in
furtherance of the suspected illegal activity. Indeed, unlike the defendant in Bunty, who had just
returned from London, which itself was not especially associated with criminal activity as to the
defendant or in general, Hassanshahi had traveled to Iran, which was exactly where his prior
relevant bad conduct had occurred.
Finally, in United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), a case on which
Hassanshahi heavily relies, the Ninth Circuit’s en banc majority found reasonable suspicion to
conduct a forensic examination of the defendant’s computer following a border stop at LAX
based on the following: the defendant’s 1992 conviction for child molestation; the defendant’s
recent travel to Mexico, a “country associated with sex tourism,” as well as other unspecified
recent travel outside the U.S.; the defendant’s collection of electronic equipment at the border,
which included the defendant and his wife each having a laptop and digital camera, as well as
one video camera between them; and the existence of password-protected files on the
defendant’s computer. See id. at 968-70.
The Court finds that for several reasons, the facts supporting reasonable suspicion here
are significantly more probative of ongoing criminal activity than the facts in Cotterman. First,
13
It is unclear from the district court’s opinion whether this travel referred to
defendant’s recent trip to England or other unknown international trips.
36
Hassanshahi’s criminal history was only eight years-old at the time of the forensic examination,
whereas Cotterman’s conviction was fifteen-years old when the examination of his devices
occurred. See id. at 957. Second, Cotterman’s recent travel to Mexico, a “country associated
with sex tourism,” falls very close to the category of evidence that the Supreme Court has
cautioned against using for reasonable suspicion because it “describe[s] a very large category of
presumably innocent travelers,” Reid v. Georgia, 448 U.S. 438, 441 (1980), while Hassanshahi
traveled on multiple occasions to the specific country at issue in the 2003 criminal investigation,
thus making his travel far more probative of criminal conduct. 14 Third, Cotterman and his wife
each carried a laptop and digital camera when traveling to Mexico, as well as one video camera
between them, which altogether does not appear particularly remarkable for international
tourists. Cf. Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (“In today’s world, the fact that
Cotterman and his wife each carried a laptop and digital camera when traveling internationally,
as well as one video camera between them, is no more evidence of ‘sex tourism’ than of any
other kind of tourism.”). Hassanshahi, on the other hand, possessed a laptop computer,
multimedia cards, thumb drives, a camcorder, SIM cards, and a cell phone, which together
suggest a person engaged in business while traveling to Iran, not tourism. Finally, while the
Ninth Circuit majority relied on Cotterman having password-protected files on his computer as
the last fact supporting reasonable suspicion, several much more probative facts were known
14
A more analogous situation would have been, for example, if Cotterman’s 1992
conviction specifically involved child pornography that he had obtained from, or that perhaps
had been made in, Mexico, which would have made his travel to Mexico more relevant and
specific than just a visit to a country generically associated with certain criminal activity. Cf.
Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (“[T]he fact that Cotterman was returning
from Mexico fails to support a finding of reasonable suspicion. Mexico is a popular travel
destination for Californians, including those who travel to Mexico for its beaches, culture and
weather, and not for its sex tourism. Travel to Mexico simply does not support reasonable
suspicion without more specific evidence that Cotterman traveled to a particular establishment,
city, or even region, associated with sex tourism.”).
37
about Hassanshahi, such as the two recent telephone calls from Iran, the 2005 questioning by
CBP officers after Hassanshahi returned from Dubai with $15,000 in cash, Hassanshahi’s
multiple other trips to Iran in recent years, and Hassanshahi’s possession of $7,000 in cash when
he arrived at LAX in January 2012. 15
* * *
The D.C. Circuit has held that “even though a single factor might not itself be sufficiently
probative of wrongdoing to give rise to a reasonable suspicion, the combination of several
factors — especially when viewed through the eyes of an experienced officer — may.”
Edmonds, 240 F.3d at 60. That is exactly the case here. Through the combination of multiple
factors, none of which individually constituted direct evidence of criminal activity but all of
which were consistent with the scheme uncovered during the 2003 HSI investigation, the Court
finds that reasonable suspicion existed to conduct the forensic examination of Hassanshahi’s
laptop. Having reached this conclusion, the Court need not address whether reasonable
suspicion was required as a matter of law because that question is rendered moot.
IV. CONCLUSION
For the foregoing reasons, the motion to suppress is denied. An order consistent with
this Memorandum Opinion is separately and contemporaneously issued.
15
In his reply memorandum, Hassanshahi compares the facts known about him to
the facts on which the district court found reasonable suspicion for a forensic examination in
Saboonchi, 990 F. Supp. 2d 536 (D. Md. 2014). Without doubt, more information was known
about Saboonchi than was known about Hassanshahi at the time of the respective forensic
examinations. Saboonchi, however, does not set the floor of what evidence is required for
reasonable suspicion, and in fact, the district court there indicated that the evidence may even
have met the much higher probable cause threshold. See id. at 571 (“All of this is more than
sufficient to give rise to reasonable, particularized suspicion — if not probable cause — that
Saboonchi was involved in violations of export restrictions on Iran.”).
38
Dated: December 1, 2014 RUDOLPH CONTRERAS
United States District Judge
39