PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 16-4687
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
HAMZA KOLSUZ,
Defendant-Appellant.
Appeal from the United States District Court for the Eastern District of Virginia, at
Alexandria. T.S. Ellis, III, District Judge. (1:16-cr-00053-TSE)
Argued: October 26, 2017 Decided: May 9, 2018
Amended: May 18, 2018
Before WILKINSON, MOTZ, and HARRIS, Circuit Judges.
Affirmed by published opinion. Judge Harris wrote the opinion, in which Judge Motz
joined. Judge Wilkinson wrote a separate opinion concurring in the judgment.
ARGUED: Todd M. Richman, OFFICE OF THE FEDERAL PUBLIC DEFENDER,
Alexandria, Virginia, for Appellant. Jeffrey Michael Smith, National Security Division,
UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee.
Esha Bhandari, AMERICAN CIVIL LIBERTIES UNION, New York, New York, for
Amici American Civil Liberties Union, ACLU of Virginia, ACLU of Maryland, ACLU
of North Carolina, ACLU of South Carolina, and ACLU of West Virginia. ON BRIEF:
Geremy C. Kamens, Federal Public Defender, OFFICE OF THE FEDERAL PUBLIC
DEFENDER, Alexandria, Virginia, for Appellant. Dana Boente, United States Attorney,
Mary B. McCord, Acting Assistant Attorney General for National Security, Heather
Alpino, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for
Appellee. Hope R. Amezquita, AMERICAN CIVIL LIBERTIES UNION
FOUNDATION OF VIRGINIA, Richmond, Virginia, Nathan Freed Wessler, Vera
Eidelman, AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York, New
York, for Amici American Civil Liberties Union, ACLU of Virginia, ACLU of
Maryland, ACLU of North Carolina, ACLU of South Carolina, and ACLU of West
Virginia. Curt Levey, THE COMMITTEE FOR JUSTICE, Washington, D.C., Erica L.
Marshall, CAUSE OF ACTION INSTITUTE, Washington, D.C., for Amici Cause of
Action Institute, The Committee for Justice, and Floor64, Inc. Sophia Cope, Adam
Schwartz, ELECTRONIC FRONTIER FOUNDATION, San Francisco, California, for
Amici Electronic Frontier Foundation, Asian Americans Advancing Justice-Asian Law
Caucus, Council on American-Islamic Relations (CAIR), CAIR California, CAIR
Florida, CAIR Missouri, CAIR New York, CAIR Ohio, CAIR Dallas/Fort Worth, and
The National Association of Criminal Defense Lawyers. Michael Price, BRENNAN
CENTER FOR JUSTICE AT NYU SCHOOL OF LAW, New York, New York, for
Amicus Brennan Center for Justice.
2
PAMELA HARRIS, Circuit Judge:
Hamza Kolsuz was detained at Washington Dulles International Airport while
attempting to board a flight to Turkey because federal customs agents found firearms
parts in his luggage. After arresting Kolsuz, the agents took possession of his smartphone
and subjected it to a month-long, off-site forensic analysis, yielding a nearly 900-page
report cataloguing the phone’s data. The district court denied Kolsuz’s motion to
suppress, applying the Fourth Amendment’s border search exception and holding that the
forensic examination was a nonroutine border search justified by reasonable suspicion.
Kolsuz ultimately was convicted of attempting to smuggle firearms out of the country
and an associated conspiracy charge.
Kolsuz now challenges the denial of his suppression motion. First, he argues that
the forensic analysis of his phone should not have been treated as a border search at all.
According to Kolsuz, once both he and his phone were in government custody, the
government interest in preventing contraband from crossing the border was no longer
implicated, so the border exception should no longer apply. Second, relying chiefly on
Riley v. California, 134 S. Ct. 2473 (2014) (holding that search incident to arrest
exception does not apply to searches of cell phones), Kolsuz urges that the privacy
interest in smartphone data is so weighty that even under the border exception, a forensic
search of a phone requires more than reasonable suspicion, and instead may be conducted
only with a warrant based on probable cause.
We agree with the district court that the forensic analysis of Kolsuz’s phone is
properly categorized as a border search. Despite the temporal and spatial distance
3
between the off-site analysis of the phone and Kolsuz’s attempted departure at the airport,
the justification for the border exception is broad enough to reach the search in this case.
We also agree with the district court that under Riley, the forensic examination of
Kolsuz’s phone must be considered a nonroutine border search, requiring some measure
of individualized suspicion. What precisely that standard should be – whether reasonable
suspicion is enough, as the district court concluded, or whether there must be a warrant
based on probable cause, as Kolsuz suggests – is a question we need not resolve:
Because the agents who conducted the search reasonably relied on precedent holding that
no warrant was required, suppression of the report would be inappropriate even if we
disagreed. Accordingly, we affirm the judgment of the district court.
I.
A.
We begin with the Fourth Amendment principles that govern this case. As a
general rule, the Fourth Amendment requires that law enforcement searches be
accompanied by a warrant based on probable cause. Arizona v. Gant, 556 U.S. 332, 338
(2009). But there are exceptions, and one such exception typically covers our nation’s
borders. At a border – or at a border’s “functional equivalent,” like the international
airport at which Kolsuz was intercepted – government agents may conduct “routine”
searches and seizures of persons and property without a warrant or any individualized
suspicion. Almeida-Sanchez v. United States, 413 U.S. 266, 272–73 (1973); United
States v. Montoya de Hernandez, 473 U.S. 531, 538 (1985). The Supreme Court has
4
described the border exception as “grounded in the recognized right of the sovereign to
control, subject to substantive limitations imposed by the Constitution, who and what
may enter the country.” United States v. Ramsey, 431 U.S. 606, 620 (1977); see United
States v. Flores-Montano, 541 U.S. 149, 152 (2004) (border exception rests on
government interest in “preventing the entry of unwanted persons and effects”). Routine
searches and seizures at the border therefore are exempted from standard Fourth
Amendment requirements so that the government can “prevent the introduction of
contraband” into the country and bar entry by those who would bring harm across the
border, “whether that be communicable diseases, narcotics, or explosives.” Montoya de
Hernandez, 473 U.S. at 537, 544.
In this case, the search in question was initiated when Kolsuz attempted to exit the
country, not to enter. But we have long held that the rationales underlying the border
exception extend to exit as well as entry searches. See United States v. Oriakhi, 57 F.3d
1290, 1296–97 (4th Cir. 1995). The “fundamental principles of national sovereignty”
that are the basis for the border search exception, we have explained, apply equally to
government efforts to “protect[] and monitor[] exports from the country” as they do to
efforts to control imports. Id. at 1296, 1297. Thus, with respect to exit searches, the
border search exception is justified by the government’s power to regulate the export of
currency and other goods. Id. at 1297. And that power surely extends to controls on the
exports of dangerous weapons, like the firearms parts at issue here. See, e.g., United
States v. Boumelhem, 339 F.3d 414, 422–23 (6th Cir. 2003) (applying border exception to
exit search of shipping container believed to hold smuggled firearms).
5
Even at the border, however, the government’s authority is not without limits. The
“ultimate touchstone” of the Fourth Amendment, Riley, 134 S. Ct. at 2482, remains
“reasonableness.” See Montoya de Hernandez, 473 U.S. at 538. While suspicionless
border searches generally are “reasonable simply by virtue of the fact that they occur at
the border,” Ramsey, 431 U.S. at 616, the Supreme Court also has recognized a category
of “nonroutine” border searches that are constitutionally reasonable only if based on
individualized suspicion. See Montoya de Hernandez, 473 U.S. at 541 (holding that
overnight detention for monitored bowel movement followed by rectal examination is
“beyond the scope of a routine customs search” and permissible under the border
exception only with reasonable suspicion). Such nonroutine border searches, the Court
has suggested, include “highly intrusive searches” that implicate especially significant
“dignity and privacy interests,” as well as destructive searches of property and searches
carried out in “particularly offensive” manners. Flores-Montano, 541 U.S. at 152, 154 &
n.2.
B.
In January 2016, Turkish citizen Hamza Kolsuz entered the United States in
Miami, Florida, on a tourist visa. By that time, Kolsuz already was well known to
government authorities. In December 2012, agents had discovered 163 firearms parts in
his luggage when Kolsuz checked in for a flight to Turkey at John F. Kennedy
International Airport in New York. The parts were listed on the United States Munitions
List (“USML”), subjecting them to export controls and a license requirement under the
Arms Export Control Act, 22 U.S.C. § 2778(b)(2). See 22 C.F.R. §§ 120.2, 121.1 (setting
6
out USML, and defining “defense articles and defense services” subject to control under
the Act). Agents explained the licensing requirements to Kolsuz and his companions,
and ultimately seized the weapons parts. Just one month later, in January 2013, the
process more or less repeated itself: Kolsuz arrived at JFK Airport for a flight to Turkey;
a search of his checked luggage revealed firearms parts; and a licensing determination
disclosed that although the parts were listed on the USML, Kolsuz had not obtained the
requisite export license.
When Kolsuz reentered the country on January 25, 2016, the authorities were
ready for him. On February 1, 2016, Charles Reich, a Special Agent with United States
Customs and Border Protection (“CBP”) in New York, reached out to CBP officers on
duty at Washington Dulles International Airport (“Dulles”) to let them know that Kolsuz,
who had been stopped before while attempting to smuggle firearms parts out of the
country, would be traveling from Dulles to Turkey the following day. Agent Reich urged
the officers to search Kolsuz’s luggage for firearms parts, and followed up with an email
containing additional information and a list of questions to ask Kolsuz about his
associates and activities.
On February 2, 2016, Kolsuz began his return trip by checking in at Miami
International Airport for a series of flights that would take him through Dulles and on to
Turkey. When Kolsuz and his luggage reached Dulles, CBP officers Lauren Colgan and
7
Jonathan Budd conducted an outbound customs examination of his two checked bags. 1
Once again, they found multiple firearms parts: 18 handgun barrels, 22 9mm handgun
magazines, four .45 caliber handgun magazines, and one .22 caliber conversion kit.
Colgan and Budd, thanks to their training, immediately recognized that the barrels and
conversion kit were listed on the USML and thus could not be removed from the country
without a license. And when Kolsuz was stopped on the jetway as he attempted to board
his flight to Turkey, he admitted that he was in possession of firearms parts for which he
did not have a federal license.
After transporting Kolsuz to a secondary inspection area, the officers conducted
what would be the first of two searches of Kolsuz’s iPhone 6 Plus. This search – often
referred to as a “manual” search – involved using the iPhone’s touch screen, which was
not password protected, to scroll through Kolsuz’s recent calls and text messages. The
officers also confirmed through a records search that Kolsuz had no export license or
pending application for a license. After an interview with a number of CBP officers,
Kolsuz was arrested.
At that point, CBP Special Agent Adam Coppolo initiated the second search of
Kolsuz’s phone, this one commonly known as a “forensic” search. Coppolo first
transported the phone approximately four miles from Dulles to the Homeland Security
1
Kolsuz never has suggested that this standard customs search of his checked
luggage presents any constitutional problem. Nor could he: It is long established that a
search of luggage taken from or bound for an overseas flight is a routine border search
that may be conducted on a suspicionless basis. See Montoya de Hernandez, 473 U.S. at
538; see also, e.g., United States v. Ezeiruaku, 936 F.2d 136, 140–41 (3d Cir. 1991).
8
Investigations office in Sterling, Virginia. There, Computer Forensic Agent Michael Del
Vacchio attached the phone to a Cellebrite Physical Analyzer, which extracts data from
electronic devices, and conducted an advanced logical file system extraction. The phone
remained in airplane mode throughout, so the forensic examination did not reach data
stored remotely – or “in the cloud” – and was instead limited to data stored on the phone
itself. Even so, the data extraction process lasted for a full month, and yielded an 896-
page report that included Kolsuz’s personal contact lists, emails, messenger
conversations, photographs, videos, calendar, web browsing history, and call logs, along
with a history of Kolsuz’s physical location down to precise GPS coordinates.
C.
Kolsuz was indicted on three counts: (i) attempting to export firearms parts on the
USML without a license, in violation of the Arms Export Control Act, 22 U.S.C. §§
2278(b) and (c); (ii) attempting to smuggle goods from the United States in violation of
18 U.S.C. § 554(a); and (iii) conspiracy to commit those offenses, in violation of 18
U.S.C. § 371.
Before trial, Kolsuz filed a motion to suppress the report generated by the forensic
examination of his phone, arguing primarily that the border exception did not apply to the
search. According to Kolsuz, a forensic search of a phone that occurs miles away from
an airport and for a month after an attempted departure does not constitute a “border
search.” Moreover, Kolsuz contended, the rationales justifying the border exception were
not implicated in this case, because at the time of the search there was no prospect that
either he or his phone – both securely in government custody – would be crossing the
9
border. Instead, Kolsuz argued, the forensic search should be treated as a search incident
to his arrest, and under Riley v. California, cell phones may be searched incident to arrest
only with a warrant based on probable cause.
In a comprehensively reasoned opinion, the district court denied Kolsuz’s
suppression motion. United States v. Kolsuz, 185 F. Supp. 3d 843, 860 (E.D. Va. 2016).
The court held first that the forensic search of Kolsuz’s phone was properly evaluated as
a border search. That Kolsuz had been arrested, the district court explained, did not
transform the forensic examination into a search incident to arrest or render the border
exception inapplicable; both the Fourth Circuit and other courts have held that a border
search may be conducted after a traveler is arrested and no longer in a position to cross
the border. Id. at 851 (citing United States v. Ickes, 393 F.3d 501, 507 (4th Cir. 2005)).
Similarly, the court found, it is well established that a search initiated at the border may
fall under the border exception even if it ultimately is conducted off-site and over a long
period of time. Id. at 851–52.
Now applying the border exception, the district court went on to consider whether
the forensic search of Kolsuz’s smartphone was a routine border search, subject to no
Fourth Amendment requirements, or whether, as Kolsuz urged, it was a nonroutine
search that required some degree of individualized suspicion. The court acknowledged
that in Ickes, the Fourth Circuit treated as routine a border inspection of a computer’s
contents, accessed manually “in the same way a typical user would” and without any
“sophisticated forensic analysis.” Id. at 853 (citing Ickes, 393 F.3d at 502–03). But that
decision, the court determined, “does not address whether more sophisticated forensic
10
searches” also may be classified as routine, id. at 854, particularly in light of the Supreme
Court’s subsequent decision in Riley and its emphasis on the significant privacy interests
in the digital contents of phones.
The court concluded that while the manual search of Kolsuz’s iPhone at the airport
was a routine border search, 2 the off-site forensic analysis of the phone’s data qualified as
a nonroutine search. After Riley, the court found, a forensic search of a phone no longer
can be analogized to an ordinary search of luggage or some other container at the border,
given the breadth and sensitivity of the private information that may be uncovered. It is
“difficult to conceive of a property search more invasive or intrusive than a sophisticated,
digital search of a cell phone,” the court concluded, which might be compared to a “body
cavity search” of a phone. Id. at 856 (quoting United States v. Saboonchi, 990 F. Supp.
2d 536, 569 (D. Md. 2014)).
As a nonroutine border search, the court went on to hold, the forensic analysis of
Kolsuz’s phone required particularized suspicion, in the form of the familiar reasonable
suspicion standard. The court rejected the more demanding requirement of a warrant
based on probable cause, noting that no reported case has held a border search to that
standard. Instead, courts consistently have deemed reasonable suspicion sufficient to
2
Although the district court addressed this initial search in the course of its
reasoning, Kolsuz’s suppression motion is limited to the subsequent forensic
examination. On appeal, Kolsuz expressly disclaims any challenge to the manual search
of his phone at Dulles, which in any event did not reveal information used against him at
trial.
11
justify even the most intrusive of nonroutine border searches, including body cavity and
alimentary canal searches. Because the government in this case had “more than
reasonable suspicion” that a forensic examination of Kolsuz’s phone would reveal
evidence of both past and ongoing attempts to export firearms parts illegally, the court
concluded, the forensic search was reasonable under the Fourth Amendment. Id. at 859,
860.
The parties consented to a bench trial, and the district court found Kolsuz guilty of
all three counts against him. In finding that Kolsuz acted with the requisite willfulness,
the court relied in part on messages Kolsuz exchanged with a co-conspirator, obtained
from the forensic search of Kolsuz’s phone. 3 The court ultimately entered judgment only
on the Arms Export Control Act and conspiracy counts against Kolsuz, dismissing the
smuggling charge on the government’s motion. Kolsuz was sentenced to 30 months in
prison and three years of supervised release, and this timely appeal followed.
II.
Kolsuz’s appeal is a narrow one, and we begin by clarifying what is and is not in
front of us today. First, Kolsuz does not challenge the manual search of his smartphone,
undertaken on-site at the airport as he tried to depart for Turkey. We thus have no
3
The court also adopted an independent willful blindness theory, under which it
was “unnecessary to rely” on the messages recovered from Kolsuz’s phone. J.A. 243
n.34. As the government recognizes, however, that theory does not apply to the
conspiracy charge of which Kolsuz was convicted, and thus does not provide an
alternative basis for affirming the district court judgment in full.
12
occasion to consider application of the border exception to manual searches of electronic
devices, conducted at the border and roughly contemporaneously with an attempted
crossing. Cf. United States v. Molina-Isidoro, 884 F.3d 287, 289 (5th Cir. 2018)
(sustaining manual search of phone at border under good-faith exception to Fourth
Amendment exclusionary rule).
Nor does Kolsuz challenge the seizure of his phone, either initially at the airport or
later at the Homeland Security Investigations office where it was forensically examined.
The Fourth Amendment protects property as well as privacy, see Flores-Montano, 541
U.S. at 154, and a seizure reasonable at its inception must remain reasonable in scope and
duration to satisfy the Fourth Amendment, see Montoya de Hernandez, 473 U.S. at 541–
42. But perhaps because he was in custody while the government undertook its month-
long forensic analysis, Kolsuz has not asserted any impairment of a possessory interest in
his phone. Accordingly, we do not address whether and under what circumstances an
extended confiscation of a traveler’s phone – quite apart from any search undertaken –
might constitute an unreasonable seizure of property for Fourth Amendment purposes.
Cf. Saboonchi, 990 F. Supp. 2d at 569 (noting that forensic searches of digital devices
may deprive individuals of their possessions for periods of days or weeks).
That leaves the question that is raised by this appeal: whether the forensic search
of Kolsuz’s phone, and the associated invasion of Kolsuz’s privacy, was justified under
the border search exception. In considering the district court’s denial of Kolsuz’s motion
to suppress, we review that court’s legal conclusions de novo and its factual findings for
clear error, considering the evidence in the light most favorable to the government. See
13
United States v. Palmer, 820 F.3d 640, 648 (4th Cir. 2016). For the reasons given below,
we affirm.
A.
Kolsuz’s primary argument is that the forensic analysis of his phone was not
subject to the border search exception at all. Once he was arrested and his phone seized
and transported miles from the airport, Kolsuz contends, the government interest that
underlies the border search exception – preventing contraband from crossing a border –
was no longer at issue, and the border exception was therefore inapplicable. Rather,
standard Fourth Amendment rules governed the forensic search, and required a warrant
based on probable cause because the search was incident to Kolsuz’s arrest. See Riley,
134 S. Ct. at 2485, 2493–94 (holding that the search incident exception does not apply to
cell phones, which generally may be searched incident to arrest only with probable cause
and a warrant). We cannot agree.
First, as the district court explained, the border exception is not rendered
inapplicable because a search initiated at a border ultimately is conducted at some
physical or temporal remove. See Kolsuz, 185 F. Supp. 3d at 851–52 (“as several courts
have held, an off-site forensic search of an electronic device over a long period of time is
nonetheless a border search”); see also, e.g., United States v. Cotterman, 709 F.3d 952,
961–62 (9th Cir. 2013) (en banc) (applying border exception to forensic examination of
laptop computer conducted miles from and days after attempted border crossing);
Saboonchi, 990 F. Supp. 2d at 548–49, 561 (applying border exception to forensic search
of cell phones conducted several hundred miles from border crossing). Indeed, after
14
pressing this point before the district court, Kolsuz concedes it on appeal, agreeing that
the location and timing of the search in this case are consistent with the border search
exception.
Nor, as the district court determined, does the fact of Kolsuz’s arrest transform the
examination of his phone into a search incident to arrest, triggering Riley and calling for a
search warrant based on probable cause. In Ickes, our court applied the border search
exception to approve a manual search of computer data that occurred only after the
defendant had been arrested, obviating any threat of an imminent border crossing. See
393 F.3d at 503; see also, e.g., United States v. Ramos, 190 F. Supp. 3d 992, 998–1000
(S.D. Cal. 2016) (rejecting argument that arrest renders border exception inapplicable by
making it impossible for defendant or contraband to cross border). Kolsuz attempts to
distinguish Ickes on the ground that it involved an entry search rather than the exit search
at issue here, but for these purposes, it makes no difference: As we have explained,
where the relevant governmental interests are present, the border search exception
extends equally to entry and exit searches, see Oriakhi, 57 F.3d at 1296–97, and any rule
carving out post-arrest searches from that doctrine would apply equally in both contexts,
as well.
In its strongest form, Kolsuz’s argument combines all of these factors – his arrest
as he sought to depart the country, the phone in government custody miles from the
border, the month-long gap between the action at the airport and the end of the search –
and argues that taken together, they show that the search in this case is entirely
“untethered” from any justification behind the border exception. The rationale allowing
15
outgoing border searches, as Kolsuz describes it, is limited to intercepting contraband as
it crosses the national border. Here, with the phone as well as the firearms parts seized
by the government and Kolsuz under arrest, there was no contraband poised to exit the
country and thus no nexus to that rationale. When that is the case, Kolsuz argues, the
border search exception does not apply, because the concerns underlying a warrant
exception “define the boundaries of the exception.” See Gant, 566 U.S. at 339.
Kolsuz’s foundational premise is correct: As a general rule, the scope of a warrant
exception should be defined by its justifications. See Riley, 134 S. Ct. at 2484–88 (asking
whether “application of the search incident to arrest doctrine to this particular category of
effects would untether the rule from the justifications underlying the [search incident to
arrest] exception”). As a result, where the government interests underlying a Fourth
Amendment exception are not implicated by a certain type of search, and where the
individual’s privacy interests outweigh any ancillary governmental interests, the
government must obtain a warrant based on probable cause. See id. At some point, in
other words, even a search initiated at the border could become so attenuated from the
rationale for the border search exception that it no longer would fall under that exception.
See Molina-Isidoro, 884 F.3d at 295–97 (Costa, J., concurring) (questioning whether
search for evidence as opposed to contraband is consistent with justifications for border
search exception).
But this is not that case. On the facts here, the link between the search of Kolsuz’s
phone and the interest that justifies border searches was sufficient to trigger the border
exception on any account of a “nexus” requirement. Government agents forensically
16
searched Kolsuz’s phone because they had reason to believe – and good reason to
believe, in the form of two suitcases filled with firearms parts – that Kolsuz was
attempting to export firearms illegally and without a license. See Kolsuz, 185 F. Supp. 3d
at 859–60. That is a transnational offense that goes to the heart of the border search
exception, which rests in part on “the sovereign interest of protecting and monitoring
exports from the country.” See Oriakhi, 57 F.3d at 1297; see also Boumelhem, 339 F.3d
at 423 (holding that exit search for firearms implicates “significant government interests”
not only in controlling exports but also in national security). This is not a case, in other
words, in which the government invokes the border exception on behalf of its generalized
interest in law enforcement and combatting crime. Cf. United States v. Vergara, 884
F.3d 1309, 1317 (11th Cir. 2018) (Jill Pryor, J., dissenting) (relying on “general law
enforcement justification” to approve evidentiary border searches would “untether the
[border search exception] from its justifications”). Here, there is a direct link between the
predicate for the search and the rationale for the border exception.
Moreover, as the district court explained, the agents who searched Kolsuz’s phone
reasonably believed that their search would reveal not only evidence of the export
violation they already had detected, but also “information related to other ongoing
attempts to export illegally various firearms parts.” Kolsuz, 185 F. Supp. 3d at 860. The
government emphasizes that finding – not contested by Kolsuz – in its argument before
us, and properly so. The justification behind the border search exception is broad enough
to accommodate not only the direct interception of contraband as it crosses the border,
but also the prevention and disruption of ongoing efforts to export contraband illegally,
17
through searches initiated at the border. See, e.g., Ramos, 190 F. Supp. 3d at 999
(approving post-arrest “investigatory” border search of cell phone for information about
larger smuggling organization and “more contraband entering into the country at that
time”); United States v. Mendez, 240 F. Supp. 3d 1005, 1007–10 (D. Ariz. 2017)
(approving post-arrest border search of cell phone for evidence of additional contraband
entering country); cf. United States v. Kim, 103 F. Supp. 3d 32, 44, 46, 59 (D.D.C. 2015)
(holding unreasonable forensic search of laptop at border where search was expected to
reveal evidence of past but not ongoing criminal activity).
In the circumstances presented here, we agree with the government’s bottom line:
Because the forensic search of Kolsuz’s phone was conducted at least in part to uncover
information about an ongoing transnational crime – in particular, information about
additional illegal firearms exports already underway, by freight or in the custody of a
coconspirator, see Kolsuz, 185 F. Supp. 3d at 860 – it “fits within the core of the
rationale” underlying the border search exception. Brief of United States at 19–20.
B.
Most of Kolsuz’s appeal is devoted to his argument against application of the
border exception. But Kolsuz has a fallback position, as well: Even under the border
exception, Kolsuz contends, the forensic search of his phone constituted a nonroutine
border search “unsupported by the type of reasonable suspicion required to justify” such
searches. Defendant’s Brief at 31. Again, we disagree.
18
1.
Like the district court, we begin by considering the first premise of Kolsuz’s
argument: that the forensic search of his cell-phone data qualifies as a nonroutine border
search, requiring some level of particularized suspicion. We agree with the district court
that particularly in light of the Supreme Court’s decision in Riley, a forensic border
search of a phone must be treated as nonroutine, permissible only on a showing of
individualized suspicion. See Kolsuz, 185 F. Supp. 3d at 852–58.
As described above, the Supreme Court has held that even at the border,
individualized suspicion is necessary to justify certain “highly intrusive searches,” in
light of the significance of the individual “dignity and privacy interests” infringed.
Flores-Montano, 541 U.S. at 152. Beyond that general guidance, the Court has not
delineated precisely what makes a search nonroutine. Compare id. at 155 (removal and
disassembly of car’s gas tank does not qualify as nonroutine border search) with Montoya
de Hernandez, 473 U.S. at 541–42 (16-hour detention for monitored bowel movement
pending rectal examination is nonroutine). But as the district court ably explains, in
deciding whether a search rises to the level of nonroutine, courts have focused primarily
on how deeply it intrudes into a person’s privacy. Kolsuz, 185 F. Supp. 3d at 853. Under
that approach, border searches of luggage, outer clothing, and personal effects
consistently are treated as routine, while searches that are most invasive of privacy – strip
searches, alimentary-canal searches, x-rays, and the like – are deemed nonroutine and
permitted only with reasonable suspicion. See id. at 853 & n.14 (citing cases).
19
By that metric, even before the Supreme Court issued its 2014 decision in Riley,
there was a convincing case for categorizing forensic searches of digital devices as
nonroutine. See Cotterman, 709 F.3d at 963–68 (holding that forensic examination of
computer is nonroutine border search requiring reasonable suspicion); Saboonchi, 990 F.
Supp. 2d at 549–60 (same as to smartphones and flash drives). First is the matter of
scale: The sheer quantity of data stored on smartphones and other digital devices dwarfs
the amount of personal information that can be carried over a border – and thus subjected
to a routine border search – in luggage or a car. “The average 400-gigabyte laptop hard
drive can store over 200 million pages. . . . Even a car full of packed suitcases with
sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of
digital storage.” Cotterman, 709 F.3d at 964. Subjected to comprehensive forensic
analysis, a digital device can reveal an unparalleled breadth of private information.
The uniquely sensitive nature of that information matters, as well. Smartphones
and laptops “contain the most intimate details of our lives: financial records, confidential
business documents, medical records and private emails,” id., and also may provide
access to data stored remotely, id. at 965. 4 The report generated by the month-long
logical file system extraction of data from Kolsuz’s phone is a case in point, revealing
896 pages’ worth of sensitive data including personal contacts, photographs, web
4
The forensic search of Kolsuz’s phone, which remained in airplane mode
throughout, did not extend to information stored remotely (“in the cloud”), nor to residual
data of files that had been deleted by Kolsuz. Kolsuz, 185 F. Supp. 3d at 849 & n.8. Like
the district court, however, we decline “to distinguish an extensive forensic search of a
cell phone from a very extensive forensic search of a cell phone.” Id. at 857.
20
browsing history, and a “history of [Kolsuz’s] physical location down to precise GPS
coordinates,” J.A. 94 – the kind of information that, analyzed cumulatively, “generates a
precise, comprehensive record of a person’s public movements that reflects a wealth of
detail about her familial, political, professional, religious and sexual associations.” See
United States v. Jones, 565 U.S. 400, 415 (2012) (Sotomayor, J., concurring). And
finally, while an international traveler can mitigate the intrusion occasioned by a routine
luggage search by leaving behind her diaries, photographs, and other especially personal
effects, the same is not true, at least practically speaking, when it comes to smartphones
and digital devices. Portable electronic devices are ubiquitous – for many, the most
reliable means of contact when abroad – and it is neither “realistic nor reasonable to
expect the average traveler to leave his digital devices at home when traveling.”
Saboonchi, 990 F. Supp. 2d at 556.
And then came Riley, in which the Supreme Court confirmed every particular of
that assessment. Riley holds that the search incident to arrest exception, which allows for
automatic searches of personal effects in the possession of an arrestee, does not apply to
manual searches of cell phones. 134 S. Ct. at 2493–94. The key to Riley’s reasoning is
its express refusal to treat such phones as just another form of container, like the wallets,
bags, address books, and diaries covered by the search incident exception. See id. at
2488–90. Instead, Riley insists, cell phones are fundamentally different “in both a
quantitative and a qualitative sense” from other objects traditionally subject to
government searches. Id. at 2489. And that is so, Riley explains, for precisely the
reasons already identified by cases treating border searches of digital devices as
21
nonroutine: the “immense storage capacity” of cell phones, putting a vastly larger array
of information at risk of exposure, id.; the special sensitivity of the kinds of information
that may be stored on a phone, such as browsing history and historical location data, id. at
2490; and, finally, the “element of pervasiveness that characterizes cell phones,” id.,
making them an “insistent part of daily life,” id. at 2484.
After Riley, we think it is clear that a forensic search of a digital phone must be
treated as a nonroutine border search, requiring some form of individualized suspicion.
See Kolsuz, 185 F. Supp. 3d at 858; see also United States v. Saboonchi, 48 F. Supp. 3d
815, 819 (D. Md. 2014) (“Saboonchi II”) (discussing ways in which Riley confirms prior
holding that border searches of digital devices are nonroutine). Indeed, the impact of
Riley is plain enough that the government’s brief does not seriously contest this point,
focusing instead on the argument (which we next address) that nonroutine or not, the
search of Kolsuz’s phone was justified under the border exception. 5 We also note that
shortly after argument in this case, the Department of Homeland Security adopted a
policy that treats forensic searches of digital devices as nonroutine border searches,
insofar as such searches now may be conducted only with reasonable suspicion of
5
The government does note that in Ickes, 393 F.3d at 505–07, our court treated a
search of a computer as a routine border search, requiring no individualized suspicion for
the search. But as the district court explained, Ickes approved a manual, on-site
inspection of computer contents that would be accessible to any user, and did not address
the use of the sophisticated forensic search methods at issue here. Kolsuz, 185 F. Supp.
3d at 853–54; see also Saboonchi, 990 F. Supp. 2d at 546 (distinguishing Ickes on same
ground). Because Kolsuz does not challenge the initial manual search of his phone at
Dulles, we have no occasion here to consider whether Riley calls into question the
permissibility of suspicionless manual searches of digital devices at the border.
22
activity that violates the customs laws or in cases raising national security concerns. U.S.
Customs and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic
Devices 5 (2018). That the agency has chosen to adopt these requirements, of course,
does not establish that they are constitutionally mandated. Cf. Ickes, 393 F.3d at 507
(distinguishing between agency practice and constitutional requirements). But it does
suggest, as courts have anticipated, that the distinction between manual and forensic
searches is a perfectly manageable one, see Cotterman, 709 F.3d at 967 (categorizing
forensic searches as nonroutine requires only “that officers make a commonsense
differentiation between a manual review of files on an electronic device and application
of computer software to analyze a hard drive”), and that treating forensic phone searches
as nonroutine need not interfere unduly with the agency’s protective mission at the
border, see Saboonchi, 990 F. Supp. 2d at 570. 6
2.
That the forensic analysis of Kolsuz’s phone data qualifies as a nonroutine border
search does not resolve this case. Nonroutine searches are permitted under the border
6
The new policy does not use the “routine” and “nonroutine” terminology of
Supreme Court case law, distinguishing instead between “basic” and “advanced”
searches. But the import is the same. “Basic” searches (like those we term “manual”) are
examinations of an electronic device that do not entail the use of external equipment or
software and may be conducted without suspicion. “Advanced” searches (like “forensic”
searches) involve the connection of external equipment to a device – such as the
Cellebrite Physical Analyzer used on Kolsuz’s phone – in order to review, copy, or
analyze its contents, and are subject to the restrictions noted above. See U.S. Customs
and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic Devices 4–
5 (2018); Molina-Isidoro, 884 F.3d at 294 & n.2 (Costa, J., concurring).
23
exception, so long as they are accompanied by the appropriate level of individualized
suspicion. See Montoya de Hernandez, 473 U.S. at 540–41 & n.4.
The district court concluded that under the border exception, the “highest level of
Fourth Amendment protection available” is the reasonable suspicion standard, which was
met in this case. 7 Kolsuz, 185 F. Supp. 3d at 858–59. As the district court explained,
courts consistently have required only reasonable suspicion even when reviewing the
most intrusive of nonroutine border searches and seizures – like, for instance, the one at
issue in Montoya de Hernandez, in which the Supreme Court held that with reasonable
suspicion, the government could detain a traveler thought to be smuggling contraband in
her alimentary canal for 16 hours while it monitored her bowel movements and sought a
court order for a rectal examination. Id. at 852–53, 858–59.
Of course, certain searches conducted under exceptions to the warrant requirement
may require more than reasonable suspicion. See, e.g., California v. Carney, 471 U.S.
386, 393–95 (1985) (holding that automobile exception to the Fourth Amendment
permits a warrantless search of a motor home if based on probable cause). Perhaps the
7
Kolsuz also argues that even if the search of his phone could be justified by
reasonable suspicion, what would be required is reasonable suspicion that contraband, as
opposed to evidence, would be found on the device. Otherwise, according to Kolsuz, the
search would be “untethered” from the constitutional justification for border searches:
the interception of contraband as it crosses the border. If this argument sounds familiar,
that is because it is a reformulation of Kolsuz’s threshold argument against any
application of the border exception to this case, addressed above. And for essentially the
reasons already given, we cannot agree. The district court found – and Kolsuz does not
dispute – that the agents here had reason to believe that their search of Kolsuz’s phone
would reveal not only evidence of past export-control violations, but also evidence of
ongoing efforts to smuggle firearms over the border. Kolsuz, 185 F. Supp. 3d at 860.
That is enough to “tether” the search to the rationale behind the border exception.
24
same is true of some nonroutine border searches, as Kolsuz argues, but we need not
resolve that question here. As the government reminds us, even if a search is judged to
be constitutionally flawed in some way, its fruits need not be suppressed if the agents
acted “in reasonable reliance on binding precedent.” Davis v. United States, 564 U.S.
229, 241 (2011); see United States v. Baker, 719 F.3d 313, 320–21 (4th Cir. 2013)
(describing Davis). In such circumstances, suppression can do little to deter police
misconduct, and the “social costs” of suppression – the exclusion from trial of reliable
evidence bearing on guilt or innocence – outweigh any deterrence benefits. Davis, 564
U.S. at 237–38.
At the time the CBP officers conducted their forensic search of Kolsuz’s phone,
there was at least some case law indicating that reasonable suspicion might be required.
See Kolsuz, 185 F. Supp. 3d at 855–58 (discussing cases). But there was no case
suggesting that even more would be necessary – for a forensic search of a phone at the
border or, indeed, for any border search, no matter how nonroutine or invasive. And that
remains the case today: Even as Riley has become familiar law, there are no cases
requiring more than reasonable suspicion for forensic cell phone searches at the border.
But see Vergara, 884 F.3d at 1313–19 (Jill Pryor, J., dissenting) (after Riley, forensic
search of phone is not subject to border search exception and therefore requires warrant
based on probable cause).
Under these circumstances, we think it was reasonable for the CBP officers who
conducted the forensic analysis of Kolsuz’s phone to rely on the established and uniform
body of precedent allowing warrantless border searches of digital devices that are based
25
on at least reasonable suspicion. See Molina-Isidoro, 884 F.3d at 293 (applying good-
faith exception to warrantless manual search of phone at border). Under Davis’s “good-
faith” exception to the Fourth Amendment exclusionary rule, that reasonable reliance by
itself is enough to bar suppression of the evidence generated by the search. See Baker,
719 F.3d at 321. Accordingly, we need not – and will not – reach the issue of whether
more than reasonable suspicion is required for a search of this nature in affirming the
judgment of the district court. See Molina-Isidoro, 884 F.3d at 294 (Costa, J.,
concurring) (reliance on good-faith exception particularly appropriate in area of rapid
legal and technological change).
III.
For the reasons given above, the judgment of the district court is
AFFIRMED
26
WILKINSON, Circuit Judge, concurring in the judgment:
I thank the majority for its thoughtful opinion. While I agree with much of what is
said, my point of departure is quite basic. The majority appears to leave the legislative
and executive branches shivering in the cold. Those branches have a critical role to play
in defining the standards for a border search, and they are much better equipped than we
are to appreciate both the privacy interests at stake and the magnitude of the practical
risks involved.
The standard of reasonableness in the particular context of a border search should
be principally a legislative question, not a judicial one. Congress should decide that
standard. Courts should apply it. This is a separation of powers approach that makes use
of the respective capabilities of all three branches of government, not just one.
The infirmity of a constitutional rule in the unique context of a border search is
clear. Such a rule claims for courts the sole prerogative to set standards in an area where
legislative inquiry would be invaluable and where the executive maintains a strong
sovereign interest. Diminishing the other two branches flirts with real-life dangers. The
whole enterprise calls for the greatest caution and circumspection, not premature
declarations of constitutional rules.
If individualized suspicion is to be required in order to conduct what the majority
asserts is a “nonroutine border search,” Maj. Op. at 4, then Congress must say so. And in
all events, there was plainly reasonable suspicion to conduct the search here. The
majority should have stopped right there. Assuming without deciding that reasonable
suspicion was even required, it is present here in triplicate.
27
Instead my colleagues wander from what Article III indisputably envisions as the
core role of courts: simply to decide a case or controversy. The majority turns
prescriptive, but the pronouncement here is too abstract and floats too far above the
realities at the border.
Lethal capabilities are advancing at a rapid pace. Detection of destructive devices
is becoming more difficult. Nation states, terrorist bands, and individual arms merchants
see profit and prestige and power in joining the arms race. Might we wish to hear in a
manner more probing than appellate briefs and oral argument exactly what are the
dimensions of the threats we face? What makes us think the elective branches would
downgrade the significant privacy interests the majority rightly identifies? Might the
other two branches, if given a fair chance, have something to say? And do not Articles I
and II, which set forth the legislative and executive roles in matters of grave international
import, give them the right to say it? Who are we to propound the idea that democratic
bodies, where Fourth Amendment reasonableness is concerned, have nothing to
contribute?
Alarmist? Hyperbolic? Perhaps. But if we so limit the role of our coordinate
branches with a constitutional ruling, how shall we ever know?
I.
The majority fairly recounts the facts here, and they are straightforward and
incriminating. Before his arrest at Dulles airport, Customs and Border Protection (CBP)
agents had twice stopped Kolsuz, a Turkish national, at JFK airport for carrying
contraband firearms parts proscribed by statute. See 22 U.S.C. § 2278. On both
28
occasions, Kolsuz failed to produce the license required to export those parts. Both times,
CBP agents informed Kolsuz that he needed a license to export those items.
Kolsuz reentered the United States on January 25, 2016, on a tourist visa. He again
purchased numerous gun parts. Law enforcement officials who were familiar with
Kolsuz’s previous attempts to export contraband firearms asked CBP to search Kolsuz’s
bags when he tried to return to Turkey. When Kolsuz arrived at Dulles, CBP searched his
bags. The inspection revealed eighteen handgun barrels, twenty-two 9 mm handgun
magazines, four .45 caliber handgun magazines, and one .22 caliber Glock conversion
kit. All of these firearms parts are restricted items on the U.S. Munitions List. At no time
did Kolsuz have permission to export them. Based on Kolsuz’s previous attempts to bring
firearm parts out of the country, CBP had ample reason to suspect that Kolsuz might
again try to export firearms.
Following the search of Kolsuz’s bags, CBP officers interrogated Kolsuz and
performed a cursory inspection of his iPhone. At the end of the interrogation, Kolsuz was
arrested and his iPhone seized. At that point, his iPhone was transported to Sterling,
Virginia, where federal law enforcement conducted an “advanced logical file system
extraction” of the iPhone. This extraction, as the majority notes, generated an 896-page
report on the information contained in the phone.
II.
This was plainly a border search. See Maj. Op. at 18. Assuming reasonable
suspicion of Kolsuz’s criminal activity is somehow required, it clearly existed here. We
need go no further. Rather than deciding the case on solid and suitably limited grounds,
29
the majority goes on to prescribe a constitutional standard whose rationale would label a
great many cell phone searches undertaken at the border as “nonroutine” and forbidden
absent prior individualized suspicion.
While the majority purports not to reach the question of the justification required
for the manual search of Kolsuz’s cell phone at Dulles airport, see Maj. Op. at 22 n.5, the
rhetorical thrust of its opinion as concerns cell phones and smartphones may be read by
many courts to require individualized suspicion for border searches of all cell phones
period. Or if the majority intends a less sweeping standard, the slipperiness of the
distinction between intrusive and less intrusive cell phone searches and between those
that are routine and those that are nonroutine will lead, I fear, to difficulties in application
down the road. While the majority’s constitutional venture may be correct, it also may
well not be. Again, we are not the ones to set the standard.
We are, each of us, in over our heads. We have no idea of the dangers we are
courting. JFK and Dulles are quintessential border posts. See Almeida-Sanchez v. United
States, 413 U.S. 266, 273 (1973). Thousands of international travelers go through them
every day. Yet the majority hardly grapples with how law enforcement is expected to
ascertain individualized suspicion when dealing with such numbers. The privacy interest,
while weighty, is the only side of a precarious balance that seems to concern the majority,
and this in the application of the Fourth Amendment, which articulates reasonableness
and hence balance as a standard. See Katz v. United States, 389 U.S. 347, 360 (1967).
One would hope that rather than charging unnecessarily ahead, the majority would
recognize the need for congressional input, which the enunciation of constitutional
30
standards makes more difficult. Constitutional standards are preemptive. They sweep all
other pieces off the board. Judicially promulgated constitutional standards say essentially,
“That’s that. The Constitution is the highest law, and the judiciary shall be its sole
guardian.”
Empirical questions lie at the heart of the tension between privacy and security
interests at the border. How many people travel through international airports every day?
What screening techniques and investigative resources does government have available?
What materials are being smuggled in and out, and by whom? What practical obstacles
exist to individualized findings? What, in other words, is the magnitude of danger courted
by progressive step-ups of search requirements?
The limited glimpse from a single case does no more than beg the question: What
is the reality of it all? This is why any Fourth Amendment standard is best designed here
through the more adaptable legislative process and the wider lens of legislative hearings.
See Riley v. California, 134 S. Ct. 2473, 2497-98 (2014) (Alito, J., concurring in the
judgment) (“Legislatures, elected by the people, are in a better position than we are to
assess and respond to the changes that have already occurred and those that almost
certainly will take place in the future.”). For “[a]s new technologies continue to appear in
the marketplace and outpace existing surveillance law, the primary job of evaluating their
impact on privacy rights and of updating the law must remain with the branch of
government designed to make such policy choices, the legislature.” In re Askin, 47 F.3d
100, 106 (4th Cir. 1995).
31
The majority contends that the “Department of Homeland Security adopted a
policy that treats forensic searches of digital devices as nonroutine border searches.” Maj.
Op. at 22. I think the document is more complex than this, but in all events, it proves my
point—that in this narrow area agency policy born of actual and ongoing experience is
more adaptable than a freeze-frame constitutional ruling.
Courts too often assume Congress is desensitized to the need for privacy
protections. This does lawmakers a disservice. Congress has long sought to strike a
balance between privacy and security in the context of digital searches. See, e.g., USA
Freedom Act of 2015, Pub. L. No. 114-23, 129 Stat. 268 (limiting government
surveillance of telephone records); 18 U.S.C. §§ 2510-22 (2012) (limiting the
government’s ability to monitor electronic communications); Orin S. Kerr, The Effect of
Legislation on Fourth Amendment Protection, 115 Mich. L. Rev. 1117, 1120 (2017)
(observing “the recent enactment of more and stronger statutory privacy laws” by federal
and state legislatures in the past five years). And, though of course not directly relevant in
the context of a federal border search, states have historically also protected Fourth
Amendment privacy rights. See Kerr, 115 Mich. L. Rev. at 1120 (documenting state
statutes limiting the use of digital searches).
It is sometimes said in non-border search cases that the judiciary does no more
than provide “a floor” which Congress can exceed at its discretion. See, e.g., Kelsey v.
Cty. of Schoharie, 567 F.3d 54, 64 (2d Cir. 2009); Graves v. Mahoning Cty., 821 F.3d
772, 778 (6th Cir. 2016). But the so-called floor in this case is not some innocuous
minimum, but a hugely consequential policy judgment that certain categories of border
32
searches will require individualized suspicion. The fact that Congress has not thus far
seen fit to adopt a court’s preferred standard gives us no license to act preemptively with
an unnecessary constitutional disquisition. The dangers of this notion are underscored by
the majority’s reservation here of the question whether probable cause or a warrant may
be required for some unspecified categories of border searches in the future. See Maj. Op.
at 24-25. This does not sound like any sort of “floor” at all.
The dangers of judicial standard-setting in an area as sensitive as border searches
is thus apparent. Here the legislative process would be informed by numerous
representatives of the executive branch, who can lend their practical insights and
experience to the inquiry. The executive’s role has always been thought especially
important in an area such as border searches, where it has long been held to have a
uniquely sovereign interest. The border search exception to the Fourth Amendment’s
warrant requirement is based on the “longstanding right of the sovereign to protect itself
by stopping and examining persons and property crossing into this country.” United
States v. Ramsey, 431 U.S. 606, 616 (1977). As the Supreme Court has explained, “[t]he
Government’s interest in preventing the entry of unwanted persons and effects is at its
zenith at the international border.” See United States v. Flores-Montano, 541 U.S. 149,
152 (2004). That interest is so powerful that border searches “are reasonable simply by
virtue of the fact that they occur at the border.” Ramsey, 431 U.S. at 616.
The role of courts is thus not to blanket the field of border searches by preempting
constitutionally the contributions that the other two branches of our government are
constitutionally empowered and uniquely positioned to make. Marbury v. Madison did of
33
course say that it is “emphatically the province and duty of the judicial department to say
what the law is.” 5 U.S. (1 Cranch) 137, 177 (1803). But that is a very different
proposition from holding that constitutional interpretation must be solely a judicial
function. Indeed “the general architecture of [the Constitution] would seem to imply a
basic coequality among the three departments. . . . [I]t nowhere explicitly raises the Court
above coordinate legislative and executive departments.” Akhil Reed Amar, Architecture,
77 Ind. L.J. 671, 692-93 (2002). This is not a new idea. James Madison wrote that “none
of [the three branches of government] ought to possess, directly or indirectly, an
overruling influence over the others in the administration of their respective powers.” The
Federalist No. 48 (James Madison). But it is precisely that “overruling influence” the
majority asserts in its unnecessary constitutional exercise today.
III.
The general search that all of us must undergo at airports attests to the difficulties
of ensuring airborne security through individualized suspicion. Our new world has
brought inconvenience and intrusions on an indiscriminate basis, which none of us
welcome, but which most of us undergo in the interest of assuring a larger common good.
Our old world of relative security and relative privacy, if indeed it ever existed, is now
gone with the wind. It is painful to dream of retrieving what is ours no longer.
The Supreme Court has often noted how technology endangers privacy. As it
observed in Riley, “[m]odern cell phones, as a category, implicate privacy concerns far
beyond those implicated by the search of a cigarette pack, a wallet, or a purse.” 134 S. Ct.
at 2488-89. But Riley involved the warrantless search of a cell phone following an
34
ordinary roadside arrest after a traffic violation. The defendant was not at the border. The
setting here is far different from Riley.
Nor does the privacy interest recognized in Riley begin to answer the question of
who should strike the balance between privacy and security at the border of the country,
the point most freighted with security threats and the point at which a nation asserts and
affirms its very right to nationhood.
Porous borders are uniquely tempting to those intent upon inflicting the vivid
horrors of mass casualties. Then too, there is the danger of highly classified technical
information being smuggled out of this country only to go into the hands of foreign
nations who do not wish us well and who seek to build their armaments to an ever more
perilous state.
It is no secret that rapid technological advances have enhanced the ability of
criminal syndicates and terrorist networks to execute transnational schemes through the
coordination now made possible by instantaneous communications. To give criminal
enterprises the advantage of technological advancements and at the same time impair
access of law enforcement to those same developments risks recalibrating the Fourth
Amendment balance in a manner that does not comport with reasonableness. Cell phones
may prove essential to revealing the scope of a conspiracy; who is involved; what
weapons and devices the conspirators possess; what the purpose and plans and timing of
the plotted criminal acts may be; and where indeed those who would carry out these acts
may be located.
35
But to stop there is to halve the equation. The majority is right to emphasize that
searches of cell phones and the like can reveal a trove of data unconnected to any
criminal offense. The intrusion upon personal privacy is undoubtedly severe. One may of
course say that international travelers are on notice that border inspections may be
uniquely intrusive, and that travelers can prepare for that prospect by not taking a full
load of personal data abroad, where additional dangers of theft and inadvertent loss may
also await. But the fact that we can pack our digital suitcase with the same care that we
pack personal belongings in traditional luggage still does not nullify the reality that these
sorts of searches look into our lives in a way that is deeply uncomfortable, especially
when government itself becomes the agent of intrusion. But the ultimate question here is
not whether there is a balance to be struck between what are highly significant privacy
and security interests. It is what branch of government is best suited to make that
determination. In this case, where there is a longstanding historical practice in border
searches of deferring to the legislative and executive branches, the majority should have
shown a modest measure of restraint simply by deciding the case. Our role in this narrow
area is more the application of standards than the creation of them. In reaching to
formulate a constitutional rule, the majority has turned the whole thing on its head.
We are ruling in a vacuum. We are building a doctrinal house without foundation.
The majority opinion provides little context or background or real-life picture of Dulles
Airport. It leaves little role for the legislative branch. At what point the domestic
conveniences of cell phone use should ripen into transnational entitlements is primarily
for the political branches to determine. The elected branches are also best able to gauge at
36
what point the creeping constitutionalization of border searches reflects the cultural
habits and practices of an elite group of transnational Americans at the risk of
endangerment that knows no class bounds.
It is ill advised to ignore the role of the political branches in addressing a
phenomenon that may fall short of the formal warfare contemplated in Articles I and II,
but still retains major features of international conflict. To reach beyond the Article III
function is to court grave dangers which we may perceive as remote and hypothetical
until one day, very suddenly, they are not. Not that any one case or any one appellate
court will likely bring down havoc on our heads. In our shielded circumstances, we may
never know or be apprised of many effects of our decisions. Still it is uncomfortable to
guess. I have nothing but respect for my friends in the majority. But taken cumulatively,
rulings slowly constitutionalizing border searches are taking chances with the safety and
lives of our fellow Americans. And this, as a judge, I cannot do.
37