United States v. Hamza Kolsuz

PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 16-4687 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. HAMZA KOLSUZ, Defendant-Appellant. Appeal from the United States District Court for the Eastern District of Virginia, at Alexandria. T.S. Ellis, III, District Judge. (1:16-cr-00053-TSE) Argued: October 26, 2017 Decided: May 9, 2018 Amended: May 18, 2018 Before WILKINSON, MOTZ, and HARRIS, Circuit Judges. Affirmed by published opinion. Judge Harris wrote the opinion, in which Judge Motz joined. Judge Wilkinson wrote a separate opinion concurring in the judgment. ARGUED: Todd M. Richman, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Alexandria, Virginia, for Appellant. Jeffrey Michael Smith, National Security Division, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. Esha Bhandari, AMERICAN CIVIL LIBERTIES UNION, New York, New York, for Amici American Civil Liberties Union, ACLU of Virginia, ACLU of Maryland, ACLU of North Carolina, ACLU of South Carolina, and ACLU of West Virginia. ON BRIEF: Geremy C. Kamens, Federal Public Defender, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Alexandria, Virginia, for Appellant. Dana Boente, United States Attorney, Mary B. McCord, Acting Assistant Attorney General for National Security, Heather Alpino, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. Hope R. Amezquita, AMERICAN CIVIL LIBERTIES UNION FOUNDATION OF VIRGINIA, Richmond, Virginia, Nathan Freed Wessler, Vera Eidelman, AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York, New York, for Amici American Civil Liberties Union, ACLU of Virginia, ACLU of Maryland, ACLU of North Carolina, ACLU of South Carolina, and ACLU of West Virginia. Curt Levey, THE COMMITTEE FOR JUSTICE, Washington, D.C., Erica L. Marshall, CAUSE OF ACTION INSTITUTE, Washington, D.C., for Amici Cause of Action Institute, The Committee for Justice, and Floor64, Inc. Sophia Cope, Adam Schwartz, ELECTRONIC FRONTIER FOUNDATION, San Francisco, California, for Amici Electronic Frontier Foundation, Asian Americans Advancing Justice-Asian Law Caucus, Council on American-Islamic Relations (CAIR), CAIR California, CAIR Florida, CAIR Missouri, CAIR New York, CAIR Ohio, CAIR Dallas/Fort Worth, and The National Association of Criminal Defense Lawyers. Michael Price, BRENNAN CENTER FOR JUSTICE AT NYU SCHOOL OF LAW, New York, New York, for Amicus Brennan Center for Justice. 2 PAMELA HARRIS, Circuit Judge: Hamza Kolsuz was detained at Washington Dulles International Airport while attempting to board a flight to Turkey because federal customs agents found firearms parts in his luggage. After arresting Kolsuz, the agents took possession of his smartphone and subjected it to a month-long, off-site forensic analysis, yielding a nearly 900-page report cataloguing the phone’s data. The district court denied Kolsuz’s motion to suppress, applying the Fourth Amendment’s border search exception and holding that the forensic examination was a nonroutine border search justified by reasonable suspicion. Kolsuz ultimately was convicted of attempting to smuggle firearms out of the country and an associated conspiracy charge. Kolsuz now challenges the denial of his suppression motion. First, he argues that the forensic analysis of his phone should not have been treated as a border search at all. According to Kolsuz, once both he and his phone were in government custody, the government interest in preventing contraband from crossing the border was no longer implicated, so the border exception should no longer apply. Second, relying chiefly on Riley v. California, 134 S. Ct. 2473 (2014) (holding that search incident to arrest exception does not apply to searches of cell phones), Kolsuz urges that the privacy interest in smartphone data is so weighty that even under the border exception, a forensic search of a phone requires more than reasonable suspicion, and instead may be conducted only with a warrant based on probable cause. We agree with the district court that the forensic analysis of Kolsuz’s phone is properly categorized as a border search. Despite the temporal and spatial distance 3 between the off-site analysis of the phone and Kolsuz’s attempted departure at the airport, the justification for the border exception is broad enough to reach the search in this case. We also agree with the district court that under Riley, the forensic examination of Kolsuz’s phone must be considered a nonroutine border search, requiring some measure of individualized suspicion. What precisely that standard should be – whether reasonable suspicion is enough, as the district court concluded, or whether there must be a warrant based on probable cause, as Kolsuz suggests – is a question we need not resolve: Because the agents who conducted the search reasonably relied on precedent holding that no warrant was required, suppression of the report would be inappropriate even if we disagreed. Accordingly, we affirm the judgment of the district court. I. A. We begin with the Fourth Amendment principles that govern this case. As a general rule, the Fourth Amendment requires that law enforcement searches be accompanied by a warrant based on probable cause. Arizona v. Gant, 556 U.S. 332, 338 (2009). But there are exceptions, and one such exception typically covers our nation’s borders. At a border – or at a border’s “functional equivalent,” like the international airport at which Kolsuz was intercepted – government agents may conduct “routine” searches and seizures of persons and property without a warrant or any individualized suspicion. Almeida-Sanchez v. United States, 413 U.S. 266, 272–73 (1973); United States v. Montoya de Hernandez, 473 U.S. 531, 538 (1985). The Supreme Court has 4 described the border exception as “grounded in the recognized right of the sovereign to control, subject to substantive limitations imposed by the Constitution, who and what may enter the country.” United States v. Ramsey, 431 U.S. 606, 620 (1977); see United States v. Flores-Montano, 541 U.S. 149, 152 (2004) (border exception rests on government interest in “preventing the entry of unwanted persons and effects”). Routine searches and seizures at the border therefore are exempted from standard Fourth Amendment requirements so that the government can “prevent the introduction of contraband” into the country and bar entry by those who would bring harm across the border, “whether that be communicable diseases, narcotics, or explosives.” Montoya de Hernandez, 473 U.S. at 537, 544. In this case, the search in question was initiated when Kolsuz attempted to exit the country, not to enter. But we have long held that the rationales underlying the border exception extend to exit as well as entry searches. See United States v. Oriakhi, 57 F.3d 1290, 1296–97 (4th Cir. 1995). The “fundamental principles of national sovereignty” that are the basis for the border search exception, we have explained, apply equally to government efforts to “protect[] and monitor[] exports from the country” as they do to efforts to control imports. Id. at 1296, 1297. Thus, with respect to exit searches, the border search exception is justified by the government’s power to regulate the export of currency and other goods. Id. at 1297. And that power surely extends to controls on the exports of dangerous weapons, like the firearms parts at issue here. See, e.g., United States v. Boumelhem, 339 F.3d 414, 422–23 (6th Cir. 2003) (applying border exception to exit search of shipping container believed to hold smuggled firearms). 5 Even at the border, however, the government’s authority is not without limits. The “ultimate touchstone” of the Fourth Amendment, Riley, 134 S. Ct. at 2482, remains “reasonableness.” See Montoya de Hernandez, 473 U.S. at 538. While suspicionless border searches generally are “reasonable simply by virtue of the fact that they occur at the border,” Ramsey, 431 U.S. at 616, the Supreme Court also has recognized a category of “nonroutine” border searches that are constitutionally reasonable only if based on individualized suspicion. See Montoya de Hernandez, 473 U.S. at 541 (holding that overnight detention for monitored bowel movement followed by rectal examination is “beyond the scope of a routine customs search” and permissible under the border exception only with reasonable suspicion). Such nonroutine border searches, the Court has suggested, include “highly intrusive searches” that implicate especially significant “dignity and privacy interests,” as well as destructive searches of property and searches carried out in “particularly offensive” manners. Flores-Montano, 541 U.S. at 152, 154 & n.2. B. In January 2016, Turkish citizen Hamza Kolsuz entered the United States in Miami, Florida, on a tourist visa. By that time, Kolsuz already was well known to government authorities. In December 2012, agents had discovered 163 firearms parts in his luggage when Kolsuz checked in for a flight to Turkey at John F. Kennedy International Airport in New York. The parts were listed on the United States Munitions List (“USML”), subjecting them to export controls and a license requirement under the Arms Export Control Act, 22 U.S.C. § 2778(b)(2). See 22 C.F.R. §§ 120.2, 121.1 (setting 6 out USML, and defining “defense articles and defense services” subject to control under the Act). Agents explained the licensing requirements to Kolsuz and his companions, and ultimately seized the weapons parts. Just one month later, in January 2013, the process more or less repeated itself: Kolsuz arrived at JFK Airport for a flight to Turkey; a search of his checked luggage revealed firearms parts; and a licensing determination disclosed that although the parts were listed on the USML, Kolsuz had not obtained the requisite export license. When Kolsuz reentered the country on January 25, 2016, the authorities were ready for him. On February 1, 2016, Charles Reich, a Special Agent with United States Customs and Border Protection (“CBP”) in New York, reached out to CBP officers on duty at Washington Dulles International Airport (“Dulles”) to let them know that Kolsuz, who had been stopped before while attempting to smuggle firearms parts out of the country, would be traveling from Dulles to Turkey the following day. Agent Reich urged the officers to search Kolsuz’s luggage for firearms parts, and followed up with an email containing additional information and a list of questions to ask Kolsuz about his associates and activities. On February 2, 2016, Kolsuz began his return trip by checking in at Miami International Airport for a series of flights that would take him through Dulles and on to Turkey. When Kolsuz and his luggage reached Dulles, CBP officers Lauren Colgan and 7 Jonathan Budd conducted an outbound customs examination of his two checked bags. 1 Once again, they found multiple firearms parts: 18 handgun barrels, 22 9mm handgun magazines, four .45 caliber handgun magazines, and one .22 caliber conversion kit. Colgan and Budd, thanks to their training, immediately recognized that the barrels and conversion kit were listed on the USML and thus could not be removed from the country without a license. And when Kolsuz was stopped on the jetway as he attempted to board his flight to Turkey, he admitted that he was in possession of firearms parts for which he did not have a federal license. After transporting Kolsuz to a secondary inspection area, the officers conducted what would be the first of two searches of Kolsuz’s iPhone 6 Plus. This search – often referred to as a “manual” search – involved using the iPhone’s touch screen, which was not password protected, to scroll through Kolsuz’s recent calls and text messages. The officers also confirmed through a records search that Kolsuz had no export license or pending application for a license. After an interview with a number of CBP officers, Kolsuz was arrested. At that point, CBP Special Agent Adam Coppolo initiated the second search of Kolsuz’s phone, this one commonly known as a “forensic” search. Coppolo first transported the phone approximately four miles from Dulles to the Homeland Security 1 Kolsuz never has suggested that this standard customs search of his checked luggage presents any constitutional problem. Nor could he: It is long established that a search of luggage taken from or bound for an overseas flight is a routine border search that may be conducted on a suspicionless basis. See Montoya de Hernandez, 473 U.S. at 538; see also, e.g., United States v. Ezeiruaku, 936 F.2d 136, 140–41 (3d Cir. 1991). 8 Investigations office in Sterling, Virginia. There, Computer Forensic Agent Michael Del Vacchio attached the phone to a Cellebrite Physical Analyzer, which extracts data from electronic devices, and conducted an advanced logical file system extraction. The phone remained in airplane mode throughout, so the forensic examination did not reach data stored remotely – or “in the cloud” – and was instead limited to data stored on the phone itself. Even so, the data extraction process lasted for a full month, and yielded an 896- page report that included Kolsuz’s personal contact lists, emails, messenger conversations, photographs, videos, calendar, web browsing history, and call logs, along with a history of Kolsuz’s physical location down to precise GPS coordinates. C. Kolsuz was indicted on three counts: (i) attempting to export firearms parts on the USML without a license, in violation of the Arms Export Control Act, 22 U.S.C. §§ 2278(b) and (c); (ii) attempting to smuggle goods from the United States in violation of 18 U.S.C. § 554(a); and (iii) conspiracy to commit those offenses, in violation of 18 U.S.C. § 371. Before trial, Kolsuz filed a motion to suppress the report generated by the forensic examination of his phone, arguing primarily that the border exception did not apply to the search. According to Kolsuz, a forensic search of a phone that occurs miles away from an airport and for a month after an attempted departure does not constitute a “border search.” Moreover, Kolsuz contended, the rationales justifying the border exception were not implicated in this case, because at the time of the search there was no prospect that either he or his phone – both securely in government custody – would be crossing the 9 border. Instead, Kolsuz argued, the forensic search should be treated as a search incident to his arrest, and under Riley v. California, cell phones may be searched incident to arrest only with a warrant based on probable cause. In a comprehensively reasoned opinion, the district court denied Kolsuz’s suppression motion. United States v. Kolsuz, 185 F. Supp. 3d 843, 860 (E.D. Va. 2016). The court held first that the forensic search of Kolsuz’s phone was properly evaluated as a border search. That Kolsuz had been arrested, the district court explained, did not transform the forensic examination into a search incident to arrest or render the border exception inapplicable; both the Fourth Circuit and other courts have held that a border search may be conducted after a traveler is arrested and no longer in a position to cross the border. Id. at 851 (citing United States v. Ickes, 393 F.3d 501, 507 (4th Cir. 2005)). Similarly, the court found, it is well established that a search initiated at the border may fall under the border exception even if it ultimately is conducted off-site and over a long period of time. Id. at 851–52. Now applying the border exception, the district court went on to consider whether the forensic search of Kolsuz’s smartphone was a routine border search, subject to no Fourth Amendment requirements, or whether, as Kolsuz urged, it was a nonroutine search that required some degree of individualized suspicion. The court acknowledged that in Ickes, the Fourth Circuit treated as routine a border inspection of a computer’s contents, accessed manually “in the same way a typical user would” and without any “sophisticated forensic analysis.” Id. at 853 (citing Ickes, 393 F.3d at 502–03). But that decision, the court determined, “does not address whether more sophisticated forensic 10 searches” also may be classified as routine, id. at 854, particularly in light of the Supreme Court’s subsequent decision in Riley and its emphasis on the significant privacy interests in the digital contents of phones. The court concluded that while the manual search of Kolsuz’s iPhone at the airport was a routine border search, 2 the off-site forensic analysis of the phone’s data qualified as a nonroutine search. After Riley, the court found, a forensic search of a phone no longer can be analogized to an ordinary search of luggage or some other container at the border, given the breadth and sensitivity of the private information that may be uncovered. It is “difficult to conceive of a property search more invasive or intrusive than a sophisticated, digital search of a cell phone,” the court concluded, which might be compared to a “body cavity search” of a phone. Id. at 856 (quoting United States v. Saboonchi, 990 F. Supp. 2d 536, 569 (D. Md. 2014)). As a nonroutine border search, the court went on to hold, the forensic analysis of Kolsuz’s phone required particularized suspicion, in the form of the familiar reasonable suspicion standard. The court rejected the more demanding requirement of a warrant based on probable cause, noting that no reported case has held a border search to that standard. Instead, courts consistently have deemed reasonable suspicion sufficient to 2 Although the district court addressed this initial search in the course of its reasoning, Kolsuz’s suppression motion is limited to the subsequent forensic examination. On appeal, Kolsuz expressly disclaims any challenge to the manual search of his phone at Dulles, which in any event did not reveal information used against him at trial. 11 justify even the most intrusive of nonroutine border searches, including body cavity and alimentary canal searches. Because the government in this case had “more than reasonable suspicion” that a forensic examination of Kolsuz’s phone would reveal evidence of both past and ongoing attempts to export firearms parts illegally, the court concluded, the forensic search was reasonable under the Fourth Amendment. Id. at 859, 860. The parties consented to a bench trial, and the district court found Kolsuz guilty of all three counts against him. In finding that Kolsuz acted with the requisite willfulness, the court relied in part on messages Kolsuz exchanged with a co-conspirator, obtained from the forensic search of Kolsuz’s phone. 3 The court ultimately entered judgment only on the Arms Export Control Act and conspiracy counts against Kolsuz, dismissing the smuggling charge on the government’s motion. Kolsuz was sentenced to 30 months in prison and three years of supervised release, and this timely appeal followed. II. Kolsuz’s appeal is a narrow one, and we begin by clarifying what is and is not in front of us today. First, Kolsuz does not challenge the manual search of his smartphone, undertaken on-site at the airport as he tried to depart for Turkey. We thus have no 3 The court also adopted an independent willful blindness theory, under which it was “unnecessary to rely” on the messages recovered from Kolsuz’s phone. J.A. 243 n.34. As the government recognizes, however, that theory does not apply to the conspiracy charge of which Kolsuz was convicted, and thus does not provide an alternative basis for affirming the district court judgment in full. 12 occasion to consider application of the border exception to manual searches of electronic devices, conducted at the border and roughly contemporaneously with an attempted crossing. Cf. United States v. Molina-Isidoro, 884 F.3d 287, 289 (5th Cir. 2018) (sustaining manual search of phone at border under good-faith exception to Fourth Amendment exclusionary rule). Nor does Kolsuz challenge the seizure of his phone, either initially at the airport or later at the Homeland Security Investigations office where it was forensically examined. The Fourth Amendment protects property as well as privacy, see Flores-Montano, 541 U.S. at 154, and a seizure reasonable at its inception must remain reasonable in scope and duration to satisfy the Fourth Amendment, see Montoya de Hernandez, 473 U.S. at 541– 42. But perhaps because he was in custody while the government undertook its month- long forensic analysis, Kolsuz has not asserted any impairment of a possessory interest in his phone. Accordingly, we do not address whether and under what circumstances an extended confiscation of a traveler’s phone – quite apart from any search undertaken – might constitute an unreasonable seizure of property for Fourth Amendment purposes. Cf. Saboonchi, 990 F. Supp. 2d at 569 (noting that forensic searches of digital devices may deprive individuals of their possessions for periods of days or weeks). That leaves the question that is raised by this appeal: whether the forensic search of Kolsuz’s phone, and the associated invasion of Kolsuz’s privacy, was justified under the border search exception. In considering the district court’s denial of Kolsuz’s motion to suppress, we review that court’s legal conclusions de novo and its factual findings for clear error, considering the evidence in the light most favorable to the government. See 13 United States v. Palmer, 820 F.3d 640, 648 (4th Cir. 2016). For the reasons given below, we affirm. A. Kolsuz’s primary argument is that the forensic analysis of his phone was not subject to the border search exception at all. Once he was arrested and his phone seized and transported miles from the airport, Kolsuz contends, the government interest that underlies the border search exception – preventing contraband from crossing a border – was no longer at issue, and the border exception was therefore inapplicable. Rather, standard Fourth Amendment rules governed the forensic search, and required a warrant based on probable cause because the search was incident to Kolsuz’s arrest. See Riley, 134 S. Ct. at 2485, 2493–94 (holding that the search incident exception does not apply to cell phones, which generally may be searched incident to arrest only with probable cause and a warrant). We cannot agree. First, as the district court explained, the border exception is not rendered inapplicable because a search initiated at a border ultimately is conducted at some physical or temporal remove. See Kolsuz, 185 F. Supp. 3d at 851–52 (“as several courts have held, an off-site forensic search of an electronic device over a long period of time is nonetheless a border search”); see also, e.g., United States v. Cotterman, 709 F.3d 952, 961–62 (9th Cir. 2013) (en banc) (applying border exception to forensic examination of laptop computer conducted miles from and days after attempted border crossing); Saboonchi, 990 F. Supp. 2d at 548–49, 561 (applying border exception to forensic search of cell phones conducted several hundred miles from border crossing). Indeed, after 14 pressing this point before the district court, Kolsuz concedes it on appeal, agreeing that the location and timing of the search in this case are consistent with the border search exception. Nor, as the district court determined, does the fact of Kolsuz’s arrest transform the examination of his phone into a search incident to arrest, triggering Riley and calling for a search warrant based on probable cause. In Ickes, our court applied the border search exception to approve a manual search of computer data that occurred only after the defendant had been arrested, obviating any threat of an imminent border crossing. See 393 F.3d at 503; see also, e.g., United States v. Ramos, 190 F. Supp. 3d 992, 998–1000 (S.D. Cal. 2016) (rejecting argument that arrest renders border exception inapplicable by making it impossible for defendant or contraband to cross border). Kolsuz attempts to distinguish Ickes on the ground that it involved an entry search rather than the exit search at issue here, but for these purposes, it makes no difference: As we have explained, where the relevant governmental interests are present, the border search exception extends equally to entry and exit searches, see Oriakhi, 57 F.3d at 1296–97, and any rule carving out post-arrest searches from that doctrine would apply equally in both contexts, as well. In its strongest form, Kolsuz’s argument combines all of these factors – his arrest as he sought to depart the country, the phone in government custody miles from the border, the month-long gap between the action at the airport and the end of the search – and argues that taken together, they show that the search in this case is entirely “untethered” from any justification behind the border exception. The rationale allowing 15 outgoing border searches, as Kolsuz describes it, is limited to intercepting contraband as it crosses the national border. Here, with the phone as well as the firearms parts seized by the government and Kolsuz under arrest, there was no contraband poised to exit the country and thus no nexus to that rationale. When that is the case, Kolsuz argues, the border search exception does not apply, because the concerns underlying a warrant exception “define the boundaries of the exception.” See Gant, 566 U.S. at 339. Kolsuz’s foundational premise is correct: As a general rule, the scope of a warrant exception should be defined by its justifications. See Riley, 134 S. Ct. at 2484–88 (asking whether “application of the search incident to arrest doctrine to this particular category of effects would untether the rule from the justifications underlying the [search incident to arrest] exception”). As a result, where the government interests underlying a Fourth Amendment exception are not implicated by a certain type of search, and where the individual’s privacy interests outweigh any ancillary governmental interests, the government must obtain a warrant based on probable cause. See id. At some point, in other words, even a search initiated at the border could become so attenuated from the rationale for the border search exception that it no longer would fall under that exception. See Molina-Isidoro, 884 F.3d at 295–97 (Costa, J., concurring) (questioning whether search for evidence as opposed to contraband is consistent with justifications for border search exception). But this is not that case. On the facts here, the link between the search of Kolsuz’s phone and the interest that justifies border searches was sufficient to trigger the border exception on any account of a “nexus” requirement. Government agents forensically 16 searched Kolsuz’s phone because they had reason to believe – and good reason to believe, in the form of two suitcases filled with firearms parts – that Kolsuz was attempting to export firearms illegally and without a license. See Kolsuz, 185 F. Supp. 3d at 859–60. That is a transnational offense that goes to the heart of the border search exception, which rests in part on “the sovereign interest of protecting and monitoring exports from the country.” See Oriakhi, 57 F.3d at 1297; see also Boumelhem, 339 F.3d at 423 (holding that exit search for firearms implicates “significant government interests” not only in controlling exports but also in national security). This is not a case, in other words, in which the government invokes the border exception on behalf of its generalized interest in law enforcement and combatting crime. Cf. United States v. Vergara, 884 F.3d 1309, 1317 (11th Cir. 2018) (Jill Pryor, J., dissenting) (relying on “general law enforcement justification” to approve evidentiary border searches would “untether the [border search exception] from its justifications”). Here, there is a direct link between the predicate for the search and the rationale for the border exception. Moreover, as the district court explained, the agents who searched Kolsuz’s phone reasonably believed that their search would reveal not only evidence of the export violation they already had detected, but also “information related to other ongoing attempts to export illegally various firearms parts.” Kolsuz, 185 F. Supp. 3d at 860. The government emphasizes that finding – not contested by Kolsuz – in its argument before us, and properly so. The justification behind the border search exception is broad enough to accommodate not only the direct interception of contraband as it crosses the border, but also the prevention and disruption of ongoing efforts to export contraband illegally, 17 through searches initiated at the border. See, e.g., Ramos, 190 F. Supp. 3d at 999 (approving post-arrest “investigatory” border search of cell phone for information about larger smuggling organization and “more contraband entering into the country at that time”); United States v. Mendez, 240 F. Supp. 3d 1005, 1007–10 (D. Ariz. 2017) (approving post-arrest border search of cell phone for evidence of additional contraband entering country); cf. United States v. Kim, 103 F. Supp. 3d 32, 44, 46, 59 (D.D.C. 2015) (holding unreasonable forensic search of laptop at border where search was expected to reveal evidence of past but not ongoing criminal activity). In the circumstances presented here, we agree with the government’s bottom line: Because the forensic search of Kolsuz’s phone was conducted at least in part to uncover information about an ongoing transnational crime – in particular, information about additional illegal firearms exports already underway, by freight or in the custody of a coconspirator, see Kolsuz, 185 F. Supp. 3d at 860 – it “fits within the core of the rationale” underlying the border search exception. Brief of United States at 19–20. B. Most of Kolsuz’s appeal is devoted to his argument against application of the border exception. But Kolsuz has a fallback position, as well: Even under the border exception, Kolsuz contends, the forensic search of his phone constituted a nonroutine border search “unsupported by the type of reasonable suspicion required to justify” such searches. Defendant’s Brief at 31. Again, we disagree. 18 1. Like the district court, we begin by considering the first premise of Kolsuz’s argument: that the forensic search of his cell-phone data qualifies as a nonroutine border search, requiring some level of particularized suspicion. We agree with the district court that particularly in light of the Supreme Court’s decision in Riley, a forensic border search of a phone must be treated as nonroutine, permissible only on a showing of individualized suspicion. See Kolsuz, 185 F. Supp. 3d at 852–58. As described above, the Supreme Court has held that even at the border, individualized suspicion is necessary to justify certain “highly intrusive searches,” in light of the significance of the individual “dignity and privacy interests” infringed. Flores-Montano, 541 U.S. at 152. Beyond that general guidance, the Court has not delineated precisely what makes a search nonroutine. Compare id. at 155 (removal and disassembly of car’s gas tank does not qualify as nonroutine border search) with Montoya de Hernandez, 473 U.S. at 541–42 (16-hour detention for monitored bowel movement pending rectal examination is nonroutine). But as the district court ably explains, in deciding whether a search rises to the level of nonroutine, courts have focused primarily on how deeply it intrudes into a person’s privacy. Kolsuz, 185 F. Supp. 3d at 853. Under that approach, border searches of luggage, outer clothing, and personal effects consistently are treated as routine, while searches that are most invasive of privacy – strip searches, alimentary-canal searches, x-rays, and the like – are deemed nonroutine and permitted only with reasonable suspicion. See id. at 853 & n.14 (citing cases). 19 By that metric, even before the Supreme Court issued its 2014 decision in Riley, there was a convincing case for categorizing forensic searches of digital devices as nonroutine. See Cotterman, 709 F.3d at 963–68 (holding that forensic examination of computer is nonroutine border search requiring reasonable suspicion); Saboonchi, 990 F. Supp. 2d at 549–60 (same as to smartphones and flash drives). First is the matter of scale: The sheer quantity of data stored on smartphones and other digital devices dwarfs the amount of personal information that can be carried over a border – and thus subjected to a routine border search – in luggage or a car. “The average 400-gigabyte laptop hard drive can store over 200 million pages. . . . Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.” Cotterman, 709 F.3d at 964. Subjected to comprehensive forensic analysis, a digital device can reveal an unparalleled breadth of private information. The uniquely sensitive nature of that information matters, as well. Smartphones and laptops “contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails,” id., and also may provide access to data stored remotely, id. at 965. 4 The report generated by the month-long logical file system extraction of data from Kolsuz’s phone is a case in point, revealing 896 pages’ worth of sensitive data including personal contacts, photographs, web 4 The forensic search of Kolsuz’s phone, which remained in airplane mode throughout, did not extend to information stored remotely (“in the cloud”), nor to residual data of files that had been deleted by Kolsuz. Kolsuz, 185 F. Supp. 3d at 849 & n.8. Like the district court, however, we decline “to distinguish an extensive forensic search of a cell phone from a very extensive forensic search of a cell phone.” Id. at 857. 20 browsing history, and a “history of [Kolsuz’s] physical location down to precise GPS coordinates,” J.A. 94 – the kind of information that, analyzed cumulatively, “generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious and sexual associations.” See United States v. Jones, 565 U.S. 400, 415 (2012) (Sotomayor, J., concurring). And finally, while an international traveler can mitigate the intrusion occasioned by a routine luggage search by leaving behind her diaries, photographs, and other especially personal effects, the same is not true, at least practically speaking, when it comes to smartphones and digital devices. Portable electronic devices are ubiquitous – for many, the most reliable means of contact when abroad – and it is neither “realistic nor reasonable to expect the average traveler to leave his digital devices at home when traveling.” Saboonchi, 990 F. Supp. 2d at 556. And then came Riley, in which the Supreme Court confirmed every particular of that assessment. Riley holds that the search incident to arrest exception, which allows for automatic searches of personal effects in the possession of an arrestee, does not apply to manual searches of cell phones. 134 S. Ct. at 2493–94. The key to Riley’s reasoning is its express refusal to treat such phones as just another form of container, like the wallets, bags, address books, and diaries covered by the search incident exception. See id. at 2488–90. Instead, Riley insists, cell phones are fundamentally different “in both a quantitative and a qualitative sense” from other objects traditionally subject to government searches. Id. at 2489. And that is so, Riley explains, for precisely the reasons already identified by cases treating border searches of digital devices as 21 nonroutine: the “immense storage capacity” of cell phones, putting a vastly larger array of information at risk of exposure, id.; the special sensitivity of the kinds of information that may be stored on a phone, such as browsing history and historical location data, id. at 2490; and, finally, the “element of pervasiveness that characterizes cell phones,” id., making them an “insistent part of daily life,” id. at 2484. After Riley, we think it is clear that a forensic search of a digital phone must be treated as a nonroutine border search, requiring some form of individualized suspicion. See Kolsuz, 185 F. Supp. 3d at 858; see also United States v. Saboonchi, 48 F. Supp. 3d 815, 819 (D. Md. 2014) (“Saboonchi II”) (discussing ways in which Riley confirms prior holding that border searches of digital devices are nonroutine). Indeed, the impact of Riley is plain enough that the government’s brief does not seriously contest this point, focusing instead on the argument (which we next address) that nonroutine or not, the search of Kolsuz’s phone was justified under the border exception. 5 We also note that shortly after argument in this case, the Department of Homeland Security adopted a policy that treats forensic searches of digital devices as nonroutine border searches, insofar as such searches now may be conducted only with reasonable suspicion of 5 The government does note that in Ickes, 393 F.3d at 505–07, our court treated a search of a computer as a routine border search, requiring no individualized suspicion for the search. But as the district court explained, Ickes approved a manual, on-site inspection of computer contents that would be accessible to any user, and did not address the use of the sophisticated forensic search methods at issue here. Kolsuz, 185 F. Supp. 3d at 853–54; see also Saboonchi, 990 F. Supp. 2d at 546 (distinguishing Ickes on same ground). Because Kolsuz does not challenge the initial manual search of his phone at Dulles, we have no occasion here to consider whether Riley calls into question the permissibility of suspicionless manual searches of digital devices at the border. 22 activity that violates the customs laws or in cases raising national security concerns. U.S. Customs and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic Devices 5 (2018). That the agency has chosen to adopt these requirements, of course, does not establish that they are constitutionally mandated. Cf. Ickes, 393 F.3d at 507 (distinguishing between agency practice and constitutional requirements). But it does suggest, as courts have anticipated, that the distinction between manual and forensic searches is a perfectly manageable one, see Cotterman, 709 F.3d at 967 (categorizing forensic searches as nonroutine requires only “that officers make a commonsense differentiation between a manual review of files on an electronic device and application of computer software to analyze a hard drive”), and that treating forensic phone searches as nonroutine need not interfere unduly with the agency’s protective mission at the border, see Saboonchi, 990 F. Supp. 2d at 570. 6 2. That the forensic analysis of Kolsuz’s phone data qualifies as a nonroutine border search does not resolve this case. Nonroutine searches are permitted under the border 6 The new policy does not use the “routine” and “nonroutine” terminology of Supreme Court case law, distinguishing instead between “basic” and “advanced” searches. But the import is the same. “Basic” searches (like those we term “manual”) are examinations of an electronic device that do not entail the use of external equipment or software and may be conducted without suspicion. “Advanced” searches (like “forensic” searches) involve the connection of external equipment to a device – such as the Cellebrite Physical Analyzer used on Kolsuz’s phone – in order to review, copy, or analyze its contents, and are subject to the restrictions noted above. See U.S. Customs and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic Devices 4– 5 (2018); Molina-Isidoro, 884 F.3d at 294 & n.2 (Costa, J., concurring). 23 exception, so long as they are accompanied by the appropriate level of individualized suspicion. See Montoya de Hernandez, 473 U.S. at 540–41 & n.4. The district court concluded that under the border exception, the “highest level of Fourth Amendment protection available” is the reasonable suspicion standard, which was met in this case. 7 Kolsuz, 185 F. Supp. 3d at 858–59. As the district court explained, courts consistently have required only reasonable suspicion even when reviewing the most intrusive of nonroutine border searches and seizures – like, for instance, the one at issue in Montoya de Hernandez, in which the Supreme Court held that with reasonable suspicion, the government could detain a traveler thought to be smuggling contraband in her alimentary canal for 16 hours while it monitored her bowel movements and sought a court order for a rectal examination. Id. at 852–53, 858–59. Of course, certain searches conducted under exceptions to the warrant requirement may require more than reasonable suspicion. See, e.g., California v. Carney, 471 U.S. 386, 393–95 (1985) (holding that automobile exception to the Fourth Amendment permits a warrantless search of a motor home if based on probable cause). Perhaps the 7 Kolsuz also argues that even if the search of his phone could be justified by reasonable suspicion, what would be required is reasonable suspicion that contraband, as opposed to evidence, would be found on the device. Otherwise, according to Kolsuz, the search would be “untethered” from the constitutional justification for border searches: the interception of contraband as it crosses the border. If this argument sounds familiar, that is because it is a reformulation of Kolsuz’s threshold argument against any application of the border exception to this case, addressed above. And for essentially the reasons already given, we cannot agree. The district court found – and Kolsuz does not dispute – that the agents here had reason to believe that their search of Kolsuz’s phone would reveal not only evidence of past export-control violations, but also evidence of ongoing efforts to smuggle firearms over the border. Kolsuz, 185 F. Supp. 3d at 860. That is enough to “tether” the search to the rationale behind the border exception. 24 same is true of some nonroutine border searches, as Kolsuz argues, but we need not resolve that question here. As the government reminds us, even if a search is judged to be constitutionally flawed in some way, its fruits need not be suppressed if the agents acted “in reasonable reliance on binding precedent.” Davis v. United States, 564 U.S. 229, 241 (2011); see United States v. Baker, 719 F.3d 313, 320–21 (4th Cir. 2013) (describing Davis). In such circumstances, suppression can do little to deter police misconduct, and the “social costs” of suppression – the exclusion from trial of reliable evidence bearing on guilt or innocence – outweigh any deterrence benefits. Davis, 564 U.S. at 237–38. At the time the CBP officers conducted their forensic search of Kolsuz’s phone, there was at least some case law indicating that reasonable suspicion might be required. See Kolsuz, 185 F. Supp. 3d at 855–58 (discussing cases). But there was no case suggesting that even more would be necessary – for a forensic search of a phone at the border or, indeed, for any border search, no matter how nonroutine or invasive. And that remains the case today: Even as Riley has become familiar law, there are no cases requiring more than reasonable suspicion for forensic cell phone searches at the border. But see Vergara, 884 F.3d at 1313–19 (Jill Pryor, J., dissenting) (after Riley, forensic search of phone is not subject to border search exception and therefore requires warrant based on probable cause). Under these circumstances, we think it was reasonable for the CBP officers who conducted the forensic analysis of Kolsuz’s phone to rely on the established and uniform body of precedent allowing warrantless border searches of digital devices that are based 25 on at least reasonable suspicion. See Molina-Isidoro, 884 F.3d at 293 (applying good- faith exception to warrantless manual search of phone at border). Under Davis’s “good- faith” exception to the Fourth Amendment exclusionary rule, that reasonable reliance by itself is enough to bar suppression of the evidence generated by the search. See Baker, 719 F.3d at 321. Accordingly, we need not – and will not – reach the issue of whether more than reasonable suspicion is required for a search of this nature in affirming the judgment of the district court. See Molina-Isidoro, 884 F.3d at 294 (Costa, J., concurring) (reliance on good-faith exception particularly appropriate in area of rapid legal and technological change). III. For the reasons given above, the judgment of the district court is AFFIRMED 26 WILKINSON, Circuit Judge, concurring in the judgment: I thank the majority for its thoughtful opinion. While I agree with much of what is said, my point of departure is quite basic. The majority appears to leave the legislative and executive branches shivering in the cold. Those branches have a critical role to play in defining the standards for a border search, and they are much better equipped than we are to appreciate both the privacy interests at stake and the magnitude of the practical risks involved. The standard of reasonableness in the particular context of a border search should be principally a legislative question, not a judicial one. Congress should decide that standard. Courts should apply it. This is a separation of powers approach that makes use of the respective capabilities of all three branches of government, not just one. The infirmity of a constitutional rule in the unique context of a border search is clear. Such a rule claims for courts the sole prerogative to set standards in an area where legislative inquiry would be invaluable and where the executive maintains a strong sovereign interest. Diminishing the other two branches flirts with real-life dangers. The whole enterprise calls for the greatest caution and circumspection, not premature declarations of constitutional rules. If individualized suspicion is to be required in order to conduct what the majority asserts is a “nonroutine border search,” Maj. Op. at 4, then Congress must say so. And in all events, there was plainly reasonable suspicion to conduct the search here. The majority should have stopped right there. Assuming without deciding that reasonable suspicion was even required, it is present here in triplicate. 27 Instead my colleagues wander from what Article III indisputably envisions as the core role of courts: simply to decide a case or controversy. The majority turns prescriptive, but the pronouncement here is too abstract and floats too far above the realities at the border. Lethal capabilities are advancing at a rapid pace. Detection of destructive devices is becoming more difficult. Nation states, terrorist bands, and individual arms merchants see profit and prestige and power in joining the arms race. Might we wish to hear in a manner more probing than appellate briefs and oral argument exactly what are the dimensions of the threats we face? What makes us think the elective branches would downgrade the significant privacy interests the majority rightly identifies? Might the other two branches, if given a fair chance, have something to say? And do not Articles I and II, which set forth the legislative and executive roles in matters of grave international import, give them the right to say it? Who are we to propound the idea that democratic bodies, where Fourth Amendment reasonableness is concerned, have nothing to contribute? Alarmist? Hyperbolic? Perhaps. But if we so limit the role of our coordinate branches with a constitutional ruling, how shall we ever know? I. The majority fairly recounts the facts here, and they are straightforward and incriminating. Before his arrest at Dulles airport, Customs and Border Protection (CBP) agents had twice stopped Kolsuz, a Turkish national, at JFK airport for carrying contraband firearms parts proscribed by statute. See 22 U.S.C. § 2278. On both 28 occasions, Kolsuz failed to produce the license required to export those parts. Both times, CBP agents informed Kolsuz that he needed a license to export those items. Kolsuz reentered the United States on January 25, 2016, on a tourist visa. He again purchased numerous gun parts. Law enforcement officials who were familiar with Kolsuz’s previous attempts to export contraband firearms asked CBP to search Kolsuz’s bags when he tried to return to Turkey. When Kolsuz arrived at Dulles, CBP searched his bags. The inspection revealed eighteen handgun barrels, twenty-two 9 mm handgun magazines, four .45 caliber handgun magazines, and one .22 caliber Glock conversion kit. All of these firearms parts are restricted items on the U.S. Munitions List. At no time did Kolsuz have permission to export them. Based on Kolsuz’s previous attempts to bring firearm parts out of the country, CBP had ample reason to suspect that Kolsuz might again try to export firearms. Following the search of Kolsuz’s bags, CBP officers interrogated Kolsuz and performed a cursory inspection of his iPhone. At the end of the interrogation, Kolsuz was arrested and his iPhone seized. At that point, his iPhone was transported to Sterling, Virginia, where federal law enforcement conducted an “advanced logical file system extraction” of the iPhone. This extraction, as the majority notes, generated an 896-page report on the information contained in the phone. II. This was plainly a border search. See Maj. Op. at 18. Assuming reasonable suspicion of Kolsuz’s criminal activity is somehow required, it clearly existed here. We need go no further. Rather than deciding the case on solid and suitably limited grounds, 29 the majority goes on to prescribe a constitutional standard whose rationale would label a great many cell phone searches undertaken at the border as “nonroutine” and forbidden absent prior individualized suspicion. While the majority purports not to reach the question of the justification required for the manual search of Kolsuz’s cell phone at Dulles airport, see Maj. Op. at 22 n.5, the rhetorical thrust of its opinion as concerns cell phones and smartphones may be read by many courts to require individualized suspicion for border searches of all cell phones period. Or if the majority intends a less sweeping standard, the slipperiness of the distinction between intrusive and less intrusive cell phone searches and between those that are routine and those that are nonroutine will lead, I fear, to difficulties in application down the road. While the majority’s constitutional venture may be correct, it also may well not be. Again, we are not the ones to set the standard. We are, each of us, in over our heads. We have no idea of the dangers we are courting. JFK and Dulles are quintessential border posts. See Almeida-Sanchez v. United States, 413 U.S. 266, 273 (1973). Thousands of international travelers go through them every day. Yet the majority hardly grapples with how law enforcement is expected to ascertain individualized suspicion when dealing with such numbers. The privacy interest, while weighty, is the only side of a precarious balance that seems to concern the majority, and this in the application of the Fourth Amendment, which articulates reasonableness and hence balance as a standard. See Katz v. United States, 389 U.S. 347, 360 (1967). One would hope that rather than charging unnecessarily ahead, the majority would recognize the need for congressional input, which the enunciation of constitutional 30 standards makes more difficult. Constitutional standards are preemptive. They sweep all other pieces off the board. Judicially promulgated constitutional standards say essentially, “That’s that. The Constitution is the highest law, and the judiciary shall be its sole guardian.” Empirical questions lie at the heart of the tension between privacy and security interests at the border. How many people travel through international airports every day? What screening techniques and investigative resources does government have available? What materials are being smuggled in and out, and by whom? What practical obstacles exist to individualized findings? What, in other words, is the magnitude of danger courted by progressive step-ups of search requirements? The limited glimpse from a single case does no more than beg the question: What is the reality of it all? This is why any Fourth Amendment standard is best designed here through the more adaptable legislative process and the wider lens of legislative hearings. See Riley v. California, 134 S. Ct. 2473, 2497-98 (2014) (Alito, J., concurring in the judgment) (“Legislatures, elected by the people, are in a better position than we are to assess and respond to the changes that have already occurred and those that almost certainly will take place in the future.”). For “[a]s new technologies continue to appear in the marketplace and outpace existing surveillance law, the primary job of evaluating their impact on privacy rights and of updating the law must remain with the branch of government designed to make such policy choices, the legislature.” In re Askin, 47 F.3d 100, 106 (4th Cir. 1995). 31 The majority contends that the “Department of Homeland Security adopted a policy that treats forensic searches of digital devices as nonroutine border searches.” Maj. Op. at 22. I think the document is more complex than this, but in all events, it proves my point—that in this narrow area agency policy born of actual and ongoing experience is more adaptable than a freeze-frame constitutional ruling. Courts too often assume Congress is desensitized to the need for privacy protections. This does lawmakers a disservice. Congress has long sought to strike a balance between privacy and security in the context of digital searches. See, e.g., USA Freedom Act of 2015, Pub. L. No. 114-23, 129 Stat. 268 (limiting government surveillance of telephone records); 18 U.S.C. §§ 2510-22 (2012) (limiting the government’s ability to monitor electronic communications); Orin S. Kerr, The Effect of Legislation on Fourth Amendment Protection, 115 Mich. L. Rev. 1117, 1120 (2017) (observing “the recent enactment of more and stronger statutory privacy laws” by federal and state legislatures in the past five years). And, though of course not directly relevant in the context of a federal border search, states have historically also protected Fourth Amendment privacy rights. See Kerr, 115 Mich. L. Rev. at 1120 (documenting state statutes limiting the use of digital searches). It is sometimes said in non-border search cases that the judiciary does no more than provide “a floor” which Congress can exceed at its discretion. See, e.g., Kelsey v. Cty. of Schoharie, 567 F.3d 54, 64 (2d Cir. 2009); Graves v. Mahoning Cty., 821 F.3d 772, 778 (6th Cir. 2016). But the so-called floor in this case is not some innocuous minimum, but a hugely consequential policy judgment that certain categories of border 32 searches will require individualized suspicion. The fact that Congress has not thus far seen fit to adopt a court’s preferred standard gives us no license to act preemptively with an unnecessary constitutional disquisition. The dangers of this notion are underscored by the majority’s reservation here of the question whether probable cause or a warrant may be required for some unspecified categories of border searches in the future. See Maj. Op. at 24-25. This does not sound like any sort of “floor” at all. The dangers of judicial standard-setting in an area as sensitive as border searches is thus apparent. Here the legislative process would be informed by numerous representatives of the executive branch, who can lend their practical insights and experience to the inquiry. The executive’s role has always been thought especially important in an area such as border searches, where it has long been held to have a uniquely sovereign interest. The border search exception to the Fourth Amendment’s warrant requirement is based on the “longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into this country.” United States v. Ramsey, 431 U.S. 606, 616 (1977). As the Supreme Court has explained, “[t]he Government’s interest in preventing the entry of unwanted persons and effects is at its zenith at the international border.” See United States v. Flores-Montano, 541 U.S. 149, 152 (2004). That interest is so powerful that border searches “are reasonable simply by virtue of the fact that they occur at the border.” Ramsey, 431 U.S. at 616. The role of courts is thus not to blanket the field of border searches by preempting constitutionally the contributions that the other two branches of our government are constitutionally empowered and uniquely positioned to make. Marbury v. Madison did of 33 course say that it is “emphatically the province and duty of the judicial department to say what the law is.” 5 U.S. (1 Cranch) 137, 177 (1803). But that is a very different proposition from holding that constitutional interpretation must be solely a judicial function. Indeed “the general architecture of [the Constitution] would seem to imply a basic coequality among the three departments. . . . [I]t nowhere explicitly raises the Court above coordinate legislative and executive departments.” Akhil Reed Amar, Architecture, 77 Ind. L.J. 671, 692-93 (2002). This is not a new idea. James Madison wrote that “none of [the three branches of government] ought to possess, directly or indirectly, an overruling influence over the others in the administration of their respective powers.” The Federalist No. 48 (James Madison). But it is precisely that “overruling influence” the majority asserts in its unnecessary constitutional exercise today. III. The general search that all of us must undergo at airports attests to the difficulties of ensuring airborne security through individualized suspicion. Our new world has brought inconvenience and intrusions on an indiscriminate basis, which none of us welcome, but which most of us undergo in the interest of assuring a larger common good. Our old world of relative security and relative privacy, if indeed it ever existed, is now gone with the wind. It is painful to dream of retrieving what is ours no longer. The Supreme Court has often noted how technology endangers privacy. As it observed in Riley, “[m]odern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse.” 134 S. Ct. at 2488-89. But Riley involved the warrantless search of a cell phone following an 34 ordinary roadside arrest after a traffic violation. The defendant was not at the border. The setting here is far different from Riley. Nor does the privacy interest recognized in Riley begin to answer the question of who should strike the balance between privacy and security at the border of the country, the point most freighted with security threats and the point at which a nation asserts and affirms its very right to nationhood. Porous borders are uniquely tempting to those intent upon inflicting the vivid horrors of mass casualties. Then too, there is the danger of highly classified technical information being smuggled out of this country only to go into the hands of foreign nations who do not wish us well and who seek to build their armaments to an ever more perilous state. It is no secret that rapid technological advances have enhanced the ability of criminal syndicates and terrorist networks to execute transnational schemes through the coordination now made possible by instantaneous communications. To give criminal enterprises the advantage of technological advancements and at the same time impair access of law enforcement to those same developments risks recalibrating the Fourth Amendment balance in a manner that does not comport with reasonableness. Cell phones may prove essential to revealing the scope of a conspiracy; who is involved; what weapons and devices the conspirators possess; what the purpose and plans and timing of the plotted criminal acts may be; and where indeed those who would carry out these acts may be located. 35 But to stop there is to halve the equation. The majority is right to emphasize that searches of cell phones and the like can reveal a trove of data unconnected to any criminal offense. The intrusion upon personal privacy is undoubtedly severe. One may of course say that international travelers are on notice that border inspections may be uniquely intrusive, and that travelers can prepare for that prospect by not taking a full load of personal data abroad, where additional dangers of theft and inadvertent loss may also await. But the fact that we can pack our digital suitcase with the same care that we pack personal belongings in traditional luggage still does not nullify the reality that these sorts of searches look into our lives in a way that is deeply uncomfortable, especially when government itself becomes the agent of intrusion. But the ultimate question here is not whether there is a balance to be struck between what are highly significant privacy and security interests. It is what branch of government is best suited to make that determination. In this case, where there is a longstanding historical practice in border searches of deferring to the legislative and executive branches, the majority should have shown a modest measure of restraint simply by deciding the case. Our role in this narrow area is more the application of standards than the creation of them. In reaching to formulate a constitutional rule, the majority has turned the whole thing on its head. We are ruling in a vacuum. We are building a doctrinal house without foundation. The majority opinion provides little context or background or real-life picture of Dulles Airport. It leaves little role for the legislative branch. At what point the domestic conveniences of cell phone use should ripen into transnational entitlements is primarily for the political branches to determine. The elected branches are also best able to gauge at 36 what point the creeping constitutionalization of border searches reflects the cultural habits and practices of an elite group of transnational Americans at the risk of endangerment that knows no class bounds. It is ill advised to ignore the role of the political branches in addressing a phenomenon that may fall short of the formal warfare contemplated in Articles I and II, but still retains major features of international conflict. To reach beyond the Article III function is to court grave dangers which we may perceive as remote and hypothetical until one day, very suddenly, they are not. Not that any one case or any one appellate court will likely bring down havoc on our heads. In our shielded circumstances, we may never know or be apprised of many effects of our decisions. Still it is uncomfortable to guess. I have nothing but respect for my friends in the majority. But taken cumulatively, rulings slowly constitutionalizing border searches are taking chances with the safety and lives of our fellow Americans. And this, as a judge, I cannot do. 37