UNITED STATES v. DONOVAN ET AL.
No. 75-212
SUPREME COURT OF THE UNITED STATES
Argued October 13, 1976—Decided January 18, 1977
429 U.S. 413
Bernard A. Berkman argued the cause for respondents Merlo et al. With him on the brief was Joshua J. Kancelbaum.
MR. JUSTICE POWELL delivered the opinion of the Court.
This case presents issues concerning the construction of Title III of the Omnibus Crime Control and Safe Streets Act of 1968,
I
On November 28, 1972, a special agent of the Federal Bureau of Investigation applied to the United States District Court for the Northern District of Ohio for an order authorizing a wiretap interception in accordance with Title III.1 The application requested authorization to intercept
The District Court again authorized interception of gambling-related conversations for a maximum of 15 days.
On February 21, 1973, the Government submitted to the District Court a proposed order giving notice of the interceptions to 37 persons, a group which the Government apparently thought included all individuals who could be identified as having discussed gambling over the monitored telephones.6 The District Court signed the proposed order, and an inventory notice was served on the listed persons, including respondents Donovan, Buzzacco, and Robbins. On September 11, 1973, after the Government submitted the names of two additional persons whose identities allegedly had been omitted inadvertently from the initial list, the District Court entered an amended order giving notice to those individuals. As a result of what the Government labels “administrative oversight,” respondents Merlo and Lauer were not included in either list of names and were never served with inventory notice.7
On November 1, 1973, an indictment was returned in the United States District Court for the Northern District of Ohio charging Kotoch, Spaganlo, the five respondents, and 10 other individuals with conspiracy to conduct and conducting a gambling business in violation of
The Court of Appeals for the Sixth Circuit affirmed. 513 F. 2d 337 (1975).8 On the identification issue, the court held that the wiretap application must identify every person whose conversations relating to the subject criminal activity the Government has probable cause to believe it will intercept. Agreeing with the District Court that at the time of the December 26 application the Government had probable cause to believe that it would overhear Donovan, Robbins, and Buzzacco “committing the offense,” the Court of Appeals affirmed the suppression of evidence derived from
We granted certiorari to resolve these issues, which concern the construction of a major federal statute, 424 U. S. 907, and now reverse.
II
The United States contends that
A
We turn first to the identification requirements of
Whatever the merits of such a statutory scheme, we find little support for it in the language and structure of Title III or in the legislative history. The statutory language itself refers only to “the person, if known, committing the
S. 917 combined the major provisions of S. 675 and S. 2050 and eventually was enacted. While it was pending before the Senate Judiciary Committee, this Court decided Katz v. United States, 389 U. S. 347 (1967). S. 917 was then redrafted to conform to Katz as well as Berger, and the identification provision was added at that time. The Senate Report states that the requirements set forth in the vari-
B
The other statutory provision at issue in this case is
Our reading of the legislative history of the discretionary notice provision in light of the purposes of Title III leads us to reject the Government‘s interpretation. As reported from the Judiciary Committee,
“The amendment would give the judge who issued the order discretion to require notice to be served on other parties to intercepted communications, even though such
parties are not specifically named in the court order. The Berger and Katz decisions established that notice of surveillance is a constitutional requirement of any surveillance statute. It may be that the required notice must be served on all parties to intercepted communications. Since legitimate interests of privacy may make such notice to all parties undesirable, the amendment leaves the final determination to the judge.” 114 Cong. Rec. 14485-14486 (1968).20
In deciding whether legitimate privacy interests justify withholding inventory notice from parties to intercepted conversations, a judge is likely to require information and assistance beyond that contained in the application papers and the recordings of intercepted conversations made available by law enforcement authorities. No purpose is served by holding that those authorities have no routine duty to supply the judge with relevant information. The Court of Appeals for the Ninth Circuit recently confronted this problem of dual responsibility, and we adopt the balanced construction that court placed on
“To dischargе this obligation the judicial officer must have, at a minimum, knowledge of the particular categories into which fall all the individuals whose conver-
sations have been intercepted. Thus, while precise identification of each party to an intercepted communication is not required, a description of the general class, or classes, which they comprise is essential to enable the judge to determine whether additional information is necessary for a proper evaluation of the interests of the various parties. Furthermore, although the judicial officer has the duty to cause the filing of the inventory [notice], it is abundantly clear that the prosecution has greater access to and familiarity with the intercepted communications. Therefore we feel justified in imposing upon the latter the duty to classify all those whose conversations have been intercepted, and to transmit this information to the judge. Should the judge desire more information regarding these classes in order to exercise his [statutory] § 2518 (8) (d) discretion, ... the government is [also] required to furnish such information as is available to it.” United States v. Chun, 503 F. 2d 533, 540 (1974). (Footnote omitted.)
We agree with the Ninth Circuit that this allocation of responsibility best serves the purposes of Title III.21
Currently, the policy of the Justice Department is to provide the issuing judge with the name of every person who has been overheard as to whom there is any reasonable possibility of indictment. Brief for United States 39. Because it fails to assure that the necessary range of infor-
III
We turn now to the question whether the District Court properly suppressed evidence derived from the wiretaps at issue solely because of the failure of the law enforcement authorities to comply fully with the provisions of
“(i) the communication was unlawfully intercepted;
“(ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or
“(iii) the interception was not made in conformity with the order of authorization or аpproval.”
There is no basis on the facts of this case to suggest that the authorization orders are facially insufficient, or that the interception was not conducted in conformity with the orders. Thus, only
Giordano concerned the provision in Title III requiring that an application for an intercept order be approved by the Attorney General or an Assistant Attorney General specially designated by the Attorney General. Concluding that Congress intended to condition the use of wiretap procedures on the judgment of senior officials in the Department of Justice, the Court required suppression for failure to comply with the approval provision. Chavez concerned the statutory requirement that the application for an intercept order specify the identity of the official authorizing the application. The problem in Chavez was one of misidentification; although the application had in fact been authorized by the Attorney General, the application erroneously identified an Assistant Attorney General as the official authorizing the application. The Court concluded that mere misidentification of the official authorizing the application did not make the application unlawful within the meaning of
In the instant case, the Court of Appeals concluded that both the identification requirement of
A
This case is unlike Giordano, where failure to satisfy the statutory requirement of prior approval by specified Justice Department officials bypassed a congressionally imposed limitation on the use of the intercept procedure. The Court there noted that it was reasonable to believe that requiring prior approval from senior officials in the Justice Department “would inevitably foreclose resort to wiretapping in various situations where investigative personnel would otherwise seek intercept authority from the court
B
We reach the same conclusion with respect to the Government‘s duty to inform the judge of all identifiable persons whose conversations were intercepted. As noted earlier, the version of Title III that emerged from the Senate Judiciary Committee provided only for mandatory notice to the “persons named in the order or the application.” The Senate Report detailed the purpose of that provision:
“[T]he intent of the provision is that the principle of postuse notice will be retained. This provision alone should insure the community that the techniques are reasonably employed. Through its operation all authorized interceptions must eventually become known at least to the subject. He can then seek appropriate civil redress, for example, under seсtion 2520 . . . if he feels that his privacy has been unlawfully invaded.” S. Rep. No. 1097, 90th Cong., 2d Sess., 105 (1968).
The floor discussion concerning the amendment adding the provision for discretionary notice merely indicates an intent to provide notice to such additional persons as may be constitutionally required.
Nothing in the structure of the Act or this legislative history suggests that incriminating conversations are “unlawfully intercepted” whenever parties to those conversations do not receive discretionary inventory notice as a result of the Government‘s failure to inform the District Court of their identities. At the time inventory notice was served on the other identifiable persons, the intercept had been completed and the conversations had been “seized” under a valid intercept order. The fact that discretionary notice reached
The legislative history indicates that postintercept notice was designed instead to assure the community that the wiretap technique is reasonably employed. But even recognizing that Congress placed considerable emphasis on that aspect of the overall statutory scheme, we do not think that postintercept notice was intended to serve as an independent restraint on resort to the wiretap procedure.
IV
Although the Government was required to identify respondents Donovan, Robbins, and Buzzacco in the December 26 application for an extension of the initial intercept, failure to do so in the circumstances here presented did not warrant suppression under
It is so ordered.
MR. CHIEF JUSTICE BURGER, concurring in part and concurring in the judgment.
I concur in the Court‘s judgment and in all except Part II-A of the Court‘s opinion. I cannot agree, however, with the Court‘s construction of the identification provisions of
Respondents Donovan, Robbins, and Buzzacco contend that, since their names were not contained in the wiretap application, suppression is required under the express exclusionary provision of Title III,
“The amendment would permit intercepted communications to be used in evidence only against the persons named in the court order, not against other persons.” Ibid. (Emphasis supplied.)
Consistent with the Justice Department‘s recommendation, the Senate rejected the result which respondents now seek.
Even if the legislative history were silent with respeсt to suppression, however, I would nonetheless take issue with the Court‘s analysis of the identification requirement. In my view, Congress required no more than that a wiretap application identify by name the primary user of the monitored facility.
Congress drafted this statute with exacting precision. As its principal sponsor, Senator McClellan, put it:
“[A] bill as controversial as this . . . requires close attention to the dotting of every ‘i’ and the crossing of every ‘t’ . . . .” Id., at 14751.
Under these circumstances, the exact words of the statute provide the surest guide to determining Congress’ intent, and we would do well to confine ourselves to that area. The statutory provision before us requires the wiretap application to specify the “identity of the person, if known, committing the offense and whose communications are to be intercepted.”
The Court emphasizes, however, that the statute expressly recognizes that more than one person may be named in a wiretap application. Ante, at 425. That is indeed true. See
Assuming that plain words of a statute might have to bow, in some circumstances, to compelling legislative history to the contrary, nothing of that kind is found here. As the Court observes, the earlier bills introduced in the Senate contained no identification provision at all. After Berger and Katz v. United States, 389 U. S. 347 (1967), were decided, the requirement was added in what was plainly an abundance of caution. For this Court in Berger flatly discounted any value in New York‘s broad identification requirement.
“It is true that the statute requires the naming of ‘the person or persons whose communications, conversations or discussions are to be overheard or recorded . . . .’ But this does no more than identify the person whose constitutionally protected area is to be invaded rather than ‘particularly describing’ the communications, conversations, or discussions to be seized.” 388 U. S., at 59. (Emphasis supplied.)
As shown by its rejection of the proposed suppression provision—which obviously would have had the practical effect of increasing the number of persons identified in wiretap applications—Congress correctly perceived little value in multiplying indefinitely the number of names to be set forth in wiretap applications and оrders. This is particularly true since no Fourth Amendment values are served by a sweeping identification requirement. The Court has made clear:
“The Fourth Amendment requires a warrant to describe only ‘the place to be searched, and the persons or things to be seized,’ not the persons from whom things will be seized.” United States v. Kahn, 415 U. S. 143, 155 n. 15 (1974). (Emphasis supplied.)
Hence, the statute, as it presently stands, comports entirely with Fourth Amendment requirements, and thus achieves the
In short, the Court has redrafted a statute passed by Congress to make it identical to a statutory provision found valueless by this Court a few years ago in the Berger case. This undertaking, unfortunately, is not entirely without consequence, notwithstanding the Court‘s refusal to approve suppression of the evidence here. Among other things, federal officers are potentiаlly subject to a civil damages action, with compensatory damages of not less than $1,000, plus punitive damages, plus reasonable attorneys’ fees.2 Nor is this federal remedy exclusive. State-provided damages remedies are not pre-empted. S. Rep. No. 1097, 90th Cong., 2d Sess., 107 (1968). Damages awards aside, the Court‘s opinion—albeit in dictum—hints that suppression may indeed be in the offing if an intentional “violation” is shown. Finally, district judges will now be put to the task, at least in some cases, of determining whether probable cause exists with respect to each person listed in the application.
MR. JUSTICE MARSHALL, with whom MR. JUSTICE BRENNAN joins, dissenting in part.
The Court today holds that an application for a warrant to authorize a wiretap under Title III of the Omnibus Crime Control and Safe Streets Act of 1968,
I continue to adhere to the position, expressed for four Members of the Court by Mr. Justice Douglas in his dissent in United States v. Chavez, 416 U.S. 562, 584-585 (1974), that Title III does not authorize “the courts to pick and choose among various statutory provisions, suppressing evidence only when they determine that a provision is ‘substantive,’ ‘central,’ or ‘directly and substantially’ related to the congressional scheme.” The Court has rejected that argument, however, see United States v. Chavez, supra; United States v. Giordano, 416 U. S. 505 (1974), and nothing is to be gained by renewing it here. But even under the standard set forth
I
Title III requires that an application for a warrant to authorize wiretapping disclose “the identity of the person, if known, committing the offense and whose communications are to be intercepted.”
“the fact that identification of an individual in an application for an intercept order triggers other statutory provisions. First, § 2518 (1) (e) requires an intercept application to disclose all previous applications ‘involving any of the same persons . . . specified in the application.’ . . . Second, § 2518 (8) (d) mandates that an inventory notice be served upon ‘the persons named in the order or the application.‘” Ante, at 425 n. 14 (emphasis added).
Yet in determining whether the identification requirement “directly and substantially implement[s] the congressional intention to limit the use of intercept procedures,” United States v. Giordano, supra, at 527, or plays a “substantive role” in the “regulatory system” established by Congress, United States v. Chavez, supra; at 578, the Court ignores the requirement‘s function as a statutory “trigger.” In its analysis, the Court focuses solely on whether a list of ad-
The Court‘s reasoning is doubly flawed. First, a judge is not required to issue a warrant if the prerequisites of
It is true, as the Court notes, ante, at 436 n. 23,5 that there is no allegation in this case that had the District Court been informed that the Government expected to overhear respondents Donovan, Buzzacco, and Robbins discussing illegal gambling activities it would not have issued a warrant. But that fact is irrelevant to an analysis of the role of the naming requirement in the regulatory system established by Congress. In Giordano, the Court rejected the argument that the Attorney General‘s failure to authorize the application for a warrant could be disregarded because the Attorney General had later ratified the application, thus demonstrating that he would have approved it originally. 416 U. S., at 523-524, n. 12. The important consideration was whether the requirement of high-level authorization was designed to play an important role, not whether it would have mattered in the particular case. The same analysis should be used here.
Thus, I conclude that the naming requirement recognized by the majority does play a “substantive role” in the system designed by Congress to limit the use of electronic surveillance. Failure to comply with that requirement, therefore, should lead to suppression on the ground that “the communication was unlawfully intercepted.”
II
The Court‘s discussion of the consequences of the Government‘s failure to comply with the notice provision of
Again, the Court takes too narrow a view of the provision at issue, ignoring its place in the system Congress has created to restrain wiretapping. That system involves not only direct
“Injunctive relief, with its attendant discovery proceedings, is not intended to be available . . . . It is expected that civil suits, if any, will instead grow out of the filing of inventories under section 2518 (8) (d).” S. Rep. No. 1097, 90th Cong., 2d Sess., 107 (1968). See also id., at 105.
The Court‘s conclusion that the notice provision is not central dismantles this carefully designed congressional structure.
III
The Court‘s opinion implies that if the violations of Title III considered here had been intentional, the result would be different. Ante, at 436 n. 23, 439 n. 26. This must be so, for surely this Court would not tolerate thе Government‘s intentional disregard of duties imposed on it by Congress. I also assume that if the Government fails to establish procedures which offer reasonable assurance that it will strictly adhere to the statutory requirements, see ante, at 439-440, resulting failures to comply will be recognized as intentional. There is, therefore, reason to hope that the Court‘s admonition that the Government should obey the law will have some effect in the future.
But that hope is a poor substitute for certainty that the Government will make every effort to fulfill its responsibilities under Title III. We can obtain that certainty only by according full recognition to the role of the naming and notice
MR. JUSTICE STEVENS, concurring in part and dissenting in part.
For the reasons stated in Parts I and II of MR. JUSTICE MARSHALL‘S opinion, I respectfully dissent from Parts III and IV of the Court‘s opinion. I join Parts I and II of the Court‘s opinion.
Notes
“(1) Each application for an order authorizing or approving the interception of a wire or oral communication shall be made in writing upon oath or affirmation to a judge of competent jurisdiction and shall state the applicant‘s authority to make such application. Each application shall include the following information:
“(a) the identity of the investigative or law enforcement officer making the apрlication, and the officer authorizing the application;
“(b) a full and complete statement of the facts and circumstances relied upon by the applicant, to justify his belief that an order should be issued, including (i) details as to the particular offense that has been, is being, or is about to be committed, (ii) a particular description of the nature and location of the facilities from which or the place where the communication is to be intercepted, (iii) a particular description of the type of communications sought to be intercepted, (iv) the identity of the person, if known, committing the offense and whose communications are to be intercepted;
“(c) a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous;
“(d) a statement of the period of time for which the interception is required to be maintained. If the nature of the investigation is such that the authorization for interception should not automatically terminate when the described type of communication has been first obtained, a particular description of facts establishing probable cause to believe that additional communications of the same type will occur thereafter;
“(e) a full and complete statement of the facts concerning all previous applications known to the individual authorizing and making the application, made to any judge for authorization to intercept, or for approval of interceptions of, wire or oral communications involving any of the same persons, facilities or places specified in the application, and the action taken by the judge on each such application; and
“(f) where the application is for the extension of an order, a statement setting forth the results thus far obtained from the interception, or a reasonable explanation of the failure to obtain such results.”
The issuing judge is free to require the applicant to furnish additional information.
“(3) Upon such application the judge may enter an ex parte order, as requested or as modified, authorizing or approving interception of wire or oral communications within the territorial jurisdiction of the court in which the judge is sitting, if the judge determines on the basis of the facts submitted by the applicant that—
“(a) there is probable cause for belief that an individual is committing, has committed, or is about to commit a particular offense enumerated in
“(b) there is probable cause for belief that particular communications concerning that offense will be obtained through such interception;
“(c) normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous;
“(d) there is probable cause for belief that the facilities from which, or the place where, the wire or oral communications are to be intercepted are being used, or are about to be used, in connection with the commission of such offense, or are leased to, listed in the name of, or commonly used by such person.
“(4) Each order authorizing or approving the interception of any wire or oral communication shall specify—
“(a) the identity of the person, if known, whose communications are to be intercepted;
“(b) the nature and location of the communications facilities as to which, or the place where, authority to intercept is granted;
“(c) a particular description of the type of communication sought to be intercepted, and a statement of the particular offense to which it relates;
“(d) the identity of the agency authorized to intercept the communications, and of the person authorizing the application; and
“(e) the period of time during which such interception is authorized, including a statement as to whether or not the interception shall automatically terminate when the described communication has been first obtained.”
Cf. United States v. Bellosi, 163 U. S. App. D. C. 273, 501 F. 2d 833 (1974).Title III also authorizes the District Court to cause an inventory notice to be served on “other parties to intercepted communications” if the judge determines that such notice is in the interest of justice. Ibid. Those other parties may also be given access to the intercepted communications, the applications, and the orders. Ibid.
See Part II, infra.“(10) (a) Any aggrieved person in any trial, hearing, or proceeding in or before any court, department, officer, agency, regulatory body, or other authority of the United States, a State, or a political subdivision thereof, may move to suppress the contents of any intercepted wire or oral communication, or evidence derived therefrom, on the grounds that—
“(i) the communication was unlawfully intercepted;
“(ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or
“(iii) the interception was not made in conformity with the order of authorization or approval.”
A number of these courts have concluded, and respondents Donovan, Robbins, and Buzzacco argue, that our decision in United States v. Kahn, 415 U. S. 143 (1974), resolved this identification issue. See United States v. Chiarizio, supra; United States v. Moore, supra. Although there is language in Kahn suggesting that wiretap applications must identify all such individuals, the identification question presented here was not before us in Kahn. The question in that case was whether a wiretap application had to identify a known user of the target telephone whose com-
“A, a businessman, talks with his customers, and the latter are served with papers showing that A is being bugged .... [T]he damage to confidence in A and to A‘s reputation in general may damage A unjustly. In this case it would seem that the customers should not be served with the inventory.” 114 Cong. Rec. 14476 (1968).
“Perhaps the approach of the Court of Appeals for the Ninth Circuit, which suggested that rather than submitting specific names we should submit categories of persons who had been overheard, is a better policy, would be more helpful to the district court in exercising its discretion, and we would have no objection to following any reasonable policy that the district courts determine would be useful to them in this area.” Tr. of Oral Arg. 6-7.
