Lazoja Sues US For Phone Seizure.
Lazoja Sues US For Phone Seizure.
Lazoja Sues US For Phone Seizure.
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-__________
v.
Defendants.
NOTICE OF MOTION
PLEASE TAKE NOTICE that, Plaintiff, Rejhane Lazoja, through her attorneys, the Council
on American-Islamic Relations, New Jersey and the Council on American-Islamic Relations, New
York, will move the Court at the United States District Court for the District of New Jersey, 50
Walnut Street, Newark, New Jersey, on September 17, 2018, for the entry of an Order directing the
return of certain seized property to Plaintiff, pursuant to Federal Rule of Criminal Procedure 41(g).
1
Case 2:18-cv-13113-SDW-LDW Document 1 Filed 08/23/18 Page 2 of 2 PageID: 2
PLEASE TAKE FURTHER NOTICE that Plaintiff will rely upon Plaintiff’s Brief in
Support of Motion For Return of Property Under Federal Rule of Criminal Procedure 41(g), and
Declaration of Jay Rehman, Esq., dated August 23, 2018, annexing: Affidavit of Rejhane Lazoja
dated August 22, 2018; Notice to U.S. Customs and Border Protection (“CBP”), dated July 9, 2018;
and CBP Policy Directive, dated January 4, 2018, in support of its motion.
PLEASE TAKE FURTHER NOTICE that a proposed form of Order is submitted herewith.
Respectfully submitted,
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW JERSEY
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW YORK
2
Case 2:18-cv-13113-SDW-LDW Document 1-1 Filed 08/23/18 Page 1 of 1 PageID: 3
JS 44 (Rev. 06/17) CIVIL COVER SHEET
The JS 44 civil cover sheet and the information contained herein neither replace nor supplement the filing and service of pleadings or other papers as required by law, except as
provided by local rules of court. This form, approved by the Judicial Conference of the United States in September 1974, is required for the use of the Clerk of Court for the
purpose of initiating the civil docket sheet. (SEE INSTRUCTIONS ON NEXT PAGE OF THIS FORM.)
(c) Attorneys (Firm Name, Address, and Telephone Number) Attorneys (If Known)
Jay Rehman, Council on American-Islamic Relations New Jersey
4475 S. Clinton Ave., Suite 202, South Plainfield, New Jersey 07080
(908) 668-5900 (see attachment)
II. BASIS OF JURISDICTION (Place an “X” in One Box Only) III. CITIZENSHIP OF PRINCIPAL PARTIES (Place an “X” in One Box for Plaintiff
(For Diversity Cases Only) and One Box for Defendant)
1 U.S. Government 3 Federal Question PTF DEF PTF DEF
Plaintiff (U.S. Government Not a Party) Citizen of This State 1 1 Incorporated or Principal Place 4 4
of Business In This State
2 U.S. Government 4 Diversity Citizen of Another State 2 2 Incorporated and Principal Place 5 5
Defendant (Indicate Citizenship of Parties in Item III) of Business In Another State
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-______________
v.
Defendants.
Relations, New York, Albert Fox Cahn, pro hac vice pending, and Carey Shenkman, pro hac vice
pending, located at 46-01 Twentieth Avenue, Queens, New York 11105, (646) 665-7599.
Case 2:18-cv-13113-SDW-LDW Document 1-2 Filed 08/23/18 Page 2 of 2 PageID: 5
Respectfully submitted,
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW JERSEY
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW YORK
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-______________
v.
Defendants.
TABLE OF CONTENTS
Parties .............................................................................................................................................. 4
Argument ........................................................................................................................................ 9
I. The Fourth Amendment Requires a Warrant Supported by Probable Cause to Search, Seize,
or Copy Digital Data Storage Devices, or Share Copies of the Contents with Third Parties .... 9
II. The Length of Time Property is Detained Raises a Separate Fourth Amendment Inquiry . 14
III. Any Retention of Data, or Sharing of Data with Third Parties, Without a Warrant
Supported by Probable Cause, Violates the Fourth Amendment ............................................ 14
Conclusion .................................................................................................................................... 15
i
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 3 of 20 PageID: 8
TABLE OF AUTHORITIES
Alasaad v. Nielsen,
2018 U.S. Dist. LEXIS 78783 (D. Mass. May 9, 2018).................................................. 2, 10-11
House v. Napolitano,
2012 U.S. Dist. LEXIS 42297 (D. Mass. Mar. 28, 2012) ........................................................ 14
Riley v. California,
134 S. Ct. 2473 (2014) ........................................................................................................ 10-12
Terry v. Ohio,
392 U.S. 1 (1968) ................................................................................................................ 13-14
ii
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 4 of 20 PageID: 9
iii
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 5 of 20 PageID: 10
PRELIMINARY STATEMENT
1. This is a motion pursuant to Rule 41(g) of the Federal Rules of Criminal Procedure
seeking the return of any personal data that Defendant U.S. Customs and Border Protection
(“CBP”), its agents and employees copied from Plaintiff Rejhane Lazoja’s phone, which was taken
from her unlawfully at the border and which contains privileged communications between Ms.
Lazoja and her counsel. The seizure, retention, and any sharing of her property without reasonable
suspicion, probable cause, or a warrant have violated Ms. Lazoja’s rights under the Fourth
Amendment of the U.S. Constitution, and are at odds with recent Supreme Court holdings as well
as District Court and Court of Appeals decisions scrutinizing CBP’s practices of seizing digital
2. When Ms. Lazoja landed at Newark Liberty International Airport (“Newark”), she
was already exhausted from the nine-hour transatlantic flight. Instead of welcoming her back to
the United States, her home country, Defendants’ agents and employees questioned Ms. Lazoja,
searched her, took her to a small, windowless room, and even seized her cell phone. Ms. Lazoja is
a Muslim woman and wears a hijab (a headscarf) in accordance with her religious beliefs. Pursuant
to her sincerely held beliefs, Ms. Lazoja cannot be seen in a state of undress by men who are not
family members. The personal data on Ms. Lazoja’s phone included pictures of her in a state of
3. U.S. Customs and Border Protection (“CBP”) follows a policy Directive that states
“copies of information contained in electronic devices (or portions thereof) . . . are retained in
accordance with this Directive” and are shared “with federal, state, local, and foreign law
enforcement agencies to the extent consistent with applicable law and policy.” CBP Directive No.
1
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 6 of 20 PageID: 11
4. Today, over 150 days later, on information and belief, Defendants and their agents
and employees still possess the personal data from Ms. Lazoja’s cell phone. While Defendants
returned Ms. Lazoja’s cell phone 130 days after it was seized, they refuse to state what they did
with her personal data, what third parties her personal data was shared with, and if let alone when
they will return her data. At no time, not when Defendants’ agents and employees seized Ms.
Lazoja’s cell phone, nor at any point in the over 150 days since, have Defendants articulated a
reasonable suspicion for seizing the phone, let alone probable cause, let alone produced a warrant
5. Seizing and searching a cell phone is unlike seizing or searching any other property.
Cell phones are a uniquely intimate and expansive repository of our lives. They do far more than
just make calls and send e-mails; they monitor and log much of our movement, activity, and even
our thinking in real time. They enable us to stay connected with coworkers and loved ones—losing
a phone essentially cuts one off from modern society. In June, the Supreme Court recognized the
indispensability of cell phones and the heightened privacy interests at stake when they are utilized
in warrantless investigations. See Carpenter v. United States, 585 U.S. ___, 2018 U.S. LEXIS
3844 at *23 (2018) (“While individuals regularly leave their vehicles, they compulsively carry cell
phones with them all the time.”). Numerous District Courts, even prior to Carpenter, have
scrutinized CBP’s policy of seizing and searching cell phones without a warrant. See, e.g., Alasaad
v. Nielsen, 2018 U.S. Dist. LEXIS 78783 *3 (D. Mass. May 9, 2018) (denying a government
motion to dismiss on a Fourth Amendment challenge to warrantless digital device searches and
seizures at the border); United States v. Kim, 103 F. Supp. 3d 32, 54-58 (D.D.C. 2015) (finding
that off-border search and copying of a laptop computer without a warrant was unreasonable).
2
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 7 of 20 PageID: 12
6. Defendants and their agents and employees violated Ms. Lazoja’s Constitutional
rights in three discrete ways: first, by initially searching and seizing Ms. Lazoja’s property without
a warrant or reasonable suspicion; second, by failing to return Ms. Lazoja’s property for over 120
days with no warrant or reasonable suspicion; and third, by continuing to retain any information
copied from Ms. Lazoja’s phone (“Data”) without a warrant or reasonable suspicion long-after her
passage through the border. Any ongoing retention by Defendants of Ms. Lazoja’s Data is
manifestly unreasonable and a continuing violation of Ms. Lazoja’s Fourth Amendment rights.
Therefore, Ms. Lazoja asks this Court to order Defendants to return her Data, order an
expungement of any copies made of the Data, and disclose all third parties who received and/or
retain copies, partial or complete, of the Data, as well as any information about the basis for the
7. Jurisdiction is conferred on this court by 28 U.S.C. §§ 1331, 1356, and Rule 41(g)
8. This Court has authority to issue declaratory and injunctive relief under 28 U.S.C.
§ 2201 and § 2202, Rules 57 and 65 of the Federal Rules of Civil Procedure, and its inherent
equitable powers.
9. Venue properly lies within the District of New Jersey because Ms. Lazoja’s
property was seized at Newark, which is in this district. 28 U.S.C. § 1391(b)(2); Fed. R. Crim. P.
41(g).
10. Rule 41(g) of the Federal Rules of Criminal Procedure empowers those “aggrieved
by an unlawful search and seizure of property or by the deprivation of property” to “move for the
3
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 8 of 20 PageID: 13
property’s return . . . in the district where the property is seized.” See Ordonez v. United States,
680 F.3d 1135, 1137 (9th Cir. 2012) (“[Rule 41(g)] provides a mechanism by which a person may
seek to recover property seized by federal agents.”). Where the government terminates, or declines
to initiate criminal proceedings, Rule 41(g) allows the wronged party to bring a civil claim under
the court's equitable jurisdiction. United States v. Bennett, 423 F.3d 271, 274 (3d Cir. 2005) (“In a
typical case under Rule 41(g), a district court exercises its equitable powers.”); see also United
States v. Bein, 214 F.3d 408, 411 (3d Cir. 2000) (“A district court has jurisdiction to entertain a
motion for return of property even after the termination of criminal proceedings against the
defendant and such an action is treated as a civil proceeding for equitable relief.”); Doe v. United
States, 896 F. Supp. 2d 1184, 1187-88 (S.D. Fla. 2012) (exercising jurisdiction over a Rule 41(g)
motion for return of property, where the property included data copied from digital devices
detained at the border, after the physical property had been returned, and where the data contained
11. After a Rule 41(g) movant demonstrates a possessory interest in the property, and
in the absence of criminal proceedings, “the government bears the burden of establishing the
movant is not entitled to relief.” Tellez-Sanchez v. United States, 2014 U.S. Dist. LEXIS 92418 at
*3 (D. Ariz. 2014) (citing United States v. Chambers, 192 F. 3d 374, 376 (3d Cir. 1999)).
PARTIES
12. Plaintiff Rejhane Lazoja is a national of the United States and holder of a valid
Security (“DHS”). She supervises Defendants McAleeman and Adele Fasano and is sued in her
official capacity.
4
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 9 of 20 PageID: 14
within DHS. He supervises Defendant Adele Fasano, and is sued in his official capacity.
15. Defendant Adele Fasano is the CBP Port Director for Newark, and is sued in her
official capacity.
16. Defendants Jane Doe and John Does 1-2 are CBP Officers in Newark, and are sued
STATEMENT OF FACTS
17. On the evening of February 26, 2018, Plaintiff Rejhane Lazoja arrived at Newark
on a flight from Zurich, Switzerland with her six-year-old daughter. See Affidavit of Rejhane
18. While passing through CBP primary inspection at Newark, Ms. Lazoja used a self-
service Automated Passport Control kiosk, which prompts travelers to scan their passports, take a
photograph, and answer a series of questions verifying biographic and flight information. The
Kiosk provided Ms. Lazoja a receipt with an ‘X’ printed on her photograph. (Rejhane Aff. ¶ 3).
19. Ms. Lazoja was directed by a CBP Officer to move to a separate line at the
20. Two CBP Officers asked Ms. Lazoja several questions including where she
22. A male CBP Officer directed Ms. Lazoja to wait in a main seating area for several
23. A female CBP Officer (“Jane Doe”) called Ms. Lazoja to follow her to a small room
with CBP Officer John Doe 1 (“John Doe 1”). (Rejhane Aff. ¶ 8).
5
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 10 of 20 PageID: 15
24. Jane Doe and John Doe 1 further questioned Ms. Lazoja about her travels, and
asked questions including whether she was ever a refugee. (Rejhane Aff. ¶ 9).
25. Ms. Lazoja is a Muslim woman and wears a hijab in accordance with her religious
26. Ms. Lazoja’s Apple iPhone 6S Plus (“iPhone”) contained photos of her in a state of
27. Ms. Lazoja’s iPhone contained legal communications with the Council on
28. Ms. Lazoja asked if she needed an attorney and whether the questions were a result
29. Jane Doe and John Doe 1 replied that there was no need to contact a lawyer.
30. Jane Doe and John Doe 1 asked Ms. Lazoja if she carried any electronic devices on
31. Ms. Lazoja assented and produced the iPhone with accompanying subscriber
32. Jane Doe and John Doe 1 confiscated Ms. Lazoja’s iPhone and SIM Card. (Rejhane
Aff. ¶ 17).
33. Like many cell phones, the contents of Ms. Lazoja’s iPhone can only be accessed
by inputting an alphanumeric password. Without said password, such cell phones are commonly
described as being “locked,” and when said password is successfully entered, they are commonly
6
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 11 of 20 PageID: 16
34. John Doe 1 asked Ms. Lazoja to unlock the iPhone, but did not state a reason for
35. Since there was no stated reason for her to unlock the iPhone, Ms. Lazoja refused.
36. Jane Doe led Ms. Lazoja out of the small room. (Rejhane Aff. ¶ 20).
37. A male CBP Officer John Doe 2 (“John Doe 2”) asked Ms. Lazoja to unlock the
38. Ms. Lazoja refused to unlock the iPhone. (Rejhane Aff. ¶ 22).
39. Jane Doe repeated her request that Ms. Lazoja unlock the iPhone, saying that she
understood the sensitivity of sharing personal pictures, including any showing Ms. Lazoja
40. Ms. Lazoja refused to unlock the iPhone. (Rejhane Aff. ¶ 24).
41. After accompanying Ms. Lazoja to the baggage claim area, Jane Doe opened and
searched Ms. Lazoja’s luggage, asking if she had more than $10,000 or more in her possession.
42. Jane Doe and John Does 1-2 did not return the iPhone. (Rejhane Aff. ¶ 26).
43. Jane Doe and John Does 1-2 provided Ms. Lazoja a receipt (No. 1199376) dated
February 26, 2018, documenting CBP’s seizure of her iPhone and SIM Card, and indicating the
iPhone and SIM Card were “Sent to DHS Lab.” (Rejhane Aff. ¶ 27); see Ex. A.
44. On July 6, 2018, Ms. Lazoja’s iPhone and SIM Card were returned to her counsel,
Jay Rehman by Michael Firing, Assistant Port Director for CBP at Newark. See Declaration by
7
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 12 of 20 PageID: 17
45. Ms. Lazoja did not receive her iPhone and SIM Card back until more than 120 days
46. On July 9, 2018, Ms. Lazoja, through counsel and via e-mail to Michael Firing,
confirmed receipt of the phone, and notified CBP that the phone contained pictures of her without
her hijab as well as privileged communications with her counsel. Ms. Lazoja requested that CBP:
confirm whether CBP made any copies of the Data, and to provide its legal basis for doing so;
expunge any copies of the Data; and confirm whether it has shared copies of the Data with any
third parties, including but not limited to, local, state, or federal law enforcement agencies.
47. Ms. Lazoja has received no response to her July 9 request. (Rehman Decl. ¶ 5).
48. CBP’s policy Directive provides that “[u]nless extenuating circumstances exist, the
detention of devices ordinarily should not exceed five (5) days.” CBP Directive No. 3340-049A,
Jan/CBP-Directive-3340-049A-Border-Search-of-Electronic-Media-Compliant.pdf, Ex. 3.
49. Ms. Lazoja has not received any copies made of the Data, or any assurances that
Defendants, their agents or employees no longer possess copies of her Data. (Rehman Decl. ¶ 8).
50. Ms. Lazoja has not received any explanation for the seizure of the phone or for the
length of time she was deprived of her property, including whether any “extenuating
51. On information and belief, CBP did not obtain a warrant to search, seize, or access
8
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 13 of 20 PageID: 18
52. Defendants and their agents have a stated policy, custom, and practice of copying
digital information from devices detained at the border, and sharing that information with third
Sharing Generally. Nothing in this Directive limits the authority of CBP to share copies of
information contained in electronic devices (or portions thereof), which are retained in
accordance with this Directive, with federal, state, local, and foreign law enforcement
agencies to the extent consistent with applicable law and policy.
Ex. 3 at § 5.5.1.3.
53. Pursuant to CBP’s own policies, if Defendants, their agents and employees do not
assert probable cause to seize a device or the information it contains, “any copies of the information
held by CBP must be destroyed.” Ex. 3 at § 5.4.1.2. “Upon this determination, the copy of the
information will be destroyed as expeditiously as possible, but no later than seven (7) days after
such determination unless circumstances require additional time, which must be approved by a
supervisor and documented in an appropriate CBP system and which must be no later than twenty-
54. Ms. Lazoja has not received any assurances that Defendants, their agents or
employees have not shared her Data, including privileged communications, with third parties.
ARGUMENT
55. The Fourth Amendment establishes that “[t]he right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the persons or things to be seized.” U.S.
9
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 14 of 20 PageID: 19
Const. amend. IV. The Supreme Court recently reiterated that “the ultimate touchstone of the
Fourth Amendment is reasonableness” and that “reasonableness generally requires the obtaining
of a judicial warrant.” Riley v. California, 134 S. Ct. 2473, 2482 (2014) (quoting Brigham City v.
Stuart, 547 U.S. 398, 403 (2006); Vernonia School Dist. 47J v. Acton, 515 U.S. 646, 653 (1995)).
Although border searches have been recognized as one exception to the warrant requirement,
United States v. Ramsey, 431 U.S. 606, 620 (1977), “the exception is not limitless.” Alasaad v.
Nielsen, 2018 U.S. Dist. LEXIS 78783 *43 (D. Mass. May 9, 2018). “Border searches must still
be ‘reasonable,’ and the Court must still—as with searches conducted in the interior—balance ‘the
sovereign’s interests’ with the privacy interests of the individual.” Id. (citing United States v.
Montoya de Hernandez, 473 U.S. 531, 539 (1985). Searches and seizures of digital devices present
56. The Supreme Court has repeatedly held, including recently in Carpenter, that
warrantless invasions of cell phones face heightened Fourth Amendment scrutiny. Cell phones
“are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars
might conclude they were an important feature of human anatomy.” Riley 134 S. Ct. at 2484; see
also Carpenter v. United States, 585 U.S. ___, 2018 U.S. LEXIS 3844 *14-15 (2018) (noting the
Court has kept “attention to Founding-era understandings in mind when applying the Fourth
Amendment to innovations in surveillance tools” such as with “the vast store of sensitive
information on a cell phone”). In Riley, a near-unanimous court held that individual’s privacy
interests outweighed any legitimate government interests in warrantless cell phone searches
incident-to-arrest, since “cell phones, as a category, implicate privacy concerns far beyond those
implicated by the search of a cigarette pack, a wallet, or a purse.” 134 S. Ct. at 2488-89. “Cell
phones differ in both a quantitative and a qualitative sense from other objects that might be kept
10
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 15 of 20 PageID: 20
on an arrestee’s person.” Id. at 2489. The Court described how individuals cannot “lug around
every piece of mail they have received for the past several months, every picture they have taken,
or every book or article they have read,” and that the “sum of an individual’s private life can be
reconstructed through a thousand photographs.” Id. A person’s browsing history and location
information “can form a revealing montage of the user’s life.” Id. at 2490. Importantly, “Riley
opens up a doctrinal path for courts to reconsider whether to extend the border search exception to
the warrant requirement . . . to searches of digital information.” Thomas Mann Miller, Digital
Border Searches After Riley v. California, 90 Wash. L. Rev. 1943, 1947 (2015). Such heightened
57. In light of Riley, some courts have already limited the scope of searches of digital
devices pursuant to the border search exception. Recently, the U.S. District Court for the District
of Massachusetts applied Riley to the border search context as part of ongoing litigation under the
First and Fourth Amendments brought by individuals whose devices were searched and seized at
the border. In that case, the court explained that “exceptions to the warrant requirement do not
exist in isolation; rather, they are all part of Fourth Amendment jurisprudence.” Alasaad, 2018
U.S. Dist. LEXIS 78783 at *53. The court similarly scrutinized the applicability of the border
search exemption in the digital context, that “[a]lthough a warrant [requirement] might ‘have an
impact on the ability of law enforcement to combat crime,” [Riley, 134 S. Ct. at 2493], it is unclear
. . . the extent to which such impediment justifies applying the border search exception to electronic
devices.” Alasaad at *62. On those grounds, the court in Alasaad found that the plaintiffs plausibly
alleged a Fourth Amendment claim against both the search and the seizure of their devices.
58. Several other Federal courts have applied the reasoning of Riley to narrow the
border search exception in the context of searches of digital devices such as cell phones. See, e.g.,
11
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 16 of 20 PageID: 21
United States v. Djibo, 151 F. Supp. 3d 297, 310 (E.D.N.Y. 2015) (granting motion to suppress
documents obtained from warrantless search of the phone of an outbound passenger under Riley);
Janfeshan v. United States Customs & Border Prot., 2017 U.S. Dist. LEXIS 151058 (S.D.N.Y.
2017) (denying motion to dismiss a Fourth Amendment claim regarding a forensic cell phone
search at the border); United States v. Kolsuz, 890 F.3d 133, 146-47 (4th Cir. 2018) (“After Riley,
we think it is clear that a forensic search of a digital phone must be treated as a nonroutine border
search, requiring some form of individualized suspicion.”); United States v. Kim, 103 F. Supp. 3d
32, 54-58 (D.D.C. 2015) (“[T]he fact that the Supreme Court has specifically likened the border
search warrant exception to the search incident to arrest exception reinforces the Court's view that
an analysis similar to the one in Riley should be undertaken here.”). Note that these cases predate
the June 2018 decision in Carpenter, where the Supreme Court further emphasized the heightened
privacy interests implicated by cell phones, specifically through providing law enforcement access
59. In Kim, where DHS agents seized a laptop computer at Los Angeles International
Airport and later sent it to a laboratory to be copied and searched, the district court found that the
lengthy post-seizure retention of a laptop at a second site, outside the airport, “did not possess the
characteristics of a border search or other regular inspection procedures,” and that it “more
resembled the common nonborder search based on individualized suspicion, which must be
prefaced by the usual warrant and probable cause standards.” Id. at 58 (citing United States v.
Brennan, 538 F.2d 711, 716 (5th Cir. 1976)). The court in Kim questioned whether the seizure and
imaging of a laptop at the border “can accurately be characterized as a border search at all.” Id. at
57.
12
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 17 of 20 PageID: 22
60. While noting that the characteristics of the seizure and search of the digital device
triggered a warrant requirement, the court found that in the absence of a warrant, there was neither
probable cause, nor even reasonable suspicion of ongoing or imminent criminal activity for the
search:
Considering all of the facts and authorities set forth above, then, the Court finds, under the
totality of the unique circumstances of this case, that the imaging and search of the entire
contents of Kim's laptop, aided by specialized forensic software, for a period of unlimited
duration and an examination of unlimited scope, for the purpose of gathering evidence in
a pre-existing investigation, was supported by so little suspicion of ongoing or imminent
criminal activity, and was so invasive of Kim's privacy and so disconnected from not only
the considerations underlying the breadth of the government's authority to search at the
border, but also the border itself, that it was unreasonable.
Id. at 59. Importantly, in Kim the plaintiff was under investigation for alleged past
criminal activity, but that did not even give rise to reasonable suspicion or justify in any way the
61. The Supreme Court recently expanded the categorically heightened privacy
interests in data located on cell phones, specifically addressing cell phones’ location data. Location
data consists of the historic or contemporaneous geographic location of a cell phone. Cell phones
store or provide location data in numerous ways, and when obtained, it enables the government to
achieve “near perfect surveillance, as if it had attached an ankle monitor to the phone’s user.”
Carpenter, 2018 U.S. LEXIS 3844 at *23. Cell phone owners’ privacy interest in location data is
so strong that transmission to a third party did not vitiate Fourth Amendment protections, as is
electronic device taken at a border is unconstitutional. See United States v. Cortez, 449 U.S. 411,
417-18 (1981) (holding that reasonable suspicion requires “a particularized and objective basis for
suspecting the particular person stopped of criminal activity”); see also Terry v. Ohio, 392 U.S. 1
13
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 18 of 20 PageID: 23
(1968) (holding that reasonable suspicion requires “specific and articulable facts” that criminal
activity “may be afoot”). No such suspicion of ongoing or imminent criminal activity existed in
the case of Ms. Lazoja giving rise to reasonable suspicion to search and seize her property.
Consequently, neither was there probable cause, nor a warrant. Therefore, the search and seizure
of Ms. Lazoja’s property violated her rights under the Fourth Amendment.
II. The Length of Time Property is Detained Raises a Separate Fourth Amendment Inquiry
63. Even if CBP could constitutionally seize Ms. Lazoja’s property, which it could not,
CBP’s impermissibly-delayed return of said property, and failure to return her Data, constitutes an
reasonable for their duration. United States v. Place, 462 U.S. 696, 708-10 (1983) (holding that
the “length of the detention”—ninety minutes—of an individual’s luggage gave rise to a seizure
requiring probable cause). Specifically, even if CBP’s warrantless, suspicionless seizure and
search authority, the length of time a device is held can give rise to a Fourth Amendment claim.
See House v. Napolitano, 2012 U.S. Dist. LEXIS 42297 at *31 (D. Mass. Mar. 28, 2012) (holding
that a forty-nine-day warrantless border detention of a locked laptop computer, computer storage
medium, and digital camera raised a plausible Fourth Amendment claim even where the claim
III. Any Retention of Data, or Sharing of Data with Third Parties, Without a Warrant
Supported by Probable Cause, Violates the Fourth Amendment
64. Here, CBP retained Ms. Lazoja’s cell phone—an indispensable companion in
modern society—without a warrant for more than 120 days. CBP has not returned any copies it
has made of Ms. Lazoja’s Data, which contains personal photos of her in an exposed state without
her hijab, as well as attorney-client communications. Neither has CBP affirmed that it has
14
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 19 of 20 PageID: 24
destroyed any copies made of Ms. Lazoja’s Data, and not transmitted the Data to any third parties.
There is no possible justification for this. Similarly, there is no justification for any warrantless
duplication or transmission of Ms. Lazoja’s Data. Such duplication or transmission of the Data
CONCLUSION
65. Plaintiff Rejhane Lazoja respectfully asks this Court to order Defendants to return
her Data, to expunge any copies made of the Data, to disclose all third parties who received and/or
retain copies, partial or complete, of the Data, and to provide information about the basis for the
seizure and retention of the property. Further, Ms. Lazoja respectfully asks that this Court declare
that Defendants, their agents and employees violated the Fourth Amendment of the U.S.
Constitution through their policy of searching, seizing, detaining, copying, and sharing with third
parties digital storage devices without a warrant. Finally, Ms. Lazoja respectfully asks that this
Court enjoin Defendants from its practice of searching and seizing electronic storage devices
Respectfully submitted,
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW JERSEY
15
Case 2:18-cv-13113-SDW-LDW Document 1-3 Filed 08/23/18 Page 20 of 20 PageID: 25
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW YORK
16
Case 2:18-cv-13113-SDW-LDW Document 1-4 Filed 08/23/18 Page 1 of 2 PageID: 26
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-_______________
v.
Defendants.
THIS MATTER having come before this Court on Motion brought by Plaintiff Rejhane
Lajoza, pursuant to Federal Rule of Criminal Procedure 41(g), and this Court having considered
all arguments and submissions proffered by the parties in respect of this Motion, and for good
1
Case 2:18-cv-13113-SDW-LDW Document 1-4 Filed 08/23/18 Page 2 of 2 PageID: 27
ORDERED that Plaintiff's Motion for Return of Property is hereby GRANTED; and it is
ORDERED that Defendants return all copies of data copied from Plaintiff's iPhone 6S
Plus and accompanying SIM Card which were seized by Defendants’ agents and employees from
Plaintiff at Newark Liberty International Airport on February 26, 2018, and expunge any copies
ORDERED that Defendants notify Plaintiff of the reasons for detaining her property and
accompanying data, as well as identify any third parties or agencies with whom Defendants, their
DECLARED that the policy of Defendants, their agents and employees of searching,
seizing, detaining, copying, and sharing with third parties digital storage devices without a warrant
is unauthorized by statute and constitutes a violation of the Fourth Amendment of the U.S.
Constitution; and it is
DECLARED that accordingly, Defendants, their agents and employees violated their duty
FURTHER ORDERED that Defendants, their agents and employees, are enjoined from
searching, seizing, detaining, copying, and sharing with third parties digital storage devices
without a warrant.
________________________
U.S.D.J.
2
Case 2:18-cv-13113-SDW-LDW Document 1-5 Filed 08/23/18 Page 1 of 2 PageID: 28
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-__________
v.
Defendants.
DECLARATION OF SERVICE
Jay Rehman, Esq., pursuant to 28 U.S.C. § 1746, declares under penalty of perjury that the
1. I am an attorney at law in the State of New Jersey and the Legal Director of the
Council on American-Islamic Relations, New Jersey, which has an office at 4475 S. Clinton Ave.,
Suite 202, South Plainfield, New Jersey 07080. I am admitted to practice before this Court.
1
Case 2:18-cv-13113-SDW-LDW Document 1-5 Filed 08/23/18 Page 2 of 2 PageID: 29
Support of Motion For Return of Property Under Federal Rule of Criminal Procedure 41(g), and
Declaration of Jay Rehman, Esq., dated August 23, 2018, annexing: Affidavit of Rejhane Lazoja
dated August 22, 2018; Notice to U.S. Customs and Border Protection (“CBP”), dated July 9,
2018; and CBP Policy Directive, dated January 4, 2018, as well as a proposed form of Order and
Respectfully submitted,
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW JERSEY
2
Case 2:18-cv-13113-SDW-LDW Document 1-6 Filed 08/23/18 Page 1 of 3 PageID: 30
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-______________
v.
Defendants.
Jay Rehman, Esq., pursuant to 28 U.S.C. § 1746, declares under penalty of perjury that
1. I am an attorney at law in the State of New Jersey and the Legal Director of the
Council on American-Islamic Relations, New Jersey, which has an office at 4475 S. Clinton Ave.,
Suite 202, South Plainfield, New Jersey 07080. I am admitted to practice before this Court.
1
Case 2:18-cv-13113-SDW-LDW Document 1-6 Filed 08/23/18 Page 2 of 3 PageID: 31
2. On August 22, 2018, Plaintiff Rejhane Lazoja swore an Affidavit in Support of Her
Motion for Return of Property. A true and correct copy of that Affidavit, along with its Exhibit A,
3. On July 6, 2018, I met with Michael Firing, Assistant Port Director for U.S.
Customs and Border Protection (“CBP”) at Newark, to receive Plaintiff Rejhane Lazoja’s iPhone
4. On July 9, 2018, I e-mailed Michael Firing to confirm receipt of the phone, and
notify CBP that the phone contained pictures of Ms. Lazoja without her hijab, as well as privileged
legal communications with the Council on American-Islamic Relations, New York. The message
requested that CBP: confirm whether it made copies of Ms. Lazoja’s data from the iPhone, and if
so, its legal basis for doing so; expunge any copies of the data; and confirm whether CBP shared
copies of the data with any third parties including law enforcement agencies. A true and correct
5. As of August 23, 2018, I have not received a response to the July 9, 2018 e-mail.
6. On August 16, 2018, I accessed CBP Directive No. 3340-049A, dated January 4,
2018, which CBP has made available online at the following URL:
https://www.cbp.gov/sites/default/files/assets/documents/2018-Jan/CBP-Directive-3340-049A-
attached as Exhibit 3.
7. Defendants in this matter have not articulated to me a basis for reasonable suspicion
for seizing the phone, nor probable cause, nor have they produced to me a warrant to search or
seize Ms. Lazoja’s iPhone and personal data. Defendants have not articulated to me a basis for the
2
Case 2:18-cv-13113-SDW-LDW Document 1-6 Filed 08/23/18 Page 3 of 3 PageID: 32
length of time that Ms. Lazoja’s was deprived of her iPhone, or whether any extenuating
circumstances existed.
8. Defendants in this matter have not provided to me any assurances that Defendants,
their agents or employees do not possess copies of data obtained from Ms. Lazoja’s iPhone and
SIM Card, or that they have not shared any data with third parties.
Respectfully submitted,
COUNCIL ON AMERICAN-ISLAMIC
RELATIONS NEW JERSEY
3
Case 2:18-cv-13113-SDW-LDW Document 1-7 Filed 08/23/18 Page 1 of 4 PageID: 33
REJHANE LAZOJA,
Plaintiff,
Case No. 18-cv-_______________
v.
Defendants.
Rejhane Lazoja, of full age, being duly sworn, upon her oath according to law, deposes
and says:
1. I am the Plaintiff in this suit, and am familiar with the facts set forth herein. I submit
this affidavit in support of my Motion for Return of Property Under Federal Rule of Criminal
Procedure 41(g).
1
Case 2:18-cv-13113-SDW-LDW Document 1-7 Filed 08/23/18 Page 2 of 4 PageID: 34
inspection at Newark, I used a self-service Automated Passport Control kiosk, which prompts
travelers to scan their passports, take a photograph, and answer a series of questions verifying
photograph.
4. I was directed by a CBP Officer to move to a separate line at the inspection point.
5. Two CBP Officers asked me several questions including where I traveled to.
7. A male CBP Officer escorted me to wait in a main seating area for several minutes.
8. A female CBP Officer Jane Doe called me to follow her to a small room with
9. Jane Doe and John Doe 1 further questioned me about my travels and asked
religious beliefs. Pursuant to my sincerely held beliefs, I cannot be seen in a state of undress by
12. My cell phone contained legal communications with the Council on American-
2
Case 2:18-cv-13113-SDW-LDW Document 1-7 Filed 08/23/18 Page 3 of 4 PageID: 35
13. I asked if I needed an attorney and whether the questions were a result of my
wearing a hijab.
14. Jane Doe and John Doe 1 replied that there was no need to contact a lawyer.
15. Jane Doe and John Doe 1 asked me if I carried any electronic devices on my person.
17. Jane Doe and John Doe 1 confiscated my iPhone and accompanying SIM Card.
18. John Doe 1 asked me to unlock my iPhone, but did not state a reason for me to
unlock my iPhone.
19. Since there was no stated reason for me to unlock my iPhone, I refused.
23. Jane Doe repeated her request that I unlock my iPhone, and said that she understood
the sensitivity of sharing personal pictures, including any showing me undressed, without my
hijab.
25. After accompanying me to the baggage claim area, Jane Doe opened and searched
26. Jane Doe and John Does 1-2 did not return my iPhone to me.
27. Jane Doe and John Does 1-2 provided me a receipt (No. 1199376) dated February
26, 2018. A true and correct copy of the receipt with my personal identifiers redacted is annexed
hereto as Exhibit A.
3
Case 2:18-cv-13113-SDW-LDW Document 1-7 Filed 08/23/18 Page 4 of 4 PageID: 36
Case 2:18-cv-13113-SDW-LDW Document 1-8 Filed 08/23/18 Page 1 of 2 PageID: 37
Albert Cahn
Michael,
Please see attached signed document by Ms. Rejhane Lazoja acknowledging her receipt of the phone.
Regards,
Disclaimer: This email may contain confidential and privileged material, including attachments, for the sole use of the
intended recipient(s) named above. Please do not review, use, copy, forward, or in any way distribute or disclose the
contents of this e-mail including any attachments unless you are the intended recipient(s) named above. If you are not
the intended recipient, or authorized to receive this message for the recipient, please contact the sender by reply email
and delete all copies of this message. This email does not by itself establish an attorney-client relationship, and may not
constitute legal advice.
1
Case 2:18-cv-13113-SDW-LDW Document 1-8 Filed 08/23/18 Page 2 of 2 PageID: 38
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 1 of 12 PageID: 39
These searches are part of CBP's longstanding practice and are essential to enforcing the law at
the U.S. border and to protecting border security. They help detect evidence relating to terrorism
and other national security matters, human and bulk cash smuggling, contraband, and child
pornography. They can also reveal information about financial and commercial crimes, such as
those relating to copyright, trademark, and export control violations. They can be vital to risk
assessments that otherwise may be predicated on limited or no advance information about a
given traveler or item, and they can enhance critical information sharing with, and feedback
from, elements of the federal government responsible for analyzing terrorist threat
information. Finally, searches at the border are often integral to a determination of an
individual's intentions upon entry and provide additional information relevant to admissibility
under the immigration laws.
2 POLICY
2.1 CBP will protect the rights of individuals against unreasonable search and seizure and
ensure privacy protections while accomplishing its enforcement mission.
2.2 All CBP Officers, Border Patrol Agents, Air and Marine Agents, Office of Professional
Responsibility Agents, and other officials authorized by CBP to perform border searches shall
adhere to the policy described in this Directive and any implementing policy memoranda or
musters.
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 2 of 12 PageID: 40
-2
2.3 This Directive governs border searches of electronic devices - including any inbound or
outbound search pursuant to longstanding border search authority and conducted at the physical
border, the functional equivalent of the border, or the extended border, consistent with law and
agency policy. For purposes of this Directive, this excludes actions taken to determine ifa
device functions (e.g., turning a device on and off); or actions taken to determine if physical
contraband is concealed within the device itself; or the review of information voluntarily
provided by an individual in an electronic format (e.g., when an individual shows an e-ticket on
an electronic device to an Officer, or when an alien proffers information to establish
admissibility). This Directive does not limit CBP's authority to conduct other lawful searches of
electronic devices, such as those performed pursuant to a warrant, consent, or abandonment, or in
response to exigent circumstances; it does not limit CBP's ability to record impressions relating
to border encounters; it does not restrict the dissemination of information as required by
applicable statutes and Executive Orders.
2.4 ·This Directive does not govern searches of shipments containing commercial quantities
of electronic devices (e.g., an importation of hundreds oflaptop computers transiting from the
factory to the distributor).
2.5 This Directive does not supersede Restrictions on Importation ofSeditious Matter,
Directive 2210-001 A~ Seditious materials encountered through a border search should continue
to be handled pursuant to Directive 2210-001 A or any successor thereto.
2.6 This Directive does not supersede Processing Foreign Diplomatic and Consular
Officials, Directive 3340-032. Diplomatic and consular officials encountered at the border, the
functional equivalent of the border (FEB), or extended border should continue to be processed
pursuant to Directive 3340-032 or any successor thereto.
2.7 This Directive applies to searches performed by or at the request of CBP. With respect to
searches performed by U.S. Immigration and Customs Enforcement (ICE), Homeland Security
Investigations (HSI) Special Agents exercise concurrently-held border search authority that is
covered by ICE's own policy and procedures. When CBP detains, seizes, or retains electronic
devices, or copies of information therefrom, and conveys such to ICE for analysis, investigation,
and disposition (with appropriate documentation), the conveyance to ICE is not limited by the
terms of this Directive, and ICE policy will apply upon receipt by ICE.
3 DEFINITIONS
3.1 Officer. A Customs and Border Protection Officer, Border Patrol Agent, Air and Marine
Agent, Office of Professional Responsibility Special Agent, or any other official of CBP
authorized to conduct border searches.
3.2 Electronic Device. Any device that may contain information in an electronic or digital
form, such as computers, tablets, disks, drives, tapes, mobile phones and other communication
devices, cameras, music and other media players.
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 3 of 12 PageID: 41
-3
The plenary authority of the Federal Government to conduct searches and inspections of persons
and merchandise crossing our nation's borders is well-established and extensive; control of the
border is a fundamental principle of sovereignty. "[T]he United States, as sovereign, has the
inherent authority to protect, and a paramount interest in protecting, its territorial integrity."
United States v. Flores-Montano, 541 U.S. 149, 153 (2004). "The Government's interest in
preventing the entry of unwanted persons and effects is at its zenith at the international border.
Time and again, [the Supreme Court has] stated that 'searches made at the border, pursuant to the
longstanding right of the sovereign to protect itself by stopping and examining persons and
property crossing into this country, are reasonable simply by virtue of the fact that they occur at
the border."' Id. at 152-53 (quoting United States v. Ramsey, 431 U.S. 606, 616
( 1977)). "Routine searches of the persons and effects of entrants [into the United States] are not
subject to any requirement of reasonable suspicion, probable cause, or warrant." United States v.
Montoya de Hernandez, 473 U.S. 531, 538 (1985). Additionally, the authority to conduct border
searches extends not only to persons and merchandise entering the United States, but applies
equally to those departing the country. See, e.g., United States v. Bourne/hem, 339 F.3d 414,
422-23 (6th Cir. 2003); United States v. Odutayo, 406 F.3d 386, 391-92 (5th Cir. 2005); United
States v. Oriakhi, 57 F.3d 1290, 1296-97 (4th Cir. 1995); United States v. Ezeiruaku, 936 F.2d
136, 143 (3d Cir. 1991); United States v. Cardona, 769 F.2d 625, 629 (9th Cir. 1985); United
States v. Udofot, 711 F.2d 831, 839-40 (8th Cir. 1983).
In addition to longstanding federal court precedent recognizing the constitutional authority of the
U.S. government to conduct border searches, numerous federal statutes and regulations also
authorize CBP to inspect and examine all individuals and merchandise entering or departing the
United States, including all types of personal property, such as electronic devices. See, e.g., 8
U.S.C. §§ 1225, 1357; 19 U.S.C. §§ 482, 507, 1461, 1496, 1581, 1582, 1589a, 1595a; see also
19 C.F.R. § 162.6 ("All persons, baggage, and merchandise arriving in the Customs territory of
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 4 of 12 PageID: 42
-4
the United States from places outside thereof are liable to inspection and search by a Customs
officer."). These authorities support CBP's enforcement and administration of federal law at the
border and facilitate the inspection of merchandise and people to fulfill the immigration,
customs, agriculture, and counterterrorism missions of the Department. This includes, among
other things, the responsibility to "ensure the interdiction of persons and goods illegally entering
or exiting the United States"; "detect, respond to, and interdict terrorists, drug smugglers and
traffickers, human smugglers and traffickers, and other persons who may undermine the security
of the United States"; "safeguard the borders of the United States to protect against the entry of
dangerous goods"; "enforce and administer all immigration laws"; "deter and prevent the illegal
entry of terrorists, terrorist weapons, persons, and contraband"; and "conduct inspections at []
ports of entry to safeguard the United States from terrorism and illegal entry of persons."
6 u.s.c. §' 211.
CBP must conduct border searches of electronic devices in accordance with statutory and
regulatory authorities and applicable judicial precedent. CBP' s broad authority to conduct
border searches is well-established, and courts have rejected a categorical exception to the border
search doctrine for electronic devices. Nevertheless, as a policy matter, this Directive imposes
certain requirements, above and beyond prevailing constitutional and legal requirements, to
ensure that the authority for border search of electronic devices is exercised judiciously,
responsibly, and consistent with the public trust.
5 PROCEDURES
5 .1.2 Border searches of electronic devices may include searches of the information stored on
the device when it is presented for inspection or during its detention by CBP for an inbound or
outbound border inspection. The border search will include an examination of only the
information that is resident upon the device and accessible through the device's operating system
or through other software, tools, or applications. Officers may not intentionally use the device to
access information that is solely stored remotely. To avoid retrieving or accessing information
stored remotely and not otherwise present on the device, Officers will either request that the
traveler disable connectivity to any network (e.g., by placing the device in airplane mode), or,
where warranted by national security, law enforcement, officer safety, or other operational
considerations, Officers will themselves disable network connectivity. Officers should also take
care to ensure, throughout the course of a border search, that they do not take actions that would
make any changes to the contents of the device.
5.1.3 Basic Search. Any border search of an electronic device that is not an advanced search,
as described below, may be referred to as a basic search. In the course of a basic search, with or
without suspicion, an Officer may examine an electronic device and may review and analyze
information encountered at the border, subject to the requirements and limitations provided
herein and applicable law. ·
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 5 of 12 PageID: 43
-5
5 .1.4 Advanced Search. An advanced search is any search in which an Officer connects
external equipment, through a wired or wireless connection, to an electronic device not merely to
gain access to the device, but to review, copy, and/or analyze its contents. In instances in which
there is reasonable suspicion of activity in violation of the laws enforced or administered by
CBP, or in which there is a national security concern, and with supervisory approval at the Grade
14 level or higher (or a manager with comparable responsibilities), an Officer may perform an
advanced search of an electronic device. Many factors may create reasonable suspicion or
constitute a national security concern; examples include the existence of a relevant national
security-related lookout in combination with other articulable factors as appropriate, or the
presence of an individual on a government-operated and government-vetted terrorist watch list.
5.1.5 Searches of electronic devices will be documented in appropriate CBP systems, and
advanced searches should be conducted in the presence of a supervisor. In circumstances where
operational considerations prevent a supervisor from remaining present for the entire advanced
search, or where supervisory presence is not practicable, the examining Officer shall, as soon as
possible, notify the appropriate supervisor about the search and any results thereof.
5 .1.6 Searches of electronic devices should be conducted in the presence of the individual
whose information is being examined unless there are national security, law enforcement, officer
safety, or other operational considerations that make it inappropriate to permit the individual to
remain present. Permitting an individual to remain present during a search does not necessarily
mean that the individual shall observe the search itself. If permitting an individual to observe the
search could reveal law enforcement techniques or potentially compromise other operational
considerations, the individual will not be permitted to observe the search itself.
5 .2.1 Officers encountering information they identify as, or that is asserted to be, protected by
the attorney-client privilege or attorney work product doctrine shall adhere to the following
procedures.
5.2.1.1 The Officer shall seek clarification, if practicable in writing, from the individual
asserting this privilege as to specific files, file types, folders, categories of files, attorney or client
names, email addresses, phone numbers, or other particulars that may assist CBP in identifying
privileged information.
5 .2.1.2 Prior to any border search of files or other materials over which a privilege has been
asserted, the Officer will contact the CBP Associate/Assistant Chief Counsel office. In
coordination with the CBP Associate/Assistant Chief Counsel office, which will coordinate with
the U.S. Attorney's Office as needed, Officers will ensure the segregation of any privileged
material from other information examined during a border search to ensure that any privileged
material is handled appropriately while also ensuring that CBP accomplishes its critical border
security mission. This segregation process will occur through the establishment and employment
of a Filter Team composed of legal and operational representatives, or through another
appropriate measure with written concurrence of the CBP Associate/Assistant Chief Counsel
office.
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 6 of 12 PageID: 44
-6
5.2.1.3 At the completion of the CBP review, unless any materials are identified that indicate an
imminent threat to homeland security, copies of materials maintained by CBP and determined to
be privileged will be destroyed, except for any copy maintained in coordination with the CBP
Associate/Assistant Chief Counsel office solely for purposes of complying with a litigation hold
or other requirement of law.
5.2.2 Other possibly sensitive information, such as medical records and work-related
information carried by journalists, shall be handled in accordance with any applicable federal law
and CBP policy. Questions regarding the review of these materials shall be directed to the CBP
Associate/Assistant Chief Counsel office, and this consultation shall be noted in appropriate CBP
systems.
5 .2.3 Officers encountering business or commercial information in electronic devices shall treat
such information as business confidential information and shall protect that information from
unauthorized disclosure. Depending on the nature of the information presented, the Trade
Secrets Act, the Privacy Act, and other laws, as well as CBP policies, may govern or restrict the
handling of the information. Any questions regarding the handling of business or commercial
information may be directed to the CBP Associate/Assistant Chief Counsel office or the CBP
Privacy Officer, as appropriate.
5.2.4 Information that is determined to be protected by law as privileged or sensitive will only
be shared with agencies or entities that have mechanisms in place to protect appropriately such
information, and such information will only be shared in accordance with this Directive.
5.3.1 Travelers are obligated to present electronic devices and the information contained
therein in a condition that allows inspection ofthe device and its contents. If presented with an
electronic device containing information that is protected by a passcode or encryption or other
security mechanism, an Officer may request the individual's assistance in presenting the
electronic device and the information contained therein in a condition that allows inspection of
the device and its contents. Passcodes or other means of access may be requested and retained as
needed to facilitate the examination of an electronic device or information contained on an
electronic device, including information on the device that is accessible through software
applications present on the device that is being inspected or has been detained, seized, or retained
in accordance with this Directive.
5.3.2 Passcodes and other means of access obtained during the course of a border inspection
will only be utilized to facilitate the inspection of devices and information subject to border
search, will be deleted or destroyed when no longer needed to facilitate the search of a given
device, and may not be utilized to access information that is only stored remotely.
5.3.4 Nothing in this Directive limits CBP's ability, with respect to any device pre~ented in a
manner that is not readily accessible for inspection, to seek technical assistance, or to use
external equipment or take other reasonable measures, or in consultation with the CBP
Associate/Assistant Chief Counsel office to pursue available legal remedies, to render a device in
a condition that allows for inspection of the device and its contents.
An Officer may detain electronic devices, or copies of information contained therein, for a brief,
reasonable period of time to perform a thorough border search. The search may take place on
site or at an off-site location, and is to be completed as expeditiously as possible. Unless
extenuating circumstances exist, the detention of devices ordinarily should not exceed five (5)
days. Devices must be presented in a manner that allows CBP to inspect their contents. Any
device not presented in such a manner may be subject to exclusion, detention, seizure, or other
appropriate action or disposition.
5.4.1.1 Approval of and Time Frames for Detention. Supervisory approval is required for
detaining electronic devices, or copies of information contained therein, for continuation of a
border search after an individual's departure from the port or other location of detention. Port
Director; Patrol Agent in Charge; Director, Air Operations; Director, Marine Operations; Special
Agent in Charge; or other equivalent level manager approval is required to extend any such
detention beyond five (5) days. Extensions of detentions exceeding fifteen (15) days must be
approved by the Director, Field Operations; Chief Patrol Agent; Director, Air Operations;
Director, Marine Operations; Special Agent in Charge; or other equivalent manager, and may be
approved and re-approved in increments of no more than seven (7) days. Approvals for
detention and any extension thereof shall be noted in appropriate CBP systems.
5.4.1.2 Destruction. Except as noted in section 5.5 or elsewhere in this Directive, if after
reviewing the information pursuant to the time frames discussed in section 5.4, there is no
probable cause to seize the device or the information contained therein, any copies of the
information held by CBP must be destroyed, and any electronic device must be returned. Upon
this determination, the copy of the information will be destroyed as expeditiously as possible, but
no later than seven (7) days after such determination unless circumstances require additional
time, which must be approved by a supervisor and documented in an appropriate CBP system
and which must be no later than twenty-one (21) days after such determination. The destruction
shall be noted in appropriate CBP systems.
impairing national security, law enforcement, officer safety, or other operational interests,
notification may be withheld.
5.4.2 Assistance
Officers may request assistance that may be needed to access and search an electronic device and
the information stored therein. Except with respect to assistance sought within CBP or from
ICE, the following subsections of 5.4.2 govern requests for assistance.
5.4.2.1 Technical Assistance. Officers may sometimes need technical assistance to render a
device and its contents in a condition that allows for inspection. For example, Officers may
encounter a device or information that is not readily accessible for inspection due to encryption
or password protection. Officers may also require translation assistance to inspect information
that is in a foreign language. In such situations, Officers may convey electronic devices or
copies of information contained therein to seek technical assistance.
5.4.2.2 Subject Matter Assistance- With Reasonable Suspicion or National Security Concern.
Officers may encounter information that requires referral to subject matter experts to determine
the meaning, context, or value of information contained therein as it relates to the laws enforced
or administered by CBP. Therefore, Officers may convey electronic devices or copies of
information contained therein for the purpose of obtaining subject matter assistance when there
is a national security concern or they have reasonable suspicion of activities in violation of the
laws enforced or administered by CBP.
5.4.2.3 Approvals for Seeking Assistance. Requests for assistance require supervisory approval
and shall be properly documented and recorded in CBP systems. If an electronic device is to be
detained after the individual's departure, the Officer detaining the device shall execute a Form
6051D and provide a copy to the individual prior to the individual's departure. All transfers of
the custody of the electronic device will be recorded on the Form 6051D.
5.4.2.4 Electronic devices should be transferred only when necessary to render the requested
assistance. Otherwise, a copy of data from the device should be conveyed in lieu of the device in
accordance with this Directive. ·
5.4.2.5 When an electronic device or information contained therein is conveyed for assistance,
the individual subject to search will be notified of the conveyance unless the Officer or other
appropriate CBP official determines, in consultation with the receiving agency or other entity as
appropriate, that notification would impair national security, law enforcement, officer safety, or
other operational interests. If CBP seeks assistance for counterterrorism purposes, if a relevant
national security-related lookout applies, or if the individual is on a government-operated and
government-vetted terrorist watch list, the individual will not be notified of the conveyance, the
existence of a relevant national security-related lookout, or his or her presence on a watch list.
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 9 of 12 PageID: 47
-9
When notification is made to the individual, the Officer will annotate the notification in CBP
systems and on the Form 6051D.
5.4.3.2 Time for Assistance. Responses from assisting agencies or entities are expected in an
expeditious manner so that CBP may complete the border search in a reasonable period of time.
Unless otherwise approved by the Director Field Operations; Chief Patrol Agent; Director, Air
Operations; Director, Marine Operations; Special Agent in Charge; or equivalent level manager,
responses should be received within fifteen (15) days. If the assisting agency or entity is unable
to respond in that period of time, the Director Field Operations; Chief Patrol Agent; Director, Air
Operations; Director, Marine Operations; Special Agent in Charge; or equivalent level manager
may permit extensions in increments of seven (7) days.
5.4.3.3 Revocation of a Request for Assistance. If at any time a CBP supervisor involved in a
request for assistance is not satisfied with the assistance provided, the timeliness of assistance, or
any other articulable reason, the request for assistance may be revoked, and the CBP supervisor
may require the as~isting agency or entity to return to CBP all electronic devices provided, and
any copies thereof, as expeditiously as possible, except as noted in 5 .5.2.3. Any such revocation
shall be documented in appropriate CBP systems. When CBP has revoked a request for
assistance because of the lack of a timely response, CBP may initiate the request with another
agency or entity pursuant to the procedures outlined in this Directive.
5.4.3.4 Destruction. Except as noted in section 5.5.1 below or elsewhere in this Directive, if
after reviewing information, probable cause to seize the device or the information from the
device does not exist, CBP will retain no copies of the information.
5.5.1.1 Retention with Probable Cause. Officers may seize and retain an electronic device, or
copies of information from the 4evice, when, based on a review ofthe electronic device
encountered or on other facts and circumstances, they determine there is probable cause to
believe that the device, or copy of the contents from the device, contains evidence of a violation
of law that CBP is authorized to enforce or administer.
collected in the course of immigration processing for the purposes of present and future
admissibility of an alien may be retained in the A-file, Central Index System, TECS, and/or E3
or other systems as may be appropriate and consistent with the policies governing such systems.
5.5.1.3 Sharing Generally. Nothing in this Directive limits the authority of CBP to share copies
of information ·contained in electronic devices (or portions thereof), which are retained in
accordance with this Directive, with federal, state, local, and foreign law enforcement agencies
to the extent consistent with applicable law and policy.
5.5.1.4 Sharing of Terrorism Information. Nothing in this Directive is intended to limit the
sharing of terrorism-related information to the extent the sharing of such information is
authorized by statute, Presidential Directive, or DHS policy. Consistent with 6 U.S.C. §
122(d)(2) and other applicable law and policy, CBP, as a component ofDHS, will promptly
share any terrorism information encountered in the course of a border search with entities of the
federal government responsible for analyzing terrorist threat information. In the case of such
terrorism information sharing, the entity receiving the information will be responsible for
providing CBP with all appropriate findings, observations, and conclusions relating to the laws
enforced by CBP. The receiving entity will be responsible for managing retention and
disposition of information it receives in accordance with its own legal authorities and
responsibilities.
5.5.1.5 Safeguarding Data During Storage and Conveyance. CBP will appropriately safeguard
information retained, copied, or seized under this Directive and during conveyance. Appropriate
safeguards include keeping materials in locked cabinets or rooms, documenting and tracking
copies to ensure appropriate disposition, and other safeguards during conveyance such as
password protection or physical protections. Any suspected loss or compromise of information
that contains personal data retained, copied, or seized under this Directive must be immediately
reported to the CBP Office of Professional Responsibility and to the Port Director; Patrol Agent
in Charge; Director, Air Operations; Director, Marine Operations; Special Agent in Charge; or
equivalent level manager.
5.5.1.6 Destruction. Except as noted in this section or elsewhere in this Directive, if after
reviewing information, there exists no probable cause to seize the information, CBP will retain
no copies of the information.
5.5.2.1 During Assistance. All electronic devices, or copies of information contained therein,
provided to an assisting agency or entity may be retained for the period of time needed to
provide the requested assistance to CBP or in accordance with section 5.5.2.3 below.
5.5.2.2 Return or Destruction. CBP will request that at the conclusion of the requested
assistance, all information be returned to CBP as expeditiously as possible, and that the assisting
agency or entity advise CBP in accordance with section 5.4.3 above. In addition, the assisting
agency or entity should destroy all copies of the information conveyed unless section 5.5.2.3
below applies. In the event that any el~ctronic devices are conveyed, they must not be destroyed;
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 11 of 12 PageID: 49
- 11
they are to be returned to CBP unless seizec;l by an assisting agency based on probable cause or
retained per 5.5.2.3.
5.5.2.3 Retention with Independent Authority. If an assisting federal agency elects to continue
to retain or seize an electronic device or information contained therein, that agency assumes
responsibility for processing the retention or seizure. Copies may be retained by an assisting
federal agency only if and to the extent that it has the independent legal authority to do so - for
example, when the inform~tion relates to terrorism or national security and the assisting agency
is authorized by law to receive and analyze such information. In such cases, the retaining agency
should advise CBP of its decision to retain information under its own authority.
5.6.1 The Officer performing the border search of information shall be responsible for
completing all after-action reporting requirements. This responsibility includes ensuring the
completion of all applicable documentation such as the Form 6051D when appropriate, and
creation and/or updating records in CBP systems. Reports are to be created and updated in an
accurate, thorough, and timely manner. Reports must include all information related to the
search through the final disposition including supervisory approvals and extensions when
appropriate.
5.6.3 Reporting requirements for this Directive are in addition to, and do not replace, any other
applicable reporting requirements.
5.7.1 The duty supervisor shall ensure that the Officer completes a thorough inspection and
that all notification, documentation, and reporting requirements are accomplished.
5.7.2 The appropriate CBP second-line supervisor shall approve and monitor the status of the
detention of all electronic devices or copies of information contained therein.
5.7.3 The appropriate CBP second-line supervisor shall approve and monitor the status of the
transfer of any electronic device or copies of information contained therein for translation,
decryption, or subject matter assistance from another agency or entity.
5.7.4 The Director, Field Operations; Chief Patrol Agent; Director, Air Operations; Director,
Marine Operations; Special Agent in Charge; or equivalent level manager shall establish
protocols to monitor the proper documentation and recording of searches conducted pursuant to
this Directive and the detention, transfer, and final disposition of electronic devices or copies of
Case 2:18-cv-13113-SDW-LDW Document 1-9 Filed 08/23/18 Page 12 of 12 PageID: 50
- 12
information contained therein in order to ensure compliance with the procedures outlined in this
Directive.
5.7.5 Officers will ensure, in coordination with field management as appropriate, that upon
receipt of any subpoena or other request for testimony or information regarding the border search
of an electronic device in any litigation or proceeding, notification is made to the appropriate
CBP Associate/Assistant Chief Counsel office.
9 REVIEW. This Directive shall be reviewed and updated, as necessary, at least every
three years.
Acting Commissioner
Case 2:18-cv-13113-SDW-LDW Document 1-10 Filed 08/23/18 Page 1 of 1 PageID: 51