Additional Questions Concerning Use of the EINSTEIN 2.0 Intrusion-Detection System

Additional Questions Concerning Use of the EINSTEIN 2.0 Intrusion-Detection System The deployment of an intrusion-detection system known as the EINSTEIN 2.0 program on the unclassified computer networks of the Executive Branch is consistent with the federal and state laws discussed in this opinion. Under the best reading of the statute, the EINSTEIN 2.0 program would not violate section 705 of the Communications Act, because it would fall within section 705’s exception permitting a person to “divulge” a communication through “authorized channels of transmission or reception,” which allows either the sender or the recipient of an Internet communication to convey the required authorization by consenting to a communication’s disclosure, including by clicking through an approved log-on banner or signing the computer-user agreement in order to gain access to a government-owned information system. If section 2702(a)(3) of the Stored Communications Act applied to the EINSTEIN 2.0 program, the exception in section 2702(c)(1)(C) permitting disclosure based on “the lawful consent of the customer or subscriber” would also apply, because in this context the government, and no other party, should be understood as the “customer or sub- scriber” of the Internet service provider. If a state law imposed requirements on the EINSTEIN 2.0 program exceeding those imposed by these federal statutes, it would stand as an obstacle to the accomplishment and execution of the full purposes and objectives of Congress and therefore be unen- forceable under the Supremacy Clause of the Constitution. August 14, 2009 MEMORANDUM OPINION FOR THE ASSOCIATE DEPUTY ATTORNEY GENERAL You have asked us to address whether the deployment of an intru- sion-detection system known as the “EINSTEIN 2.0” program on the unclassified computer networks of the Executive Branch is consistent with (1) section 705(a) of the Communications Act of 1934, as amended, 47 U.S.C. § 605(a) (2006); (2) the provision of the Stored Communica- tions Act codified at 18 U.S.C. § 2702(a)(3) (2006); and (3) state laws concerning interception or electronic surveillance. For the reasons given below, we conclude that it is. 1 1 We solicited the views of the Criminal Division and National Security Division on each of these questions. Both components concur in our conclusions. 269 33 Op. O.L.C. 269 (2009) I. You have asked whether by engaging in any of the activities that are part of the EINSTEIN 2.0 program, 2 the Department of Agriculture (“USDA”), the Department of Homeland Security (“DHS”), or the relevant Internet service provider (“ISP”) would violate section 705(a) of the Communications Act of 1934, as amended, 47 U.S.C. § 605(a) (2006). Although this is a novel question, and the statute is hardly a model of clarity, we conclude that under the best reading of the statute, the EINSTEIN 2.0 activities would not violate section 705. In pertinent part, section 705 provides: Except as authorized by chapter 119, title 18 [i.e., the Wiretap Act], no person receiving, assisting in receiving, transmitting, or as- sisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, sub- stance, purport, effect, or meaning thereof, except through author- ized channels of transmission or reception, (1) to any person other than the addressee, his agent, or attor- ney, (2) to a person employed or authorized to forward such com- munication to its destination, (3) to proper accounting or distributing officers of the various communicating centers over which the communication may be passed, (4) to the master of a ship under whom he is serving, (5) in response to a subpena issued by a court of competent ju- risdiction, or (6) on demand of other lawful authority. 47 U.S.C. § 605(a). 3 The Communications Act defines “person” in 47 U.S.C. § 153(32) (2006) to “include[] an individual, partnership, associa- 2 These activities are described in detail in a memorandum of this Office. See Use of the EINSTEIN 2.0 Intrusion-Detection System to Protect Unclassified Computer Networks in the Executive Branch, 33 Op. O.L.C. 63 (2009) (“EINSTEIN 2.0 Opinion”). 3 Section 705 contains additional prohibitions, such as on the “intercept[ion] [of] any radio communication and divulg[ing] or publish[ing]” of its contents, and on the use for personal benefit of radio communications intercepted or received without authorization. 270 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System tion, joint-stock company, trust, or corporation.” “[C]ommunication by wire” is defined as “the transmission of writing, signs, signals, pictures, and sounds of all kinds by aid of wire, cable, or other like connection between the points of origin and reception of such transmission, including all instrumentalities, facilities, apparatus, and services (among other things, the receipt, forwarding, and delivery of communications) inci- dental to such transmission.” Id. § 153(52). 4 Although the scope of section 705’s prohibition is not entirely clear on its face, case law supports reading the provision as a general bar on a “person receiving, assisting in receiving, transmitting, or assisting in transmitting” wire or radio communications from “divulg[ing]” or “pub- lish[ing]” such communications to persons other than the addressee, his agent or attorney, except “through authorized channels of transmission or reception,” as “authorized by” the Wiretap Act, or in the circumstances enumerated in clauses (2) through (6). In United States v. Finn, 502 F.2d 938, 942 (7th Cir. 1974), for instance, the court identified the “absurdi- ties” that would result from a literal reading of the text, including that “[c]lauses (2) through (6) would be rendered meaningless, for all of those categories are completely covered by the more general clause (1).” Simi- larly, reading clause (6) as a prohibition “would forbid divulgence of a communication ‘on demand of other lawful authority,’” thereby “ren- der[ing] all such demands unlawful and by its own terms [] eliminat[ing] the very category to which it refers.” Instead, the court concluded, clauses (2) through (6) should be read “as exceptions to the general prohibition of clause (1),” a construction the court viewed as “the only way to give effect to the Congressional intent.” Id. Finn is consistent with a line of precedents interpreting the pre-Wiretap Act version of this provision, Except for the first sentence of section 705 quoted above, these additional provisions extend only to “radio” communications, which are not at issue here. See 47 U.S.C. § 605(a); id. § 153(33) (defining “radio communication” to “mean[] the transmission by radio of writing, signs, signals, pictures, and sounds of all kinds”). 4 This definition of “wire communication” is substantially similar to the definition of “electronic communication” under the Wiretap Act, 18 U.S.C. § 2510(12) (2006), which includes “any transfer of signs, signals, writing, images, sounds, data, or intelli- gence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce.” Cf. id. § 2510(1) (defining “wire communication” under the Wiretap Act to mean an “aural transfer”). 271 33 Op. O.L.C. 269 (2009) which contained substantially similar language. For instance, in Nardone v. United States, 302 U.S. 379, 380–81 (1937), the Supreme Court charac- terized the version of section 705 then in effect as providing that “no person who, as an employee, has to do with the sending or receiving of any interstate communication by wire shall divulge or publish it or its substance to anyone other than the addressee or his authorized representa- tive or to authorized fellow employees, save in response to a subpoena issued by a court of competent jurisdiction or on demand of other lawful authority.” 5 See also Hanna v. United States, 404 F.2d 405, 408–09 (5th Cir. 1968) (“[I]nformation thus lawfully obtained may be divulged ‘in response to a subpoena issued by a court of competent jurisdiction, or on demand of other lawful authority.’” (quoting section 705)); Bubis v. United States, 384 F.2d 643, 646–47 (9th Cir. 1967) (“[N]o . . . person shall divulge or publish the existence, contents, substance, purport, or effect of any such communication to anyone other than the addressee or his authorized representative, or to authorized fellow employees, or in response to a subpoena issued by a court of competent jurisdiction, or on The version of the statute at issue in Nardone provided that: 5 No person receiving or assisting in receiving, or transmitting, or assisting in transmitting, any interstate or foreign communication by wire or radio shall divulge or publish the existence, contents, substance, purport, effect, or meaning thereof, except through authorized channels of transmission or reception, to any person oth- er than the addressee, his agent, or attorney, or to a person employed or authorized to forward such communication to its destination, or to proper accounting or dis- tributing officers of the various communicating centers over which the communica- tion may be passed, or to the master of a ship under whom he is serving, or in re- sponse to a subpena issued by a court of competent jurisdiction, or on demand of other lawful authority; and no person not being authorized by the sender shall inter- cept any communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person; and no person not being entitled thereto shall receive or assist in receiving any inter- state or foreign communication by wire or radio and use the same or any infor- mation therein contained for his own benefit or for the benefit of another not enti- tled thereto; and no person having received such intercepted communication or having become acquainted with the contents, substance, purport, effect, or meaning of the same or any part therof, knowing that such information was so obtained, shall divulge or publish the existence, contents, substance, purport, effect, or mean- ing of the same or any part thereof, or use the same or any information therein con- tained for his own benefit or for the benefit of another not entitled thereto . . . . Communications Act of 1934, Pub. L. No. 73-416, § 605, 48 Stat. 1064, 1103–04. 272 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System demand of other lawful authority.”); Brandon v. United States, 382 F.2d 607, 611 (10th Cir. 1967) (similar). Although our research has not uncovered any case law applying sec- tion 705 in the context of cybersecurity activities, we conclude that the EINSTEIN 2.0 program falls within section 705’s authorization to “di- vulge” a communication through an “authorized channel[] of transmission or reception.” We assume for purposes of this analysis—but do not de- cide—that federal-systems Internet traffic would constitute “communica- tion[s] by wire” under section 705, that the EINSTEIN 2.0 program would involve “divulg[ence] or publi[cation]” of the contents of such communi- cations, that DHS or USDA would be a “person receiving, assisting in receiving, transmitting, or assisting in transmitting” such communica- tions, and that the program would not be “authorized by” the Wiretap Act. 6 6 A number of those assumptions may not be necessary, and thus there may be addi- tional bases for concluding that the EINSTEIN 2.0 program would not violate section 705. An argument might be made, for instance, that program activities are “authorized by” the Wiretap Act for purposes of section 705 because they are not affirmatively prohibited by that Act. Compare United States v. Freeman, 524 F.2d 337, 340 & n.5 (7th Cir. 1976) (phrase “[e]xcept as authorized by [the Wiretap Act]” in section 705 “permits” telephone companies to protect their rights or property pursuant to the relevant exception in 18 U.S.C. § 2511(2)(a)(i)), with EINSTEIN 2.0 Opinion, 33 Op. O.L.C. at 103 (concluding that “the better reading” of a related exception in FISA for conduct “authorized by” the Wiretap Act was to refer to affirmative “orders” obtained under that Act, rather than activities that “merely are not prohibited by those statutes”). Although we need not, and do not, resolve this question here, we note that such a reading of section 705 would not only incorporate the Wiretap Act’s consent exception, see 18 U.S.C. § 2511(2)(a)(ii) (2006), but would also appear to import wholesale all of the statutory exceptions found in that Act, cf., e.g., id. § 2511(2)(a)(i) (“rights or property”), essentially collapsing section 705 and the Wiretap Act into a single standard, notwithstanding that section 705(a) retained, by its plain terms, an independent limitation regarding wire communications. It might separately be contended that any disclosure of communications by the service provider to DHS would occur on “demand of other lawful authority,” although here DHS has entered into an agreement with USDA and thus arguably is not “demand[ing]” disclosure of communications. Cf. Brown v. Continental Tel. Co., 670 F.2d 1364, 1365– 66 (4th Cir. 1982) (request for records and telephone bills served on telephone company by Attorney for the Commonwealth was a “demand of . . . lawful authority” under section 705 because the statute’s plain text contemplated the release of protected information “to appropriate authorities in response to a demand less compelling than a subpoena”). And with respect to any conduct of USDA or DHS that is potentially within the scope of section 705, there is some question whether the first sentence of section 705 applies to 273 33 Op. O.L.C. 269 (2009) We begin with the text of section 705, which expressly permits a “di- vulge[nce] or publi[cation]” of a wire communication made “through authorized channels of transmission or reception.” We believe the plain language of section 705 is fairly interpreted to include the EINSTEIN scanning sensors as a “channel[] of transmission or reception” of Internet communications, particularly where a party to the communication has, as here, expressly authorized such scanning. In reaching this conclusion, we have considered the potential ambiguities concerning both what consti- tutes a “channel of transmission or reception” and what constitutes a channel that has been “authorized” for purposes of section 705. As to the first issue, we are aware of a narrower construction of the phrase “channel[] of transmission or reception” that would be limited to the channel through which the communication actually passes from recip- ient to sender. Under such a reading, section 705 would prohibit, inter alia, forwarding of a mirror copy of federal systems Internet traffic to EINSTEIN 2.0 sensors for processing, see EINSTEIN 2.0 Opinion, 33 Op. O.L.C. at 67–68, or DHS’s disclosure to another federal agency if that disclosure did not involve transmitting the communication to its recipient, unless one of the other express exceptions in the statute applied. But the text of the section does not by terms compel that narrower reading, given the placement of the relevant phrase. That phrase is located where it could be read to qualify the prohibition against divulgence to third parties, and thus to indicate that the channels being referenced are those that might be used to reach third parties. Indeed, the phrase itself, in its second appear- ance in the section, is not limited to channels of transmission by “wire,” government employees. Compare United States v. Hall, 488 F.2d 193, 195 (9th Cir. 1973) (superseded on other grounds) (“The legislative history [] explicitly shows that Congress intended to exclude law enforcement officers from the purview of the new [section 705]”); S. Rep. No. 90-1097, at 108 (1968) (“[The first sentence of section 705] is designed to regulate the conduct of communications personnel.”); and Int’l Cablevision, Inc. v. Sykes, 75 F.3d 123, 131 n.4 (2d Cir. 1996) (similar), with Nardone, 302 U.S. at 381 (“Taken at face value the phrase ‘no person’ [in the pre-Wiretap Act version of section 705] comprehends federal agents[.]”); and United States v. Sugden, 226 F.2d 281 (9th Cir. 1955) (interpreting pre-Wiretap Act version of section 705 to permit FCC agents to “listen [to radio communications] for the purpose of enforcing the [Communications] [A]ct” but to require exclusion of evidence, in a criminal prosecution unrelated to violations of that Act, obtained by FCC agents who intercepted defendant’s short range radio transmis- sions). We need not, and do not, resolve these issues in light of our conclusion that the exercise falls within section 705’s “authorized channels of transmission” provision. 274 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System suggesting a potentially broad conception of the means by which commu- nications may be passed along. Furthermore, the text is not clear that the channel in question must be the one through which the original communi- cation travels, as the text specifically refers to the divulgence, not of the communication itself, but of its substance or meaning. Insofar as the phrase “channels of transmission or reception” qualifies the divulgence, as its placement indicates, it is clearly intended to refer to channels other than those through which the communication flows. As to whether the channel would be “authorized” for purposes of sec- tion 705, the dictionary defines “authorized” as “having authority[;] . . . recognized as having authority[;] . . . approved,” and defines “authori- ty” as, inter alia, “justifying grounds: basis, warrant.” Webster’s Third New International Dictionary 146 (3d ed. 1993). The statute does not specify the source or nature of the “authoriz[ation]” required. As a matter of ordinary meaning, the term “authorized” is certainly broad enough to encompass either the sender or receiver of a communication expressly authorizing—by means of indicating consent to—divulgence or publication. This reading is also supported by the terms of section 705’s second sentence, which states that “[n]o person not being author- ized by the sender shall intercept any radio communication and divulge or publish” that communication. 47 U.S.C. § 605(a) (emphasis added). That Congress chose the unqualified term “authorized” in the first sentence, while expressly limiting which party could authorize disclo- sure in the second, suggests an intent that the term be given a broader reading in the former instance. 7 We therefore would interpret the phrase “authorized channels of transmission or reception” to permit either the sender or the recipient of an Internet communication to convey the required authorization by consenting to a communication’s disclosure in the context of the EINSTEIN 2.0 system. Although we are not aware of any judicial precedent directly on point, we draw support for this reading of the statute from case law analyzing 7 Our reading of “authorized” arguably also draws support from, and is entirely con- sistent with, the use of the word “authorizing” in the text of section 705(b), which con- templates a “marketing system” for satellite communications in which “agents have been lawfully designated for the purpose of authorizing private viewing by individuals” and “individuals receiving [satellite] programming ha[ve] obtained authorization for private viewing under that [marketing] system.” 47 U.S.C. § 605(b). 275 33 Op. O.L.C. 269 (2009) consent by either the sender or receiver of a communication in determin- ing whether interception or divulgence of a telephone call violated certain related provisions in section 705. In Rathbun v. United States, 355 U.S. 107 (1957), for instance, the Supreme Court held that the second clause of the version of section 705 then in effect (which provided that “no person not being authorized by the sender shall intercept any communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person,” see supra note 5) was not violated where the recipient of a phone call asked the police to listen to the call on an extension telephone in his home. The Court concluded, notwithstanding the statute’s specific reference to the “authoriz[ation] [of] the sender,” that “there ha[d] been no ‘interception’ as Congress intended that the word be used.” 355 U.S. at 109. The Court looked to another related provision of section 705, which then prohibited any person from “receiv[ing] or assist[ing] in receiving any interstate or foreign communication by wire or radio and us[ing] the same or any information therein contained for his own benefit.” That provision, the Court explained, gave “[t]he clear inference . . . that one entitled to re- ceive the communication may use it for his own benefit or have another use it for him.” Id. at 110. In dictum the Court further observed that even the defendant in that case conceded that under section 705 “either party may record the [telephone] conversation and publish it.” Id. Similarly, in Weiss v. United States, 308 U.S. 321 (1939), the Court held evidence to be inadmissible in a criminal trial where federal agents had violated the same provision of section 705 as in Rathbun (the prohibi- tion against any person “not being authorized by the sender” intercepting and divulging communications) by tapping the defendant’s intrastate phone calls. In rejecting the government’s argument that the defendant’s trial testimony about the intercepted conversations constituted consent, the Court relied on the fact that “divulgence was not consented to by either of the parties to any of the telephone conversations.” Id. at 330 (emphasis added). More recently, in United States v. Hodge, 539 F.2d 898 (6th Cir. 1976), the court rejected a defendant’s claim that agents of the Drug Enforcement Agency had violated section 705 by recording tele- phone conversations between the defendant and a government informant. (The informant in the case had consented to the DEA monitoring.) The court quoted section 705 in full before tersely dismissing the defendant’s claim, explaining that “[i]t is well settled that there is no violation of the 276 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System [Communications] Act if the interception was, as here, authorized by a party to the conversation.” Id. at 905. 8 Although these cases do not interpret the phrase in section 705 upon which we rely here, they provide at least indirect support for reading the word “authorized,” which appears without qualification as to the scope of the persons encompassed by it, to permit the recipient of a communication (either a federal agency, in the case of communications directly to that agency, or individual federal employees, in the case of communications to those employees) to consent to and thereby authorize the communica- tion’s disclosure in the context of the EINSTEIN 2.0 program. 9 At a minimum, our reading of the unqualified word “authorized” is consistent with what appears to have been the prior understanding that the statute was not, absent an express limitation regarding the scope of any consent exception, intended to require two-party consent for any such exception to apply. As we explain below, we believe that under our reading of section 705, the manifestations of consent by USDA in conjunction with those of 8 A modern line of cases brought by plaintiff corporations to prevent the unauthorized reception or transmission of satellite television signals has focused on the consent of the sending party in determining whether a “divulg[ence]” was “authorized.” See, e.g., National Satellite Sports, Inc. v. Eliadis, Inc., 253 F.3d 900, 916 –17 (6th Cir. 2001) (holding that private cable company had violated section 705 by selling the broadcast transmission of a boxing match to a commercial customer, when the company was only authorized by the program’s originator to distribute it to residential customers). We do not read these cases as negating the relevance of the precedents discussed above, which contemplate consent by either party to communications such as telephone calls. For one thing, the modern case law does not purport to overrule or limit the precedents discussed above. More significantly, in this line of cases there is no contention that the recipient of a licensed commercial broadcast—who often acts pursuant to a contractual agreement with the originator—is “authorized” to distribute the material beyond the terms of that agree- ment. 9 In light of this case law, we do not believe the existence of an express consent excep- tion in the Wiretap Act requires a contrary interpretation of “authorized channel[] of transmission or reception” in section 705. When Congress reenacted the language of section 705 in the 1968 Wiretap Act, it did so against the settled background of case law interpreting the pre-Wiretap Act statute to allow consensual interception. By reenacting statutory text that was in large part identical to the preexisting language, and by indicating no disapproval of settled case law, Congress can be understood to have left in place the established meaning of the text it employed rather than to have impliedly precluded recognition of a consent exception. 277 33 Op. O.L.C. 269 (2009) individual federal employees using government information systems are sufficient to avoid a violation of that provision by the ISP, DHS, or USDA, in conjunction with the authorized operation of the EINSTEIN 2.0 system. First, with respect to potential violations by the service provider, we believe any “divulge[nce]” of communications would occur through an “authorized channel[] of transmission or reception.” As to any disclo- sure by the provider of communications between third parties and USDA, the agency has “authorized” the service provider to disclose such commu- nications to DHS by virtue of the Memorandum of Agreement between USDA and DHS, which memorializes USDA’s consent to the scanning of its Internet traffic for cybersecurity purposes. As to disclosure by the service provider of communications addressed to or sent by individual employees, we have previously concluded that a federal employee’s valid, voluntary consent to the scanning of Internet traffic is apparent from his clicking through an approved log-on banner or signing the computer-user agreement in order to gain access to a government-owned information system, see EINSTEIN 2.0 Opinion, 33 Op. O.L.C. at 98, and we believe this consent would foreclose any claim that the service provider would violate section 705 by transmitting communications through the intrusion- detection sensors operated by DHS because it would authorize any result- ing divulgence. We similarly conclude that the same consents—by USDA and USDA employees—“authorize” DHS to “divulge” the communications to any other authorized agency without running afoul of the prohibition in sec- tion 705. As to communications involving the agency itself, USDA has expressly consented to any such disclosures by DHS through the Memo- randum of Agreement and other documents detailing the operation of the EINSTEIN 2.0 program. As to communications involving individual employees, the model log-on banner and computer-user agreement dis- cussed in our EINSTEIN 2.0 Opinion state expressly that “[a]ny commu- nications or data transiting or stored on this information system may be disclosed or used for any lawful government purpose.” 33 Op. O.L.C. at 70. The scope of the employee’s consent to disclosure for any “lawful government purpose” is informed by our separate conclusion in the con- text of 18 U.S.C. § 2511 that DHS is “authorized by law” to conduct an exercise involving EINSTEIN technology, as described in the implemen- tation plan governing that exercise, by virtue of several affirmative statu- tory authorities, particularly a recent appropriations statute providing 278 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System funding for the precise exercise in question, as well as DHS’s organic statute and the Federal Information Security Management Act. Finally, we believe the log-on banner and computer-user agreements discussed above would also be sufficient to foreclose any claim that USDA would violate section 705 by divulging to DHS, through its partic- ipation in EINSTEIN 2.0, the contents of communications addressed to its employees. This reading of section 705 is consistent with the conclusion in our EINSTEIN 2.0 Opinion that the EINSTEIN 2.0 program would not violate parallel non-disclosure provisions contained in the Wiretap Act. Section 2511(3) of title 18, U.S. Code, provides that “a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication . . . while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intend- ed recipient,” except “with the lawful consent of the originator or any addressee or intended recipient of such communication,” or “to a person employed or authorized, or whose facilities are used, to forward such communication to its destination.” Our EINSTEIN 2.0 Opinion conclud- ed that EINSTEIN 2.0 would not unlawfully “divulge” the contents of Internet communications within the meaning of section 2511(3), both because the participating agency and its employees would have manifest- ed consent to the scanning, and “because the federal government is ‘au- thorized,’ and its ‘facilities are used, to forward such communications to [their] destination.’” 33 Op. O.L.C. at 96. With respect to individual federal employees, we further noted that Internet communications cannot reach employees at work without routing through the government’s com- puter systems. Id. Thus, even if section 705 is not read by terms to incor- porate this exception, we find it significant that the exception we conclude section 705 adopts is hardly a novel one in this area. We are also not aware of any legislative history that indicates a congressional intention to preclude recognition of such an exception here. II. We believe the EINSTEIN 2.0 system would also comply with the pro- vision of the Stored Communications Act (“SCA”), codified at 18 U.S.C. § 2702(a)(3), that provides that “a provider of remote computing service 279 33 Op. O.L.C. 269 (2009) or electronic communication service to the public shall not knowingly divulge a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications covered by [section 2702(a)(1) or (a)(2)]) to any governmental entity.” Insofar as the EINSTEIN 2.0 system examines, in real time, Internet traffic-flow data that is not retained by the ISP, there may be grounds to assert that this provision is simply inapplicable, because the data in ques- tion is not a “record or other information” within the possession of the ISP. Even assuming, however, that section 2702(a)(3) by its terms may apply to EINSTEIN 2.0, we believe that the statutory exception permitting disclosure based on “the lawful consent of the customer or subscriber” would apply. 18 U.S.C. § 2702(c)(1)(C) (2006). That is because we be- lieve that in this context the government, and no other party, should be understood as the “customer or subscriber” of the ISP for purposes of this exception. On this view, even assuming that non-content informa- tion obtained from or with the assistance of the ISP regarding Internet traffic that passed onto or off of the government’s system would qualify as “record[s] or other information” under the SCA, these “record[s] or other information” would “pertain[] to” the government as a “subscriber to or customer of [the ISP’s] service,” and the government could there- fore provide “lawful consent” to divulge this information. 18 U.S.C. § 2702(c)(2). This construction of the statute fits naturally with the plain text: insofar as a government agency has contracted with an ISP for Internet service, the government is indisputably a “customer” (if not also a subscriber) of the ISP. In accordance with this view, the Ninth Circuit has characterized a municipality as a “subscriber” of a text-messaging service where the municipality contracted with the service to provide two-way text pagers to police officers and other municipal employees. See Quon v. Arch Wireless Operating Co., 529 F.3d 892, 895, 903 (9th Cir. 2008). Insofar as end users such as individual employees hold a protected pri- vacy interest in non-content information, the employer’s consent to dis- closure might violate some legal obligation of the employer, but it would not create liability for the ISP under the SCA, since the ISP had obtained the necessary consent of its “customer or subscriber.” In any event, in our case, the individual employees have also consented to the disclosure, so disclosure should not violate any SCA-protected interest of theirs (even if they are also somehow “customers or subscribers” of the ISP). Nor 280 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System does there appear to be any Fourth Amendment issue with the disclosure. Not only have the employees here consented to the disclosure, but courts have generally concluded that there is no reasonable expectation of privacy in non-content information provided to an ISP. See, e.g., United States v. Perrine, 518 F.3d 1196, 1204–05 (10th Cir. 2008) (collecting cases); Freedman v. America Online, Inc., 412 F. Supp. 2d 174, 181–82 (D. Conn. 2005). We recognize the concern that non-content information pertaining to one customer or subscriber (such as the government in our case) could include information pertaining to other customers or subscribers of the ISP insofar as those other parties have sent or received traffic from the first customers/subscriber’s computers. But we do not believe the SCA should be read to require separate consent from both customers/sub- scribers in that circumstance. Such records or information “pertain” to the customer/subscriber providing consent, even if they reveal information about other customers/subscribers too, so under the plain text of the statute one-party consent seems sufficient for disclosure. Indeed, any other interpretation would yield the odd result that a customer’s ability to consent to disclosure of its information would depend on whether other parties it telephoned or emailed happened to be customers of the same provider. Also, unlike content information, which relates to discrete messages each with a particular sender and particular recipients, the “record or other information” covered by section 2702(a)(3) often in- volves an aggregation of data—the total record of a customer/subscriber’s Internet traffic or phone calls, for example—that is unique to the individ- ual customer/subscriber and for which (as a result) no other party could provide meaningful consent. Information regarding other custom- ers/subscribers who have not provided consent could of course be dis- closed under this analysis only to the extent that such information is contained in a “record or other information” pertaining to the customer or subscriber who has provided lawful consent (here, the government). Furthermore, the SCA’s consent exception for content information ex- pressly allows one-party consent—either the “originator” or the “address- ee” or “intended recipient” of the communication may authorize disclo- sure of its contents, 18 U.S.C. § 2702(b)(3)—and it would be anomalous if the provisions on non-content information, which are generally less restrictive, imposed a more stringent consent requirement than those for content information. Cf. In re American Airlines, Inc. Privacy Litig., 370 281 33 Op. O.L.C. 269 (2009) F. Supp. 2d 552, 561 (N.D. Tex. 2005) (construing statute to allow any intended recipient of a communication to authorize disclosure of content information). Congress appears to have adopted the current SCA provi- sions on non-content information in part to bring those provisions more in line with provisions on content information. Before 2001, the SCA pro- vided only that a provider could disclose “a record or other information pertaining to a subscriber to or customer of [the provider’s] service (not including [content information]) to any person other than a governmental entity” and that the provider generally could disclose such records or information to a governmental entity “only when the governmental entity . . . ha[d] the consent of the subscriber or customer to such disclosure” or satisfied one of several other enumerated exceptions. See 18 U.S.C. § 2703(c) (2000); Pub. L. No. 99-508, § 201, 100 Stat. 1848, 1860 (1986). Congress amended the statute to provide that, even without an affirmative government request, the provider may disclose records and information covered by section 2702(a)(3) “with the lawful consent of the customer or subscriber” or in certain other specified circumstances. See 18 U.S.C. § 2702(c)(2) (Supp. I 2001); Pub. L. No. 107-56, § 212(a)(1)(E), 115 Stat. 272, 284 (2001). As explained in the legislative history, Congress intended this change “to allow communications providers to disclose non- content information (such as the subscriber’s login records).” H.R. Rep. No. 107-236, pt. 1, at 58 (2001). Under pre-2001 law, the House Judiciary Committee explained, “the communications provider [was] expressly permitted to disclose content information but not expressly permitted to provide non-content information. This change would cure this problem and would permit the disclosure of the less-protected information, parallel to the disclosure of the more protected information.” Id.; see also 147 Cong. Rec. 19,001, 19,009 (statement of Sen. Leahy) (discussing 2001 amendments and observing that “the right to disclose the content of com- munications necessarily implies the less intrusive ability to disclose non- content records”). In addition, although we are aware of little relevant legislative history bearing directly on the meaning of “consent” in section 2702(a)(3), the legislative history of the SCA as originally enacted sug- gests that Congress understood background legal principles to allow one- party consent, which arguably supports construing consent provisions of the statute in accordance with that understanding. See S. Rep. No. 99-541, at 3 (1986) (observing that “because [information on remote computer systems] is subject to control by a third party computer operator, the 282 Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System information may be subject to no constitutional privacy protection” (citing United States v. Miller, 425 U.S. 435 (1976))). III. Finally, we do not believe the EINSTEIN 2.0 program impermissibly infringes state wiretapping and communication privacy laws. See, e.g., Fla. Stat. Ann. § 934.03(3)(d) (West 2009); 18 Pa. Cons. Stat. Ann. § 5704(4) (West Supp. 2009); Md. Code Ann., Cts. & Jud. Proc. § 10- 402(c)(3) (Lexis Nexis 2009); Cal. Penal Code § 631(a) (West 1999). To the extent that such laws purported to apply to the conduct of federal agencies and agents conducting authorized EINSTEIN 2.0 operations and imposed requirements that exceeded those imposed by the federal statutes discussed above and in our EINSTEIN 2.0 Opinion, they would “stand[] as an obstacle to the accomplishment and execution of the full purposes and objectives of Congress,” and be unenforceable under the Supremacy Clause. Hines v. Davidowitz, 312 U.S. 52, 67 (1941); see also Geier v. Am. Honda Motor Co., 529 U.S. 861, 873 (2000); Old Dominion Branch v. Austin, 418 U.S. 264 (1974); Bansal v. Russ, 513 F. Supp. 2d 264, 283 (E.D. Pa. 2007) (concluding that “federal officers participating in a feder- al investigation are not required to follow” state wiretapping law contain- ing additional requirements not present in the federal Wiretap Act, be- cause in such circumstances, “the state law would stand as an obstacle to federal law enforcement”); Johnson v. Maryland, 254 U.S. 51 (1920); cf. United States v. Adams, 694 F.2d 200, 201 (9th Cir. 1982) (“evidence obtained from a consensual wiretap conforming to 18 U.S.C. § 2511(2)(c) is admissible in federal court proceedings without regard to state law”). DAVID J. BARRON Acting Assistant Attorney General Office of Legal Counsel 283