United States v. Agron Hasbajrami

15-2684(L) United States of America v. Agron Hasbajrami 15-2684, 17-2669 United States of Americi. v. Agron Hasbajrami UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT August Term, 2018 Argued; August 27, 2018 Decided: December 18 2019 I Docket No. 15-2684-L; 17-2669-CON UNITED STATES OF AMERICA, Appellee, - V. - AGRON HASBAJRAMt Defendant-Appellant. Before: LYNCH, CARNEY, and DRONEY, Circuit Judges. Agron Hasbajrami was arrested at John F. Kennedy International Airport in September 2011 and charged with attempting to provide material support to a terrorist organization. After he pleaded guilty, the government disclosed, for the first time, that certain evidence involved in Hasbajrami's arrest and prosecution had been derived from information obtained by the government without a warrant pursuant to its warrantless surveillance program under Section 702 of the FISA Amendments Act of 2008. Hasbajrami then withdrew his initial plea and moved to suppress any fn1its of the Section 702 surveillance. The district court (Gleeson, then-].) denied the motion to suppress and Hasbajrami again pleaded guilty, this time pursuant to a conditional guiJty plea that allowed him to appeal the district court's ruling denying his motion to suppress. He now appeals, arguing inter alia that the warrantless surveillance and the collection of his communications violated the Fourth Amendment. We conclude that the collection of the communications of United States persons incidental to the lawful surveillance of non-United States persons located abroad does not violate the Fourth Amendment and that, to the extent that the government's inadvertent targeting of a United States person led to collection of Hasbajrami's communications, he was not harmed by that collection. - Because there is insufficient information in either the classified or the public record in this case to permit us to determine whether any such querying was reasonable, and therefore permissible under the Fourth Amendment, we REMAND the case to the district court for further proceedings consistent with this opinion. MICHAEL K. BACHRACH, Law Office of Michael K. Bachrach, New York, NY, Joshua L. Oratel, Joshua L. Dratel, P.C., New York, NY, and Steve Zissou, Steve Zissou & Associates, Bayside, NY, for Defe,1dant-Appellant Agron Hasbajrami. SETH D. DUCHARME, David C. James, Saritha Komatireddy, Assistant United States Attorneys, Joseph F. Palmer, Attorney, National Security Division, United States Department of Justice for Richard P. Donoghue, United Stales District Attorney for the Eastern District of New York, Brooklyn, NY,for the United States of America. 2 PATRICK TOOMEY and Ashley Gorski, American Civil Liberties Foundation, New York, NY, Mark Rumold and Andrew Crocker, Electronic Frontier Foundation, San Francisco, CA, Amici Curiae American Civil Liberties Union and Electronic Frontier Foundation. GERARDE. LYNCH, Circuit Judge: This case concerns the Fourth Amendment implications of the government's increasing technological capacity for electronic surveillance in foreign intelligence and terrorism investigations, and the balance our constitutional system requires between national security and individual privacy. On September 6, 2011, Defendant-Appellant Agron Hasbajrami ("Hasbajrami") was arrested as he attempted to board a flight to Turkey at John F. Kennedy International Airport in Queens, New York. His luggage contained a tent, boots, and cold-weather gear. The government, which had collected Hasbajrami's electronic communications, charged him with attempting to provide material support to a terrorist organization, alleging that he intended to travel to the Federally Administered Tribal Area of Pakistan, where he expected to join a terrorist organization, receive training, and ultimately fight "against U.S. forces and others in Afghanistan and Pakistan." App'x at 44. During the course of the prosecution, the government disclosed that it had collected some of its 3 evidence under the Foreign Intelligence Surveillance Act of 1978 ('''FISA"}, Pub, L. No. 95-511, 92 Stat. 1783 (1978), codified at 50 U.S.C. § 1801 et seq., and that it intended to introduce FISA-derived evidence at any eventual trial. Faced with the evidence, including his own incriminating communications, Hasbajrami ultimately pleaded guilty to attempting to provide material support to terrorists in violation of 18 U.S.C. § 2339A. He was sentenced to 180 months in prison. Hasbajrami was already serving his sentence when the government provided him with a supplemental letter disclosing, for the first time, that some of the evidence it had previously disclosed from FISA surveillance was itself the fruit of earlier information obtained without a warrant pursuant to Section 702 of the FISA Amendments Act ("Section 702"), Pub. L. No. 110-261, 122 Stat. 2436 (2008), codified at 50 U.S.C. § 1881a. It is that Section 702-derived evidence - primarily electronic communications between Hasbajrami and individuals without ties to the United States and located abroad - that is at issue in this appeal. FoIIowing the disclosure of Section 702 surveillance, the district court Gohn Gleeson, then-J.) permitted Hasbajrami to withdraw his plea; Hasbajrami subsequently moved to suppress all evidence seized by the government under its Section 702 programs, 4 as well as any fruits of that surveillance, including the evidence obtained pursuant to FISA warrants and incul patory statements Hasbajrami made upon arrest. The district court denied the motion to suppress, and Hasbajrami again pleaded guilty, reserving his right to appeal the district court's denial of his suppression motion. The vast majority of Section 702 surveillance at issue here involves information the government collected about Hasbajrami incidental to its surveillance of other individuals without ties to the United States and located abroad. 1 This opinion has been reviewed by appropriate intelligence agencies for the purpose of redacting material that includes or references classified information. After an initial redaction, the panel met ex parte with representatives of those agencies in order to discuss potential substitutions or modified phrasing that would minimize the need for redaction, and the possibility that certain information referenced in the opinion could be declassified, thus further 5 In light of that disclosure, and the evidence in the public and classified record, we reach three principal conclusions: First, the "incidental collection" of communications (that is, the collection of the communications of individuals in the United States acquired in the course of the surveillance of individuals without ties to the United States and located abroad) is permissible under the Fourth Amendment. We therefore conclude, in agreement with the district court, that, at least insofar as the record available to the district court is concerned, the vast majority of the evidence detailed in the record was lawfully collected. Second, the "inadvertent collection" of communications of those located within the United States (that is, the acquisition of communications accidentally collected because an intelligence agency mistakenly believes that an individual is a non�United States person located abroad and therefore targets that individual's e-mail address under its Section 702 authority) raises novel constitutional questions. We do not reach those reducing the need for redaction. That meeting was transcribed for the record, and the transcript (which is itself classified) will be preserved as part of the record of this appeal in the custody of a Classified Information Security Officer with the Department of Justice's Litigation Security Group. The meeting was extremely productive, and has resulted in a modest number of changes of wording that do not affect the substance of the opinion, and a significant reduction in the amount of redacted material. It is of course regrettable that any part of an opinion disposing of a criminal appeal is unavailable for public inspection. However, we have neither the authority, nor the expertise, nor the inclination to overrule classification decisions made by the relevant executive branch agencies. We respect the need for such classification of sensitive national security information, and appreciate the cooperation of the agencies in the effort to limit the need for modifications and redactions. 6 questions today because we are satisfied that, to the extent such accidental collection occurred in this case, any information thus acquired did not taint the investigation or prosecution of Hasbajrami. Third, querying databases of stored information derived from Section 702-acquired surveillance also raises novel and difficult questions. Querying, depending on the particulars of a given case (such as what databases are queried, for what purpose1 and under what circumstances), could violate the Fourth Amendment, and thus require the suppression of evidence; therefore, a district court must ensure that any such querying was reasonable. But no information about any queries conducted as to Hasbajrami was provided to the district court, and the information provided to us on this subject is too sparse to reach a conclusion as to the reasonableness of any such queries conducted as to Hasbajrami. Given these conclusions, further proceedings are necessary to determine (a) what (if any) evidence relevant to Hasbajrami was obtained by the government by querying databases, (b) whether any such querying violated the Fourth Amendment and, if so, (c) whether any such violation tainted other lawfully­ collected evidence. We therefore REMAND the case to the district court for further proceedings consistent with this opinion. BACKGROUND This appeal concerns the legal status of evidence of Hasbajrami's electronic communications with individuals located abroad, which was collected by the 7 government without a warrant pursuant to the government's authority under Section 702. The background to this appeal may be easily summarized: Hasbajrami sought to suppress evidence the government acquired under Section 702, arguing that the government had violated his Fourth Amendment rights when it seized his communications without a warrant, and that those communications, and any information that the government later collected as the fruit of that initial warrantless surveillance, should therefore be suppressed. The district court declined to suppress the evidence, and Hasbajrami pleaded guilty while reserving his right to appeal the district court's decision. But our disposition of the case turns in part on the particulars of how Section 702-acquired surveillance was used in Hasbajrami's prosecution; a fuller accounting of the facts of Hasbajrami's case and the nature of Section 702 surveillance is therefore necessary. First, we begin by describing Hasbajrami's arrest and the initial proceedings in which he pleaded guilty, the subsequent disclosure of Section 702 surveillance, Hasbajrami's withdrawal of his guilty plea, and his subsequent motion to suppress. Second, we describe in broad terms the operation of Section 702 surveillance. Third, we turn to the district court's discussion of the use of Section 702 evidence (that it was aware of) in this case, 8 and its denial of the suppression motion. Finally, we describe the proceedings at the district court following its denial of the suppression motion, and the proceedings on appeal. I. Allegations and Initial Proceedings The conduct underlying Hasbajrami's prosecution occurred primarily between April and August, 2011. During that time, Hasbajrami communicated by e-mail with "Individual #1," a non-American located abroad, who Hasbajrami believed was associated with a terrorist organization, In those e-mails, Hasbajrami discussed his interest in the group's terrorist operations, and Individual #1 instructed Hasbajrami how he could smuggle himself into Pakistan to join the organization. Individual #1 also detailed means by which Hasbajrami could send money to him and how Hasbajrami could contact him once he reached Pakistan. In discussing his plans to join Individual #1 in Pakistan, Hasbajrami also described his arrangements for traveling to Turkey, and his concern that his projected route from there to Pakistan might have been compromised. Following an investigation by the agents of the Federal Bureau of Investigation's Joint Terrorism Task Force, Hasbajrami was arrested as he was 9 about to board a flight to Istanbut Turkey. His luggage contained a tent, boots, and cold-weather gear. Upon arrest, Hasbajrami made certain inculpatory statements. A. Initial Proceedings Hasbajrami was indicted on September 8, 20lt and charged with one count of providing material support to terrorist organizations. At the same time, and as required by statute, the government gave notice that it "intend[ed] to offer into evidence, or otherwise use or disclose in any proceedings ... information obtained or derived from electronic surveillance and physical searches conducted pursuant to [FISAJ. 11 See Notice of Intent to Use Foreign Intelligence Surveillance Act Information, United States v. Hasbajrami, l:ll-cr-623 (E.D.N.Y. filed Sept. 13, 2011), ECF No. 9. In discovery, Hasbajrarni was provided with evidence of his communications obtained pursuant to traditional FISA warrants,2 and he 2As detailed below, this opinion will use "traditional FISA" to describe FISA surveillance that was authorized by statute prior to the enactment of Section 702. The FISA Amendments Act will be referred to as the "FAA," of which Section 702 is one part. 10 eventually pleaded guilty on April 12, 2012, to one count of providing material sup port to terrorists. He was sentenced to 180 months' imprisonment. B. Disclosure of Section 702 Surveillance, Withdrawal of Plea, and Motion to Suppress After Hasbajrami's initial plea and sentencing, and while Hasbajrami was serving his sentence, the government disclosed that it had coUected Hasbajrami' s communications under Section 702 of the FAA. 3 In a letter sent to Hasbajrami in February 2014, the government stated that "based on a recent determination," it had concluded that the information obtained from FISA surveillance that the government had already disclosed "was itself also derived from other collection pursuant to Title VII of FISA [i.e., Section 702] as to which you were aggrieved." App'x at 31. The government stated that "certain evidence and information ... that the government intended to offer into evidence or otherwise use or disclose 3The government's provision of notice in this case was likely in response the Solicitor General's assertion, at oral argument before the Supreme Court in Clapper v. Amnesty International USA, 568 U.S. 398 (2013), that prosecutors would provide notice to defendants in cases where evidence was derived from Section 702 surveillance. See Charlie Savage, Door May Open Challenge to Secret Wiretaps, N.Y.Times (Oct. 17, 2013), at A3. While the government's policy prior to Clapper was not to provide notice of Section 702 surveillance, it began reviewing cases and providing supplemental notice in 2013. Id. 11 in proceedings in this case was derived from acquisition of foreign intelligence information conducted pursuant to the FAA." Id. In response to that disclosure, Hasbajrami sought leave to withdraw his plea. The district court granted that motion, finding that Hasbajrami had "specifically asked [his counsel] about whether warrantless wiretaps had played a role in his case. After [counsel] informed him that such wiretaps were not part of the evidence, he was more willing to plead guilty. Thus, Hasbajrami seems to have been misled about a fact he considered important in deciding how to plead." App'x at 39. Furthermore, the government's misleading notice, according to the district court, prevented Hasbajrami from kno wing that he could challenge the evidence against him on the grounds that Section 702 was unconstitutional. The court concluded that, prior to the letter disclosing Section 702 surveillance, Hasbajrami "was not sufficiently informed about the facts" to have ''made an intelligent decision about whether to plead guilty[.] When the government provided FISA notice without FAA notice, Hasbajrami was misled about an important aspect of his case." App'x at 38. Accordingly, the court allowed him to withdraw the plea and reopened the case. 12 Hasbajrami then moved to suppress "the fruits of all warrantless FAA surveillance," the motion that is at issue in this appeal. See Omnibus Motions at 8-9, United States v. Hasbajrami, 1:ll-cr-623 (E.D.N.Y. filed Nov. 26, 2014), ECF No. 92 ("Suppression Motion"). He described what he sought to suppress, "the fruits of all warrantless FAA surveillance," as including: • all evidence and information derived as a result of Title VII warrantless FAA surveillance; • all evidence and information "obtained or derived from Title I and Title III PISA collection ... [that was] itself also derived from other collection pursuant to Title VII" of the FAA; • Hasbajrami's custodial statements; and • Any other evidence and information that the Government could not have obtained in this case through an independent source. Id. To properly understand the scope of Hasbajrami's motion, however, it is necessary to describe the statutory framework underpinning Section 702 surveillance and the way in which the program operates in practice. 13 II. Section 702 Surveillance 4 In order to ensure national security, the United States maintains several programs aimed at the surveillance of those who pose threats to its safety. These programs each draw on a wide vari�ty of authority, including executive orders, statutory provisions, and agency procedures and guidance. See generally Diana Lee, Paulina Perlin & Joe Schottenfeld, Gathering Intelligence: Drifting Meaning and 4 The purpose of this section is to provide the general background necessary to understand the parties' arguments and it is not intended to provide a comprehensive description of the way in which each agency implements Section 702 surveillance. Additionally, as detailed below, each agency must seek approval of its Section 702 procedures each year, including changes in operation. Our intention is thus only to describe the program in broad terms. We note, moreover, that many Section 702 procedures remain highly classified, including the specific procedures under which the collection of Hasbajrami' s communications would likely have taken place. Our discussion here is drawn from declassified public sources and in large part from the report on Section 702 surveillance produced by the Privacy and Civil Liberties Oversight Board. See Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (fuly 2, 2014), https://www.pclob.gov/library/702-Report.pdf ("PCLOB Report"). The PCLOB is an independent agency within the executive branch, authorized by statute., inter alia, to "analyze and review actions the executive branch takes" and "ensure that liberty concerns are appropriately considered" in the government's development and implementation of anti-terrorism programs. See 42 U.S.C. § 2000ee(c). The PCLOB is composed of five members, appointed by the President and confirmed by the Senate. Id. § 2000ee(h). Accordingly, we discuss the program, and changes in its operation over time, only to the extent that the details are (a) relevant and (b) public. 14 the Modern Surveillance Apparatus, 10 J. of Nat'l Sec. L. & Pol'y 77 (2019) (describing several separate authorities for surveillance, including FISA and Section 702, each with separate operating standards). Hasbajrarni's appeal specifically implicates the government's statutory authority under FISA, first enacted in 1978, and more specifically the amendments to FISA, including Section 702, enacted in 2008. 5 FISA was first enacted in response to revelations about the government's electronic surveillance of the domestic communications of United States citizens. See David S. Kris & J. Douglas Wilson, National Security Investigations and Prosecutions§ 3:7 ("Kris & Wilson"). "Traditional FISA" surveillance, as surveillance under the FISA has come to be known following the enactment of the FAA in 2008, governed surveillance inside the United States, in the context only of national security investigations rather than domestic criminal prosecutions. See id. § 4:2. For those national security investigations, FISA established procedures governing the collection of information derived from 5While Section 702 was first enacted in 2008, the fact that any e-mails tied to Americans were sometimes collected under its authority was not made public until June 2013, when "two classified [National Security Agency ("NSA")J collection programs were first reported by the press based on unauthorized disclosures of classified documents by Edward Snowden, a contractor for the NSA." PCLOB Report at 1. 15 electronic surveillance, physical searches, ''pen/trap" surveillance1 and tangible­ things production orders, and the use of information so obtained. See id. § 4:5. In order to initiate traditional FISA surveillance, the government must submit an application to a court demonstrating that there is "probable cause to believe that 'the target of the electronic surveillance is a foreign power or agent of a foreign power,' a nd that each of the specific 'facilities or places at which the electronic surveillance is directed is being used, or is about to be used, by a foreign power or an agent of a foreign power."' See Clapper, 568 U.S. at 403 (quoting FISA § 105(a)(3)). FISA applications are reviewed by two specialized courts: the Foreign Intelligence Surveillance Court ( 11FISC") and the Foreign Intelligence Surveillance Court of Review ("FISCR"),. both composed of Article III federal judges assigned to their role by the Chief Justice of the United States. See id.; Kris & Wilson § 5:1 (describing jurisdiction of FISC and FISCR). Applications are submitted under oath by a federal officer and must describe, among other things, whom the government wishes to search or surveil, the place or things to be searched or surveilled, the sort of information the government expects to gather, and the existence and nature of any prior FISA applications targeting the individual. See generally Kris & Wilson§ 6:2. 16 Traditional FISA had some limitations, however. Because each application required a court order, which in turn required probable cause, the government believed th.at, after September 11, 2001, [FISA's] requirements unduly restrict[ed 11 the] speed and agility" with which the government could detect and respond to terrorist threats. See id. § 16:2 (internal quotation marks omitted). Additionally, the advent of e-mail "clearly expanded traditional FISA's reach." Id.§ 16:6. Communications, such as phone calls, between two individuals without ties to the United States and located abroad were outside the purview of FISA, and any collection of such communications that occurred would not be constrained by its procedures. Id. But as such communication increasingly came to be conducted by e-mail, many of those e-mails would ultimately be stored on servers within the United States, and thus "the government could not conduct warrantless survei llance in the U.S. of stored e-mail messages exchanged between two parties located abroad'' without following the procedures laid out in FISA. Id. First enacted in 2008, Section 702 was intended to address some of FISA's perceived limitations. 6 Section 702 allows the Attorney General (" AG") and 6President George W. Bush initially authorized the NSA "to conduct warrantless wiretapping of telephone and e-mail communications where one party to the communication was located outside the United States" and one party was believed to be a member of a terrorist organization. See Clapper., 568 U.S. at 403. 17 Director of National Intelligence ("DNI") to "authorize jointly ... the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.'' 50 U.S.C. § 1881a(a). 7 That targeting is primarily executed by compelling electronic service providers, including internet service providers and companies that maintain the communications infrastructure, to "immediately provide the Government with all information, facilities, or assistance necessary to accomplish the acquisition [of communications of an individual or his or her account] in a manner that will protect the secrecy of the acquisition and produce a minimum of interference with the services that such electronic communication service provider is providing to the target of the acquisition." 50 U.S.C. § 1881a(i)(l)(A). Following public revelations of the program, Congress passed the Protect America Act ("PAA"), Pub. L. No. 110•55, 121 Stat. 552 (2007), which far a limited period of time allowed the government to use surveillance procedures similar to those contained in the FAA. See In re Directives, 551 F.3d 1004, 1006-07 (FISA Ct. Rev. 2008). The PAA expired on February 16, 2008. See id. at 10 0 6 n.1. 7 Like other sections of the FISA, Section 702's definition of "United States person" includes lawful permanent residents (such as Hasbajrami). See 50 U.S.C. § 1801(i) (defining "United States person u to be a "citizen of the United States, an alien lawfully admitted for permanent residence" or certain unincorporated associations or corporations with ties to the United States). 18 Section 702 differs from traditional FISA procedures in several key respects. First, Section 702 does not require a probable cause determination before undertaking surveillance. Clapper, 568 U.S. at 404. Second, Section 702 "does not require the Government to specify [in a FlSA application] the nature and location of each of the particular facilities or places at which the electronic surveillance will occur." Id. Instead, as detailed below, the FISC approves Section 702 procedures in advance, targeting non-United States persons located abroad as a category, and the government does not have to return to the FISC to seek approval before it undertakes surveillance of any specific individual or his or her accounts under those Section 702 procedures. See Kris & Wilson§ 17:17. In short, under the FAA and Section 702 the government may compel service providers located in the United States to provide e-mails or other electronic communications to, from, or about individuals the government believes are (a) not United States persons and (b) located abroad. 8 Both under the 8 The FAA also contains two sections, Sections 703 and 704, that address the direct targeting of individual United States persons outside the United States for electronic surveillance. See Laura K. Donohue, Section 702 and the Collection of International Telephone and Internet Content, 38 Harv. J.L. & Pub. Pol'y 117, 142-44 (2015). The procedures followed "generally reflect the structure employed by traditional FISA with regard to electronic surveillance and physical search.'' Id. at 143. These sections are codified at 50 U.S.C. §§ 1881h and 1881c, and are not at issue in this appeal. 19 stahltory scheme and in practice, Section 702 surveillance unfolds in several different steps, each with different implications for this Court's review. The first step is what the statute and intelligence community refers to as "targeting," followed by collection, "minimization," retention and storage, and, finally, dissemination and querying. 9 We will discuss each step in turn. A. "Targeting" Targeting generally refers to the decision to surveil an individual or his or her channels of electronic communications, such as an e-mail address. The government may not "intentionally target" for Section 702 surveillance anyone located in the United States or a "United States person" outside the United States. 50 U.S.C. §§ 1881a(b)(1), (3). Nor may it target a non-United States person "if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States.n 50 U.S.C. § 188la(b)(2). 9 Some of these terms, such as collection, are terms of art, but their use is not necessarily uniform across the various government agencies or for different forms of surveillance. See, e.g., Lee, Perlin & Schottenfeld, Gathering Intelligence at 95 (highlighting "definitional variances" for terms like collection, acquisition, and targeting across the various surveillance programs). For the purposes of providing background to Hasbajrami's case, we define the terms primarily as each is used by the PCLOB. 20 The precise mechanisms each agency must follow to target communications are not specified by the statute. Instead, Section 702 requires the AG and the DNI to adopt targeting procedures each year that will govern how the program functions at each agency tasked with Section 702 surveillance. See 50 U.S.C. §§ 1881a(a), (d). While labelled targeting procedures, the procedures are just as much about who is not to be targeted under Section 702 (that is, how to prevent acquisition of the communications of those in the United States or who are United States persons) as about setting out who is to be targeted. In this opinion, our concern with "targeting' is with the procedures designed to protect the constitutional privacy rights of Americans and comply with the Fourth Amendment inside the United States, and not with the obviously confidential procedures and criteria by which United States intelligence agencies decide which non-United States persons located abroad are appropriate objects of surveillance. The targeting procedures are supposed to ensure that any authorized acquisition is "limited to targeting persons reasonably believed to be located outside the United States" and to "prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at 21 the time of the acquisition to be located in the United States.n 50 U.S.C. § 1881a(d)(l). Targeting procedures are also subject to the limitations related to targeting United States persons outlined above. SO U.S.C. § 1881a(b). The NSA and the FBI each develop targeting procedures tailored to the agency's particular mission and purpose in using Section 702-acquired information. PCLOB Report at 41-43, 47. Once the required procedures have been formulated, the DNI and AG must seek approval of their proposed targeting procedures from the FISC. 50 U.S.C. § 1881a(d)(2). The FISC reviews the proposed standards for compliance with both statutory and constitutional requirements. See, e.g., In re Proceedings Required by 702(i) of FISA Amendments Act of 2008, No. MISC 08-01, 2008 WL 9487946, at •s (FISA Ct. Aug 27, 2008); Redacted, 2011 WL 10945618 at •1 (FISA Ct. Oct. 3, 2011) ("Bates Decision"). In contrast to traditional domestic search warrants and FISA warrants, which authorize searches or seizures of specific persons, places, or things based on individualized probable cause, judicial review of Section 702 functions as a form of programmatic pre-clearance. "[T}he Court is required to consider whether the targeting ... procedures adopted by the Government meet the requirements of the statute and ... are consistent with 22 the Fourth Amendment. The Court is not required, in the course of this Section 702(i} review, to reach beyond the Government's procedures and conduct a facial review of the constitutionality of the statute." In re Proceedings, 2008 WL 9487946, at ,.5; see also PCLOB at 26·31 (describing judicial review proceedings under Section 702). Once its procedures are approved by the FISC, an agency can begin surveilling individuals it seeks to target. The NSA ''initiates all Section 702 targeting, and thus makes all initial decisions pursuant to its targeting procedures.'' PCLOB Report at 42. According to the PCLOB, the CIA and the FBI can "'nominate' targets to the NSA for Section 702 targeting" but the NSA is required to ·"make the determination whether to initiate targeting." Id. Section 702 surveillance usually begins when an agency "tasks" a specific "selector" or "facility," usually an e•mail address or telephone number. See id. at 32. Much information about the targeting standards used by the NSA remains classified, but generally "[i}f they are to fulfill their purposes ... [the targeting procedures submitted to the FISC for approval] should contain a description of factors that in isolation or combination justify a reasonable belief that the target is abroad.'' Kris & Wilson § 17:7. According to one commentator, the NSA "has 23 created a presumption of non-U.S. person status/' assuming "that the individual is a non-U.S. person" if the agency does not know its target is a United States person. See Donohue, Section 702 at 158. B. Collection Once an account or facility such as an e-mail address has been targeted, the intelligence agencies may then begin to collect information related to that particular address. Such information includes e-mails to and from a given account, or information "about" a given account. 1. PRISM and Upstream Collection The NSA operates two separate types of collection programs which collect different types of information. These two programs have come to be labelled PRISM collection and upstream collection. Under PRISM, the FBI (on behalf of the NSA) sends "selectors" (for instance, an e-mail address) to internet service providers ("ISPs"), based in the United States. The ISPs are then required to provide communications sent to or from that selector to the NSA. See PCLOB Report at 33-34. PRISM, therefore, collects only the e-mails a given user sends from his or her account, and the e­ mails he or she receives from others through that account. Id. at 34. Collection 24 and review of such material happens roughly in real time, or close to real time. In other words, �he collected e-mails are not simply swept into a database for use at some unspecified future time when the database is queried, but are monitored and analyzed at or near the time of their collection. In that regard, the interception and review of electronic communications under PRISM resembles a traditional domestic law enforcement wiretap. Upstream collection is broader. Instead of compelling information from an ISP, the NSA instead compels information from "the providers that control the telecommunications backbone over which communications transit." PCLOB Report at 35. Upstream fills a gap in PRISM surveillance. Id. If, for instance, an individual that the NSA sought to target maintained his or her e-mail account with a foreign internet service provider, that e-mail address would be out of reach of the PRISM program. In that situation, the NSA could use upstream collection to collect traffic to that account as it traversed the backbone. Id. Upstream collection is broader than PRISM, in that it captures not only conversations to and from a given e-mail address, but also communications "about" that address (i.e., a conversation between two parties not themselves targeted that happens to mention whatever the tasked term is). See id. at 37-38. 25 One key difference between PRISM and upstream collection is that PRISM collects individual communications, while upstream collects whole 1'multi­ communication transactions," or "MCTs." Id. at 39. "An Internet transaction refers to any set of data that travels across the Internet together such that it may be understood by a device on the Internet." Id. Thus, a transaction might contain a single discrete com munication (e.g., a single e-mail), or it could contain "multiple discrete communications," and "[i]f a single discrete communication within an MCT is to, from, or about a Section 702-tasked selector, and at least one end of the transaction is foreign, the NSA will acquire the entire MCT" under upstream collection. Id. The result is a "greater likelihood" that upstream collection will "result in the acquisition of wholly domestic communications and extraneous U.S. person information." Id. at 41. The NSA is the only agency that receives upstream collection; the CIA and FBI are not provided with information obtained in this manner and do not store it in their databases. Id. at 54. 2. Incidental and Inadvertent Collection As detailed above, the statute primarily authorizes agencies like the NSA to collect the e-mails of "non-United States persons" located abroad. But even if the government scrupulously follows the procedures intended to restrict 26 collection of communications to and from persons with ties to the United States, the agencies might still end up collecting information about United States persons or those located in the United States, or communications sent to or from a United States person or an individual located in the United States. Collection may sweep up those individuals' e-mails in two ways, conventionally referred to as "incidental collection" and "inadvertent collection." First, collection might be "incidental." PCLOB Report at 114. Incidental collection occurs when a non-targeted individual (a United States person or someone in the United States) communicates with a targeted non-United States person located abroad. Such collection would occur under PRISM, for instance, if the NSA has targeted the e-mail address of a non-United States person in another country, and a United States person e-mails that targeted individual. An ISP would be required to provide the NSA with any such e-mails as part of its compliance with a Section 702 directive targeting the non-United States party to the communication. Second, collection might be "inadvertent." Id. at 116. Inadvertent collection occurs when the NSA reasonably believes that it is targeting a non-United States person located abroad, or does not have enough information to determine 27 whether an individual e-mail address or other communications facility is being used by a United States person or accessed from within the United States, and therefore presumes that the account is controlled by a foreigner outside the United States. The collection is characterized as "inadvertent" when the agency learns that the person controlling the account is a United States person after it has already acquired some of the person's communications. In essence, inadvertent collection occurs when the NSA targets United States persons or individuals located within the United States in error: the agency thought it was targeting a foreign individual abroad, but the targeted person was in fact a United States person or an individual located in the United States. C. "Minimization" In general terms, minimization describes the manner in which the government processes communications after they have been collected and seeks to provide safeguards against the misuse of Section 702 information. See PCLOB Report at SO. The 2011 Minimization Procedures, which have been declassified, apply "to the acquisition, retention, use, and dissemination of non-publicly available information concerning unconsenting United States persons that is acquired by targeting non-United States persons reasonably believed to be 28 located outside the United States." Se,e Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of 1978, As Amended§ 1, National Security Agency (Oct. 31, 2011), https://www.dni.gov/files/documents/ Minimization%20Procedures%20Used %20By%20NSA%20In%20Connection%20 With%20FISA%20Section%20702.pdf ("NSA 2011 Minimization Procedures").10 As with their targeting procedures, the NSA, FBI, and CIA must seek yearly approval of their minimization procedures from the FISC. 50 U.S.C. § 1881a(e)(2). Section 702 requires that each agency also adopt procedures that prohibit the disclosure of information about United States persons in a manner that identifies them, unless that identity is necessary to understand the intelligence information. See 50 U.S.C.§ 1881a(e)(1) (cross-referencing 50 U.S.C. §§ 1821(4) and 1801(h)); see also Kris & Wilson§ 9:1. By statute, the procedures must ensure ''that nonpublicly available information, which is not foreign intelligence information ... shall not be disseminated in a manner that identifies These minimization procedures were submitted to the FISC for approval after 10 Hasbajrami' s arrest, and therefore did not govern the operation of Section 702 during the time period relevant here. 29 any United States person, without such person's consent, unless such person's identity is necessary to understand foreign intelligence information or assess its importance." 50 U.S.C. § 1801(h)(2). Minimization procedures seek to "balance the government's need to acquire, retain, and disseminate forei gn intelligence information, against the countervailing privacy interests of U.S. persons." Kris & Wilson§ 9:1; PCLOB Report at 50 ("Minimization procedures are best understood as a set of controls on data to balance privacy and national security interests."). The meaning of the term as used in the FISA context is subtly different from what it means in the more familiar context of court-authorized domestic electronic surveillance by law enforcement agencies under traditional domestic wiretaps. In the latter context, minimization procedures generally involve stopping the monitoring of communications that can be determined in real time to be non-evidentiary. In the context of Section 702 surveillance, the information subject to minimization has already been collected. After review, it is either retained or destroyed; information is "minimized'' by non-retention. NSA analysts are instructed to "exercise reasonable judgment in determining whether information acquired must be minimized and will destroy inadvertently acquired communications of 30 or concerning a United States person at the earliest practicable point in the processing cycle at which such communication can be identified either: as clearly not relevant to the authorized purpose of the acquisition (e.g., the communication does not contain foreign intelligence information); or, as not containing evidence of a crime which may be disseminated under these procedures." 11 NSA 2011 Minimization Procedure§ 3(b)(l). After an NSA analyst reviews an individual e-mail communication, he or she will decide if the information warrants retention in the NSA's databases and/or dissemination to other agencies. The analyst will determine if "it is a domestic or foreign communication to, from, or about a target and is reasonably believed to contain foreign intelligence information or evidence of a crime." Id. § 3(b)(4). Communications fitting this description will thus.be retained and processed; information not involving foreign intelligence information or evidence of a crime will be destroyed unless it meets one of several exceptions, 11 It is not clear whether the minimization procedures' use of "inadvertent" here is intended broadly to invoke the word's p1ain meaning, or is used as a term of art to apply the provision only to communications acquired as a result of "inadvertent collection," as defined above, where a United States person has been erroneously targeted. 31 such as when "the communication contains information pertaining to a threat of serious harm to life or property." Id. § 5(4). When an e-mail or other communication is processed and retained, the information will be scanned and stored. Information that "do[es] not meet the retention standards ... and ... [is] known to contain communications of or concerning United States persons" will be "destroyed upon recognition." Id. § 3(c)(l). If a target moves to the United States, or if the NSA uncovers information that the target is a United States person, "acquisition from that person will be terminated without delay." Id.§ 3(d)(l). "[D]omestic communications" - all communications that do not have "at least one communicant outside the United States," id.§ 2(e), "will be promptly destroyed," except under certain conditions. Id.§ 5. Such conditions include if a communication is "reasonably believed to contain significant foreign intelligence information,'' which may be provided to the FBI (which in tum may disseminate information "in accordance with its minimization procedures"). Id. § 5(1). Information that is "reasonably believed to contain evidence of a crime that has been, is being, or is about to be committed 11 may be "disseminated (including 32 United States person identities) to appropriate Federal law enforcement agencies." Id. § 5(2). D. Retention and Dissemination As addressed above, the minimization procedures also govern the ultimate retention of surveillance materials and the "reporting of acquired information outside of [the] intelligence agency" that collects the information. PCLOB Report at 64. The minimization procedures treat retention and dissemination in similar ways: the NSA, for instance, may retain communications "in generally the same situations where the NSA is permitted to disseminate ... these communications" to other agencies. Id. at 62. 1be retention and dissemination of information gathered under the FAA is also governed by the same restrictions that apply to traditional FISA. Id. at 64. Additional protections generally apply if the NSA, for instance, seeks to disseminate Section 702 information con taining the identity of a United States person. The NSA will then "mask" the identity, deleting any identifying information unless certain exceptions apply. These exceptions include when "the U.S. person's identity is necessary to understand foreign intelligence 33 information, or the communication contains evidence of a crime and is being disseminated to law enforcement authorities." Id. at 65. Agencies relying on NSA reporting may request that the identity of a United States person be unmasked. Id. The NSA may provide that information if at least one additional criterion is met, including when "the identity of the United States person is necessary to understand foreign intelligence information" or the information "indicates that the United States person" is an "agent of a foreign power" or the "target of intelligence activities of a foreign power." NSA 2011 Minimization Procedure § 6(b). Agencies may also request that information about a given e-mail address or facility be forwarded on a regular basis. E. Storage and Querying Once communications are collected and retained or disseminated, each agency may establish databases to store those communications in its possession, and may query those stored communications to identify information of interest in connection with a particular investigation or agency function. The NSA, CIA, and FBI each maintain separate databases containing Section 702 information on which the agencies rely for their own purposes. PCLOB Report at 55-56. According to the PCLOB,. the NSA, for instance, 11 often 34 stores data acquired from multiple legal authorities in a single data repository.'' PCLOB at 55. The agency then "tags" the sources for each piece of information, and "has systems that prevent an analyst from accessing or querying data acquired under a legal authority for which the analyst does not have the requisite training." 12 Id. at 55-56. The CIA limits access to databases that contain Section 702-acquired information to only those agents who have had the requisite training. Id. at 55. And the FBI "stores electronic data obtained from traditional FISA electronic surveillance and physical searches ... in the same repositories as the FBI stores Section 702-acquired data." Id. at 59. An agent without requisite training would see whether a piece of Section 702-acquired information was responsive to her query, but she would not be able to view the actual underlying material without clearance. Id. 1 'Data is frequently reviewed through queries, which identify communications that have particular characteristics specified in the query, such as containing a particular name or having been sent to or from a partic ular e-mail address." Id. at 127. Colloquially, the parties (and those engaged in policy 12Each agency with access to Section 702 data provides training to personnel regarding the proper use of Section 702 material, as well as the agency's minimization procedures. See PCLOB Report at 53-54. The exact training procedures and who is trained may vary by agency. 35 debates about the program) have referred to this querying capability as "backdoor searches." Originally, the minimization procedures precluded analysts from searching terms associated with United States persons. See Classified Supplemental App'x at 121-22 In April 2011, the government sought approval for new minimization procedures that allowed the querying of terms related to United States persons. See Bates Decision, 2011 WL 10945618 at '7-8. The FISC ultimately approved the new procedures in October 2011 (i.e., after Hasbajrami's arrest) because they were "designed to yield foreign intelligence information.'' Id. at •7_ Querying, the court stated, "should not be problematic in a collection that is focused on non-United States persons located outside the United States and that, in the aggregate, is less 36 likely to result in the acquisition of nonpublic information regarding non­ consenting United States persons." Id. In a June 2014 letter to Senator Wyden, Deirdre Walsh, Director of Legislative Affairs for the Office of the Director of National Intelligence, stated that each of the three agencies allowed querying. The NSA could query Section 702-acquired information if it had a "reasonable basis to expect the query will return foreign intelligence,'' as could the CIA and the FBI. See Response to Question from the 5 June 2014 Hearing, Letter from Deirdre Walsh, Director of Legislative Affairs, to Senator Ron Wyden (June 27, 2014) ("Walsh Letter"); see also PCLOB Report at 57-58. The FBI is also allowed to query its own databases in such a way that these queries are "designed to find and extract evidence of a crime." Walsh Letter at 2. The FBI also will query previously acquired information from a variety of sources, including Section 702 when it "opens new national security investigations." Id. at 3. Recently, and after the time pericxl at issue in this case, Congress enacted the FISA Amendments Reauthorization Act of 2017, Pub. L. No. 115-118, 132 Stat. 3 (2018), codified at SO U.S.C. § 1881a. The act amended the FAA to require the agencies to develop "querying procedures" alongside their targeting and 37 minimization procedures and seek approval of all three sets of procedures yearly from the FISC. Congress also amended the FAA to require a court order in most cases where the FBI seeks to "access the contents of communications ... that were retrieved pursuant to a query made using a United States person query term that was not designed to find and extract foreign intelligence information.'' 50 U.S.C. § 1881a{f)(2)(A). Such querying standards were not in place when the surveillance at issue here occurred. Ill. The District Court's Denial of Hasbajrami's Suppression Motion As noted above, Hasbajrami moved to suppress "the fruits of all warrantless FAA surveillance." See Suppression Motion at 8. He also moved for discovery of the FISA and Section 702 information relevant to his case. After the district court reviewed the relevant materials ex parte and in camera, it denied the suppression motion. See United States v, Hasbajrami, 1:11-cr- 623, 2016 WL 1029500 (E.D.N.Y. Feb. 18, 2016) ("Suppression Decision''). 13 It treated the suppression motion as an as-applied challenge to the Section 702 surveillance used to support the government's initial application to the FISC, 13As addressed below, the district court announced its decision on February 15, 2015, in a text order on the docket, issued without an opinion. The redacted opinion was issued on the public docket in March 2016. 38 primarily addressing the issue of collection. Id. at *7. First, after noting the , distinction between PRISM and upstream collection, the court concluded that "[n]one of the Section 702 communications used in Title I and Title II FISA applications targeting the agent of the foreign power were 'about' communications" and therefore "the constitutionality of upstream collection [was] not at issue" in Hasbajrami's case. Id. at *6-7. The district court then turned to PRISM collection. Summarizing precedent, the court noted that the Fourth Amendment "does not constrain the government from collecting the communications of non-U.S. individuals targeted by Section 702 surveillance." Id. at .,.7, Although Hasbajrami was a legal perm.anent resident located in the United States, the court found that it was "non-U.S. persons who were the targets of Section 702 surveillance" and that Hasbajrami's e-mails were collected incidentally to the surveillance of individuals the court described as "legitimate targets of Section 702 surveillance." Id. The court concluded that the incidental interception of the communications of individuals in the United States was constitutional because the surveillance was "lawful in the first place - whether it is the domestic surveillance of U.S. persons pursuant to a warrant or the warrantless surveillance 39 of non-U.S. persons who are abroad - [and therefore] the incidental interception of non-targeted U.S. persons' communications with the targeted persons is also lawful." Id. at 11-9, The court did not address whether any inadvertent collection related to Hasbajrami. It also did not address the specifics of any querying as applied to Hasbajrami in particular, and there does not appear to have been any fact­ finding regarding the querying of previously-collected communications with identifiers related to Hasbajrami. Instead, the parties had raised querying within the context of whether the minimization procedures were reasonable, and the government argued that it was permitted to query whatever data it had lawfully collected even if it used identifiers it knew were associated with United States persons. See Gov't Mem. of Law at 71, United States v. Hasbajrami, 1:ll-c:r-623 (E.D.N.Y. filed Dec. 23, 2014), ECF No. 97. To the extent that the district court considered querying, then, it appeared to adopt the government's position, stating in a footnote: That the government is able to query information obtained under the PRISM program, i.e. lawfully­ obtained communications that were to or from legitimate targets, does not render the minimization procedures inadequate, as amici contend .... Here, once the government learned that the target was potentially 40 an agent of a foreign power, the government sought orders from the FISC for electronic surveillance and physical searches pursuant to Title I and Title III of FISA targeting an agent of a foreign power .... I agree with the government that "[i]t would be perverse to authorize the unrestricted review of lawfully collected information but then [] restrict the targeted review of the same information in response to tailored inquiries." Gov't Br. at 71-72. Suppression Decision, 2016 WL 1029500 at *12 n.20. As for Hasbajrami's request to provide discovery to properly-cleared defense counsel, the district court concluded that disclosure was unnecessary. Id. at "'14. Instead, its review was "relatively straightforward and not complex" and the district court was "able to evaluate the legality of the challenged surveillance without concluding that due process first warranted disclosure." Id. at *14 (citing United States v. Abu-Jihaad, 630 F.3d 102, 129 (2d Cir. 2010)). IV. Further Proceedings at the District Court The district court denied the motion to suppress in a text order dated February 20, 2015. The order stated that "[a]n opinion [would] follow," but that the motion would be denied as to "the fruits of the FAA surveillance, including the defendant's post-arrest statements." App'x at 16. The court noted that it would hold a conference and "inquire of the government whether it intends to offer once again the charge bargain that was previously accepted by the 41 defendant, and whether it has considered the prospect of allowing the defendant to enter such a plea pursuant to Rule ll(a)(2), reserving his right to seek appellate review of [the district court's] denial of the motion to suppress evidence." Id. The parties prepared for trial, but Hasbajrami in due course again pleaded guilty, this time to a two-count Superseding Information, which charged him with providing and attempting to provide material support to terrorists. According to the terms of the agreement, Hasbajrami: [A]gree[d] not to file an appeal or otherwise challenge ... the conviction or sentence in the event that the Court imposes a term of imprisonment of 180 months or below, with the sole and limit�d exception that, pursuant to Federal Rule of Criminal Procedure ll(a)(2), the defendant may appeal the District Court's February 20, 2015 denial of his motion to suppress evidence that was obtained or derived from surveillance conducted pursuant to the FISA Amendments Act of 2008, 50 U.S.C. §§ 1881a et seq. App'x at 48. Hasbajrami also consented to his removal, after serving his sentence, from the United States. The district court sentenced H asbajrami to a term of 180 months' imprisonment on Count One and 12 months' imprisonment on Count Two, each to run consecutively. 42 On March 8, 2016 - more than one year after it denied the motion - the district court issued a redacted opinion on the public docket explaining its reasons for denying suppression. Hasbajrami requested that the full decision be released to his cleared defense counsel, so that he might better prepare his appeal. The court (Dora L. Irizarry, C./.)14 held that PISA required redaction and that "Defendant's counsel are not entitled to view the Unredacted Opinion because releasing it would reveal classified foreign intelligence informatio n and circumvent FISA .... " United States v. Hasbajrami, l:11-cr-623, 2017 WL 3610595 at "'3 (E.D.N.Y. April 6, 2017). V. Proceedings on Appeal Hasbajrami timely filed two notices of appeal. The first addressed the district court's denial of Hasbajrami's motion to suppress; the second addressed the district court's decision to deny Hasbajrami' s counsel access to the unredacted and unmodified version of the suppression ruling. Both appeals were consolidated and argument was heard by this Court on August 27, 2018. At oral argument, the government was unable to represent whether or not identifiers related to Hasbajrami had been used in querying previously-acquired 14By this point, the case had been transferred to Chief Judge Irizarry following Judge Gleeson's resignation. 43 Section 702 surveillance databases. This Court therefore ordered the government to "identify(] the record evidence that supports the proposed factual inference that it conducted no queries or back.door searches of Section 702 material with regard to Hasbajrami before or leading to the FISA court's issuance of Title I and Title ID warrants with respect to Hasbajrami." Order, United States v. Hasbajrami, Nos. 15-2684, 17-2669 {2d Cir. Sept. 4, 2018), ECF No. 203. Both parties filed supplemental briefing, including an additional classified brief from the government (which was posted, heavily redacted, on the public docket for this appeal). DISCUSSION Hasbajrami primarily raises an as-applied challenge to the constitutionality of warrantless collection and review of his communications under Section 702. 15 As the PCLOB notes, judicial review of Section 702 surveillance presents particular challenges because the program: entails many separate decisions to monitor large numbers of individuals, resulting in the annual collection of hundreds of millions of communications of 15Hasbajrami also raises an alternative statutory argument, arguing that suppression was warranted because he claims the surveillance did not comply with the requirements of Section 702 itself. The Court has carefully considered the argument, in light of the classified record, and finds it without merit. 44 different types, obtained through a variety of methods, pursuant to multiple foreign intelligence imperatives, and involving four intelligence agencies that each have their own rules governing how they may handle and use the communications that are acquired. PCLOB Report at 86. In other words, review is difficult because we must consider those individual "separate decisions" within the context of the program as a whole.16 In this case, it is undisputed that the government possessed ample evidence obtained from surveillance authorized by a FISA warrant to convict Hasbajrami. The evidence that formed the basis for that warrant however, was obtained as a result of warrantless Section 702 surveillance of non-United States persons located abroad. Thus, the primary issue, affecting the bulk of the evidence against Hasbajrami, is whether the incidental collection of the communications of United' States persons, without a warrant, violates the Fourth Amendment. We conclude, as did the district court, that such collection is lawful. But that is not the only action involving Section 702 surveillance at issue here. 16When reviewing a district court's denial of a motion to suppress evidence, we review the court's legal determinations de novo and its factual findings for clear error. United States v. Boles, 914 F.3d 95, 102 (2d Cir. 2019). The issues on appeal are legal, and therefore our review here is de nova. 45 We must also address inadvertent collection, storage and querying, as each of these issues is raised by the record. The record is sufficient to permit us to answer the principal question before us: we conclude that the district court correctly held that the incidental collection in this case, and the government's use of the information thus collected, was lawful. The record also permits us to conclude that, even assuming that inadvertent collection of the communications of United States persons may in some circumstances violate the Constitution, the effect of any such collection in this case was harmless beyond a reasonable doubt. The absence of evidence in the record regarding , however, prevents us from determining the reasonableness of any such querying prior to the FISC's probable-cause finding, and from fully understanding how if at all the results of such querying affected the subsequent conduct of the investigation. As a result, we must remand for further proceedings and fact­ finding by the district court. 46 I. ..,Incidental" Collection The primary type of Section 702 collection we must address here involves "incidental" collection. The government was "targeting," within the meaning of Section 702, the accounts of individuals located abroad who were reasonably believed to be agents of terrorist organizations. In collecting communications from those accounts, the government collected e-mails between Hasbajrami and In reviewing Hasbajrami's suppression motion, the district court focused on this incidental collection, ultimately concluding that a warrant was not required and the government's actions were reasonable. On appeal, Hasbajrami and the amici argue that the Fourth Amendment bars the incidental collection of e-mails of individuals, like Hasbajrami, located in 47 the United States. First, they argue that surveillance of individuals in the United States is per se unreasonable if it is conducted without a warrant. They also focus on the specific attributes of warrants - the particularity requirement, the need for a neutral judicial forum and a finding of probable cause - and argue that Section 702,. the targeting and minimization procedures, and FISC oversight do not provide a substitute procedure sufficient to satisfy the Fourth Amendment. According to Hasbajrami, the broad scope of Section 702's surveillance and the government's failure to seek a warrant or its equivalent render the program unconstitutional as applied to him and therefore requires the suppression of evidence acquired under the program. We disagree. In addressing the issues before us, we adopt an approach similar to that employed by the United States Court of Appeals for the Ninth Circuit in United States v. Mohamud, 843 F.3d 420 (9th Cir. 2016). We must first decide whether a warrant is required for the government's incidental collection of the communications of United States persons. We conclude that a warrant is not required for such collection. But "[e]ven if a warrant is not required, a search is not beyond Fourth Amendment scrutiny; for it must be reasonable in its scope and manner of execution." Maryland v. King, 569 U.S. 435, 448 (2013); see also 48 Mohamud, 843 F.3d at 441. We further conclude that the incidental collection of Hasbajrami's e-mails was reasonable. A. No Warrant was Required We conclude that a warrant is not required based on two well-established principles of Fourth Amendment law. First, the Fourth Amendment does not apply extraterritorially to the surveillance of persons abroad, including United States citizens. Second, law enforcement officers do not need to seek an additional warrant or probable cause determination to continue surveillance when, in the course of executing a warrant or engaging in other lawful search activities, they come upon evidence of other criminal activity outside the scope of the warrant or the rationale justifying the search, or the participation of individuals not the subject of that initial warrant or search. First, the Fourth Amendment (and, in particular, its warrant requirement) does not apply extraterritorially. See United States v. Verdugo-Urquidez, 494 U.S. 259 (1990). In Verdugo-Urquidez, agents from the United States Drug Enforcement Agency, working alongside Mexican law enforcement, raided without a warrant properties in Mexico owned by the defendant. Id. at 262-63. The agents believed that the defendant was the leader of a narcotics smuggling ring and they seized 49 documents and "a tally sheet" detailing quantities of drugs possessed and transported. Id. Prior to trial, the defendant sought suppression of the evidence, arguing that the agents should have sought a warrant before searching his property. Id. at 263-64. The Supreme Court held that suppression of the evidence was not required, because the Fourth Amendment does not apply to extraterritorial actions by law enforcement, at least where the "[the defendant] was a citizen and resident of Mexico with no voluntary attachment to the United States, and the place searched was located in Mexico." Id. at 274-75. "Under these circumstances," the Court held, "the Fourth Amendment ha[d] no application." Id. at 275. This Court has since extended Verdugo-Urquidez's holding to conclude that the Warrant Oause of the Fourth Amendment does not apply to the surveillance of United States citizens abroad. See In re Terrorist Bombings, 552 F.3d 157, 171 (2d Cir. 2008). The defendant in that case, a United States citizen with a home in Kenya, had "urged the suppression of the evidence resulting from the ... [electronic] surveillance of his Kenyan telephone lines'' because it was not authorized by a valid warrant or, alternatively, because the surveillance was 50 unreasonable. Id. at 160. This Court held that "the Fourth Amendment's Warrant Clause has no extraterritorial application and that foreign searches of U.S. citizens conducted by U.S. agents are subject only to the Fourth Amendment's requirement of reasonableness." Id. at 171. \Ve determined that the searches in that case were ultimately reasonable and therefore suppression of the evidence was not required. Verdugo-Urquidez and In re Terrorist Bombin&s make it dear that the Fourth Amendment does not requirl:! the government to obtain a warrant before collecting the e-mails of foreign individuals abroad. Nor can there be any question that the electronic surveillance of foreign individuals located abroad who are reasonably believed to hold themselves out as agents and - of terrorist organizations targeting the United States is reasonable within the meaning of the Fourth Amendment. Efforts to monitor the activities of such individuals to detect and forestall possible te rrorist attacks on this country present a paradigm case of a compelling government interest. The protections extended by the Fourth Amendment to foreign individuals abroad, if any, are minimal and plainly outweighed by the paramount national interest in preventing foreign attacks on our nation and its people. 51 But while the warrantless surveillance of foreign individuals abroad under the circumstances that existed here presents no cognizable constitutional problem, we must nevertheless still consider what protections the Fourth Amendment provides individuals located within the United States who communicate with the foreign individuals abroad lawfully targeted under Section 702. The second Fourth Amendment principle implicated by incidental collection speaks directly to that concern. The Fourth Amendment generally is not violated when law enforcement officers, having lawfully undertaken electronic surveillance, whether under the authority of a warrant or an exception to the warrant requirement, discover and seize either evidence of criminal activity that they would not have had probable cause to search for in the first place, or the relevant conversations of an individual they did not anticipate or name in a warrant application. See, e.g., United States v. Donovan, 429 U.S. 413,427 & n.15 (1977) (noting, as to domestic wiretaps, "[i]t is not a constitutional requirement that all those likely to be overheard engaging in incriminating conversations be named."); United States v. Figueroa, 757 F.2d 466,472 (2d Cir. 1985) ("More particularly, the mere fact that Title III allows interception of 52 conversations of 'others as yet unknown' do es not render the statute unconstitutional on its face as authorizing a general warrant.''). This line of cases has come to be known as the "incidental overhear" doctrine. See, e.g., Suppression Decision, 2016 WL 1029500 at ""9 (noting that "[ c]ourts have long dealt with the issue of incidental interception of non-targeted persons' communications" and collecting cases). Courts have repeatedly held that law enforcement agents do not need to obtain a separate warrant to collect conversations of persons as to whom probable cause did not previously exist with individuals whose oral or wire communications are being collected through a lawful wiretap or bug, where those conversations on their face contain evidence of criminal activity.17 See, e.g., Donovan, 429 U.S. at 427 & n.15; Figueroa, 757 F.2d at 472; see also In re Certified Question of Law, 858 F.3d 605 (FISA Ct. Rev. 2016) (finding incidental collection of content information reasonable where warrant was obtained only for non-content dialing information); United States v. 17The "incidental overhear" doctrine is closely related to the "plain view" doctrine applied in connection with physical searches. See, e.g., Coolidge v. New Hampshire, 403 U.S. 443, 465-67 (1971) (describing plain view doctrine and noting that "[t]he doctrine serves to supplement the prior justification - whether it be a warrant ... , hot pursuit, search incident to lawful arrest, or some other legitimate reason for being pr esent unconnected with a search directed against the accused - and permits the warrantless seizure."}. 53 Stewart, 590 F.3d 93, 129 (2d Cir. 2009) (concluding. in challenge to Title I FISA surveillance, that "[b]ecause Stewart's co-conspirators were targeted pursuant to proper procedures, the Fourth Amendment did not require that Stewart also be identified or described as a target in order for her intercepted conversations to be used in a criminal prosecution.'') (internal citation omitted). Combining these two Fourth Amendment principles, the government may lawfully collect, without a warrant and pursuant to Section 702, the e-mails of foreign individuals located abroad who reasonably appear to constitute a potential threat to the United States and, once it is lawfully collecting those e- mails, it does not need to seek a warrant, supported by probable cause, to continue to collect e-mails between that person and other individuals once it is learned that some of those individuals are United States citizens or lawful permanent residents, or are located in the United States. Accord Mohamud, 843 F.3d at 441; see also United States v. Mohammad, 339 F. Supp. 3d 724, 748-49 (N.D. Ohio 2018) (applying Verdugo-Urquidez and rejecting Fourth Amendment challenge to Section 702 surveillance where, despite marriage to United States citizen, defendant lived abroad at time of offense); United States v. Muhtorov, 187 F. Supp. 3d 1240, 1258 (D. Colo. 2015) (rejecting facial and as applied challenge to 54 incidental collection under Section 702 and concluding that a warrant was not acquired and search as reasonable). That is the case even if the government would have needed, but did not have, a warrant or probable cause had it sought to collect the e-mails of the American third party in the first instance. Cf. In re Certified Question, 858 F.3d at 604 (framing constitutional issue as whether incidental content collection rendered primary dialing information collection unreasonable, not whether warrant would have been required for content collection in its own right). Objecting to this conclusion, Hasbajrami and amici advance several arguments seeking to apply the warrant requirement to Hasbajrami's case. Each is unavailing. First, they argue that Verdugo-Urquidez does not control the outcome here because Section 702 collection occurs in the United States. Practically speaking, Section 702 surveillance could occur only within the United States, as the agencies can compel only ISPs located in the United States to provide e-mails. But Fourth Amendment doctrine relating to wire or electronic communication does not focus on the location where the communication takes place. Katz v. United States, 389 U.S. 347 (1967), the seminal Supreme Court 55 decision on the interception of such communication, holds that a person's privacy interest in his or her communications does not depend on whether the government ph ysically intrudes into a physical space in which that person has a property interest or an expectation of physical privacy. What matters, and what implicates the protection of the Fourth Amendment, is the expectation of privacy in the communications themselves, and therefore a warrant is required to seize even those communications made in a public telephone booth. Conversely, by the same reasoning, a person who does not have a Fourth Amendment-protected privacy interest in his communications, such as a foreign national resident abroad, does not acquire such an interest by reason of the physical location of the intercepting device. At least where the communication is collected essentially in real time as it occurs, the targeted communication, whether conducted over telephone wires or via the internet, occurs in the relevant sense where the person whose calls or e-mails are being intercepted is located, regardless of the location of the means used to intercept it. Second, Hasbajrami argues that the surveillance cannot be properly considered "incidental" where the government can or even does expect to collect conversations with people with ties to the United States or located within its 56 borders. While we have concerns, expressed below, about the potential scope of Section 702 surveillance, those concerns are less applicable where, as here, collection and review are occurring nearly contemporaneously and that collection is ancillary to lawful surveillance of a permitted target. In the nahlre of law enforcement, there is always a possibility that the collection of evidence against a person who there is already probable cause to believe is involved in criminal activity or who is otherwise legitimately subject to surveillance will also develop information about others not previously reasonably suspected of wrongdoing. There is no contention here that the Section 702 surveillance was undertaken as a pretext to collect the communications of Hasbajrami, or of any other identified United States person or person located in the United States. That the overall practice of surveilling foreigners abroad of interest to the legitimate purpose of gathering foreign intelligence information may predictably lead to the interception of communications with United States persons no more invalidates that practice, or requires the government to cease its surveillance of the target until a warrant is obtained, than the general foreseeability of intercepting communications with previously unknown co~conspirators undermines the inadvertent overhear doctrine in ordinary domestic criminal wiretapping. 57 11 Finally, Hasbajrami and amid seek to distinguish the incidental overhear" line of cases, noting that in those cases there was already an initial warrant supported by probable cause. They agree, however, that "the incidental overhear cases simply stand for the proposition that the government need not obtain multiple warrants to intercept protected communications." Brief of Amici Curiae American Civil Liberties Union and Electronic Frontier Foundation at 15, United States v. Hasbajrami, No. 15-2684 (2d Cir. Oct. 23, 2017} (emphasis in original). That is exactly the point here: once that initial surveillance is rendered lawful by a warrant, a FISC order, or some other exception to the warrant requirement, an additional warrant is not necessary in order to collect the calls or e-mails of third parties. As the district court recognized, once the surveillance was "lawful in the first place -whether it is the domestic surveillance of U.S. persons pursuant to a warrant or the warrantless surveillance of non-U.S. persons who are abroad - the incidental interception of non-targeted U.S. persons' communications with the targeted persons is also lawful." Suppression Decision, 2016 WL 1029500 at ""9. The reason why the initial surveillance was lawful does not matter to this conclusion. 58 Accordingly, the incidental collection of United States persons' e-mails during lawful foreign intelligence surveillance of foreigners located abroad is not per se unreasonable because the collection is done without a warrant. B. Incidental Collection of E-mails under Section 702 is Reasonable Even absent a warrant requirement, however, the government's action must still be reasonable, at least insofar as it affects United States persons, to be consistent with the Fourth A mendment. King, 569 U.S. at 448. "To determine whether a search is reasonable under the Fourth Amendment, we examine the totality of the circumstances to balance, on the one hand, the degree to which it intrudes upon an individual's privacy and, on the other, the degree to which it is needed for the promotion of legitimate government interests." ln re Terrorist Bombings, 552 F.3d at 172 (internal quotation marks omitted). For the purposes of Hasbajrami's appeal, we may assume that a United States person ordinarily has a reasonable expectation in the privacy of his e-mails sufficient to trigger a Fourth Amendment reasonableness inquiry when the government undertakes to monitor even foreign communications in a way that can be expected to, and in fact does, lead to the interception of communications with United States persons. See, e.g., United States v. Warshak, 631 F.3d 266, 285-86 59 (6th Cir. 2010) (analogizing between letters and e-mails and finding reasonable expectation of privacy). In other words, we can assume that the government may not eavesdrop, without reasonable justification, on the conversations of United States persons (even abroad) with foreign nationals, simply because the United States person is interacting with a foreigner. Even assuming that a United States person might be understood to take some risk that the person with whom he or she is communicating is under surveillance, it does not follow that an American communicating with a foreign national must take the risk that the person with whom he is communicating is subject to unreasonable, or indiscriminate, electronic surveillance, or that communicating with foreigners subjects the American national himself or herself to continuing surveillance. But such a privacy interest can be outweighed by the government's "manifest need to monitor'' the communications of foreign agents of terrorist organizations operating abroad, and this need outweighs that interest in privacy and makes the incidental collection of communications between such foreigners and United States persons reasonable. In re Terrorist Bombings, 552 F.3d at 172. Even in the context of conventional warfare, identifying domestic agents of foreign powers is a principal concern of intelligence-gathering. The need to 60 identify potential domestic co�conspirators of hostile foreign persons or groups is even greater in the context of informal non-state terrorist organizations and movements. The recruitment of persons inside the United States or the placement of agents here to carry out terrorist attacks is one of the very threats that make it vital to surveil terrorist actors abroad. The communications of terrorist operatives abroad with persons inside the United States is thus of particular importance, and at least as important as monitoring the communications of foreign terrorists abroad among themselves. 18 The logic of this conclusion is dear and compelling. If it is reasonable - and indeed necessary to the national security - for intelligence agencies to monitor the communications of suspected forei gn terrorists abroad, the need to keep track of the potential threat from abroad does not lessen because some of the suspect's contacts turn out to be American nationals, or foreign nationals located within the United States. And when the conversations being monitored 18The same reasoning defeats any argument that such monitoring should be limited to the acquisition of forei gn intelligence, and that communications collected for that purpose should not be made available to domestic law enforcement agencies. There is little point in having intelligence agencies collect information abroad if those agencies are not able to share what they learn with domestic law enforcement when the information they acquire points to ongoing or impending criminal activities inside our borders. 61 constitute evidence of criminal conspiracies between the foreign operative and someone located within the United States, the urgency becomes greater, not less. The logic of the plai n view and inadvertent overhear cases fully applies: when an officer executing a lawful search or electronic surveillance warrant, or otherwise engaged in a lawful search, comes upon evidence of a previously unsuspected crime, or learns of the involvement of a previously unsuspected individual, the officer is not required to stop and obtain a new warrant to seize the item or to continue monitoring the phone line for which the warrant was obtained. The seizure of evidence of a crime in plain view without a warrant is a reasonab le seizure. In the same way., when evidence of a potential crime involving an American comes to light during the lawful surveillance of a foreign operative abroad, it is entirely reasonable within the meaning of the Fourth Amendment for the government to continue monitoring the conversations of that operative with the American as well as with his or her other associates. 1'.I 19 Of course, if the government wishes to expand the investigation to monitor the communications of the newly discovered United States-connected suspect, it - would be required to obtain a conventional Title III or traditional PISA warrant 62 In balancing Hasbajrami's privacy interest with the government's concern for national security, then1 we conclude that the totality of the circumstances here weighs in the government's favor. The incidental collection of communications between targeted foreigners abroad and United States persons or persons in the United States is thus reasonable. For similar reasons, when the intelligence information properly collected raises reasonable grounds to believe that a crime is being committed or planned in the United States, dissemination of the information to a domestic law enforcement agency such as the FBI is also reasonable. In summary, the district court reached the correct conclusions regarding incidental collection: the initial targeting of individuals without ties to the United States and located abroad is lawful; there is no need for a wanant in order to collect incidental communications by United States persons to and from those individuals; and both the collection of such communications and the dissemination of information from such collection about potential criminal actions within the country to domestic law enforcement are reasonable under the Fourth Amendment. Were such incidental collection the only Section 702 material relevant to Hasbajramts motion, we would simply affirm the district 63 court's ruling. But, as the record rurrently stands, we must also consider additional issues. II. "Inadvertent" Collection The district court's ruling on the suppression motion did not address whether any e-mail accounts of United States persons or individuals within the United States, including Hasbajrami, had been "inadvertently" targeted, that is, targeted by mistake under the presumption that an address was controlled by a non-United States person. Upon reviewing the classified record, in particular its ex parte proceedings under the Classified Information Procedures Act ("CIP A"), 18 U.S.C. app. 3, § 1 et seq., it is clear that the district court was made aware of one instance of the direct targeting of an e-mail account controlled by a United States person that resulted in the collection of Hasbajrami's communications. Before the incidental collection discussed above, the NSA had directly targeted at least one such e-mail address. Like the later incidental collection, the NSA had originally been monitoring communications with individuals it reasonably believed were non-United States persons located abroad, and as a result discovered an e-mail from the United States person. At that time, however, NSA analysts concluded, wrongly, that the 64 account holder was not a United States person. The NSA therefore tasked the account (a different account than those that were the subject of incidental collection detailed above) in its own right, and collected communications from the account for several weeks. The agency eventually detasked the account after it concluded it was not yielding significant intelligence information, but it did not initially purge the information because it did not discover until later that the account holder was a United States person. The related Section 702-acquired material, which included communications to and/or from Hasbajrami, stayed in NSA databases, however, and was not disseminated to domestic law enforcement, until the agency conducted a search of these databases in 2014 following the initiation of Hasbajrami's prosecution. The inadvertent collection of communications raises complicated questions. First, as a statutory matter, Section 702 prohibits the targeting of e­ mail accounts that the government knows to be maintained by United States persons. See 50 U.S.C. § 1881a(b). But the statute thus appears to prohibit only knowing or intentional targeting, and not to address situations where the government is mistaken, reasonably or unreasonably. Does the express prohibition of targeting accounts known to be those of United States persons 65 implicitly authorize the targeting of any account not known with certainty to be that of a United States person? If there is evidence of a high likelihood that the account belongs to a United States person and the government proceeds to target it without taking steps to investigate further, does the willful blindness standard, which equates such deliberate indifference to actual knowledge in many legal contexts, apply? Cf. Global-Tech Appliances, Inc. v. SEB S.A., 563 U.S. 754, 766-69 (2011) (discussing willful blindness doctrine). Second1 the Fourth Amendment calculus for such collection would be different than the one employed in considering incidental collection. Incidental collection is justified because the "target" of the surveillance cannot rely on the Fourth Amendment's protections, as discussed above. But a United States citizen or lawful permanent resident, located in the United States, assuming a reasonable expectation of privacy, would be protected by the Fourth Amendment. Is the Fourth Amendment prohibition of "unreasonable" searches violated if the government unreasonably (recklessly or negligently) concludes that the targeted account is that of a foreigner located abroad? Is it permissible for the government to adopt a presumption that, under all circumstances or in the presence of one or more key indicia, an account holder whose identity is 66 unclear should be treated as foreign? Would the later discovery that the account did indeed belong to a United States person require the minimization, or the suppression in a criminal case, of inadvertently collected conversations? A district court reviewing a motion to suppress evidence inadvertently collected (or derived from inadvertent collection) would have to address these issues, and perhaps others, in deciding whether the government's reliance on inadvertent collection in an investigation or prosecution was reasonable within the meaning of the Fourth Amendment. But we need not decide those questions today because we are satisfied that any inadvertent collection disclosed to the district court was harmless. The interception of communications from the inadvertently targeted account was brief, lasting only approximately two weeks. The materials collected, whatever they were, were not used in applying for the FISA warrant - indeed, their very existence seems to have been unknown to anyone involved in the criminal investigation of Hasbajrami, as the inadvertent targeting of the account in question was not even discovered by th e government until well into the prosecution of this case. And finally, the collection was terminated because the government itself determined that nothing of any intelligence value was being 67 learned. Presumably that conclusion would not have been reached if the collected conversations were indicative of criminal terrorist plots, or were of evidentiary value to a criminal investigation. Thus, even assuming arguendo that there was some legal infirmity in the decision to begin collection despite uncertainty about the status of the account, or to continue it once at least some evidence pointing to a possible United States source for the account was discovered, we conclude, even in the context of a conditional guilty plea, that the failure to suppress the results of that collection was harmless beyond any reasonable doubt. III. Querying There is a third issue in this case, however: the storage of Section 702 information in databases and the subsequent querying of those databases by the government. The district court did not make any findings regarding whether the NSA, the FBI or any other agency queried databases with regard to Hasbajrami prior to the FISC order. Instead, it appeared to accept the government's argument, framed within the context of a discussion of whether the minimization procedures provided adequate protections so as to make collection reasonable, that the government could freely query information it had lawfully acquired 68 without further Fourth Amendment inquiry. See Suppression Dedsion, 2016 WL 1029500 at *12 n.20 ("I agree with the government that it would be perverse to authorize the unrestricted review of lawfully collected information but then restrict the targeted review of the same information in response to tailored inquires.") (internal alterations and quotation marks omitted). The government renewed this argument on appeal. FoUowing oral argument, during which the government would neither confirm nor deny whether it had queried any databases of Section 702-acquired information, this Court ordered further briefing. The government Cov't Supplemental Classified Br. at 6-7 (emphasis added). 69 Like inadvertent collection, the storage and querying of information raises challenging constitutional questions, to which there are few dear answers in the case law. Cf. In re Directives, 551 F.3d at 1015 (dismissing petitioner's concerns, under the PAA, because the "government assures us that it does not maintain a database of incidentally collected information from non-targeted United States persons, and there is no evidence to the contrary."). The issue was not addressed by the Ninth Circuit inMohamud, which explicitly left open the question of whether "the incidental overhear doctrine permits the unconstitutional and widespread retention and querying of the incidentally collected information," stating that the issue was "not before [the court]." 843 F.3d at 440 n.24. The district court in Mohamud did reach the question, however, and it concluded that the "subsequent querying of a§ 702 collection, even if U.S. person identifiers are used, is not a separate search and does not make § 702 surveillance unreasonable under the Fourth Amendment." United States v. Mohamud, No. 3:10-cr-475-KI-1, 2014 WL 2866749, at *26 (D. Or. June 24, 2014), affd, 843 F.3d 420 (9th Cir. 2016). We do not find that logic persuasive. Storage has little significance in its own right: the lawfully-collected communications, even of United States persons, continue to serve the same foreign intelligence purpose in the continued 70 surveillance of a foreign operative, whether his interlocutor is a United States person or a citizen and resident of some other country. The material is justifiably retained, not to keep tabs on a United States person, but to keep tabs on the non­ United States person abroad who has been targeted.20 But querying that stored data does have important Fourth Amendment implications, and those implications counsel in favor of considering querying a separate Fourth Amendment event that, in itself, must be reasonable. Our reasoning is based on three considerations. First, courts have increasingly recognized the need for additional probable cause or reasonableness assessments to support a search of information or objects that the government has lawfully collected. It is true that the FBI does not need an additional warrant to go down to its evidence locker and look through a box of evidence it collected from a crime scene. But lawful collection alone is not always enough to justify a future search. In Riley v. California, the Supreme Court held that a warrant was necessary to search a cell phone, even when that cell phone was lawfully seized pursuant to 20The considerations might be different if the storage involved data responsive to a warrant and retained for the purpose of a domestic criminal prosecution. This Court, sitting en bane, considered similar issues in United States v. Ganias, 824 F.3d 199 (2d Cir. 2016), although we ultimately did not need to decide them. 71 a search incident to a lawful arrest. 573 U.S. 373, 401 (2014). Several circuit court decisions have reached similar conclusions. In United States v. Sedaghaty, for instance, the government had searched a defendant's home pursuant to a warrant focused on tax violations. 728 F.3d 885,912 (9th Cir. 2013). Agents seized nine computers, which forensic experts searched with "an evolving list of search terms" in order "to comb through the computers for useful materials," eventually finding evidence confirming the defendant was supporting Chechen terrorist groups. Id. The Ninth Circuit concluded that the searches beyond the scope of the warrant were improper, noting that the government "should not be able to comb through [the defendant's] computers plucking out new forms of evidence that the investigating agents have decided may be useful" after it failed to find evidence of willfulness regarding the tax returns. Id. at 913. To do so required a new warrant, even though the government already had access to the machines and had lawfully seized them. See also United States v. Runyan, 275 F.3d 449, 464-65 (5th Cir. 2001) (finding that police exceeded the scope of a private search when they "examined disks that the private searchers did not examine" and would have required a warrant to do so); United States v. Mulder, 808 F.2d 1346, 1349 (2d Cir. 1987) (holding that a separate warrant was needed to test 72 packages in suitcase for drugs, even though the suitcase was lawfully sei.1.ed via private search). Second, Section 702 is sweeping in its technological capacity and broad in its scope. In the case of the incidental collection discussed above, - was collecting and reviewing e�mails for its own foreign intelligence purposes in , and reporting �vidence that it obtained suggesting on-going criminal activity in the United States. Such activity is closely analogous to precedents drawn from traditional domestic criminal wiretapping. As discussed above, it is not difficult to conclude that, like "incidentally overheard" criminal conversations and evidence of crimes seized in plain view, the collection and use of information obtained in this way is reasonable within the meaning of the Fourth Amendment. But the vast technological capabilities of the Section 702 program, estimated by the PCLOB as totaling nearly 250 million e-mails annually by 2011 and likely larger numbers since then, may mean that analysts are not reviewing each of those e-mails contemporaneously with their collection. PCLOB Report at 116, 128-29. If such a vast body of information is simply stored in a database, available for review by request from domestic law enforcement agencies solely 73 on the speculative possibility that evidence of interest to agents investigating a particular individual might be found there, the program begins to look more like a dragnet, and a query more like a general warrant, and less like an individual officer going to the evidence locker to check a previously-acquired piece of evidence against some newfound insight The Supreme Court has expressed increasing concern about the interaction between Fourth Amendment precedent and evolving government technological capabilities. Riley rested in part on the fact that "[c]ell phones ... place vast quantities of personal information literally in the hands of individuals." 573 U.S. at 386. "A search of the information on a cell phone [ therefore] bears little resemblance to the type of physical search considered" in past cases. Id.; see also Ganias, 824 F.3d at 217-18 (noting privacy implications of expansive technology and data storage). And in Carpenter, the Court concluded that a warrant (or a valid substitute) was required to acquire cell-site records, even though they were stored by a third party and under traditi onal Fourth Amendment doctrine a cellphone user would not have an expectation of privacy in such information: We decline to grant the state unrestricted access to a wireless carrier's database of physical location information. In light of the deeply revealing nahlre of [this information], its depth, breadth, and 74 comprehensive reach, and the inescapable and automatic nature of its collection, the fact that such information is gathered by a third party does not make it any less deserving of Fourth Amendment protection. The Government's acquisition of the cell-site records here was a search under that Amendment. Carpenter v. United States, 138 S. Ct. 2206, 2223 (2018). Third, as a practical matter, querying is problematic because it may make it easier to target wide-ranging information about a given United States person at a point when the government knows it is investigating such a person. Section 702 forbids the government from targeting a non-United States person as a backdoor way of targeting a United States person. 50 U.S.C. § 1881a(b). But, as detailed above, in the course of its intelligence gathering operations, the NSA may have collected all sorts of information about an individual, the sum of which may resemble what the NSA would have gathered if it had directly targeted that individual in the first place. To permit that information to be accessed indiscriminately, for domestic law enforcement purposes, without any reason to believe that the individual is involved in any criminal activity and or even that any information about the person is likely to be in the database, just to see if there is anything incriminating in any conversations that might happen to be there, would be at odds with the bedrock Fourth Amendment concept that law 75 enforcement agents may not invade the privacy of individuals without some objective reason to believe that evidence of crime will be found by a search. Treating querying as a Fourth Amendment event and requiring the query itself to be reasonable provides a backstop to protect the privacy interests of United States persons and ensure that they are not being improperly targeted. Fourth, much may dep end on who is querying what database. There is a potentially significant difference between, for example, the FBI querying its own database and the FBI requesting that the NSA query its far larger archive of collected communications, collected pursuant to a broader mandate. As we understand the public sources of information about the collection and use of Section 702 material, the FBI maintains its own records of communications provided to it by the NSA. See PCLOB Report at 58-59. Such communications presumably were provided because review of the material properly collected by the NSA under Section 702 uncovered evidence of criminal activity (relating to terrorism or otherwise), and were appropriately communicated to domestic law enforcement. Just as the FBI may act on such information where it requires immediate criminal investigation, it may well be appropriate for the agency to retain the information and store it for later review when other legitimate 76 evidence or leads make that information relevant to an on-going investigation. Such a review of the agency's own files is arguably analogous to traditional law enforcement techniques; evidence lawfully collected does not always accumulate to a sufficient quantity to warrant an immediate arrest or indictment, but may be retained and later reviewed when additional evidence is developed. FBI queries directed to a larger archive of millions of communications collected and stored by the NSA for foreign intelligence purposes, on the chance that something in those files might contain incriminating information about a person of interest to domestic law enforcement, raise different concerns. What kinds of querying, subject to what limitations, under what procedures, are reasonable within the meaning of the Fourth Amendment, and when (if ever) such querying of one or more databases, maintained by an agency of the United States for information about a United States person, might require a warrant, are difficult and sensitive questions. We do not purport to answer them here, or even to canvass all of the considerations that may prove relevant or the various type s of querying that may raise distinct problems. Indeed, we cannot do so on the sparse record presented. We do not know what databases were queried by whom, for what reasons, what (if any) 77 information was uncovered by such queries, or what (if any) use was made of any information uncovered. The government has represented that no information derived from any such queries was presented to the FISC to obtain the FISA warrant, but has not addressed whether any such information contributed to the investigation in other ways. Given these considerations, the district court here must conduct an inquiry into whether any querying of databases of Section 702-acquired information using terms related to Hasbajrami was lawful under the Fourth Amendment. Fo r today we need only reiterate that "the ultimate touchstone of the Fourth Amendment is reasonableness." Riley, 573 U.S. at 381; cf Abu 4Jihaad, 630 F.3d at 121-22 (stating that, even in the application of the warrant requirement, the requirement is "flexible, so that different standards may be compatible with the Fourth Amendment in light of the different purposes and practical considerations at issue.") (internal quotation marks and citations omitted). We cannot, and should not, go further, pending development of a more complete record by the district court on remand, and an assessment by the 78 district court as to whether whatever was done was consistent with the Fourth Amendment and whether, if there was any illegality, any evidence should have been suppressed in response to Hasbajrami' s motion.21 IV. Hasbajrami's Conditional Plea and Resolution of the Motion to Suppress As addressed above, there is still an open issue as to what queries of Section 702-acquired information occurred in this case, whether any such queries were reasonable and, if unreasonable, whether the queried information tainted the application before the FISC or in some other way would lead to the suppression of any evidence. But in its post•argument briefing, the government argues that even if it did query Section 702 databases, that action ultimately could not matter because the 11On November 14, 2019, Hasbajrami filed a Rule 280) letter alerting this Court to three recently declassified opinions from the FISC and FISCR. See In re DNI/AG 702(h) Certifications 2018, 941 F.3d 547 (FISA Ct. Rev. 2019); Redacted (FISA Ct. Sep. 4 , 2019); Redacted, 2018 WL 9909971 (PISA Ct. O ct. 18, 2018). Based on our review, we do not believe that these opinions substantively affect our decision because, even to the extent that their approach differs from ours, they are not binding on this Court. Since we are remanding for the district court to further assess this issue with the benefit of a more complete record, we decline to engage further at this time. We did not find it necessary to review the unredacted versions of these opinions in reaching this conclusion and, therefore, Hasbajrami's request for access to the unredacted versions of these opinions is DENIED. 79 communications collected as a result of incidental collection would provide an independent source sufficient to support the FISC's probable cause determination. Gov't Supplemental Classified Br. at 9 (arguing that "this Court's analysis should be limited to alleged 'searches' where a causal link can be drawn between the search and the acquisition of the evidence that Hasbajrami seeks to suppress."). The government relies primarily on Murray v. United States, 487 U.S. 533 (1988). In Murray, federal law enforcement agents surveilling the defendant witnessed him drive into a warehouse in South Boston. Id. at 535. Agents arrested the defendant and a co-conspirator after they drove away from the warehouse and, upon arrest, the agents discovered marijuana in the defendant's truck. The agents then forced entry into the warehouse, where they "observed in plain view numerous burlap-wrapped bales that were later found to contain marijuana. They left without disturbing the bales, kept the warehouse under surveillance," and re-entered only after obtaining a warrant. Id. In applying for the warrant, however, the agents did not advise the court of their prior entry; they also did not rely on their observations of the contents of the warehouse in order to establish probable cause. Id. at 536. The Supreme Court held that 80 suppression of the evidence eventually seized from the warehouse would not be required "if the warrant-authorized search of the warehouse was an independent source of the challenged evidence.'' Id. at 543-44. Although "[k)nowledge that the marijuana was in the warehouse was assuredly acquired at the time of the unlawful entry ... it was also acquired at the time of entry pursuant to the warrant, and if that later acquisition was not the result of the earlier entry there is no reason why the independent source doctrine should not apply. 1' Id. at 541. Even assuming the government was querying databases simultaneously with its incidental collection activities, according to the government's position its agents would be analogous to the agents in Murray. Their subjective understanding of the evidence might have been affected by the fruits of an unreasonable search, and had they relied on that evidence in support of a warrant application they might not be able to use the evidence obtained by executing that warrant. But, according to the government, if the information they placed before the FISC, and that court's subsequent probable cause determination, rested on other information, that "later acquisition was not the result of the earlier [search]1' and so "there is no reason why the independent source doctrine should not apply." Id. at 541. 81 We cannot apply the independent source doctrine on the record currently before us. Had this case gone to trial, our task would be significantly different. Under those circumstances, we could have undertaken to trace, as the Ninth Circuit did in Mohamud, 843 F .3d at 438 & n.21, individual pieces of evidence that had actually been presented to the jury at that trial in order to assess whether those pieces of evidence had been obtained consistent with the Fourth Amendment. And if individual pieces of evidence needed to be suppressed, the Court could then decide whether the admission of any given piece of evidence was harmless when compared to all the legally obtained evidence that was ultimately presented at trial. But we are not reviewing the acquisition of evidence used at a trial. Rather, Hasbajrami's appeal reaches us following a conditional plea made pursuant to Rule ll(a}(2) of the Federal Rules of Criminal Procedure. Rule l l(a)(2) provides that: With the consent of the court and the government, a defendant may enter a conditional plea of guilty or nolo contendere, reserving in writing the right to have an appellate court review an adverse determination of a specified pretrial motion. A defendant who prevails on appeal may then withdraw the plea. 82 According to the Advisory Committee Notes to the 1983 Amendments, conditional pleas should be permitted 11only when the decision of the court of appeals will dispose of the case either by allowing the plea to stand or by such action as compelling dismissal of the indictment or suppressing essential evidence." See also United States v. Bundy, 392 F.3d 641, 647-48 {4th Cir. 2004). The classic example of a case in which that standard is met is a narcotics case in which the evidence sought to be suppressed is the very basis of the charge. The suppression of the evidence would end the case; if the evidence is admissible, guilt is assured; if not, no evidence of guilt remains. The situation is more problematic and complicated, however, where the suppression of some but not all of the evidence in the case is a possible outcome. Our sister circuits have applied a harmless error calculation when evaluating whether an opportunity to withdra,w a plea is a necessary remedy after it is determined on appeal that the challenged district court ruling was, in whole or in part, erroneous. See, e.g., United States v. Lustig, 830 F.3d 1075, 1086 (9th Cir. 2016); United States v. Rivera-Nevarez, 418 F.3d 1104 (10th Cir. 2005) (affirming conviction on harmless error where conviction was upheld on 83 grounds not considered by district court). 22 Those courts have applied the harmless error rule by asking "whether the erroneous suppression ruling could have affected [the defendant's] decision to plead guilty.'' Lustig, 830 F.3d at 1086. But the record here is murky. It is clear that the presence or absence of Section 702 surveillance affected Hasbajrami' s initial decision to plead guilty. Indeed, it was because the district court was convinced that Hasbajrami's initial decision to plead guilty was predicated in part on his lawyers' assurance that the government had represented that there was no warrantless surveillance in his case that it granted the defense motion to withdraw Hasbajrami's first guilty plea when those representations were revealed to have been inaccurate. App'x at 39 (noting that Hasbajrami "specifically asked [his counsel] about whether warrantless wiretaps had played a role in his case. After they informed him that such wiretaps were not part of the evidence, he was more willing to plead guilty."). Moreover, Hasbajrami moved to suppress all Section 702 material 22The Advisory Committee also considered Fed. R. Crim. P. ll(h)'s harmless error calculus to apply, but it noted that, without full factual development, invocation of the harmless error rule would be difficult. The Committee noted, however, that "relatively few appellate decisions result in affirmance upon [harmless error]. Thus it will only rarely be true that the conditional plea device will cause an appellate court to consider constitutional questions which could otherwise have been avoided by invocation of the doctrine of harmless error." Fed. R. Crim. P. 11, advisory committee's notes to 1983 amendments. 84 collected by the government, including matter that was not presented to the FISC to obtain the traditional FISA warrant. What is unclear is just how much Section 702-acquired information would remain, after further fact-finding at the district court. It may be that, after a full evaluation of the record in light of Hasbajrami's motion to suppress, the evidence available to the government remains very much intact. For all we know, any queries conducted by the government may have been entirely reasonable, they may not have yielded any evidence at all, and any material that was uncovered even by a putatively unconstitutional query may not have affected the investigation in any way. However those matters would be decided on remand, though, we cannot predict here whether any such queries were constitutionally questionable, or whether any information derived from such queries should itself have been suppressed, or directly or indirectly tainted the warrant application. And, without being able to fully predict or decide either of those issues, we also cannot adequately predict whether a potentially-altered evidentiary landscape "could have affected [Hasbajrami's] decision to plead guilty." Lustig, 830 F.3d at 1086; see also United States v. uake, 95 F.3d 409, 420-421 (6th Cir. 1996) (noting that Fed. R. Crim. P. ll(a)(2) addresses the situation in which "the defendant is fully 85 successful on appeal," and not "the effect of a partially successful appeal/ but vacating judgment because "[ defendant was] successful in excluding what appears to be the most damning evidence against him.") (emphasis in original). Taking these considerations into account, then, we are left with a posture similar to that faced by this Court in United States v. Wong Ching Hing, 867 F.2d 754 (2d Cir. 1989). The defendant in that case had reserved his right to appeal the district court's failure to suppress roadside statements made to police without Miranda warnings, as well as subsequent statements made at a police station. Id. at 756. This Court, like the district court, found that the roadside statements were voluntary and that supp ression was therefore unnecessary as to those. Id. But the defendant had made two separate sets of statements to law enforcement once detained at the police station. The first set was made to the state police, and it did not add anything to what he had voluntarily provided at the initial stop. The second set of statements, however, was made to a DEA agent and "formed the basis of the information to which Wong pled guilty," which charged him with making a false statement. Id. The Court concluded that the circumstances "may well warrant the conclusion that the detention was not valid as a Terry stop." Id. at 758. But it was 86 unclear what effect such a holding would have on Wong's legal position, because the record was not clear as to whether the conditional guilty plea was "conditioned upon the government's being successful in admitting all of the statements or any one of them." Id. at 758 (emphasis added). The Court therefore vacated the judgment and remanded to the district court for "further proceedings," noting that the government had also urged affirmance on an alternative ground and that "the parties will not be precluded from asserting new arguments" on remand. ld. We therefore follow a similar course of action here. Because the district court was not even aware whether such querying had occurred, and because even we have not been advised as to what was done, for what reasons, and with what results, we remand to the district court to determine the facts, consistent with the considerations stated above, and to decide in the first instance, based on its fachlal findings, whether there was a constitutional violation in this particular case, and what (if any) evidence would need to be suppressed if there was indeed a violation. Similarly, we leave it to the district court to determine, in the first instance., whether any exceptions to the exclusionary rule, such as a good 87 faith exception, might apply in this case. 23 Finally, we leave it to the district court to determine, if any evidence should have been suppressed, whether the failure to suppress that evidence was harmless, and if it was not what remedy is appropriate. On remand, the district court should undertake whatever proceedings are necessary, consistent with the considerations stated above. To the extent that any decisions must be made about what information is to be presented to appropriately-cleared defense counsel, such decisions too are best left to the district court after it becomes clear what the inquiry about querying will involve. 24 Cf Abu-Jihaad, 630 F.3d at 129 (noting that, under FISA, disclosure is 23 The government has argued before this Court that the good faith exception would apply. Because of the incomplete record here, we take no position as to whether the exception applies. 24 Hasbajrami argues on appeal that his due proces s rights would be violated if he is not provided with an unredacted or unmodified version of the district court's order. He concedes, however, that the argument would be rendered moot if this Court reverses on either constitutional or statutory grounds. After reviewing the minor redactions, we conclude that the limited information redacted from the district court's opinion could not have substantially affected Hasbajrami' s due process rights in this appeal. In any event, we undertook de novo review and we are satisfied that the limited redactions in the portions of this opinion relating to the district court's rulings do not require disclosure to the defense at this time . We therefore deny Hasbajrami's request to unseal or to disclose to the defense team the redacted portions of the district court opinion. As addressed above, however, the district court remains free to consider, in the 88 exception and ex parte, in camera review is the rule, and that the review of materials that are "relatively straightforward and not complex" may not necessarily require adversarial testing). CONCLUSION Based on the foregoing considerations, we REMAND to the di strict court for further proceedings consistent with this opinion. first instance, what if any classified material, including the government's Rule 280) letter and the redacted portions of this opinion relating to querying, should be provided to properly-cleared defense counsel on remand, consistent with the requirements of CIPA and FISA. We therefore DENY Hasbajrami's February 8, 2019 motion for disclosure of the government's Rule 280) letter, without prejudice to renewal before the district court on remand. 89