In this appeal from an insider securities trading conviction, we must decide difficult evidentiary issues involving an illegal interception of voicemail, as well as whether internal corporate earnings projections may constitute “material” inside information and whether conviction requires proof of actual use of that inside information.
I
PDA Engineering, Inc. (“PDA”) was, in 1993, a software design firm with headquarters in Orange County, California. Shares in PDA were publicly traded on the National Association of Securities Dealers Exchange (commonly referred to as “NASDAQ”). Richard Smith served as PDA’s Vice President for North American Sales and worked in PDA’s Nashville, Tennessee, office. By early 1993, after nearly .three years with PDA, Smith had accumulated 51,445 shares of PDA stock.
In a series of transactions between June 10 and June 18, 1993, Smith liquidated his entire position in PDA. In addition to selling his own shares, Smith “sold short” 1 25,000 shares on July 8, and another 10,000 shares on July 20. Smith’s parents also sold and sold short a total of 12,000 shares.
Amidst this flurry of sales activity, on June 19, Smith telephoned Angela Bravo de Rueda (“Bravo”), an employee in the Los Angeles office of PDA, and left her the following voicemail message:
Hi, Angie, Rich.... I talked to Tom last night after I left you some messages and he and Lou discovered that there was about a million and a half dollar mistake in the budget, so now we’re back at ground zero and we’ve got to scramble for the next few days. Anyway, finally I sold all my stock off on Friday and I’m going to short the stock because I know its going to go down a couple of points here in the next week as soon as Lou releases the information about next year’s earnings. I’m more concerned about this year’s earnings actually. 2
*1054 Unbeknownst to either Smith or Bravo, another Los Angeles-based PDA employee, Linda Alexander-Gore (“Gore”), guessed correctly Bravo’s voicemail password and accessed Bravo’s mailbox. When Gore encountered Smith’s message, she forwarded it to her own mailbox. In order to retrieve it, she then called her own voicemail from her home telephone, played the message, and recorded it with a handheld audiotape recorder. 3 After recording the message, Gore approached a co-worker, Robert Phillips (“Phillips”). She informed him of the genei’al nature of the communication and provided him with a copy of the recording.
Phillips listened to the message and telephoned the United States Attorney’s Office for the Central District of California, where he spoke to Assistant United States Attorney Bart Williams (“Williams”). Phillips told Williams that he believed he had information, in the form of an audiotape, that indicated possible criminal activity. He played the tape for Williams approximately four times and attempted to answer several questions about the contents of the recording. He informed Williams that he believed that the speaker on the tape was Smith and that the references in the message to “Tom” and “Lou” were probably to Tom Curry and Lou Delmonico, both corporate officers at PDA. Phillips offered to send Williams a copy of the tape itself, but Williams declined. Phillips never spoke to Williams again.
Williams referred the matter to Special Agent Maura Kelly (“Kelly”) of the Federal Bureau of Investigation (“FBI”). Kelly contacted the Pacific Regional Office of the Securities and Exchange Commission (“SEC”) and relayed to a staff attorney that an “anonymous informant had told [Williams] about insider trading in the stock of a company called PDA Engineering by a person named Richard Smith and that the anonymous informant had a tape of a conversation involving an individual purporting to be Smith discussing insider trading.” In November 1993, the SEC issued a formal order of investigation against Smith. Over the course of the ensuing eight months, the SEC obtained documentary evidence from various sources and deposed a number of witnesses. Sometime during the seventh month of its eight-month investigation (in July 1994), the SEC obtained via administrative subpoena an audiotape copy of the recorded voicemail message.
In September 1994, the SEC referred the matter back to the United States Attorney in Los Angeles for possible criminal prosecution. Throughout the next eighteen months, the United States Attorney’s Office and the FBI conducted substantial additional investigation, during which they interviewed fifteen individuals and subpoenaed sixteen additional boxes of documents.
Smith was indicted on eleven counts of insider trading in violation of § 10(b) of the Securities Exchange Act of 1934, 15 U.S.C. § 78j(b), and SEC Rule 10b-5, 17 C.F.R. § 240.10b-5, and on one count of obstruction of justice in violation of 18 U.S.C. § 1505. Smith moved to suppress the evidence supporting the eleven insider trading counts and to dismiss the indictment as a whole, including the obstruetion-of-justice count. After an extensive hearing, the district court suppressed the voicemail message itself, but refused to exclude the remainder of the government’s evidence, concluding that it was not “derived from” the initial illegal recording. Although the court granted Smith’s motion to dismiss the obstruction count, 4 it denied his motion to dismiss with respect to the insider trading counts.
After a week-long trial, a jury returned guilty verdicts on all eleven insider trading counts. Smith filed a motion for judgment of acquittal or, in the alternative, for a new trial. The district court denied the motion, and Smith appealed.
Smith’s contentions on appeal are essentially these: (1) that the government’s evidence of insider trading was “derived from” an illegal wiretap and, therefore, should have been excluded pursuant to 18 U.S.C. § 2515; (2) that the information he possessed was *1055 forward-looking, or “soft,” information, and hence was not “material” within the meaning of Rule 10b—5; and (3) that the district court erroneously instructed the jury that it could convict Smith based upon his mere possession, as opposed to his use, of inside information.
II
Prior to trial, the district court suppressed the tape of the voicemail message because it concluded that the tape had been illegally “intercepted” within the meaning of 18 U.S.C. § 2515. The court refused, however, to exclude the remainder of the government’s evidence. Smith contends on appeal that all evidence produced by the government at trial should have been suppressed because it was “derived from” an illegal wiretap in violation of § 2515. The government counters on two fronts. In addition to its argument that the district court correctly rejected Smith’s “derived from” argument, see infra Part II.B, the government maintains (as an alternative basis for affirmance 5 ) that the district court erred in concluding that § 2515 governs this case in the first place. The government contends that a separate section of Title 18— § 2701—applies to situations like the one presented here and thus controls the evidentiary question.. Because the government’s alternative argument presents a threshold issue, we address it first.
A
When the Fifth Circuit observed that the Wiretap Act “is famous (if not infamous) for its lack of clarity,”
Steve Jackson Games, Inc. v. United States Secret Service,
Smith insists that the Wiretap Act controls. The district court agreed. Section 2515 provides, in relevant part, that “[w]hen-ever any wire ... communication has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received, in evidence in any trial.” 18 U.S.C. § 2515 (emphasis added). Section 2510(1) defines “wire communication” as “any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like connection” and expressly includes within its scope “any electronic storage of such communication.” 18 U.S.C, § 2510(1) (emphasis added). 6 Section 2510(4) defines “intercept” as “the aural or other acquisition of the contents of any wire ... communication through the use of any electronic, mechanical, or other device.” 18 U.S.C. § 2510(4).
In view of the rather broad definitions supplied in § 2510, Smith argues, the voice-mail message Gore retrieved from Bravo’s mailbox seems rather plainly to fit within the language of the exclusionary provision of § 2515. For starters, the message itself, which Smith left in the voicemail system via telephone, was a “wire communication”; it was an “aural transfer,” made using a wire facility (the telephone line), and was subsequently “electronically] stor[ed]” within the voicemail system. In addition, Gore’s act of recording the message with a handheld audiotape-recording “device” constituted an “aural or other acquisition” 7 —and, hence, an “interception”—of the message. It is clear, Smith insists, that § 2515 applies. The government’s response: Not so fast.
Section 2701, which is part of the Stored Communications Act, provides for the criminal punishment of anyone who “intentionally *1056 accesses without authorization a facility through which an electronic communication service is provided ... and thereby obtains ... access to a wire ... communication while it is in storage in such system.” 18 U.S.C. § 2701. There is no doubt that the voicemail message at issue is a “wire communication.” 8 We have also already observed that the message was in “storage” within PDA’s voicemail system. When Gore used Bravo’s password to dial into the voicemail system, and then retrieved and recorded Smith’s message, the government argues, she violated § 2701’s prohibition on “accessing]” stored wired communications. Consequently, the government argues, the voicemail message fits within § 2701.
The fact that § 2701, as well as § 2515, appears to apply to the voicemail message is significant, the government argues, because, unlike the Wiretap Act, the Stored Communications Act does not provide an exclusion remedy. It allows for civil damages, see 18 U.S.C. § 2707, and criminal punishment, see 18 U.S.C. § 2701(b), but nothing more. Indeed, the Stored Communications Act expressly rules out exclusion as a remedy; § 2708, entitled “Exclusivity of Remedies,” states specifically that § 2707’s civil cause of action and § 2701(b)’s criminal penalties “are the only judicial remedies and sanctions for violations of’ the Stored Communications Act. 18 U.S.C. § 2708 (emphasis added). Therein lies the rub. If the voicemail message at issue is subject to the strictures of the Stored Communications Act, then suppression is not an available remedy. If, however, it is subject to the Wiretap Act, then suppression is quite explicitly available. In other words, with respect to this case, the Wiretap Act and the Stored Communications Act appear, on their faces, to be mutually exclusive statutes (with mutually exclusive remedial schemes). Unfortunately, at least at first glance, Congress seems to have defied the laws of semantics and managed to make the voicemail message here at issue simultaneously subject to both. 9
1
In an effort to alleviate the apparent textual tension, the government endeavors to take the voicemail message at issue outside the scope of § 2515 by narrowly interpreting the word “intercept.” Citing a handful of decisions — most prominently
United States v. Turk,
The government’s explanation encounters problems, however. Most significantly, although the government’s proposed definition of “intercept” might comport with the term’s ordinary meaning—“to take, seize or stop by the way or
before arrival at the destined place,” see, e.g., Webster’s Third New International Dictionary
1176 (1986) (emphasis added)—in this case, ordinary meaning does not control. When, as here, the meaning of a word is clearly explained in a statute, courts are not at liberty to look beyond the statutory definition.
See Colawtti n Franklin,
The government cites a slew of cases that it claims supports its narrow definition of “intercept” as requiring contemporaneity. The lion’s share of those cases, however, concern electronic communications, not wire communications.
See Steve Jackson Games,
Reno,
Congress’ use of the word “transfer” in the definition of “electronic communication,” and its omission in that definition of the phrase “any electronic storage of such communication” (part of the definition of “wire communication”) reflects that Congress did not intend for “intercept” to apply to “electronic communications” when those communications are in “electronic storage.”
Steve Jackson Games,
*1058
In a case involving wire communications, like this one, the narrow definition of “intercept” is much harder to swallow. If, as the government insists, the term “intercept” necessarily implies contemporaneous acquisition, then the portion of § 2510(1) that specifically explains “wire communication” as including stored information is rendered essentially meaningless because messages in electronic storage cannot, by definition, be acquired contemporaneously.
12
We cannot accept such an interpretation, which flies in the face of “the cardinal rule of statutory interpretation that no provision [of a statute] should be construed to be entirely redundant.”
Kungys v. United States,
2
It is not necessary, as the government assumes, either to rewrite or to ignore congressionally approved language to make sense of the Stored Communications Act and the Wiretap Act. Rather, the two statutes “admit[ ] a reasonable construction which gives effect to all of [them] provisions.”
Jarecki v. G.D. Searle & Co.,
Both textual and structural considerations support our interpretation. First, our construction comports with the statutory definition of “intercept” as entailing actual “acquisition,”
see
18 U.S.C. § 2510(4), and with the ordinary meaning of “accessf ]” (which is not statutorily defined) as meaning “to get at” or to “gain access to,”
see Webster’s Ninth New Collegiate Dictionary
49 (1986).
13
Second,
*1059
whereas the language of § 2701 refers broadly to accessing a communications “facility,” § 2515 refers more pointedly to intercepting the “wire ... communication” itself.
14
One assuredly can access a communications facility—such as a company voicemail system— without listening to or recording any of the messages stored within that facility. Third, our reading of the Acts explains their contrasting penalty schemes. If, for instance, a hypothetical hacker were merely to “access! ]” a communication facility
(ie.,
put himself in position to acquire a wire communication), he could be either sued for civil damages under § 2707 or criminally prosecuted under § 2701(b), which provides for incarceration for a period of up to
two
years. If, however, he were to go further, and actually to “intercept! ]”
(ie.,
acquire) a wire communication, he may be sued for civil damages under § 2520 or criminally prosecuted under § 2511, which provides for incarceration for a period of up to
five
years. The fact that criminal violations of the Wiretap Act are punished more severely than those of the Stored Communications Act reflects Congress’s considered judgment regarding the relative culpability that attaches to violations of those provisions and supports our conclusion that a violation of the latter is, conceptually, a “lesser included offense” of the former. Fourth, our construction explains the absence of an exclusion remedy among the Stored Communications Act’s provisions. Obviously, the act of , merely “access[ing]” a communications facility would not alone produce the contents of any wire communication that might be suppressed; hence, an exclusion provision in the Stored Communications Act is unnecessary. The actual “interception]” of a wire communication, however, could yield suppressible evidence; hence, pursuant to § 2515, the contents of any such communication illegally intercepted may not be introduced in any official proceeding. Finally, and perhaps most importantly, our interpretation permits the Wiretap Act and the Stored Communications Act to coexist peacefully; that is, it prevents us from having simply to ignore a congressional enactment or a portion thereof.
See United Savings Ass’n v. Timbers of Inwood Forest,
3
We thus reject the government’s interpretation in favor of what we believe to be a more holistically sound approach to this confusing area of the law. Pursuant to that approach, we conclude that Gore’s act of retrieving and recording Smith’s voicemail message constituted an “interception],” and is therefore governed, not by the Stored Communications Act but, instead, by the Wiretap Act and the exclusionary rule of § 2515. Consequently, we conclude that the district court was correct to suppress the tape of the voicemail message.
B
Section 2515 requires the suppression of not only the illegally intercepted wire communication itself, but also any “evidence derived therefrom.”
15
Smith insists that the entirety of the government’s case against him was “derived from” the unlawful wiretap and should therefore have been excluded from evidence. We have long recognized that § 2515 “codifies the ‘fruits of the poisonous tree’ doctrine with respect to violations that trigger application of the section.”
United States v. Spagnuolo,
In
Wong Sun v. United States,
The “attenuated basis” exception is, at bottom, the manifestation of the courts’ consistent rejection of a “but for” causation standard in “fruit of the poisonous tree” doctrine. As the Supreme Court put the matter in
United States v. Ceccolini,
Even in situations where the exclusionary rule is plainly applicable, we have declined to adopt a “per se or ‘but for’ rale” that would make inadmissible any evidence, whether tangible or live-witness testimony, which somehow came to light through a chain of causation that began with an illegal arrest.
Id.
at 276,
In arguing for suppression, Smith advocates an “impetus” test for determining taint. He points to the district court’s “factual finding” that “it’s fairly obvious that the intercepted message was the impetus for starting the investigation,” and argues that “[b]eeause the district court’s finding ... was not clearly erroneous, the evidence obtained in the subsequent investigation of Smith
*1061
should have been suppressed.” Smith relies upon this court’s decision in
United States v. Johns,
We likewise decline Smith’s invitation to couch the taint inquiry in terms of “links in [a] causal chain” leading to incriminating evidence. The question of taint simply “cannot be answered on the basis of ‘causation in the logical sense alone.’ ”
See United States v. Carsello,
Contrary to Smith’s suggestions, under Ninth Circuit precedent, the baseline inquiry in evaluating taint is not whether an unlawful search was the “impetus” for the investigation or whether there exists an unbroken “causal chain” between the search and the incriminating evidence; rather, courts must determine whether “anything seized illegally, or any leads gained from illegal activity, tend[ed]
significantly to direct
the investigation toward the specific evidence sought to be suppressed.”
Cales,
The standard for suppression under the “attenuated basis” exception is slightly different when the evidence sought to be suppressed is testimonial, rather than documentary. Courts require “a closer, more direct link between the illegality and [live-witness] testimony” than they demand for the exclusion of documentary evidence.
Ceccolini,
With these principles in mind, we turn to the disputed evidence in this ease. To recap, the voicemail message, which the district court concluded had been illegally “intercept-, ed,” stated, in relevant part:
Hi, Angie, Rich.... I talked to Tom last night after I left you some messages and he and Lou discovered that there was about a million and a half dollar mistake in the budget, so now we’re back at ground zero and we’ve got to scramble for the next few days. Anyway, finally I sold all my stock off on Friday and I’m going to short the stock because I know its going to go down a couple of points here in the next week as soon as Lou releases the information about next year’s earnings. I’m more concerned about this year’s earnings actually.
Significantly, the text of the voicemail message itself actually reveals very little about the crime; it discloses only (1) the existence of insider trading, (2) the first name of the suspected inside trader, (3) the fact that the inside trader had sold stock recently and would sell short in the near future, and (4) the existence, but not the significance, of two individuals named “Tom” and “Lou.” More significantly, the SEC did not even obtain an actual copy of the message until July 1994, after its investigation was well underway. Hence, the information contained in the recording did not itself even directly trigger the SEC’s investigation; rather, the spark for the probe was the third-hand description of the tape the SEC received from Special Agent Kelly of the FBI. Recall that Kelly had informed the SEC that
[an] anonymous informant had told [Assistant United States Attorney Williams] about insider trading in the stock of a company called PDA Engineering by a person named Richard Smith and that the anonymous informant had a tape of a eon-versation involving an individual purporting to be Smith discussing insider trading.
Consequently, it is not the information that one might potentially glean from the message itself that is most relevant to the question of taint; rather, it is the information about the message that the SEC actually learned from Agent Kelly.
From Kelly, the SEC learned even less than it might have ascertained from the message itself: (1) the probable name of the suspected inside trader; (2) the name of company in whose stock he traded; and (3) the existence of potential criminal activity. 17 What the SEC did not learn from Kelly is more telling: (1) the identities of any of PDA’s corporate officers, including Lou Delmonico or Thomas Curry; (2) the nature of the information to which Smith was privy and whether it was “material” within the meaning of the securities laws; (3) Smith’s position at PDA and whether his position gave rise to a duty to disclose nonpublic information; (4) whether Smith possessed the requisite mens rea to support an insider trading conviction; (5) the identity of the stockbroker who consummated Smith’s trades; (6) whether Smith had followed or ignored his broker’s advice in shorting his PDA stock; (7) the fact that Smith’s parents had engaged in suspicious trades; and (8) the identity of Smith’s parents’ stockbroker. The SEC had to discover all of these facts on its own accord through independent investigation. Over the course of eight months, the SEC obtained documentary evidence from a number of sources (including PDA, NASDAQ, and several brokerage firms) and interviewed a bevy of witnesses (including, among others, Smith himself, Bravo, Gore, Phillips, Smith’s stockbroker, Smith’s parents and their stockbroker, and PDA’s chief financial officer and chief operating officer).
There is no reason to believe that the relatively meager amount of information provided to the SEC by Agent Kelly “led
directly
to any of the evidence actually used against the defendant at trial,”
Carsello, 578
F.2d at 203 (emphasis added), or otherwise “significantly directed” the government to
*1063
ward the evidence it ultimately obtained, see
Cales,
Because the nexus between the intercepted voicemail message and the lion’s share of the evidence independently gleaned from the SEC’s investigation (which the United States Attorney and the FBI subsequently inherited) is sufficiently attenuated, we affirm the district court’s decision insofar as it concludes that the government’s evidence was not “derived from” the unlawful wiretap within the meaning of 18 U.S.C. § 2515. 18
Ill
Section 10(b) of the Securities Exchange Act of 1934 makes it unlawful for any person “[t]o use or employ, in connection with the purchase or sale of any security registered on a national securities exchange or any security not so registered, any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [SEC] may prescribe.” 15 U.S.C. § 78j(b). To implement § 10(b), in 1942, the SEC adopted Rule 10b-5, which provides, in relevant part:
It shall be unlawful for any person, directly or indirectly ...,
(a) [t]o employ any device, scheme, or artifice to defraud,
(b) to make any untrue statement of a material fact or to omit to state a material fact necessary in order to make the statements made, in the light of the circumstances under which they were made, not misleading, or
(c) to engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person,
in connection with the purchase or sale of any security.
17 C.F.R.. § 240.10b-5. A violation of Rule 10b-5 comprises four elements: a(l) misleading (2) statement or omission (3) of a “material” fact (4) made with scienter.
See SEC v. Fehn,
Smith contends that the information upon which he traded consisted of “forecasts of future sales and revenue.” This “soft,” forward-looking information, he insists, cannot, as a matter of law, constitute “material” information within the meaning of Rule 10b-5 and, consequently, cannot give rise to insider trading liability. Smith complains that the district court employed an erroneous understanding of materiality (i.e., as including “soft” information) when it refused to dismiss the indictment, denied his motions for judgment of acquittal and new trial, and instructed the jury. He urges reversal on all three grounds.
In
Basic, Inc. v. Levinson,
*1065
In support of his contention that “soft” information cannot, as a matter of law, be “material” within the meaning of Rule 10b-5, Smith invokes a handful of Ninth Circuit
eases—In re Worlds of Wonder Securities Litigation,
Nor can there be any doubt that the forecast of earnings was a “material” fact. The applicable test of materiality is essentially objective: “... whether ‘a reasonable man would attach importance (to the fact misrepresented) in determining his choice of action in the transaction in question.’ ” And generally earnings projections of a company constitute a prime factor in estimating the worth of its stock, especially when made close to the end of the fiscal year.
Id.
at 489 (internal citations omitted). It is irrelevant that neither
Basic
nor
Fehn
nor
Marx
involved insider trading. The standard for materiality is a constant (at least for Rule 10b-5 purposes); it does not vary “depending on who brings the action or whether insiders are alleged to have profited.”
Basic,
*1066 There is, quite simply, no ease law to support Smith’s blanket assertion that forward-looking statements cannot, as a matter of law, constitute “material” information within the meaning of Rule 10b-5. Indeed, both the Supreme Court and this court have held to the contrary and have observed that determining materiality requires a nuanced, case-by-case approach. Consequently, we reject Smith’s contentions that the district court erred (1) in refusing to dismiss the indictment, (2) in denying his motion for a judgment of acquittal, and (3) in instructing the jury based upon the Basic definition of materiality.
IV
With respect to Smith’s state of mind, the district court instructed the jury as follows:
In order for you to find the defendant guilty on [the insider trading counts] of the indictment, the government must prove a causal relationship between the material nonpublic information in the defendant’s possession and the defendant’s trading.
That is, the government must prove that the defendant sold or sold short PDA stock because of material nonpublic information that he knowingly possessed. It is not sufficient that the government proves that the defendant sold or sold short PDA stock while knowingly in possession of the material nonpublic information. However, the government need not prove that the defendant sold or sold short PDA stock solely because of the material nonpublic information. It is enough if the government proves that such inside information was a significant factor in defendant’s decision to sell or sell short PDA stock.
Although he accedes in much of the instruction, Smith objects to the final two sentences, arguing that they “confused the jury” by providing that the government need only demonstrate that the inside information was a “significant factor” in his decision to trade, and not “the reason.” The government and the SEC counter by arguing that, in fact, the district court’s instruction “exceeded the requirements of existing law.” They insist that there is no “causation” element to an insider trading prosecution. Rather, they contend, “[w]hen a corporate'insider like Smith has information relating to his company that he knows (or is reckless in not knowing) to be material and nonpublic and he trades in the company’s stock, he violates the antifraud provisions of the federal securities laws, whether or not the information is a factor in his decision to trade.” In other words, the government contends, it needed only to prove that Smith knowingly possessed material nonpublic information, not that he actually used the information in deciding to buy or sell.
A
Although the use-possession debate has attracted a good deal of attention from academic commentators,
23
very few courts (and none in this circuit) have.addressed the issue head on. In support of their proposed “possession-only” standard, the government and the SEC rely principally upon dictum from a Second Circuit case,
United States v. Teicher,
Because the advantage [an inside trader has over other traders] is in the form of information, it exists in the mind of the trader. Unlike a loaded weapon which may stand ready but unused, material information can not lay idle in the human brain.
Id. at 120-21.
Despite the Second Circuit’s thoughtful analysis, we believe that the weight of authority supports a “use” requirement. Perhaps most significantly, the Supreme Court has consistently suggested, albeit in dictum, that Rule 10b-5 requires that the government prove causation in insider trading prosecutions. Indeed, just last Term, in
United States v. O’Hagan,
— U.S.-,
In addition to suggestions from the Supreme Court, the only court of appeals squarely to consider the causation issue concluded that Rule 10b-5 does, in fact, entail a “use” requirement.
See SEC v. Adler,
The
Adler
court also thought a “use” requirement more consistent with the language of § 10(b) and Rule 10b-5, which emphasizes “manipulation],” “deception],” and “fraud.” We agree. By focusing exclusively upon the phrase “in connection with,” the Second Circuit, we think, lost sight of the law’s main thrust. ' After all, § 10(b) and Rule 10b-5 do not just prohibit certain unspecified acts “in connection with” the purchase or sale of securities; rather, they prohibit the employment of “manipulative” and “deceptive” trading practices in connection with those transactions. This court has expressly held that “scienter” is a necessary element of an insider trading violation,
see SEC v. Fehn,
A corporate insider who trades knowing that he has inside information not available to persons on the other sides of his trades knows that those persons, to whom he owes a fiduciary duty, are at a disadvantage and will be making their decisions on the basis of incomplete information.
The SEC’s position, however, rests upon a faulty premise. The persons with whom a hypothetical insider trades are not at a “disadvantage” at all provided the insider does not “use” the information to which he is privy. That is to say, if the insider merely possesses and does not use, the two parties are trading on a level playing field; if the insider merely possesses and does not use, both individuals are “making their decisions on the basis of incomplete information.” It is the insider’s use, not his possession, that gives rise to an informational advantage and the requisite intent to defraud.
Moreover, with respect to our colleagues on the Second Circuit, we do not believe that the “oft-quoted maxim” of “disclose or abstain,”
Teicher,
We do not take lightly the SEC’s argument that a “use” requirement poses difficulties of proof. In operation, the government claims, the “use” requirement will “entail significant factual inquiries into the state of mind and the motivations of the inside trader.” In an attempt to alleviate those difficulties, the
Adler
court adopted a rule providing that, although “use” is a required element of a Rule 10b-5 insider trading violation, “when an insider trades while in possession of material nonpublic information, a strong inference arises that such information was used by the insider in trading.”
Adler,
We nonetheless adhere to our view that Rule 10b-5 entails a “use” requirement. We appreciate that a “use” requirement renders criminal prosecutions marginally more difficult for the government to prove. The difficulties, however, are by no means insuperable. It is certainly not necessary that the government present a smoking gun in every insider trading prosecution. (Not that a smoking gun will always be beyond the government’s reach; consider, for instance, that in this ease Bravo might herself have gone to the authorities with Smith’s statement that “I’m going to short the stock because I know its going to go down a couple of points here in the next week as soon as Lou releases the information about next years earnings.”) Any number of types of circumstantial evidence might be relevant to the1 causation issue. Suppose, for instance, that an individual who has never before invested comes into possession of material nonpublic information and the very next day invests a significant sum of money in substantially out-of-the-money call options. 26 We are confident that the government would have little trouble demonstrating “use” in such a situation, or in other situations in which unique trading patterns or unusually large trading quantities suggest that an investor had used inside information.
Consequently, we reject the government’s proffered “knowing possession” standard for insider trading violations as contrary the weight of existing authority. Rather, we hold that Rule 10b-5 requires that the government (or the SEC, as the case may be 27 ) demonstrate that the suspected inside trader actually used material nonpublic information in consummating his transaction.
B
Smith contends that the district court’s instructions in this case were insuffi *1070 cient as a matter of law. Specifically, he complains that “a jury instruction which allows the government to obtain a conviction without proof that the defendant traded in stock ‘because of the material nonpublic information’ that he possessed, effectively wipes out the scienter requirement as defined by this Court and the Supreme Court.” As a legal matter, he is correct. The trouble for Smith lies not in the law but in the facts, because the district court in this case did require proof of causation. It specifically instructed- the jury that “the government must prove that the defendant sold or sold short PDA stock because 0/material nonpublic information that he knowingly possessed” and cautioned that “[i]t is not sufficient that the government proves that the defendant sold or sold short PDA stock while knowingly in possession of the material nonpublic information.” 28 In other words, even under the more rigorous “use” standard that we adopt today, Smith has nothing to complain about. We must therefore reject Smith’s challenge to the district court’s state-of-mind instruction.
V
For the foregoing reasons, the district court’s decision is affirmed in all respects.
AFFIRMED.
Notes
. “Short selling is a device whereby the speculator sells stock which he does not own, anticipating that the price will decline and that he will thereby be enabled to 'cover,' or make delivery of the stock sold, by purchasing it at the lesser price. If the decline materializes, the short seller realizes as a profit the differential between the sales price and the lower purchase or covering price.” Louis Loss & Joel Seligman, Fundamentals of Securities Regulation' 699 (3d ed.1988) (quoting Stock Exchange Practices, Report of Comm, on Banking & Currency, S.Rep. No. 1455, 73d Cong., 2d Sess. 50-51 (1934)) (internal quotation marks omitted).
. Perhaps not so coincidentally, Smith was correct in his estimation that the price of PDA's stock would decline. Following the company's release of its fourth-quarter sales figures on August 19, PDA stock dropped roughly 38%, from approximately eight dollars ($8) per share to approximately five dollars ($5) per share. In addition to the substantial losses he avoided by selling his own stock — somewhere in the neigh *1054 borhood of $150,000 — Smith’s short sales netted him approximately $50,000.
. The record does not reveal the precise reason for Gore’s curiosity.
. The court granted the motion to dismiss with respect to part of the obstruction count on October 11, 1996, and with respect to the remainder on November 1, 1996.
. In reviewing a motion to suppress, we may affirm on any basis fairly supported by the record.
See United States v. Smith,
. Section 2510(17), in turn, defines “electronic storage" to include "any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof.” 18 U.S.C. § 2510(17).
.The term "acquisition” is not defined in § 2510; however, its ordinary meaning—the act of acquiring, or coming into possession of, see Webster’s Third New International Dictionary 18-19 (1986)—is certainly broad enough to encompass Gore’s conduct.
. The Stored Communications Act borrows the definitions articulated in § 2510.
. As is most often the case, the legislative history is of no help whatsoever. In referring to the addition to the definition of “wire communication" in § 2510(1) of the phrase "and such term includes any electronic storage of such communication,” the Senate Report accompanying the Electronic Communications Privacy Act, Pub.L. No. 99-508, 100 Stat. 1848 (1986), observes that "wire communications in storage like voice mail, remain wire communications, and are protected accordingly." S.Rep. No. 99-541, 99th Cong., 2d Sess. (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3566 (emphasis added). Presumably, that would include protection against "aural or other acquisition” — "intercept[ion]”—under § 2515. The House Report, however, suggests a different conclusion:
An “electronic mail” service, which permits a sender to transmit a digital message to the service's facility, where it is held in storage until the addressee requests it, would be subject to Section 2701. A “voice mail" service operates in much the same way.... It would likewise be subject to Section 2701.
H.R.Rep. No. 99-647, 99th Cong., 2d Sess. 63 (1986) (emphasis added).
Five words spring immediately to mind: "Friends at a cocktail party.”
See Conroy v. Aniskoff,
. For a similar treatment, see Thomas R. Greenberg, Comment, E-Mail and Voice Mail: Employee Privacy and the Federal Wiretap Statute, 44 Am. U.L.Rev. 219 (1994). There, a student author observes:
While the distinction between the terms “intercept” and "access" has little significance for forms of communication that only exist as transmissions, and are never stored, the distinction is critical when a transmitted communication is later electronically stored, because it is at the time of storage that a communication becomes subject to different provisions of the ECPA. This is the case with both E-mail and voice mail messages, both of which have a transmission phase and a storage phase. During the transmission phase, any protection against unlawful interception ... is governed by§ 2511 [and § 2515]. On arrival in storage, the same messages are subject to § 2701. Thus, the same message is subject to differing standards of protection because it exists in a different statutorily defined medium.
Id. at 248 (emphasis added).
. The only cases involving wire communications that have adopted the narrow definition of "interception" have done so with little analysis and with seeming unawareness of § 2510(l)'s express inclusion of stored information within the meaning of "wire communication.”
See United States v. Moriarty,
Similarly, although the Turk case—in which the narrow definition of "intercept” first surfaced—involved wire communications, its interpretation of "intercept” is no longer of any real persuasive force because when Turk was decided in 1976, the statutory definition of "wire communication” did not yet include stored information. Congress’s amendment of § 2510(1) to include stored information occurred ten years later, in 1986. See Electronic Communications Privacy Act, Pub.L. No. 99-508, 100 Stat. 1848 (1986). Consequently, to the extent that Turk stands for a definition of "intercept” that necessarily entails contemporaneity, it has, at least in the context of wire communications, been statutorily overruled.
. Of course, that would not necessarily be the case if there were other portions of the Wiretap Act, § 2511 for instance, in which the "storage” element of the "wire communication” definition might remain viable. Every mention in the Act of "wire communication," however, refers in some manner or another to that communication’s ”intercept[ion].”
. Many dictionaries do not contain a definition for the word "-access" as a verb. Apparently, "access,” used as a verb, only came into being in the so-called "computer age.” See Fowler's Modem English Usage 13-14 (1996).
. Other sections of the Wiretap Act make similar reference to the communications themselves. See, e.g., 18 U.S.C. § 2511(l)(a).
. By its terms, § 2515's exclusionary rule "applies even to evidence obtained by entirely private conduct.”
Chandler v. United States,
. The "independent source” exception "operates to admit evidence that is actually found by legal means through sources unrelated to the illegal search.”
Ramirez-Sandoval,
Smith suggests that the evidence against him must be suppressed unless the government can show an "independent source” for its investigation. He is wrong. An "independent source” is a sufficient, but not a necessary, condition for admitting evidence that might. otherwise be deemed "fruit of the poisonous tree.” Smith's proposed "independent source” requirement would deny the "attenuated basis” exception of any independent bite whatsoever, and we therefore reject it.
. As often happens in the childhood game of "Telephone,” by the time the information contained in the message had been thrice recycled (through Dr. Phillips, Assistant United States Attorney Williams, and Special Agent Kelly), it had been watered down somewhat.
. We also refuse Smith’s invitation to reverse the district court’s rejection of his requests for a full evidentiary hearing on the taint issue. We review a district court’s decision whether to conduct an evidentiary hearing only for abuse of discretion.
See United States v. Sarno,
Smith complains on appeal that at the suppression hearing, "there was ... little evidence submitted of how the government actually conducted its investigation.” Instead, Smith contends, "the district court heard mostly legal arguments from both sides." In fact, however, the district court received what it described as "piles” of documentary evidence relating to the suppression issue. Moreover, Smith specifically stipulated to facts concerning the conduct of the government's investigation and declined the court’s offer to call any live witnesses; consequently, he has little room to complain about any perceived lack of fact development at the hearing.
It was only
after
the district court had denied his suppression motion that Smith requested a more extensive hearing. Testimony from live witnesses would have been largely cumulative of evidence that the court had already received. The district court did not abuse its discretion.
See United States v. Clay,
. The Supreme Court recently recognized a second type of insider trading liability: the so-called "misappropriation theory” of liability.
See United States v.
O'Hagan,-U.S. -,-,
. Indeed, tb do so would, as the SEC argues, "defy logic and experience.” After all, investors are concerned, perhaps above all else, with the future cash flows of the companies in which they invest. Surely, the average investor's interest would be piqued by a company's internal projections of economic downturn.
. PDA’s fiscal year ran from July to June, so that the fourth quarter comprised April, May, and June.
. The line between "soft” and "hard” information is not a bright one.
Compare,
e.g.,
In re VeriFone Sec. Litig.,
. See, e.g., 7 Louis Loss & Joel Seligman, Securities Regulation 3504-05 (3d ed.1991); 2 Alan R. Bromberg & Lewis D. Lowenfels, Securities Fraud & Commodities Fraud, § 7.4(600), at 7:159, 7:160.14 (1996); Allan Horwich, Possession Versus Use: Is There a Causation Element in the Prohibition on Insider Trading?, 52 Bus. Law. 1235 (1997).
. Our own decisions, although not addressing the causation issue specifically, also suggest that "use" is a required element of a Rule 10b-5 insider trading violation.
See, e.g., SEC v. Clark,
. In fact, a knowing-possession standard would, we think, go a long way toward making insider trading a strict liability crime. In view of the statutorily authorized ten-year prison sentence that may accompany an insider trading conviction,
see
15 U.S.C. § 78ff(a), any construction of Rule 10b-5 that de facto eliminates the mens rea requirement should be disfavored,
see United States v. United States Gypsum Co.,
. "An 'out-of-the-money' call option allows a person purchasing the option to buy stock during a limited period in the future at a fixed price (the 'strike price'). That price is higher than the current market price. Thus, the option holder essentially is betting that the market price will rise over the strike price within the limited time period. The time period limitations make such investments extremely speculative.”
United States v. Grossman,
. We express no view as to whether or not an Adler-type presumption may be employed in civil enforcement proceedings under Rule 10b-5.
. The fact that the district court added that the inside information need not be the “sole[ ]" cause of the trade alters neither our analysis nor our conclusion. It is sufficient, as the district court observed, that the material nonpublic information be a "significant factor” in the insider's decision to buy or sell. We hold simply that the government may not rest upon a demonstration that the suspected inside trader bought or sold while in possession of inside information; rather, it must, at a minimum, prove that the suspect used the information in formulating or consummating his trade.
