United States v. Hamza Kolsuz ( 2018 )


Menu:
  •                                      PUBLISHED
    UNITED STATES COURT OF APPEALS
    FOR THE FOURTH CIRCUIT
    No. 16-4687
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    v.
    HAMZA KOLSUZ,
    Defendant-Appellant.
    Appeal from the United States District Court for the Eastern District of Virginia, at
    Alexandria. T.S. Ellis, III, District Judge. (1:16-cr-00053-TSE)
    Argued: October 26, 2017                                        Decided: May 9, 2018
    Amended: May 18, 2018
    Before WILKINSON, MOTZ, and HARRIS, Circuit Judges.
    Affirmed by published opinion. Judge Harris wrote the opinion, in which Judge Motz
    joined. Judge Wilkinson wrote a separate opinion concurring in the judgment.
    ARGUED: Todd M. Richman, OFFICE OF THE FEDERAL PUBLIC DEFENDER,
    Alexandria, Virginia, for Appellant. Jeffrey Michael Smith, National Security Division,
    UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee.
    Esha Bhandari, AMERICAN CIVIL LIBERTIES UNION, New York, New York, for
    Amici American Civil Liberties Union, ACLU of Virginia, ACLU of Maryland, ACLU
    of North Carolina, ACLU of South Carolina, and ACLU of West Virginia. ON BRIEF:
    Geremy C. Kamens, Federal Public Defender, OFFICE OF THE FEDERAL PUBLIC
    DEFENDER, Alexandria, Virginia, for Appellant. Dana Boente, United States Attorney,
    Mary B. McCord, Acting Assistant Attorney General for National Security, Heather
    Alpino, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for
    Appellee.      Hope R. Amezquita, AMERICAN CIVIL LIBERTIES UNION
    FOUNDATION OF VIRGINIA, Richmond, Virginia, Nathan Freed Wessler, Vera
    Eidelman, AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York, New
    York, for Amici American Civil Liberties Union, ACLU of Virginia, ACLU of
    Maryland, ACLU of North Carolina, ACLU of South Carolina, and ACLU of West
    Virginia. Curt Levey, THE COMMITTEE FOR JUSTICE, Washington, D.C., Erica L.
    Marshall, CAUSE OF ACTION INSTITUTE, Washington, D.C., for Amici Cause of
    Action Institute, The Committee for Justice, and Floor64, Inc. Sophia Cope, Adam
    Schwartz, ELECTRONIC FRONTIER FOUNDATION, San Francisco, California, for
    Amici Electronic Frontier Foundation, Asian Americans Advancing Justice-Asian Law
    Caucus, Council on American-Islamic Relations (CAIR), CAIR California, CAIR
    Florida, CAIR Missouri, CAIR New York, CAIR Ohio, CAIR Dallas/Fort Worth, and
    The National Association of Criminal Defense Lawyers. Michael Price, BRENNAN
    CENTER FOR JUSTICE AT NYU SCHOOL OF LAW, New York, New York, for
    Amicus Brennan Center for Justice.
    2
    PAMELA HARRIS, Circuit Judge:
    Hamza Kolsuz was detained at Washington Dulles International Airport while
    attempting to board a flight to Turkey because federal customs agents found firearms
    parts in his luggage. After arresting Kolsuz, the agents took possession of his smartphone
    and subjected it to a month-long, off-site forensic analysis, yielding a nearly 900-page
    report cataloguing the phone’s data.     The district court denied Kolsuz’s motion to
    suppress, applying the Fourth Amendment’s border search exception and holding that the
    forensic examination was a nonroutine border search justified by reasonable suspicion.
    Kolsuz ultimately was convicted of attempting to smuggle firearms out of the country
    and an associated conspiracy charge.
    Kolsuz now challenges the denial of his suppression motion. First, he argues that
    the forensic analysis of his phone should not have been treated as a border search at all.
    According to Kolsuz, once both he and his phone were in government custody, the
    government interest in preventing contraband from crossing the border was no longer
    implicated, so the border exception should no longer apply. Second, relying chiefly on
    Riley v. California, 
    134 S. Ct. 2473
    (2014) (holding that search incident to arrest
    exception does not apply to searches of cell phones), Kolsuz urges that the privacy
    interest in smartphone data is so weighty that even under the border exception, a forensic
    search of a phone requires more than reasonable suspicion, and instead may be conducted
    only with a warrant based on probable cause.
    We agree with the district court that the forensic analysis of Kolsuz’s phone is
    properly categorized as a border search.        Despite the temporal and spatial distance
    3
    between the off-site analysis of the phone and Kolsuz’s attempted departure at the airport,
    the justification for the border exception is broad enough to reach the search in this case.
    We also agree with the district court that under Riley, the forensic examination of
    Kolsuz’s phone must be considered a nonroutine border search, requiring some measure
    of individualized suspicion. What precisely that standard should be – whether reasonable
    suspicion is enough, as the district court concluded, or whether there must be a warrant
    based on probable cause, as Kolsuz suggests – is a question we need not resolve:
    Because the agents who conducted the search reasonably relied on precedent holding that
    no warrant was required, suppression of the report would be inappropriate even if we
    disagreed. Accordingly, we affirm the judgment of the district court.
    I.
    A.
    We begin with the Fourth Amendment principles that govern this case. As a
    general rule, the Fourth Amendment requires that law enforcement searches be
    accompanied by a warrant based on probable cause. Arizona v. Gant, 
    556 U.S. 332
    , 338
    (2009). But there are exceptions, and one such exception typically covers our nation’s
    borders. At a border – or at a border’s “functional equivalent,” like the international
    airport at which Kolsuz was intercepted – government agents may conduct “routine”
    searches and seizures of persons and property without a warrant or any individualized
    suspicion. Almeida-Sanchez v. United States, 
    413 U.S. 266
    , 272–73 (1973); United
    States v. Montoya de Hernandez, 
    473 U.S. 531
    , 538 (1985). The Supreme Court has
    4
    described the border exception as “grounded in the recognized right of the sovereign to
    control, subject to substantive limitations imposed by the Constitution, who and what
    may enter the country.” United States v. Ramsey, 
    431 U.S. 606
    , 620 (1977); see United
    States v. Flores-Montano, 
    541 U.S. 149
    , 152 (2004) (border exception rests on
    government interest in “preventing the entry of unwanted persons and effects”). Routine
    searches and seizures at the border therefore are exempted from standard Fourth
    Amendment requirements so that the government can “prevent the introduction of
    contraband” into the country and bar entry by those who would bring harm across the
    border, “whether that be communicable diseases, narcotics, or explosives.” Montoya de
    
    Hernandez, 473 U.S. at 537
    , 544.
    In this case, the search in question was initiated when Kolsuz attempted to exit the
    country, not to enter. But we have long held that the rationales underlying the border
    exception extend to exit as well as entry searches. See United States v. Oriakhi, 
    57 F.3d 1290
    , 1296–97 (4th Cir. 1995). The “fundamental principles of national sovereignty”
    that are the basis for the border search exception, we have explained, apply equally to
    government efforts to “protect[] and monitor[] exports from the country” as they do to
    efforts to control imports. 
    Id. at 1296,
    1297. Thus, with respect to exit searches, the
    border search exception is justified by the government’s power to regulate the export of
    currency and other goods. 
    Id. at 1297.
    And that power surely extends to controls on the
    exports of dangerous weapons, like the firearms parts at issue here. See, e.g., United
    States v. Boumelhem, 
    339 F.3d 414
    , 422–23 (6th Cir. 2003) (applying border exception to
    exit search of shipping container believed to hold smuggled firearms).
    5
    Even at the border, however, the government’s authority is not without limits. The
    “ultimate touchstone” of the Fourth Amendment, 
    Riley, 134 S. Ct. at 2482
    , remains
    “reasonableness.” See Montoya de 
    Hernandez, 473 U.S. at 538
    . While suspicionless
    border searches generally are “reasonable simply by virtue of the fact that they occur at
    the border,” 
    Ramsey, 431 U.S. at 616
    , the Supreme Court also has recognized a category
    of “nonroutine” border searches that are constitutionally reasonable only if based on
    individualized suspicion. See Montoya de 
    Hernandez, 473 U.S. at 541
    (holding that
    overnight detention for monitored bowel movement followed by rectal examination is
    “beyond the scope of a routine customs search” and permissible under the border
    exception only with reasonable suspicion). Such nonroutine border searches, the Court
    has suggested, include “highly intrusive searches” that implicate especially significant
    “dignity and privacy interests,” as well as destructive searches of property and searches
    carried out in “particularly offensive” manners. 
    Flores-Montano, 541 U.S. at 152
    , 154 &
    n.2.
    B.
    In January 2016, Turkish citizen Hamza Kolsuz entered the United States in
    Miami, Florida, on a tourist visa. By that time, Kolsuz already was well known to
    government authorities. In December 2012, agents had discovered 163 firearms parts in
    his luggage when Kolsuz checked in for a flight to Turkey at John F. Kennedy
    International Airport in New York. The parts were listed on the United States Munitions
    List (“USML”), subjecting them to export controls and a license requirement under the
    Arms Export Control Act, 22 U.S.C. § 2778(b)(2). See 22 C.F.R. §§ 120.2, 121.1 (setting
    6
    out USML, and defining “defense articles and defense services” subject to control under
    the Act). Agents explained the licensing requirements to Kolsuz and his companions,
    and ultimately seized the weapons parts. Just one month later, in January 2013, the
    process more or less repeated itself: Kolsuz arrived at JFK Airport for a flight to Turkey;
    a search of his checked luggage revealed firearms parts; and a licensing determination
    disclosed that although the parts were listed on the USML, Kolsuz had not obtained the
    requisite export license.
    When Kolsuz reentered the country on January 25, 2016, the authorities were
    ready for him. On February 1, 2016, Charles Reich, a Special Agent with United States
    Customs and Border Protection (“CBP”) in New York, reached out to CBP officers on
    duty at Washington Dulles International Airport (“Dulles”) to let them know that Kolsuz,
    who had been stopped before while attempting to smuggle firearms parts out of the
    country, would be traveling from Dulles to Turkey the following day. Agent Reich urged
    the officers to search Kolsuz’s luggage for firearms parts, and followed up with an email
    containing additional information and a list of questions to ask Kolsuz about his
    associates and activities.
    On February 2, 2016, Kolsuz began his return trip by checking in at Miami
    International Airport for a series of flights that would take him through Dulles and on to
    Turkey. When Kolsuz and his luggage reached Dulles, CBP officers Lauren Colgan and
    7
    Jonathan Budd conducted an outbound customs examination of his two checked bags. 1
    Once again, they found multiple firearms parts: 18 handgun barrels, 22 9mm handgun
    magazines, four .45 caliber handgun magazines, and one .22 caliber conversion kit.
    Colgan and Budd, thanks to their training, immediately recognized that the barrels and
    conversion kit were listed on the USML and thus could not be removed from the country
    without a license. And when Kolsuz was stopped on the jetway as he attempted to board
    his flight to Turkey, he admitted that he was in possession of firearms parts for which he
    did not have a federal license.
    After transporting Kolsuz to a secondary inspection area, the officers conducted
    what would be the first of two searches of Kolsuz’s iPhone 6 Plus. This search – often
    referred to as a “manual” search – involved using the iPhone’s touch screen, which was
    not password protected, to scroll through Kolsuz’s recent calls and text messages. The
    officers also confirmed through a records search that Kolsuz had no export license or
    pending application for a license. After an interview with a number of CBP officers,
    Kolsuz was arrested.
    At that point, CBP Special Agent Adam Coppolo initiated the second search of
    Kolsuz’s phone, this one commonly known as a “forensic” search.             Coppolo first
    transported the phone approximately four miles from Dulles to the Homeland Security
    1
    Kolsuz never has suggested that this standard customs search of his checked
    luggage presents any constitutional problem. Nor could he: It is long established that a
    search of luggage taken from or bound for an overseas flight is a routine border search
    that may be conducted on a suspicionless basis. See Montoya de 
    Hernandez, 473 U.S. at 538
    ; see also, e.g., United States v. Ezeiruaku, 
    936 F.2d 136
    , 140–41 (3d Cir. 1991).
    8
    Investigations office in Sterling, Virginia. There, Computer Forensic Agent Michael Del
    Vacchio attached the phone to a Cellebrite Physical Analyzer, which extracts data from
    electronic devices, and conducted an advanced logical file system extraction. The phone
    remained in airplane mode throughout, so the forensic examination did not reach data
    stored remotely – or “in the cloud” – and was instead limited to data stored on the phone
    itself. Even so, the data extraction process lasted for a full month, and yielded an 896-
    page report that included Kolsuz’s personal contact lists, emails, messenger
    conversations, photographs, videos, calendar, web browsing history, and call logs, along
    with a history of Kolsuz’s physical location down to precise GPS coordinates.
    C.
    Kolsuz was indicted on three counts: (i) attempting to export firearms parts on the
    USML without a license, in violation of the Arms Export Control Act, 22 U.S.C. §§
    2278(b) and (c); (ii) attempting to smuggle goods from the United States in violation of
    18 U.S.C. § 554(a); and (iii) conspiracy to commit those offenses, in violation of 18
    U.S.C. § 371.
    Before trial, Kolsuz filed a motion to suppress the report generated by the forensic
    examination of his phone, arguing primarily that the border exception did not apply to the
    search. According to Kolsuz, a forensic search of a phone that occurs miles away from
    an airport and for a month after an attempted departure does not constitute a “border
    search.” Moreover, Kolsuz contended, the rationales justifying the border exception were
    not implicated in this case, because at the time of the search there was no prospect that
    either he or his phone – both securely in government custody – would be crossing the
    9
    border. Instead, Kolsuz argued, the forensic search should be treated as a search incident
    to his arrest, and under Riley v. California, cell phones may be searched incident to arrest
    only with a warrant based on probable cause.
    In a comprehensively reasoned opinion, the district court denied Kolsuz’s
    suppression motion. United States v. Kolsuz, 
    185 F. Supp. 3d 843
    , 860 (E.D. Va. 2016).
    The court held first that the forensic search of Kolsuz’s phone was properly evaluated as
    a border search. That Kolsuz had been arrested, the district court explained, did not
    transform the forensic examination into a search incident to arrest or render the border
    exception inapplicable; both the Fourth Circuit and other courts have held that a border
    search may be conducted after a traveler is arrested and no longer in a position to cross
    the border. 
    Id. at 851
    (citing United States v. Ickes, 
    393 F.3d 501
    , 507 (4th Cir. 2005)).
    Similarly, the court found, it is well established that a search initiated at the border may
    fall under the border exception even if it ultimately is conducted off-site and over a long
    period of time. 
    Id. at 851
    –52.
    Now applying the border exception, the district court went on to consider whether
    the forensic search of Kolsuz’s smartphone was a routine border search, subject to no
    Fourth Amendment requirements, or whether, as Kolsuz urged, it was a nonroutine
    search that required some degree of individualized suspicion. The court acknowledged
    that in Ickes, the Fourth Circuit treated as routine a border inspection of a computer’s
    contents, accessed manually “in the same way a typical user would” and without any
    “sophisticated forensic analysis.” 
    Id. at 853
    (citing 
    Ickes, 393 F.3d at 502
    –03). But that
    decision, the court determined, “does not address whether more sophisticated forensic
    10
    searches” also may be classified as routine, 
    id. at 854,
    particularly in light of the Supreme
    Court’s subsequent decision in Riley and its emphasis on the significant privacy interests
    in the digital contents of phones.
    The court concluded that while the manual search of Kolsuz’s iPhone at the airport
    was a routine border search, 2 the off-site forensic analysis of the phone’s data qualified as
    a nonroutine search. After Riley, the court found, a forensic search of a phone no longer
    can be analogized to an ordinary search of luggage or some other container at the border,
    given the breadth and sensitivity of the private information that may be uncovered. It is
    “difficult to conceive of a property search more invasive or intrusive than a sophisticated,
    digital search of a cell phone,” the court concluded, which might be compared to a “body
    cavity search” of a phone. 
    Id. at 856
    (quoting United States v. Saboonchi, 
    990 F. Supp. 2d
    536, 569 (D. Md. 2014)).
    As a nonroutine border search, the court went on to hold, the forensic analysis of
    Kolsuz’s phone required particularized suspicion, in the form of the familiar reasonable
    suspicion standard. The court rejected the more demanding requirement of a warrant
    based on probable cause, noting that no reported case has held a border search to that
    standard. Instead, courts consistently have deemed reasonable suspicion sufficient to
    2
    Although the district court addressed this initial search in the course of its
    reasoning, Kolsuz’s suppression motion is limited to the subsequent forensic
    examination. On appeal, Kolsuz expressly disclaims any challenge to the manual search
    of his phone at Dulles, which in any event did not reveal information used against him at
    trial.
    11
    justify even the most intrusive of nonroutine border searches, including body cavity and
    alimentary canal searches.     Because the government in this case had “more than
    reasonable suspicion” that a forensic examination of Kolsuz’s phone would reveal
    evidence of both past and ongoing attempts to export firearms parts illegally, the court
    concluded, the forensic search was reasonable under the Fourth Amendment. 
    Id. at 859,
    860.
    The parties consented to a bench trial, and the district court found Kolsuz guilty of
    all three counts against him. In finding that Kolsuz acted with the requisite willfulness,
    the court relied in part on messages Kolsuz exchanged with a co-conspirator, obtained
    from the forensic search of Kolsuz’s phone. 3 The court ultimately entered judgment only
    on the Arms Export Control Act and conspiracy counts against Kolsuz, dismissing the
    smuggling charge on the government’s motion. Kolsuz was sentenced to 30 months in
    prison and three years of supervised release, and this timely appeal followed.
    II.
    Kolsuz’s appeal is a narrow one, and we begin by clarifying what is and is not in
    front of us today. First, Kolsuz does not challenge the manual search of his smartphone,
    undertaken on-site at the airport as he tried to depart for Turkey. We thus have no
    3
    The court also adopted an independent willful blindness theory, under which it
    was “unnecessary to rely” on the messages recovered from Kolsuz’s phone. J.A. 243
    n.34. As the government recognizes, however, that theory does not apply to the
    conspiracy charge of which Kolsuz was convicted, and thus does not provide an
    alternative basis for affirming the district court judgment in full.
    12
    occasion to consider application of the border exception to manual searches of electronic
    devices, conducted at the border and roughly contemporaneously with an attempted
    crossing.   Cf. United States v. Molina-Isidoro, 
    884 F.3d 287
    , 289 (5th Cir. 2018)
    (sustaining manual search of phone at border under good-faith exception to Fourth
    Amendment exclusionary rule).
    Nor does Kolsuz challenge the seizure of his phone, either initially at the airport or
    later at the Homeland Security Investigations office where it was forensically examined.
    The Fourth Amendment protects property as well as privacy, see 
    Flores-Montano, 541 U.S. at 154
    , and a seizure reasonable at its inception must remain reasonable in scope and
    duration to satisfy the Fourth Amendment, see Montoya de 
    Hernandez, 473 U.S. at 541
    –
    42. But perhaps because he was in custody while the government undertook its month-
    long forensic analysis, Kolsuz has not asserted any impairment of a possessory interest in
    his phone. Accordingly, we do not address whether and under what circumstances an
    extended confiscation of a traveler’s phone – quite apart from any search undertaken –
    might constitute an unreasonable seizure of property for Fourth Amendment purposes.
    Cf. Saboonchi, 
    990 F. Supp. 2d
    at 569 (noting that forensic searches of digital devices
    may deprive individuals of their possessions for periods of days or weeks).
    That leaves the question that is raised by this appeal: whether the forensic search
    of Kolsuz’s phone, and the associated invasion of Kolsuz’s privacy, was justified under
    the border search exception. In considering the district court’s denial of Kolsuz’s motion
    to suppress, we review that court’s legal conclusions de novo and its factual findings for
    clear error, considering the evidence in the light most favorable to the government. See
    13
    United States v. Palmer, 
    820 F.3d 640
    , 648 (4th Cir. 2016). For the reasons given below,
    we affirm.
    A.
    Kolsuz’s primary argument is that the forensic analysis of his phone was not
    subject to the border search exception at all. Once he was arrested and his phone seized
    and transported miles from the airport, Kolsuz contends, the government interest that
    underlies the border search exception – preventing contraband from crossing a border –
    was no longer at issue, and the border exception was therefore inapplicable. Rather,
    standard Fourth Amendment rules governed the forensic search, and required a warrant
    based on probable cause because the search was incident to Kolsuz’s arrest. See 
    Riley, 134 S. Ct. at 2485
    , 2493–94 (holding that the search incident exception does not apply to
    cell phones, which generally may be searched incident to arrest only with probable cause
    and a warrant). We cannot agree.
    First, as the district court explained, the border exception is not rendered
    inapplicable because a search initiated at a border ultimately is conducted at some
    physical or temporal remove. See 
    Kolsuz, 185 F. Supp. 3d at 851
    –52 (“as several courts
    have held, an off-site forensic search of an electronic device over a long period of time is
    nonetheless a border search”); see also, e.g., United States v. Cotterman, 
    709 F.3d 952
    ,
    961–62 (9th Cir. 2013) (en banc) (applying border exception to forensic examination of
    laptop computer conducted miles from and days after attempted border crossing);
    Saboonchi, 
    990 F. Supp. 2d
    at 548–49, 561 (applying border exception to forensic search
    of cell phones conducted several hundred miles from border crossing). Indeed, after
    14
    pressing this point before the district court, Kolsuz concedes it on appeal, agreeing that
    the location and timing of the search in this case are consistent with the border search
    exception.
    Nor, as the district court determined, does the fact of Kolsuz’s arrest transform the
    examination of his phone into a search incident to arrest, triggering Riley and calling for a
    search warrant based on probable cause. In Ickes, our court applied the border search
    exception to approve a manual search of computer data that occurred only after the
    defendant had been arrested, obviating any threat of an imminent border crossing. 
    See 393 F.3d at 503
    ; see also, e.g., United States v. Ramos, 
    190 F. Supp. 3d 992
    , 998–1000
    (S.D. Cal. 2016) (rejecting argument that arrest renders border exception inapplicable by
    making it impossible for defendant or contraband to cross border). Kolsuz attempts to
    distinguish Ickes on the ground that it involved an entry search rather than the exit search
    at issue here, but for these purposes, it makes no difference: As we have explained,
    where the relevant governmental interests are present, the border search exception
    extends equally to entry and exit searches, see 
    Oriakhi, 57 F.3d at 1296
    –97, and any rule
    carving out post-arrest searches from that doctrine would apply equally in both contexts,
    as well.
    In its strongest form, Kolsuz’s argument combines all of these factors – his arrest
    as he sought to depart the country, the phone in government custody miles from the
    border, the month-long gap between the action at the airport and the end of the search –
    and argues that taken together, they show that the search in this case is entirely
    “untethered” from any justification behind the border exception. The rationale allowing
    15
    outgoing border searches, as Kolsuz describes it, is limited to intercepting contraband as
    it crosses the national border. Here, with the phone as well as the firearms parts seized
    by the government and Kolsuz under arrest, there was no contraband poised to exit the
    country and thus no nexus to that rationale. When that is the case, Kolsuz argues, the
    border search exception does not apply, because the concerns underlying a warrant
    exception “define the boundaries of the exception.” See 
    Gant, 566 U.S. at 339
    .
    Kolsuz’s foundational premise is correct: As a general rule, the scope of a warrant
    exception should be defined by its justifications. See 
    Riley, 134 S. Ct. at 2484
    –88 (asking
    whether “application of the search incident to arrest doctrine to this particular category of
    effects would untether the rule from the justifications underlying the [search incident to
    arrest] exception”). As a result, where the government interests underlying a Fourth
    Amendment exception are not implicated by a certain type of search, and where the
    individual’s privacy interests outweigh any ancillary governmental interests, the
    government must obtain a warrant based on probable cause. See 
    id. At some
    point, in
    other words, even a search initiated at the border could become so attenuated from the
    rationale for the border search exception that it no longer would fall under that exception.
    See 
    Molina-Isidoro, 884 F.3d at 295
    –97 (Costa, J., concurring) (questioning whether
    search for evidence as opposed to contraband is consistent with justifications for border
    search exception).
    But this is not that case. On the facts here, the link between the search of Kolsuz’s
    phone and the interest that justifies border searches was sufficient to trigger the border
    exception on any account of a “nexus” requirement. Government agents forensically
    16
    searched Kolsuz’s phone because they had reason to believe – and good reason to
    believe, in the form of two suitcases filled with firearms parts – that Kolsuz was
    attempting to export firearms illegally and without a license. See 
    Kolsuz, 185 F. Supp. 3d at 859
    –60. That is a transnational offense that goes to the heart of the border search
    exception, which rests in part on “the sovereign interest of protecting and monitoring
    exports from the country.” See 
    Oriakhi, 57 F.3d at 1297
    ; see also 
    Boumelhem, 339 F.3d at 423
    (holding that exit search for firearms implicates “significant government interests”
    not only in controlling exports but also in national security). This is not a case, in other
    words, in which the government invokes the border exception on behalf of its generalized
    interest in law enforcement and combatting crime. Cf. United States v. Vergara, 
    884 F.3d 1309
    , 1317 (11th Cir. 2018) (Jill Pryor, J., dissenting) (relying on “general law
    enforcement justification” to approve evidentiary border searches would “untether the
    [border search exception] from its justifications”). Here, there is a direct link between the
    predicate for the search and the rationale for the border exception.
    Moreover, as the district court explained, the agents who searched Kolsuz’s phone
    reasonably believed that their search would reveal not only evidence of the export
    violation they already had detected, but also “information related to other ongoing
    attempts to export illegally various firearms parts.” 
    Kolsuz, 185 F. Supp. 3d at 860
    . The
    government emphasizes that finding – not contested by Kolsuz – in its argument before
    us, and properly so. The justification behind the border search exception is broad enough
    to accommodate not only the direct interception of contraband as it crosses the border,
    but also the prevention and disruption of ongoing efforts to export contraband illegally,
    17
    through searches initiated at the border. See, e.g., 
    Ramos, 190 F. Supp. 3d at 999
    (approving post-arrest “investigatory” border search of cell phone for information about
    larger smuggling organization and “more contraband entering into the country at that
    time”); United States v. Mendez, 
    240 F. Supp. 3d 1005
    , 1007–10 (D. Ariz. 2017)
    (approving post-arrest border search of cell phone for evidence of additional contraband
    entering country); cf. United States v. Kim, 
    103 F. Supp. 3d 32
    , 44, 46, 59 (D.D.C. 2015)
    (holding unreasonable forensic search of laptop at border where search was expected to
    reveal evidence of past but not ongoing criminal activity).
    In the circumstances presented here, we agree with the government’s bottom line:
    Because the forensic search of Kolsuz’s phone was conducted at least in part to uncover
    information about an ongoing transnational crime – in particular, information about
    additional illegal firearms exports already underway, by freight or in the custody of a
    coconspirator, see 
    Kolsuz, 185 F. Supp. 3d at 860
    – it “fits within the core of the
    rationale” underlying the border search exception. Brief of United States at 19–20.
    B.
    Most of Kolsuz’s appeal is devoted to his argument against application of the
    border exception. But Kolsuz has a fallback position, as well: Even under the border
    exception, Kolsuz contends, the forensic search of his phone constituted a nonroutine
    border search “unsupported by the type of reasonable suspicion required to justify” such
    searches. Defendant’s Brief at 31. Again, we disagree.
    18
    1.
    Like the district court, we begin by considering the first premise of Kolsuz’s
    argument: that the forensic search of his cell-phone data qualifies as a nonroutine border
    search, requiring some level of particularized suspicion. We agree with the district court
    that particularly in light of the Supreme Court’s decision in Riley, a forensic border
    search of a phone must be treated as nonroutine, permissible only on a showing of
    individualized suspicion. See 
    Kolsuz, 185 F. Supp. 3d at 852
    –58.
    As described above, the Supreme Court has held that even at the border,
    individualized suspicion is necessary to justify certain “highly intrusive searches,” in
    light of the significance of the individual “dignity and privacy interests” infringed.
    
    Flores-Montano, 541 U.S. at 152
    . Beyond that general guidance, the Court has not
    delineated precisely what makes a search nonroutine. Compare 
    id. at 155
    (removal and
    disassembly of car’s gas tank does not qualify as nonroutine border search) with Montoya
    de 
    Hernandez, 473 U.S. at 541
    –42 (16-hour detention for monitored bowel movement
    pending rectal examination is nonroutine). But as the district court ably explains, in
    deciding whether a search rises to the level of nonroutine, courts have focused primarily
    on how deeply it intrudes into a person’s privacy. 
    Kolsuz, 185 F. Supp. 3d at 853
    . Under
    that approach, border searches of luggage, outer clothing, and personal effects
    consistently are treated as routine, while searches that are most invasive of privacy – strip
    searches, alimentary-canal searches, x-rays, and the like – are deemed nonroutine and
    permitted only with reasonable suspicion. See 
    id. at 853
    & n.14 (citing cases).
    19
    By that metric, even before the Supreme Court issued its 2014 decision in Riley,
    there was a convincing case for categorizing forensic searches of digital devices as
    nonroutine. See 
    Cotterman, 709 F.3d at 963
    –68 (holding that forensic examination of
    computer is nonroutine border search requiring reasonable suspicion); Saboonchi, 990 F.
    Supp. 2d at 549–60 (same as to smartphones and flash drives). First is the matter of
    scale: The sheer quantity of data stored on smartphones and other digital devices dwarfs
    the amount of personal information that can be carried over a border – and thus subjected
    to a routine border search – in luggage or a car. “The average 400-gigabyte laptop hard
    drive can store over 200 million pages. . . . Even a car full of packed suitcases with
    sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of
    digital storage.” 
    Cotterman, 709 F.3d at 964
    . Subjected to comprehensive forensic
    analysis, a digital device can reveal an unparalleled breadth of private information.
    The uniquely sensitive nature of that information matters, as well. Smartphones
    and laptops “contain the most intimate details of our lives: financial records, confidential
    business documents, medical records and private emails,” 
    id., and also
    may provide
    access to data stored remotely, 
    id. at 965.
    4 The report generated by the month-long
    logical file system extraction of data from Kolsuz’s phone is a case in point, revealing
    896 pages’ worth of sensitive data including personal contacts, photographs, web
    4
    The forensic search of Kolsuz’s phone, which remained in airplane mode
    throughout, did not extend to information stored remotely (“in the cloud”), nor to residual
    data of files that had been deleted by Kolsuz. 
    Kolsuz, 185 F. Supp. 3d at 849
    & n.8. Like
    the district court, however, we decline “to distinguish an extensive forensic search of a
    cell phone from a very extensive forensic search of a cell phone.” 
    Id. at 857.
    20
    browsing history, and a “history of [Kolsuz’s] physical location down to precise GPS
    coordinates,” J.A. 94 – the kind of information that, analyzed cumulatively, “generates a
    precise, comprehensive record of a person’s public movements that reflects a wealth of
    detail about her familial, political, professional, religious and sexual associations.” See
    United States v. Jones, 
    565 U.S. 400
    , 415 (2012) (Sotomayor, J., concurring). And
    finally, while an international traveler can mitigate the intrusion occasioned by a routine
    luggage search by leaving behind her diaries, photographs, and other especially personal
    effects, the same is not true, at least practically speaking, when it comes to smartphones
    and digital devices. Portable electronic devices are ubiquitous – for many, the most
    reliable means of contact when abroad – and it is neither “realistic nor reasonable to
    expect the average traveler to leave his digital devices at home when traveling.”
    Saboonchi, 
    990 F. Supp. 2d
    at 556.
    And then came Riley, in which the Supreme Court confirmed every particular of
    that assessment. Riley holds that the search incident to arrest exception, which allows for
    automatic searches of personal effects in the possession of an arrestee, does not apply to
    manual searches of cell 
    phones. 134 S. Ct. at 2493
    –94. The key to Riley’s reasoning is
    its express refusal to treat such phones as just another form of container, like the wallets,
    bags, address books, and diaries covered by the search incident exception. See 
    id. at 2488–90.
       Instead, Riley insists, cell phones are fundamentally different “in both a
    quantitative and a qualitative sense” from other objects traditionally subject to
    government searches. 
    Id. at 2489.
    And that is so, Riley explains, for precisely the
    reasons already identified by cases treating border searches of digital devices as
    21
    nonroutine: the “immense storage capacity” of cell phones, putting a vastly larger array
    of information at risk of exposure, id.; the special sensitivity of the kinds of information
    that may be stored on a phone, such as browsing history and historical location data, 
    id. at 2490;
    and, finally, the “element of pervasiveness that characterizes cell phones,” 
    id., making them
    an “insistent part of daily life,” 
    id. at 2484.
    After Riley, we think it is clear that a forensic search of a digital phone must be
    treated as a nonroutine border search, requiring some form of individualized suspicion.
    See 
    Kolsuz, 185 F. Supp. 3d at 858
    ; see also United States v. Saboonchi, 
    48 F. Supp. 3d 815
    , 819 (D. Md. 2014) (“Saboonchi II”) (discussing ways in which Riley confirms prior
    holding that border searches of digital devices are nonroutine). Indeed, the impact of
    Riley is plain enough that the government’s brief does not seriously contest this point,
    focusing instead on the argument (which we next address) that nonroutine or not, the
    search of Kolsuz’s phone was justified under the border exception. 5 We also note that
    shortly after argument in this case, the Department of Homeland Security adopted a
    policy that treats forensic searches of digital devices as nonroutine border searches,
    insofar as such searches now may be conducted only with reasonable suspicion of
    5
    The government does note that in 
    Ickes, 393 F.3d at 505
    –07, our court treated a
    search of a computer as a routine border search, requiring no individualized suspicion for
    the search. But as the district court explained, Ickes approved a manual, on-site
    inspection of computer contents that would be accessible to any user, and did not address
    the use of the sophisticated forensic search methods at issue here. Kolsuz, 
    185 F. Supp. 3d
    at 853–54; see also Saboonchi, 
    990 F. Supp. 2d
    at 546 (distinguishing Ickes on same
    ground). Because Kolsuz does not challenge the initial manual search of his phone at
    Dulles, we have no occasion here to consider whether Riley calls into question the
    permissibility of suspicionless manual searches of digital devices at the border.
    22
    activity that violates the customs laws or in cases raising national security concerns. U.S.
    Customs and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic
    Devices 5 (2018). That the agency has chosen to adopt these requirements, of course,
    does not establish that they are constitutionally mandated. Cf. 
    Ickes, 393 F.3d at 507
    (distinguishing between agency practice and constitutional requirements). But it does
    suggest, as courts have anticipated, that the distinction between manual and forensic
    searches is a perfectly manageable one, see 
    Cotterman, 709 F.3d at 967
    (categorizing
    forensic searches as nonroutine requires only “that officers make a commonsense
    differentiation between a manual review of files on an electronic device and application
    of computer software to analyze a hard drive”), and that treating forensic phone searches
    as nonroutine need not interfere unduly with the agency’s protective mission at the
    border, see Saboonchi, 
    990 F. Supp. 2d
    at 570. 6
    2.
    That the forensic analysis of Kolsuz’s phone data qualifies as a nonroutine border
    search does not resolve this case. Nonroutine searches are permitted under the border
    6
    The new policy does not use the “routine” and “nonroutine” terminology of
    Supreme Court case law, distinguishing instead between “basic” and “advanced”
    searches. But the import is the same. “Basic” searches (like those we term “manual”) are
    examinations of an electronic device that do not entail the use of external equipment or
    software and may be conducted without suspicion. “Advanced” searches (like “forensic”
    searches) involve the connection of external equipment to a device – such as the
    Cellebrite Physical Analyzer used on Kolsuz’s phone – in order to review, copy, or
    analyze its contents, and are subject to the restrictions noted above. See U.S. Customs
    and Border Prot., CBP Directive No. 3340-049A, Border Search of Electronic Devices 4–
    5 (2018); 
    Molina-Isidoro, 884 F.3d at 294
    & n.2 (Costa, J., concurring).
    23
    exception, so long as they are accompanied by the appropriate level of individualized
    suspicion. See Montoya de 
    Hernandez, 473 U.S. at 540
    –41 & n.4.
    The district court concluded that under the border exception, the “highest level of
    Fourth Amendment protection available” is the reasonable suspicion standard, which was
    met in this case. 7 
    Kolsuz, 185 F. Supp. 3d at 858
    –59. As the district court explained,
    courts consistently have required only reasonable suspicion even when reviewing the
    most intrusive of nonroutine border searches and seizures – like, for instance, the one at
    issue in Montoya de Hernandez, in which the Supreme Court held that with reasonable
    suspicion, the government could detain a traveler thought to be smuggling contraband in
    her alimentary canal for 16 hours while it monitored her bowel movements and sought a
    court order for a rectal examination. 
    Id. at 852–53,
    858–59.
    Of course, certain searches conducted under exceptions to the warrant requirement
    may require more than reasonable suspicion. See, e.g., California v. Carney, 
    471 U.S. 386
    , 393–95 (1985) (holding that automobile exception to the Fourth Amendment
    permits a warrantless search of a motor home if based on probable cause). Perhaps the
    7
    Kolsuz also argues that even if the search of his phone could be justified by
    reasonable suspicion, what would be required is reasonable suspicion that contraband, as
    opposed to evidence, would be found on the device. Otherwise, according to Kolsuz, the
    search would be “untethered” from the constitutional justification for border searches:
    the interception of contraband as it crosses the border. If this argument sounds familiar,
    that is because it is a reformulation of Kolsuz’s threshold argument against any
    application of the border exception to this case, addressed above. And for essentially the
    reasons already given, we cannot agree. The district court found – and Kolsuz does not
    dispute – that the agents here had reason to believe that their search of Kolsuz’s phone
    would reveal not only evidence of past export-control violations, but also evidence of
    ongoing efforts to smuggle firearms over the border. 
    Kolsuz, 185 F. Supp. 3d at 860
    .
    That is enough to “tether” the search to the rationale behind the border exception.
    24
    same is true of some nonroutine border searches, as Kolsuz argues, but we need not
    resolve that question here. As the government reminds us, even if a search is judged to
    be constitutionally flawed in some way, its fruits need not be suppressed if the agents
    acted “in reasonable reliance on binding precedent.” Davis v. United States, 
    564 U.S. 229
    , 241 (2011); see United States v. Baker, 
    719 F.3d 313
    , 320–21 (4th Cir. 2013)
    (describing Davis). In such circumstances, suppression can do little to deter police
    misconduct, and the “social costs” of suppression – the exclusion from trial of reliable
    evidence bearing on guilt or innocence – outweigh any deterrence benefits. 
    Davis, 564 U.S. at 237
    –38.
    At the time the CBP officers conducted their forensic search of Kolsuz’s phone,
    there was at least some case law indicating that reasonable suspicion might be required.
    See Kolsuz, 
    185 F. Supp. 3d
    at 855–58 (discussing cases). But there was no case
    suggesting that even more would be necessary – for a forensic search of a phone at the
    border or, indeed, for any border search, no matter how nonroutine or invasive. And that
    remains the case today: Even as Riley has become familiar law, there are no cases
    requiring more than reasonable suspicion for forensic cell phone searches at the border.
    But see 
    Vergara, 884 F.3d at 1313
    –19 (Jill Pryor, J., dissenting) (after Riley, forensic
    search of phone is not subject to border search exception and therefore requires warrant
    based on probable cause).
    Under these circumstances, we think it was reasonable for the CBP officers who
    conducted the forensic analysis of Kolsuz’s phone to rely on the established and uniform
    body of precedent allowing warrantless border searches of digital devices that are based
    25
    on at least reasonable suspicion. See 
    Molina-Isidoro, 884 F.3d at 293
    (applying good-
    faith exception to warrantless manual search of phone at border). Under Davis’s “good-
    faith” exception to the Fourth Amendment exclusionary rule, that reasonable reliance by
    itself is enough to bar suppression of the evidence generated by the search. See 
    Baker, 719 F.3d at 321
    . Accordingly, we need not – and will not – reach the issue of whether
    more than reasonable suspicion is required for a search of this nature in affirming the
    judgment of the district court.     See 
    Molina-Isidoro, 884 F.3d at 294
    (Costa, J.,
    concurring) (reliance on good-faith exception particularly appropriate in area of rapid
    legal and technological change).
    III.
    For the reasons given above, the judgment of the district court is
    AFFIRMED
    26
    WILKINSON, Circuit Judge, concurring in the judgment:
    I thank the majority for its thoughtful opinion. While I agree with much of what is
    said, my point of departure is quite basic. The majority appears to leave the legislative
    and executive branches shivering in the cold. Those branches have a critical role to play
    in defining the standards for a border search, and they are much better equipped than we
    are to appreciate both the privacy interests at stake and the magnitude of the practical
    risks involved.
    The standard of reasonableness in the particular context of a border search should
    be principally a legislative question, not a judicial one. Congress should decide that
    standard. Courts should apply it. This is a separation of powers approach that makes use
    of the respective capabilities of all three branches of government, not just one.
    The infirmity of a constitutional rule in the unique context of a border search is
    clear. Such a rule claims for courts the sole prerogative to set standards in an area where
    legislative inquiry would be invaluable and where the executive maintains a strong
    sovereign interest. Diminishing the other two branches flirts with real-life dangers. The
    whole enterprise calls for the greatest caution and circumspection, not premature
    declarations of constitutional rules.
    If individualized suspicion is to be required in order to conduct what the majority
    asserts is a “nonroutine border search,” Maj. Op. at 4, then Congress must say so. And in
    all events, there was plainly reasonable suspicion to conduct the search here. The
    majority should have stopped right there. Assuming without deciding that reasonable
    suspicion was even required, it is present here in triplicate.
    27
    Instead my colleagues wander from what Article III indisputably envisions as the
    core role of courts: simply to decide a case or controversy. The majority turns
    prescriptive, but the pronouncement here is too abstract and floats too far above the
    realities at the border.
    Lethal capabilities are advancing at a rapid pace. Detection of destructive devices
    is becoming more difficult. Nation states, terrorist bands, and individual arms merchants
    see profit and prestige and power in joining the arms race. Might we wish to hear in a
    manner more probing than appellate briefs and oral argument exactly what are the
    dimensions of the threats we face? What makes us think the elective branches would
    downgrade the significant privacy interests the majority rightly identifies? Might the
    other two branches, if given a fair chance, have something to say? And do not Articles I
    and II, which set forth the legislative and executive roles in matters of grave international
    import, give them the right to say it? Who are we to propound the idea that democratic
    bodies, where Fourth Amendment reasonableness is concerned, have nothing to
    contribute?
    Alarmist? Hyperbolic? Perhaps. But if we so limit the role of our coordinate
    branches with a constitutional ruling, how shall we ever know?
    I.
    The majority fairly recounts the facts here, and they are straightforward and
    incriminating. Before his arrest at Dulles airport, Customs and Border Protection (CBP)
    agents had twice stopped Kolsuz, a Turkish national, at JFK airport for carrying
    contraband firearms parts proscribed by statute. See 22 U.S.C. § 2278. On both
    28
    occasions, Kolsuz failed to produce the license required to export those parts. Both times,
    CBP agents informed Kolsuz that he needed a license to export those items.
    Kolsuz reentered the United States on January 25, 2016, on a tourist visa. He again
    purchased numerous gun parts. Law enforcement officials who were familiar with
    Kolsuz’s previous attempts to export contraband firearms asked CBP to search Kolsuz’s
    bags when he tried to return to Turkey. When Kolsuz arrived at Dulles, CBP searched his
    bags. The inspection revealed eighteen handgun barrels, twenty-two 9 mm handgun
    magazines, four .45 caliber handgun magazines, and one .22 caliber Glock conversion
    kit. All of these firearms parts are restricted items on the U.S. Munitions List. At no time
    did Kolsuz have permission to export them. Based on Kolsuz’s previous attempts to bring
    firearm parts out of the country, CBP had ample reason to suspect that Kolsuz might
    again try to export firearms.
    Following the search of Kolsuz’s bags, CBP officers interrogated Kolsuz and
    performed a cursory inspection of his iPhone. At the end of the interrogation, Kolsuz was
    arrested and his iPhone seized. At that point, his iPhone was transported to Sterling,
    Virginia, where federal law enforcement conducted an “advanced logical file system
    extraction” of the iPhone. This extraction, as the majority notes, generated an 896-page
    report on the information contained in the phone.
    II.
    This was plainly a border search. See Maj. Op. at 18. Assuming reasonable
    suspicion of Kolsuz’s criminal activity is somehow required, it clearly existed here. We
    need go no further. Rather than deciding the case on solid and suitably limited grounds,
    29
    the majority goes on to prescribe a constitutional standard whose rationale would label a
    great many cell phone searches undertaken at the border as “nonroutine” and forbidden
    absent prior individualized suspicion.
    While the majority purports not to reach the question of the justification required
    for the manual search of Kolsuz’s cell phone at Dulles airport, see Maj. Op. at 22 n.5, the
    rhetorical thrust of its opinion as concerns cell phones and smartphones may be read by
    many courts to require individualized suspicion for border searches of all cell phones
    period. Or if the majority intends a less sweeping standard, the slipperiness of the
    distinction between intrusive and less intrusive cell phone searches and between those
    that are routine and those that are nonroutine will lead, I fear, to difficulties in application
    down the road. While the majority’s constitutional venture may be correct, it also may
    well not be. Again, we are not the ones to set the standard.
    We are, each of us, in over our heads. We have no idea of the dangers we are
    courting. JFK and Dulles are quintessential border posts. See Almeida-Sanchez v. United
    States, 
    413 U.S. 266
    , 273 (1973). Thousands of international travelers go through them
    every day. Yet the majority hardly grapples with how law enforcement is expected to
    ascertain individualized suspicion when dealing with such numbers. The privacy interest,
    while weighty, is the only side of a precarious balance that seems to concern the majority,
    and this in the application of the Fourth Amendment, which articulates reasonableness
    and hence balance as a standard. See Katz v. United States, 
    389 U.S. 347
    , 360 (1967).
    One would hope that rather than charging unnecessarily ahead, the majority would
    recognize the need for congressional input, which the enunciation of constitutional
    30
    standards makes more difficult. Constitutional standards are preemptive. They sweep all
    other pieces off the board. Judicially promulgated constitutional standards say essentially,
    “That’s that. The Constitution is the highest law, and the judiciary shall be its sole
    guardian.”
    Empirical questions lie at the heart of the tension between privacy and security
    interests at the border. How many people travel through international airports every day?
    What screening techniques and investigative resources does government have available?
    What materials are being smuggled in and out, and by whom? What practical obstacles
    exist to individualized findings? What, in other words, is the magnitude of danger courted
    by progressive step-ups of search requirements?
    The limited glimpse from a single case does no more than beg the question: What
    is the reality of it all? This is why any Fourth Amendment standard is best designed here
    through the more adaptable legislative process and the wider lens of legislative hearings.
    See Riley v. California, 
    134 S. Ct. 2473
    , 2497-98 (2014) (Alito, J., concurring in the
    judgment) (“Legislatures, elected by the people, are in a better position than we are to
    assess and respond to the changes that have already occurred and those that almost
    certainly will take place in the future.”). For “[a]s new technologies continue to appear in
    the marketplace and outpace existing surveillance law, the primary job of evaluating their
    impact on privacy rights and of updating the law must remain with the branch of
    government designed to make such policy choices, the legislature.” In re Askin, 
    47 F.3d 100
    , 106 (4th Cir. 1995).
    31
    The majority contends that the “Department of Homeland Security adopted a
    policy that treats forensic searches of digital devices as nonroutine border searches.” Maj.
    Op. at 22. I think the document is more complex than this, but in all events, it proves my
    point—that in this narrow area agency policy born of actual and ongoing experience is
    more adaptable than a freeze-frame constitutional ruling.
    Courts too often assume Congress is desensitized to the need for privacy
    protections. This does lawmakers a disservice. Congress has long sought to strike a
    balance between privacy and security in the context of digital searches. See, e.g., USA
    Freedom Act of 2015, Pub. L. No. 114-23, 129 Stat. 268 (limiting government
    surveillance of telephone records); 18 U.S.C. §§ 2510-22 (2012) (limiting the
    government’s ability to monitor electronic communications); Orin S. Kerr, The Effect of
    Legislation on Fourth Amendment Protection, 
    115 Mich. L
    . Rev. 1117, 1120 (2017)
    (observing “the recent enactment of more and stronger statutory privacy laws” by federal
    and state legislatures in the past five years). And, though of course not directly relevant in
    the context of a federal border search, states have historically also protected Fourth
    Amendment privacy rights. See Kerr, 
    115 Mich. L
    . Rev. at 1120 (documenting state
    statutes limiting the use of digital searches).
    It is sometimes said in non-border search cases that the judiciary does no more
    than provide “a floor” which Congress can exceed at its discretion. See, e.g., Kelsey v.
    Cty. of Schoharie, 
    567 F.3d 54
    , 64 (2d Cir. 2009); Graves v. Mahoning Cty., 
    821 F.3d 772
    , 778 (6th Cir. 2016). But the so-called floor in this case is not some innocuous
    minimum, but a hugely consequential policy judgment that certain categories of border
    32
    searches will require individualized suspicion. The fact that Congress has not thus far
    seen fit to adopt a court’s preferred standard gives us no license to act preemptively with
    an unnecessary constitutional disquisition. The dangers of this notion are underscored by
    the majority’s reservation here of the question whether probable cause or a warrant may
    be required for some unspecified categories of border searches in the future. See Maj. Op.
    at 24-25. This does not sound like any sort of “floor” at all.
    The dangers of judicial standard-setting in an area as sensitive as border searches
    is thus apparent. Here the legislative process would be informed by numerous
    representatives of the executive branch, who can lend their practical insights and
    experience to the inquiry. The executive’s role has always been thought especially
    important in an area such as border searches, where it has long been held to have a
    uniquely sovereign interest. The border search exception to the Fourth Amendment’s
    warrant requirement is based on the “longstanding right of the sovereign to protect itself
    by stopping and examining persons and property crossing into this country.” United
    States v. Ramsey, 
    431 U.S. 606
    , 616 (1977). As the Supreme Court has explained, “[t]he
    Government’s interest in preventing the entry of unwanted persons and effects is at its
    zenith at the international border.” See United States v. Flores-Montano, 
    541 U.S. 149
    ,
    152 (2004). That interest is so powerful that border searches “are reasonable simply by
    virtue of the fact that they occur at the border.” 
    Ramsey, 431 U.S. at 616
    .
    The role of courts is thus not to blanket the field of border searches by preempting
    constitutionally the contributions that the other two branches of our government are
    constitutionally empowered and uniquely positioned to make. Marbury v. Madison did of
    33
    course say that it is “emphatically the province and duty of the judicial department to say
    what the law is.” 5 U.S. (1 Cranch) 137, 177 (1803). But that is a very different
    proposition from holding that constitutional interpretation must be solely a judicial
    function. Indeed “the general architecture of [the Constitution] would seem to imply a
    basic coequality among the three departments. . . . [I]t nowhere explicitly raises the Court
    above coordinate legislative and executive departments.” Akhil Reed Amar, Architecture,
    77 Ind. L.J. 671, 692-93 (2002). This is not a new idea. James Madison wrote that “none
    of [the three branches of government] ought to possess, directly or indirectly, an
    overruling influence over the others in the administration of their respective powers.” The
    Federalist No. 48 (James Madison). But it is precisely that “overruling influence” the
    majority asserts in its unnecessary constitutional exercise today.
    III.
    The general search that all of us must undergo at airports attests to the difficulties
    of ensuring airborne security through individualized suspicion. Our new world has
    brought inconvenience and intrusions on an indiscriminate basis, which none of us
    welcome, but which most of us undergo in the interest of assuring a larger common good.
    Our old world of relative security and relative privacy, if indeed it ever existed, is now
    gone with the wind. It is painful to dream of retrieving what is ours no longer.
    The Supreme Court has often noted how technology endangers privacy. As it
    observed in Riley, “[m]odern cell phones, as a category, implicate privacy concerns far
    beyond those implicated by the search of a cigarette pack, a wallet, or a 
    purse.” 134 S. Ct. at 2488-89
    . But Riley involved the warrantless search of a cell phone following an
    34
    ordinary roadside arrest after a traffic violation. The defendant was not at the border. The
    setting here is far different from Riley.
    Nor does the privacy interest recognized in Riley begin to answer the question of
    who should strike the balance between privacy and security at the border of the country,
    the point most freighted with security threats and the point at which a nation asserts and
    affirms its very right to nationhood.
    Porous borders are uniquely tempting to those intent upon inflicting the vivid
    horrors of mass casualties. Then too, there is the danger of highly classified technical
    information being smuggled out of this country only to go into the hands of foreign
    nations who do not wish us well and who seek to build their armaments to an ever more
    perilous state.
    It is no secret that rapid technological advances have enhanced the ability of
    criminal syndicates and terrorist networks to execute transnational schemes through the
    coordination now made possible by instantaneous communications. To give criminal
    enterprises the advantage of technological advancements and at the same time impair
    access of law enforcement to those same developments risks recalibrating the Fourth
    Amendment balance in a manner that does not comport with reasonableness. Cell phones
    may prove essential to revealing the scope of a conspiracy; who is involved; what
    weapons and devices the conspirators possess; what the purpose and plans and timing of
    the plotted criminal acts may be; and where indeed those who would carry out these acts
    may be located.
    35
    But to stop there is to halve the equation. The majority is right to emphasize that
    searches of cell phones and the like can reveal a trove of data unconnected to any
    criminal offense. The intrusion upon personal privacy is undoubtedly severe. One may of
    course say that international travelers are on notice that border inspections may be
    uniquely intrusive, and that travelers can prepare for that prospect by not taking a full
    load of personal data abroad, where additional dangers of theft and inadvertent loss may
    also await. But the fact that we can pack our digital suitcase with the same care that we
    pack personal belongings in traditional luggage still does not nullify the reality that these
    sorts of searches look into our lives in a way that is deeply uncomfortable, especially
    when government itself becomes the agent of intrusion. But the ultimate question here is
    not whether there is a balance to be struck between what are highly significant privacy
    and security interests. It is what branch of government is best suited to make that
    determination. In this case, where there is a longstanding historical practice in border
    searches of deferring to the legislative and executive branches, the majority should have
    shown a modest measure of restraint simply by deciding the case. Our role in this narrow
    area is more the application of standards than the creation of them. In reaching to
    formulate a constitutional rule, the majority has turned the whole thing on its head.
    We are ruling in a vacuum. We are building a doctrinal house without foundation.
    The majority opinion provides little context or background or real-life picture of Dulles
    Airport. It leaves little role for the legislative branch. At what point the domestic
    conveniences of cell phone use should ripen into transnational entitlements is primarily
    for the political branches to determine. The elected branches are also best able to gauge at
    36
    what point the creeping constitutionalization of border searches reflects the cultural
    habits and practices of an elite group of transnational Americans at the risk of
    endangerment that knows no class bounds.
    It is ill advised to ignore the role of the political branches in addressing a
    phenomenon that may fall short of the formal warfare contemplated in Articles I and II,
    but still retains major features of international conflict. To reach beyond the Article III
    function is to court grave dangers which we may perceive as remote and hypothetical
    until one day, very suddenly, they are not. Not that any one case or any one appellate
    court will likely bring down havoc on our heads. In our shielded circumstances, we may
    never know or be apprised of many effects of our decisions. Still it is uncomfortable to
    guess. I have nothing but respect for my friends in the majority. But taken cumulatively,
    rulings slowly constitutionalizing border searches are taking chances with the safety and
    lives of our fellow Americans. And this, as a judge, I cannot do.
    37