RECOMMENDED FOR FULL-TEXT PUBLICATION
Pursuant to Sixth Circuit Rule 206
File Name: 08a0252p.06
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
_________________
X
Plaintiff-Appellee, -
STEVEN WARSHAK,
-
-
-
No. 06-4092
v.
,
>
UNITED STATES OF AMERICA, -
Defendant-Appellant. -
N
Appeal from the United States District Court
for the Southern District of Ohio at Cincinnati.
No. 06-00357—Susan J. Dlott, District Judge.
Argued: December 5, 2007
Decided and Filed: July 11, 2008
Before: BOGGS, Chief Judge; MARTIN, BATCHELDER, DAUGHTREY, MOORE, COLE,
CLAY, GILMAN, GIBBONS, ROGERS, SUTTON, COOK, McKEAGUE, and GRIFFIN,
Circuit Judges.
_________________
COUNSEL
ARGUED: Steven L. Lane, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C.,
for Appellant. Martin G. Weinberg, LAW OFFICES, Boston, Massachusetts, for Appellee.
ON BRIEF: Steven L. Lane, Nathan P. Judish, John H. Zacharia, UNITED STATES
DEPARTMENT OF JUSTICE, Washington, D.C., Benjamin C. Glassman, Donetta D. Wiethe,
ASSISTANT UNITED STATES ATTORNEYS, Cincinnati, Ohio, for Appellant. Martin G.
Weinberg, LAW OFFICES, Boston, Massachusetts, Martin Stanley Pinales, SIRKIN, PINALES &
SCHWARTZ, Cincinnati, Ohio, for Appellee. Kevin S. Bankston, ELECTRONIC FRONTIER
FOUNDATION, San Francisco, California, Patricia L. Bellia, NOTRE DAME LAW SCHOOL,
Notre Dame, Indiana, Susan A. Freiwald, UNIVERSITY OF SAN FRANCISCO SCHOOL OF
LAW, San Francisco, California, for Amici Curiae.
SUTTON, J., delivered the opinion of the court, in which BOGGS, C. J., BATCHELDER,
GILMAN, GIBBONS, ROGERS, COOK, McKEAGUE, and GRIFFIN, JJ., joined. MARTIN, J.
(pp. 12-15), delivered a separate dissenting opinion in which DAUGHTREY, MOORE, COLE, and
CLAY, JJ., joined.
1
No. 06-4092 Warshak v. United States Page 2
_________________
OPINION
_________________
SUTTON, Circuit Judge. Since 1986, Title II of the Electronic Communications Privacy Act
of 1986, Pub. L. No. 99-508, § 201, 100 Stat. 1848, codified as amended at 18 U.S.C.
§§ 2701–2711, commonly referred to as the Stored Communications Act, has authorized the federal
government to require internet service providers to disclose the contents of “electronic
communication[s]” of their customers in certain circumstances, including by way of an ex parte
court order. Id. § 2703(d). The government obtained two such orders in 2005 to search Steven
Warshak’s e-mails. When Warshak learned about the orders, roughly a year later, he filed a
declaratory judgment action, seeking to invalidate § 2703(d) under the Fourth Amendment, and he
moved for a preliminary injunction, seeking to enjoin the government from conducting further ex
parte e-mail searches. The district court granted the motion and enjoined the government from
using § 2703(d) to seize the contents of “any personal email account[]” belonging to Warshak or
“any resident of the Southern District of Ohio” without “prior notice and an opportunity to be
heard.” JA 129. We vacate the preliminary injunction because Warshak’s constitutional claim is
not ripe for judicial resolution.
I.
A.
The Stored Communications Act prohibits unauthorized access to certain electronic
communications, see 18 U.S.C. § 2701, and places restrictions on a service provider’s disclosure of
certain communications, see id. § 2702. It also permits a “governmental entity” to compel a service
provider to disclose the contents of communications in certain circumstances. See id. § 2703.
Three relevant definitions bear on the meaning of the compelled-disclosure provisions of the
Act. “[E]lectronic communication service[s]” permit “users . . . to send or receive wire or electronic
communications,” id. § 2510(15), a definition that covers basic e-mail services, see Patricia L. Bellia
et al., Cyberlaw: Problems of Policy and Jurisprudence in the Information Age 584 (2d ed. 2004).
“[E]lectronic storage” is “any temporary, intermediate storage of a wire or electronic
communication . . . and . . . any storage of such communication by an electronic communication
service for purposes of backup protection of such communication.” 18 U.S.C. § 2510(17).
“[R]emote computing service[s]” provide “computer storage or processing services” to customers,
id. § 2711(2), and are designed for longer-term storage, see Orin S. Kerr, A User’s Guide to the
Stored Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev. 1208,
1216 (2004).
The compelled-disclosure provisions give different levels of privacy protection based on
whether the e-mail is held with an electronic communication service or a remote computing service
and based on how long the e-mail has been in electronic storage. The government may obtain the
contents of e-mails that are “in electronic storage” with an electronic communication service for 180
days or less “only pursuant to a warrant.” 18 U.S.C. § 2703(a). The government has three options
for obtaining communications stored with a remote computing service and communications that
have been in electronic storage with an electronic service provider for more than 180 days: (1)
obtain a warrant; (2) use an administrative subpoena; or (3) obtain a court order under § 2703(d).
Id. § 2703(a), (b).
Under § 2703(d), the provision at issue in this case, “a court of competent jurisdiction” may
issue an order based on “specific and articulable facts showing that there are reasonable grounds to
believe that the contents of a wire or electronic communication, or the records or other information
No. 06-4092 Warshak v. United States Page 3
sought, are relevant and material to an ongoing criminal investigation.” Id. § 2703(d). Although
the statute generally requires the government to give the user prior notice of the disclosure unless
it obtains a warrant, it contains an exception, id. § 2703(b)(1)(B), which says the government may
delay notice in 90-day increments, id. § 2705(a)(4), if notification would result in “(A) endangering
the life or physical safety of an individual; (B) flight from prosecution; (C) destruction of or
tampering with evidence; (D) intimidation of potential witnesses; or (E) otherwise seriously
jeopardizing an investigation or unduly delaying a trial,” id. § 2705(a)(2); see also id. § 2705(b)
(authorizing the government to seek a court order preventing the service provider from disclosing
the subpoena if the same conditions are met).
B.
Warshak is the president and sole owner of Berkeley Premium Nutraceuticals, Inc., which
became the target of an investigation into “mail and wire fraud, money laundering, and other federal
offenses” based on its “nationwide marketing, distribution, and sale of products.” JA 47, 50. The
government sought permission from a magistrate judge to require Warshak’s internet service
providers—NuVox Communications and Yahoo!—to turn over Warshak’s account information,
“[a]ll [l]og files and backup tapes” and the contents of e-mails that had been “accessed, viewed, or
downloaded” or that were more than 181 days old. JA 49, 52.
On May 6, 2005, and again on September 12, 2005, the magistrate judge granted the
applications under § 2703(d) of the Act. As required, the orders were based on “specific and
articulable facts showing that there [were] reasonable grounds to believe that the records or other
information sought [were] relevant and material to an ongoing criminal investigation.” JA 48, 51;
see 18 U.S.C. § 2703(d). As permitted, the orders did not give Warshak immediate notice of the
disclosures. 18 U.S.C. § 2703(b)(1)(B). Concluding that notice to Warshak “would seriously
jeopardize the investigation,” the magistrate judge ordered the government to delay notice for 90
days and mandated that the “[o]rder[s] [be] sealed until otherwise ordered by the Court.” JA 48, 51;
see 18 U.S.C. §§ 2703(b)(1)(B), 2705(a).
On May 31, 2006, roughly a year after the court issued the first § 2703(d) order, the
government gave Warshak notice of the orders. In response, he sued the government on June 12,
seeking declaratory and injunctive relief. Among other complaints, Warshak alleged that § 2703(d)
violated the Fourth Amendment on its face and as applied because the searches were based on a
showing of less than probable cause and were not supported by a warrant.
On June 30, Warshak filed a motion for a preliminary injunction. The court granted the
motion and enjoined the government from using § 2703(d) to search “the contents of any personal
email account maintained by an [ISP] in the name of any resident of the Southern District of Ohio”
without providing the user “prior notice and an opportunity to be heard.” JA 130. The court
reasoned that Warshak likely would succeed on his Fourth Amendment claim because internet users
have a reasonable expectation of privacy in e-mails, and because the orders authorized warrantless
searches on less than probable cause. The court also concluded that Warshak faced imminent harm
based on the two prior orders and the government’s refusal to pledge not to seek additional orders
in the future. The court enjoined the government from enforcing § 2703(d) or related sections of
the Act (sections 2703(b)(1)(B)(ii) and 2705) to the extent that they “authorize the ex parte issuance
of search and seizure orders without a warrant and on less than a showing of probable cause.” JA
129. While the court relied “in part” on the “threat of irreparable injury” to Warshak, it explained
that “the constitutional flaws . . . are facial in nature.” Id.
On September 20, 2006, a federal grand jury indicted Warshak for bank fraud, mail fraud and
money laundering, among other federal crimes. See Indictment, United States v. Warshak, No. 1:06-
No. 06-4092 Warshak v. United States Page 4
cr-00111 (S.D. Ohio Sept. 20, 2006). On February 22, 2008, a jury convicted him on 93 counts.
See Jury Verdict as to Steven E. Warshak, Warshak, No. 1:06-cr-00111 (S.D. Ohio Feb. 22, 2008).
II.
The Constitution does not extend the “judicial Power” to any legal question, wherever and
however presented, but only to those legal questions presented in “Cases” and “Controversies.” U.S.
Const. art. III, § 2. A claim is not “amenable to . . . the judicial process,” Steel Co. v. Citizens for
a Better Env’t, 523 U.S. 83, 102 (1998), when it is filed too early (making it unripe), when it is filed
too late (making it moot) or when the claimant lacks a sufficiently concrete and redressable interest
in the dispute (depriving the plaintiff of standing). This case implicates at least two of these
doctrines today, ripeness and standing, both of which “unquestionably . . . overlap,” Airline Prof’ls
Ass’n of the Int’l Bhd. of Teamsters v. Airborne, Inc., 332 F.3d 983, 988 (6th Cir. 2003), and at some
point could well implicate the third (mootness) in view of the motion to suppress that Warshak filed
in his criminal case. As there is no obligation to favor one of these justiciability doctrines over the
other and as none of these questions goes to the merits of the case, we may address them in any
sequence we wish. See Arizonans for Official English v. Arizona, 520 U.S. 43, 66–67 (1997). We
start—and end—with ripeness.
Like standing, ripeness “is drawn both from Article III limitations on judicial power and
from prudential reasons for refusing to exercise jurisdiction.” Nat’l Park Hospitality Ass’n v. Dep’t
of Interior, 538 U.S. 803, 808 (2003) (internal quotation marks omitted). The ripeness doctrine
serves to “avoid[] . . . premature adjudication” of legal questions and to prevent courts from
“entangling themselves in abstract” debates that may turn out differently in different settings. Id.
at 807. In ascertaining whether a claim is ripe for judicial resolution, we ask two basic questions:
(1) is the claim “fit[] . . . for judicial decision” in the sense that it arises in a concrete factual context
and concerns a dispute that is likely to come to pass? and (2) what is “the hardship to the parties of
withholding court consideration”? Abbott Labs. v. Gardner, 387 U.S. 136, 149 (1967); see also
Ammex, Inc. v. Cox, 351 F.3d 697, 706 (6th Cir. 2003); Adult Video Ass’n v. U.S. Dept. of Justice,
71 F.3d 563, 568 (6th Cir. 1995).
A.
There are several reasons why this claim is not “fit” for judicial review. To start, we have
no idea whether the government will conduct an ex parte search of Warshak’s e-mail account in the
future and plenty of reason to doubt that it will, making this a claim that depends on “contingent
future events that may not occur as anticipated, or indeed may not occur at all.” Texas v. United
States, 523 U.S. 296, 300 (1998) (internal quotation marks omitted). Answering difficult legal
questions before they arise and before the courts know how they will arise is not the way we
typically handle constitutional litigation. See Lujan v. Nat’l Wildlife Fed’n, 497 U.S. 871, 894
(1990).
Past is precedent, Warshak responds: Government agents have conducted two ex parte
searches of his e-mails before, so it is fair to assume they will do so again. Making that prospect
more likely, he adds, is the government’s reluctance to promise not to search Warshak’s e-mail
accounts in the future. But this position overlooks a central feature of the statute. Searches under
the statute generally require what Warshak demands: “prior notice.” 18 U.S.C. § 2703(b)(1)(B).
In conducting its previous searches of Warshak’s e-mails, the government obtained judicial
permission to delay notice to Warshak on the ground that disclosure would “seriously jeopardiz[e]
[the] investigation.” Id. § 2705(a)(2)(E). That possibility no longer exists. Warshak has ample
notice of the investigation—indeed notice of the worst sort: He has been indicted (and now
convicted). The question, as framed by the complaint, is not whether the government will conduct
another search of Warshak’s e-mails; it is whether the government will conduct another ex parte
No. 06-4092 Warshak v. United States Page 5
search of his e-mails, a possibility that is exceedingly remote given that the reason the government
kept these searches confidential—that they would jeopardize the ongoing investigation—no longer
exists. It is within the realm of possibility, we suppose, that a new investigation could commence
or that some other reason for delaying notice could arise, such as the need to avoid “endangering the
life or physical safety of an individual; . . . flight from prosecution; . . . destruction of or tampering
with evidence; . . . intimidation of potential witnesses; or . . . unduly delaying a trial.” Id.
§ 2705(a)(2)(A)–(E). But these possibilities are just that—possibilities (and remote possibilities at
that)—making it eminently unpredictable whether, when or why the government would seek judicial
permission to conduct another ex parte search of Warshak’s e-mails.
Not only do “we have no idea whether or when” such a search will occur but we also “have
no idea” what e-mail accounts, or what types of e-mail accounts, the government might investigate.
Toilet Goods Ass’n, Inc. v. Gardner, 387 U.S. 158, 163 (1967). That uncertainty looms large in a
debate about the expectations of privacy in e-mail accounts. The underlying merits issue in the case
is this: In permitting the government to search e-mails based on “reasonable grounds,” is § 2703(d)
consistent with the Fourth Amendment, which generally requires “probable cause” and a warrant
in the context of searches of individuals, homes and, perhaps most analogously, posted mail? The
answer to that question will turn in part on the expectations of privacy that computer users have in
their e-mails—an inquiry that may well shift over time, that assuredly shifts from internet-service
agreement to internet-service agreement and that requires considerable knowledge about ever-
evolving technologies. Because “[t]he task of generating balanced and nuanced rules” in this area
“requires a comprehensive understanding of technological facts,” Orin S. Kerr, The Fourth
Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L.
Rev. 801, 875 (2004), Warshak’s claim epitomizes the kind of dispute that would profit from “a
concrete factual context,” Ammex, 351 F.3d at 706.
Think of just one of these moving parts—the variety of internet-service agreements and the
differing expectations of privacy that come with them. An agreement might say that a service
provider will “not . . . read or disclose subscribers’ e-mail to anyone except authorized users.”
United States v. Maxwell, 45 M.J. 406, 417 (C.A.A.F. 1996) (describing testimony about AOL’s
then-existing policy). An agreement might say that a service provider “will not intentionally
monitor or disclose any private email message” but that it “reserve[s] the right” to do so in some
cases. See Privacy Statement for Juno Members, http://www.juno.com/legal/privacy.html (last
visited July 7, 2008). An agreement might say that a service provider “may or may not pre-screen
Content, but . . . shall have the right (but not the obligation) in [its] sole discretion to pre-screen,
refuse or move any Content that is available via the Service”—as indeed Warshak’s Yahoo! account
did. JA 89, 163 n.3. An agreement might say that e-mails will be provided to the government on
request—as indeed the same Yahoo! account did. An agreement might say that other individuals,
besides the recipient of the e-mail, will have access to it and will be entitled to use the information
in it. See, e.g., JA 208 (explaining that Gmail, a service provided by Google, gives users “an
enormous amount of storage capacity . . . in exchange for . . . terms of service which say that Google
is allowed . . . [to] take a look at the content of [users’] e-mail and . . . target advertising at [users]
accordingly”). Or an agreement might say that the user has no expectation of privacy in any of her
communications. See, e.g., JA 207 (government counsel explaining that “every day when we log
into our e-mail account, we agree that we have no expectation of privacy in the account”).
Some of these service-provider agreements could cast doubt on the validity of § 2703(d) in
a given case; others might not. Better, we think, to decide the validity of the statute in the context
of a specific internet-service agreement and a specific search and seizure.
Nor can we rely on previous government searches of Warshak’s e-mails to hypothesize the
factual context of the next search. Even if the record contained the full text of the NuVox and
Yahoo! service-provider agreements (it does not; it contains just part of the Yahoo! agreement), we
No. 06-4092 Warshak v. United States Page 6
would run into a similar conjecture problem. Just as there is little basis for assuming the government
will conduct another ex parte search of Warshak’s e-mails, there is little basis for assuming any
future search will concern e-mails facilitated by these service providers, as opposed to e-mails
facilitated by other service providers. In view of Warshak’s knowledge of the investigation and
knowledge of his pre-existing service-provider agreements before he filed the complaint, it is surely
possible that he might switch to a service provider that gave him a greater expectation of
privacy—say, by contracting with a paid-subscription service provider that promises not to screen
e-mail. Or he might decide that the convenience of free, web-based e-mail is ultimately worth the
tradeoff of allowing the service provider to screen his e-mail. We simply have no way of knowing
what kind of accounts Warshak is likely to possess in the future and no basis for assuming that
future e-mails will be controlled by the same type of service-provider agreement he used in the past.
“The operation of the statute,” in short, will be “better grasped when viewed in light of a particular
application.” Texas, 523 U.S. at 301.
Concerns about the premature resolution of legal disputes have particular resonance in the
context of Fourth Amendment disputes. In determining the “reasonableness” of searches under the
Fourth Amendment and the legitimacy of citizens’ expectations of privacy, courts typically look at
the “totality of the circumstances,” Samson v. California, 547 U.S. 843, 848 (2006) (internal
quotation marks omitted), reaching case-by-case determinations that turn on the concrete, not the
general, and offering incremental, not sweeping, pronouncements of law, see O’Connor v. Ortega,
480 U.S. 709, 718 (1987). Courts thus generally review such challenges in two discrete, post-
enforcement settings: (1) a motion to suppress in a criminal case or (2) a damages claim under
§ 1983 or under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388
(1971), against the officers who conducted the search. In both settings, the reviewing court looks
at the claim in the context of an actual, not a hypothetical, search and in the context of a developed
factual record of the reasons for and the nature of the search. A pre-enforcement challenge to future
e-mail searches, by contrast, provides no such factual context. The Fourth Amendment is designed
to account for an unpredictable and limitless range of factual circumstances, and accordingly it
generally should be applied after those circumstances unfold, not before.
That is why Warshak’s rejoinder—that this case presents a “purely legal question,” Toilet
Goods, 387 U.S. at 163—carries little weight. In addition to the fact that this “purely legal question”
remains a purely speculative legal question, this case presents a legal question that may be answered
differently in different settings and a legal question that “depend[s] . . . on an understanding of”
complex factual issues. Id. In such cases, “judicial appraisal . . . is likely to stand on a much surer
footing in the context of a specific application of [the law] than could be the case in the framework
of [a] generalized challenge.” Id. at 164.
Making matters worse, Warshak’s complaint sought, and the district court’s injunction gave
him, pre-enforcement relief not just on behalf of himself but on behalf of all e-mail users. The point
of this attack on the statute, like all facial challenges, was to leave nothing standing—to prevent
§ 2703(d) from ever being enforced without a warrant and probable cause, no matter the
circumstances, no matter the individual’s expectation of privacy, no matter the government’s
interests in obtaining the information without tipping the suspect off to the investigation.
That is not how constitutional litigation typically proceeds, and that is why the federal courts
do not lightly uphold facial challenges. Many of the concerns that underlie the ripeness
doctrine—that “[t]he operation of the statute [will be] better grasped when viewed in light of a
particular application” and that “the proper exercise of the judicial function” avoids deciding
abstract and speculative questions, Texas, 523 U.S. at 301 (internal quotation marks
omitted)—underlie, and are indeed echoed by, the courts’ reluctance to grant relief in the face of
facial, as opposed to as-applied, attacks on statutes. When “determining whether a law is facially
invalid,” as when determining whether a case is ripe, “we must be careful not to . . . speculate about
No. 06-4092 Warshak v. United States Page 7
‘hypothetical’ or ‘imaginary’ cases” or to “premature[ly] interpret[] . . . statutes on the basis of
factually barebones records.” Wash. State Grange v. Wash. State Republican Party, 128 S. Ct. 1184,
1190–91 (2008) (internal quotation marks omitted). “Exercising judicial restraint in a facial
challenge frees the Court not only from unnecessary pronouncement on constitutional issues, but
also from premature interpretations of statutes in areas where their constitutional application might
be cloudy.” Id. at 1191 (internal quotation marks omitted); see also United States v. Raines, 362
U.S. 17, 22 (1960). As-applied challenges—the “basic building blocks of constitutional
adjudication”—remain the preferred route. Gonzales v. Carhart, 127 S. Ct. 1610, 1639 (2007)
(internal quotation marks omitted); cf. Nat’l Wildlife Fed’n, 497 U.S. at 894 (noting that the ripeness
doctrine turns in part on the fact that “[t]he case-by-case approach . . . is the traditional, and remains
the normal, mode of operation of the courts”).
Litigation by hypothetical becomes particularly risky in the face of ever-evolving and ever-
more-complicated technology. Cf. Carhart, 127 S. Ct. at 1638. The complexities of modern
electronic communications, which already have changed markedly since 1986, make it especially
difficult to do what facial invalidation requires—“to consider every conceivable situation which
might possibly arise in the application of complex and comprehensive legislation.” Id. at 1639
(internal quotation marks omitted).
The Supreme Court has been especially reluctant to invalidate statutes on their face under
the Fourth Amendment. “The constitutional validity of a warrantless search is pre-eminently the
sort of question which can only be decided in the concrete factual context of the individual case.”
Sibron v. New York, 392 U.S. 40, 59 (1968). On this basis, Sibron refused “to be drawn into . . . the
abstract and unproductive exercise” of entertaining a Fourth Amendment challenge to the facial
validity of New York’s “stop-and-frisk” statute, which authorized police to stop and search
individuals in certain circumstances. Id. at 43–44, 59. See generally Skinner v. Ry. Labor
Executives’ Ass’n, 489 U.S. 602, 632 n.10 (1989); Bell v. Wolfish, 441 U.S. 520, 560 (1979).
Even outside the case-by-case imperatives of Fourth Amendment decisionmaking, the
Supreme Court has expressed increasing skepticism of facial challenges in recent years. In United
States v. Salerno, 481 U.S. 739 (1987), the Court held that the Bail Reform Act is not facially invalid
under the Due Process Clause of the Fifth Amendment or the Excessive Bail Clause of the Eighth
Amendment, id. at 755. The Court reasoned that “[a] facial challenge to a legislative Act is . . . the
most difficult challenge to mount successfully, since the challenger must establish that no set of
circumstances exists under which the Act would be valid. The fact that the Bail Reform Act might
operate unconstitutionally under some conceivable set of circumstances is insufficient to render it
wholly invalid . . . .” Id. at 745. In Sabri v. United States, 541 U.S. 600 (2004), the Court rejected
a facial challenge to a bribery statute, explaining that “[f]acial adjudication carries too much promise
of premature interpretatio[n] of statutes on the basis of factually barebones records,” id. at 609
(internal quotation marks omitted) (second alteration in original). “Although passing on the validity
of a law wholesale may be efficient in the abstract,” the Court explained, “any gain is often offset
by losing the lessons taught by the particular, to which common law method normally looks.” Id.
at 608–09. Even in the abortion context, where in the past it has applied a more relaxed standard
to facial challenges, see Planned Parenthood of Se. Pa. v. Casey, 505 U.S. 833, 895 (1992), the
Court recently expressed its preference for as-applied challenges. In Carhart, the Court refused to
engage in conjecture about potential applications of an abortion statute, saying that “it would indeed
be undesirable for this Court to consider every conceivable situation which might possibly arise in
the application of complex and comprehensive legislation.” 127 S. Ct. at 1639 (internal quotation
marks omitted).
This trend continued in the Supreme Court’s most recent Term. In Crawford v. Marion
County Election Board, 128 S. Ct. 1610 (2008), the Court explained that plaintiffs mounting facial
challenges “bear a heavy burden of persuasion,” then rejected a facial challenge to Indiana’s voter-
No. 06-4092 Warshak v. United States Page 8
identification requirements, id. at 1621–23. In Washington State Grange, the Court explained that
“[f]acial challenges are disfavored, raise the risk of premature interpretation[,] . . . run contrary to
the fundamental principle of judicial restraint” and “threaten to short-circuit the democratic
process.” 128 S. Ct. at 1191. Refusing to hold Washington’s primary system unconstitutional in
all its applications, the Court reasoned that the plaintiffs’ claim rested on “sheer speculation” that
the system would confuse voters and that there was “no evidentiary record” to provide guidance.
Id. at 1193–94. That the system “could conceivably be” implemented in a constitutional manner was
“fatal” to the facial challenge, leaving fact-specific claims of voter confusion to “await an as-applied
challenge.” Id. at 1194–95. A similar conclusion applies here: Because we can only speculate as
to the sorts of accounts and privacy terms that different users may have today and may have in the
future, it is far more prudent to “await an as-applied challenge” to decide whether the Act is
constitutional in a discrete factual setting.
In the face of these considerations and this case law, Berger v. New York, 388 U.S. 41
(1967), offers Warshak little help. Berger, it is true, appeared to invalidate a New York
eavesdropping statute on its face. Id. at 43 n.1. But the Court did not discuss the distinction
between as-applied and facial challenges, and accordingly did not reach, and necessarily did not
discuss, the question whether it would have made sense to proceed differently. One year later, when
the Court decided Sibron, it did discuss this distinction, it interpreted Berger narrowly and it advised
courts to consider challenges to “[t]he constitutional validity of a warrantless search” on an as-
applied basis. Sibron, 392 U.S. at 59. Unlike Berger and Sibron, moreover, this case involves not
just the risk of guessing about other fact patterns in which a statute might be applied but the risk of
guessing how the statute will be applied even to this individual—a fact that makes the facial
invalidation of this statute especially inappropriate.
No doubt, Warshak is correct that the Court has issued Fourth Amendment rulings that
effectively invalidated statutes in whole or in part. See, e.g., Payton v. New York, 445 U.S. 573,
589–90, 598 & n.46 (1980); Torres v. Puerto Rico, 442 U.S. 465, 471, 474 (1979). But in these
cases, too, the Court reviewed applications of statutes in concrete settings—motions to suppress that
sought to prevent the information obtained in a search from being used against the defendant. See
Payton, 445 U.S. at 576–79, 589–90; Torres, 442 U.S. at 467, 474. That is a distant cry from the
relief Warshak seeks today.
Nor, for a separate reason, was it appropriate in this case to grant a preliminary injunction
in favor of persons other than Warshak. “While district courts are not categorically prohibited from
granting injunctive relief benefitting an entire class in an individual suit, such broad relief is rarely
justified because injunctive relief should be no more burdensome to the defendant than necessary
to provide complete relief to the plaintiffs.” Sharpe v. Cureton, 319 F.3d 259, 273 (6th Cir. 2003)
(emphasis omitted). Warshak did not seek class-action relief, and he has made no showing—below
or here—why the injunction needed to run in favor of other individuals in order to protect him.
Our reluctance to hypothesize how the government might conduct a conjectural search of
Warshak’s e-mails, then resolve the constitutionality of that search as well as any others the
government might conduct under the statute, is reinforced by another reality: The Stored
Communications Act has been in existence since 1986 and to our knowledge has not been the
subject of any successful Fourth Amendment challenges, in any context, whether to § 2703(d) or to
any other provision. If it “is often true” that reviewing “legislation in advance of its immediate
adverse effect in the context of a concrete case involves too remote and abstract an inquiry for the
proper exercise of the judicial function,” Texas, 523 U.S. at 301 (internal quotation marks omitted),
the same is assuredly true when we have no precedent to guide us, cf. Raines, 362 U.S. at 23.
Discretion, indeed, is the better part of valor.
No. 06-4092 Warshak v. United States Page 9
B.
There also is no meaningful risk of “hardship” to Warshak “of withholding court
consideration.” Abbott Labs., 387 U.S. at 149. The prototypical case of hardship comes from the
claimant who faces a choice between immediately complying with a burdensome law or “risk[ing]
serious criminal and civil penalties.” Id. at 153; compare id. with Toilet Goods, 387 U.S. at 164–65.
Yet Warshak faces no such conflict. The relevant provisions of the Act do not require Warshak to
do anything. They do not “force [Warshak] to modify [his] behavior in order to avoid future adverse
consequences,” see Ohio Forestry Ass’n, Inc. v. Sierra Club, 523 U.S. 726, 734 (1998), or require
Warshak “to engage in, or to refrain from, any conduct,” see Texas, 523 U.S. at 301. Because the
Act does not purport to regulate his primary conduct at all, much less impose criminal and civil
penalties for non-compliance, it does not put Warshak in an untenable bind between undertaking an
irreversible burden or risking criminal indictment.
Hardship is difficult to maintain on this record for another reason. Individuals subjected to
allegedly unconstitutional searches and seizures have at least two alternatives short of a pre-
enforcement, facial attack on the enabling statute. They may file a motion to suppress in the event
the government tries to use the evidence against them in a criminal prosecution. Or they may file
a § 1983 or a Bivens action against the officers who conducted the search. Warshak filed a motion
to suppress in his criminal case and, for reasons of his own, has not filed a Bivens action.
Warshak responds that these options will not allow him to obtain what he wants: a
constitutional ruling on the validity of § 2703(d). As he sees it, the courts could apply the Leon
good-faith doctrine in denying his motion to suppress, see United States v. Leon, 468 U.S. 897
(1984), and they could reject his Bivens claim on the ground that the invalidity of the statute had not
been “clearly established.” Both rulings, he points out, would not generate a Fourth Amendment
determination. Even accepting for a moment Warshak’s premise that one of the “hardship” concerns
that may ripen a claim into a justiciable controversy is a litigant’s interest in obtaining a
constitutional ruling, Warshak is only half right. Yes, Leon permits courts to decide the good-faith
question without determining whether the search was valid. See Leon, 468 U.S. at 925; Illinois v.
Krull, 480 U.S. 340, 349–50 (1987). And indeed, since the oral argument in this case, the district
court has rejected Warshak’s suppression motion solely on the ground that the officers acted in good
faith. Opinion and Order, Warshak, No. 1:06-cr-00111, at 11–13 (S.D. Ohio Dec. 13, 2007).
But the same is not true of a Bivens action. The Court has “insist[ed]” on a strict order of
engagement in Bivens (and § 1983) actions, requiring courts to “turn[] to the existence or
nonexistence of a constitutional right as the first inquiry” and preventing them from “skip[ping]
ahead to the question whether the law clearly established that the officer’s conduct was unlawful in
the circumstances of the case.” Saucier v. Katz, 533 U.S. 194, 201 (2001) (emphasis added). If a
constitutional ruling is what Warshak wanted, a Bivens action would have given it to him.
But even if a Bivens claim did not guarantee Warshak the constitutional ruling he seeks, see
Scott v. Harris, 127 S. Ct. 1769, 1774 n.4 (2007) (saving for another day whether to reconsider the
requirement that the constitutional issue must be resolved first in a § 1983 or Bivens action), that
would not alter our conclusion. Warshak offers no authority for the proposition that an otherwise-
unripe claim may be entertained on the ground that it will facilitate a judicial ruling on the merits.
And we doubt that any such authority exists. A central tenet of the case-or-controversy requirement
after all is that a general interest in a judicial ruling on the merits does not by itself confer
jurisdiction on the federal courts. Otherwise, a claimant’s interest in a judicial ruling itself would
justify reaching the question, prematurely or not. And even if the Supreme Court were to permit
lower courts to sidestep constitutional rulings in addressing motions to suppress and § 1983 (and
Bivens) actions, that presumably would be because the Court took the view that in some settings it
did not make sense to decide constitutional questions prematurely. See Scott, 127 S. Ct. at 1774 n.4.
No. 06-4092 Warshak v. United States Page 10
That of course is the same concern underlying the ripeness doctrine—a concern we would hardly
respect by permitting such claims through pre-enforcement, facial attacks instead.
Also unavailing is Warshak’s concern that, without a constitutional ruling, he will be
exposed to future unconstitutional searches. That contention, as we have shown, turns on a long list
of speculative assumptions—that (1) the government will again seek to obtain his e-mail contents,
even though he has already been indicted and convicted, (2) it will choose to do so through
§ 2703(d), as opposed to a search warrant or subpoena, (3) a court will determine that the § 2703(d)
requirements are met, (4) the government will seek to invoke the delayed-notice provision and (5)
a court will find that notice of the search would imperil the existence of an already-known
investigation. That is not a plausible theory of hardship.
Warshak also has argued on appeal that the Act creates a “chilling effect” on his use of
email. Although a chilling effect might relax ripeness requirements in a First Amendment case, see,
e.g., Anderson v. Spear, 356 F.3d 651, 669 (6th Cir. 2004), Warshak never made a First Amendment
claim. The first time he claimed a “chilling effect” of any sort as to him was at oral argument before
the en banc court. The only other “chilling effect” concern raised in the litigation was in his
memorandum in support of a preliminary injunction, in which he alleged that denying the injunction
would cause harm to others because it would “have a chilling effect on the [general public’s] use
of email as a form of communication because people and businesses would regard it as unsecured.”
JA 76. Because Warshak does not challenge the government’s action on First Amendment grounds,
this is a “non-First Amendment case[]” and the traditional ripeness requirements apply. Nat’l Rifle
Ass’n of Am. v. Magaw, 132 F.3d 272, 285 (6th Cir. 1997).
*****
The dissent makes two points that deserve a response: (1) that the court should “reach[] the
question that is on everyone’s mind”—the validity of the delayed-notice provision of the Act,
Dissent at 12; see id. (“Why do today what can be done tomorrow?”), and (2) that the court should
contain its “zeal to uphold the power of the government to intrude into the privacy of citizens,” id.
at 14, and that its decision “is but another step in the ongoing degradation of civil rights in the courts
of this country,” id. at 15.
As a matter of efficiency, the dissent is quite right. The ripeness doctrine, like all limitations
on the “judicial Power,” prevents us from “do[ing] today what can be done tomorrow” and, in the
process, prevents us from announcing interpretations of the Constitution that some citizens and
commentators may wish to hear today. But efficiency is not the only end of the Constitution, and
it is hardly a value that necessarily favors the promotion of civil rights, at least if history is any
guide. See Stanley v. Illinois, 405 U.S. 645, 656 (1972). Whatever value efficiency has when it
comes to the interpretation of constitutional rights, at any rate, that consideration must be balanced
against other judicial values: deciding constitutional questions correctly, which we are more likely
to do on a case-by-case basis in the context of a concrete factual setting; and exercising the Marbury
power only when the Constitution, Congress and precedent give us that authority. “Although
passing on the validity of a law wholesale may be efficient in the abstract, any gain is often offset
by losing the lessons taught by the particular.” Sabri, 541 U.S. at 608–09.
The dissent’s concern about the “ongoing degradation of civil rights” seems a bit
overwrought. The whole point of not deciding the constitutionality of a law in an unripe setting is
not to decide it—not to degrade, or for that matter uplift, any constitutional right until we are faced
with a concrete, as-applied, challenge to the provision. And if it is true, as the dissent charges, that
the majority has a “zeal to uphold the power of the government to intrude into the privacy of
citizens”—needless to say, it is not—perhaps we should be commended for restraining ourselves
by not making that view the law when we had the chance.
No. 06-4092 Warshak v. United States Page 11
But, perhaps most acutely, both of the dissent’s concerns have almost nothing to do with this
case. Warshak has only himself to blame for choosing not to vindicate his civil rights when he had
the chance—through a Bivens action. And, either way, he still retains the right to challenge the
district court’s resolution of his motion to suppress through an appeal of his criminal conviction.
III.
For these reasons, we vacate the preliminary injunction and remand the case to the district
court to dismiss Warshak’s constitutional claim.
No. 06-4092 Warshak v. United States Page 12
_______________
DISSENT
_______________
BOYCE F. MARTIN, JR., Circuit Judge, dissenting, with whom Judges Daughtrey, Moore,
Cole and Clay join. Apparently taking a page from the Supreme Court, today the majority dismisses
this case by concluding that it is not ripe for adjudication. Why do today what can be done
tomorrow? I dissent because I not only believe this case is ripe for review, but because the majority
gives unwarranted deferential treatment to the government. Such treatment would not be afforded
a private litigant defending against a motion for preliminary injunction, and should not be given
here.
I.
The majority adequately recites the facts, but conveniently leaves out what I believe to be
an essential element of the case. As the majority correctly states, § 2703(d) allows a court to issue
an order based on less than probable cause, allowing the government to search a suspect’s email
communications stored with an electronic service provider for more than 180 days. Typically, in
order to effect such a search, the Stored Communications Act requires the government to notify the
suspect of the search. However, § 2703(b)(1)(B) allows the court to grant the government a 90-day
delay of the notice if notification would result in “(A) endangering the life or physical safety of an
individual; (B) flight from prosecution; (C) destruction of or tampering with evidence;
(D) intimidation of potential witnesses; or (E) otherwise seriously jeopardizing an investigation or
unduly delaying a trial.” 18 U.S.C. § 2705(a)(2), (b). What the majority leaves out is the fact that
while the government was initially granted a 90-day delay before being required to notify Warshak
of its searches of his email accounts, when the 90 days expired, the government ignored the statute
and failed to notify Warshak of its searches. Over a year went by before Warshak became aware
that his emails had been searched. While members of this Court may argue over whether or not the
delayed notification section of the Stored Communications Act is constitutional, it is uncontroverted
that the government violated the law by failing to notify Warshak 90 days after searching his emails.
The fact that the government was unable to abide by an arguably unconstitutional provision
of the Stored Communications Act informs any analysis of Warshak’s motion for preliminary
injunction. Not only is Warshak alleging that the delayed notification provision of the act is
unconstitutional, but he is also alleging that the government cannot be trusted to abide by the actual
requirements of that law as written.
II.
Instead of reaching the question that is on everyone’s mind — whether or not the delayed
notification provision of the Stored Communications Act is constitutional — the majority sidesteps
the question and instead finds that Warshak’s claims are unripe for judicial review. In finding that
Warshak’s claims are not quite “fit” for judicial review, the majority analyzes this case under the
framework outlined by the Supreme Court in 1967 in Abbott Laboratories v. Gardner, 387 U.S. 136,
149 (1967). Under Abbott Laboratories, the majority asks whether (1) “the claim [is] ‘fit [] . . . for
judicial decision’? And (2) what is ‘the hardship to the parties of withholding court consideration’?”
See Maj. Op. at 6-7. My question is this: why not analyze the ripeness of Warshak’s claims under
the much more recent precedent of this Circuit? This Circuit has held that a ripeness analysis
involves three — not two — questions: (1) the “likelihood that the harm alleged by [the] plaintiffs
will ever come to pass”; (2) “whether the factual record is sufficiently developed to produce a fair
adjudication of the merits of the parties’ respective claims”; and (3) “the hardship to the parties if
judicial relief is denied at [this] stage in the proceedings.” Adult Video Ass’n v. U.S. Dept. of Justice,
No. 06-4092 Warshak v. United States Page 13
71 F.3d 563, 568 (6th Cir. 1995) (internal citations omitted). My guess is that it is easier to say that
Warshak’s case does not fall under the amorphous term “fit”, than to confront the actual facts and
assess the likelihood of his emails being searched in the future. Because the majority failed to
analyze this case under this Circuit’s precedent, I will do so here.
The original panel found that the two prior searches of Warshak’s email (which violated the
terms of the Stored Communications Act), coupled with the government’s continued threat of
searching his emails without notification, satisfied the first ripeness prong. Warshak v. U.S., 490
F.3d 455, 467 (6th Cir. 2007). The en banc majority disagrees with this conclusion. Instead, it
argues that the only reason the government gave in its application for delaying notice of the searches
was that disclosure would seriously jeopardize the investigation, and because Warshak has now been
indicted, there is no longer any possibility that the investigation would be jeopardized by disclosing
a subsequent search of his emails. From this reasoning, the majority further posits that because
Warshak is aware of the investigation, the government has no reason for keeping the searches
confidential, and the possibility that the government will conduct another ex parte search without
notice has therefore become “exceedingly remote.” Respectfully, I disagree with the majority’s
Pollyannish view of federal criminal investigations.
First, the government’s stated reason in the prior applications for delayed notification is not
the only reason recognized by the statute. The statute allows a court to delay notice if it would result
in “(A) endangering the life or physical safety of an individual; (B) flight from prosecution;
(C) destruction of or tampering with evidence; (D) intimidation of potential witnesses; or
(E) otherwise seriously jeopardizing an investigation or unduly delaying a trial.” 18 U.S.C.
§ 2705(a)(2), (b). Even if we accept the majority’s tenuous conclusion that once a suspect is
indicted there is no longer a possibility the investigation will be jeopardized or unduly delayed, there
are at least four more statutorily recognized reasons for delaying notice that are not negated by the
fact of indictment. Post-indictment, there is always a risk that life or physical safety could be
endangered. There is a risk that the suspect could flee or destroy evidence. There is a risk that a
potential witness could be intimidated. It could always be stated that these issues remain and an
application could support delayed notice to search Warshak’s emails again. Let us not delude
ourselves into thinking that the government’s investigation automatically stops once a suspect is
indicted. That is not the case at all. Warshak is still the subject of an ongoing investigation. The
possibility that he may be the subject of another ex parte search is anything but “extremely remote.”
Second, the majority makes much of the fact that Warshak “has ample notice of the
investigation — indeed notice of the worst sort: He has been indicted.” Maj. Op. at 4. The majority
seems to suggest that once a suspect is indicted, the government no longer needs to give notice of
any subsequent searches because the suspect now knows he is being investigated. Our Constitution
suggests something entirely different. While it is true that Warshak knows he is being investigated
and now is facing criminal prosecution, it is not true that he has ever been given notice of any
clandestine searches of his email. It is certainly possible that Warshak may be subject to future
searches, and it is certain that his rights under the Fourth Amendment have not been tolled because
of his indictment. The United States must either give notice prior to any future searches or it must
apply for a search warrant supported by probable cause. The notice we are concerned with is not
whether or not Warshak is aware he is being investigated, but whether or not the United States has
abided by the mandates of the Fourth Amendment. The fact that he is on “notice” that he is being
investigated has no bearing on the ripeness of his claim.
Under the first prong of this Circuit’s ripeness analysis, it is clear that given the factual
context of Warshak’s claim — the past e-mail seizures, the ongoing nature of the investigation
against Warshak, and the government policy of seizing emails without a warrant or notice to the
account holder — there is a sufficient “likelihood that the harm alleged by [the] plaintiffs will ever
come to pass.” Adult Video Ass’n, 71 F.3d at 568.
No. 06-4092 Warshak v. United States Page 14
The second prong of our analysis looks to whether the factual record is sufficiently
developed to allow for a fair adjudication of Warshak’s claim. Id. The original panel held, and the
district court concluded, that the past seizures of Warshak’s e-mails presented an adequate factual
basis on which to assess the government’s conduct. Although future seizures, and not the past
incidents, are those upon which Warshak’s challenge is focused, the likely similarity clearly renders
them a sufficient backdrop for judicial review.
The majority disagrees and contends that the factual record is insufficient because it has “no
idea” what types of email accounts the government might investigate and, thus, has no basis for
determining whether Warshak has a reasonable expectation of privacy in any single account. I could
not disagree more. The original panel opinion sufficiently addressed this issue, analyzing the
relevant facts, and pertinent Supreme Court opinions, as well as the most recent precedents of our
sister circuits. That panel, as well as the district court, concluded “that individuals maintain a
reasonable expectation of privacy in e-mails that are stored with, or sent or received through, a
commercial ISP.” Warshak, 490 F.3d at 473. Rather than address the facts and law cited by the
panel’s opinion, the majority fails to cite one case dealing with electronic communications in the
privacy context, instead relying on a single professor’s law review article.
In its zeal to uphold the power of the government to intrude into the privacy of citizens, the
majority has forgotten where this case lies procedurally. We are merely at the preliminary
injunction stage. Every day in civil litigation across this country, private parties seek preliminary
injunctions against other private parties relying on past relevant wrongful conduct and the threat of
future wrongful conduct. The factual record necessary to support a preliminary injunction does not
have to be complete. In fact, we have stated that “[t]he purpose of a preliminary injunction is merely
to preserve the relative positions of the parties until a trial on the merits can be held.” Certified
Restoration Dry Cleaning Network, L.L.C. v. Tenke Corp., 511 F.3d 535, 542 (6th Cir. 2007)
(quoting Univ. of Texas v. Camenisch, 451 U.S. 390, 395 (1981)). “Given this limited purpose, a
preliminary injunction is customarily granted on the basis of procedures that are less formal and
evidence that is less complete than in a trial on the merits.” Id. Warshak “is not required to prove
his case in full at a preliminary injunction hearing and the findings of fact and conclusions of law
made by a court granting the preliminary injunction are not binding at trial on the merits.” Id. I
challenge the majority to find a case where this or any other court has not granted a preliminary
injunction against a defendant who has twice previously committed wrongful conduct, has a written
policy in favor of committing the wrongful conduct, and refuses to promise not to commit the
wrongful conduct in the future. Despite the fact that a violation of one of the bedrock principles of
the Bill of Rights has been alleged, today the majority has decided to treat the government more
favorably than a private litigant would be treated in a similar preliminary injunction setting.
Turning to the final prong of this Circuit’s ripeness analysis, I believe the only party that
would suffer undue hardship if the preliminary injunction were not granted is Warshak. The
government’s ex parte approach to obtaining Warshak’s e-mails precludes the possibility of judicial
review at a subsequent and more appropriate time. Thus, as Warshak points out, he will likely suffer
the hardship of continuing to have his Fourth Amendment rights violated with limited legal recourse
if his current claims are deemed unripe. The government, on the other hand, suffers no hardship if
the preliminary injunction is granted. By the terms of the modified preliminary injunction, the
government is prohibited only “from seizing the contents of a personal e-mail account maintained
by an ISP in the name of any resident of the Southern District of Ohio, pursuant to a court order
issued under 18 U.S.C. § 2703(d), without either (1) providing the relevant account holder or
subscriber prior notice and an opportunity to be heard, or (2) making a fact-specific showing that
the account holder maintained no expectation of privacy with respect to the ISP. . . .” Warshak, 490
F.3d at 482. The United States may still seek a search warrant based on probable cause, or subpoena
the contents of an email account, and the ex parte search and delayed notification procedures of
§ 2703(d) are still available if the terms of the email account establish that the account holder has
No. 06-4092 Warshak v. United States Page 15
no reasonable expectation of privacy in the account. The only tool taken from the government is
the one that allegedly violates the Fourth Amendment. While that one investigatory tool is now
gone, Warshak’s constitutional rights remain intact. Hopefully, given the mandates of the
Constitution, we should strive to maintain that status quo through a preliminary injunction. We
should not allow a citizen’s constitutional rights to be violated when the United States is not even
minimally burdened here in its criminal investigations.
Based on the foregoing, I respectfully dissent.
III.
While I am saddened, I am not surprised by today’s ruling. It is but another step in the
ongoing degradation of civil rights in the courts of this country. The majority makes much of the
fact that facial challenges are no way to litigate the constitutional validity of certain laws. Yet our
Supreme Court has no problem striking down a handgun ban enacted by a democratically elected
city government on a facial basis. See Dist. of Columbia v. Heller, — U.S. —, 2008 WL 2520816
(June 26, 2008). History tells us that it is not the fact that a constitutional right is at issue that
portends the outcome of a case, but rather what specific right we are talking about. If it is free
speech, freedom of religion, or the right to bear arms, we are quick to strike down laws that curtail
those freedoms. But if we are discussing the Fourth Amendment’s right to be free from
unreasonable searches and seizures, heaven forbid that we should intrude on the government’s
investigatory province and actually require it to abide by the mandates of the Bill of Rights. I can
only imagine what our founding fathers would think of this decision. If I were to tell James Otis and
John Adams that a citizen’s private correspondence is now potentially subject to ex parte and
unannounced searches by the government without a warrant supported by probable cause, what
would they say? Probably nothing, they would be left speechless.