Concurrence Opinion
concurring in the order denying rehearing en banc:
The original panel majority opinion, see Microsoft Corp. v. United States,
The theme running through the government’s petition and the dissents is the concern that, by virtue of the result the panel reached, U.S. law enforcement will less easily be able to access electronic data that a magistrate judge in the United States has determined is probably connected to criminal activity.
Before going further, it is worth pointing out what is not at issue in this appeal. First, it is common ground that Congress did not intend for the SCA’s warrant procedures to apply extraterritorially. See Gov’t Pet. for Reh’g 11. Second, although the panel majority determined that the SCA’s focus lies on protecting user privacy, this determination was made under the second part of the extraterritoriality analysis set forth as a canon of construction in Morrison and recently developed further in RJR Nabisco, Inc. v. European Community, — U.S. -,
Accordingly, the dispositive question in the case, as we see it, might be framed as whether Microsoft’s execution of the warrant to retrieve a private customer’s electronic data, stored on its servers in Ireland, would constitute an extraterritorial application of the SCA in light of the statute’s “focus,” determined in accordance with Morrison and RJR Nabisco. Again, this is a question of statutory construction. And, unsurprising in light of the need for an extraterritoriality analysis, it requires consideration of the concerns of sovereignty and international comity.
The panel majority concluded that “the relevant provisions of the SCA focus on protecting the privacy of the content of a user’s stored electronic communications.” Microsoft,
Guided by our determination of the statute’s focus and looking at the text of the SCA itself, the panel majority read the statute to treat the locus of the SCA’s privacy protections as at the place of data storage. As further detailed in the majority opinion, this conclusion comports with the SCA’s reliance on the fact and form of content storage as predicates to its various provisions, as well as its use of the term of art “warrant” and its requirement of compliance with Federal Rule of Criminal Procedure 41, “Search and Seizure” — features usually associated with physical access. See, e.g., 18 U.S.C. § 2701(a) (prohibiting access to “facilities]” where electronic communications are stored); id. § 2702(a)(l)-(2) (prohibiting disclosure of communications “while in electronic storage” or “which [are] carried or maintained” by an electronic communication service); id. § 2703(a) (imposing warrant procedures on electronic communications that are “in electronic storage in an electronic communications system for one hundred and eighty days or less”). We noted that the statute uses “[t]he circumstances in which the communications have been stored ... as a proxy for the intensity of the user’s privacy interests, dictating the stringency of the procedural protection they receive.” Microsoft,
The panel majority rejected this position, and a few reflections illustrate why we were correct to do so. First: The position of the government and the dissenters necessarily ignores situations in which the effects outside the United States are less readily dismissed, whichever label is chosen to describe the “focus” of the statute. For example, under the dissents’ reasoning (as we understand it), the SCA warrant is valid when (1) it is served in the United States on a branch office of an Irish service provider, (2) it seeks content stored in Ireland but accessible at the U.S. branch, (3) the account holding that content was opened and established in Ireland by an Irish citizen, (4) the disclosure demanded by the warrant would breach Irish law, and (5) U.S. law enforcement could request the content through the MLAT process.
Second: My dissenting colleagues take issue with the idea that “privacy” can have a territorial locus at all when it comes to electronic data, given the ease with which the data can be subdivided or moved across borders and our now familiar notion of data existing in the ephemeral “cloud.” But, mundane as it may seem, even data subject to lightning recall has been stored somewhere, and the undisputed record here showed that the “somewhere” in this case is a datacenter firmly located on Irish soil.
To connect these two points: Some of my dissenting colleagues, see post at 62 (Jacobs, /., dissenting from the denial of reh’g en banc), like the panel, have noted potential concerns with reciprocity — that if the United States can direct a service provider with operations in the United States to access data of a foreign citizen stored in a foreign country, a foreign sovereign might claim authority to do the same and access data of a U.S. citizen stored in the United States, so long as the data would be disclosed abroad. If this concern holds any intuitive force, it does so only because the location of data storage does still have import; and therefore reaching across physical borders to access electronic data gives us pause when we are on the receiving end of the intrusion. It is for just this sort of reason that the government has entered into MLATs with other sovereigns: to address mutual needs for law enforcement while respecting sovereign borders. And it is for just this sort of reason that the government has in other circumstances taken a position, somewhat in tension with the one it takes here, that courts should be particularly solicitous of sovereignty concerns when authorizing data to be collected in the United States but drawn from within the boundaries of a foreign nation. See, e.g., Br. United States
Third, and finally: The exercise of selecting a “focus” and then determining its territorial locus highlights some of the difficulties inherent in applying the Morrison extraterritoriality analysis. Where the panel majority and the dissents diverge most sharply and meaningfully is on the better view of the legal consequences of the focus inquiry: where — for purposes of assessing extraterritoriality according to the Supreme Court’s precedents — to locate the affected interest. Once we concluded that the statute focuses on protecting privacy, the panel majority had to assess further where privacy might be considered to be physically based — an elusive inquiry, at best. As noted, the dissents emphasize disclosure, and reason from that premise that the place of disclosure establishes whether the proposed application of the statute is domestic. But we saw the overarching goal of the SCA as protecting privacy and allowing only certain exceptions, of which limited disclosure in response to a warrant is one. Considerations of privacy and disclosure cannot be divorced; they are two sides of the same coin. By looking past privacy and directly to disclosure, however, the dissents would move the “focus” of the statute to its exceptions, and away from its goal. The better approach, which in our estimation is more in keeping with the Morrison analysis and the SCA’s emphasis on data storage, is one that looks to the step taken before disclosure — access— in determining privacy’s territorial locus.
With a less anachronistic statute or with a more flexible armature for interpreting questions of a statute’s extraterritoriality, we might well reach a result that better reconciles the interests of law enforcement, privacy, and international comity. In an analytic regime, for example, that invited a review of the totality of the relevant circumstances when assessing a statute’s potential extraterritorial impact, we might be entitled to consider the residency or citizenship of the client whose data is sought, the nationality and operations of the service provider, the storage practices and conditions on disclosure adopted by the provider, and other related factors. And we can expect that a statute designed afresh to address today’s data realities would take an approach different from the SCA’s, and would be cognizant of the mobility of data and the varying privacy regimes of concerned sovereigns, as well as the potentially conflicting obligations placed on global service providers like Microsoft. As noted above, there is no suggestion that Congress could not extend the SCA’s warrant procedures to cover the situation presented here, if it so chose.
These were not the statutory context and precedent available to the panel, however, nor would they be available to our Court sitting en banc. Under the circumstances presented to us, the Microsoft warrant was properly quashed.
DENNIS JACOBS, Circuit Judge, joined by JOSÉ A. CABRANES, REENA RAGGI, and CHRISTOPHER F. DRONEY, Circuit Judges, dissenting from the denial of rehearing in banc:
The United States has ordered Microsoft to provide copies of certain emails pursuant to the Stored Communications Act. A magistrate judge found probable cause to believe those emails contain evidence of a crime. (The instrument functions as a subpoena though the Act calls it a warrant.) A panel of this Court directed the district court to quash the warrant as
I subscribe to the dissents of Judge Cabranes, Judge Raggi, and Judge Dro-ney, which set out in detail the doctrinal basis for the right result in this appeal. I write separately to describe an approach that is perhaps more reductionist.
I
As all seem to agree, and as the government concedes, the Act lacks extraterritorial reach. However, no extraterritorial reach is needed to require delivery in the United States of the information sought, which is easily accessible in the United States at a computer terminal. The majority nevertheless undertakes to determine whether this case presents a forbidden extraterritorial application by first “look[ing] to the ‘territorial events or relationships’ that are the ‘focus’ of the relevant statutory provision.” Majority Op.,
Extraterritoriality need not be fussed over when the information sought is already within the grasp of a domestic entity served with a warrant. The warrant in this case can reach what it seeks because the warrant was served on Microsoft, and Microsoft has access to the information sought. It need only touch some keys in Redmond, Washington. If I can access my emails from my phone, then in an important sense my emails are in my pocket, notwithstanding where my provider keeps its servers.
The majority opinion relies on an implicit analogy to paper documents: “items” and “material” and “content” that are “located” and “stored” and that the government seeks to “collect” and “import.” But electronic data are not stored on disks in the way that books are stored on shelves or files in cabinets. Electronic “documents” are literally intangible: when we say they are stored on a disk, we mean they are encoded on it as a pattern. At stake in this case is not whether Microsoft can be compelled to import and deliver a disk (or anything else), but whether Microsoft can be compelled to deliver information that is encoded on a disk in a server and that Microsoft can read.
The panel’s approach is unmanageable, and increasingly antiquated. As explained in an article Judge Lynch cites in his concurrence (
To enforce the warrant, there is no practical alternative to relying upon access, and no need to seek an alternative. We can conclude that warrants can reach what their recipients can deliver: if the recipient can access a thing here, then it can be delivered here; and if statutory and constitutional standards are met, it should not matter where the ones-and-zeroes are “stored.”
Localizing the data in Ireland is not marginally more useful than thinking of Santa Claus as a denizen of the North Pole. Problems arise if one over-thinks the problem, reifying the notional: Where in the world is a Bitcoin? Where in my DVR are the images and voices? Where are the snows of yesteryear?
II
The majority has found no indication that Congress considered in 1986 whether a warrant issued under the Act would reach data stored on servers outside the United States; and Judge Lynch’s concurrence, having recognized the flaws in the majority opinion, calls on Congress to modernize the statute. I too would like to see Congress act, chiefly to consider certain ramifications, such as whether the United States might be vulnerable to reciprocal claims of access through local offices of American companies abroad. But we are not in a position to punt when it comes to construing a statute that either does or does not allow execution of a warrant in a case that is before us now. Holding, as the panel did, that the statute does not allow enforcement of this warrant is an interpretation of the statute, not a deferential bow to Congress. So though it would best if Congress could form a consensus on the issue, that preference is not a principle of statutory construction.
Nor can it matter how we would order legislative priorities (this would seem to be a bit down the list), or how much we would welcome bipartisan consideration of a bill that has not been enacted. Legislative proposals are myriad, and they fall as leaves. Come what may, we are left for now with the law as it is. The panel misconstrues it, and I would rehear the case in banc.
JOSÉ A. CABRANES, Circuit Judge, joined by DENNIS JACOBS, REENA RAGGI, and CHRISTOPHER F. DRONEY, Circuit Judges, dissenting from the order denying rehearing en banc:
An evenly-divided en banc court has declined to rehear a case that presents multiple questions of exceptional importance to public safety and national security.
The panel majority quashed a warrant issued-under section 2703 of the Stored
I.
The negative consequences of the panel majority’s opinion are far reaching. It has substantially burdened the government’s legitimate law enforcement efforts; created a roadmap for the facilitation of criminal activity; and impeded programs to protect the national security of the United States and its allies.
First, as Judge Lynch’s concurring opinion explains, the panel majority’s holding affords “absolute” protection from disclosure to electronic communications stored abroad, regardless of whether they are controlled by a domestic service provider and are accessible from within the United States.
Second, the panel majority’s opinion has created a roadmap for even an unsophisticated person to use email to facilitate criminal activity while avoiding detection by law enforcement. The Microsoft customer targeted by the government’s warrant in this case indicated to Microsoft when he signed up for its service that he resided in Ireland — a representation Microsoft took at face value.
Third, the panel majority’s decision has already led major service providers to reduce significantly their cooperation with law enforcement. The panel majority held that the physical location of a server containing a customer’s emails determines whether an SCA warrant seeking the disclosure of those emails is an extraterritorial application of the SCA. However, electronic data storage is more complex and haphazard than the panel majority’s holding assumes. Many service providers regularly “store different pieces of information for a single customer account in various datacenters at the same time, and routinely move data around based on their own internal business practices.”
For example, Google will now disclose “only those portions of customer accounts stored in the United States at the moment the warrant is served.”
Yahoo! has advised law enforcement that it “will not even preserve data located outside the United States in response to a [s]ection 2703 request.”
II.
The baleful consequences of the panel’s decision are compelled neither by the text of the statute nor by our precedent. The panel majority arrived at its damaging holding because it adopted a flawed reading of the SCA.
The second step of the two-step framework for analyzing extraterritoriality issues set forth in Morrison v. National Australia Bank Ltd.,
Even if the “focus” of the SCA is user privacy, a plain reading of the statute makes clear that the conduct relevant to the SCA’s “focus,” and which the SCA seeks to regulate, is a provider’s disclosure or non-disclosure of emails to third parties, not a provider’s access to a customer’s data. Here, Microsoft’s disclosure of emails to the government would take place at its headquarters in the United States. Therefore, had the panel majority correctly identified the conduct relevant to the SCA’s “privacy focus,” it would have concluded that the warrant at issue was a domestic application of the SCA.
However, while section 2701 prohibits “[ujnlawful access” (most obviously hacking), it recognizes that providers have standing authority to access a customer’s electronic communications.
' On the other hand, section 2702 expressly prohibits, with some exceptions, a provider from “disclosing]” a customer’s communications.
Considering sections 2701, 2702, and 2703 together, it is clear that the SCA protects user privacy by prohibiting unlawful access of customer communications (such as hacking), and by regulating a provider’s disclosure of customer communications to third parties. Inasmuch as section 2701’s limitations on access specifically do not apply to providers, it is only when a provider divulges the content of a user’s communication to a third party that the provider puts a user’s privacy at risk. It is not a mere coincidence that the SCA recognizes a provider’s standing authority to access a user’s communications and, at the same time, prohibits a provider from disclosing those communications to third-parties except as authorized by sections 2702 and 2703. Accordingly, the panel majority’s focus on access (instead of on disclosure) is entirely misplaced.
Put another way, Microsoft did not need a warrant to take possession of the emails stored in Ireland. Nor did it need a warrant to move the emails from Ireland to the United States. It already had possession of, and lawful access to, the targeted emails from its office in Redmond, Washington. Only Microsoft’s disclosure of the emails to the government would have been unlawful under the SCA absent a warrant.
[[Image here]]
In sum, the government obtained a warrant based on a showing of probable cause before a judicial officer of the United States. That warrant required Microsoft’s office in Redmond, Washington, to disclose certain emails that happened to be electronically stored in its servers abroad, but to which Microsoft had immediate access in the United States. Because the location of a provider’s disclosure determines whether the SCA is applied domestically or extraterritorially, the enforcement of the warrant here involved a domestic application of the SCA. The panel should have affirmed the District Court’s denial of Microsoft’s motion to quash.
For the foregoing reasons, I dissent from the order denying rehearing en banc. I trust that the panel’s misreading of this important statute can be rectified as soon as possible by a higher judicial authority or by the Congress of the United States.
In this case, a panel of the court quashes a compelled-disclosure warrant issued under the Stored Communications Act (“SCA”) by a neutral magistrate and supported by probable cause to think that the information demanded is evidence of a crime. See 18 U.S.C. § 2703(a). The ground for decision is the presumption against extraterritoriality, see Morrison v. Nat’l Australia Bank Ltd.,
1. Matter of Exceptional Importance
The panel’s ruling, the reasoning informing it, and. its disturbing consequences raise questions “of exceptional importance to public safety and national security.” Ca-branes, J., Op. Dissenting from Denial of Reh’g En Banc (“Cabranes, J., Op.”), ante at 62. The panel nevertheless urges us to forego en banc review because the SCA is outdated and overdue for congressional revision. See Microsoft,
This is not a case where some legal principle (e.g., standing, mootness) allowed the panel to avoid applying the SCA,
2. The Panel’s Discussion of “Warrant”
Several aspects of the panel’s extraterritoriality analysis require particular review. The first is the panel’s lengthy discussion of why Congress’s “use of the term of art “warrant’ ” in the SCA manifests an intent for the statute to operate only domestically. Microsoft,
Notably, the panel majority concludes that Congress’s use of the term “warrant” in § 2703 signals its intent to invoke all of the “traditional, domestic connotations” that pertain to traditional search warrants. Microsoft,
As to the latter point, the reason United States search warrants do not apply extra-territorially has to do with sovereignty, not privacy. Since before the republic, the law of nations has recognized that one sovereign cannot unilaterally enforce its criminal laws within the territory of another.
As Judge Lynch explains, how warrants protect privacy is through the Fourth Amendment requirement that they issue only “upon probable cause.” U.S. Const. amend. TV; see Microsoft,
As Judge Cabranes observes, by failing to recognize these distinctions (a) between search warrants directed to particular locations and § 2703(a) warrants directed to particular persons, and (b) between the values of sovereignty and privacy, the panel majority construes “warrant” as used in § 2703 to yield a perverse result: affording greater privacy protection to foreign citizens and Americans who claim to reside abroad than to resident U.S. citizens. See Cabranes, J., Op., ante at 65-66 n.19. This troubling result and the reasons leading to it warrant en banc review.
3. The Focus of the Statute
Where, as here, the government does not argue that Congress intended for
This reasoning raises several concerns.
First, I cannot agree that a person who is compelled by a § 2703(a) warrant to disclose to the government materials already in that person’s possession is “seiz[ing]” anything as an agent of the government. See id. The cases cited by the panel majority identify such agency where property is not already in an actor’s possession. In such circumstances, but for authorizing law or warrant, the actor could not lawfully take possession of — i.e., seize — third-party materials. That is not the case here. Microsoft did not need any warrant from the United States to take possession of the subscriber communications it had stored in Ireland. Nor did it need such a warrant to transfer those communications from Ireland to the United States. Indeed, it did not need the approval of Irish authorities or even of its subscriber to take such action. Thus, it is simply wrong to characterize Microsoft’s actions in retrieving customer electronic data in Ireland as “Microsoft’s execution of the warrant,” much less as a seizure by Microsoft. Carney, J., Op., ante at 56 (emphasis added); see Microsoft,
Thus, we need to convene en banc to clarify that a service provider who complies with a § 2703(a) warrant compelling disclosure of communications in his lawful possession does not thereby conduct a search or seizure as the agent of the government.
Second, I also cannot agree with the panel that privacy is the focus of § 2703 and that subscriber privacy would be invaded in Ireland were Microsoft to access its subscriber files there. To the extent § 2702(a) generally prohibits a service provider from knowingly disclosing subscribers’ electronic communications to third parties, that provision might be understood to focus on enhancing subscriber privacy. But § 2703 identifies circumstances when the government nevertheless “may require” service providers to disclose their subscribers’ communications. This gives some force to the government’s argument that the focus of § 2703 is compelled disclosure, not enhanced privacy. See Gov’t Pet. for Reh’g at 11-12 (noting that focus inquiry is “provision-specific” and citing RJR Nabisco, Inc. v. European Cmty., - U.S. -,
Even assuming that the enhanced privacy and compelled disclosure provisions of the SCA are two sides of the same coin, I think the panel errs in concluding that the privacy afforded by the SCA would be invaded by Microsoft’s access of its own files in Dublin rather than by its subsequent disclosure of subscriber communications in the United States.
As already stated, Microsoft is entitled to access and to move subscriber communications at will, even without consulting its subscriber. Such actions by Microsoft disclose nothing to the government about the existence or content of such communications. The only privacy interest afforded by § 2702(a), however, is against such disclosure. The statute provides no privacy right against Microsoft’s own handling of communications short of such disclosure. Thus, contrary to the panel, I think that, even if privacy is the focus of §§ 2702 and 2703, the territorial event that is the focus of that privacy interest is the service provider’s disclosure of the subscriber communications to a third party — whether in violation of § 2702(a) or as authorized by warrant under § 2703(a). It is where that disclosure occurs that determines whether these statutory provisions are being applied domestically or extraterritorially.
Here, there is no question that the challenged § 2703(a) warrant issued, was served on Microsoft in, and required disclosure in the United States. Thus, even if “privacy” is the statute’s “focus,” the challenged warrant here applies the statute domestically, not extraterritorially. We should say so en banc.
4. Concluding Observations
Two final points. As Judge Cabranes observes, and Judge Carney seems to agree, the same reasoning that leads the panel to conclude that § 2703(a) warrants cannot reach communications that Microsoft has stored in Ireland might also preclude affording § 2702(a) privacy protections to such materials. See Cabranes, J., Op., ante at 68 n.36; Carney, J., Op., ante at 57 n.6. But if § 2702(a) protections do not apply here, does the government even need a § 2703(a) warrant? Could it simply proceed by subpoena? See Marc Rich & Co., A.G. v. United States, 707 F.2d at
My second point is not unrelated. The panel concludes that, because the Congress that enacted the SCA could not have foreseen the technological context in which this case arises, the focus of the statute cannot be domestic disclosure of data that a service provider in the United States accesses from abroad. Therefore, the warrant should be quashed. It seems to me this allows the first prong of analysis — did Congress intend extraterritoriality? — to be determinative of the second — is the statute being applied extraterritorially in the case at hand? In fact, the two steps of analysis are distinct. See Morrison v. Nat’l Australia Bank Ltd.,
For the foregoing reasons, this court en banc should enforce, not quash, the challenged § 2703(a) warrant.
CHRISTOPHER F. DRONEY, Circuit Judge, joined by DENNIS JACOBS, JOSÉ A. CABRANES, and REENA RAGGI, Circuit Judges, dissenting from the denial of rehearing en banc:
The majority opinion undertook the daunting task of attempting to apply a statute enacted decades ago to present technology. For example, who knew in 1986 that electronic mail — “email”—would become such a primary means of communication that its commercial providers would have millions of servers across the world to store and manage those communications? Or that the recipient of the warrant here — Microsoft—would itself manage over one million server computers, located in over forty countries, used by over one billion customers? Such developments in electronic communications could not have been anticipated at the time of the statute’s adoption. Indeed, the task of applying statutes and rules from many years ago to
I dissent, though, from the denial of en banc in this case for three reasons. First, the privacy interests that are the focus of many aspects of the Stored Communications Act (“SCA”) are protected in this context by its warrant requirement. Second, the activity that is the focus of the disclosure aspects of the SCA would necessarily occur in the United States where Microsoft is headquartered and where it would comply with the § 2703 warrant, not in the foreign country where it has chosen to store the electronic communications of its customers; also, the provisions of the statute concerning the mechanics of disclosure of these communications are unrelated to its privacy provisions. Third, the prudent course of action is to allow the warrants to proceed, and if Congress wishes to change the statute, it may do so while important criminal investigations continue.
When determining whether a statute applies extraterritorially, a court must read the statute provision by provision, not as a whole. RJR Nabisco, Inc. v. European Community, — U.S. -,
As the majority opinion notes, the SCA was broadly focused on the privacy concerns of electronic communications and the parties to those communications. See Maj. Op. at 216-220. But Congress addressed those concerns through the warrant requirement in the SCA. See 18 U.S.C. § 2703. That requirement provides protection for individual privacy interests by requiring the Government to make an adequate showing of probable cause of evidence of a crime or property used to commit a crime to a judge — a well-established standard of Fourth Amendment protection. See id.; Fed. R. Crim. P. 41(c); U.S. Const, amend. IV (“[N]o warrants shall issue, but upon probable cause.”); Camara v. Mun. Court of City & Cnty. of S.F.,
Furthermore, the provisions of the SCA concerning the means of disclosure following obtaining the warrant are quite separate from the privacy components of the SCA. Section 2703 includes a number of specific disclosure provisions, which state it is the provider of the electronic communication service that is the source of the records sought by the Government either pursuant to the warrant or the other means provided by that section to properly obtain the electronic communications. See id. § 2703 (a) (“A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication....”) (emphasis added); § 2703 (b)(1) (“A governmental entity may require a provider of remote computing service to disclose the contents of any wire or electronic communication ... ”) (emphasis added); § 2703 (c)(1) & (2) (both describing disclosure by providers); § 2703 (g) (same).
It makes no difference that Microsoft has chosen to store some electronic communications in other countries. That decision is based on its own business considerations, not privacy concerns for its customers. Microsoft has possession and immediate access to those emails regardless of where it chose to store them. Thus, the second prong of the RJR Nabisco test is satisfied here: the disclosure of the electronic communications occurs in the United States, when Microsoft honors the warrant by disclosing those communications.
It is also important to note that the interests of foreign internet electronic communication service providers, whose headquarters are abroad and whose customers choose to subscribe to those services with the knowledge that the provider is located outside the United States, are not at stake here. If the emails sought by the Government in this case were maintained by a foreign-based internet service provider, the situation would be quite different. Here, however, the majority’s concerns regarding “the interests of comity that ... ordinarily govern the conduct of cross-boundary criminal investigations,” Maj. Op. at 221, are overstated when the warrant is served on a U.S.-based electronic communication service provider for stored emails of a customer who chose to have a U.S.-based electronic communication service provider furnish his email service.
There is a real and practical component to the denial of en banc review of this case. This is a case that turns on statutory interpretation under RJR Nabisco rather than responding to a direct challenge to the constitutionality of the SCA or its disclosure provisions. The denial of en banc review hobbles both this specific Government investigation as well as many others, important not only to the United States but also foreign nations. The Government’s interest in continuing critical investigations into criminal activity is manifest. If Congress wishes to revisit the privacy and disclosure aspects of § 2703, it is free to do so when it chooses to do so. Until that time, this Court should allow the warrants to compel disclosure pursuant to § 2703 as it exists, and allow the Government to do its job in investigating serious criminal activity.
For these reasons, I respectfully dissent from the denial of en banc review.
Notes
. Judges Lynch and Bolden, who comprised the rest of the panel that heard this appeal, are not eligible to participate in deciding whether to rehear this case en banc because they are', respectively, a judge who entered senior status not long before the en banc poll was requested and a district judge sitting by designation. See 28 U.S.C. § 46(c) (limiting en banc voting to "the circuit judges of the circuit who are in regular active service”).
. In this regard, it bears noting that an SCA section not at issue in this case, 18 U.S.C. § 2702(b)(8), authorizes “[a] provider ... [to] divulge the contents of a communication ... to a governmental entity, if the provider, in good faith, believes that an emergency involving danger of death, or serious physical injury to any person requires disclosure without delay of communications relating to the emergency,” bypassing the warrant procedures of § 2703. Another section gives a provider immunity from civil liability for a voluntary production of content made "in accordance with ... [a] statutory authorization ... under this chapter.” 18 U.S.C. § 2703(e). The panel expressed no opinion on the use of these subsections, nor has it been suggested that the exigent circumstances of-a "danger of death or serious physical injury” are presented here.
.This is a fact well appreciated by the Members of Congress who have introduced a bill proposing related amendments. See International Communications Privacy Act, S. 2986, H.R. 5323, 114th Cong. (2016).
. This approach, in which we considered several numbered sections of the SCA, is not inconsistent with RJR Nabisco. Rather than requiring a provision-by-provision analysis in every instance, as the government and some of the dissenters suggest in the context of their “focus” analysis, see post at 61 (Droney, J., dissenting from the denial of reh’g en banc), RJR Nabisco involved looking at the expressed congressional intent with regard to the separately-enacted RICO predicate statutes, one by one, in the context of an overarching structure — that is, RICO. The panel majority here saw the SCA’s relevant provisions, essentially enacted of a piece, as reflecting a single congressional expression with respect to extraterritorial application — a statutory circumstance quite different from the one addressed in RJR Nabisco.
. In support of their position my dissenting colleagues contend, as does the government, that an SCA warrant functions more like a subpoena than a traditional warrant and should be treated accordingly as reaching all documents under the control of the instrument’s recipient. See post at 65 n.19 (Cabranes, J., dissenting from the denial of reh’g en banc); id. at 60 (Jacobs, J., dissenting from the denial of reh’g en banc). The SCA does not address a potential extraterritorial application of the instrument issued under § 2703 — indeed it is unlikely, in view of the historical context, that Congress could have anticipated such an application, much less weighed domestic law enforcement interests against countervailing concerns with international comity. In light of the importance of these interests, it seems a stretch to conclude that we should read Congress’s deliberate choice of the term "warrant” to reflect a concurrent intention to incorporate into the statute, without explicit mention, a body of case law addressing not warrants, but grand jury subpoenas. Cf. id. at 65 n.19 (Cabranes, J., dissenting from the denial of reh'g en banc) (citing Marc Rich & Co. v. United States,
.As explored further below, although the SCA is broadly focused on privacy, it does address disclosure, most particularly in § 2702, as an exception to its general rule of maintaining the confidentiality of customer content. See post at 67-68 (Cabranes, J., dissenting from the denial of reh'g en banc). The panel majority read the SCA to focus foremost on protecting user privacy by controlling access to stored communications — controls that apply even to service providers (if, for example, an employee exceeded his or her authorization with respect to stored data). To the extent that the majority opinion "raises concerns about the extraterritorial reach of protections from unlawful access and disclosures afforded by sections 2701 and 2702,” id. at 68 n.36 (Cabranes, J., dissenting from the denial of reh’g en banc) (emphasis added), one might take some comfort from the privacy laws of other countries that would apply to servers on their territory (and the significant incentives for service providers to guard against unauthorized intrusion). More importantly, however, the dissents’ concerns about the reach outside the United States of the protections established by the statute provide yet another reason for congressional overhaul of the SCA.
. Taken to its logical conclusion, the dissents’ focus on the place of disclosure to the exclusion of other factors would mean that, so long as the requested data is to be disclosed to the government within the United States, the SCA has only domestic application. But because, presumably, data demanded by the United States government under the SCA can always be expected to be disclosed to the government in the United States absent special circumstances, no application of the SCA's data disclosure procedures would be extraterritorial. At a time when U.S. companies, to their great credit, provide electronic communications services to customers resident around the globe, this observation suggests the demerits of the analysis.
. As noted in the panel majority opinion, MLATs are Mutual Legal Assistance Treaties "between the United States and other countries, which allow signatoiy states to request one another's assistance with ongoing criminal investigations, including issuance and execution of search warrants.” Microsoft,
. Microsoft represents in the record that it stores data in different locations around the world not at whim, but for competitive commercial reasons: so that the data can be more quickly recalled for users based on proximity to their reported geographic locations. See Microsoft,
. As Judge Lynch wrote in his panel concurrence, privacy "is an abstract concept with no obvious territorial locus,” and the majority’s conclusion therefore “does not really help us to distinguish domestic applications of the statute from extraterritorial ones.” Concurring Op.,
. We have had occasion to observe that the decision to deny rehearing en banc "does not necessarily mean that a case either lacks significance or was correctly decided. Indeed, the contrary may be true. An oft-cited justification for voting against rehearing, perhaps counterintuitively, is that the case is ‘too important to en banc.' " United States v. Taylor,
. See 18 U.S.C. §§ 2701-12.
. See Majority Op. at 222.
. Petition for Rehearing and Rehearing En Banc ("En Banc Petition”) 2-3. In just the second half of 2015, Google alone "received 3,716 warrants seeking data from a total of 9,412 accounts.” Id. at 75.
. In his concurring opinion, Judge Lynch observes that despite Microsoft’s suggestion that "this case involves a government threat to individual privacy.... upholding] the warrant here would not undermine basic values of privacy as defined in the Fourth Amendment and in the libertarian traditions of this country.” Concurring Op. at 222. As he explains, "the government complied with the most restrictive privacy-protecting requirements of the [SCA]. Those requirements are consistent with the highest levels of protection ordinarily required by the Fourth Amendment for the issuance of search warrants.” Id. at 223.
. Judge Carney’s opinion concurring in the order denying rehearing en banc does not dispute the fact that the panel majority’s decision has put the safety and security of Americans at risk. Instead, in a footnote, the concurring opinion notes two sections of the SCA that it believes lessen the severity of these consequences. Ante at 55 n.2 (Carney, I., concurring in the order denying reh’g en banc). The first section, 2702(b)(8), permits “[a] provider ... [to] divulge the contents of a communication ... to a government entity, if the provider, in good faith, believes that” there are exigent circumstances. Id. (quoting 18 U.S.C. § 2702(b)(8)) (emphasis added). The second section, 2703(e), "gives a provider immunity from civil liability for a voluntary production of content made 'in accordance with ... [a] statutory authorization.Id. at 55 n.2 (quoting 18 U.S.C. § 2703(e)). In asking us to entrust our national security to the good faith of internet service providers, I can only assume that the concurring opinion has some unstated reason for believing that Microsoft is just an atypically unpatriotic service provider and that other, more virtuous, service providers would never put their business interests ahead of public safety and national security.
.Concurring Op. at 223.
. Id. at 224.
. Majority Op. at 202-04.
. Id.
. The United States has entered into MLATs with several countries, allowing parties to the treaty to request assistance with ongoing criminal investigations, including issuance and execution of search warrants. See id. at 221. However, many countries do not have MLATs with the United States, e.g., Indonesia and Pakistan, and law enforcement cooperation with those countries is limited. See Gov’t Br. 48-53 (describing the inefficiencies of the MLAT process as well as its ineffectiveness in certain circumstances).
. En Banc Petition 18-19.
. Id.
. See Id. 17-19; see also Orin Kerr, The Surprising Implications of the Microsoft/Ireland Warrant Case, Wash. Post: The Volokh Conspiracy (Nov. 29, 2016), https://www. washingtonpost.com/news/volokh-conspiracy/ wp/2016/11/29/the-surprising-implications-of-the-microsoftireland-warrant-case.
. En Banc Petition 19.
. Id.
. Id.
. Id.
. The first step of the extraterritorial analysis is "to determine whether the relevant statutory provision contemplates extraterritorial application.” Majority Op. at 210 (citing Morrison,
The panel majority conflates SCA disclosure warrants with traditional search warrants. While the latter authorize government action as to places, the former authorize government action on persons. The fact that warrants generally do not authorize government searches of places outside the United States — a limitation grounded in respect for sovereignty, not privacy, see, e.g., The Apollon,
By failing to distinguish between search warrants as to places and disclosure warrants directed to persons, and between sovereignty and privacy, the panel majority construes "warrant” as used in the SCA to yield the perverse result of affording greater privacy protection to foreign nationals and Americans
. RJR Nabisco,
. See Majority Op. at 216-20.
. Id. at 220. Judge Carney's opinion concurring in the order denying rehearing en banc reiterates the panel majority’s conclusion— that, "the locus of the SCA’s privacy protections [is] at the place of data storage” — but again provides little or no explanation for how or why the statutory language permits such a reading. Ante at 56 (Carney, /., concurring in the order denying reh’g en banc). It offers only the sphinx-like explanation that "§ 2701, by proscribing unauthorized access to storage facilities, not only limits disclosure but also 'shelters the communications’ integrity.' ” Id. at 56 (quoting Majority Op. at 217-18). Conversely, and as the concurring opinion itself notes, those of us dissenting from the denial of en banc review “offer[] a detailed recitation of the available statutory support for [the] conclusion” that the conduct relevant to the SCA’s focus occurs at the place of disclosure. Id. at 57.
. Judge Carney’s en banc concurrence asserts that the panel majority's "reading of the SCA did no more than adhere to the dictates of Morrison in construing the SCA.” Ante at 56 (Carney, /., concurring in the order denying reh’g en banc). I disagree. Instead of locating support for its legal conclusion in the text or structure of the SCA, the concurring opinion, like the papel majority’s opinion, fixates on its unsubstantiated belief that the warrant at issue here raises "concerns of sovereignty and international comity.” Id. at 56. They both then conclude, based primarily on that misconception, that the warrant at issue must be an extraterritorial application of the SCA. Morrison, however, does not permit a court to conclude that a particular application of a statute is extraterritorial simply because it believes that the application threatens international comity. Rather, step two of the Morrison framework directs courts to examine the statutory language. See Morrison,
.According to the en banc concurrence, the panel majority considered and rejected my suggested holding partly because that holding "ignores situations in which the effects outside the United States are less readily dismissed.” Ante at 58 (Carney, /., concurring in the order denying reh'g en banc). As far as I understand it, the concurring opinion asserts the belief that the facts of this case are too sympathetic to my interpretation of the law and that only under alternative, entirely fictional, circumstances would the true menace of my position be revealed. It then devises a hypothetical warrant that purports to show how my suggested 'holding permits the au
This hypothetical is too clever by half. In attempting to construct the most shocking warrant conceivable, the concurring opinion omits two critical facts, both of which are required under my understanding of the law. First, a judicial officer of the United States would have to issue the warrant upon a finding of probable cause to believe that the information' being sought was related to criminal activity occurring within the United States. Second, the provider would have to disclose the targeted information to the government inside the United States. Thus, if all of the conditions necessary for a valid SCA warrant are satisfied, there is no basis for concluding that even Judge Carney’s imagined warrant, not to mention the warrant at issue, is an ■ extraterritorial application of the SCA.
. Id. at 217; see 18 U.S.C. §§ 2701-03.
. 18 U.S.C. § 2701.
. Majority Op. at 220 (emphasis added).
. 18 U.S.C. § 2701.
. Id. § 2701(c)(1) (emphasis added).
. The panel majority characterizes a service provider that "access[es]” a user’s email pursuant to an SCA warrant as “an agent of the government.” Majority Op. at 214, 220. But, the legal authorities cited by the panel for the proposition that a private party who assists the government in conducting a search and seizure "becomes an agent of the government,” id. at 214, do not involve circumstances, such as those here, where the private party already had possession of the relevant property.
. Id. §§ 2702-03 (emphasis added).
. See id. § 2702(a)(l)-(3).
. Id. (emphasis added).
. Id. § 2703(a) (emphasis added).
. Neither the panel majority’s opinion nor the en banc concurrence explains why "privacy” is better served by looking to a provider’s access rather than its disclosure. They just assume the point. See ante at 60 (Carney, /., concurring in the order denying reh’g en banc) ("The better approach ... is one that looks to the step taken before disclosure— access — in determining privacy’s territorial locus.”); Majority Op. at 220. Both the panel majority's opinion and the-en banc concurrence also fail to explain why the physical location of the datacenter is the legal point of access, rather than the location from where the service provider electronically gains access to the targeted data, which, in this case, is the United States. Evidently, it is so (again) because the panel majority and the concurrence say it is so. See ante at 56 (Carney, /., concurring in the order denying reh’g en banc) ("[T]he locus of the SCA’s privacy protections [is] at the place of data storage.”); Majority Op. at 220. Naked assertions, however, do not the law make.
.To the extent the panel majority concludes that the SCA does not apply extraterritorially to compel a provider’s disclosures pursuant to section 2703, its place-of-access reasoning raises concerns about the extraterritorial reach of protections from unlawful access and disclosures afforded by sections 2701 and 2702. Such a concern might be avoided if the statute is construed to reach, at least, the conduct of persons within the jurisdiction of the United States. This further concern only reinforces the need for en banc review.
. Ultimately, Judge Carney's concurring opinion suggests that rehearing en banc is unnecessary because the panel majority’s holding was compelled by an anachronistic statute and an inflexible framework for analyzing questions of extraterritoriality. Ante at 60 (Carney, /., concurring in the order denying reh'g en banc). It also notes that some Members of Congress have introduced a bill purporting to resolve all of our concerns with the statute. Id. at 55 n.3. I submit that rehearing en banc is necessary precisely because the panel majority misread the SCA and misapplied the extraterritoriality framework set forth in Morrison. Where a decision of our court has unnecessarily created serious, ongoing problems for those charged with enforcing the law and ensuring our national security, and where a legislative remedy is entirely speculative, we should not shirk our duty to interpret an extant statute in accordance with its terms.
. On the panel’s reasoning, if on September 10, 2001, the government had been able to show probable cause to believe that Mohamed Atta, Abdul Aziz al Omari, etc., were communicating electronically about an imminent, devastating attack on the United States, and that Microsoft possessed those emails, no federal court could have issued a § 2703(a) warrant compelling Microsoft to disclose those emails if it had stored them overseas, even though its employees would not have had to leave their desks in Redmond, Washington, to retrieve them.
. See Restatement (Third) of Foreign Relations Law § 432(2) ("A state's law enforcement officers may exercise their functions in the territory of another state only with the consent of the other state, given by duly authorized officials of that state.”); 1 Oppen-heim’s International Law § 119 (Robert Jennings & Arthur Watts, eds., 9th ed. 1992) ("It is ... a breach of international law for a state without permission to send its agents into the territory of another state to apprehend persons accused of having committed a crime.”); The Apollon,
Lead Opinion
ORDER
Following disposition of this appeal, an active judge of the Court requested a poll on whether to rehear the case en banc
Susan L. Carney, Circuit Judge, concurs by opinion in the denial of rehearing en banc.
Dennis Jacobs, Circuit Judge, joined by José A. Cabranes, Reena Raggi, and Christopher F. Droney, Circuit Judges, dissents by opinion from the denial of rehearing en banc.
José A. Cabranes, Circuit Judge, joined by Dennis Jacobs, Reena Raggi, and Christopher F. Droney, Circuit Judges, dissents by opinion from the denial of rehearing en bane.
Reena Raggi, Circuit Judge, joined by Dennis Jacobs, José A. Cabranes, and Christopher F. Droney, Circuit Judges, dissents by opinion from the denial of rehearing en banc.
Christopher F. Droney, Circuit Judge, joined by Dennis Jacobs, José A. Cabranes, and Reena Raggi, Circuit Judges, dissents by opinion from the denial of rehearing en banc.
The following active judges were recused from participating in the poll: Rosemary S. Pooler, Debra Ann Livingston, and Raymond J. Lohier, Jr.
