Title
by
Editor
 

Steve Jackson Games, Inc. v. U.S. Secret Service

36 F.3d 457 (5th Cir. 1994)

   
  Up Chapter 09 Title Page Title Page Email Listserve Email Listserve
     
 

[NOTE: This case has been edited for classroom use by the omission of text, citations, and footnotes. See this alternate source or this alternate source for the full opinion.]


U.S Circuit Judge Rhesa Hawkins Barksdale


The narrow issue before us is whether the seizure of a computer, used to operate an electronic bulletin board system, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, constitutes an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. § 2510, et seq., as amended by Title I of the Electronic Communications Privacy Act of 1986, Pub.L. No. 99-508, Title I, 100 Stat. 1848 (1986). We hold that it is not, and therefore AFFIRM.


I.

The district court's findings of fact are not in dispute. . . .

. . . .

The district court held that the Secret Service violated the Privacy Protection Act, and awarded actual damages of $51,040 to SJG; and that it violated Title II of the ECPA by seizing stored electronic communications without complying with the statutory provisions, and awarded the statutory damages of $1,000 to each of the individual appellants. And, it awarded appellants $195,000 in attorneys' fees and approximately $57,000 in costs. But, it held that the Secret Service did not "intercept" the E-mail in violation of Title I of the ECPA, 18 U.S.C. § 2511(1)(a), because its acquisition of the contents of the electronic communications was not contemporaneous with the transmission of those communications.


II.

As stated, the sole issue is a very narrow one: whether the seizure of a computer on which is stored private E-mail that has been sent to an electronic bulletin board, but not yet read (retrieved) by the recipients, constitutes an "intercept" proscribed by 18 U.S.C. § 2511(1)(a). Section 2511 was enacted in 1968 as part of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, often referred to as the Federal Wiretap Act. Prior to the 1986 amendment by Title I of the ECPA, it covered only wire and oral communications. Title I of the ECPA extended that coverage to electronic communications.n4 In relevant part, § 2511(1)(a) proscribes "intentionally intercept[ing] . . . any wire, oral, or electronic communication", unless the intercept is authorized by court order or by other exceptions not relevant here. Section 2520 authorizes, inter alia, persons whose electronic communications are intercepted in violation of § 2511 to bring a civil action against the interceptor for actual damages, or for statutory damages of $10,000 per violation or $100 per day of the violation, whichever is greater. 18 U.S.C. § 2520.

The Act defines "intercept" as "the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device." 18 U.S.C. § 2510(4). The district court, relying on our court's interpretation of intercept in United States v. Turk, 526 F.2d 654 (5th Cir. 1976), held that the Secret Service did not intercept the communications, because its acquisition of the contents of those communications was not contemporaneous with their transmission. In Turk, the government seized from a suspect's vehicle an audio tape of a prior conversation between the suspect and Turk. (Restated, when the conversation took place, it was not recorded contemporaneously by the government.) Our court held that replaying the previously recorded conversation was not an "intercept", because an intercept "require[s] participation by the one charged with an 'interception' in the contemporaneous acquisition of the communication through the use of the device". Id. at 658.

Appellants agree with Turk's holding, but contend that it is not applicable, because it "says nothing about government action that both acquires the communication prior to its delivery, and prevents that delivery." (Emphasis by appellants.) Along that line, appellants note correctly that Turk's interpretation of "intercept" predates the ECPA, and assert, in essence, that the information stored on the BBS could still be "intercepted" under the Act, even though it was not in transit. They maintain that to hold otherwise does violence to Congress' purpose in enacting the ECPA, to include providing protection for E-mail and bulletin boards. For the most part, appellants fail to even discuss the pertinent provisions of the Act, much less address their application. Instead, they point simply to Congress' intent in enacting the ECPA and appeal to logic (i.e., to seize something before it is received is to intercept it).

But, obviously, the language of the Act controls. . . .

. . . .

. . . "[W]ire communication" [] is defined by the Act as

any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like connection between the point of origin and the point of reception (including the use of such connection in a switching station) . . . and such term includes any electronic storage of such communication.
18 U.S.C. § 2510(1) (emphasis added). In contrast, as noted, an "electronic communication" is defined as "any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system . . . but does not include . . . any wire or oral communication. . . ." 18 U.S.C. § 2510(12) (emphasis added).

Critical to the issue before us is the fact that, unlike the definition of "wire communication", the definition of "electronic communication" does not include electronic storage of such communications. See 18 U.S.C. § 2510(12). See note 4, supra.n6 "Electronic storage" is defined as

(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication. . . .
18 U.S.C. § 2510(17) (emphasis added). The E-mail in issue was in "electronic storage". Congress' use of the word "transfer" in the definition of "electronic communication", and its omission in that definition of the phrase "any electronic storage of such communication" (part of the definition of "wire communication") reflects that Congress did not intend for "intercept" to apply to "electronic communications" when those communications are in "electronic storage".n7

We could stop here, because "[i]ndisputably, the goal of statutory construction is to ascertain legislative intent through the plain language of a statute--without looking to legislative history or other extraneous sources". Stone v. Caplan (Matter of Stone), 10 F.3d 285, 289 (5th Cir.1994). But, when interpreting a statute as complex as the Wiretap Act, which is famous (if not infamous) for its lack of clarity, we consider it appropriate to note the legislative history for confirmation of our understanding of Congress' intent.

As the district court noted, the ECPA's legislative history makes it crystal clear that Congress did not intend to change the definition of "intercept" as it existed at the time of the amendment. The Senate Report explains:

Section 101(a)(3) of the [ECPA] amends the definition of the term "intercept" in current section 2510(4) of title 18 to cover electronic communications. The definition of "intercept" under current law is retained with respect to wire and oral communications except that the term "or other" is inserted after "aural." This amendment clarifies that it is illegal to intercept the nonvoice portion of a wire communication. For example, it is illegal to intercept the data or digitized portion of a voice communication.
S.Rep. No. 99-541, 99th Cong., 2d Sess. 13 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3567.

Our conclusion is reinforced further by consideration of the fact that Title II of the ECPA clearly applies to the conduct of the Secret Service in this case. . . . Section 2701(a) provides:

Except as provided in subsection (c) of this section whoever--

(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or
(2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished. . . .
18 U.S.C. § 2701(a) (emphasis added).

As stated, the district court found that the Secret Service violated § 2701 . . . . The Secret Service does not challenge this ruling.

We find no indication in either the Act or its legislative history that Congress intended for conduct that is clearly prohibited by Title II to furnish the basis for a civil remedy under Title I as well. Indeed, there are persuasive indications that it had no such intention.

First, the substantive and procedural requirements for authorization to intercept electronic communications are quite different from those for accessing stored electronic communications. . . .

Second, other requirements applicable to the interception of electronic communications, such as those governing minimization, duration, and the types of crimes that may be investigated, are not imposed when the communications at issue are not in the process of being transmitted at the moment of seizure, but instead are in electronic storage. . . .

Obviously, when intercepting electronic communications, law enforcement officers cannot know in advance which, if any, of the intercepted communications will be relevant to the crime under investigation, and often will have to obtain access to the contents of the communications in order to make such a determination. Interception thus poses a significant risk that officers will obtain access to communications which have no relevance to the investigation they are conducting. That risk is present to a lesser degree, and can be controlled more easily, in the context of stored electronic communications, because, as the Secret Service advised the district court, technology exists by which relevant communications can be located without the necessity of reviewing the entire contents of all of the stored communications. For example, the Secret Service claimed (although the district court found otherwise) that it reviewed the private E-mail on the BBS by use of key word searches.

Next, as noted, court orders authorizing an intercept of electronic communications are subject to strict requirements as to duration. An intercept may not be authorized "for any period longer than is necessary to achieve the objective of the authorization, nor in any event longer than thirty days". 18 U.S.C. § 2518(5). There is no such requirement for access to stored communications.

Finally, as also noted, the limitations as to the types of crimes that may be investigated through an intercept, see 18 U.S.C. § 2516, have no counterpart in Title II of the ECPA.

In light of the substantial differences between the statutory procedures and requirements for obtaining authorization to intercept electronic communications, on the one hand, and to gain access to the contents of stored electronic communications, on the other, it is most unlikely that Congress intended to require law enforcement officers to satisfy the more stringent requirements for an intercept in order to gain access to the contents of stored electronic communications.

At oral argument, appellants contended (for the first time) that Title II's reference in § 2701(c) to § 2518 (which sets forth the procedures for the authorized interception of wire, oral, or electronic communications) reflects that Congress intended considerable overlap between Titles I and II of the ECPA. . . .

Appellants overemphasize the significance of this reference to § 2518. . . . Because § 2701 covers both stored wire and electronic communications, it was necessary in subsection (c) to refer to the different provisions authorizing access to each.


III.

For the foregoing reasons, the judgment is AFFIRMED.


   

 

FOOTNOTES

4 An "electronic communication" is defined as:

any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include--
(A) the radio portion of a cordless telephone communication that is transmitted between the cordless telephone handset and the base unit;
(B) any wire or oral communication;
(C) any communication made through a tone-only paging device; or
(D) any communication from a tracking device (as defined in section 3117 of this title). . . .
18 U.S.C. § 2510(12).

6 Wire and electronic communications are subject to different treatment under the Wiretap Act. The Act's exclusionary rule, 18 U.S.C. § 2515, applies to the interception of wire communications, including such communications in electronic storage, see 18 U.S.C. § 2510(1), but not to the interception of electronic communications. See 18 U.S.C. § 2518(10)(a). And, the types of crimes that may be investigated by means of surveillance directed at electronic communications, 18 U.S.C. § 2516(3) ("any federal felony"), are not as limited as those that may be investigated by means of surveillance directed at wire or oral communications. See 18 U.S.C. § 2516(1) (specifically listed felonies).

7 Stored wire communications are subject to different treatment than stored electronic communications. Generally, a search warrant, rather than a court order, is required to obtain access to the contents of a stored electronic communication. See 18 U.S.C. § 2703(a). But, compliance with the more stringent requirements of § 2518, including obtaining a court order, is necessary to obtain access to a stored wire communication, because § 2703 expressly applies only to stored electronic communications, not to stored wire communications.


     
Top Top of Page Up Chapter 09 Title Page Title Page
  Email Listserve Email Listserve
     
(C) 2001-03 Tom W. Bell. All rights reserved. Fully attributed noncommercial use of this document permitted if accompanied by this paragraph.
www.tomwbell.com/NetLaw/Ch09/SJGames2.html - v.2003.04.02