EFTA01207766
EFTA01207793 DataSet-9
EFTA01207815

EFTA01207793.pdf

DataSet-9 22 pages 17,194 words document
P19 D6 P17 V13 P18
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (17,194 words)
United States v. Kim, — F.Supp.3d (2015) 2015 WL 2148070 Only the Westlaw citation is currently available. West Headnotes (14) United States District Court, District of Columbia. Arrest United States of America 4 -Reasonableness; reason or founded v. suspicion, etc Jae Shik Kim, Karham Eng. Corp., Defendants. Law enforcement officer has reasonable Crim. Action No. 13—oloo (ABJ) J Signed May 8, suspicion of criminal activity, of kind sufficient 2015 to support investigatory stop, if officer can point to specific and articulable facts which, when considered together with rational inferences that Synopsis can be drawn from those facts, indicate that Background: Defendant charged with violating export criminal activity may be afoot. U.S. Const. control laws moved to suppress evidence discovered Amend. 4. during warrantless search of laptop computer that was seized as he was departing from the United States for his Cases that cite this headnote home country of Korea. Holdings: The District Court, Amy Berman Jackson, J., Arrest held that: oiFReasonableness; reason or founded suspicion, etc In mere fact that alien may have previously participated in unlawful export of controlled articles to Iran in violation Court's determination of whether officer had of export control laws did not provide special agent of the reasonable suspicion of criminal activity, of kind Department of Homeland Security (DHS) with reasonable required to support investigatory stop, must be suspicion of any ongoing or imminent criminal activity, based on totality of the circumstances. U.S. of kind sufficient to support seizure and search of Const. Amend. 4. contents of alien's laptop computer as he was departing for his home country of Korea following his most recent visit to the United States; Cases that cite this headnote (2)in assessing reasonableness of search„ it was not appropriate for court to simply categorize the laptop as "container," of kind which may be subjected to warrantless search at border; and PI Arrest (iReasonableness; reason or founded P) search was supported by so little suspicion of ongoing suspicion, etc or imminent criminal activity, and was so invasive of defendant's privacy and so disconnected from not only Reasonable suspicion of criminal activity, of the considerations underlying the breadth of government's kind required to support investigatory stop, is authority to search at border, but also the actual border reasonable suspicion of ongoing or imminent itself, that it was unreasonable and violative of Fourth crime. U.S. Const. Amend. 4. Amendment. Cases that cite this headnote Motion granted. WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 1 EFTA01207793 United States v. Kim, — F.Supp.3d (2015) Customs Duties international border. U.S. Const. Amend. 4. ii-Particular Objects or Products Mere fact that alien may have previously Cases that cite this headnote participated in unlawful export of controlled articles to Iran in violation of export control laws did not provide special agent of the Department of Homeland Security (DHS) with 171 Customs Duties reasonable suspicion of any ongoing or imminent criminal activity, of kind sufficient to 6-Grounds or cause for stop, search, or seizure support seizure and search of contents of alien's laptop computer as he was departing for his Routine searches of the persons and effects of home country of Korea following his most entrants at international border are not subject to recent visit to the United States, where alien had any requirement of reasonable suspicion, business interests in the United States sufficient probable cause, or warrant. U.S. Const. Amend. to explain his frequent visits, where prior 4. incident in which alien allegedly participated in unlawful export of controlled articles to Iran did Cases that cite this headnote not involve his travel to the United States, and where special agent conducted no surveillance of alien while he was in the United States on his latest trip and uncovered nothing during his encounter with alien in airport to suggest any IBI Searches and Seizures ongoing or imminent violation of export laws. it-Fourth Amendment and reasonableness in U.S. Const. Amend. 4. general Ultimate touchstone of validity of search under Cases that cite this headnote the Fourth Amendment is reasonableness. U.S. Const. Amend. 4. Cases that cite this headnote Arrest -4Reasonableness; mason or founded suspicion, etc Evidence of prior criminal conduct alone is 191 Searches and Seizures insufficient to give rise to reasonable suspicion P-Necessity of and preference for warrant, and of ongoing or imminent criminal activity, of exceptions in general kind required to support investigatory stop. U.S. Const. Amend. 4. When search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing, reasonableness generally requires Cases that cite this headnote the obtaining of judicial warrant. U.S. Const. Amend. 4. Cases that cite this headnote 1'1 Aliens, Immigration, and Citizenship 6.-Border Stops and Inspections Customs Duties -4Searches and Seizures Ira Searches and Seizures Government's interest in preventing the entry of -4Necessity of and preference for warrant, and unwanted persons and effects is at its zenith at exceptions in general WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 2 EFTA01207794 United States v. Kim, — F.Supp.3d (2015) longstanding right of the sovereign to protect In the absence of warrant, search is reasonable itself by stopping and examining persons only if it falls within a specific exception to crossing into the country, are reasonable simply warrant requirement. U.S. Const. Amend. 4. by virtue of fact that they occur at the border. U.S. Const. Amend. 4. Cases that cite this headnote Cases that cite this headnote Ittl Customs Duties ti-Particular Objects or Products Itrl Customs Duties iTime and distance factors; checkpoints In assessing the reasonableness, for Fourth Customs Duties Amendment purposes, of law enforcement ti.Scope and Nature; Successive or Secondary agent's conduct in seizing laptop computer of Searches alien suspected of having violated export laws in the past before alien boarded aircraft to return to Law enforcement agent's imaging and search of his home country of Korea, and in having hard entire contents of alien's laptop computer, aided drive copied so that it could be subjected to by specialized forensic software, over period of search of indefinite duration using specialized unlimited duration and conducting examination computer software, it was not appropriate for of unlimited scope, for the purpose of gathering court to simply categorize the laptop as evidence of pre-existing export violation, was "container," of kind which may be subjected to supported by so little suspicion of ongoing or warrantless search at border, especially given imminent criminal activity, and was so invasive the wealth of personal information that could be of alien's privacy and so disconnected from not stored on laptop and fact that actual examination only the considerations underlying the breadth and analysis of contents of laptop's hard drive of government's authority to search at border, occurred over period of weeks at location far but also the actual border itself, that it was removed from border; rather, to determine unreasonable and violative of alien's Fourth constitutionality of agent's conduct, district Amendment rights. U.S. Const. Amend. 4. court had to proceed by assessing, on the one hand, the degree to which search intruded on alien's privacy and, on the other, the degree to Cases that cite this headnote which it was necessary for promotion of legitimate governmental interests. U.S. Const. Amend. 4. Ildj Aliens, Immigration, and Citizenship Cases that cite this hcadnotc tii heckpoints Customs Duties i•Time and distance factors; checkpoints Concept of "border" search, for Fourth 1121 Aliens, Immigration, and Citizenship Amendment purposes, extends beyond the eBorder Stops and Inspections physical boundary itself to the functional Customs Duties equivalent of border, which may include an ti•Searches and Seizures established station near the border or other nearby convenient locations. U.S. Const. Government's power to conduct warrantless Amend. 4. searches at the border arises out of the sovereign's right and need to protect its territorial integrity and national security; Cases that cite this headnote searches made at the border, pursuant to WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 3 EFTA01207795 United States v. Kim, — F.Supp.3d (2015) border to protect the homeland is the beginning and end of the matter. Attorneys and Law Firms But to apply those principles under the facts of this case would mean that the border search doctrine has no Frederick Walton Yette, U.S. Attorney's Office, borders. The search of the laptop began well after Kim Washington, DC, for United States of America. had already departed, and it was conducted approximately 150 miles away from the airport. The government engaged in an extensive examination of the entire contents of Kim's hard drive after it had already been secured, and it accorded itself unlimited time to do so. MEMORANDUM OPINIONAND ORDER There was little or no reason to suspect that criminal activity was afoot at the time Kim was about to cross the border, and there was little about this search—neither its AMY BERMAN JACKSON, United States District Judge location nor its scope and duration—that resembled a routine search at the border. The fundamental inquiry *I In this case involving the enforcement of export required under the Fourth Amendment is whether the control laws and the trade embargo with Iran, defendant invasion of the defendant's right to privacy in his papers Jae Shik Kim has moved to suppress the evidence the and effects was reasonable under the totality of the United States harvested from a laptop computer it seized circumstances, and the Court finds that it was not. from him when he was departing the country through Los Angeles International Airport. Kim is a Korean businessman with business operations in both Korea and California, and in October of 2012, investigators with the Department of Homeland Security obtained information PROCEDURAL HISTORY that he was involved in a previous shipment of controlled articles to a Chinese businessman in Korea, who then On March 28, 2013, Kim and his company, Karham Eng. forwarded them to customers in Iran. The Special Agent Corp. ("Karham"), were indicted for violations of a handling the investigation decided to search Kim's laptop number of statutes, including the International Emergency computer for evidence the next time Kim came to the Economic Powers Act ("IEEPA"), 50 U.S.0 § 1701 et United States, and in December 2012, he obtained the seq., the Arms Export Control Act ("AECA"), 22 U.S.C. computer from Kim before permitting him to board his § 2778, and the International Traffic in Arms Regulation flight home. The next day, the laptop was shipped to an ("ITAR"), 22 C.F.R. pts. 120-30. Indictment [Dkt. N I]. agency forensic specialist in San Diego, who created an These laws and regulations govern economic sanctions identical copy of the hard drive, which was then searched imposed by the United States against certain countries, using specialized software and a list of keywords. The such as Iran, and the export of certain "defense articles" thousands of files that were extracted from the keyword from the United States. The United States alleges that search were then burned onto a DVD and returned to the from around December 2007 through March 2010, case agent for further review. defendants conspired to export defense articles without the required export licenses for sale to intermediaries in After incriminating emails were uncovered through that China and Korea and ultimate customers in Iran. process, the agent sought and obtained a warrant based Indictment ¶ 17. The defense articles at issue—six upon the content of the emails to conduct the search of the Q—Flex Accelerometers, Models QA-2000-10, hard drive that had already been completed and to seize QA-2000-20, or QA-3000—are aircraft parts the emails that had already been reviewed. Those emails manufactured by Honeywell Aerospace which are used in now form a part of the basis of this prosecution, and Kim aircraft and missile navigation systems. Indictment TT 3, moves to suppress that evidence, arguing that his rights 16(1), 17(3). They appear on the export control list, and under the Fourth Amendment of the Constitution have an export license is required before they may be exported been violated. legally from the United States. 22 U.S.C. § 2778(bX2); 22 C.F.R. pt. 123.1(a). The government points to its plenary authority to conduct warrantless searches at the border. It posits that a laptop *2 On March 2, 2015, defendants filed the instant motion computer is simply a "container" that was examined to suppress. Dots.' Mot to Suppress Evidence [Dkt. # 35] pursuant to this authority, and it submits that the ("Defs.' Mot."). The parties briefed the motion, Gov't's government's unfettered right to search cargo at the Opp. to Defs.' Mot. [Dkt. # 37] ("Gov't Opp."); Defs.' WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 4 EFTA01207796 United States v. Kim, — F.Supp.3d (2015) Reply in Supp. of Defs.' Mot. [Dkt. # 38] ("Defs.' at 3; see also 4/7 Tr. at 17. The emails included several Reply"), and the Court held an evidentiary hearing on communications with "Uncle Kim" atJS®karham.co.kr: April 7 and 8, 2015, at which the following facts were established. • an email dated June 24, 2010 from Yang to Kim that stated, "There is an inquiry from a domestic client for Honeywell products. It is not for military application and I confirm the end user is not Iranian," to which Kim responded on the same day, FACTUAL BACKGROUND "Thanks! Raymond, I will also check the Honeywell parts whether [w]e can buy them." A. The Government's Investigation of Bin Yang • emails between Yang and Kim from July 2010 In 2011, Special Agent Kevin Hamako of the Department relating to the purchase of various items not subject of Homeland Security ("DHS") Homeland Security to export controls Investigations office was investigating a Chinese national, Bin Yang, also known as Raymond Yang, for export • an email from almost a year later, dated March 28, control violations, specifically the unlawful export of 2011, in which Yang asked Kim if he could identify accelerometers to China and Iran. Mots. Hr'g Tr., April 7, a source for other parts that are not subject to 2015 ("4/7 Tr.") at 7. As part of the investigation, Special controls: "Dear Uncle Kim Hi. I have the inquiry for Agent Hamako worked with an undercover agent who Honeywell QAT 185/160 model, about 150pcs for communicated with Yang by email and telephone. 4/7 Tr. each model per year. 3pcs is a completed unit. First at 14. trial order, the client will buy 9pcs for each model as a start. Do you have any good sources to supply On April I, 2011, Yang sent the undercover agent an them." On the same date, Kim responded, "Now, Mr email asking to obtain Honeywell QA-3000-30's from Ji are checking it with ow USA office. And also, him, and he offered: "Because my uncle has a sudden Tomorrow, I will go to USA with Mr. Ji and stopped schedule to USA, he may could meet you and pay you." in USA office. We will check it again and feed back Report of Investigation, No. 107, May 20, 2011, Gov't you soon." Ex. 3 ("May 2011 ROI") at 3. *3 • an email from Yang to Kim dated April I, 2011, On April 4, 2011, Yang sent the undercover agent another stating: "I see that you will go to U.S.A, it is very email stating, "My uncle just has his sudden trip to US, he good. For your reference, I get a message that there may meet you and only see the goods and maybe pay is supplier could supply us some stocks of QA3000. you." May 2011 ROI at 3. But I don't have successful business with him before, but we could buy his goods if his stocks are In an April 5, 2011 telephone conversation between Yang ok. Dear Uncle Kim, can you please have a check if and the undercover agent, Yang again volunteered that he you agree. We could pay you, so you can buy it in had a contact who would be traveling to the United States USA.... QAT 185 and 160 are not sensitive products, who could inspect the QA-3000 accelerometers that Yang and if you can supply, we could buy from you, and hoped to buy. May 2011 ROI at 3; 4/7 Tr. at 15-16. Yang there is no worry to pay the deposit, because I trust proposed to have his "uncle" travel to the United States, my uncle." inspect the accelerometers, and provide payment for them. 4/7 Tr. at 15-16. He also stated he did not want his May 2011 ROI at 4-6. "uncle" to physically carry the items out of the country because he was afraid that U.S. customs officials would On April 5, 2011, Yang had the recorded telephone call discover them. 4/7 Tr. at 16; see also Report of with the undercover agent described above in which he Investigation, No. 114, Jun. 22, 2011, Gov't Ex. 2 ("Jun. proposed that his "uncle" could inspect the parts Yang 2011 ROI") at 3 (detailing information about the April 5, hoped to buy. As of May 2011, though, the agents were 2011 telephone call). At that point, the unidentified aware that Yang's inquiry to Kim had borne no fruit and "uncle" became a further subject of the investigation. 4/7 the undercover operation was over. 4/7 Tr. at 72 (stating Tr. at 16. the agents knew "fairly soon after, within maybe a couple of weeks" that the operation was not going ahead). On April 27, 2011, Special Agent Hamako obtained and executed a warrant to search and seize Yang's emails, and on May 12, 2011, he received the emails. May 2011 ROI WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 5 EFTA01207797 United States v. Kim, — F.Supp.3d (2015) B. The Identification of "Uncle Kim" and his On October IS, 2012, Special Agent Hamako interviewed Companies Yang. 4/7 Tr. at 9; see also Report of Investigation No. On June 21, 2011, Special Agent Hamako was able to 146, Nov. 15, 2012, Gov't Ex. 1 ("Nov. 2012 ROI") at identify "Uncle Kim" as defendant Jae Shik Kim by 3-5 (reporting results of the Yang debrief). Yang told searching a government database for theJS investigators that at some point in 2008 or 2009, he ®karham.co.kr email address. 4/7 Tr. at 21-22; Jun. 2011 purchased six QA-2000 accelerometers from Kim, which ROI at 3-4. The email address appeared in U.S. State were shipped to him in China without an export license. Department records on a non-immigrant visa application 4/7 Tr. at 10. Yang said that once he received the submitted by Kim. 4/7 Tr. at 21-22; Jun. 2011 ROI at 3. accelerometers, two of his Iranian customers traveled The application provided Special Agent Hamako with from Iran to China to receive them directly. Id. Yang told other information about Kim, including his date of birth, Special Agent Hamako that Kim purchased the passport number, and nationality. Jun. 2011 ROI at 3-4; accelerometers through his connections in the United 4/7 Tr. at 22. States, and they were shipped from the United States to China. 4/7 Tr. at 11; Nov. 2012 ROI at 3. While this is not From the visa application, Special Agent Hamako also reflected in the report of the interview, Special Agent determined that Kim was president of corporate defendant Hamako testified that Yang also told him that Kim knew Karham. 4/7 Tr. at 22. Through further research, he the accelerometers were destined for customers in Iran. learned that Karham was located in South Korea and 4/7 Tr. at II. Stevenson Ranch, California, and that Karham shared its Stevenson Ranch, California address with a company *4 As a result of the Yang interview, Special Agent called Apex Components. 4/7 Tr. at 22-23; see also Jun. Hamako decided to conduct what he characterized as a 2011 ROI at 3-5 (providing information about the border search of Kim's electronic devices "as he was identification of Kim). leaving the U.S. on his next travel." 4/7 Tr. at 110. Special Agent Hamako researched Karham and Apex I wanted to know when [Kim] was Components and found that Karham was involved in the returning to further my export and sale of equipment used in the oil industry and investigation in the sense that I petrochemical industries, including types of meters. 4/7 wanted to be ready to conduct more Tr. at 24. On a web-based government database, Special proactive steps if he was in the Agent Hamako found approximately thirty-nine shipper's U.S., specifically, to include a export declarations ("SEDs") from Karham for the export border search, surveillance, or other of meters from the United States to Australia and South activities to determine if he was Korea. 417 Tr. at 24. He found eight shipper's export engaged in any potential criminal declarations from Apex Components, which also showed activity while in the United States. exports of various industrial equipment from the United States to South Korea. 4/7 Tr. at 25. 4/7 Tr. at 33. At that time, it was the agent's understanding that no suspicion was required to conduct a Finally, Special Agent Hamako found travel records border search of any items Kim might be carrying, showing that defendant Kim arrived in Los Angeles including electronic devices. 4/7 Tr. at 32. International Airport ("LAX") on April 2, 2011, and departed LAX for Narita, Japan on April 14, 2011. Jun. Because of the ongoing investigation, Kim's name was in 2011 ROI at 4; see also 4/7 Tr. at 26. DHS's case management system, which meant Special Agent Hamako would receive an automatic email if Kim was booked on a flight to or from the United States. 4/7 Tr. at 32-33. Some time later, the agent received an email C. Yang's Arrest and Debrief notifying him that Kim was going to return to the United Early the following year, in January 2012, Yang was States in November 2012, and that he would be departing arrested and, in May 2012, he was extradited from LAX for South Korea on December 5, 2012. 4/7 Tr. at 33. Bulgaria to the United States. 4/7 Tr. at 9. He agreed to be debriefed by U.S. authorities in an effort to ameliorate his sentence. 4/7 Tr. at 9; see also Search Warrant, Ex. B to Defs.' Mot. [Dkt. # 35-2] ("Search Warrant"); Aff. in D. The December 5, 2012 Search of Kim Supp. of Appl. for Search Warrant, Ex. B to Defs.' Mot. Special Agent Hamako testified that while he understood [Dkt. # 35-2] ("SW Aff."), at 7 n.1. that he had the authority to conduct a border search of WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 6 EFTA01207798 United States v. Kim, — F.Supp.3d (2015) Kim without any level of suspicion that Kim was engaged *5 4/7 Tr. at 34-35. He added that based on Yang's in criminal activity, 4/7 Tr. at 34, he had grounds for that statements and Karham's general business activities, he suspicion in any event. was "concerned that [Kim] could be involved in further activity in the [Spates regarding illegal exports." 4/7 Tr. At that time my suspicion was at 39. But he testified that he did not know at the based on the debriefing of Yang in time—and he does not know now—what Kim did while which Yang stated he had he was in the United States between November 25 and previously successfully procured December 5, 2012, and that he did not conduct any ITAR controlled accelerometers surveillance or take any steps to find out before carrying from Mr. Kim, as well as the fact out his plan to obtain the laptop. 4/7 Tr. at 81. that Mr. Kim's company appeared to be engaging in exports from the On December 5, 2012, working with a LAX duty agent U.S. to South Korea and other and Customs and Border Protection officers, Special foreign locations, as well as the fact Agent Hamako conducted the planned search of Kim as that, more recently, Mr. Yang had he departed the country. 4/7 Tr. at 40. First, he searched asked Mr. Kim to view products in Kim's checked luggage, which was located behind the the U.S., inspect them and pay for check-in counter with Korean Airlines. Id. He found no them. accelerometers or contraband. 4/7 Tr. at 82-83. He did find a small plastic bag containing plastic o-rings, some 4/7 Tr. at 35. Special Agent Hamako stated that although unidentified industrial metal objects, and some product he knew Yang was incarcerated, he "wasn't sure if Mr. brochures. 4/7 Tr. at 40-41, 90. The agent was not able to Kim was in contact with other individuals who might be identify the applications of these particular o-rings seeking to illegally procure U.S. goods," and that his goal because he was not an aircraft parts expert, but said that was to ascertain whether Kim had other customers. 4/7 he knew "in other cases the Iranian Air Force had been Tr. at 35-36. Under questioning by the prosecutor at the seeking o-rings for their aircraft," and so he thought that hearing, the agent agreed that he also thought it was these small plastic ones "could be" on the munitions list, reasonable to believe that records of the 2008 and he kept them to determine their application. 4/7 Tr. at transactions, including emails, could still be saved on the 41-42. He later spoke with the manufacturer, and computer. 4/7 Tr. at 38-39. determined "it was very unlikely that they were export controlled items," and shipped them back to Kim. 4/7 Tr. Special Agent Hamako said he intended to conduct a at 43. Special Agent Hamako also testified that the metal border search of Kim as he departed the country rather objects in the luggage did not appear to have any moving than as he entered the country, parts or sensors or electronics and may have been a tripod, and the product brochures "didn't seem to be because if I believed at that time pertinent at the time." 4/7 Tr. at 87-88, 90. So he did not that he was traveling to the U.S. retain either the metal objects or the brochures and did not and might be conducting criminal photograph or document what they were. 4/7 Tr. at 88-89. activity while he was in the U.S., such as procuring products or Next, Special Agent Hamako stopped Kim on the jetway attempting to set up subsequent between the gate and the airplane as Kim was boarding deals, I would want to capture that his flight. 4/7 Tr. at 40, 43. He identified himself and information after he had done so, asked Kim if he had any electronics, to which Kim rather than before he had conducted responded that he had a laptop. 4/7 Tr. at 44. Special any such activity. So, conducting a Agent Hamako told Kim that he would be detaining the border search on the inbound side laptop pursuant to a border search and that he would could cause him to decide not to return it once the search was complete. Id. He also told conduct whatever activities or Kim that he would be detaining the o-rings until their operations he might have been export control status was determined. Id. Special Agent planning. Whereas, conducting the Hamako testified that he did not have an interpreter border search as he was leaving, in during the encounter with Kim because he did not our view, would be more likely to anticipate that he was likely to say anything obtain evidence of any criminal incriminating. 4/7 Tr. at 94. activity he had conducted during his trip. My goal at that time wasn't to WestlawNext © 2015 Thomson Reuters. No claim to original U.S. Government Works. 7 EFTA01207799 United States v. Kim, — F.Supp.3d (2015) conduct an in-depth interview or Special Agent Marshall explained as follows: subject interview of Mr. Kim, reading him his rights or anything Allocated space, in general, means like that, since my main goal was to space in your hard drive where ... obtain his electronics and then let files are living, files that you see on him go on his way. your desktop, maybe a photo of a family vacation or Word 4/7 Tr. at 95. This is precisely what took place, and Kim documents. Unallocated space boarded his flight. 4/7 Tr. at 45. refers to space that's not currently being used by—let's say it's Special Agent Hamako did not turn the laptop on or Windows, by Windows for any review its contents in any way during his search of Kim at files. And when you delete a file, it LAX. 4/7 Tr. at 45. He explained that "it would be goes into unallocated space.... inappropriate to search his laptop without—without an [U]nallocated space is space that's individual who's qualified to preserve the contents of the not currently being used by the laptop. Because if I were to turn on the laptop and just computer. begin searching it there, that would be altering the information on the laptop and could render any evidence I 4/8 Tr. at 9. found on it tainted or otherwise questionable, since I would be modifying the contents of the laptop by Special Agent Marshall placed the hard drive back into conducting searches on it. And also, because based on the Kim's laptop and returned the laptop to Special Agent time available, it could have taken who knows how long." Hamako on December 7, 2012. 4/8 Tr. at 8.: 4/7 Tr. at 45; see also 4/7 Tr. at I 15 (stating that "conducting a live search on his computer would have Also on December 7, 2012, Special Agent Marshall necessarily changed and altered the contents of the laptop, employed a software program called EnCase to export so I would not have conducted such a search"). Special files from Kim's computer. 4/8 Tr. at 10; see also Dec. Agent Hamako testified, "[M]y main goal was to obtain 2012 ROI at 4 (stating that he used commercially any electronics that he had on his person at that time." 4/7 available email analysis software to export files). He used Tr. at 94. EnCase to export six Microsoft Outlook email containers,' 8,184 Microsoft Excel spreadsheets, 11,315 Adobe PDF files, 2,062 Microsoft Word files, and 879 Microsoft PowerPoint files from the image. Dec. 2012 ROI at 4; see E. The Search of Kim's Computer also 4/8 Tr. at II. *6 On December 6, 2012, Special Agent Hamako submitted Kim's laptop to Special Agent David Marshall Special Agent Marshall used another program, Intella, to of the Homeland Security Investigation San Diego process the files. 4/8 Tr. at 10; see also Dec. 2012 ROI at Computer Forensics Group. Report of Investigation, No. 4. He testified that Intella is a powerful piece of software 147, Dec. 11, 2012, Gov't Ex. 5 ("Dec. 2012 Ron at 1, with a variety of capabilities, including the ability to 3; Mots. Hr'g Tr., April 8, 2015 ("4/8 Tr.") at 7-8;' see search the text of emails that are not otherwise searchable. also 4/7 Tr. at 99-100. Special Agent Hamako "requested 4/8 Tr. at 31. It also indexes and categorizes emails: a border search of the laptop" from Special Agent Marshall. 4/8 Tr. at 8. [A]n e-mail container can contain thousands of e-mails. So Intella To carry out Special Agent Hamako's request, Special will go through and open up the Agent Marshall removed the hard drive from Kim's e-mail, and what we call index and laptop and created a forensic image, or a duplicate copy, categorize the e-mail. So it looks at of it. 4/8 Tr. at 8. To do this, Special Agent Marshall all the e-mail information, the to connected a piece of hardware "about the size of a and the from, the dates, things like shoebox" to the laptop hard drive: the hardware creates that, the attachments, and it "an exact copy, reading every single bit, as we call it, processes those and categorizes all every single piece of data on the hard drive and making a that information so that the user can copy of that for me to analyze later on." 4/8 Tr. at 8-9. then go in and see all the e-mails from a certain person, you know, or The imaged copy included all files from both the to a certain person or on a date. allocated and unallocated space on the computer, which WestlawNexi © 2015 Thomson Reuters. No claim to original U.S Government Works. 8 EFTA01207800 United States v. Kim, — F.Supp.3d (2015) *7 4/8 Tr. at 31-32. And according to Special Agent the Iranian Transactions Regulations, and other statutes Hamako, it would have been "impractical" to use the would be contained in the files on Kim's laptop. SW Aff. search function in Outlook instead; given the 10. The affidavit states that the laptop was detained investigators' search methodologies, "Intella is more during a border search, that the government had imaged efficient." 4/7 Tr. at 105. the laptop, and that Special Agent Hamako reviewed emails obtained from the laptop for ten days. SW Aff. 11 These files were copied to a "case agent review" laptop 16-17. The affidavit then describes the contents of emails for Special Agent Hamako to review. 4/8 Tr. at II. When between Kim and Yang from December 2007 through Special Agent Marshall saw the number of files on the April 2008, showing that Kim helped Yang purchase six laptop, he asked Special Agent Hamako to give him a accelerometers without the required export control keyword list to use to "filter down the amount of license, and that the items were to be forwarded to Iran. information for him to review." 4/8 Tr. at II. SW Aft ¶¶ 18-40. On December 10, 2012, Special Agent Hamako gave The application stated further that, "[w]ith the approval of Special Agent Marshall a list of twenty-two keywords: the Court in signing this warrant, agents executing this QA-2000, QA-3000, G-2000, 7270A, accelerometers, search warrant will employ the following procedures" to gyroscope, angular, sensor, Honeywell, Endevco, search Kim's computer: forensic imaging, which the Northrop, Grumman, ITAR, sensitive, export, shipment, affidavit acknowledged had already occurred, and military, aircraft, missile, satellite, ballistic, and nuclear. identification and extraction of relevant data. SW Aff. 4/8 Tr. at 12-13. Using these keywords to screen the files 43-50. Special Agent Hamako explained: on Kim's laptop, Special Agent Marshall found approximately 5,900 files that had a keyword match. 4/8 *8 Analysis of the data following the creation of the Tr. at 13. He burned the files to a DVD and gave the forensic image can be a highly technical process DVD to Special Agent Hamako, along with the case agent requiring specific expertise, equipment and software. review laptop. Dec. 2012 ROI at 4; 4/8 Tr. at 13. There are literally thousands of different hardware items and software programs, and different versions of The next day, on December 11, 2012, Special Agent the same program, that can be commercially purchased, Marshall exported all of the picture files, which can installed and custom-configured on a user's computer include images of documents and not simply photographs, system. that were located in the allocated space of the sss computer—approximately 24,900 .jpg files. 4/8 Tr. at 13-14; Dec. 2012 ROI at 4. He copied all of those onto another DVD and gave the DVD to Special Agent Analyzing the contents of a computer or other Hamako. 4/8 Tr. at 13-14; Dec. 2012 ROI at 4. electronic storage device, even without significant technical challenges, can be very challenging. Special Agent Hamako then spent "[s]everal days" Searching by keywords, for example, often yields many reviewing the files obtained from Kim's computer, thousands of hits.... Merely finding a relevant hit does conducting keyword searches of the emails and not end the review process. The computer may have documents. 4/7 Tr. at 47; Search Warrant 1 17 (stating stored information about the data at issue: who created that Special Agent Hamako received the emails on it, when and how it was created or downloaded or December 10, 2012 and reviewed them until December copied, when was it last accessed, when was it last 19, 2012). He found emails consistent with the 2008 modified, when was it last printed and when it was transaction Yang described during the interview, and deleted.... Moreover, certain file formats do not lend those form the basis for the criminal charges in this case. themselves to keyword searches.... Many common 4/7 Tr. at 47-48. electronic mail, database and spreadsheet applications do not store data as searchable text. SW Aft. ¶¶ 45-46. F. The Search Warrant On January 13, 2013, Special Agent Hamako filed an According to the agent's affidavit, the "mind-boggling" application for a search warrant in the U.S. District Court amount of data stored on computers makes analyzing the for the Southern District of California. Search Warrant. data "increasingly time-consuming." SW Aff. ¶ 48. He provided an affidavit with the application, in which he Therefore, Special Agent Hamako predicted that "[t]he stated his belief that there was "probable cause to believe identification and extraction process ... may take weeks or that evidence relating to violations" of the ACEA, IEEPA, months." SW Aff. 1j 49. He also averred that the WestlawNext © 2015 Thomson Reuters. No claim to origin
ℹ️ Document Details
SHA-256
7e2ea00041e5432eb697257f2c51bf3ea2303c8e86012ac18580151b45146a60
Bates Number
EFTA01207793
Dataset
DataSet-9
Document Type
document
Pages
22

Comments 0

Loading comments…
Link copied!