Warshak v. United States

SUTTON, J., delivered the opinion of the court, in which BOGGS, C.J., *523BATCHELDER, GILMAN, GIBBONS, ROGERS, COOK, McKEAGUE, and GRIFFIN, JJ., joined. MARTIN, J. (pp. 584-38), delivered a separate dissenting opinion in which DAUGHTREY, MOORE, COLE, and CLAY, JJ., joined.

OPINION

SUTTON, Circuit Judge.

Since 1986, Title II of the Electronic Communications Privacy Act of 1986, Pub.L. No. 99-508, § 201, 100 Stat. 1848, codified as amended at 18 U.S.C. §§ 2701-2711, commonly referred to as the Stored Communications Act, has authorized the federal government to require internet service providers to disclose the contents of “electronic communieation[s]” of their customers in certain circumstances, including by way of an ex parte court order. Id. § 2703(d). The government obtained two such orders in 2005 to search Steven Warshak’s e-mails. When Warshak learned about the orders, roughly a year later, he filed a declaratory judgment action, seeking to invalidate § 2703(d) under the Fourth Amendment, and he moved for a preliminary injunction, seeking to enjoin the government from conducting further ex parte e-mail searches. The district court granted the motion and enjoined the government from using § 2703(d) to seize the contents of “any personal email account[]” belonging to Warshak or “any resident of the Southern District of Ohio” without “prior notice and an opportunity to be heard.” JA 129. We vacate the preliminary injunction because Warshak’s constitutional claim is not ripe for judicial resolution.

I.

A.

The Stored Communications Act prohibits unauthorized access to certain electronic communications, see 18 U.S.C. § 2701, and places restrictions on a service provider’s disclosure of certain communications, see id. § 2702. It also permits a “governmental entity” to compel a service provider to disclose the contents of communications in certain circumstances. See id. § 2703.

Three relevant definitions bear on the meaning of the compelled-disclosure provisions of the Act. “[Ejlectronic communication service[s]” permit “users ... to send or receive wire or electronic communications,” id. § 2510(15), a definition that covers basic e-mail services, see Patricia L. Bellia et al., Cyberlaw: Problems of Policy and Jurisprudence in the Information Age 584 (2d ed.2004). “[Ejlectronic storage” is “any temporary, intermediate storage of a wire or electronic communication ... and ... any storage of such communication by an electronic communication service for purposes of backup protection of such communication.” 18 U.S.C. § 2510(17). “[Rjemote computing service[sj” provide “computer storage or processing services” to customers, id. § 2711(2), and are designed for longer-term storage, see Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L.Rev. 1208, 1216 (2004).

The compelled-disclosure provisions give different levels of privacy protection based on whether the e-mail is held with an electronic communication service or a remote computing service and based on how long the e-mail has been in electronic storage. The government may obtain the contents of e-mails that are “in electronic storage” with an electronic communication service for 180 days or less “only pursuant to a warrant.” 18 U.S.C. § 2703(a). The government has three options for obtaining communications stored with a remote *524computing service and communications that have been in electronic storage with an electronic service provider for more than 180 days: (1) obtain a warrant; (2) use an administrative subpoena; or (3) obtain a court order under § 2703(d). Id. § 2703(a), (b).

Under § 2703(d), the provision at issue in this case, “a court of competent jurisdiction” may issue an order based on “specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation.” Id. § 2703(d). Although the statute generally requires the government to give the user prior notice of the disclosure unless it obtains a warrant, it contains an exception, id. § 2703(b)(1)(B), which says the government may delay notice in 90-day increments, id. § 2705(a)(4), if notification would result in “(A) endangering the life or physical safety of an individual; (B) flight from prosecution; (C) destruction of or tampering with evidence; (D) intimidation of potential witnesses; or (E) otherwise seriously jeopardizing an investigation or unduly delaying a trial,” id. § 2705(a)(2); see also id. § 2705(b) (authorizing the government to seek a court order preventing the service provider from disclosing the subpoena if the same conditions are met).

B.

Warshak is the president and sole owner of Berkeley Premium Nutraceuticals, Inc., which became the target of an investigation into “mail and wire fraud, money laundering, and other federal offenses” based on its “nationwide marketing, distribution, and sale of products.” JA 47, 50. The government sought permission from a magistrate judge to require Warshak’s internet service providers — NuVox Communications and Yahoo! — to turn over Wars-hak’s account information, “[a]ll [l]og files and backup tapes” and the contents of emails that had been “accessed, viewed, or downloaded” or that were more than 181 days old. JA 49, 52.

On May 6, 2005, and again on September 12, 2005, the magistrate judge granted the applications under § 2703(d) of the Act. As required, the orders were based on “specific and articulable facts showing that there [were] reasonable grounds to believe that the records or other information sought [were] relevant and material to an ongoing criminal investigation.” JA 48, 51; see 18 U.S.C. § 2703(d). As permitted, the orders did not give Warshak immediate notice of the disclosures. 18 U.S.C. § 2703(b)(1)(B). Concluding that notice to Warshak “would seriously jeopardize the investigation,” the magistrate judge ordered the government to delay notice for 90 days and mandated that the “[o]rder[s][be] sealed until otherwise ordered by the Court.” JA 48, 51; see 18 U.S.C. §§ 2703(b)(1)(B), 2705(a).

On May 31, 2006, roughly a year after the court issued the first § 2703(d) order, the government gave Warshak notice of the orders. In response, he sued the government on June 12, seeking declaratory and injunctive relief. Among other complaints, Warshak alleged that § 2703(d) violated the Fourth Amendment on its face and as applied because the searches were based on a showing of less than probable cause and were not supported by a warrant.

On June 30, Warshak filed a motion for a preliminary injunction. The court granted the motion and enjoined the government from using § 2703(d) to search “the contents of any personal email account maintained by an [ISP] in the name of any resident of the Southern District of Ohio” *525without providing the user “prior notice and an opportunity to be heard.” JA 130. The court reasoned that Warshak likely would succeed on his Fourth Amendment claim because internet users have a reasonable expectation of privacy in e-mails, and because the orders authorized war-rantless searches on less than probable cause. The court also concluded that Warshak faced imminent harm based on the two prior orders and the government’s refusal to pledge not to seek additional orders in the future. The court enjoined the government from enforcing § 2703(d) or related sections of the Act (sections 2703(b)(l)(B)(ii) and 2705) to the extent that they “authorize the ex parte issuance of search and seizure orders without a warrant and on less than a showing of probable cause.” JA 129. While the court relied “in part” on the “threat of irreparable injury” to Warshak, it explained that “the constitutional flaws ... are facial in nature.” Id.

On September 20, 2006, a federal grand jury indicted Warshak for bank fraud, mail fraud and money laundering, among other federal crimes. See Indictment, United States v. Warshak, No. 1:06-cr-00111 (S.D.Ohio Sept. 20, 2006). On February 22, 2008, a jury convicted him on 93 counts. See Jury Verdict as to Steven E. Warshak, Warshak, No. 1:06-cr-00111 (S.D.Ohio Feb. 22, 2008).

II.

The Constitution does not extend the “judicial Power” to any legal question, wherever and however presented, but only to those legal questions presented in “Cases” and “Controversies.” U.S. Const. art. III, § 2. A claim is not “amenable to ... the judicial process,” Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 102, 118 S.Ct. 1003, 140 L.Ed.2d 210 (1998), when it is filed too early (making it unripe), when it is filed too late (making it moot) or when the claimant lacks a sufficiently concrete and redressable interest in the dispute (depriving the plaintiff of standing). This case implicates at least two of these doctrines today, ripeness and standing, both of which “unquestionably ... overlap,” Airline Prof'ls Ass’n of the Int’l Bhd. of Teamsters v. Airborne, Inc., 332 F.3d 983, 988 (6th Cir.2003), and at some point could well implicate the third (mootness) in view of the motion to suppress that Warshak filed in his criminal case. As there is no obligation to favor one of these justiciability doctrines over the other and as none of these questions goes to the merits of the case, we may address them in any sequence we wish. See Arizonans for Official English v. Arizona, 520 U.S. 43, 66-67, 117 S.Ct. 1055, 137 L.Ed.2d 170 (1997). We start — and end — with ripeness.

Like standing, ripeness “is drawn both from Article III limitations on judicial power and from prudential reasons for refusing to exercise jurisdiction.” Nat’l Park Hospitality Ass’n v. Dep’t of Interior, 538 U.S. 803, 808, 123 S.Ct. 2026, 155 L.Ed.2d 1017 (2003) (internal quotation marks omitted). The ripeness doctrine serves to “avoid[ ] ... premature adjudication” of legal questions and to prevent courts from “entangling themselves in abstract” debates that may turn out differently in different settings. Id. at 807, 123 S.Ct. 2026. In ascertaining whether a claim is ripe for judicial resolution, we ask two basic questions: (1) is the claim “fit[ ] ... for judicial decision” in the sense that it arises in a concrete factual context and concerns a dispute that is likely to come to pass? and (2) what is “the hardship to the parties of withholding court consideration”? Abbott Labs. v. Gardner, 387 U.S. 136, 149, 87 S.Ct. 1507, 18 L.Ed.2d 681 (1967); see also Ammex, Inc. v. Cox, 351 *526F.3d 697, 706 (6th Cir.2003); Adult Video Ass’n v. U.S. Dept. of Justice, 71 F.3d 563, 568 (6th Cir.1995).

A.

There are several reasons why this claim is not “fit” for judicial review. To start, we have no idea whether the government will conduct an ex parte search of Warshak’s e-mail account in the future and plenty of reason to doubt that it will, making this a claim that depends on “contingent future events that may not occur as anticipated, or indeed may not occur at all.” Texas v. United States, 523 U.S. 296, 300, 118 S.Ct. 1257, 140 L.Ed.2d 406 (1998) (internal quotation marks omitted). Answering difficult legal questions before they arise and before the courts know how they will arise is not the way we typically handle constitutional litigation. See Lujan v. Nat’l Wildlife Fed’n, 497 U.S. 871, 894, 110 S.Ct. 3177, 111 L.Ed.2d 695 (1990).

Past is precedent, Warshak responds: Government agents have conducted two ex parte searches of his e-mails before, so it is fair to assume they will do so again. Making that prospect more likely, he adds, is the government’s reluctance to promise not to search Warshak’s e-mail accounts in the future. But this position overlooks a central feature of the statute. Searches under the statute generally require what Warshak demands: “prior notice.” 18 U.S.C. § 2703(b)(1)(B). In conducting its previous searches of Warshak’s e-mails, the government obtained judicial permission to delay notice to Warshak on the ground that disclosure would “seriously jeopardiz[e][the] investigation.” Id. § 2705(a)(2)(E). That possibility no longer exists. Warshak has ample notice of the investigation — indeed notice of the worst sort: He has been indicted (and now convicted). The question, as framed by the complaint, is not whether the government will conduct another search of Warshak’s e-mails; it is whether the government will conduct another ex parte search of his emails, a possibility that is exceedingly remote given that the reason the government kept these searches confidential— that they would jeopardize the ongoing investigation — no longer exists. It is within the realm of possibility, we suppose, that a new investigation could commence or that some other reason for delaying notice could arise, such as the need to avoid “endangering the life or physical safety of an individual; ... flight from prosecution; ... destruction of or tampering with evidence; ... intimidation of potential witnesses; or ... unduly delaying a trial.” Id. § 2705(a)(2)(A)-(E). But these possibilities are just that — possibilities (and remote possibilities at that) — making it eminently unpredictable whether, when or why the government would seek judicial permission to conduct another ex parte search of Warshak’s e-mails.

Not only do “we have no idea whether or when” such a search will occur but we also “have no idea” what e-mail accounts, or what types of e-mail accounts, the government might investigate. Toilet Goods Ass’n, Inc. v. Gardner, 387 U.S. 158, 163, 87 S.Ct. 1520, 18 L.Ed.2d 697 (1967). That uncertainty looms large in a debate about the expectations of privacy in e-mail accounts. The underlying merits issue in the case is this: In permitting the government to search e-mails based on “reasonable grounds,” is § 2703(d) consistent with the Fourth Amendment, which generally requires “probable cause” and a warrant in the context of searches of individuals, homes and, perhaps most analogously, posted mail? The answer to that question will turn in part on the expectations of privacy that computer users have in their e-mails — an inquiry that may well shift over time, that assuredly shifts from inter*527net-service agreement to internet-service agreement and that requires considerable knowledge about ever-evolving technologies. Because “[t]he task of generating balanced and nuanced rules” in this area “requires a comprehensive understanding of technological facts,” Orín S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 Mich. L.Rev. 801, 875 (2004), Warshak’s claim epitomizes the kind of dispute that would profit from “a concrete factual context,” Ammex, 351 F.3d at 706.

Think of just one of these moving parts — the variety of internet-service agreements and the differing expectations of privacy that come with them. An agreement might say that a service provider will “not ... read or disclose subscribers’ e-mail to anyone except authorized users.” United States v. Maxwell, 45 M. J. 406, 417 (C.A.A.F.1996) (describing testimony about AOL’s then-existing policy). An agreement might say that a service provider “will not intentionally monitor or disclose any private email message” but that it “reserve[s] the right” to do so in some cases. See Privacy Statement for Juno Members, http://www.juno.com/legal/ privacy.html (last visited July 7, 2008). An agreement might say that a service provider “may or may not pre-screen Content, but ... shall have the right (but not the obligation) in [its] sole discretion to pre-screen, refuse or move any Content that is available via the Service” — as indeed Warshak’s Yahoo! account did. JA 89, 163 n. 3. An agreement might say that e-mails will be provided to the government on request — as indeed the same Yahoo! account did. An agreement might say that other individuals, besides the recipient of the e-mail, will have access to it and will be entitled to use the information in it. See, e.g., JA 208 (explaining that Gmail, a service provided by Google, gives users “an enormous amount of storage capacity ... in exchange for ... terms of service which say that Google is allowed ... [to] take a look at the content of [users’] e-mail and ... target advertising at [users] accordingly”). Or an agreement might say that the user has no expectation of privacy in any of her communications. See, e.g., JA 207 (government counsel explaining that “every day when we log into our e-mail account, we agree that we have no expectation of privacy in the account”).

Some of these service-provider agreements could cast doubt on the validity of § 2703(d) in a given case; others might not. Better, we think, to decide the validity of the statute in the context of a specific internet-service agreement and a specific search and seizure.

Nor can we rely on previous government searches of Warshak’s e-mails to hypothesize the factual context of the next search. Even if the record contained the full text of the NuVox and Yahoo! service-provider agreements (it does not; it contains just part of the Yahoo! agreement), we would run into a similar conjecture problem. Just as there is little basis for assuming the government will conduct another ex parte search of Warshak’s emails, there is little basis for assuming any future search will concern e-mails facilitated by these service providers, as opposed to e-mails facilitated by other service providers. In view of Warshak’s knowledge of the investigation and knowledge of his pre-existing service-provider agreements before he filed the complaint, it is surely possible that he might switch to a service provider that gave him a greater expectation of privacy — say, by contracting with a paid-subscription service provider that promises not to screen e-mail. Or he might decide that the convenience of free, web-based e-mail is ultimately worth the tradeoff of allowing the service provider to *528screen his e-mail. We simply have no way of knowing what kind of accounts Warshak is likely to possess in the future and no basis for assuming that future e-mails will be controlled by the same type of service-provider agreement he used in the past. “The operation of the statute,” in short, will be “better grasped when viewed in light of a particular application.” Texas, 523 U.S. at 301, 118 S.Ct. 1257.

Concerns about the premature resolution of legal disputes have particular resonance in the context of Fourth Amendment disputes. In determining the “reasonableness” of searches under the Fourth Amendment and the legitimacy of citizens’ expectations of privacy, courts typically look at the “totality of the circumstances,” Samson v. California, 547 U.S. 843, 848, 126 S.Ct. 2193, 165 L.Ed.2d 250 (2006) (internal quotation marks omitted), reaching case-by-case determinations that turn on the concrete, not the general, and offering incremental, not sweeping, pronouncements of law, see O’Connor v. Ortega, 480 U.S. 709, 718, 107 S.Ct. 1492, 94 L.Ed.2d 714 (1987). Courts thus generally review such challenges in two discrete, post-enforcement settings: (1) a motion to suppress in a criminal case or (2) a damages claim under § 1983 or under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388, 91 S.Ct. 1999, 29 L.Ed.2d 619 (1971), against the officers who conducted the search. In both settings, the reviewing court looks at the claim in the context of an actual, not a hypothetical, search and in the context of a developed factual record of the reasons for and the nature of the search. A pre-enforcement challenge to future e-mail searches, by contrast, provides no such factual context. The Fourth Amendment is designed to account for an unpredictable and limitless range of factual circumstances, and accordingly it generally should be applied after those circumstances unfold, not before.

That is why Warshak’s rejoinder — that this case presents a “purely legal question,” Toilet Goods, 387 U.S. at 163, 87 S.Ct. 1520 — carries little weight. In addition to the fact that this “purely legal question” remains a purely speculative legal question, this case presents a legal question that may be answered differently in different settings and a legal question that “depend[s] ... on an understanding of’ complex factual issues. Id. In such eases, “judicial appraisal ... is likely to stand on a much surer footing in the context of a specific application of [the law] than could be the case in the framework of [a] generalized challenge.” Id. at 164, 87 S.Ct. 1520.

Making matters worse, Warshak’s complaint sought, and the district court’s injunction gave him, pre-enforcement relief not just on behalf of himself but on behalf of all e-mail users. The point of this attack on the statute, like all facial challenges, was to leave nothing standing — to prevent § 2703(d) from ever being enforced without a warrant and probable cause, no matter the circumstances, no matter the individual’s expectation of privacy, no matter the government’s interests in obtaining the information without tipping the suspect off to the investigation.

That is not how constitutional litigation typically proceeds, and that is why the federal courts do not lightly uphold facial challenges. Many of the concerns that underlie the ripeness doctrine — that “[t]he operation of the statute [will be] better grasped when viewed in light of a particular application” and that “the proper exercise of the judicial function” avoids deciding abstract and speculative questions, Texas, 523 U.S. at 301, 118 S.Ct. 1257 (internal quotation marks omitted)— underlie, and are indeed echoed by, the *529courts’ reluctance to grant relief in the face of facial, as opposed to as-applied, attacks on statutes. When “determining whether a law is facially invalid,” as when determining whether a case is ripe, “we must be careful not to ... speculate about ‘hypothetical’ or ‘imaginary’ cases” or to “premature[ly] interpret ] ... statutes on the basis of factually barebones records.” Wash. State Grange v. Wash. State Republican Party, — U.S.-, 128 S.Ct. 1184, 1190-91, 170 L.Ed.2d 151 (2008) (internal quotation marks omitted). “Exercising judicial restraint in a facial challenge frees the Court not only from unnecessary pronouncement on constitutional issues, but also from premature interpretations of statutes in areas where their constitutional application might be cloudy.” Id. at 1191 (internal quotation marks omitted); see also United States v. Raines, 362 U.S. 17, 22, 80 S.Ct. 519, 4 L.Ed.2d 524 (1960). As-applied challenges — the “basic building blocks of constitutional adjudication” — remain the preferred route. Gonzales v. Carhart, — U.S. -, 127 S.Ct. 1610, 1639, 167 L.Ed.2d 480 (2007) (internal quotation marks omitted); cf. Nat’l Wildlife Fed’n, 497 U.S. at 894, 110 S.Ct. 3177 (noting that the ripeness doctrine turns in part on the fact that “[t]he ease-by-case approach ... is the traditional, and remains the normal, mode of operation of the courts”).

Litigation by hypothetical becomes particularly risky in the face of ever-evolving and ever-more-complicated technology. Cf. Carhart, 127 S.Ct. at 1638. The complexities of modern electronic communications, which already have changed markedly since 1986, make it especially difficult to do what facial invalidation requires — “to consider every conceivable situation which might possibly arise in the application of complex and comprehensive legislation.” Id. at 1639 (internal quotation marks omitted).

The Supreme Court has been especially reluctant to invalidate statutes on their face under the Fourth Amendment. “The constitutional validity of a warrant-less search is pre-eminently the sort of question which can only be decided in the concrete factual context of the individual case.” Sibron v. New York, 392 U.S. 40, 59, 88 S.Ct. 1889, 20 L.Ed.2d 917 (1968). On this basis, Sibron refused “to be drawn into ... the abstract and unproductive exercise” of entertaining a Fourth Amendment challenge to the facial validity of New York’s “stop-and-frisk” statute, which authorized police to stop and search individuals in certain circumstances. Id. at 43-44, 59, 88 S.Ct. 1889. See generally Skinner v. Ry. Labor Executives’ Ass’n, 489 U.S. 602, 632 n. 10, 109 S.Ct. 1402, 103 L.Ed.2d 639 (1989); Bell v. Wolfish, 441 U.S. 520, 560, 99 S.Ct. 1861, 60 L.Ed.2d 447 (1979).

Even outside the case-by-case imperatives of Fourth Amendment decisionmak-ing, the Supreme Court has expressed increasing skepticism of facial challenges in recent years. In United States v. Salerno, 481 U.S. 739, 107 S.Ct. 2095, 95 L.Ed.2d 697 (1987), the Court held that the Bail Reform Act is not facially invalid under the Due Process Clause of the Fifth Amendment or the Excessive Bail Clause of the Eighth Amendment, id. at 755, 107 S.Ct. 2095. The Court reasoned that “[a] facial challenge to a legislative Act is ... the most difficult challenge to mount successfully, since the challenger must establish that no set of circumstances exists under which the Act would be valid. The fact that the Bail Reform Act might operate unconstitutionally under some conceivable set of circumstances is insufficient to render it wholly invalid.... ” Id. at 745, 107 S.Ct. 2095. In Sabri v. United States, 541 U.S. 600, 124 S.Ct. 1941, 158 L.Ed.2d *530891 (2004), the Court rejected a facial challenge to a bribery statute, explaining that “[f]acial adjudication carries too much promise of premature interpretatio[n] of statutes on the basis of factually barebones records,” id. at 609, 124 S.Ct. 1941 (internal quotation marks omitted) (second alteration in original). “Although passing on the validity of a law wholesale may be efficient in the abstract,” the Court explained, “any gain is often offset by losing the lessons taught by the particular, to which common law method normally looks.” Id. at 608-09, 124 S.Ct. 1941. Even in the abortion context, where in the past it has applied a more relaxed standard to facial challenges, see Planned Parenthood of Se. Pa. v. Casey, 505 U.S. 833, 895, 112 S.Ct. 2791, 120 L.Ed.2d 674 (1992), the Court recently expressed its preference for as-applied challenges. In Carhart, the Court refused to engage in conjecture about potential applications of an abortion statute, saying that “it would indeed be undesirable for this Court to consider every conceivable situation which might possibly arise in the application of complex and comprehensive legislation.” 127 S.Ct. at 1639 (internal quotation marks omitted).

This trend continued in the Supreme Court’s most recent Term. In Crawford v. Marion County Election Board, — U.S. -, 128 S.Ct. 1610, 170 L.Ed.2d 574 (2008), the Court explained that plaintiffs mounting facial challenges “bear a heavy burden of persuasion,” then rejected a facial challenge to Indiana’s voter-identification requirements, id. at 1621-23. In Washington State Grange, the Court explained that “[f]acial challenges are disfavored, raise the risk of premature interpretation[,] ... run contrary to the fundamental principle of judicial restraint” and “threaten to short-circuit the democratic process.” 128 S.Ct. at 1191. Refusing to hold Washington’s primary system unconstitutional in all its applications, the Court reasoned that the plaintiffs’ claim rested on “sheer speculation” that the system would confuse voters and that there was “no evi-dentiary record” to provide guidance. Id. at 1193-94. That the system “could conceivably be” implemented in a constitutional manner was “fatal” to the facial challenge, leaving fact-specific claims of voter confusion to “await an as-applied challenge.” Id. at 1194-95. A similar conclusion applies here: Because we can only speculate as to the sorts of accounts and privacy terms that different users may have today and may have in the future, it is far more prudent to “await an as-applied challenge” to decide whether the Act is constitutional in a discrete factual setting.

In the face of these considerations and this case law, Berger v. New York, 388 U.S. 41, 87 S.Ct. 1873, 18 L.Ed.2d 1040 (1967), offers Warshak little help. Berger, it is true, appeared to invalidate a New York eavesdropping statute on its face. Id. at 43 n. 1, 87 S.Ct. 1873. But the Court did not discuss the distinction between as-applied and facial challenges, and accordingly did not reach, and necessarily did not discuss, the question whether it would have made sense to proceed differently. One year later, when the Court decided Sibron, it did discuss this distinction, it interpreted Berger narrowly and it advised courts to consider challenges to “[t]he constitutional validity of a warrantless search” on an as-applied basis. Sibron, 392 U.S. at 59, 88 S.Ct. 1889. Unlike Berger and Sibron, moreover, this case involves not just the risk of guessing about other fact patterns in which a statute might be applied but the risk of guessing how the statute will be applied even to this individual — a fact that makes the facial invalida*531tion of this statute especially inappropriate.

No doubt, Warshak is correct that the Court has issued Fourth Amendment rulings that effectively invalidated statutes in whole or in part. See, e.g., Payton v. New York, 445 U.S. 573, 589-90, 598 & n. 46, 100 S.Ct. 1371, 63 L.Ed.2d 639 (1980); Torres v. Puerto Rico, 442 U.S. 465, 471, 474, 99 S.Ct. 2425, 61 L.Ed.2d 1 (1979). But in these cases, too, the Court reviewed applications of statutes in concrete settings — motions to suppress that sought to prevent the information obtained in a search from being used against the defendant. See Payton, 445 U.S. at 576-79, 589-90, 100 S.Ct. 1371; Torres, 442 U.S. at 467, 474, 99 S.Ct. 2425. That is a distant cry from the relief Warshak seeks today.

Nor, for a separate reason, was it appropriate in this case to grant a preliminary injunction in favor of persons other than Warshak. “While district courts are not categorically prohibited from granting injunctive relief benefitting an entire class in an individual suit, such broad relief is rarely justified because injunctive relief should be no more burdensome to the defendant than necessary to provide complete relief to the plaintiffs.” Sharpe v. Cureton, 319 F.3d 259, 273 (6th Cir.2003) (emphasis omitted). Warshak did not seek class-action relief, and he has made no showing — below or here — why the injunction needed to run in favor of other individuals in order to protect him.

Our reluctance to hypothesize how the government might conduct a conjectural search of Warshak’s e-mails, then resolve the constitutionality of that search as well as any others the government might conduct under the statute, is reinforced by another reality: The Stored Communications Act has been in existence since 1986 and to our knowledge has not been the subject of any successful Fourth Amendment challenges, in any context, whether to § 2703(d) or to any other provision. If it “is often true” that reviewing “legislation in advance of its immediate adverse effect in the context of a concrete case involves too remote and abstract an inquiry for the proper exercise of the judicial function,” Texas, 523 U.S. at 301, 118 S.Ct. 1257 (internal quotation marks omitted), the same is assuredly true when we have no precedent to guide us, cf. Raines, 362 U.S. at 23, 80 S.Ct. 519. Discretion, indeed, is the better part of valor.

B.

There also is no meaningful risk of “hardship” to Warshak “of withholding court consideration.” Abbott Labs., 387 U.S. at 149, 87 S.Ct. 1507. The prototypical case of hardship comes from the claimant who faces a choice between immediately complying with a burdensome law or “risking] serious criminal and civil penalties.” Id. at 153, 87 S.Ct. 1507; compare id. with Toilet Goods, 387 U.S. at 164-65, 87 S.Ct. 1520. Yet Warshak faces no such conflict. The relevant provisions of the Act do not require Warshak to do anything. They do not “force [Warshak] to modify [his] behavior in order to avoid future adverse consequences,” see Ohio Forestry Ass’n, Inc. v. Sierra Club, 523 U.S. 726, 734, 118 S.Ct. 1665, 140 L.Ed.2d 921 (1998), or require Warshak “to engage in, or to refrain from, any conduct,” see Texas, 523 U.S. at 301, 118 S.Ct. 1257. Because the Act does not purport to regulate his primary conduct at all, much less impose criminal and civil penalties for noncompliance, it does not put Warshak in an untenable bind between undertaking an irreversible burden or risking criminal indictment.

Hardship is difficult to maintain on this record for another reason. Individuals subjected to allegedly unconstitutional *532searches and seizures have at least two alternatives short of a pre-enforcement, facial attack on the enabling statute. They may file a motion to suppress in the event the government tries to use the evidence against them in a criminal prosecution. Or they may file a § 1983 or a Bivens action against the officers who conducted the search. Warshak filed a motion to suppress in his criminal case and, for reasons of his own, has not filed a Bivens action.

Warshak responds that these options will not allow him to obtain what he wants: a constitutional ruling on the validity of § 2703(d). As he sees it, the courts could apply the Leon good-faith doctrine in denying his motion to suppress, see United States v. Leon, 468 U.S. 897, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984), and they could reject his Bivens claim on the ground that the invalidity of the statute had not been “clearly established.” Both rulings, he points out, would not generate a Fourth Amendment determination. Even accepting for a moment Warshak’s premise that one of the “hardship” concerns that may ripen a claim into a justiciable controversy is a litigant’s interest in obtaining a constitutional ruling, Warshak is only half right. Yes, Leon permits courts to decide the good-faith question without determining whether the search was valid. See Leon, 468 U.S. at 925, 104 S.Ct. 3405; Illinois v. Krull, 480 U.S. 340, 349-50, 107 S.Ct. 1160, 94 L.Ed.2d 364 (1987). And indeed, since the oral argument in this case, the district court has rejected Warshak’s suppression motion solely on the ground that the officers acted in good faith. Opinion and Order, Warshak, No. 1:06-cr-00111, 2007 WL 4410237 at 11-13 (S.D.Ohio Dec. 13, 2007).

But the same is not true of a Bivens action. The Court has “insist[ed]” on a strict order of engagement in Bivens (and § 1983) actions, requiring courts to “turn[ ] to the existence or nonexistence of a constitutional right as the first inquiry ” and preventing them from “skip[ping] ahead to the question whether the law clearly established that the officer’s conduct was unlawful in the circumstances of the case.” Saucier v. Katz, 533 U.S. 194, 201, 121 S.Ct. 2151, 150 L.Ed.2d 272 (2001) (emphasis added). If a constitutional ruling is what Warshak wanted, a Bivens action would have given it to him.

But even if a Bivens claim did not guarantee Warshak the constitutional ruling he seeks, see Scott v. Harris, — U.S.-, 127 S.Ct. 1769, 1774 n. 4, 167 L.Ed.2d 686 (2007) (saving for another day whether to reconsider the requirement that the constitutional issue must be resolved first in a § 1983 or Bivens action), that would not alter our conclusion. Warshak offers no authority for the proposition that an otherwise-unripe claim may be entertained on the ground that it will facilitate a judicial ruling on the merits. And we doubt that any such authority exists. A central tenet of the case-or-controversy requirement after all is that a general interest in a judicial ruling on the merits does not by itself confer jurisdiction on the federal courts. Otherwise, a claimant’s interest in a judicial ruling itself would justify reaching the question, prematurely or not. And even if the Supreme Court were to permit lower courts to sidestep constitutional rulings in addressing motions to suppress and § 1983 (and Bivens) actions, that presumably would be because the Court took the view that in some settings it did not make sense to decide constitutional questions prematurely. See Scott, 127 S.Ct. at 1774 n. 4. That of course is the same concern underlying the ripeness doctrine — a concern we would hardly respect by permitting such claims through pre-enforcement, facial attacks instead.

*533Also unavailing is Warshak’s concern that, without a constitutional ruling, he will be exposed to future unconstitutional searches. That contention, as we have shown, turns on a long list of speculative assumptions — that (1) the government will again seek to obtain his e-mail contents, even though he has already been indicted and convicted, (2) it will choose to do so through § 2703(d), as opposed to a search warrant or subpoena, (3) a court will determine that the § 2703(d) requirements are met, (4) the government will seek to invoke the delayed-notice provision and (5) a court will find that notice of the search would imperil the existence of an already-known investigation. That is not a plausible theory of hardship.

Warshak also has argued on appeal that the Act creates a “chilling effect” on his use of email. Although a chilling effect might relax ripeness requirements in a First Amendment case, see, e.g., Anderson v. Spear, 356 F.3d 651, 669 (6th Cir.2004), Warshak never made a First Amendment claim. The first time he claimed a “chilling effect” of any sort as to him was at oral argument before the en banc court. The only other “chilling effect” concern raised in the litigation was in his memorandum in support of a preliminary injunction, in which he alleged that denying the injunction would cause harm to others because it would “have a chilling effect on the [general public’s] use of email as a form of communication because people and businesses would regard it as unsecured.” JA 76. Because Warshak does not challenge the government’s action on First Amendment grounds, this is a “non-First Amendment case[]” and the traditional ripeness requirements apply. Nat’l Rifle Ass’n of Am. v. Magaw, 132 F.3d 272, 285 (6th Cir.1997).

‡ if: ❖ ‡ %

The dissent makes two points that deserve a response: (1) that the court should “reach[ ] the question that is on everyone’s mind” — the validity of the delayed-notice provision of the Act, Dissent at 534; see id. (“Why do today what can be done tomorrow?”), and (2) that the court should contain its “zeal to uphold the power of the government to intrude into the privacy of citizens,” id. at 537, and that its decision “is but another step in the ongoing degradation of civil rights in the courts of this country,” id. at 538.

As a matter of efficiency, the dissent is quite right. The ripeness doctrine, like all limitations on the “judicial Power,” prevents us from “do[ing] today what can be done tomorrow” and, in the process, prevents us from announcing interpretations of the Constitution that some citizens and commentators may wish to hear today. But efficiency is not the only end of the Constitution, and it is hardly a value that necessarily favors the promotion of civil rights, at least if history is any guide. See Stanley v. Illinois, 405 U.S. 645, 656, 92 S.Ct. 1208, 31 L.Ed.2d 551 (1972). Whatever value efficiency has when it comes to the interpretation of constitutional rights, at any rate, that consideration must be balanced against other judicial values: deciding constitutional questions correctly, which we are more likely to do on a case-by-case basis in the context of a concrete factual setting; and exercising the Mar-burg power only when the Constitution, Congress and precedent give us that authority. “Although passing on the validity of a law wholesale may be efficient in the abstract, any gain is often offset by losing the lessons taught by the particular.” Sabri, 541 U.S. at 608-09, 124 S.Ct. 1941.

The dissent’s concern about the “ongoing degradation of civil rights” seems a bit overwrought. The whole point of not deciding the constitutionality of a law in an *534unripe setting is not to decide it — not to degrade, or for that matter uplift, any constitutional right until we are faced with a concrete, as-applied, challenge to the provision. And if it is true, as the dissent charges, that the majority has a “zeal to uphold the power of the government to intrude into the privacy of citizens” — needless to say, it is not — perhaps we should be commended for restraining ourselves by not making that view the law when we had the chance.

But, perhaps most acutely, both of the dissent’s concerns have almost nothing to do with this case. Warshak has only himself to blame for choosing not to vindicate his civil rights when he had the chance— through a Bivens action. And, either way, he still retains the right to challenge the district court’s resolution of his motion to suppress through an appeal of his criminal conviction.

III.

For these reasons, we vacate the preliminary injunction and remand the case to the district court to dismiss Warshak’s constitutional claim.