United States v. Hassanshahi

Citation75 F.Supp.3d 101
Decision Date01 December 2014
Docket NumberCriminal Action No. 13–0274 RC
CourtU.S. District Court — District of Columbia
PartiesUnited States of America v. Shantia Hassanshahi, also known as Shantia Hassan Shahi, also known as Shahi, also known as Shantia Haas, also known as Sean Haas, and Hasston, Inc., Defendants.

Frederick Walton Yette, U.S. Attorney's Office, Jeffrey Michael Smith, U.S. Department of Justice, Washington, DC, for United States of America.

Mir Saied Kashani, Los Angeles, CA, John Patrick Pierce, Themis PLLC, Washington, DC, for Defendants.

MEMORANDUM OPINION

Re Document No.: 28

RUDOLPH CONTRERAS, United States District Judge

Denying Defendant's Motion to Suppress
I. INTRODUCTION

Defendant Shantia Hassanshahi is charged with one count of conspiracy to violate the International Economic Emergency Powers Act, 50 U.S.C. § 1705, and the Iranian Transactions and Sanctions Regulations, 31 C.F.R. §§ 560.203 –204, commonly referred to as the United States' trade embargo against Iran. Now before the Court is Hassanshahi's motion to suppress evidence uncovered during a forensic examination of his laptop following an international border stop at Los Angeles International Airport on the basis that the laptop examination violated the Fourth Amendment. Upon consideration of Hassanshahi's motion and the opposition thereto, the Court reaches two conclusions: first, the exclusionary rule does not require suppressing the laptop evidence as fruit of the poisonous tree because discovery of that evidence was sufficiently attenuated from the initial unlawful telephone database search; and second, reasonable suspicion existed for conducting the forensic examination after Hassanshahi landed at the airport. Accordingly, the Court will deny Hassanshahi's motion to suppress.

II. FACTUAL BACKGROUND1

On August 16, 2011, Homeland Security Investigations (“HSI”) received an unsolicited e-mail from a source indicating that the source had received an e-mail from an Iranian known as M. Sheikhi who, on behalf of his Iranian company, sought the source's assistance in procuring protection relays for an Iranian power project. See Akronowitz Aff., ECF No. 37–1 (2d Akronowitz Aff.) at ¶ 2. The e-mail from Sheikhi to the source contained an Iranian business telephone number and the address for Sheikhi's company in Tehran, Iran. See id . An HSI agent used the telephone number associated with Sheikhi to search an “HSI-accessible law enforcement database” in the hope of identifying potential U.S.-based targets engaged in the sale or export of protection relays for use in Iran. See id . ¶ 3. The HSI agent's search returned a single telephone record indicating one call between Sheikhi's telephone number and a telephone number with an “818” area code (the “818 number”), which is the area code for Los Angeles, California. See id . ¶ 4.

After discovering that the 818 number was assigned to Google/Google Voice, see id . ¶ 13, HSI prepared and served on Google an Administrative Export Enforcement Control Subpoena (“AEEC Subpoena”). See id . ¶ 14. In response, Google provided information that identified Hassanshahi as the person to whom the 818 number was registered, and Google also provided an e-mail address registered to Hassanshahi.See id . ¶ 15. In addition, Google provided call log information for the period between September 6, 2011, and October 6, 2011, which showed that the 818 number had received one telephone call from an unknown Iranian phone number on October 5, 2011. See id. ; Revised Akronowitz Aff., ECF No. 42–1 (3d Akronowitz Aff.) at ¶ 15. The Google call log information also revealed one missed call between Hassanshahi's 818 number and an unknown Iranian cell phone number on September 19, 2011. See 2d Akronowitz Aff. ¶ 15.

On October 18, 2011, the HSI agent searched the Department of Homeland Security's (“DHS”) TECS database for additional information about Hassanshahi.2 See id . ¶ 16. TECS led the agent to discover that Hassanshahi was involved in a prior federal law enforcement investigation into potential violations of the Iran trade embargo.3 See id. ¶ 16a. Specifically, the investigation occurred in 2003 through an HSI office in California, and the investigation uncovered that Hassanshahi and two partners had established an American company for the purpose of entering into an agreement with a Chinese company to build a computer production facility in Iran. See id . Hassanshahi's American company later filed a breach-of-contract claim against the Chinese company in California state court, and that lawsuit was dismissed in part because the contract was unenforceable as against public policy since it involved doing business in Iran, a clear violation of U.S. law. See id . The Department of Justice did not file criminal charges against Hassanshahi for his role in this venture. See id .

The TECS search also revealed a number of earlier instances in which Hassanshahi reentered the U.S. after traveling to the Middle East, including: an incident in 2005 when Hassanshahi was questioned by U.S. Customs and Border Protection (“CBP”) agents after returning from Dubai with $15,000 in cash; an incident in 2006 when Hassanshahi returned from Tehran with a travel companion; and four other returns from Tehran—two in 2008, one in 2010, and one in May 2011. See id . ¶¶ 16c-e. In addition, HSI learned through TECS that Hassanshahi presently was outside the U.S., so HSI supplemented the existing TECS information by entering instructions that HSI should be alerted and Hassanshahi should be referred for secondary screening the next time he returned to the U.S. See id . ¶ 17.

Around December 20, 2011, HSI served Google with a second AEEC Subpoena, this time seeking subscriber information and recent Internet protocol (“IP”) logs for Hassanshahi's Google e-mail account. See id . ¶ 18. In response, Google provided information indicating that Hassanshahi's e-mail account was accessed from an Iran IP address twenty-four times between December 8, 2011, and December 15, 2011. See id. The information provided by Google also showed, however, that Hassanshahi's e-mail account was accessed from a U.S. IP address on the same day it apparently was accessed from an Iran IP address, including sometimes within just a few minutes of each other. See Def.'s Reply Supp. Mot. Dismiss Ex. 1 at 27 (Google Subscriber Information). And on another occasion, Hassanshahi's e-mail account apparently was accessed on the same day from an Iran IP address, a Germany IP address, and a U.S. IP address, occasionally alternating between the countries within minutes. See id. at 30.

On January 11, 2012, HSI was alerted that Hassanshahi would be returning to the U.S. the next day through Los Angeles International Airport (“LAX”).See 2d Akronowitz Aff. ¶ 19. When Hassanshahi arrived at LAX on January 12, he was referred for secondary screening, at which time CBP agents seized several electronic devices in Hassanshahi's possession—including a laptop computer, multimedia cards, thumb drives, a camcorder, SIM cards, and a cell phone—and sent those devices to the HSI agent in Sterling, Virginia, for further analysis.4 See id. ¶ 20; Arkonowitz Aff., ECF No. 1–1 (“1st Arkonowitz Aff.”) at ¶ 19. When the devices arrived in Virginia a few days later, HSI conducted a forensic examination of the laptop and discovered numerous documents relating to Hassanshahi's apparent business activities in Iran, see 2d Arkonowitz Aff. ¶ 21, including documents showing that in 2009, Hassanshahi, through his company, purchased approximately $6,000,000 in goods that were exported to Armenia and then transshipped to Iran, see 1st Arkonowitz Aff. ¶ 22, as well as a September 5, 2011, letter from Hassanshahi to the Iranian Minister of Energy in which Hassanshahi asked the Iranian government for payment for “protective relays for transmission lines.” See id .

Now before the Court is Hassanshahi's motion to suppress the evidence discovered during the forensic examination of his laptop. Hassanshahi asserts two arguments in support of his motion. First, he argues that the law enforcement database through which HSI initially obtained his 818 number constituted an unconstitutional search, and under the fruit of the poisonous tree doctrine, the forensic laptop examination was the direct result of that unlawful search such that the laptop evidence was tainted and must be suppressed. Second and alternatively, Hassanshahi argues that this Court should follow two recent court decisions from other federal jurisdictions that concluded that the Fourth Amendment required reasonable suspicion to conduct a forensic examination of an electronic device after an international border stop.5 Hassanshahi then argues that the laptop evidence must be suppressed here because the Government lacked reasonable suspicion for the search. The Court addresses these arguments below.

III. ANALYSIS

Hassanshahi's motion to suppress requires the Court to analyze two important areas of Fourth Amendment jurisprudence: the fruit of the poisonous tree doctrine and international border searches. As to the first issue, it is well settled that evidence secured as the result of an illegal search or seizure is tainted fruit of a poisonous tree that must be suppressed, unless intervening events or other attenuating circumstances sufficiently dissipated the taint of the initial illegality. The Court ultimately finds that such attenuating circumstances existed here, and the exclusionary rule therefore does not require suppression of the evidence found on Hassanshahi's laptop. Second, the Court finds that reasonable suspicion existed for the forensic examination of Hassanshahi's laptop after it was seized during the international border stop at LAX. Finally, because the Court reaches this conclusion as to reasonable suspicion, it need not—and does not—take a position regarding whether, as a matter of law, the Fourth Amendment required the Government to possess reasonable...

To continue reading

Request your trial
5 cases
  • United States v. Manafort
    • United States
    • U.S. District Court — District of Columbia
    • 21 d4 Junho d4 2018
    ...98 S.Ct. 1942, 56 L.Ed.2d 486 (1978). The government bears the burden in a challenge to a warrantless search, United States v. Hassanshahi , 75 F.Supp.3d 101, 108 (D.D.C. 2014) ; see United States v. Peyton , 745 F.3d 546, 552 (D.C. Cir. 2014), and the defendant bears the burden when a sear......
  • United States v. Jae Shik Kim, Karham Eng. Corp.
    • United States
    • U.S. District Court — District of Columbia
    • 8 d5 Maio d5 2015
    ...suspicion was required because it found that such suspicion was present in any event. United States v. Hassanshahi,No. 13–0274(RC), 75 F.Supp.3d 101, 118–19, 2014 WL 6735479, at *12 (D.D.C.2014). In an effort to follow that sensible approach, this Court took up the reasonable suspicion ques......
  • In re Rail Freight Fuel Surcharge Antitrust Litig.
    • United States
    • U.S. District Court — District of Columbia
    • 10 d2 Outubro d2 2017
    ......1869 Miscellaneous No. 07–0489 (PLF) United States District Court, District of Columbia. Signed October 10, 2017 Filed November 13, 2017 292 ......
  • United States v. Hassanshahi
    • United States
    • U.S. District Court — District of Columbia
    • 19 d4 Novembro d4 2015
    ...that the Court assumed, for purposes of its analysis and at the Government's suggestion, was unconstitutional. See United States v. Hassanshahi , 75 F.Supp.3d 101 (D.D.C.2014). Following the Court's decision, Mr. Hassanshahi has argued, both orally before the Court and in rounds of suppleme......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT