Legal Research AI

United States v. Hasston, Inc.

Court: District Court, District of Columbia
Date filed: 2014-12-01
Citations: 75 F. Supp. 3d 101
Copy Citations
1 Citing Case

                           UNITED STATES DISTRICT COURT
                           FOR THE DISTRICT OF COLUMBIA

UNITED STATES OF AMERICA                         :
                                                 :
       v.                                        :
                                                 :      Criminal Action No.: 13-0274 (RC)
SHANTIA HASSANSHAHI,                             :
also known as Shantia Hassan Shahi,              :      Re Document No.:       28
also known as Shahi,                             :
also known as Shantia Haas,                      :
also known as Sean Haas,                         :
                                                 :
       and                                       :
                                                 :
HASSTON, INC.,                                   :
                                                 :
       Defendants.                               :

                                 MEMORANDUM OPINION

                        DENYING DEFENDANT’S MOTION TO SUPPRESS

                                     I. INTRODUCTION

       Defendant Shantia Hassanshahi is charged with one count of conspiracy to violate the

International Economic Emergency Powers Act, 50 U.S.C. § 1705, and the Iranian Transactions

and Sanctions Regulations, 31 C.F.R. §§ 560.203-204, commonly referred to as the United

States’ trade embargo against Iran. Now before the Court is Hassanshahi’s motion to suppress

evidence uncovered during a forensic examination of his laptop following an international border

stop at Los Angeles International Airport on the basis that the laptop examination violated the

Fourth Amendment. Upon consideration of Hassanshahi’s motion and the opposition thereto, the

Court reaches two conclusions: first, the exclusionary rule does not require suppressing the

laptop evidence as fruit of the poisonous tree because discovery of that evidence was sufficiently

attenuated from the initial unlawful telephone database search; and second, reasonable suspicion
existed for conducting the forensic examination after Hassanshahi landed at the airport.

Accordingly, the Court will deny Hassanshahi’s motion to suppress.


                               II. FACTUAL BACKGROUND 1

       On August 16, 2011, Homeland Security Investigations (“HSI”) received an unsolicited

e-mail from a source indicating that the source had received an e-mail from an Iranian known as

M. Sheikhi who, on behalf of his Iranian company, sought the source’s assistance in procuring

protection relays for an Iranian power project. See Akronowitz Aff., ECF No. 37-1 (“2d

Akronowitz Aff.”) at ¶ 2. The e-mail from Sheikhi to the source contained an Iranian business

telephone number and the address for Sheikhi’s company in Tehran, Iran. See id. An HSI agent

used the telephone number associated with Sheikhi to search an “HSI-accessible law

enforcement database” in the hope of identifying potential U.S.-based targets engaged in the sale

or export of protection relays for use in Iran. See id. ¶ 3. The HSI agent’s search returned a

single telephone record indicating one call between Sheikhi’s telephone number and a telephone

number with an “818” area code (the “818 number”), which is the area code for Los Angeles,

California. See id. ¶ 4.


       1
                The United States of America (the “Government”) provides the following facts
through affidavits submitted by HSI Special Agent Akronowitz. At oral argument, Hassanshahi
objected to the Government’s provision of the Akronowitz affidavits by arguing that the
affidavits were internally inconsistent and, by implication, unreliable or simply untruthful. The
Court is satisfied, however, by the Government’s explanation that the first Akronowitz affidavit
was prepared to support the criminal complaint and the second, more detailed Akronowitz
affidavit was prepared to support the Government’s opposition to the motion to suppress.
Hassanshahi has provided no legal basis for why the Government was not entitled to submit a
supplemental affidavit in response to the motion to suppress, and the Court finds that there is
nothing internally inconsistent between the affidavits — the second affidavit merely provides
more information about the HSI investigation than the first affidavit, which is not surprising
given the different purposes. Finally, the fact that the Government later provided a third,
corrected Akronowitz affidavit does not render the earlier affidavits defective or unreliable in
their entirety.


                                                 2
       After discovering that the 818 number was assigned to Google/Google Voice, see id. ¶

13, HSI prepared and served on Google an Administrative Export Enforcement Control

Subpoena (“AEEC Subpoena”). See id. ¶ 14. In response, Google provided information that

identified Hassanshahi as the person to whom the 818 number was registered, and Google also

provided an e-mail address registered to Hassanshahi. See id. ¶ 15. In addition, Google provided

call log information for the period between September 6, 2011, and October 6, 2011, which

showed that the 818 number had received one telephone call from an unknown Iranian phone

number on October 5, 2011. See id.; Revised Akronowitz Aff., ECF No. 42-1 (“3d Akronowitz

Aff.”) at ¶ 15. The Google call log information also revealed one missed call between

Hassanshahi’s 818 number and an unknown Iranian cell phone number on September 19, 2011.

See 2d Akronowitz Aff. ¶ 15.

       On October 18, 2011, the HSI agent searched the Department of Homeland Security’s

(“DHS”) TECS database for additional information about Hassanshahi. 2 See id. ¶ 16. TECS led

the agent to discover that Hassanshahi was involved in a prior federal law enforcement

investigation into potential violations of the Iran trade embargo. 3 See id. ¶ 16a. Specifically, the


       2
               TECS is a database that serves as a data repository to support law enforcement
“lookouts,” border screening, and reporting for DHS’s primary and secondary border inspection
processes. See http://www.dhs.gov/xlibrary/assets/privacy/privacy-pia-cbp-tecs-sar-update.pdf.
       3
                The HSI agent’s affidavit does not state that this information about the 2003
investigation actually was written in TECS. Instead, the affidavit merely provides that after
“conduct[ing] research on Hassanshahi in TECS,” the HSI agent “discovered” the information
about the 2003 investigation. See 2d Akronowitz Aff. ¶ 16. At oral argument on the motion to
suppress, counsel for the Government suggested that the HSI agent discovered the information
about the investigation through a telephone call with another agent, a call that is not referenced
anywhere in the affidavit. The affidavit also does not specify if or when the HSI agent reviewed
HSI’s investigative file from the 2003 investigation. In fact, counsel for the Government stated
at oral argument that the 2003 HSI investigative file had not yet been produced to Hassanshahi as
part of discovery in this criminal case. As such, it remains somewhat ambiguous and open for
further clarification how the HSI agent learned the information about the 2003 investigation that
he put in his affidavit, as well as how much the HSI agent actually knew about this investigation


                                                  3
investigation occurred in 2003 through an HSI office in California, and the investigation

uncovered that Hassanshahi and two partners had established an American company for the

purpose of entering into an agreement with a Chinese company to build a computer production

facility in Iran. See id. Hassanshahi’s American company later filed a breach-of-contract claim

against the Chinese company in California state court, and that lawsuit was dismissed in part

because the contract was unenforceable as against public policy since it involved doing business

in Iran, a clear violation of U.S. law. See id. The Department of Justice did not file criminal

charges against Hassanshahi for his role in this venture. See id.

       The TECS search also revealed a number of earlier instances in which Hassanshahi

reentered the U.S. after traveling to the Middle East, including: an incident in 2005 when

Hassanshahi was questioned by U.S. Customs and Border Protection (“CBP”) agents after

returning from Dubai with $15,000 in cash; an incident in 2006 when Hassanshahi returned from

Tehran with a travel companion; and four other returns from Tehran — two in 2008, one in

2010, and one in May 2011. See id. ¶¶ 16c-e. In addition, HSI learned through TECS that

Hassanshahi presently was outside the U.S., so HSI supplemented the existing TECS information

by entering instructions that HSI should be alerted and Hassanshahi should be referred for

secondary screening the next time he returned to the U.S. See id. ¶ 17.

       Around December 20, 2011, HSI served Google with a second AEEC Subpoena, this

time seeking subscriber information and recent Internet protocol (“IP”) logs for Hassanshahi’s

Google e-mail account. See id. ¶ 18. In response, Google provided information indicating that

Hassanshahi’s e-mail account was accessed from an Iran IP address twenty-four times between



before ordering the forensic examination in January 2012. Nonetheless, for the purposes of the
motion to suppress, the Court accepts that the HSI agent knew the details about the 2003
investigation that he provides in the affidavit.


                                                 4
December 8, 2011, and December 15, 2011. See id. The information provided by Google also

showed, however, that Hassanshahi’s e-mail account was accessed from a U.S. IP address on the

same day it apparently was accessed from an Iran IP address, including sometimes within just a

few minutes of each other. See Def.’s Reply Supp. Mot. Dismiss Ex. 1 at 27 (Google Subscriber

Information). And on another occasion, Hassanshahi’s e-mail account apparently was accessed

on the same day from an Iran IP address, a Germany IP address, and a U.S. IP address,

occasionally alternating between the countries within minutes. See id. at 30.

       On January 11, 2012, HSI was alerted that Hassanshahi would be returning to the U.S.

the next day through Los Angeles International Airport (“LAX”). See 2d Akronowitz Aff. ¶ 19.

When Hassanshahi arrived at LAX on January 12, he was referred for secondary screening, at

which time CBP agents seized several electronic devices in Hassanshahi’s possession —

including a laptop computer, multimedia cards, thumb drives, a camcorder, SIM cards, and a cell

phone — and sent those devices to the HSI agent in Sterling, Virginia, for further analysis. 4 See

id. ¶ 20; Arkonowitz Aff., ECF No. 1-1 (“1st Arkonowitz Aff.”) at ¶ 19. When the devices

arrived in Virginia a few days later, HSI conducted a forensic examination of the laptop and

discovered numerous documents relating to Hassanshahi’s apparent business activities in Iran,

see 2d Arkonowitz Aff. ¶ 21, including documents showing that in 2009, Hassanshahi, through

his company, purchased approximately $6,000,000 in goods that were exported to Armenia and

then transshipped to Iran, see 1st Arkonowitz Aff. ¶ 22, as well as a September 5, 2011, letter

from Hassanshahi to the Iranian Minister of Energy in which Hassanshahi asked the Iranian

government for payment for “protective relays for transmission lines.” See id.



       4
            Hassanshahi also possessed “approximately” $7,000 in cash when he arrived at
LAX on January 12, 2012. See Def.’s Reply Supp. Mot. Suppress Ex. 1 at 48.


                                                5
         Now before the Court is Hassanshahi’s motion to suppress the evidence discovered

during the forensic examination of his laptop. Hassanshahi asserts two arguments in support of

his motion. First, he argues that the law enforcement database through which HSI initially

obtained his 818 number constituted an unconstitutional search, and under the fruit of the

poisonous tree doctrine, the forensic laptop examination was the direct result of that unlawful

search such that the laptop evidence was tainted and must be suppressed. Second and

alternatively, Hassanshahi argues that this Court should follow two recent court decisions from

other federal jurisdictions that concluded that the Fourth Amendment required reasonable

suspicion to conduct a forensic examination of an electronic device after an international border

stop. 5 Hassanshahi then argues that the laptop evidence must be suppressed here because the

Government lacked reasonable suspicion for the search. The Court addresses these arguments

below.


                                          III. ANALYSIS

         Hassanshahi’s motion to suppress requires the Court to analyze two important areas of

Fourth Amendment jurisprudence: the fruit of the poisonous tree doctrine and international

border searches. As to the first issue, it is well settled that evidence secured as the result of an

illegal search or seizure is tainted fruit of a poisonous tree that must be suppressed, unless

intervening events or other attenuating circumstances sufficiently dissipated the taint of the

initial illegality. The Court ultimately finds that such attenuating circumstances existed here, and

the exclusionary rule therefore does not require suppression of the evidence found on


         5
               See generally United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), cert.
denied, 134 S. Ct. 899 (2014), reh’g denied, 134 S. Ct. 1512 (2014); United States v. Saboonchi,
990 F. Supp. 2d 536 (D. Md. 2014), reconsideration denied, No. CRIM. PWG-13-100, 2014 WL
3741141 (D. Md. July 28, 2014).


                                                   6
Hassanshahi’s laptop. Second, the Court finds that reasonable suspicion existed for the forensic

examination of Hassanshahi’s laptop after it was seized during the international border stop at

LAX. Finally, because the Court reaches this conclusion as to reasonable suspicion, it need not

— and does not — take a position regarding whether, as a matter of law, the Fourth Amendment

required the Government to possess reasonable suspicion before conducting the forensic

examination.

                         A. Legal Standard For Motion To Suppress

       Generally, “[t]he proponent of a motion to suppress has the burden of establishing that

his own Fourth Amendment rights were violated by the challenged search or seizure.” Rakas v.

Illinois, 439 U.S. 128, 130 n.1 (1978) (citations omitted). However, when, like here, “‘a

defendant produces evidence that he was arrested or subjected to a search without a warrant, the

burden shifts to the government to justify the warrantless arrest or search.’” United States v.

Jones, 374 F. Supp. 2d 143, 147 (D.D.C. 2005) (quoting United States v. de la Fuente, 548 F.2d

528, 533 (5th Cir. 1977)); see also United States v. Jeffers, 342 U.S. 48, 51 (1951) (“[T]he

burden is on those seeking the exemption to show the need for it[.]” (citation omitted)); United

States v. Mangum, 100 F.3d 164, 169 (D.C. Cir. 1996) (“The government carries the burden of

showing that the measures employed during the stop were justified.”).

                      B. Fruit Of The Poisonous Tree And Attenuation

       The Fourth Amendment protects “[t]he right of the people to be secure in their persons,

houses, papers, and effects, against unreasonable searches and seizures.” U.S. Const. amend. IV.

By its text, the Amendment “‘contains no provision expressly precluding the use of evidence

obtained in violation of its commands.’” Herring v. United States, 555 U.S. 135, 139 (2009)

(quoting Arizona v. Evans, 514 U.S. 1, 10 (1995)). Supreme Court decisions, however, have




                                                 7
“establish[ed] an exclusionary rule that, when applicable, forbids the use of improperly obtained

evidence at trial,” see id., in order “to ‘compel respect for the constitutional guaranty.’” Davis v.

United States, 131 S. Ct. 2419, 2426 (2011) (quoting Elkins v. United States, 364 U.S. 206, 217

(1960)). Furthermore, though the Supreme Court “has applied the exclusionary rule to certain

Fourth Amendment violations[,]” it “‘has never … interpreted’” that rule as “‘proscrib[ing] the

introduction of illegally seized evidence in all proceedings or against all persons.’” United

States v. Spencer, 530 F.3d 1003, 1006 (D.C. Cir. 2008) (quoting United States v. Leon, 468 U.S.

897, 906 (1984)). Rather, the exclusionary rule is designed to safeguard Fourth Amendment

rights through its deterrent effect, and the rule therefore only applies when it results in

“appreciable deterrence.” See Herring, 555 U.S. at 139-41.

       The fruit of the poisonous tree doctrine was developed within the context of the Supreme

Court’s exclusionary rule jurisprudence. Under the doctrine, an illegal search or seizure requires

the exclusion at trial of not only the evidence seized in violation of the Fourth Amendment, but

also any evidence obtained as a result of that seizure if the “seizure is a but-for cause of the

discovery of the evidence (a necessary condition), and if the causal chain has not become ‘too

attenuated to justify exclusion,’” United States v. Brodie, 742 F.3d 1058, 1062-63 (D.C. Cir.

2014) (quoting Hudson v. Michigan, 547 U.S. 586, 592 (2006)), “or, to put the same point with

another metaphor, if circumstances have not ‘purged [the evidence] of the primary taint.’” Id. at

1063 (alteration in original) (quoting Wong Sun v. United States, 371 U.S. 471, 488 (1963)). In

the motion to suppress, Hassanshahi argues that the evidence on his laptop should be excluded as

tainted fruit because its discovery resulted directly from the initial law enforcement database

search that uncovered the 818 number.




                                                  8
                     1. Existence Of An Initial Unlawful Search Or Seizure

       The Court’s preliminary inquiry is whether an unlawful search or seizure occurred.

Hassanshahi argues that the law enforcement database in which the HSI agent ran a search using

Sheikhi’s business telephone number must be either the National Security Agency’s (“NSA”)

bulk telephony metadata program or an equivalent telephony database. See Def.’s Mem. Supp.

Mot. Suppress 18-30. Hassanshahi then relies on Judge Leon’s opinion in Klayman v. Obama,

957 F. Supp. 2d 1 (D.D.C. 2013), appeal pending, No. 14-5004 (D.C. Cir.), to establish the facial

unconstitutionality of the NSA telephony program or, by implication, the unconstitutionality of

the unknown equivalent database allegedly used by HSI here.

       In response, the Government sidesteps Hassanshahi’s argument by taking the position

that although the NSA telephony database was not used, the Court nevertheless should assume

arguendo that the law enforcement database HSI did use was unconstitutional. See Gov’t’s

Mem. Opp’n Mot. Suppress 12. Consistent with this position, the Government refuses to provide

details about its law enforcement database on the basis that such information is irrelevant once

the Court accepts the facial illegality of the database. See id. at 11-12. Regrettably, the Court

therefore starts its analysis from the posture that HSI’s initial search of the mysterious law

enforcement database, which uncovered one call between Sheikhi’s business telephone number

and the 818 number linked to Hassanshahi, was unconstitutional.

                                       2. But-For Causation

       Next, the Court finds that the existence of but-for causation between the law enforcement

database search and the forensic laptop examination is quite plain. See Brodie, 742 F.3d at 1062-

63 (explaining that “but-for” causation is a “necessary condition” in the fruit of the poisonous

tree analysis); see also Owens v. Republic of Sudan, 412 F. Supp. 2d 99, 111 (D.D.C. 2006) (but-




                                                  9
for causation asks: “were the act removed from the sequence of events leading up to the injury,

would the injury have occurred as it did?”). Here, the law enforcement database search revealed

the 818 number, which led HSI to subpoena Google, through which HSI learned that the 818

number was registered to Hassanshahi. HSI then investigated Hassanshahi through TECS and by

issuing a second subpoena to Google, which together led HSI to place an alert in TECS requiring

CBP officers to refer Hassanshahi for secondary screening the next time he returned to the U.S.

Finally, when Hassanshahi arrived at LAX, CBP officers followed the TECS instruction by

referring Hassanshahi to secondary screening, and Hassanshahi’s laptop then was seized and sent

to Virginia for the forensic examination. As such, the Court easily concludes that “but for” the

initial law enforcement database search, the forensic laptop examination would not have

occurred.

                           3. Attenuation And The Exclusionary Rule

       “[N]ot … all evidence is ‘fruit of the poisonous tree’ simply because it would not have

come to light but for the illegal actions of the police.” Wong Sun, 371 U.S. at 487-88. Instead,

exclusion is not required when “the government proves … that the evidence would have been

discovered inevitably, was discovered through independent means, or that its discovery was so

attenuated from the illegal search or seizure that the taint of the unlawful government conduct

was dissipated.” United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007) (citations

omitted). Here, the Government argues that attenuation existed, and the Supreme Court has

identified three factors for courts to consider when determining attenuation: (1) the amount of

time between the illegality and the discovery of the evidence, i.e., temporal proximity; (2) the

presence of intervening circumstances; and (3) the purpose and flagrancy of the illegal conduct.

See Brodie, 742 F.3d at 1063 (citing Brown v. Illinois, 422 U.S. 590, 603-04 (1975)). The




                                                10
Government bears the burden of proving attenuation by a preponderance of the evidence. See

Holmes, 505 F.3d at 1293; United States v. Wood, 981 F.2d 536, 541 (D.C. Cir. 1992).

                                     a. Temporal Proximity

       The Court first considers the temporal proximity between the illegality and the discovery

of the evidence. See Brodie, 742 F.3d at 1063. The Government’s affidavit shows that more

than four months passed between the unconstitutional law enforcement database search on

August 24, 2011, and the forensic laptop examination on January 17, 2012. See 2d Akronowitz

Aff. ¶¶ 3, 21. Though “there is no ‘bright-line’ test for temporal proximity” within the

attenuation analysis, see United States v. Reed, 349 F.3d 457, 463 (7th Cir. 2003), the Court

finds that this several month gap — during which the Government continued to investigate

Hassanshahi through unrelated sources, including the use of preexisting evidence in TECS and

the issuance of lawful subpoenas to Google — weighs in favor of not suppressing the laptop

evidence. Compare United States v. Gross, 662 F.3d 393, 402 (6th Cir. 2011) (finding that two

month gap between the unlawful seizure and defendant’s voluntary confession suggests

attenuation as to the confession), United States v. Roberts, No. 11-CR-0018, 2012 WL 1033515,

at *7 (E.D. Pa. Mar. 28, 2012) (finding that the “temporal proximity” factor weighed against

suppression when over two months elapsed between the initial unlawful search and defendant’s

consent to a second search that revealed incriminating evidence), and United States v. Lawrence,

No. CRIM.05-333, 2006 WL 752920, at *6 (D. Minn. Mar. 23, 2006) (finding attenuation in part

because four months passed between the illegal search and arrest and the later incriminating

statements made by defendant), with United States v. Miller, 146 F.3d 274, 280 (5th Cir. 1998)

(finding that the ninety second time period between the illegal stop and the search did not

support the government’s attenuation claim), United States v. Green, 111 F.3d 515, 521 (7th Cir.




                                                11
1997) (explaining that the fact that only five minutes elapsed between the illegal stop and the

search of the car weighed against attenuation), and United States v. Ceballos, 812 F.2d 42, 50

(2d Cir. 1987) (finding that “the [consent] to search and the statements given were too closely

connected in context and time … to break the chain of illegality” when only a few minutes had

elapsed).

                                   b. Intervening Circumstances

       The Court next considers whether there were intervening circumstances sufficient to

break the causal chain and lessen the taint of the initial illegality. See Brodie, 742 F.3d at 1062-

63. Often, the intervening circumstance that most strongly dissipates the evidentiary taint is a

“voluntary act by the defendant.” Green, 111 F.3d at 522; see also United States v. Jackson, No.

A04-141 CR, 2005 WL 1115466, at *17 (D. Alaska May 10, 2005) (“A defendant may himself

commit an intervening independent act that will be sufficient in relation to other events for

attenuation purposes.” (citing United States v. Sprinkle, 106 F.3d 613, 619 (4th Cir. 1997)). In

opposition to Hassanshahi’s motion to suppress, the Government offers two intervening events:

HSI’s investigative steps following discovery of the 818 number, which itself was just a minor

lead in the case; and Hassanshahi’s voluntary appearance at LAX after arriving on an

international flight. See Gov’t’s Mem. Opp’n Mot. Suppress 13.


                                 i. Hassanshahi’s Arrival At LAX

       Starting with the latter event, the Court finds that Hassanshahi’s voluntary arrival at LAX

was a relevant intervening circumstance, but at the same time, the Court is uncertain how much

weight to give this event. Because Hassanshahi’s arrival at LAX on an inbound international

flight provided the Government with justification to conduct a border search, this situation is

somewhat analogous to the more common instance in which a defendant, through new conduct



                                                 12
following an unlawful search or seizure, gives the police a fresh basis for conducting a legal

search or seizure. For example, in United States v. Sprinkle, 106 F.3d 613 (4th Cir. 1997), the

Fourth Circuit held that when the defendant fled from and fired a gun at an officer while resisting

an unjustified investigative stop, the defendant committed a new crime that “purged the taint of

the prior illegal stop” and provided the officer with probable cause to arrest the defendant and

then seize a gun that was in plain view at the scene of the new crime. Id. at 619.

       Similarly, in United States v. Jackson, No. A04-141 CR, 2005 WL 1115466 (D. Alaska

May 10, 2005), the district court held that when the defendant disobeyed an order by a uniformed

officer during an unlawful stop and fled down the street, the officer acquired new and sufficient

justification to pursue the fleeing defendant, seize the defendant, and then conduct a pat-down

search of the defendant, which revealed contraband in the defendant’s possession. Id. at *14-16;

see also United States v. Allen, 619 F.3d 518, 526 (6th Cir. 2010) (“Here, there was an initial

attempt at a traffic stop, which [the defendant] claims to have been illegal, followed by an

attempt to escape from the police by leading the officers on a high-speed chase…. [T]he act of

fleeing from police officers constituted a new, distinct crime that rendered evidence subsequently

seized admissible.”); United States v. Hooker, No. 94-5863, 54 F.3d 774, *2 (4th Cir. 1995)

(finding that defendant’s “voluntary action” of coming out of her home, approaching the officers,

and stating that her “conscience” was bothering her and the officers thus could enter and search

her home were adequate intervening circumstances to purge taint of the earlier unlawful seizure

and search of defendant’s car).

       As these cases illustrate, a voluntary act by a person following initial unlawful law

enforcement conduct can provide an officer with new grounds for conducting a lawful search or

seizure such that the exclusionary rule does not apply to any newly recovered evidence. This




                                                13
concept, however, may get the Government only so far: though Hassanshahi’s arrival at LAX

provided justification to conduct a border search, Hassanshahi argues that the forensic laptop

examination went beyond a routine suspicionless border search and therefore required reasonable

suspicion. Accepting arguendo that reasonable suspicion in fact was required, Hassanshahi’s

arrival at LAX would be one factor in the reasonable suspicion calculus, but landing at LAX, by

itself, would not have created reasonable suspicion for the forensic examination. As such, the

circumstances here would be distinguishable from the typical case in which the intervening

voluntary conduct provided all the cause or suspicion that was required for the second search or

seizure. On the other hand, if the Court rejects Hassanshahi’s argument that reasonable

suspicion was required, his arrival at LAX alone would have justified the forensic examination,

thus making the arrival a more significant, and perhaps even dispositive, attenuating

circumstance. The Court ultimately need not resolve this issue, however, because the

Government’s other intervening circumstance argument unambiguously weighs heavily in favor

of not suppressing the laptop evidence.


              ii. The 818 Number “Lead” And The Need For Further Investigation

       Federal courts consistently have held that the exclusionary rule does not apply to

subsequently discovered evidence when an initial limited piece of information — typically the

name of a potential target for investigation — is obtained through an illegal search or seizure

because substantial intervening investigative steps still are required to uncover the necessary

incriminating evidence. The seminal case on this “unlawful lead” principle came from Judge

Friendly in United States v. Friedland, 441 F.2d 855 (2d Cir. 1971). There, federal officers

illegally bugged the offices of the defendant’s acquaintance, and those officers then informed

other agents that the defendant should be investigated based on conversations the officers illicitly



                                                14
overheard. See id. at 854-57. In refusing to suppress inculpatory evidence about the defendant

that was discovered through further lawful investigation, the court held that it “would stretch the

exclusionary rule beyond tolerable bounds” to “grant life-long immunity from investigation and

prosecution simply because a violation of the Fourth Amendment first indicated to the police that

a man was not the law-abiding citizen he purported to be.” Id. at 861.

       Other courts have taken a similar approach since Friedland by refusing to apply the

exclusionary rule to suppress evidence that was discovered during a later investigation following

the initial unlawful discovery of evidence that merely pointed law enforcement in the

defendant’s direction. For instance, in United States v. Carter, 573 F.3d 418 (7th Cir. 2009), the

court explained that “[f]ew cases, if any, applying the attenuation exception hold that evidence

separately uncovered through completely lawful means is inadmissible because an illegal search

first made a particular person a suspect in a criminal investigation.” Id. at 423. The court then

concluded that an out-of-court identification was admissible under the attenuation exception

even though law enforcement’s original interest in the defendant arose through the discovery of

an “Inmate ID Card” bearing the defendant’s name during a prior unlawful search. Id. at 420,

423.

       Similarly, in United States v. Watson, 950 F.2d 505 (8th Cir. 1991), the court held that

when “a law enforcement officer merely recommends investigation of a particular individual

based on suspicions arising serendipitously from an illegal search, the causal connection is

sufficiently attenuated so as to purge the later investigation of any taint from the original

illegality.” Id. at 508. The court then concluded that the grand jury’s use of the defendant’s

name and alias did not taint a later investigation, despite the court assuming arguendo the

illegality of the prior search that uncovered records containing the defendant’s identifying




                                                 15
information. See id.; see also Hoonsilapa v. INS, 575 F.2d 735, 738 (9th Cir. 1978) (“[T]he mere

fact that [a] Fourth Amendment illegality directs attention to a particular suspect does not require

exclusion of evidence subsequently unearthed from independent sources.” (citation omitted).

       The circumstances here even more strongly compel finding attenuation than in the above

cases because the law enforcement database search revealed only the slimmest of leads: the 818

number. HSI thus was required to take an additional investigative step just to find a name

associated with the 818 number, as compared to the typical “unlawful lead” case in which the

defendant’s full identify is discovered through the illegal search or seizure. In addition, HSI

acted lawfully by subpoenaing Google for information about the owner of the 818 number, and

HSI’s four month investigation between obtaining the 818 number and conducting the forensic

laptop examination primarily involved the use of information in TECS that existed before the

initial database search, which further shows that the 818 number, at most, “tipped off the

[G]overnment … to the probable identity of the perpetrator.” United States v. Smith, 155 F.3d

1051, 1063 (9th Cir. 1998); cf. United States v. Crews, 445 U.S. 463, 475 (1980) (“The

exclusionary rule … does not reach backward to taint information that was in official hands prior

to any illegality.”). Accordingly, the Court concludes that the discovery of the laptop evidence

occurred only through substantial and essential intervening events following the “unlawful lead”

that was the 818 number, and this factor therefore weighs strongly in favor of not excluding that

evidence.

                        c. Purpose And Flagrancy Of The Illegal Conduct

       Lastly, the Court considers the “purpose” and “flagrancy” of the illegal law enforcement

conduct. See Brodie, 742 F.3d at 1063. As a rule, courts generally “favor suppression” only “if

law enforcement officials conducted the illegal search with the purpose of extracting evidence




                                                16
against the defendant, or if they flagrantly broke the law in conducting the search.” United

States v. Washington, 387 F.3d 1060, 1075 (9th Cir. 2004) (citation omitted); see also Davis v.

United States, 131 S. Ct. 2419, 2427 (2011) (“When the police exhibit ‘deliberate,’ ‘reckless, or

‘grossly negligent’ disregard for Fourth Amendment rights, the benefits of exclusion tend to

outweigh the costs.” (citation omitted)). In contrast, when law enforcement officials acted with

an “objectively reasonable good-faith belief that their conduct is lawful, or when their conduct

involves only simple, isolated negligence, the deterrent value of suppression is diminished, and

exclusion cannot ‘pay its way.’” Davis, 131 S. Ct. at 2427 (citations omitted); see also, e.g.,

United States v. Boone, 62 F.3d 323, 325 (10th Cir. 1995) (noting that “a mistaken belief” that

the defendant “had consented to the search … rises to the level of a Fourth Amendment

violation, [but] it does not qualify as flagrant misconduct that would tilt the scales against

attenuation”); United States v. Ramos, 42 F.3d 1160, 1164 (8th Cir. 1994) (holding that

attenuation existed when, among other considerations, the “officer’s conduct was in good faith”

and “not flagrant”); United States v. Richard, 994 F.2d 244, 252 (5th Cir. 1993) (holding that

attenuation existed when, among other considerations, “both agents reasonably believed that they

had consent to search” defendant’s motel room).

       The Court, however, is left slightly in the dark regarding the flagrancy element because

the Government has strategically refused to provide details about the law enforcement database it

used. Based on the Government’s affidavits and briefing on the motion to suppress, the Court

knows only that the database was accessible to HSI and that this database was not the NSA

program discussed in Klayman. The Court may surmise, though, that the law enforcement

database operates fairly similarly to the NSA program, at least insofar as the database also

appears to include a repository of aggregated telephone records for calls made into the U.S. from




                                                 17
abroad. Cf. Klayman, 957 F. Supp. 2d at *14-19 (describing the NSA’s bulk telephony

program). The Court can reach this conclusion because HSI used the database to search

retrospectively for telephone calls between Sheikhi’s Iranian telephone number and any U.S.

number, which suggests that the database includes, at a minimum, a collection of past telephone

calls from foreign numbers into the U.S.

       Such ambiguity, however, leaves the Court in a difficult position. For example, if the

Court treats the HSI law enforcement database as functionally equivalent to the NSA telephony

program, the Court likely would conclude that HSI acted in good faith because federal courts

generally have approved of the NSA program, with the exception being Judge Leon’s opinion in

Klayman, which itself is on appeal before the D.C. Circuit. See Gov’t’s Mem. Opp’n Mot.

Suppress 19 n.5 (citing cases upholding the NSA program). Further, even if the Court accepts

Klayman as the authoritative statement on the NSA program’s legality, Klayman was not decided

until 2013, while the HSI database search occurred in 2011, at which time it appears that no

federal court had deemed the program unconstitutional. See Davis, 131 S. Ct. at 2429

(“Evidence obtained during a search conducted in reasonable reliance on binding precedent is

not subject to the exclusionary rule.”).

       But, at the same time, the Court does not know with certainty whether the HSI database

actually involves the same public interests, characteristics, and limitations as the NSA program

such that both databases should be regarded similarly under the Fourth Amendment. In

particular, the NSA program was specifically limited to being used for counterterrorism

purposes, see Klayman, 957 F. Supp. 2d at 15-16, and it remains unclear if the database that HSI

searched imposed a similar counterterrorism requirement. If the HSI database did have such a

limitation, that might suggest some level of flagrancy by HSI because it was clear that neither




                                                18
Sheikhi nor Hassanshahi was involved in terrorism activities. With so many caveats, the

Government’s litigation posture leaves the Court in a difficult, and frustrating, situation. Yet,

even assuming that the HSI database was misused to develop the lead into Hassanshahi, HSI’s

conduct appears no more flagrant than law enforcement conduct in other “unlawful lead” cases,

which still held that the attenuation exception applied nonetheless. 6 Cf. Carter, 573 F.3d at 421

(admitting evidence after illegal search of defendant’s residence); Smith, 155 F.3d at 1059

(admitting evidence resulting from an “illegally intercepted wire communication”); Friedland,

441 F.2d at 856 (admitting evidence after the “FBI unlawfully installed electronic ‘bugs’” in an

office).

           The Court is more certain, though, that HSI did not search the law enforcement database

for the purpose of “extracting evidence against the defendant.” Washington, 387 F.3d at 1075

(citation omitted). When it executed the database search using Sheikhi’s business telephone

number, HSI had no inclination that Hassanshahi was involved with Sheikhi or his company;

indeed, the agency used the law enforcement database to cast a wide net for potential U.S.-based

suspects for the very reason that it had no leads into U.S. suspects at the time. Thus, although

that net eventually ensnared Hassanshahi, the lack of initial targeting compels the Court to

conclude that HSI did not act purposefully or in bad faith to violate Hassanshahi’s constitutional

rights.




           6
               The Government’s silence regarding the nature of the law enforcement database
has made the Court’s analysis more complex than it should be. Although the Court still
concludes that the attenuation exception applies in large part based on the “unlawful lead” line of
cases, the Court will order that the Government provide the Court with an ex parte declaration
summarizing the contours of the mysterious law enforcement database used by HSI, including
any limitations on how and when the database may be used.


                                                  19
    4. United States v. Scios and United States v. Najjar Do Not Compel A Different Result

       Finally, the Court must address two arguments raised through Hassanshahi’s reply

memorandum. First, Hassanshahi argues that the D.C. Circuit’s en banc decision in United

States v. Scios, 590 F.2d 956 (D.C. Cir. 1978), is directly on point and compels against finding

attenuation. See Def.’s Reply Supp. Mot. Suppress 20-19. In Scios, law enforcement agents

illegally searched sixty file folders located in the defendant’s home after the defendant had been

arrested. See id. at 958. One of the folders contained various papers, including a credit card

receipt for a motel bearing the defendant’s name and an itemized bill from the same motel

indicating that “Mr. Massa” had registered for the room. See id. The agents issued a subpoena

to require Massa to appear before a grand jury regarding the defendant’s possible unlawful

activity, namely wiretapping. See id. Massa initially refused to testify, but he later agreed after

the prosecutor granted him immunity and threatened contempt for any further refusal. See id. at

958-59. After the defendant was indicted, he moved to suppress Massa’s testimony as fruit of

the illegal seizure of the credit card receipt. See id. at 959. The en banc court held that Massa’s

testimony was inadmissible because his decision to testify was “made solely to avoid being jailed

for contempt.” Id. at 961. The court also noted that the taint from the illegal search had not

dissipated because the agents were unaware of Massa’s existence prior to the search, and because

Massa agreed to testify only in response to official pressure, not through his own volition. Id. at

963-64.

       The Court finds that Scios is inapplicable to the instant case. Scios involved applying the

fruit of the poisonous tree doctrine to testimony from a witness whose identity was uncovered

through a search that violated the defendant’s Fourth Amendment rights. Thus, in Scios, and in

other cases relying on Scios since then, the question was whether a witness voluntarily had




                                                 20
chosen to testify such that the testimony may be considered attenuated from the prior unlawful

search. See Scios, 590 F.2d at 960 (“In certain circumstances, the attenuation doctrine has been

applied where the witness who has been located as the result of an illegal search or seizure has

voluntarily decided to testify.” (citations omitted)); id. (“Turning to the case before us, we

examine first the claim that the taint of the illegal seizure was attenuated by a voluntary decision

to testify.”); see also United States v. Stevens, 612 F.2d 1226, 1230 (10th Cir. 1979) (comparing

Scios and affirming the district court’s decision to admit witness testimony when the witness

“offered to testify” in part due to “a desire ‘to change his life-style and stay out of trouble,’” not

due to the threat of contempt or other penalties like in Scios); United States v. Davis, No. CRIM.

10-339, 2011 WL 1655549, at *5-6 (D. Or. May 2, 2011) (comparing Scios and admitting

witness testimony when the witness “made an independent and voluntary decision to speak with

the officers several months after she was identified as a result of an illegal search,” such that

attenuation existed).

       Here, there is no witness testimony against Hassanshahi, and even stretching Scios to its

plausible limits, Hassanshahi has not, and cannot, demonstrate how any relevant physical

evidence against him might be considered “coerced” like the witness in Scios. Cf. Scios, 590

F.2d at 961 (“[I]t is plain that Massa’s giving of testimony before the grand jury, and presumably

at the trial is purely and simply a product of coercion.”). Instead, the unlawful law enforcement

database search allowed HSI to uncover the identity of Hassanshahi — the defendant, not a

witness and not evidence in and of itself — by linking him to the 818 number through the

Google subpoena; the 818 number then led HSI to other physical evidence, such as that in TECS,

not any witness testimony. Accordingly, the scenario here is both factually and legally distinct

from Scios. The correct analysis, in fact, involves the “wrongful lead” cases, discussed above, in




                                                  21
which a limited piece of illegally obtained evidence directs law enforcement to focus its

subsequent lawful investigation on the defendant, not on involuntary witness testimony cases

like Scios. 7

        Second, Hassanshahi suggests through his reply memorandum that United States v.

Najjar, 300 F.3d 466 (4th Cir. 2002), requires the Court to find a lack of attenuation here. See

Def.’s Reply Supp. Mot. Suppress 23-25. Not so. In Najjar, the defendant argued that the

district court erred by admitting evidence obtained through two search warrants when much of

the evidence used to obtain those two warrants came from the execution of an earlier warrant in

1995 that later was invalidated. See id. at 475. In affirming the district court’s decision, the

Fourth Circuit explained that the officer’s “investigation was not a simple matter of looking at

salvage certificates obtained in the 1995 search and obtaining new evidence from their use,

rather it was a substantial investigative effort unconnected to the seized documents

themselves[.]” Id. at 479. The court then relied on a theory similar to the “wrongful lead”

doctrine by explaining that “it is not enough that the original certificates may have triggered [the

officer’s] suspicion or gave impetus or direction toward what is to be focused on by the

government.” Id. (internal citation and quotation omitted). Thus, the court concluded that

“[e]ven if the original illegal search in some slight way was a but-for cause of the later searches,


        7
               Even ignoring this fundamental difference, Scios still does not compel a different
result here. There is no doubt that in the case of both Messa’s testimony in Scios and the
forensic examination of Hassanshahi’s laptop, “but for” the initial unlawful search, law
enforcement would not have uncovered the relevant evidence, thus making both pieces of
evidence “fruit” of the poisonous tree. Cf. Def.’s Reply Supp. Mot. Suppress 22 (arguing that
“[j]ust like Massa’s testimony in Scios, the computer search in this case is fruit of the poisonous
tree and should be suppressed”). But unlike in Scios, where the D.C. Circuit found no
attenuation primarily due to a lack of voluntariness by Messa, all three attenuation factors in this
case suggest that the illegal taint from the database search was purged by the time of the forensic
examination. Hassanshahi fails to appreciate that merely having “but-for” causation does not
require suppression when other attenuating factors are at play.


                                                 22
[the officer’s] two-year investigation and the intervening circumstances were sufficient to break

the causal link between any primary illegality and later obtained evidence.” Id.

       Though HSI’s investigation into Hassanshahi lasted several months rather than two years,

the conclusion in Najjar in consistent with the Court’s decision here because of the significant

investigative steps HSI took between the database search and the forensic examination, as well

as the limited probative value of the unlawfully discovered 818 number. To distinguish the

cases, Hassanshahi asserts that “no time at all passed between the illegal search (accessing the

telephony database) and when the agent ordered the computer search when and if Hassanshahi

returned to the U[.]S.” Def.’s Reply Supp. Mot. Suppress 25. But Hassanshahi’s argument

misstates the facts of the case and therefore focuses on the wrong timeframe. In reality, the HSI

agent did not order the forensic examination “when and if Hassanshahi returned to the U[.]S.”

Id. Instead, on November 29, 2011, the agent “augmented the existing TECS records regarding

Hassanshahi by entering instructions that [the agent] should be alerted if and when [Hassanshahi]

returned to the United States, and that [Hassanshahi] should be referred for secondary screening

by [CBP] officers when he returned to the U.S.” 2d Akronowitz Aff. ¶ 17. There is no support

in the record for Hassanshahi’s claim that the forensic examination also was ordered on

November 29 or, for that matter, at any other time prior to Hassanshahi’s arrival at LAX on

January 12, 2012. Indeed, the record does not reflect any evidence that law enforcement had any

way of knowing which devices, if any, Hassanshahi would possess when he eventually crossed

the border at a then-unknown date.

       Alternatively, even if the Court used November 29, 2011, as the relevant date, most of

the key investigative steps leading to the forensic examination already had occurred between

then and the August 24, 2011, database search such that the same temporal proximity analysis




                                                23
should apply. Thus, Hassanshahi’s suggestion that “[t]here was no time for any independent

investigation” during this two month period, see Def.’s Reply Supp. Mot. Suppress 25, is not

supported by the undisputed facts in the record, which show that HSI did conduct an independent

investigation in this period by using, for example, TECS and a Google subpoena. 8 Lastly,

Hassanshahi asserts that Najjar is distinguishable because the circuit court there agreed with the

district court’s finding that the original violation was not purposeful or flagrant. See id. As this

Court has explained, however, it reaches the same conclusion as Najjar about the lack of

purposefulness or flagrancy with regard to the database search. Simply put, then, nothing in

Najjar requires a different conclusion here. 9

                                  *               *              *

       In sum, the Court finds that all three attenuation factors compel in favor of finding that

the initial taint of illegality from the law enforcement database search was purged. Accordingly,

the Court concludes that the “causal chain” leading to the discovery of laptop evidence was “too

attenuated to justify exclusion.” Brodie, 742 F.3d at 1063 (citation and quotation omitted). The

Court therefore refuses to suppress the laptop evidence on this basis.




       8
               Hassanshahi also argues that “there was no independent source of information”
linking Hassanshahi to Sheikhi. See Def.’s Reply Supp. Mot. Suppress 25. Though true that the
database search provided the only link between Hassanshahi and Sheikhi, Hassanshahi does not
explain why this fact is relevant to the attenuation analysis.
       9
                It appears to the Court that Hassanshahi actually may be arguing about the
independent discovery exception to the fruit of the poisonous tree doctrine, not attenuation. Cf.
United States v. Holmes, 505 F.3d 1288, 1293 (D.C. Cir. 2007) (explaining that inevitable
discovery, discovery through independent means, and attenuation are alternative methods for
dissipating the taint from an unlawful search or seizure). If that is the case, Hassanshahi presents
a straw man argument because the Government never suggested that it discovered the laptop
evidence through independent means.


                                                 24
            C. Reasonable Suspicion Existed For The Forensic Laptop Examination

       The broad power of the Government to conduct searches at the international borders is

rooted in “the long-standing right of the sovereign to protect itself by stopping and examining

persons and property crossing into this country.” 10 United States v. Ramsey, 431 U.S. 606, 621

(1977). The Supreme Court therefore has explained that “[t]he Government’s interest in

preventing the entry of unwanted persons and effects is at its zenith at the international border.”

United States v. Flores-Montano, 541 U.S. 149, 152 (2004). Given the strong interests at stake,

the Supreme Court has “[t]ime and again … stated that ‘searches made at the border … are

reasonable simply by virtue of the fact that they occur at the border.’” Id. at 152-53 (quoting

Ramsey, 431 U.S. at 616).

       Notwithstanding this sweeping language about the Government’s expansive border

search power, the Supreme Court has suggested over the years that the Fourth Amendment may

impose some limits even at the nation’s borders, though the Court has not always spoken

definitively on that subject, nor has it clearly defined such limits, if any. Cf. Flores-Montano,

541 U.S. at 152-53, 155-56 (noting that there are “reasons that might support a requirement of

some level of suspicion in the case of highly intrusive searches of the person-dignity and privacy

interests of the person being searched,” as well as in the case of searches of property that are

“destructive”); United States v. Montoya de Hernandez, 473 U.S. 531, 541 & n.4 (1985) (noting

that the Court has “not previously decided what level of suspicion would justify a seizure of an

incoming traveler for purposes other than a routine border search”); Ramsey, 431 U.S. at 618

n.13 (leaving open the question of “whether, and under what circumstances, a border search

       10
                As a threshold issue, it is well settled that searches of passengers on incoming
international flights at a U.S. airport are considered the “functional equivalent of a border
search” for Fourth Amendment purposes. Almeida-Sanchez v. United States, 413 U.S. 266, 273
(1973).


                                                 25
might be deemed ‘unreasonable’ because of the particularly offensive manner in which it is

carried out”). Indeed, “the ultimate touchstone of the Fourth Amendment is ‘reasonableness,’”

Brigham City, Utah v. Stuart, 547 U.S. 398, 403 (2006), so it appears only logical that some

circumstance might arise at the border when the Government’s conduct nudges into

unreasonableness territory.

       Hassanshahi now argues that this Court should recognize one such limit to the border

search power by following two recent federal court decisions — United States v. Cotterman, 709

F.3d 952 (9th Cir. 2013), and United States v. Saboonchi, 990 F. Supp. 2d 536 (D. Md. 2014) —

and holding that the Fourth Amendment required reasonable suspicion to conduct the forensic

examination of Hassanshahi’s laptop following the border stop. Before reaching the legal merits

of this position, however, the Court first must determine whether reasonable suspicion did in fact

exist. And because the Court ultimately concludes that there was reasonable suspicion for the

forensic examination of Hassanshahi’s laptop, the constitutional question of whether that

examination required reasonable suspicion becomes moot. 11




       11
                Interestingly, both Cotterman, 709 F.3d at 970 (“[W]e conclude that the
examination of Cotterman’s electronic devices was supported by reasonable suspicion and that
the scope and manner of the search were reasonable under the Fourth Amendment.”), and
Saboonchi, 990 F. Supp. 2d at 571 (“All of this is more than sufficient to give rise to reasonable,
particularized suspicion — if not probable cause — that Saboonchi was involved in violations of
export restrictions on Iran.”), found reasonable suspicion for the respective forensic computer
examinations, yet both courts spent considerable space addressing a constitutional question that
had no practical effect on the final disposition of the case. By contrast, this Court finds that
engaging in such an exercise would be imprudent unless reasonable suspicion was found not to
exist. See Stillman v. CIA, 319 F.3d 546, 548 (D.C. Cir. 2003) (holding that the district court
abused its discretion by “unnecessarily” deciding a First Amendment question and explaining
that “‘[a] fundamental and longstanding principle of judicial restraint requires that courts avoid
reaching constitutional questions in advance of the necessity of deciding them.’” (quoting Lyng
v. Nw. Indian Cemetery Protective Ass’n, 485 U.S. 439, 445 (1988)).


                                                26
                                1. Reasonable Suspicion Standard

       Reasonable suspicion exists when a law enforcement officer has “specific and articulable

facts,” which, considered together with rational inferences from those facts, indicate that

criminal activity “may be afoot.” Terry v. Ohio, 392 U.S. 1, 21, 30 (1968). When making the

reasonable suspicion determination, courts are instructed to view the “totality of the

circumstances” and not engage in a “divide-and-conquer analysis” in which courts consider

whether each fact is “susceptible to an innocent explanation.” United States v. Arvizu, 534 U.S.

266, 274 (2002). Thus, “[a] determination that reasonable suspicion exists … need not rule out

the possibility of innocent conduct.” Id. at 274 (citation omitted).

       In addition, officers may “draw on their own experience and specialized training to make

inferences from and deductions about the cumulative information available to them that ‘might

well elude an untrained person.’” Id. at 273 (quoting United States v. Cortez, 449 U.S. 411, 418

(1981)); see also Ornelas v. United States, 517 U.S. 690, 699 (1996) (reviewing court must give

“due weight” to factual inferences drawn by law enforcement officers). Though an officer’s

reliance on a mere “inchoate and unparticularized suspicion or ‘hunch’” is insufficient to

establish reasonable suspicion, see Terry, 392 U.S. at 27, the likelihood of criminal activity need

not rise to the level required for probable cause, nor even to the preponderance of the evidence

standard. See United States v. Sokolow, 490 U.S. 1, 7 (1989).

       Before turning to the reasonable suspicion analysis, the Court notes that it must exclude

from the calculus evidence of the one telephone call between Sheikhi’s business phone number

and Hassanshahi’s 818 number because this evidence was the clear and direct result of an

unconstitutional search, as conceded by the Government. See, e.g., United States v. Karo, 468

U.S. 705, 719 (1984) (explaining that “if sufficient untainted evidence was presented in the




                                                 27
warrant affidavit to establish probable cause, the warrant was nevertheless valid” (citation

omitted)); United States v. Pina-Aboite, 109 F. App’x 227, 234 (10th Cir. 2004) (explaining that

because the officer violated the Fourth Amendment by extending the scope of a traffic stop after

finding no traffic violation, incriminating statements made later during the stop were tainted and

could not contribute retrospectively to establishing reasonable suspicion for the prolonged stop);

United States v. Eustaquio, 198 F.3d 1068, 1071-72 (8th Cir. 1999) (“As the touching of the

defendant’s midriff area was violative of the Fourth Amendment, any evidence resulting

therefrom is inadmissible and cannot be used to determine whether there was a reasonable

suspicion to detain or search her.”). The Court next turns to the remaining evidence known

about Hassanshahi prior to the forensic examination.

                2. Hassanshahi’s Criminal History And Frequent Travel To Iran

       Prior to conducting the forensic examination, HSI conducted research on Hassanshahi in

TECS, which led HSI to discover details about a 2003 federal investigation into Hassanshahi’s

participation in a conspiracy to establish an American company for the purpose of entering into

an agreement with a Chinese company to build a computer production facility in Iran. 12 Federal



       12
                In his reply memorandum, Hassanshahi suggests that the probative value of the
2003 HSI investigation is significantly lessened because he was “cleared” of any criminal
misconduct. The decision not to file criminal charges, however, does not automatically equate to
him having been cleared of all wrongdoing, and anyway, it is the facts uncovered about
Hassanshahi’s role in the scheme to violate the Iran export embargo that are probative of a
potential new scheme to violate the same laws in 2011, not the ultimate decision not to file
charges. Indeed, according to the California state court decision dismissing Hassanshahi’s
breach of contract claim as against public policy, Hassanshahi and his co-plaintiffs specifically
alleged that “they and defendants [Chinese companies] agreed to establish an Iranian corporation
to manufacture notebook computers in [Iran’s] free trade zone and to sell that product in Iran and
in neighboring countries.” Kashani v. Tsann Kuen China Enter. Co., 118 Cal. App. 4th 531,
537-38 (Cal. App. 2d Dist. 2004). Plaintiffs also alleged that as part of this agreement, they
“traveled to Iran to begin setting up the plant,” “secured the necessary governmental
cooperation,” and “invested considerable funds, time and resources into the project to find the
land, plan the facility, and other expensive preparations … [and to] make certain commitments,


                                                28
circuit courts have consistently held, however, that a person’s criminal history is insufficient to

create reasonable suspicion by itself. See, e.g., United States v. Johnson, 482 F. App’x 137, 148

(6th Cir. 2012) (“The fact that [defendant] had committed crimes in the past, while it has a place

in the reasonable-suspicion analysis, is not, without more, strong evidence of criminal activity in

the present.”); United States v. Walden, 146 F.3d 487, 490 (7th Cir. 1998) (“Reasonable

suspicion of criminal activity cannot be based solely on a person’s prior criminal record.”). But,

at the same time, “criminal history contributes powerfully to the reasonable suspicion calculus,”

United States v. Santos, 403 F.3d 1120, 1132 (10th Cir. 2005), and an officer’s “knowledge of

the individual’s criminal history help[s] to dispel any likelihood that the observed conduct

actually was innocent.” United States v. Monteiro, 447 F.3d 39, 47 (1st Cir. 2006).

       Here, HSI’s 2003 investigation into Hassanshahi’s scheme to violate the Iran trade

embargo was relevant for more than just establishing Hassanshahi’s general history with law

enforcement, as his past activity in Iran also negatively colored the perception of any future

travel by him to that specific country. Thus, Hassanshahi’s travel to Iran after 2003 should not

be measured as general travel abroad to a foreign country like another person’s travel might, but

rather as him returning to the specific “scene of the crime,” for lack of a better term. Travel to

Iran, then, becomes a particularized and objective fact potentially indicative of ongoing criminal

activity by Hassanshahi because one quite reasonable explanation for his ongoing presence in

Iran was that he continued to conduct business involving that country, similar to what he did in

2003. Cf. Reid v. Georgia, 448 U.S. 438, 440-41 (1980) (finding no reasonable suspicion in

large part because defendant’s arrival “from Fort Lauderdale, which the agent testified is a



including [with] the government [of Iran].” Id. at 548 (internal citations and quotation marks
omitted). Given Hassanshahi’s own admissions in the civil lawsuit, the assertion that no criminal
charges were filed may be true, but that does not negate the reality of the underlying events.


                                                 29
principal place of origin of cocaine sold elsewhere in the country[,] … describe[d] a very large

category of presumably innocent travelers, who would be subject to virtually random seizures

were the Court to conclude that as little foundation as there was in this case could justify a

seizure.”); Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (criticizing the majority for finding

reasonable suspicion based in large part on defendant recently traveling to Mexico, a country

broadly associated with “sex tourism,” because using such a generic fact to support reasonable

suspicion potentially means that “thousands of individuals — many with decades-old convictions

— will now be forced to reconsider traveling to entire countries or even continents, or will need

to leave all their electronic equipment behind, to avoid arousing a ‘reasonable’ suspicion.”).

       In addition, TECS revealed not only that Hassanshahi was in Iran for some period of time

between late 2011 and early 2012, but also that he had returned from Iran in 2006, twice in 2008,

once in 2010, and once again in May 2011. Given Hassanshahi’s history in acting to violate the

Iran trade embargo, these frequent trips potentially were suggestive of a continuous illegal

business relationship with someone in Iran, or with the country’s government itself. Cf. United

States v. Glover, 353 F. App’x 314, 317 (11th Cir. 2009) (finding that defendant’s multiple “trips

to Trinidad, which was known to be a high drug trafficking location,” were indicative of drug

smuggling and helped support reasonable suspicion); Hurn v. United States, 221 F. Supp. 2d

493, 503 (D.N.J. 2002) (finding that defendant’s “repeated, prior trips to Jamaica,” a “known

drug source country,” were indicative of drug smuggling and helped support reasonable

suspicion); United States v. Clymore, 515 F. Supp. 1361, 1367 (E.D.N.Y. 1981) (evidence that

defendant was returning from a trip to Pakistan, a country known as a source of narcotics; that

defendant had made a number of other trips to the Middle East; and that defendant previously




                                                 30
had been arrested for attempted smuggling supported finding reasonable suspicion to conduct

invasive strip search at airport).

        This possibility was reinforced by the fact that in 2005, Hassanshahi was stopped,

questioned, and then released by CBP officers after he returned from Dubai with $15,000 in

cash, an act that also might suggest continued business activity in the Middle East following the

2003 investigation. Further, when Hassanshahi landed at LAX on January 12, 2012, he had

approximately $7,000 in cash in his possession. Cf. United States v. Chandler, 437 F. App’x

420, 428 (6th Cir. 2011) (noting that “while the mere possession of currency is innocent

behavior, the large amount of currency possessed by [defendant] was unusual” and indicative of

a recent narcotics transaction) (emphasis in original); United States v. Green, 599 F.3d 360, 376

(4th Cir. 2010) (holding that the incriminating nature of a large sum of money could be

“immediately inferred” when defendant was suspected of drug-related activities); United States

v. Whitney, 391 F. App’x 277, 279, 282 (4th Cir. 2010) (discovery of roughly $3,000 in cash in

defendant’s pockets during a traffic stop was an important fact for justifying reasonable

suspicion); United States v. Chhien, 266 F.3d 1, 8-9 (1st Cir. 2001) (discovery of $2,000 in cash

during a traffic stop helped support determination of reasonable suspicion and justified a brief

period of further detention); Conrod v. Davis, 120 F.3d 92, 97-98 (8th Cir. 1997) (discovery of

$6,000 in cash in individual’s pocket and $4,000 in suitcase helped establish reasonable

suspicion). Together, these events further add to the pile of evidence known to HSI which

suggested that Hassanshahi had maintained ongoing business dealings in the Middle East, and

Iran in particular.




                                                31
              3. Accessing E-Mail Account In Iran And Telephone Calls From Iran

       HSI also understood that Hassanshahi’s e-mail account was accessed twenty-four times

from an Iran IP address between December 8, 2011, and December 15, 2011. At the same time,

however, this account was accessed from IP addresses in multiple other countries within minutes

of apparently being accessed in Iran, which may suggest that other users had access to the

account. Nonetheless, a “determination that reasonable suspicion exists … need not rule out the

possibility of innocent conduct,” Arvizu, 534 U.S. at 277, and Hassanshahi’s seemingly frequent

use of e-mail while in Iran suggests that he may have been conducting business while traveling

to that country, especially in light of the 2003 investigation.

       In addition, HSI possessed evidence that around the same time Hassanshahi traveled to

Iran, he also made contact with one Iranian telephone number and received a missed call from

another Iranian number. Though it certainly is possible that these two telephone calls were

nothing more than innocent conduct by Hassanshahi, it also is plausible that the calls further

indicated Hassanshahi’s continued involvement in prohibited activities inside Iran. Again, as the

Supreme Court and the D.C. Circuit have explained, “that an individual’s conduct is ‘ambiguous

and susceptible of an innocent explanation’ does not mean that it may not be grounds for

suspicion: ‘Terry recognized that … officers could detain [such] individuals to resolve the

ambiguity.’” United States v. Brown, 334 F.3d 1161, 1168 (D.C. Cir. 2003) (quoting Illinois v.

Wardlow, 528 U.S. 119, 125-26 (2000)) (alteration in Brown).

                      4. Possession Of Multiple Electronic Devices At LAX

       Finally, one additional fact weighs in favor of reasonable suspicion existing before the

forensic laptop examination. When Hassanshahi landed at LAX, he possessed multiple

electronic devices and data storage accessories, including a laptop computer, multimedia cards,




                                                  32
thumb drives, a camcorder, SIM cards, and a cell phone. See 1st Arkonowitz Aff. ¶ 19. Though

it generally is unremarkable nowadays for a person traveling abroad to bring a computer,

camcorder, or cell phone with them, Hassanshahi’s possession of multiple data storage devices

appears to be inconsistent with just personal use while traveling. Instead, one reasonable

inference was that these data storage devices, and thus perhaps the corresponding electronic

devices as well, were necessary for conducting business while Hassanshahi was in Iran. This

inference then further supports the possibility that Hassanshahi traveled to Iran to engage in the

same type of business activity for which he was investigated in 2003.

                  5. Totality Of The Circumstances And Reasonable Suspicion

       Judicial review of the Government’s argument for reasonable suspicion is “not a rubber

stamp.” United States v. Freeman, 735 F.3d 92, 103 (2d Cir. 2013). At the same time, however,

the Court is mindful that reasonable suspicion sets a “low threshold,” United States v. Rivera,

353 F.App’x 535, 537 (2d Cir. 2009), and requires only a “‘minimal level of objective

justification.’” United States v. Edmonds, 240 F.3d 55, 59 (D.C. Cir. 2001) (quoting INS v.

Delgado, 466 U.S. 210, 217 (1984)). Further, though the contemporaneous evidence against

Hassanshahi was, in a vacuum, innocent — travel to Iran; telephone calls from and e-mail

activity in Iran; possession of legal electronic and data storage devices while traveling abroad —

“the question of whether reasonable suspicion existed can only be answered by considering the

totality of the circumstances as the officer on the scene experienced them.” Id. at 59-60

(citations omitted). Indeed, “[a]n officer’s training and experiences enable him to ‘draw[]

inferences and make[] deductions’ from seemingly innocuous facts — ‘inferences and

deductions that might well elude an untrained person.’” Id. at 60 (quoting Cortez, 449 U.S. at

418) (alteration in Edmonds).




                                                33
        Here, HSI Special Agent Arkonowitz, who was in communication with the CBP officers

who detained Hassanshahi at LAX, had several years of experience working for HSI, including

specific experience with criminal investigations into the illegal exportation of goods from the

U.S to Iran. See 1st Arkonowitz Aff. ¶ 1; 2d Arkonowitz Aff. ¶ 1. The Court also must consider

the innocuous facts known about Hassanshahi not only for what they suggest taken together, but

also for what they suggest in the context of the 2003 HSI criminal investigation. This

investigation established a clear precedent of Hassanshahi attempting to violate the Iran trade

embargo, and such evidence “contributes powerfully to the reasonable suspicion calculus.”

Santos, 403 F.3d at 1132. Indeed, as one circuit court has explained, law enforcement’s

“knowledge of the individual’s criminal history” can “help[] to dispel any likelihood that the

observed conduct actually was innocent.” Monteiro, 447 F.3d at 47.

       Ultimately, based on Hassanshahi’s recent contacts with Iran — including the latest trip

to Iran following a series of other visits to Iran in the past few years and the recent telephone

calls from Iran — the large quantity of electronic devices and cash in Hassanshahi’s possession

when he returned from Iran in January 2012, and the 2003 criminal investigation into what may

have been similar illegal conduct, the Court finds that law enforcement possessed “specific and

articulable facts,” which, considered together with rational inferences from those facts, indicated

that Hassanshahi may have been up to his old tricks by again conducting business in violation of

the Iran trade embargo. See Terry, 392 U.S. at 21; see also Wayne R. LeFave et al., Criminal

Procedure § 3.8 (5th ed. 2009) (“The Terry reference to when ‘criminal activity may be afoot’

strongly suggests that though the arrest standard may sometimes require that guilt be more

probable than not, this is never the case as to a stopping for investigation, where the very purpose

is to clarify an ambiguous situation.” (footnote omitted; emphasis in original)).




                                                 34
       Other cases in which federal courts have found reasonable suspicion based on similar or

lesser evidence are instructive. For example, in United States v. Massi, 761 F.3d 512 (5th Cir.

2014), the circuit court affirmed the district court’s finding of reasonable suspicion to justify an

investigatory inspection of an airplane based on the following: the plane’s “suspicious” flight

path and frequent refueling stops between Orlando and Las Vegas; the registered owner of the

plane having been convicted of drug trafficking approximately twenty years prior; and a

passenger on the plane having recently crossed from Tijuana, Mexico, “a known hub of the

illegal drug trade,” into the U.S. See id. at 518, 522-23. Similarly here, Hassanshahi had a

history of illegal conduct directly relevant to the crime for which he now was suspected. In

addition, Hassanshahi had recently traveled to Iran, a suspicious country that might be

considered the “hub” of his illegal activity given the 2003 investigation, and he also had made

multiple trips to Iran in recent years, which together could be considered a suspicious travel

history given that Iran is not a common destination for U.S. citizens.

       As another example, the district court in United States v. Bunty, 617 F. Supp. 2d 359

(E.D. Pa. 2008), considered the defendant’s motion to suppress evidence that was found on his

computer equipment during a search after he arrived at a Philadelphia airport on a flight from

London. See id. at 363-64. After concluding that reasonable suspicion was not required for the

search, the district court went on to consider whether such suspicion existed anyway. See id. at

365. In doing so, the court found that reasonable suspicion did exist for the computer search

based on the following: the defendant had been arrested for the sexual abuse of a child and

recently had pled guilty to corrupting the morals of a minor in that case; the defendant possessed

a letter from his probation officer giving him permission to travel to England; the defendant

possessed two laptop computers, a digital camera, a cell phone, and a variety of electronic




                                                 35
storage devices, including several compact discs, movie DVDs, flash drives, and floppy disks

that could not be used with his computers; and the defendant had a history of “extensive

international travel.” 13 See id.

        Similarly here, Hassanshahi had a criminal history relevant to the crime for which he now

was suspected — there, possession of child pornography; here, violating the Iran trade embargo.

In addition, Hassanshahi had recently traveled abroad, and he also had entered the U.S. with a

variety of electronic devices and data storage accessories that could have been used in

furtherance of the suspected illegal activity. Indeed, unlike the defendant in Bunty, who had just

returned from London, which itself was not especially associated with criminal activity as to the

defendant or in general, Hassanshahi had traveled to Iran, which was exactly where his prior

relevant bad conduct had occurred.

        Finally, in United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013), a case on which

Hassanshahi heavily relies, the Ninth Circuit’s en banc majority found reasonable suspicion to

conduct a forensic examination of the defendant’s computer following a border stop at LAX

based on the following: the defendant’s 1992 conviction for child molestation; the defendant’s

recent travel to Mexico, a “country associated with sex tourism,” as well as other unspecified

recent travel outside the U.S.; the defendant’s collection of electronic equipment at the border,

which included the defendant and his wife each having a laptop and digital camera, as well as

one video camera between them; and the existence of password-protected files on the

defendant’s computer. See id. at 968-70.

        The Court finds that for several reasons, the facts supporting reasonable suspicion here

are significantly more probative of ongoing criminal activity than the facts in Cotterman. First,

        13
               It is unclear from the district court’s opinion whether this travel referred to
defendant’s recent trip to England or other unknown international trips.


                                                 36
Hassanshahi’s criminal history was only eight years-old at the time of the forensic examination,

whereas Cotterman’s conviction was fifteen-years old when the examination of his devices

occurred. See id. at 957. Second, Cotterman’s recent travel to Mexico, a “country associated

with sex tourism,” falls very close to the category of evidence that the Supreme Court has

cautioned against using for reasonable suspicion because it “describe[s] a very large category of

presumably innocent travelers,” Reid v. Georgia, 448 U.S. 438, 441 (1980), while Hassanshahi

traveled on multiple occasions to the specific country at issue in the 2003 criminal investigation,

thus making his travel far more probative of criminal conduct. 14 Third, Cotterman and his wife

each carried a laptop and digital camera when traveling to Mexico, as well as one video camera

between them, which altogether does not appear particularly remarkable for international

tourists. Cf. Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (“In today’s world, the fact that

Cotterman and his wife each carried a laptop and digital camera when traveling internationally,

as well as one video camera between them, is no more evidence of ‘sex tourism’ than of any

other kind of tourism.”). Hassanshahi, on the other hand, possessed a laptop computer,

multimedia cards, thumb drives, a camcorder, SIM cards, and a cell phone, which together

suggest a person engaged in business while traveling to Iran, not tourism. Finally, while the

Ninth Circuit majority relied on Cotterman having password-protected files on his computer as

the last fact supporting reasonable suspicion, several much more probative facts were known

       14
                A more analogous situation would have been, for example, if Cotterman’s 1992
conviction specifically involved child pornography that he had obtained from, or that perhaps
had been made in, Mexico, which would have made his travel to Mexico more relevant and
specific than just a visit to a country generically associated with certain criminal activity. Cf.
Cotterman, 709 F.3d at 992 (Smith, J., dissenting) (“[T]he fact that Cotterman was returning
from Mexico fails to support a finding of reasonable suspicion. Mexico is a popular travel
destination for Californians, including those who travel to Mexico for its beaches, culture and
weather, and not for its sex tourism. Travel to Mexico simply does not support reasonable
suspicion without more specific evidence that Cotterman traveled to a particular establishment,
city, or even region, associated with sex tourism.”).


                                                37
about Hassanshahi, such as the two recent telephone calls from Iran, the 2005 questioning by

CBP officers after Hassanshahi returned from Dubai with $15,000 in cash, Hassanshahi’s

multiple other trips to Iran in recent years, and Hassanshahi’s possession of $7,000 in cash when

he arrived at LAX in January 2012. 15

                                  *              *               *

       The D.C. Circuit has held that “even though a single factor might not itself be sufficiently

probative of wrongdoing to give rise to a reasonable suspicion, the combination of several

factors — especially when viewed through the eyes of an experienced officer — may.”

Edmonds, 240 F.3d at 60. That is exactly the case here. Through the combination of multiple

factors, none of which individually constituted direct evidence of criminal activity but all of

which were consistent with the scheme uncovered during the 2003 HSI investigation, the Court

finds that reasonable suspicion existed to conduct the forensic examination of Hassanshahi’s

laptop. Having reached this conclusion, the Court need not address whether reasonable

suspicion was required as a matter of law because that question is rendered moot.


                                        IV. CONCLUSION

       For the foregoing reasons, the motion to suppress is denied. An order consistent with

this Memorandum Opinion is separately and contemporaneously issued.



       15
                In his reply memorandum, Hassanshahi compares the facts known about him to
the facts on which the district court found reasonable suspicion for a forensic examination in
Saboonchi, 990 F. Supp. 2d 536 (D. Md. 2014). Without doubt, more information was known
about Saboonchi than was known about Hassanshahi at the time of the respective forensic
examinations. Saboonchi, however, does not set the floor of what evidence is required for
reasonable suspicion, and in fact, the district court there indicated that the evidence may even
have met the much higher probable cause threshold. See id. at 571 (“All of this is more than
sufficient to give rise to reasonable, particularized suspicion — if not probable cause — that
Saboonchi was involved in violations of export restrictions on Iran.”).


                                                 38
Dated: December 1, 2014        RUDOLPH CONTRERAS
                               United States District Judge




                          39