In re Certified Question of Law

U.S. Court of Appeals4/14/2016
View on CourtListener

AI Case Brief

Generate an AI-powered case brief with:

📋Key Facts
⚖️Legal Issues
📚Court Holding
💡Reasoning
🎯Significance

Estimated cost: $0.001 - $0.003 per brief

Full Opinion

PER CURIAM.

The Foreign Intelligence Surveillance Court (“FISC”) certified this matter under 50 U.S.C. § 1803(j) for review by this court. The FISC certified the following question to us:

Whether an order issued under 50 U.S.C. § 1842 may authorize the Government to obtain all post-cut-through digits, subject to a prohibition on the affirmative investigative use of any contents thereby acquired, when there is no technology reasonably available to the Government that would permit:

(1) a PR/TT [pen register/trap-and-trace] device to acquire post-cut-through digits that are non-content DRAS [dialing, routing, addressing, and signaling] information, while not acquiring post-cut-through digits that are contents of a communication; or
(2) the Government at the time it receives information acquired by a PR/TT device, to discard post-cut-through digits that are contents of a communication, while retaining those digits that are non-content DRAS information.

*593We have reviewed the record and considered briefs from the government and from amicus curiae appointed by the court under 50 U.S.C. § 180S(i) to present argument in this matter. We conclude that section 1842 authorizes, and the Fourth Amendment to the Constitution of the United States does not prohibit, an order of the kind described in the RISC’s certification. Read fairly and as a whole, the governing statutes evince Congress’s understanding that pen registers and trap-and-trace devices will, under some circumstances, inevitably collect content information. Congress has addressed this difficulty by requiring the government to minimize the incidental collection of content through the employment of such technological measures as are reasonably available—not by barring entirely, as a form of prophylaxis, the use of pen registers and trap-and-trace devices simply because they might gather content incidentally.

Nor does an order authorizing such surveillance run afoul of the Fourth Amendment’s guarantee against unreasonable searches and seizures. The warrant requirement is generally a tolerable proxy for “reasonableness” when the government is seeking to unearth evidence of criminal wrongdoing, but it fails properly to balance the interests at stake when the government is instead seeking to preserve and protect the nation’s security from foreign threat. We therefore hold that surveillance of this type may be constitutionally reasonable even when it is not authorized by a probable-cause warrant. We further hold, on the facts presented here, that the order under review reasonably balances the investigative needs of the government and the privacy interests of the people.

I

On January 21, 2016, a judge of the FISC approved an Application for Pen Register and Trap and Trace Device(s) after finding that the application met the requirements for a pen register/trap-and-trace authorization order under the Foreign Intelligence Surveillance Act (“FISA”). The authorization provided for the installation and use of pen register/trap-and-trace devices on a cellular telephone number used by the subject of an ongoing investigation to protect against clandestine intelligence activities, with the assistance of the service provider for that number.1

As requested by the government, the court’s order granted “the authority to record and decode all post-cut-through digits,” as described in a memorandum filed by the government with the FISC on August 17, 2009, in connection with an earlier request for similar authorization. The court’s order further provided that the government “shall not make any affirmative investigative use of post-cut-through digits acquired through pen register authorization that do not constitute call dialing, routing, addressing or signaling information, unless separately authorized by this Court.” In a secondary order, the court directed the service provider to furnish “all information, facilities, or technical assistance necessary to accomplish the installation and operation of the ... device(s).”

“Post-cut-through digits” are numbers or characters that are dialed after the call *594is initially connected or “cut through.” Frequently, those numbers are other telephone numbers, as when a caller places a calling card, credit card, or collect call by first dialing a carrier access number and then, after the initial call is “cut through,” dialing the telephone number of the intended recipient. See U.S. Telecom Ass’n v. FCC, 227 F.3d 450, 456, 462 (D.C.Cir. 2000); In re Application of the United States, 396 F.Supp.2d 45, 48 (D.Mass. 2005). Both the first dialed number (the carrier access number) and the second dialed number (the intended recipient’s number) constitute dialing information.2 The initial dialed number, however, is likely to be of little interest to investigators who are seeking to determine what specific number the caller is calling. In such a situation, in order to discover what number is being called, the investigators must be able to intercept the post-cut-through digits.

In some instances, after a caller has dialed a telephone number, the caller dials additional digits that do not constitute dialing information, but instead constitute a form of content information. For example, after dialing a bank, the caller may be prompted to input a password, a personal identification number, or a bank account number. Or, under certain circumstances, a customer may enter a credit card number or a Social Security number by dialing additional digits. That information is considered content information. As the government acknowledges, pen register orders do not target the interception and decoding of such content information.3

The authorization granted by the FISC judge in this case was consistent with prior FISC practice. Since at least 2006, FISC judges have issued pen register/trap-and-trace orders under 50 U.S.C. § 1842 that have authorized the acquisition of all post-cut-through digits; while generally prohibiting the use of those digits that do not constitute dialing information.

In the order certifying the question of law to this court, the FISC judge set forth in detail the background of the legal issue presented by the government’s application. The FISC judge also described the manner in which other courts have dealt with this issue under the pen register/trap-and-trace provisions of title 18 of the United States Code, which govern the use of such devices in the context of criminal investigations.

The FISC judge explained that the pen register/trap-and-trace statutes provide that the information intercepted by pen registers and trap-and-trace devices “shall not include the contents of any communication.” 18 U.S.C. § 3127(3), (4). A relat*595ed section, however, states that the government “shall use technology reasonably available to it” that restricts the recording or decoding of electronic or other impulses “so as not to include the contents of any wire or electronic communications.” Id. § 3121(c). In the past, the FISC judge explained, the government has argued, and the FISC has accepted, that in the absence of such reasonably available technology, the government is permitted to obtain all post-cut-through digits, so long as the investigative use of any content information contained therein is prohibited. Because there is not now and has not previously been any known or reasonably available technology to segregate dialing information from content information in post-cut-through digits prior to the interception of those digits, the government has contended that it is entitled to obtain post-cut-through digits even when the acquisition of such digits comes with some risk of intercepting content information.

The FISC judge explained that the government’s interest in acquiring such digits is concretely presented in this case. The subject of the investigation is suspected of engaging in clandestine intelligence activities on behalf of a foreign government, contrary to the interests of the United States, [redacted] Using currently available technology, the government cannot identify the foreign telephone number without obtaining the entire set of post-cut-through digits.

Considering the competing privacy interests, the FISC judge concluded that they are not great. Even though some post-cut-through digits may constitute content information, they “nonetheless involve a narrow category of information from a subset of calls placed from a targeted phone number.” The intrusion, the judge explained, is less than obtaining the full contents of calls to or from a targeted number, and the intrusion is also “mitigated by the prohibition on affirmative investigative use” of the non-dialing information.

In view of the uniformity of the authorities holding that post-cut-through digits may not be intercepted in the parallel setting of criminal investigations, the FISC judge concluded that the “disagreement between the FISC and other courts provides reason to believe that consideration of these issues by the [Foreign Intelligence Surveillance Court of Review] would serve the interests of justice.” See 50 U.S.C. § 1803(j). We find that it is appropriate for this court to address the certified question.

II

The problem in this case is this: Under presently available technology, there is no way for a pen register to distinguish between dialing information and content information contained in post-cut-through digits so that it can be directed to intercept only the former and not the latter.4 Therefore, in the case of a pen register order that authorizes the interception of post-cut-through digits, there is some risk that content information will be intercepted along with dialing information. The question we have been asked to decide is whether the statute that authorizes the issuance of pen register orders for foreign intelligence purposes permits courts to au*596thorize the interception of post-cut-through digits, even though there is some risk that such digits might sometimes include content information.

A

The statute that governs the use of pen registers and trap-and-trace devices for foreign intelligence purposes is title IV of FISA, 50 U.S.C. §§ 1841-46. That statute provides that the government can obtain an order authorizing the installation and use of a pen register or trap-and-trace device upon a statutorily sufficient showing, made either to a judge of the FISC or to a properly authorized magistrate judge. Id. § 1842.

An application for a pen register or a trap-and-trace device under section 1842 requires the approval of the Attorney General or a designated attorney for the government. Id. § 1842(c). It also requires a certification by the applicant that the information likely to be obtained “is foreign intelligence information not concerning a United States person or is relevant to an ongoing investigation to protect against international terrorism or clandestine intelligence activities.” Id. § 1842(c)(2). Finally, the application must contain a “specific selection term” to be used as the basis for the use of the pen register or the trap-and-trace device. Id. § 1842(c)(3). A “specific selection term” is a term “that specifically identifies a person, account, address, or personal device, or any other specific identifier.” Id. § 1841(4)(A)(i). It must be used to limit, “to the greatest extent reasonably practicable, the scope of information sought, consistent with the purpose for seeking the use of the pen register or trap and trace device.” Id. § 1841(4)(A)(ii).

Section 1842(h)(1) of FISA provides that the Attorney General “shall ensure that appropriate policies and procedures are in place to safeguard nonpublicly available information concerning United States persons that is collected through the use of a pen register or trap and trace device installed under this section.” Section 1842(h)(2) further provides that the FISC is not prohibited from imposing “additional privacy or minimization procedures with regard to the installation or use of a pen register or trap and trace device.”

The definitional section of title IV of FISA, section 1841, provides that the terms pen register and trap-and-trace device have the same meanings that are given to those terms in section 3127 of the title 18. The definition of pen register in section 3127 provides as follows, in pertinent part:

[T]he term “pen register” means a device or process which records or decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted, provided, however, that such information shall not include the contents of any communication....

18 U.S.C. § 3127(3). The definition of “trap and trace device” in title 18 contains similar language:

[T]he term “trap and trace device” means a device or process which captures the incoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication, provided, however, that such information shall not include the contents of any communication;

Id. § 3127(4).

B

The question whether title IV of FISA authorizes pen register orders to *597collect post-cut-through digits turns on the meaning of the definitional language in 18 U-.S.C. § 3127(3), and in particular the “proviso” clause, which reads as follows: “provided, however, that such information shall not include the contents of any communication.” It is clear that the statutory language is intended to prohibit the use of pen registers for the purpose of intercepting content communications, such as bank account numbers, social security numbers, and personal identification numbers. The statute expresses that intent in an unusual way, however, by making the prohibition against intercepting content information part of the definition of “pen register.”5

The most literal interpretation of section 3127(3), read in isolation, leads to a problem. If a device ceases to be a pen register whenever it intercepts post-cut-through content information, it is impossi■ble to know in advance whether the device is a pen register (and thus whether its use may be authorized under title IY of FISA).

A pen register intercepts the digits that are dialed. It does not distinguish between dialing information, on the one hand, and dialed digits that constitute “the contents of any communication,” on the other. With currently available technology, that distinction can be drawn only after the information collected by the pen register has been decoded. Defining a device as a pen register depending on the nature of the material it ultimately collects thus poses a dilemma for courts that are asked to authorize the collection of dialing information, and in particular post-cut-through digits. A court seeking to determine whether to authorize a pen register application that includes post-cut-through digits cannot know in advance whether the device will intercept some content information and therefore be ineligible for an authorization order.

One approach to resolving that problem is to conclude that if there is any chance that content information will be intercepted, a pen register order that authorizes the collection of post-cut-through digits may not be entered. Adopting that theory, several courts have held that the pen register statute does not authorize the collection of any post-cut-through digits. See In re Application of the United States, 622 F.Supp.2d 411 (S.D.Tex.2007); In re Application of the United States, No. 6:06-mj-1130 (M.D. Fla. June 20, 2006), aff'g In re Application of the United States, No. 6:06-mj-1130 (May 23, 2006); In re Applications of the United States, 515 F.Supp.2d 325 (E.D.N.Y.2007); In re Application of the United States, 441 F.Supp.2d 816 (S.D.Tex.2006).6

*598The theory adopted by those courts might lead to the conclusion that the collection of post-cut-through digits may be authorized in circumstances in which the government can assure the court that it is highly unlikely that content information will be intercepted along with dialing information. None of the above-cited decisions have drawn that distinction, however. Rather, they have flatly barred the government from relying on the pen register statutes to intercept post-cut-through digits. See In re Application of the United States, 622 F.Supp.2d at 422 (“If the Government has no means to exclude collecting content when collecting post-cut-through dialed digits, the Government may not obtain such information under the Pen Register Statute.”); In re Applications of the United States, 515 F.Supp.2d at 339 (“Until the Government can separate PCTDD that do not contain content from those that do, pen register authorization is insufficient for the Government to obtain any PCTDD.”); In re Application of the United States, 441 F.Supp.2d at 827 (“Post-cut-through dialed digit contents ... are not available to law enforcement under the Pen/Trap Statute.”); In re Application of the United States, No. 6:06-mj-1130, at 6 (M.D. Fla. June 20, 2006) (“[T]his Court rejects the United States’ argument that it can obtain post-cut-through digits on the lesser showing permitted by the pen register and trap-and-trace statutes.”).

We think the better approach is to interpret the definitional language of section 3127(3) to mean that a court may not authorize the use of a pen register to collect content information, and that any content information that is collected cannot be used for any investigative purposes. Under that interpretation, a court can authorize the use of a pen register to collect post-cut-through digits, as long as the collecting agency takes all reasonably available steps to minimize the collection of content information and is prohibited from making use of any content information that may be collected.

We conclude that the latter interpretation of section 3127(3) is more in line with the statutory text and the purpose the provision was intended to serve. In particular, we do not believe Congress intended to prohibit the use of pen registers whenever there was any risk that the intercepted digits would constitute content information. To the contrary, we believe the best interpretation of the related provisions of the pen register statutes is that Congress understood that content information might sometimes be intercepted by authorized pen registers, but intended that steps should be taken to minimize that risk to the extent reasonably possible. Both the text and the legislative history of the pen register statutes support this interpretation of section 3127(3).

1

It is clear from the text of the pen register provisions in title 18, read as a whole, that Congress understood that some content information might be intercepted in the course of executing a valid pen register order. One of those provisions is 18 U.S.C. § 3121(c). The statute states:

*599(c) Limitation. A government agency authorized to install and use a pen register or trap and trace device under this chapter or under State law shall use technology reasonably available to it that restricts the recording or decoding of electronic or other impulses to the dialing, routing, addressing, and signaling information utilized in the processing and transmitting of wire or electronic communications so as not to include the contents of any wire or electronic communications.

18 U.S.C. § 8121(c).

That language requires the government to use “reasonably available” technology to avoid recording content information. But the prohibition is conditional, requiring the government to use such restricting technology only if it is “reasonably available.” Thus, by requiring the use of “technology reasonably available” to restrict recording and decoding of intercepted information to dialing information, Congress recognized that such technology might not be available or might not achieve the objective with perfect accuracy.

The plain import of the statutory language is that, absent such “reasonably available” technology, lawfully authorized pen registers will sometimes intercept and decode content information contained in dialed digits, in addition to information regarding dialing information. Thus, section 3121(c) strikes a compromise that allows the government to obtain the dialing information to which it is entitled, while requiring that all reasonably available measures be taken to avoid or minimize the collection of content information.

As the amicus curiae points out, section 3121(c) is not incorporated by reference in title TV of FISA and therefore does not directly apply to FISA pen register applications. Nonetheless, it is important to our analysis here because it provides guidance in determining how Congress intended courts to interpret the definitional provisions, sections 3127(3) and (4), which apply to both title 18 and title TV of FISA. The argument that section 3121(c) is irrelevant to FISA pen registers also ignores the body of law that teaches that “where words are employed in a statute which had at the time a well-known meaning at common law or in the law of this country they are presumed to have been used in that sense unless the context compels to the contrary.” Lorillard v. Pons, 434 U.S. 575, 583, 98 S.Ct. 866, 55 L.Ed.2d 40 (1978) (quoting Standard Oil v. United States, 221 U.S. 1, 59, 31 S.Ct. 502, 55 L.Ed. 619 (1911)).

Based on the legislative history of, and amendments to, the criminal pen register statute, and Congress’s understanding of the developing technology, it can safely be assumed that Congress—in incorporating the criminal pen register definition into FISA—understood that it was incorporating more than just the definition of a pen register at section 3127. Indeed, the author of what became section 3121(c), Senator Patrick Leahy, was quite clear that the provision was necessary to address the incidental collection of content under a pen register order. 147 Cong. Rec. 20,680 (2001) (statement of Sen. Patrick Leahy). But at the same time Senator Leahy recognized that the government’s ability to avoid the collection of content information was subject to the limitations of “reasonably available technology.” Id.

The amicus curiae takes the position that the definitional- language of section 3127(3)—“provided, however, that such information shall not include the contents of any communication”—plainly forecloses the conclusion that a pen register may lawfully intercept content under any circumstances. And some courts, likewise seizing on the “provided” clause of section *6003127(3), have dismissed section 3121(c) as a mere “added precaution to ensure that, the Government does not use an authorized pen register to collect contents.” In re Application of the United States, 622 F.Supp.2d at 421.

We cannot agree with either position. Our duty is “to construe statutes, not isolated provisions,” and to properly discharge that duty, “we must read the [statute’s] words in their context and with a view to their place in the overall statutory scheme.” King v. Burwell, — U.S. -, 135 S.Ct. 2480, 2489, 192 L.Ed.2d 483 (2015). Of particular salience here, we are to avoid interpreting one statutory provision in a manner that would render another provision superfluous. Corley v. United Slates, 556 U.S. 303, 314, 129 S.Ct. 1558, 173 L.Ed.2d 443 (2009).

In focusing narrowly on section 3127(3) and giving short shrift to the natural implication of section 3121(c), the amicus curiae’s plain-language argument and the “added precaution” theory run afoul of these principles. If section 3127(3) barred courts from authorizing the collection of post-cut-through digits, there would be no need for technology to distinguish between dialing information and content information. The need for technology to distinguish between the two types of information arises only jf the courts can authorize investigators to intercept signals that can sometimes contain content. Because only post-cut-through digits can contain content information, the limitation of section 3121(c) must necessarily be directed to post-cut-through digits. And because the limitation in section 3121(c) is conditional, not absolute, the two provisions can be read in harmony only by construing them to permit the interception of post-cut-through digits under appropriate circumstances.7

2

The background and development of the provisions of title 18 that authorize the installation and use of pen registers confirm our understanding of the statutory text by shedding further light on the meaning of the pen register statutes in general, and section 3121(c) in particular.

Prior to 1986, there was no federal statute that governed the use of pen registers and trap-and-trace devices. Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Pub.L. No. 90-351, 82 Stat. 197, dealt with the interception of oral or wire communications that could “be overheard and understood by the human ear.” S.Rep. No. 99-541, at 2 (1968). Title III was silent, however, as to the use of pen registers or other devices that could intercept non-content information.

In Smith v. Maryland, 442 U.S. 735, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979), the Supreme Court held that the Fourth Amendment does not apply to a pen register that simply monitors the digits dialed on a party’s telephone. The Court reasoned that the calling party has voluntarily turned that dialing information over to a third *601party and has assumed the risk that the third party would turn that information over to the government. Thus, the Court held that pen registers, unlike wiretaps that intercept conversations, could be installed and operated without the need for a court order.

In 1986, Congress changed that regime with the enactment of the Electronic Communications Privacy Act of 1986, Pub.L. No. 99-508, 100 Stat. 1848. That statute added a provision authorizing the government to install and use pen registers and trap-and-trace devices, but only upon obtaining a court order. The showing required to obtain such an order was less demanding than the probable cause showing required for a wiretap authorization, however. For the installation and use of a pen register or trap-and-trace device, the statute required only that the government represent that the information being sought was “relevant to an ongoing criminal investigation being conducted” by the requester’s agency. 18 U.S.C. § 3122(b) (1988).

Eight years later, in the Communications Assistance for Law Enforcement Act of 1994, Pub.L. No. 103-414, 108 Stat. 4279, Congress revisited the use of pen registers and trap-and-trace devices. The legislative history of that statute shows that Congress understood that pen registers were capable of intercepting content information in the course of performing their authorized function of intercepting dialing information.8 Congress’s response to that problem was to direct that the interception of content incidental to the interception of dialing information was to be minimized to the extent that it was technologically feasible to do so.

In particular, Congress added the “limitation” provision, section 3121(c), to the pen register statutes. The enacted version of section 3121(c) stated:

A government agency authorized to install and use a pen register under this chapter or under State law shall use technology reasonably available to it that restricts the recording or decoding of electronic or other impulses to the dialing and signaling information utilized in call processing.

18 U.S.C. § 3121(c) (1994).

That provision recognized that pen registers were capable of intercepting content information. Congress’s solution to that problem was to direct agencies using pen registers to use technology that was “reasonably available” to restrict the recording or decoding of content information and limit the information obtained to “the dialing and signaling information utilized in call processing.” In effect, Congress directed the agencies to do the best they reasonably could to limit the interception of content information, but it did not suggest that, in the absence of such reasonably available technology, a pen register could not be authorized if it posed the risk of intercepting content information.

Both the House and Senate Reports on the 1994 Act explained that the purpose of the amendment was not to prohibit the use of pen registers, but to “require[] law enforcement to use reasonably available technology to minimize information obtained through pen registers.” S.Rep. No. 103-402, at 18 (1994); H.R.Rep. No. 103-*602827, pt.1, at 17 (1994).9 In particular, the reports explained that the new provision would require government agencies “to use, when reasonably available, technology that restricts the information captured by such device to the dialing or signaling information necessary to direct or process a call, excluding any further communication conducted through the use of dialed digits that would otherwise be captured.” S.Rep. No. 103-402, at 31; H.R.Rep. No. 103-827, pt. 1, at 32.

Senator Leahy, the principal sponsor of the legislation, used the same language when explaining the text of the amendment during floor consideration of the legislation in the Senate. See 140 Cong. Rec. 20,451 (1994) (statement of Sen. Patrick Leahy).

Accordingly, as matters stood after the 1994 legislation, the government could obtain authorization to use pen registers, even though those devices might in some instances intercept content information, as long as the government used all technology that was reasonably available to minimize the extent to which such content information was intercepted and decoded.

Four years later, Congress amended FISA by adding the pen register and trap- and-trace provisions of title IV, 50 U.S.C. § 1841 et seq. The new section 1841 provided that the terms “pen register” and “trap and trace device” were to “have the meanings given such terms in section 3127 of title 18.” Pub.L. No. 105-272. 112 Stat. 2396, § 601 (1998).

Following the attacks against New York and Washington on September 11, 2001, Congress enacted the USA PATRIOT Act of 2001, Pub.L. No. 107-56, 115 Stat. 272. Among many other provisions, Congress modified portions of the pen register/trap- and-trace statute. The changes made at that time are at the heart of the issue before the court today.

The principal change to the pen register/trap-and-trace provisions was to make those provisions applicable not just to telephony, but to all forms of wire and electronic communications. In so doing, Congress made four amendments that bear on the present issue.

First, Congress omitted the words “call processing” and added the words “routing” and “addressing” to section 3121(c) to cover technologies other than telephony. Id. § 216(a).

Second, Congress modified section 3121(c) to state explicitly that the purpose of directing the government to use “reasonably available” technology to limit the collection of certain electronic signals was “so as not to include the contents of any wire or electronic communications.” Id.

Third, Congress amended the definition of “pen register” by expanding the definition to include “dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted.” Id. § 216(c).

Fourth, Congress added the proviso in the definitions of pen register and trap- and-trace device that read: “provided, however, that such information shall not include the contents of any communication.” Id.

*603The USA PATRIOT Act was enacted seven weeks after the September 11, 2001, attacks, and in light of the speed with which it was enacted, there is only limited legislative history for the statute. The changes to sections 3121(c) and 3127 were added in the Senate. In the absence of a committee report, Senator Leahy, the chairman of the Senate Judiciary Committee, presented a detailed summary of the changes on the day before the Act was passed. He explained that the language used in the pen register and trap-and-trace statutes was intended “to expressly exclude the use of pen-trap devices to intercept ‘content’ which is broadly defined in 18 U.S.C. 2510(8).” 147 Cong. Rec. 20,680 (2001) (statement of Sen. Patrick Leahy). He added that the Act “requires the government to use reasonably available technology that limits the interceptions under the pen/trap device laws ‘so as not to include the contents of any wire or electronic communications.’ ” Id.

Importantly, Senator Leahy recognized that, notwithstanding the statutory directive to use reasonably available technology to avoid collecting content information, the “pen/trap devices in use today collect ‘content.’ ” Id. In particular, he recognized the risk of collecting content information from “[t]he impulses made after a phone call is connected.” Id. He explained that the amendment to section 3121(c) was intended to underscore the need to incentivize the development of better technology to limit the interception of content information, particularly in light of the fact that the USA PATRIOT Act made the pen register provisions applicable to a wide array of modem communications technologies, such as the Internet, and not simply traditional telephone lines. See also H.R.Rep. No. 107-236(1), at 52-53 (2001).

Senator Leahy stated that he was concerned that in broadening the types of dialing information that could be intercepted to include routing and addressing information, Congress might be misunderstood as authorizing the interception of content information. He said that to address that issue, he had favored including definitions of those terms in the 2001 statute, but that the administration had objected. Instead, to address his concerns, the administration agreed to include the references to content information in sections 3121(c) and 3127(3) and (4).

Senator Leahy also noted that, in light of the known risk of collecting content information from post-cut-through digits, he would have preferred a requirement of somewhat heightened judicial review for pen register and trap-and-trace applications. But in the absence of such a requirement, he acknowledged that the statute continued to require only that the government “use reasonably available technology” to limit the collection of content information.

Senator Leahy’s comments make clear that the new language added in the 2001 statute was intended to avoid expanding the type of information that could be intercepted, not to narrow it. In particular, nothing in his comments, or elsewhere in the legislative history, suggests that, in the absence of an effective technological solution, the amendments to the pen register/trap-and-trace statutes were intended to prohibit the collection of dialing information simply because there was some risk that content information might incidentally be collected as well.

Analysis of the sequence of pertinent statutes leads us to conclude that Congress recognized, from as early as 1994, that judicial authorization to collect post-cut-through digits posed the risk that some content information would be inter*604cepted. But Congress chose to deal with that risk by requiring the government to use reasonably available technology to minimize the extent to which such content information was collected. It could have dealt with that risk by preventing the collection of post-cut-through digits altogether, but it did not.

We therefore conclude that a close analysis of the statutes that have authorized pen register orders starting in 1986 does not support the view that Congress sought to prohibit any authorized collection of dialing information whenever it posed some risk of additionally collecting content information. What Congress elected was a course of minimization, principally through the use of “reasonably available technology”

III

Our analysis of the pen register statutes requires us to consider whether those statutes, if construed to authorize the interception of post-cut-through digits, would run afoul of the Fourth Amendment.

As noted above, the Supreme Court in Smith v. Maryland held that the use of a pen register to collect the numbers dialed on a target telephone does not constitute a “search” for Fourth Amendment purposes. The Smith case, however, involved the use of a pen register to obtain dialing information only; no content information was at issue in that case, in the form of post-cut-through digits or otherwise.

It may be that if a pen register interception were directed at the acquisition and use of content information, it would be unlawful in the absence of a court order issued on a showing of probable cause. In the context of criminal investigations, that would certainly be the case for the interception of conversations through electronic surveillance, Berger v. New York, 388 U.S. 41, 87 S.Ct. 1873, 18 L.Ed.2d 1040 (1967), and it has been held that probable cause is required to authorize the disclosure and use of content information in email communications, see Warshak v. United States, 490 F.3d 455 (6th Cir.2007), vacated, 532 F.3d 521 (6th Cir.2008) (en banc). The same rule might apply to the use of a pen register for the purpose of intercepting content information.

But the FISC judge’s authorization order for post-cut-through digits does not target content information; it targets dialing information. If content information is collected at all, the collection of that information is incidental, and the FISC judge’s authorization order directs that no investigative use be made of that information (at least in the absence of a further order from the court). The constitutional issue, therefore, is not whether a probable cause warrant is required to use a pen register to obtain content information for investigative purposes. Rather, the question is whether the risk of incidental collection of content information renders the collection of dialing information in post-cut-through digits unreasonable in the absence of a probable cause warrant, even when the content information will not be used for any purpose. We think the answer to that question is no.

The touchstone of the Fourth Amendment is reasonableness. Riley v. California, — U.S.-, 134 S.Ct. 2473, 2482, 189 L.Ed.2d 430 (2014); United States v. Knights, 534 U.S. 112, 118, 122 S.Ct. 587, 151 L.Ed.2d 497 (2001); see also Vemonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 652, 115 S.Ct. 2386, 132 L.Ed.2d 564 (1995); In re Sealed Case, 310 F.3d 717, 742 (F.I.S.C.R.2002), In determining the reasonableness of particular governmental action, the court must assess, “on the one hand, the degree to which it intrudes upon an individual’s privacy and, on the other, *605the degree to which it is needed for the promotion of legitimate governmental interests.” Wyoming v. Houghton, 526 U.S. 295, 300, 119 S.Ct. 1297, 143 L.Ed.2d 408 (1999); see also Tennessee v. Garner,

Additional Information

In re Certified Question of Law | Law Study Group