United States v. Agron Hasbajrami

U.S. Court of Appeals for the Second Circuit

United States v. Agron Hasbajrami

Opinion

15-2684(L) United States of America v. Agron Hasbajrami

15-2684, 17-2669 United States of Americi. v. Agron Hasbajrami

UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT

August Term, 2018

Argued; August 27, 2018 Decided: December 18 2019 I

Docket No. 15-2684-L; 17-2669-CON

UNITED STATES OF AMERICA,

Appellee,

- V. -

AGRON HASBAJRAMt

Defendant-Appellant.

Before:

LYNCH, CARNEY, and DRONEY, Circuit Judges.

Agron Hasbajrami was arrested at John F. Kennedy International Airport in September 2011 and charged with attempting to provide material support to a terrorist organization. After he pleaded guilty, the government disclosed, for the first time, that certain evidence involved in Hasbajrami's arrest and prosecution had been derived from information obtained by the government without a warrant pursuant to its warrantless surveillance program under Section 702 of the FISA Amendments Act of 2008. Hasbajrami then withdrew his initial plea and moved to suppress any fn1its of the Section 702 surveillance. The district court (Gleeson, then-].) denied the motion to suppress and Hasbajrami again pleaded guilty, this time pursuant to a conditional guiJty plea that allowed him to appeal the district court's ruling denying his motion to suppress. He now appeals, arguing inter alia that the warrantless surveillance and the collection of his communications violated the Fourth Amendment. We conclude that the collection of the communications of United States persons incidental to the lawful surveillance of non-United States persons located abroad does not violate the Fourth Amendment and that, to the extent that the government's inadvertent targeting of a United States person led to collection of Hasbajrami's communications, he was not harmed by that collection. -

Because there is insufficient information in either the classified or the public record in this case to permit us to determine whether any such querying was reasonable, and therefore permissible under the Fourth Amendment, we REMAND the case to the district court for further proceedings consistent with this opinion.

MICHAEL K. BACHRACH, Law Office of Michael K. Bachrach, New York, NY, Joshua L. Oratel, Joshua L. Dratel, P.C., New York, NY, and Steve Zissou, Steve Zissou & Associates, Bayside, NY, for Defe,1dant-Appellant Agron Hasbajrami.

SETH D. DUCHARME, David C. James, Saritha Komatireddy, Assistant United States Attorneys, Joseph F. Palmer, Attorney, National Security Division, United States Department of Justice for Richard P. Donoghue, United Stales District Attorney for the Eastern District of New York, Brooklyn, NY,for the United States of America.

2 PATRICK TOOMEY and Ashley Gorski, American Civil Liberties Foundation, New York, NY, Mark Rumold and Andrew Crocker, Electronic Frontier Foundation, San Francisco, CA, Amici Curiae American Civil Liberties Union and Electronic Frontier Foundation.

GERARDE. LYNCH, Circuit Judge:

This case concerns the Fourth Amendment implications of the

government's increasing technological capacity for electronic surveillance in

foreign intelligence and terrorism investigations, and the balance our

constitutional system requires between national security and individual privacy.

On September 6, 2011, Defendant-Appellant Agron Hasbajrami

("Hasbajrami") was arrested as he attempted to board a flight to Turkey at John

F. Kennedy International Airport in Queens, New York. His luggage contained a

tent, boots, and cold-weather gear. The government, which had collected

Hasbajrami's electronic communications, charged him with attempting to

provide material support to a terrorist organization, alleging that he intended to

travel to the Federally Administered Tribal Area of Pakistan, where he expected

to join a terrorist organization, receive training, and ultimately fight "against U.S.

forces and others in Afghanistan and Pakistan." App'x at 44. During the course

of the prosecution, the government disclosed that it had collected some of its

3 evidence under the Foreign Intelligence Surveillance Act of 1978 ('''FISA"}, Pub,

L. No. 95-511,

92 Stat. 1783

(1978), codified at

50 U.S.C. § 1801

et seq., and that it

intended to introduce FISA-derived evidence at any eventual trial. Faced with

the evidence, including his own incriminating communications, Hasbajrami

ultimately pleaded guilty to attempting to provide material support to terrorists

in violation of 18 U.S.C. § 2339A. He was sentenced to 180 months in prison.

Hasbajrami was already serving his sentence when the government

provided him with a supplemental letter disclosing, for the first time, that some

of the evidence it had previously disclosed from FISA surveillance was itself the

fruit of earlier information obtained without a warrant pursuant to Section 702 of

the FISA Amendments Act ("Section 702"),

Pub. L. No. 110-261, 122

Stat. 2436

(2008), codified at 50 U.S.C. § 1881a.

It is that Section 702-derived evidence - primarily electronic

communications between Hasbajrami and individuals without ties to the United

States and located abroad - that is at issue in this appeal. FoIIowing the

disclosure of Section 702 surveillance, the district court Gohn Gleeson, then-J.)

permitted Hasbajrami to withdraw his plea; Hasbajrami subsequently moved to

suppress all evidence seized by the government under its Section 702 programs,

4 as well as any fruits of that surveillance, including the evidence obtained

pursuant to FISA warrants and incul patory statements Hasbajrami made upon

arrest. The district court denied the motion to suppress, and Hasbajrami again

pleaded guilty, reserving his right to appeal the district court's denial of his

suppression motion.

The vast majority of Section 702 surveillance at issue here involves

information the government collected about Hasbajrami incidental to its

surveillance of other individuals without ties to the United States and located

abroad.

1 This opinion has been reviewed by appropriate intelligence agencies for the purpose of redacting material that includes or references classified information. After an initial redaction, the panel met ex parte with representatives of those agencies in order to discuss potential substitutions or modified phrasing that would minimize the need for redaction, and the possibility that certain information referenced in the opinion could be declassified, thus further 5 In light of that disclosure, and the evidence in the public and classified

record, we reach three principal conclusions:

First, the "incidental collection" of communications (that is, the collection of the communications of individuals in the United States acquired in the course of the surveillance of individuals without ties to the United States and located abroad) is permissible under the Fourth Amendment. We therefore conclude, in agreement with the district court, that, at least insofar as the record available to the district court is concerned, the vast majority of the evidence detailed in the record was lawfully collected.

Second, the "inadvertent collection" of communications of those located within the United States (that is, the acquisition of communications accidentally collected because an intelligence agency mistakenly believes that an individual is a non�United States person located abroad and therefore targets that individual's e-mail address under its Section 702 authority) raises novel constitutional questions. We do not reach those

reducing the need for redaction. That meeting was transcribed for the record, and the transcript (which is itself classified) will be preserved as part of the record of this appeal in the custody of a Classified Information Security Officer with the Department of Justice's Litigation Security Group. The meeting was extremely productive, and has resulted in a modest number of changes of wording that do not affect the substance of the opinion, and a significant reduction in the amount of redacted material. It is of course regrettable that any part of an opinion disposing of a criminal appeal is unavailable for public inspection. However, we have neither the authority, nor the expertise, nor the inclination to overrule classification decisions made by the relevant executive branch agencies. We respect the need for such classification of sensitive national security information, and appreciate the cooperation of the agencies in the effort to limit the need for modifications and redactions. 6 questions today because we are satisfied that, to the extent such accidental collection occurred in this case, any information thus acquired did not taint the investigation or prosecution of Hasbajrami.

Third, querying databases of stored information derived from Section 702-acquired surveillance also raises novel and difficult questions. Querying, depending on the particulars of a given case (such as what databases are queried, for what purpose1 and under what circumstances), could violate the Fourth Amendment, and thus require the suppression of evidence; therefore, a district court must ensure that any such querying was reasonable. But no information about any queries conducted as to Hasbajrami was provided to the district court, and the information provided to us on this subject is too sparse to reach a conclusion as to the reasonableness of any such queries conducted as to Hasbajrami.

Given these conclusions, further proceedings are necessary to determine (a) what

(if any) evidence relevant to Hasbajrami was obtained by the government by

querying databases, (b) whether any such querying violated the Fourth

Amendment and, if so, (c) whether any such violation tainted other lawfully­

collected evidence. We therefore REMAND the case to the district court for

further proceedings consistent with this opinion.

BACKGROUND

This appeal concerns the legal status of evidence of Hasbajrami's electronic

communications with individuals located abroad, which was collected by the

7 government without a warrant pursuant to the government's authority under

Section 702. The background to this appeal may be easily summarized:

Hasbajrami sought to suppress evidence the government acquired under Section

702, arguing that the government had violated his Fourth Amendment rights

when it seized his communications without a warrant, and that those

communications, and any information that the government later collected as the

fruit of that initial warrantless surveillance, should therefore be suppressed. The

district court declined to suppress the evidence, and Hasbajrami pleaded guilty

while reserving his right to appeal the district court's decision.

But our disposition of the case turns in part on the particulars of how

Section 702-acquired surveillance was used in Hasbajrami's prosecution; a fuller

accounting of the facts of Hasbajrami's case and the nature of Section 702

surveillance is therefore necessary. First, we begin by describing Hasbajrami's

arrest and the initial proceedings in which he pleaded guilty, the subsequent

disclosure of Section 702 surveillance, Hasbajrami's withdrawal of his guilty

plea, and his subsequent motion to suppress. Second, we describe in broad terms

the operation of Section 702 surveillance. Third, we turn to the district court's

discussion of the use of Section 702 evidence (that it was aware of) in this case,

8 and its denial of the suppression motion. Finally, we describe the proceedings at

the district court following its denial of the suppression motion, and the

proceedings on appeal.

I. Allegations and Initial Proceedings

The conduct underlying Hasbajrami's prosecution occurred primarily

between April and August, 2011. During that time, Hasbajrami communicated

by e-mail with "Individual #1," a non-American located abroad, who Hasbajrami

believed was associated with a terrorist organization, In those e-mails,

Hasbajrami discussed his interest in the group's terrorist operations, and

Individual #1 instructed Hasbajrami how he could smuggle himself into Pakistan

to join the organization. Individual #1 also detailed means by which Hasbajrami

could send money to him and how Hasbajrami could contact him once he

reached Pakistan. In discussing his plans to join Individual #1 in Pakistan,

Hasbajrami also described his arrangements for traveling to Turkey, and his

concern that his projected route from there to Pakistan might have been

compromised.

Following an investigation by the agents of the Federal Bureau of

Investigation's Joint Terrorism Task Force, Hasbajrami was arrested as he was

9 about to board a flight to Istanbut Turkey. His luggage contained a tent, boots,

and cold-weather gear. Upon arrest, Hasbajrami made certain inculpatory

statements.

A. Initial Proceedings Hasbajrami was indicted on September 8, 20lt and charged with one

count of providing material support to terrorist organizations. At the same time,

and as required by statute, the government gave notice that it "intend[ed] to

offer into evidence, or otherwise use or disclose in any proceedings ...

information obtained or derived from electronic surveillance and physical

searches conducted pursuant to [FISAJ. 11 See Notice of Intent to Use Foreign

Intelligence Surveillance Act Information, United States v. Hasbajrami, l:ll-cr-623

(E.D.N.Y. filed Sept. 13, 2011), ECF No. 9.

In discovery, Hasbajrarni was provided with evidence of his

communications obtained pursuant to traditional FISA warrants,2 and he

2As detailed below, this opinion will use "traditional FISA" to describe FISA surveillance that was authorized by statute prior to the enactment of Section 702. The FISA Amendments Act will be referred to as the "FAA," of which Section 702 is one part.

10 eventually pleaded guilty on April 12, 2012, to one count of providing material

sup port to terrorists. He was sentenced to 180 months' imprisonment.

B. Disclosure of Section 702 Surveillance, Withdrawal of Plea, and Motion to Suppress

After Hasbajrami's initial plea and sentencing, and while Hasbajrami was

serving his sentence, the government disclosed that it had coUected Hasbajrami' s

communications under Section 702 of the FAA. 3 In a letter sent to Hasbajrami in

February 2014, the government stated that "based on a recent determination," it

had concluded that the information obtained from FISA surveillance that the

government had already disclosed "was itself also derived from other collection

pursuant to Title VII of FISA [i.e., Section 702] as to which you were aggrieved."

App'x at 31. The government stated that "certain evidence and information ...

that the government intended to offer into evidence or otherwise use or disclose

3The government's provision of notice in this case was likely in response the Solicitor General's assertion, at oral argument before the Supreme Court in Clapper v. Amnesty International USA,

568 U.S. 398

(2013), that prosecutors would provide notice to defendants in cases where evidence was derived from Section 702 surveillance. See Charlie Savage, Door May Open Challenge to Secret Wiretaps, N.Y.Times (Oct. 17, 2013), at A3. While the government's policy prior to Clapper was not to provide notice of Section 702 surveillance, it began reviewing cases and providing supplemental notice in 2013.

Id.

11 in proceedings in this case was derived from acquisition of foreign intelligence

information conducted pursuant to the FAA."

Id.

In response to that disclosure, Hasbajrami sought leave to withdraw his

plea. The district court granted that motion, finding that Hasbajrami had

"specifically asked [his counsel] about whether warrantless wiretaps had played

a role in his case. After [counsel] informed him that such wiretaps were not part

of the evidence, he was more willing to plead guilty. Thus, Hasbajrami seems to

have been misled about a fact he considered important in deciding how to

plead." App'x at 39. Furthermore, the government's misleading notice, according

to the district court, prevented Hasbajrami from kno wing that he could challenge

the evidence against him on the grounds that Section 702 was unconstitutional.

The court concluded that, prior to the letter disclosing Section 702 surveillance,

Hasbajrami "was not sufficiently informed about the facts" to have ''made an

intelligent decision about whether to plead guilty[.] When the government

provided FISA notice without FAA notice, Hasbajrami was misled about an

important aspect of his case." App'x at 38. Accordingly, the court allowed him to

withdraw the plea and reopened the case.

12 Hasbajrami then moved to suppress "the fruits of all warrantless FAA

surveillance," the motion that is at issue in this appeal. See Omnibus Motions at

8-9, United States v. Hasbajrami, 1:ll-cr-623 (E.D.N.Y. filed Nov. 26, 2014), ECF

No. 92 ("Suppression Motion"). He described what he sought to suppress, "the

fruits of all warrantless FAA surveillance," as including:

• all evidence and information derived as a result of Title VII warrantless FAA surveillance; • all evidence and information "obtained or derived from Title I and Title III PISA collection ... [that was] itself also derived from other collection pursuant to Title VII" of the FAA; • Hasbajrami's custodial statements; and • Any other evidence and information that the Government could not have obtained in this case through an independent source.

Id.

To properly understand the scope of Hasbajrami's motion, however, it is

necessary to describe the statutory framework underpinning Section 702

surveillance and the way in which the program operates in practice.

13 II. Section 702 Surveillance 4

In order to ensure national security, the United States maintains several

programs aimed at the surveillance of those who pose threats to its safety. These

programs each draw on a wide vari�ty of authority, including executive orders,

statutory provisions, and agency procedures and guidance. See generally Diana

Lee, Paulina Perlin & Joe Schottenfeld, Gathering Intelligence: Drifting Meaning and

4 The purpose of this section is to provide the general background necessary to understand the parties' arguments and it is not intended to provide a comprehensive description of the way in which each agency implements Section 702 surveillance. Additionally, as detailed below, each agency must seek approval of its Section 702 procedures each year, including changes in operation. Our intention is thus only to describe the program in broad terms. We note, moreover, that many Section 702 procedures remain highly classified, including the specific procedures under which the collection of Hasbajrami' s communications would likely have taken place. Our discussion here is drawn from declassified public sources and in large part from the report on Section 702 surveillance produced by the Privacy and Civil Liberties Oversight Board. See Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (fuly 2, 2014), https://www.pclob.gov/library/702-Report.pdf ("PCLOB Report"). The PCLOB is an independent agency within the executive branch, authorized by statute., inter alia, to "analyze and review actions the executive branch takes" and "ensure that liberty concerns are appropriately considered" in the government's development and implementation of anti-terrorism programs. See 42 U.S.C. § 2000ee(c). The PCLOB is composed of five members, appointed by the President and confirmed by the Senate. Id. § 2000ee(h). Accordingly, we discuss the program, and changes in its operation over time, only to the extent that the details are (a) relevant and (b) public.

14 the Modern Surveillance Apparatus, 10 J. of Nat'l Sec. L. & Pol'y 77 (2019)

(describing several separate authorities for surveillance, including FISA and

Section 702, each with separate operating standards). Hasbajrarni's appeal

specifically implicates the government's statutory authority under FISA, first

enacted in 1978, and more specifically the amendments to FISA, including

Section 702, enacted in 2008. 5

FISA was first enacted in response to revelations about the government's

electronic surveillance of the domestic communications of United States citizens.

See David S. Kris & J. Douglas Wilson, National Security Investigations and

Prosecutions§ 3:7 ("Kris & Wilson"). "Traditional FISA" surveillance, as

surveillance under the FISA has come to be known following the enactment of

the FAA in 2008, governed surveillance inside the United States, in the context

only of national security investigations rather than domestic criminal

prosecutions. See id. § 4:2. For those national security investigations, FISA

established procedures governing the collection of information derived from

5While Section 702 was first enacted in 2008, the fact that any e-mails tied to Americans were sometimes collected under its authority was not made public until June 2013, when "two classified [National Security Agency ("NSA")J collection programs were first reported by the press based on unauthorized disclosures of classified documents by Edward Snowden, a contractor for the NSA." PCLOB Report at 1. 15 electronic surveillance, physical searches, ''pen/trap" surveillance1 and tangible­

things production orders, and the use of information so obtained. See id. § 4:5.

In order to initiate traditional FISA surveillance, the government must

submit an application to a court demonstrating that there is "probable cause to

believe that 'the target of the electronic surveillance is a foreign power or agent

of a foreign power,' a nd that each of the specific 'facilities or places at which the

electronic surveillance is directed is being used, or is about to be used, by a

foreign power or an agent of a foreign power."' See Clapper,

568 U.S. at 403

(quoting FISA § 105(a)(3)). FISA applications are reviewed by two specialized

courts: the Foreign Intelligence Surveillance Court ( 11FISC") and the Foreign

Intelligence Surveillance Court of Review ("FISCR"),. both composed of Article

III federal judges assigned to their role by the Chief Justice of the United States.

See id.; Kris & Wilson § 5:1 (describing jurisdiction of FISC and FISCR).

Applications are submitted under oath by a federal officer and must describe,

among other things, whom the government wishes to search or surveil, the place

or things to be searched or surveilled, the sort of information the government

expects to gather, and the existence and nature of any prior FISA applications

targeting the individual. See generally Kris & Wilson§ 6:2.

16 Traditional FISA had some limitations, however. Because each application

required a court order, which in turn required probable cause, the government

believed th.at, after September 11, 2001, [FISA's] requirements unduly restrict[ed 11

the] speed and agility" with which the government could detect and respond to

terrorist threats. See id. § 16:2 (internal quotation marks omitted). Additionally,

the advent of e-mail "clearly expanded traditional FISA's reach." Id.§ 16:6.

Communications, such as phone calls, between two individuals without ties to

the United States and located abroad were outside the purview of FISA, and any

collection of such communications that occurred would not be constrained by its

procedures. Id. But as such communication increasingly came to be conducted by

e-mail, many of those e-mails would ultimately be stored on servers within the

United States, and thus "the government could not conduct warrantless

survei llance in the U.S. of stored e-mail messages exchanged between two parties

located abroad'' without following the procedures laid out in FISA. Id.

First enacted in 2008, Section 702 was intended to address some of FISA's

perceived limitations. 6 Section 702 allows the Attorney General (" AG") and

6President George W. Bush initially authorized the NSA "to conduct warrantless wiretapping of telephone and e-mail communications where one party to the communication was located outside the United States" and one party was believed to be a member of a terrorist organization. See Clapper.,

568 U.S. at 403

. 17 Director of National Intelligence ("DNI") to "authorize jointly ... the targeting of

persons reasonably believed to be located outside the United States to acquire

foreign intelligence information.'' 50 U.S.C. § 1881a(a). 7 That targeting is

primarily executed by compelling electronic service providers, including internet

service providers and companies that maintain the communications

infrastructure, to "immediately provide the Government with all information,

facilities, or assistance necessary to accomplish the acquisition [of

communications of an individual or his or her account] in a manner that will

protect the secrecy of the acquisition and produce a minimum of interference

with the services that such electronic communication service provider is

providing to the target of the acquisition." 50 U.S.C. § 1881a(i)(l)(A).

Following public revelations of the program, Congress passed the Protect America Act ("PAA"), Pub. L. No. 110•55,

121 Stat. 552

(2007), which far a limited period of time allowed the government to use surveillance procedures similar to those contained in the FAA. See In re Directives,

551 F.3d 1004, 1006-07

(FISA Ct. Rev. 2008). The PAA expired on February 16, 2008. See

id.

at 10 0 6 n.1.

7 Like other sections of the FISA, Section 702's definition of "United States person" includes lawful permanent residents (such as Hasbajrami). See

50 U.S.C. § 1801

(i) (defining "United States person u to be a "citizen of the United States, an alien lawfully admitted for permanent residence" or certain unincorporated associations or corporations with ties to the United States).

18 Section 702 differs from traditional FISA procedures in several key

respects. First, Section 702 does not require a probable cause determination

before undertaking surveillance. Clapper,

568 U.S. at 404

. Second, Section 702

"does not require the Government to specify [in a FlSA application] the nature

and location of each of the particular facilities or places at which the electronic

surveillance will occur."

Id.

Instead, as detailed below, the FISC approves Section

702 procedures in advance, targeting non-United States persons located abroad

as a category, and the government does not have to return to the FISC to seek

approval before it undertakes surveillance of any specific individual or his or her

accounts under those Section 702 procedures. See Kris & Wilson§ 17:17.

In short, under the FAA and Section 702 the government may compel

service providers located in the United States to provide e-mails or other

electronic communications to, from, or about individuals the government

believes are (a) not United States persons and (b) located abroad. 8 Both under the

8 The FAA also contains two sections, Sections 703 and 704, that address the direct targeting of individual United States persons outside the United States for electronic surveillance. See Laura K. Donohue, Section 702 and the Collection of International Telephone and Internet Content,

38 Harv. J.L. & Pub. Pol'y 117

, 142-44 (2015). The procedures followed "generally reflect the structure employed by traditional FISA with regard to electronic surveillance and physical search.'' Id. at 143. These sections are codified at 50 U.S.C. §§ 1881h and 1881c, and are not at issue in this appeal. 19 stahltory scheme and in practice, Section 702 surveillance unfolds in several

different steps, each with different implications for this Court's review. The first

step is what the statute and intelligence community refers to as "targeting,"

followed by collection, "minimization," retention and storage, and, finally,

dissemination and querying. 9 We will discuss each step in turn.

A. "Targeting"

Targeting generally refers to the decision to surveil an individual or his or

her channels of electronic communications, such as an e-mail address. The

government may not "intentionally target" for Section 702 surveillance anyone

located in the United States or a "United States person" outside the United

States. 50 U.S.C. §§ 1881a(b)(1), (3). Nor may it target a non-United States person

"if the purpose of such acquisition is to target a particular, known person

reasonably believed to be in the United States.n 50 U.S.C. § 188la(b)(2).

9 Some of these terms, such as collection, are terms of art, but their use is not necessarily uniform across the various government agencies or for different forms of surveillance. See, e.g., Lee, Perlin & Schottenfeld, Gathering Intelligence at 95 (highlighting "definitional variances" for terms like collection, acquisition, and targeting across the various surveillance programs). For the purposes of providing background to Hasbajrami's case, we define the terms primarily as each is used by the PCLOB. 20 The precise mechanisms each agency must follow to target

communications are not specified by the statute. Instead, Section 702 requires the

AG and the DNI to adopt targeting procedures each year that will govern how

the program functions at each agency tasked with Section 702 surveillance. See 50

U.S.C. §§ 1881a(a), (d). While labelled targeting procedures, the procedures are

just as much about who is not to be targeted under Section 702 (that is, how to

prevent acquisition of the communications of those in the United States or who

are United States persons) as about setting out who is to be targeted. In this

opinion, our concern with "targeting' is with the procedures designed to protect

the constitutional privacy rights of Americans and comply with the Fourth

Amendment inside the United States, and not with the obviously confidential

procedures and criteria by which United States intelligence agencies decide

which non-United States persons located abroad are appropriate objects of

surveillance.

The targeting procedures are supposed to ensure that any authorized

acquisition is "limited to targeting persons reasonably believed to be located

outside the United States" and to "prevent the intentional acquisition of any

communication as to which the sender and all intended recipients are known at

21 the time of the acquisition to be located in the United States.n 50 U.S.C.

§ 1881a(d)(l). Targeting procedures are also subject to the limitations related to

targeting United States persons outlined above. SO U.S.C. § 1881a(b). The NSA

and the FBI each develop targeting procedures tailored to the agency's particular

mission and purpose in using Section 702-acquired information. PCLOB Report

at 41-43, 47.

Once the required procedures have been formulated, the DNI and AG

must seek approval of their proposed targeting procedures from the FISC. 50

U.S.C. § 1881a(d)(2). The FISC reviews the proposed standards for compliance

with both statutory and constitutional requirements. See, e.g., In re Proceedings

Required by 702(i) of FISA Amendments Act of 2008, No. MISC 08-01,

2008 WL 9487946

, at •s (FISA Ct. Aug 27, 2008); Redacted,

2011 WL 10945618

at •1 (FISA Ct.

Oct. 3, 2011) ("Bates Decision"). In contrast to traditional domestic search

warrants and FISA warrants, which authorize searches or seizures of specific

persons, places, or things based on individualized probable cause, judicial

review of Section 702 functions as a form of programmatic pre-clearance. "[T}he

Court is required to consider whether the targeting ... procedures adopted by

the Government meet the requirements of the statute and ... are consistent with

22 the Fourth Amendment. The Court is not required, in the course of this Section

702(i} review, to reach beyond the Government's procedures and conduct a facial

review of the constitutionality of the statute." In re Proceedings,

2008 WL 9487946

,

at ,.5; see also PCLOB at 26·31 (describing judicial review proceedings under

Section 702).

Once its procedures are approved by the FISC, an agency can begin

surveilling individuals it seeks to target. The NSA ''initiates all Section 702

targeting, and thus makes all initial decisions pursuant to its targeting

procedures.'' PCLOB Report at 42. According to the PCLOB, the CIA and the FBI

can "'nominate' targets to the NSA for Section 702 targeting" but the NSA is

required to ·"make the determination whether to initiate targeting."

Id.

Section 702 surveillance usually begins when an agency "tasks" a specific

"selector" or "facility," usually an e•mail address or telephone number. See id. at

32. Much information about the targeting standards used by the NSA remains

classified, but generally "[i}f they are to fulfill their purposes ... [the targeting

procedures submitted to the FISC for approval] should contain a description of

factors that in isolation or combination justify a reasonable belief that the target is

abroad.'' Kris & Wilson § 17:7. According to one commentator, the NSA "has

23 created a presumption of non-U.S. person status/' assuming "that the individual

is a non-U.S. person" if the agency does not know its target is a United States

person. See Donohue, Section 702 at 158.

B. Collection

Once an account or facility such as an e-mail address has been targeted, the

intelligence agencies may then begin to collect information related to that

particular address. Such information includes e-mails to and from a given

account, or information "about" a given account.

1. PRISM and Upstream Collection

The NSA operates two separate types of collection programs which collect

different types of information. These two programs have come to be labelled

PRISM collection and upstream collection.

Under PRISM, the FBI (on behalf of the NSA) sends "selectors" (for

instance, an e-mail address) to internet service providers ("ISPs"), based in the

United States. The ISPs are then required to provide communications sent to or

from that selector to the NSA. See PCLOB Report at 33-34. PRISM, therefore,

collects only the e-mails a given user sends from his or her account, and the e­

mails he or she receives from others through that account. Id. at 34. Collection

24 and review of such material happens roughly in real time, or close to real time. In

other words, �he collected e-mails are not simply swept into a database for use at

some unspecified future time when the database is queried, but are monitored

and analyzed at or near the time of their collection. In that regard, the

interception and review of electronic communications under PRISM resembles a

traditional domestic law enforcement wiretap.

Upstream collection is broader. Instead of compelling information from an

ISP, the NSA instead compels information from "the providers that control the

telecommunications backbone over which communications transit." PCLOB

Report at 35. Upstream fills a gap in PRISM surveillance. Id. If, for instance, an

individual that the NSA sought to target maintained his or her e-mail account

with a foreign internet service provider, that e-mail address would be out of

reach of the PRISM program. In that situation, the NSA could use upstream

collection to collect traffic to that account as it traversed the backbone. Id.

Upstream collection is broader than PRISM, in that it captures not only

conversations to and from a given e-mail address, but also communications

"about" that address (i.e., a conversation between two parties not themselves

targeted that happens to mention whatever the tasked term is). See id. at 37-38.

25 One key difference between PRISM and upstream collection is that PRISM

collects individual communications, while upstream collects whole 1'multi­

communication transactions," or "MCTs." Id. at 39. "An Internet transaction

refers to any set of data that travels across the Internet together such that it may

be understood by a device on the Internet." Id. Thus, a transaction might contain

a single discrete com munication (e.g., a single e-mail), or it could contain

"multiple discrete communications," and "[i]f a single discrete communication

within an MCT is to, from, or about a Section 702-tasked selector, and at least one

end of the transaction is foreign, the NSA will acquire the entire MCT" under

upstream collection. Id. The result is a "greater likelihood" that upstream

collection will "result in the acquisition of wholly domestic communications and

extraneous U.S. person information." Id. at 41. The NSA is the only agency that

receives upstream collection; the CIA and FBI are not provided with information

obtained in this manner and do not store it in their databases. Id. at 54.

2. Incidental and Inadvertent Collection

As detailed above, the statute primarily authorizes agencies like the NSA

to collect the e-mails of "non-United States persons" located abroad. But even if

the government scrupulously follows the procedures intended to restrict

26 collection of communications to and from persons with ties to the United States,

the agencies might still end up collecting information about United States

persons or those located in the United States, or communications sent to or from

a United States person or an individual located in the United States.

Collection may sweep up those individuals' e-mails in two ways,

conventionally referred to as "incidental collection" and "inadvertent collection."

First, collection might be "incidental." PCLOB Report at 114. Incidental collection

occurs when a non-targeted individual (a United States person or someone in the

United States) communicates with a targeted non-United States person located

abroad. Such collection would occur under PRISM, for instance, if the NSA has

targeted the e-mail address of a non-United States person in another country,

and a United States person e-mails that targeted individual. An ISP would be

required to provide the NSA with any such e-mails as part of its compliance with

a Section 702 directive targeting the non-United States party to the

communication.

Second, collection might be "inadvertent." Id. at 116. Inadvertent collection

occurs when the NSA reasonably believes that it is targeting a non-United States

person located abroad, or does not have enough information to determine

27 whether an individual e-mail address or other communications facility is being

used by a United States person or accessed from within the United States, and

therefore presumes that the account is controlled by a foreigner outside the

United States. The collection is characterized as "inadvertent" when the agency

learns that the person controlling the account is a United States person after it

has already acquired some of the person's communications. In essence,

inadvertent collection occurs when the NSA targets United States persons or

individuals located within the United States in error: the agency thought it was

targeting a foreign individual abroad, but the targeted person was in fact a

United States person or an individual located in the United States.

C. "Minimization"

In general terms, minimization describes the manner in which the

government processes communications after they have been collected and seeks

to provide safeguards against the misuse of Section 702 information. See PCLOB

Report at SO. The 2011 Minimization Procedures, which have been declassified,

apply "to the acquisition, retention, use, and dissemination of non-publicly

available information concerning unconsenting United States persons that is

acquired by targeting non-United States persons reasonably believed to be

28 located outside the United States." Se,e Minimization Procedures Used by the

National Security Agency in Connection with Acquisitions of Foreign Intelligence

Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of

1978, As Amended§ 1, National Security Agency (Oct. 31, 2011),

https://www.dni.gov/files/documents/

Minimization%20Procedures%20Used %20By%20NSA%20In%20Connection%20

With%20FISA%20Section%20702.pdf ("NSA 2011 Minimization Procedures").10

As with their targeting procedures, the NSA, FBI, and CIA must seek

yearly approval of their minimization procedures from the FISC. 50 U.S.C.

§ 1881a(e)(2). Section 702 requires that each agency also adopt procedures that

prohibit the disclosure of information about United States persons in a manner

that identifies them, unless that identity is necessary to understand the

intelligence information. See 50 U.S.C.§ 1881a(e)(1) (cross-referencing

50 U.S.C. §§ 1821

(4) and 1801(h)); see also Kris & Wilson§ 9:1. By statute, the procedures

must ensure ''that nonpublicly available information, which is not foreign

intelligence information ... shall not be disseminated in a manner that identifies

These minimization procedures were submitted to the FISC for approval after 10

Hasbajrami' s arrest, and therefore did not govern the operation of Section 702 during the time period relevant here. 29 any United States person, without such person's consent, unless such person's

identity is necessary to understand foreign intelligence information or assess its

importance."

50 U.S.C. § 1801

(h)(2).

Minimization procedures seek to "balance the government's need to

acquire, retain, and disseminate forei gn intelligence information, against the

countervailing privacy interests of U.S. persons." Kris & Wilson§ 9:1; PCLOB

Report at 50 ("Minimization procedures are best understood as a set of controls

on data to balance privacy and national security interests."). The meaning of the

term as used in the FISA context is subtly different from what it means in the

more familiar context of court-authorized domestic electronic surveillance by law

enforcement agencies under traditional domestic wiretaps. In the latter context,

minimization procedures generally involve stopping the monitoring of

communications that can be determined in real time to be non-evidentiary. In the

context of Section 702 surveillance, the information subject to minimization has

already been collected. After review, it is either retained or destroyed;

information is "minimized'' by non-retention. NSA analysts are instructed to

"exercise reasonable judgment in determining whether information acquired

must be minimized and will destroy inadvertently acquired communications of

30 or concerning a United States person at the earliest practicable point in the

processing cycle at which such communication can be identified either: as clearly

not relevant to the authorized purpose of the acquisition (e.g., the

communication does not contain foreign intelligence information); or, as not

containing evidence of a crime which may be disseminated under these

procedures." 11 NSA 2011 Minimization Procedure§ 3(b)(l).

After an NSA analyst reviews an individual e-mail communication, he or

she will decide if the information warrants retention in the NSA's databases

and/or dissemination to other agencies. The analyst will determine if "it is a

domestic or foreign communication to, from, or about a target and is reasonably

believed to contain foreign intelligence information or evidence of a crime." Id.

§ 3(b)(4). Communications fitting this description will thus.be retained and

processed; information not involving foreign intelligence information or

evidence of a crime will be destroyed unless it meets one of several exceptions,

11 It is not clear whether the minimization procedures' use of "inadvertent" here is intended broadly to invoke the word's p1ain meaning, or is used as a term of art to apply the provision only to communications acquired as a result of "inadvertent collection," as defined above, where a United States person has been erroneously targeted. 31 such as when "the communication contains information pertaining to a threat of

serious harm to life or property." Id. § 5(4).

When an e-mail or other communication is processed and retained, the

information will be scanned and stored. Information that "do[es] not meet the

retention standards ... and ... [is] known to contain communications of or

concerning United States persons" will be "destroyed upon recognition." Id.

§ 3(c)(l). If a target moves to the United States, or if the NSA uncovers

information that the target is a United States person, "acquisition from that

person will be terminated without delay." Id.§ 3(d)(l).

"[D]omestic communications" - all communications that do not have "at

least one communicant outside the United States," id.§ 2(e), "will be promptly

destroyed," except under certain conditions. Id.§ 5. Such conditions include if a

communication is "reasonably believed to contain significant foreign intelligence

information,'' which may be provided to the FBI (which in tum may disseminate

information "in accordance with its minimization procedures"). Id. § 5(1).

Information that is "reasonably believed to contain evidence of a crime that has

been, is being, or is about to be committed 11 may be "disseminated (including

32 United States person identities) to appropriate Federal law enforcement

agencies." Id. § 5(2).

D. Retention and Dissemination

As addressed above, the minimization procedures also govern the ultimate

retention of surveillance materials and the "reporting of acquired information

outside of [the] intelligence agency" that collects the information. PCLOB Report

at 64. The minimization procedures treat retention and dissemination in similar

ways: the NSA, for instance, may retain communications "in generally the same

situations where the NSA is permitted to disseminate ... these communications"

to other agencies. Id. at 62.

1be retention and dissemination of information gathered under the FAA is also governed by the same restrictions that apply to traditional FISA. Id. at 64.

Additional protections generally apply if the NSA, for instance, seeks to

disseminate Section 702 information con taining the identity of a United States

person. The NSA will then "mask" the identity, deleting any identifying

information unless certain exceptions apply. These exceptions include when "the

U.S. person's identity is necessary to understand foreign intelligence

33 information, or the communication contains evidence of a crime and is being

disseminated to law enforcement authorities." Id. at 65.

Agencies relying on NSA reporting may request that the identity of a

United States person be unmasked. Id. The NSA may provide that information if

at least one additional criterion is met, including when "the identity of the

United States person is necessary to understand foreign intelligence information"

or the information "indicates that the United States person" is an "agent of a

foreign power" or the "target of intelligence activities of a foreign power." NSA

2011 Minimization Procedure § 6(b). Agencies may also request that information

about a given e-mail address or facility be forwarded on a regular basis.

E. Storage and Querying

Once communications are collected and retained or disseminated, each

agency may establish databases to store those communications in its possession,

and may query those stored communications to identify information of interest

in connection with a particular investigation or agency function.

The NSA, CIA, and FBI each maintain separate databases containing

Section 702 information on which the agencies rely for their own purposes.

PCLOB Report at 55-56. According to the PCLOB,. the NSA, for instance, 11 often

34 stores data acquired from multiple legal authorities in a single data repository.''

PCLOB at 55. The agency then "tags" the sources for each piece of information,

and "has systems that prevent an analyst from accessing or querying data

acquired under a legal authority for which the analyst does not have the requisite

training." 12 Id. at 55-56. The CIA limits access to databases that contain Section

702-acquired information to only those agents who have had the requisite

training. Id. at 55. And the FBI "stores electronic data obtained from traditional

FISA electronic surveillance and physical searches ... in the same repositories as

the FBI stores Section 702-acquired data." Id. at 59. An agent without requisite

training would see whether a piece of Section 702-acquired information was

responsive to her query, but she would not be able to view the actual underlying

material without clearance. Id.

1 'Data is frequently reviewed through queries, which identify

communications that have particular characteristics specified in the query, such

as containing a particular name or having been sent to or from a partic ular e-mail

address." Id. at 127. Colloquially, the parties (and those engaged in policy

12Each agency with access to Section 702 data provides training to personnel regarding the proper use of Section 702 material, as well as the agency's minimization procedures. See PCLOB Report at 53-54. The exact training procedures and who is trained may vary by agency. 35 debates about the program) have referred to this querying capability as

"backdoor searches."

Originally, the minimization procedures precluded analysts from

searching terms associated with United States persons. See Classified

Supplemental App'x at 121-22

In

April 2011, the government sought approval for new minimization procedures

that allowed the querying of terms related to United States persons. See Bates

Decision,

2011 WL 10945618

at '7-8. The FISC ultimately approved the new

procedures in October 2011 (i.e., after Hasbajrami's arrest) because they were

"designed to yield foreign intelligence information.''

Id.

at •7_ Querying, the court

stated, "should not be problematic in a collection that is focused on non-United

States persons located outside the United States and that, in the aggregate, is less

36 likely to result in the acquisition of nonpublic information regarding non­

consenting United States persons."

Id.

In a June 2014 letter to Senator Wyden, Deirdre Walsh, Director of

Legislative Affairs for the Office of the Director of National Intelligence, stated

that each of the three agencies allowed querying. The NSA could query Section

702-acquired information if it had a "reasonable basis to expect the query will

return foreign intelligence,'' as could the CIA and the FBI. See Response to

Question from the 5 June 2014 Hearing, Letter from Deirdre Walsh, Director of

Legislative Affairs, to Senator Ron Wyden (June 27, 2014) ("Walsh Letter"); see

also PCLOB Report at 57-58. The FBI is also allowed to query its own databases

in such a way that these queries are "designed to find and extract evidence of a

crime." Walsh Letter at 2. The FBI also will query previously acquired

information from a variety of sources, including Section 702 when it "opens new

national security investigations." Id. at 3.

Recently, and after the time pericxl at issue in this case, Congress enacted

the FISA Amendments Reauthorization Act of 2017,

Pub. L. No. 115-118, 132

Stat.

3 (2018), codified at SO U.S.C. § 1881a. The act amended the FAA to require the

agencies to develop "querying procedures" alongside their targeting and

37 minimization procedures and seek approval of all three sets of procedures yearly

from the FISC. Congress also amended the FAA to require a court order in most

cases where the FBI seeks to "access the contents of communications ... that

were retrieved pursuant to a query made using a United States person query

term that was not designed to find and extract foreign intelligence information.''

50 U.S.C. § 1881a{f)(2)(A). Such querying standards were not in place when the

surveillance at issue here occurred.

Ill. The District Court's Denial of Hasbajrami's Suppression Motion

As noted above, Hasbajrami moved to suppress "the fruits of all

warrantless FAA surveillance." See Suppression Motion at 8. He also moved for

discovery of the FISA and Section 702 information relevant to his case.

After the district court reviewed the relevant materials ex parte and in

camera, it denied the suppression motion. See United States v, Hasbajrami, 1:11-cr-

623,

2016 WL 1029500

(E.D.N.Y. Feb. 18, 2016) ("Suppression Decision''). 13 It

treated the suppression motion as an as-applied challenge to the Section 702

surveillance used to support the government's initial application to the FISC,

13As addressed below, the district court announced its decision on February 15, 2015, in a text order on the docket, issued without an opinion. The redacted opinion was issued on the public docket in March 2016. 38 primarily addressing the issue of collection. Id. at *7. First, after noting the ,

distinction between PRISM and upstream collection, the court concluded that

"[n]one of the Section 702 communications used in Title I and Title II FISA

applications targeting the agent of the foreign power were 'about'

communications" and therefore "the constitutionality of upstream collection

[was] not at issue" in Hasbajrami's case. Id. at *6-7.

The district court then turned to PRISM collection. Summarizing

precedent, the court noted that the Fourth Amendment "does not constrain the

government from collecting the communications of non-U.S. individuals targeted

by Section 702 surveillance." Id. at .,.7, Although Hasbajrami was a legal

perm.anent resident located in the United States, the court found that it was

"non-U.S. persons who were the targets of Section 702 surveillance" and that

Hasbajrami's e-mails were collected incidentally to the surveillance of

individuals the court described as "legitimate targets of Section 702

surveillance." Id. The court concluded that the incidental interception of the

communications of individuals in the United States was constitutional because

the surveillance was "lawful in the first place - whether it is the domestic

surveillance of U.S. persons pursuant to a warrant or the warrantless surveillance

39 of non-U.S. persons who are abroad - [and therefore] the incidental interception

of non-targeted U.S. persons' communications with the targeted persons is also

lawful." Id. at 11-9,

The court did not address whether any inadvertent collection related to

Hasbajrami. It also did not address the specifics of any querying as applied to

Hasbajrami in particular, and there does not appear to have been any fact­

finding regarding the querying of previously-collected communications with

identifiers related to Hasbajrami. Instead, the parties had raised querying within

the context of whether the minimization procedures were reasonable, and the

government argued that it was permitted to query whatever data it had lawfully

collected even if it used identifiers it knew were associated with United States

persons. See Gov't Mem. of Law at 71, United States v. Hasbajrami, 1:ll-c:r-623

(E.D.N.Y. filed Dec. 23, 2014), ECF No. 97. To the extent that the district court

considered querying, then, it appeared to adopt the government's position,

stating in a footnote:

That the government is able to query information obtained under the PRISM program, i.e. lawfully­ obtained communications that were to or from legitimate targets, does not render the minimization procedures inadequate, as amici contend .... Here, once the government learned that the target was potentially

40 an agent of a foreign power, the government sought orders from the FISC for electronic surveillance and physical searches pursuant to Title I and Title III of FISA targeting an agent of a foreign power .... I agree with the government that "[i]t would be perverse to authorize the unrestricted review of lawfully collected information but then [] restrict the targeted review of the same information in response to tailored inquiries." Gov't Br. at 71-72.

Suppression Decision,

2016 WL 1029500

at *12 n.20.

As for Hasbajrami's request to provide discovery to properly-cleared

defense counsel, the district court concluded that disclosure was unnecessary.

Id.

at "'14. Instead, its review was "relatively straightforward and not complex" and

the district court was "able to evaluate the legality of the challenged surveillance

without concluding that due process first warranted disclosure."

Id.

at *14 (citing

United States v. Abu-Jihaad,

630 F.3d 102, 129

(2d Cir. 2010)).

IV. Further Proceedings at the District Court

The district court denied the motion to suppress in a text order dated

February 20, 2015. The order stated that "[a]n opinion [would] follow," but that

the motion would be denied as to "the fruits of the FAA surveillance, including

the defendant's post-arrest statements." App'x at 16. The court noted that it

would hold a conference and "inquire of the government whether it intends to

offer once again the charge bargain that was previously accepted by the 41 defendant, and whether it has considered the prospect of allowing the defendant

to enter such a plea pursuant to Rule ll(a)(2), reserving his right to seek

appellate review of [the district court's] denial of the motion to suppress

evidence."

Id.

The parties prepared for trial, but Hasbajrami in due course again pleaded

guilty, this time to a two-count Superseding Information, which charged him

with providing and attempting to provide material support to terrorists.

According to the terms of the agreement, Hasbajrami:

[A]gree[d] not to file an appeal or otherwise challenge ... the conviction or sentence in the event that the Court imposes a term of imprisonment of 180 months or below, with the sole and limit�d exception that, pursuant to Federal Rule of Criminal Procedure ll(a)(2), the defendant may appeal the District Court's February 20, 2015 denial of his motion to suppress evidence that was obtained or derived from surveillance conducted pursuant to the FISA Amendments Act of 2008, 50 U.S.C. §§ 1881a et seq.

App'x at 48. Hasbajrami also consented to his removal, after serving his sentence,

from the United States. The district court sentenced H asbajrami to a term of 180

months' imprisonment on Count One and 12 months' imprisonment on Count

Two, each to run consecutively.

42 On March 8, 2016 - more than one year after it denied the motion - the

district court issued a redacted opinion on the public docket explaining its

reasons for denying suppression. Hasbajrami requested that the full decision be

released to his cleared defense counsel, so that he might better prepare his

appeal. The court (Dora L. Irizarry, C./.)14 held that PISA required redaction and

that "Defendant's counsel are not entitled to view the Unredacted Opinion

because releasing it would reveal classified foreign intelligence informatio n and

circumvent FISA .... " United States v. Hasbajrami, l:11-cr-623,

2017 WL 3610595

at "'3 (E.D.N.Y. April 6, 2017).

V. Proceedings on Appeal

Hasbajrami timely filed two notices of appeal. The first addressed the

district court's denial of Hasbajrami's motion to suppress; the second addressed

the district court's decision to deny Hasbajrami' s counsel access to the

unredacted and unmodified version of the suppression ruling. Both appeals were

consolidated and argument was heard by this Court on August 27, 2018.

At oral argument, the government was unable to represent whether or not

identifiers related to Hasbajrami had been used in querying previously-acquired

14By this point, the case had been transferred to Chief Judge Irizarry following Judge Gleeson's resignation. 43 Section 702 surveillance databases. This Court therefore ordered the government

to "identify(] the record evidence that supports the proposed factual inference

that it conducted no queries or back.door searches of Section 702 material with

regard to Hasbajrami before or leading to the FISA court's issuance of Title I and

Title ID warrants with respect to Hasbajrami." Order, United States v. Hasbajrami,

Nos. 15-2684, 17-2669 {2d Cir. Sept. 4, 2018), ECF No. 203.

Both parties filed supplemental briefing, including an additional classified

brief from the government (which was posted, heavily redacted, on the public

docket for this appeal).

DISCUSSION

Hasbajrami primarily raises an as-applied challenge to the

constitutionality of warrantless collection and review of his communications

under Section 702. 15 As the PCLOB notes, judicial review of Section 702

surveillance presents particular challenges because the program:

entails many separate decisions to monitor large numbers of individuals, resulting in the annual collection of hundreds of millions of communications of

15Hasbajrami also raises an alternative statutory argument, arguing that suppression was warranted because he claims the surveillance did not comply with the requirements of Section 702 itself. The Court has carefully considered the argument, in light of the classified record, and finds it without merit.

44 different types, obtained through a variety of methods, pursuant to multiple foreign intelligence imperatives, and involving four intelligence agencies that each have their own rules governing how they may handle and use the communications that are acquired.

PCLOB Report at 86. In other words, review is difficult because we must

consider those individual "separate decisions" within the context of the program

as a whole.16

In this case, it is undisputed that the government possessed ample

evidence obtained from surveillance authorized by a FISA warrant to convict

Hasbajrami. The evidence that formed the basis for that warrant however, was

obtained as a result of warrantless Section 702 surveillance of non-United States

persons located abroad. Thus, the primary issue, affecting the bulk of the

evidence against Hasbajrami, is whether the incidental collection of the

communications of United' States persons, without a warrant, violates the Fourth

Amendment. We conclude, as did the district court, that such collection is lawful.

But that is not the only action involving Section 702 surveillance at issue here.

16When reviewing a district court's denial of a motion to suppress evidence, we review the court's legal determinations de novo and its factual findings for clear error. United States v. Boles,

914 F.3d 95, 102

(2d Cir. 2019). The issues on appeal are legal, and therefore our review here is de nova. 45 We must also address inadvertent collection, storage and querying, as each of

these issues is raised by the record.

The record is sufficient to permit us to answer the principal question

before us: we conclude that the district court correctly held that the incidental

collection in this case, and the government's use of the information thus

collected, was lawful. The record also permits us to conclude that, even assuming

that inadvertent collection of the communications of United States persons may

in some circumstances violate the Constitution, the effect of any such collection

in this case was harmless beyond a reasonable doubt. The absence of evidence in

the record regarding

, however, prevents us from

determining the reasonableness of any such querying

prior to the FISC's probable-cause finding, and from fully understanding how if

at all the results of such querying affected the subsequent conduct of the

investigation. As a result, we must remand for further proceedings and fact­

finding by the district court.

46 I. ..,Incidental" Collection

The primary type of Section 702 collection we must address here involves

"incidental" collection. The government was "targeting," within the meaning of

Section 702, the accounts of individuals located abroad who were reasonably

believed to be agents of terrorist organizations. In collecting communications

from those accounts, the government collected e-mails between Hasbajrami and

In reviewing

Hasbajrami's suppression motion, the district court focused on this incidental

collection, ultimately concluding that a warrant was not required and the

government's actions were reasonable.

On appeal, Hasbajrami and the amici argue that the Fourth Amendment

bars the incidental collection of e-mails of individuals, like Hasbajrami, located in

47 the United States. First, they argue that surveillance of individuals in the United

States is per se unreasonable if it is conducted without a warrant. They also focus

on the specific attributes of warrants - the particularity requirement, the need

for a neutral judicial forum and a finding of probable cause - and argue that

Section 702,. the targeting and minimization procedures, and FISC oversight do

not provide a substitute procedure sufficient to satisfy the Fourth Amendment.

According to Hasbajrami, the broad scope of Section 702's surveillance and the

government's failure to seek a warrant or its equivalent render the program

unconstitutional as applied to him and therefore requires the suppression of

evidence acquired under the program.

We disagree. In addressing the issues before us, we adopt an approach

similar to that employed by the United States Court of Appeals for the Ninth

Circuit in United States v. Mohamud,

843 F.3d 420

(9th Cir. 2016). We must first

decide whether a warrant is required for the government's incidental collection

of the communications of United States persons. We conclude that a warrant is

not required for such collection. But "[e]ven if a warrant is not required, a search

is not beyond Fourth Amendment scrutiny; for it must be reasonable in its scope

and manner of execution." Maryland v. King,

569 U.S. 435, 448

(2013); see also

48 Mohamud,

843 F.3d at 441

. We further conclude that the incidental collection of

Hasbajrami's e-mails was reasonable.

A. No Warrant was Required

We conclude that a warrant is not required based on two well-established

principles of Fourth Amendment law. First, the Fourth Amendment does not

apply extraterritorially to the surveillance of persons abroad, including United

States citizens. Second, law enforcement officers do not need to seek an additional

warrant or probable cause determination to continue surveillance when, in the

course of executing a warrant or engaging in other lawful search activities, they

come upon evidence of other criminal activity outside the scope of the warrant or

the rationale justifying the search, or the participation of individuals not the

subject of that initial warrant or search.

First, the Fourth Amendment (and, in particular, its warrant requirement)

does not apply extraterritorially. See United States v. Verdugo-Urquidez,

494 U.S. 259

(1990). In Verdugo-Urquidez, agents from the United States Drug Enforcement

Agency, working alongside Mexican law enforcement, raided without a warrant

properties in Mexico owned by the defendant.

Id. at 262-63

. The agents believed

that the defendant was the leader of a narcotics smuggling ring and they seized

49 documents and "a tally sheet" detailing quantities of drugs possessed and

transported.

Id.

Prior to trial, the defendant sought suppression of the evidence,

arguing that the agents should have sought a warrant before searching his

property.

Id. at 263-64

.

The Supreme Court held that suppression of the evidence was not

required, because the Fourth Amendment does not apply to extraterritorial

actions by law enforcement, at least where the "[the defendant] was a citizen and

resident of Mexico with no voluntary attachment to the United States, and the

place searched was located in Mexico."

Id. at 274-75

. "Under these

circumstances," the Court held, "the Fourth Amendment ha[d] no application."

Id. at 275

.

This Court has since extended Verdugo-Urquidez's holding to conclude that

the Warrant Oause of the Fourth Amendment does not apply to the surveillance

of United States citizens abroad. See In re Terrorist Bombings,

552 F.3d 157, 171

(2d

Cir. 2008). The defendant in that case, a United States citizen with a home in

Kenya, had "urged the suppression of the evidence resulting from the ...

[electronic] surveillance of his Kenyan telephone lines'' because it was not

authorized by a valid warrant or, alternatively, because the surveillance was

50 unreasonable.

Id. at 160

. This Court held that "the Fourth Amendment's Warrant

Clause has no extraterritorial application and that foreign searches of U.S.

citizens conducted by U.S. agents are subject only to the Fourth Amendment's

requirement of reasonableness."

Id. at 171

. \Ve determined that the searches in

that case were ultimately reasonable and therefore suppression of the evidence

was not required.

Verdugo-Urquidez and In re Terrorist Bombin&s make it dear that the Fourth

Amendment does not requirl:! the government to obtain a warrant before

collecting the e-mails of foreign individuals abroad. Nor can there be any

question that the electronic surveillance of foreign individuals located abroad

who are reasonably believed to hold themselves out as agents and - of

terrorist organizations targeting the United States is reasonable within the

meaning of the Fourth Amendment. Efforts to monitor the activities of such

individuals to detect and forestall possible te rrorist attacks on this country

present a paradigm case of a compelling government interest. The protections

extended by the Fourth Amendment to foreign individuals abroad, if any, are

minimal and plainly outweighed by the paramount national interest in

preventing foreign attacks on our nation and its people.

51 But while the warrantless surveillance of foreign individuals abroad under

the circumstances that existed here presents no cognizable constitutional

problem, we must nevertheless still consider what protections the Fourth

Amendment provides individuals located within the United States who

communicate with the foreign individuals abroad lawfully targeted under

Section 702.

The second Fourth Amendment principle implicated by incidental

collection speaks directly to that concern. The Fourth Amendment generally is

not violated when law enforcement officers, having lawfully undertaken

electronic surveillance, whether under the authority of a warrant or an exception

to the warrant requirement, discover and seize either evidence of criminal

activity that they would not have had probable cause to search for in the first

place, or the relevant conversations of an individual they did not anticipate or

name in a warrant application. See, e.g., United States v. Donovan,

429 U.S. 413

,427

& n.15 (1977) (noting, as to domestic wiretaps, "[i]t is not a constitutional

requirement that all those likely to be overheard engaging in incriminating

conversations be named."); United States v. Figueroa,

757 F.2d 466,472

(2d Cir.

1985) ("More particularly, the mere fact that Title III allows interception of

52 conversations of 'others as yet unknown' do es not render the statute

unconstitutional on its face as authorizing a general warrant.'').

This line of cases has come to be known as the "incidental overhear"

doctrine. See, e.g., Suppression Decision,

2016 WL 1029500

at ""9 (noting that

"[ c]ourts have long dealt with the issue of incidental interception of non-targeted

persons' communications" and collecting cases). Courts have repeatedly held

that law enforcement agents do not need to obtain a separate warrant to collect

conversations of persons as to whom probable cause did not previously exist

with individuals whose oral or wire communications are being collected through

a lawful wiretap or bug, where those conversations on their face contain

evidence of criminal activity.17 See, e.g., Donovan,

429 U.S. at 427

& n.15; Figueroa,

757 F.2d at 472

; see also In re Certified Question of Law,

858 F.3d 605

(FISA Ct. Rev.

2016) (finding incidental collection of content information reasonable where

warrant was obtained only for non-content dialing information); United States v.

17The "incidental overhear" doctrine is closely related to the "plain view" doctrine applied in connection with physical searches. See, e.g., Coolidge v. New Hampshire,

403 U.S. 443, 465-67

(1971) (describing plain view doctrine and noting that "[t]he doctrine serves to supplement the prior justification - whether it be a warrant ... , hot pursuit, search incident to lawful arrest, or some other legitimate reason for being pr esent unconnected with a search directed against the accused - and permits the warrantless seizure."}.

53 Stewart, 590

F.3d 93, 129 (2d Cir. 2009) (concluding. in challenge to Title I FISA

surveillance, that "[b]ecause Stewart's co-conspirators were targeted pursuant to

proper procedures, the Fourth Amendment did not require that Stewart also be

identified or described as a target in order for her intercepted conversations to be

used in a criminal prosecution.'') (internal citation omitted).

Combining these two Fourth Amendment principles, the government may

lawfully collect, without a warrant and pursuant to Section 702, the e-mails of

foreign individuals located abroad who reasonably appear to constitute a

potential threat to the United States and, once it is lawfully collecting those e-

mails, it does not need to seek a warrant, supported by probable cause, to

continue to collect e-mails between that person and other individuals once it is

learned that some of those individuals are United States citizens or lawful

permanent residents, or are located in the United States. Accord Mohamud,

843 F.3d at 441

; see also United States v. Mohammad,

339 F. Supp. 3d 724, 748-49

(N.D.

Ohio 2018) (applying Verdugo-Urquidez and rejecting Fourth Amendment

challenge to Section 702 surveillance where, despite marriage to United States

citizen, defendant lived abroad at time of offense); United States v. Muhtorov,

187 F. Supp. 3d 1240, 1258

(D. Colo. 2015) (rejecting facial and as applied challenge to

54 incidental collection under Section 702 and concluding that a warrant was not

acquired and search as reasonable). That is the case even if the government

would have needed, but did not have, a warrant or probable cause had it sought

to collect the e-mails of the American third party in the first instance. Cf. In re

Certified Question,

858 F.3d at 604

(framing constitutional issue as whether

incidental content collection rendered primary dialing information collection

unreasonable, not whether warrant would have been required for content

collection in its own right).

Objecting to this conclusion, Hasbajrami and amici advance several

arguments seeking to apply the warrant requirement to Hasbajrami's case. Each

is unavailing.

First, they argue that Verdugo-Urquidez does not control the outcome here

because Section 702 collection occurs in the United States. Practically speaking,

Section 702 surveillance could occur only within the United States, as the agencies

can compel only ISPs located in the United States to provide e-mails.

But Fourth Amendment doctrine relating to wire or electronic

communication does not focus on the location where the communication takes

place. Katz v. United States,

389 U.S. 347

(1967), the seminal Supreme Court

55 decision on the interception of such communication, holds that a person's

privacy interest in his or her communications does not depend on whether the

government ph ysically intrudes into a physical space in which that person has a

property interest or an expectation of physical privacy. What matters, and what

implicates the protection of the Fourth Amendment, is the expectation of privacy

in the communications themselves, and therefore a warrant is required to seize

even those communications made in a public telephone booth. Conversely, by

the same reasoning, a person who does not have a Fourth Amendment-protected

privacy interest in his communications, such as a foreign national resident

abroad, does not acquire such an interest by reason of the physical location of the

intercepting device. At least where the communication is collected essentially in

real time as it occurs, the targeted communication, whether conducted over

telephone wires or via the internet, occurs in the relevant sense where the person

whose calls or e-mails are being intercepted is located, regardless of the location

of the means used to intercept it.

Second, Hasbajrami argues that the surveillance cannot be properly

considered "incidental" where the government can or even does expect to collect

conversations with people with ties to the United States or located within its

56 borders. While we have concerns, expressed below, about the potential scope of

Section 702 surveillance, those concerns are less applicable where, as here,

collection and review are occurring nearly contemporaneously and that

collection is ancillary to lawful surveillance of a permitted target. In the nahlre of

law enforcement, there is always a possibility that the collection of evidence

against a person who there is already probable cause to believe is involved in

criminal activity or who is otherwise legitimately subject to surveillance will also

develop information about others not previously reasonably suspected of

wrongdoing. There is no contention here that the Section 702 surveillance was

undertaken as a pretext to collect the communications of Hasbajrami, or of any

other identified United States person or person located in the United States. That

the overall practice of surveilling foreigners abroad of interest to the legitimate

purpose of gathering foreign intelligence information may predictably lead to the

interception of communications with United States persons no more invalidates

that practice, or requires the government to cease its surveillance of the target

until a warrant is obtained, than the general foreseeability of intercepting

communications with previously unknown co~conspirators undermines the

inadvertent overhear doctrine in ordinary domestic criminal wiretapping.

57 11 Finally, Hasbajrami and amid seek to distinguish the incidental overhear"

line of cases, noting that in those cases there was already an initial warrant

supported by probable cause. They agree, however, that "the incidental overhear

cases simply stand for the proposition that the government need not obtain

multiple warrants to intercept protected communications." Brief of Amici Curiae

American Civil Liberties Union and Electronic Frontier Foundation at 15, United

States v. Hasbajrami, No. 15-2684 (2d Cir. Oct. 23, 2017} (emphasis in original).

That is exactly the point here: once that initial surveillance is rendered lawful by

a warrant, a FISC order, or some other exception to the warrant requirement, an

additional warrant is not necessary in order to collect the calls or e-mails of third

parties. As the district court recognized, once the surveillance was "lawful in the

first place -whether it is the domestic surveillance of U.S. persons pursuant to a

warrant or the warrantless surveillance of non-U.S. persons who are abroad -

the incidental interception of non-targeted U.S. persons' communications with

the targeted persons is also lawful." Suppression Decision,

2016 WL 1029500

at ""9.

The reason why the initial surveillance was lawful does not matter to this

conclusion.

58 Accordingly, the incidental collection of United States persons' e-mails

during lawful foreign intelligence surveillance of foreigners located abroad is not

per se unreasonable because the collection is done without a warrant.

B. Incidental Collection of E-mails under Section 702 is Reasonable

Even absent a warrant requirement, however, the government's action

must still be reasonable, at least insofar as it affects United States persons, to be

consistent with the Fourth A mendment. King,

569 U.S. at 448

. "To determine

whether a search is reasonable under the Fourth Amendment, we examine the

totality of the circumstances to balance, on the one hand, the degree to which it

intrudes upon an individual's privacy and, on the other, the degree to which it is

needed for the promotion of legitimate government interests." ln re Terrorist

Bombings,

552 F.3d at 172

(internal quotation marks omitted).

For the purposes of Hasbajrami's appeal, we may assume that a United

States person ordinarily has a reasonable expectation in the privacy of his e-mails

sufficient to trigger a Fourth Amendment reasonableness inquiry when the

government undertakes to monitor even foreign communications in a way that

can be expected to, and in fact does, lead to the interception of communications

with United States persons. See, e.g., United States v. Warshak,

631 F.3d 266

, 285-86

59 (6th Cir. 2010) (analogizing between letters and e-mails and finding reasonable

expectation of privacy). In other words, we can assume that the government may

not eavesdrop, without reasonable justification, on the conversations of United

States persons (even abroad) with foreign nationals, simply because the United

States person is interacting with a foreigner. Even assuming that a United States

person might be understood to take some risk that the person with whom he or

she is communicating is under surveillance, it does not follow that an American

communicating with a foreign national must take the risk that the person with

whom he is communicating is subject to unreasonable, or indiscriminate,

electronic surveillance, or that communicating with foreigners subjects the

American national himself or herself to continuing surveillance.

But such a privacy interest can be outweighed by the government's

"manifest need to monitor'' the communications of foreign agents of terrorist

organizations operating abroad, and this need outweighs that interest in privacy

and makes the incidental collection of communications between such foreigners

and United States persons reasonable. In re Terrorist Bombings,

552 F.3d at 172

.

Even in the context of conventional warfare, identifying domestic agents of

foreign powers is a principal concern of intelligence-gathering. The need to

60 identify potential domestic co�conspirators of hostile foreign persons or groups is

even greater in the context of informal non-state terrorist organizations and

movements. The recruitment of persons inside the United States or the placement

of agents here to carry out terrorist attacks is one of the very threats that make it

vital to surveil terrorist actors abroad. The communications of terrorist

operatives abroad with persons inside the United States is thus of particular

importance, and at least as important as monitoring the communications of

foreign terrorists abroad among themselves. 18

The logic of this conclusion is dear and compelling. If it is reasonable -

and indeed necessary to the national security - for intelligence agencies to

monitor the communications of suspected forei gn terrorists abroad, the need to

keep track of the potential threat from abroad does not lessen because some of

the suspect's contacts turn out to be American nationals, or foreign nationals

located within the United States. And when the conversations being monitored

18The same reasoning defeats any argument that such monitoring should be limited to the acquisition of forei gn intelligence, and that communications collected for that purpose should not be made available to domestic law enforcement agencies. There is little point in having intelligence agencies collect information abroad if those agencies are not able to share what they learn with domestic law enforcement when the information they acquire points to ongoing or impending criminal activities inside our borders. 61 constitute evidence of criminal conspiracies between the foreign operative and

someone located within the United States, the urgency becomes greater, not less.

The logic of the plai n view and inadvertent overhear cases fully applies: when an

officer executing a lawful search or electronic surveillance warrant, or otherwise

engaged in a lawful search, comes upon evidence of a previously unsuspected

crime, or learns of the involvement of a previously unsuspected individual, the

officer is not required to stop and obtain a new warrant to seize the item or to

continue monitoring the phone line for which the warrant was obtained. The

seizure of evidence of a crime in plain view without a warrant is a reasonab le

seizure. In the same way., when evidence of a potential crime involving an

American comes to light during the lawful surveillance of a foreign operative

abroad, it is entirely reasonable within the meaning of the Fourth Amendment

for the government to continue monitoring the conversations of that operative

with the American as well as with his or her other associates. 1'.I

19 Of course, if the government wishes to expand the investigation to monitor the communications of the newly discovered United States-connected suspect, it

- would be required to obtain a conventional Title III or traditional PISA warrant

62 In balancing Hasbajrami's privacy interest with the government's concern

for national security, then1 we conclude that the totality of the circumstances here

weighs in the government's favor. The incidental collection of communications

between targeted foreigners abroad and United States persons or persons in the

United States is thus reasonable. For similar reasons, when the intelligence

information properly collected raises reasonable grounds to believe that a crime

is being committed or planned in the United States, dissemination of the

information to a domestic law enforcement agency such as the FBI is also

reasonable.

In summary, the district court reached the correct conclusions regarding

incidental collection: the initial targeting of individuals without ties to the United

States and located abroad is lawful; there is no need for a wanant in order to

collect incidental communications by United States persons to and from those

individuals; and both the collection of such communications and the

dissemination of information from such collection about potential criminal

actions within the country to domestic law enforcement are reasonable under the

Fourth Amendment. Were such incidental collection the only Section 702

material relevant to Hasbajramts motion, we would simply affirm the district

63 court's ruling. But, as the record rurrently stands, we must also consider

additional issues.

II. "Inadvertent" Collection

The district court's ruling on the suppression motion did not address

whether any e-mail accounts of United States persons or individuals within the

United States, including Hasbajrami, had been "inadvertently" targeted, that is,

targeted by mistake under the presumption that an address was controlled by a

non-United States person.

Upon reviewing the classified record, in particular its ex parte proceedings

under the Classified Information Procedures Act ("CIP A"), 18 U.S.C. app. 3, § 1 et

seq., it is clear that the district court was made aware of one instance of the direct

targeting of an e-mail account controlled by a United States person that resulted

in the collection of Hasbajrami's communications. Before the incidental collection

discussed above, the NSA had directly targeted at least one such e-mail address.

Like the later incidental collection, the NSA had originally been monitoring

communications with individuals it reasonably believed were non-United States

persons located abroad, and as a result discovered an e-mail from the United

States person. At that time, however, NSA analysts concluded, wrongly, that the

64 account holder was not a United States person. The NSA therefore tasked the

account (a different account than those that were the subject of incidental

collection detailed above) in its own right, and collected communications from

the account for several weeks. The agency eventually detasked the account after

it concluded it was not yielding significant intelligence information, but it did

not initially purge the information because it did not discover until later that the

account holder was a United States person. The related Section 702-acquired

material, which included communications to and/or from Hasbajrami, stayed in

NSA databases, however, and was not disseminated to domestic law

enforcement, until the agency conducted a search of these databases in 2014

following the initiation of Hasbajrami's prosecution.

The inadvertent collection of communications raises complicated

questions. First, as a statutory matter, Section 702 prohibits the targeting of e­

mail accounts that the government knows to be maintained by United States

persons. See 50 U.S.C. § 1881a(b). But the statute thus appears to prohibit only

knowing or intentional targeting, and not to address situations where the

government is mistaken, reasonably or unreasonably. Does the express

prohibition of targeting accounts known to be those of United States persons

65 implicitly authorize the targeting of any account not known with certainty to be

that of a United States person? If there is evidence of a high likelihood that the

account belongs to a United States person and the government proceeds to target

it without taking steps to investigate further, does the willful blindness standard,

which equates such deliberate indifference to actual knowledge in many legal

contexts, apply? Cf. Global-Tech Appliances, Inc. v. SEB S.A.,

563 U.S. 754, 766-69

(2011) (discussing willful blindness doctrine).

Second1 the Fourth Amendment calculus for such collection would be

different than the one employed in considering incidental collection. Incidental

collection is justified because the "target" of the surveillance cannot rely on the

Fourth Amendment's protections, as discussed above. But a United States citizen

or lawful permanent resident, located in the United States, assuming a

reasonable expectation of privacy, would be protected by the Fourth

Amendment. Is the Fourth Amendment prohibition of "unreasonable" searches

violated if the government unreasonably (recklessly or negligently) concludes

that the targeted account is that of a foreigner located abroad? Is it permissible

for the government to adopt a presumption that, under all circumstances or in

the presence of one or more key indicia, an account holder whose identity is

66 unclear should be treated as foreign? Would the later discovery that the account

did indeed belong to a United States person require the minimization, or the

suppression in a criminal case, of inadvertently collected conversations?

A district court reviewing a motion to suppress evidence inadvertently

collected (or derived from inadvertent collection) would have to address these

issues, and perhaps others, in deciding whether the government's reliance on

inadvertent collection in an investigation or prosecution was reasonable within

the meaning of the Fourth Amendment.

But we need not decide those questions today because we are satisfied that

any inadvertent collection disclosed to the district court was harmless. The

interception of communications from the inadvertently targeted account was

brief, lasting only approximately two weeks. The materials collected, whatever

they were, were not used in applying for the FISA warrant - indeed, their very

existence seems to have been unknown to anyone involved in the criminal

investigation of Hasbajrami, as the inadvertent targeting of the account in

question was not even discovered by th e government until well into the

prosecution of this case. And finally, the collection was terminated because the

government itself determined that nothing of any intelligence value was being

67 learned. Presumably that conclusion would not have been reached if the

collected conversations were indicative of criminal terrorist plots, or were of

evidentiary value to a criminal investigation.

Thus, even assuming arguendo that there was some legal infirmity in the

decision to begin collection despite uncertainty about the status of the account, or

to continue it once at least some evidence pointing to a possible United States

source for the account was discovered, we conclude, even in the context of a

conditional guilty plea, that the failure to suppress the results of that collection

was harmless beyond any reasonable doubt.

III. Querying

There is a third issue in this case, however: the storage of Section 702

information in databases and the subsequent querying of those databases by the

government. The district court did not make any findings regarding whether the

NSA, the FBI or any other agency queried databases with regard to Hasbajrami

prior to the FISC order. Instead, it appeared to accept the government's

argument, framed within the context of a discussion of whether the minimization

procedures provided adequate protections so as to make collection reasonable,

that the government could freely query information it had lawfully acquired

68 without further Fourth Amendment inquiry. See Suppression Dedsion,

2016 WL 1029500

at *12 n.20 ("I agree with the government that it would be perverse to

authorize the unrestricted review of lawfully collected information but then

restrict the targeted review of the same information in response to tailored

inquires.") (internal alterations and quotation marks omitted).

The government renewed this argument on appeal. FoUowing oral

argument, during which the government would neither confirm nor deny

whether it had queried any databases of Section 702-acquired information, this

Court ordered further briefing. The government

Cov't Supplemental Classified Br. at 6-7 (emphasis added).

69 Like inadvertent collection, the storage and querying of information raises

challenging constitutional questions, to which there are few dear answers in the

case law. Cf. In re Directives,

551 F.3d at 1015

(dismissing petitioner's concerns,

under the PAA, because the "government assures us that it does not maintain a

database of incidentally collected information from non-targeted United States

persons, and there is no evidence to the contrary."). The issue was not addressed

by the Ninth Circuit inMohamud, which explicitly left open the question of

whether "the incidental overhear doctrine permits the unconstitutional and

widespread retention and querying of the incidentally collected information,"

stating that the issue was "not before [the court]."

843 F.3d at 440

n.24. The

district court in Mohamud did reach the question, however, and it concluded that

the "subsequent querying of a§ 702 collection, even if U.S. person identifiers are

used, is not a separate search and does not make § 702 surveillance unreasonable

under the Fourth Amendment." United States v. Mohamud, No. 3:10-cr-475-KI-1,

2014 WL 2866749

, at *26 (D. Or. June 24, 2014), affd,

843 F.3d 420

(9th Cir. 2016).

We do not find that logic persuasive. Storage has little significance in its

own right: the lawfully-collected communications, even of United States persons,

continue to serve the same foreign intelligence purpose in the continued

70 surveillance of a foreign operative, whether his interlocutor is a United States

person or a citizen and resident of some other country. The material is justifiably

retained, not to keep tabs on a United States person, but to keep tabs on the non­

United States person abroad who has been targeted.20

But querying that stored data does have important Fourth Amendment

implications, and those implications counsel in favor of considering querying a

separate Fourth Amendment event that, in itself, must be reasonable. Our

reasoning is based on three considerations.

First, courts have increasingly recognized the need for additional probable

cause or reasonableness assessments to support a search of information or objects

that the government has lawfully collected. It is true that the FBI does not need

an additional warrant to go down to its evidence locker and look through a box

of evidence it collected from a crime scene. But lawful collection alone is not

always enough to justify a future search.

In Riley v. California, the Supreme Court held that a warrant was necessary

to search a cell phone, even when that cell phone was lawfully seized pursuant to

20The considerations might be different if the storage involved data responsive to a warrant and retained for the purpose of a domestic criminal prosecution. This Court, sitting en bane, considered similar issues in United States v. Ganias,

824 F.3d 199

(2d Cir. 2016), although we ultimately did not need to decide them. 71 a search incident to a lawful arrest.

573 U.S. 373

, 401 (2014). Several circuit court

decisions have reached similar conclusions. In United States v. Sedaghaty, for

instance, the government had searched a defendant's home pursuant to a

warrant focused on tax violations.

728 F.3d 885,912

(9th Cir. 2013). Agents seized

nine computers, which forensic experts searched with "an evolving list of search

terms" in order "to comb through the computers for useful materials,"

eventually finding evidence confirming the defendant was supporting Chechen

terrorist groups.

Id.

The Ninth Circuit concluded that the searches beyond the

scope of the warrant were improper, noting that the government "should not be

able to comb through [the defendant's] computers plucking out new forms of

evidence that the investigating agents have decided may be useful" after it failed

to find evidence of willfulness regarding the tax returns.

Id. at 913

. To do so

required a new warrant, even though the government already had access to the

machines and had lawfully seized them. See also United States v. Runyan,

275 F.3d 449, 464-65

(5th Cir. 2001) (finding that police exceeded the scope of a private

search when they "examined disks that the private searchers did not examine"

and would have required a warrant to do so); United States v. Mulder,

808 F.2d 1346, 1349

(2d Cir. 1987) (holding that a separate warrant was needed to test

72 packages in suitcase for drugs, even though the suitcase was lawfully sei.1.ed via

private search).

Second, Section 702 is sweeping in its technological capacity and broad in

its scope. In the case of the incidental collection discussed above, - was

collecting and reviewing e�mails for its own foreign intelligence purposes in

, and reporting �vidence that it obtained suggesting

on-going criminal activity in the United States. Such activity is closely analogous

to precedents drawn from traditional domestic criminal wiretapping. As

discussed above, it is not difficult to conclude that, like "incidentally overheard"

criminal conversations and evidence of crimes seized in plain view, the collection

and use of information obtained in this way is reasonable within the meaning of

the Fourth Amendment.

But the vast technological capabilities of the Section 702 program,

estimated by the PCLOB as totaling nearly 250 million e-mails annually by 2011

and likely larger numbers since then, may mean that analysts are not reviewing

each of those e-mails contemporaneously with their collection. PCLOB Report at

116, 128-29. If such a vast body of information is simply stored in a database,

available for review by request from domestic law enforcement agencies solely

73 on the speculative possibility that evidence of interest to agents investigating a

particular individual might be found there, the program begins to look more like

a dragnet, and a query more like a general warrant, and less like an individual

officer going to the evidence locker to check a previously-acquired piece of

evidence against some newfound insight

The Supreme Court has expressed increasing concern about the interaction

between Fourth Amendment precedent and evolving government technological

capabilities. Riley rested in part on the fact that "[c]ell phones ... place vast

quantities of personal information literally in the hands of individuals." 573 U.S.

at 386. "A search of the information on a cell phone [ therefore] bears little

resemblance to the type of physical search considered" in past cases. Id.; see also

Ganias,

824 F.3d at 217-18

(noting privacy implications of expansive technology

and data storage). And in Carpenter, the Court concluded that a warrant (or a

valid substitute) was required to acquire cell-site records, even though they were

stored by a third party and under traditi onal Fourth Amendment doctrine a

cellphone user would not have an expectation of privacy in such information:

We decline to grant the state unrestricted access to a wireless carrier's database of physical location information. In light of the deeply revealing nahlre of [this information], its depth, breadth, and

74 comprehensive reach, and the inescapable and automatic nature of its collection, the fact that such information is gathered by a third party does not make it any less deserving of Fourth Amendment protection. The Government's acquisition of the cell-site records here was a search under that Amendment.

Carpenter v. United States,

138 S. Ct. 2206, 2223

(2018).

Third, as a practical matter, querying is problematic because it may make

it easier to target wide-ranging information about a given United States person at

a point when the government knows it is investigating such a person. Section 702

forbids the government from targeting a non-United States person as a backdoor

way of targeting a United States person. 50 U.S.C. § 1881a(b). But, as detailed

above, in the course of its intelligence gathering operations, the NSA may have

collected all sorts of information about an individual, the sum of which may

resemble what the NSA would have gathered if it had directly targeted that

individual in the first place. To permit that information to be accessed

indiscriminately, for domestic law enforcement purposes, without any reason to

believe that the individual is involved in any criminal activity and or even that

any information about the person is likely to be in the database, just to see if

there is anything incriminating in any conversations that might happen to be

there, would be at odds with the bedrock Fourth Amendment concept that law

75 enforcement agents may not invade the privacy of individuals without some

objective reason to believe that evidence of crime will be found by a search.

Treating querying as a Fourth Amendment event and requiring the query itself

to be reasonable provides a backstop to protect the privacy interests of United

States persons and ensure that they are not being improperly targeted.

Fourth, much may dep end on who is querying what database. There is a

potentially significant difference between, for example, the FBI querying its own

database and the FBI requesting that the NSA query its far larger archive of

collected communications, collected pursuant to a broader mandate. As we

understand the public sources of information about the collection and use of

Section 702 material, the FBI maintains its own records of communications

provided to it by the NSA. See PCLOB Report at 58-59. Such communications

presumably were provided because review of the material properly collected by

the NSA under Section 702 uncovered evidence of criminal activity (relating to

terrorism or otherwise), and were appropriately communicated to domestic law

enforcement. Just as the FBI may act on such information where it requires

immediate criminal investigation, it may well be appropriate for the agency to

retain the information and store it for later review when other legitimate

76 evidence or leads make that information relevant to an on-going investigation.

Such a review of the agency's own files is arguably analogous to traditional law

enforcement techniques; evidence lawfully collected does not always accumulate

to a sufficient quantity to warrant an immediate arrest or indictment, but may be

retained and later reviewed when additional evidence is developed. FBI queries

directed to a larger archive of millions of communications collected and stored

by the NSA for foreign intelligence purposes, on the chance that something in

those files might contain incriminating information about a person of interest to

domestic law enforcement, raise different concerns.

What kinds of querying, subject to what limitations, under what

procedures, are reasonable within the meaning of the Fourth Amendment, and

when (if ever) such querying of one or more databases, maintained by an agency

of the United States for information about a United States person, might require

a warrant, are difficult and sensitive questions. We do not purport to answer

them here, or even to canvass all of the considerations that may prove relevant or

the various type s of querying that may raise distinct problems.

Indeed, we cannot do so on the sparse record presented. We do not know

what databases were queried by whom, for what reasons, what (if any)

77 information was uncovered by such queries, or what (if any) use was made of

any information uncovered. The government has represented that no

information derived from any such queries was presented to the FISC to obtain

the FISA warrant, but has not addressed whether any such information

contributed to the investigation in other ways.

Given these considerations, the district court here must conduct an inquiry

into whether any querying of databases of Section 702-acquired information

using terms related to Hasbajrami was lawful under the Fourth Amendment. Fo r

today we need only reiterate that "the ultimate touchstone of the Fourth

Amendment is reasonableness." Riley, 573 U.S. at 381; cf Abu 4Jihaad,

630 F.3d at 121-22

(stating that, even in the application of the warrant requirement, the

requirement is "flexible, so that different standards may be compatible with the

Fourth Amendment in light of the different purposes and practical

considerations at issue.") (internal quotation marks and citations omitted).

We cannot, and should not, go further, pending development of a more

complete record by the district court on remand, and an assessment by the

78 district court as to whether whatever was done was consistent with the Fourth

Amendment and whether, if there was any illegality, any evidence should have

been suppressed in response to Hasbajrami' s motion.21

IV. Hasbajrami's Conditional Plea and Resolution of the Motion to Suppress

As addressed above, there is still an open issue as to what queries of

Section 702-acquired information occurred in this case, whether any such queries

were reasonable and, if unreasonable, whether the queried information tainted

the application before the FISC or in some other way would lead to the

suppression of any evidence.

But in its post•argument briefing, the government argues that even if it did

query Section 702 databases, that action ultimately could not matter because the

11On November 14, 2019, Hasbajrami filed a Rule 280) letter alerting this Court to three recently declassified opinions from the FISC and FISCR. See In re DNI/AG 702(h) Certifications 2018,

941 F.3d 547

(FISA Ct. Rev. 2019); Redacted (FISA Ct. Sep. 4 , 2019); Redacted,

2018 WL 9909971

(PISA Ct. O ct. 18, 2018). Based on our review, we do not believe that these opinions substantively affect our decision because, even to the extent that their approach differs from ours, they are not binding on this Court. Since we are remanding for the district court to further assess this issue with the benefit of a more complete record, we decline to engage further at this time. We did not find it necessary to review the unredacted versions of these opinions in reaching this conclusion and, therefore, Hasbajrami's request for access to the unredacted versions of these opinions is DENIED. 79 communications collected as a result of incidental collection would provide an

independent source sufficient to support the FISC's probable cause

determination. Gov't Supplemental Classified Br. at 9 (arguing that "this Court's

analysis should be limited to alleged 'searches' where a causal link can be drawn

between the search and the acquisition of the evidence that Hasbajrami seeks to

suppress.").

The government relies primarily on Murray v. United States,

487 U.S. 533

(1988). In Murray, federal law enforcement agents surveilling the defendant

witnessed him drive into a warehouse in South Boston.

Id. at 535

. Agents

arrested the defendant and a co-conspirator after they drove away from the

warehouse and, upon arrest, the agents discovered marijuana in the defendant's

truck. The agents then forced entry into the warehouse, where they "observed in

plain view numerous burlap-wrapped bales that were later found to contain

marijuana. They left without disturbing the bales, kept the warehouse under

surveillance," and re-entered only after obtaining a warrant.

Id.

In applying for

the warrant, however, the agents did not advise the court of their prior entry;

they also did not rely on their observations of the contents of the warehouse in

order to establish probable cause.

Id. at 536

. The Supreme Court held that

80 suppression of the evidence eventually seized from the warehouse would not be

required "if the warrant-authorized search of the warehouse was an independent

source of the challenged evidence.''

Id. at 543-44

. Although "[k)nowledge that the

marijuana was in the warehouse was assuredly acquired at the time of the

unlawful entry ... it was also acquired at the time of entry pursuant to the

warrant, and if that later acquisition was not the result of the earlier entry there is

no reason why the independent source doctrine should not apply. 1'

Id. at 541

.

Even assuming the government was querying databases simultaneously

with its incidental collection activities, according to the government's position its

agents would be analogous to the agents in Murray. Their subjective

understanding of the evidence might have been affected by the fruits of an

unreasonable search, and had they relied on that evidence in support of a

warrant application they might not be able to use the evidence obtained by

executing that warrant. But, according to the government, if the information they

placed before the FISC, and that court's subsequent probable cause

determination, rested on other information, that "later acquisition was not the

result of the earlier [search]1' and so "there is no reason why the independent

source doctrine should not apply."

Id. at 541

.

81 We cannot apply the independent source doctrine on the record currently

before us. Had this case gone to trial, our task would be significantly different.

Under those circumstances, we could have undertaken to trace, as the Ninth

Circuit did in Mohamud, 843 F .3d at 438 & n.21, individual pieces of evidence that

had actually been presented to the jury at that trial in order to assess whether

those pieces of evidence had been obtained consistent with the Fourth

Amendment. And if individual pieces of evidence needed to be suppressed, the

Court could then decide whether the admission of any given piece of evidence

was harmless when compared to all the legally obtained evidence that was

ultimately presented at trial.

But we are not reviewing the acquisition of evidence used at a trial. Rather,

Hasbajrami's appeal reaches us following a conditional plea made pursuant to

Rule ll(a}(2) of the Federal Rules of Criminal Procedure. Rule l l(a)(2) provides

that:

With the consent of the court and the government, a defendant may enter a conditional plea of guilty or nolo contendere, reserving in writing the right to have an appellate court review an adverse determination of a specified pretrial motion. A defendant who prevails on appeal may then withdraw the plea.

82 According to the Advisory Committee Notes to the 1983 Amendments,

conditional pleas should be permitted 11only when the decision of the court of

appeals will dispose of the case either by allowing the plea to stand or by such

action as compelling dismissal of the indictment or suppressing essential

evidence." See also United States v. Bundy,

392 F.3d 641

, 647-48 {4th Cir. 2004). The

classic example of a case in which that standard is met is a narcotics case in

which the evidence sought to be suppressed is the very basis of the charge. The

suppression of the evidence would end the case; if the evidence is admissible,

guilt is assured; if not, no evidence of guilt remains. The situation is more

problematic and complicated, however, where the suppression of some but not

all of the evidence in the case is a possible outcome.

Our sister circuits have applied a harmless error calculation when

evaluating whether an opportunity to withdra,w a plea is a necessary remedy

after it is determined on appeal that the challenged district court ruling was, in

whole or in part, erroneous. See, e.g., United States v. Lustig,

830 F.3d 1075, 1086

(9th Cir. 2016); United States v. Rivera-Nevarez,

418 F.3d 1104

(10th Cir. 2005)

(affirming conviction on harmless error where conviction was upheld on

83 grounds not considered by district court). 22 Those courts have applied the

harmless error rule by asking "whether the erroneous suppression ruling could

have affected [the defendant's] decision to plead guilty.'' Lustig,

830 F.3d at 1086

.

But the record here is murky. It is clear that the presence or absence of

Section 702 surveillance affected Hasbajrami' s initial decision to plead guilty.

Indeed, it was because the district court was convinced that Hasbajrami's initial

decision to plead guilty was predicated in part on his lawyers' assurance that the

government had represented that there was no warrantless surveillance in his

case that it granted the defense motion to withdraw Hasbajrami's first guilty plea

when those representations were revealed to have been inaccurate. App'x at 39

(noting that Hasbajrami "specifically asked [his counsel] about whether

warrantless wiretaps had played a role in his case. After they informed him that

such wiretaps were not part of the evidence, he was more willing to plead

guilty."). Moreover, Hasbajrami moved to suppress all Section 702 material

22The Advisory Committee also considered Fed. R. Crim. P. ll(h)'s harmless error calculus to apply, but it noted that, without full factual development, invocation of the harmless error rule would be difficult. The Committee noted, however, that "relatively few appellate decisions result in affirmance upon [harmless error]. Thus it will only rarely be true that the conditional plea device will cause an appellate court to consider constitutional questions which could otherwise have been avoided by invocation of the doctrine of harmless error." Fed. R. Crim. P. 11, advisory committee's notes to 1983 amendments. 84 collected by the government, including matter that was not presented to the FISC

to obtain the traditional FISA warrant. What is unclear is just how much Section

702-acquired information would remain, after further fact-finding at the district

court. It may be that, after a full evaluation of the record in light of Hasbajrami's

motion to suppress, the evidence available to the government remains very much

intact. For all we know, any queries conducted by the government may have

been entirely reasonable, they may not have yielded any evidence at all, and any

material that was uncovered even by a putatively unconstitutional query may

not have affected the investigation in any way.

However those matters would be decided on remand, though, we cannot

predict here whether any such queries were constitutionally questionable, or

whether any information derived from such queries should itself have been

suppressed, or directly or indirectly tainted the warrant application. And,

without being able to fully predict or decide either of those issues, we also cannot

adequately predict whether a potentially-altered evidentiary landscape "could

have affected [Hasbajrami's] decision to plead guilty." Lustig,

830 F.3d at 1086

;

see also United States v. uake,

95 F.3d 409, 420-421

(6th Cir. 1996) (noting that Fed.

R. Crim. P. ll(a)(2) addresses the situation in which "the defendant is fully

85 successful on appeal," and not "the effect of a partially successful appeal/ but

vacating judgment because "[ defendant was] successful in excluding what

appears to be the most damning evidence against him.") (emphasis in original).

Taking these considerations into account, then, we are left with a posture

similar to that faced by this Court in United States v. Wong Ching Hing,

867 F.2d 754

(2d Cir. 1989). The defendant in that case had reserved his right to appeal the

district court's failure to suppress roadside statements made to police without

Miranda warnings, as well as subsequent statements made at a police station.

Id. at 756

. This Court, like the district court, found that the roadside statements were

voluntary and that supp ression was therefore unnecessary as to those.

Id.

But the

defendant had made two separate sets of statements to law enforcement once

detained at the police station. The first set was made to the state police, and it did

not add anything to what he had voluntarily provided at the initial stop. The

second set of statements, however, was made to a DEA agent and "formed the

basis of the information to which Wong pled guilty," which charged him with

making a false statement.

Id.

The Court concluded that the circumstances "may well warrant the

conclusion that the detention was not valid as a Terry stop."

Id. at 758

. But it was

86 unclear what effect such a holding would have on Wong's legal position, because

the record was not clear as to whether the conditional guilty plea was

"conditioned upon the government's being successful in admitting all of the

statements or any one of them."

Id. at 758

(emphasis added). The Court therefore

vacated the judgment and remanded to the district court for "further

proceedings," noting that the government had also urged affirmance on an

alternative ground and that "the parties will not be precluded from asserting

new arguments" on remand. ld.

We therefore follow a similar course of action here. Because the district

court was not even aware whether such querying had occurred, and because

even we have not been advised as to what was done, for what reasons, and with

what results, we remand to the district court to determine the facts, consistent

with the considerations stated above, and to decide in the first instance, based on

its fachlal findings, whether there was a constitutional violation in this particular

case, and what (if any) evidence would need to be suppressed if there was

indeed a violation. Similarly, we leave it to the district court to determine, in the

first instance., whether any exceptions to the exclusionary rule, such as a good

87 faith exception, might apply in this case. 23 Finally, we leave it to the district court

to determine, if any evidence should have been suppressed, whether the failure

to suppress that evidence was harmless, and if it was not what remedy is

appropriate.

On remand, the district court should undertake whatever proceedings are

necessary, consistent with the considerations stated above. To the extent that any

decisions must be made about what information is to be presented to

appropriately-cleared defense counsel, such decisions too are best left to the

district court after it becomes clear what the inquiry about querying will

involve. 24 Cf Abu-Jihaad,

630 F.3d at 129

(noting that, under FISA, disclosure is

23 The government has argued before this Court that the good faith exception would apply. Because of the incomplete record here, we take no position as to whether the exception applies.

24 Hasbajrami argues on appeal that his due proces s rights would be violated if he is not provided with an unredacted or unmodified version of the district court's order. He concedes, however, that the argument would be rendered moot if this Court reverses on either constitutional or statutory grounds. After reviewing the minor redactions, we conclude that the limited information redacted from the district court's opinion could not have substantially affected Hasbajrami' s due process rights in this appeal. In any event, we undertook de novo review and we are satisfied that the limited redactions in the portions of this opinion relating to the district court's rulings do not require disclosure to the defense at this time . We therefore deny Hasbajrami's request to unseal or to disclose to the defense team the redacted portions of the district court opinion. As addressed above, however, the district court remains free to consider, in the 88 exception and ex parte, in camera review is the rule, and that the review of

materials that are "relatively straightforward and not complex" may not

necessarily require adversarial testing).

CONCLUSION

Based on the foregoing considerations, we REMAND to the di strict court

for further proceedings consistent with this opinion.

first instance, what if any classified material, including the government's Rule 280) letter and the redacted portions of this opinion relating to querying, should be provided to properly-cleared defense counsel on remand, consistent with the requirements of CIPA and FISA. We therefore DENY Hasbajrami's February 8, 2019 motion for disclosure of the government's Rule 280) letter, without prejudice to renewal before the district court on remand. 89

Reference

Status
Published