Facebook, Inc. v. State of New Jersey

SYLLABUS This syllabus is not part of the Court’s opinion. It has been prepared by the Office of the Clerk for the convenience of the reader. It has been neither reviewed nor approved by the Court and may not summarize all portions of the opinion. Facebook, Inc. v. State (A-61-21; A-7-22) (087054) Argued March 13, 2023 -- Decided June 29, 2023 RABNER, C.J., writing for a unanimous Court. The Court considers whether Facebook can be compelled to provide the contents of two users’ accounts every 15 minutes for 30 days into the future based only on probable cause, the ordinary standard for a search warrant, or whether the State must instead satisfy certain requirements and apply for a wiretap order, which requires an enhanced showing -- one beyond probable cause -- because gaining access to private communications in real time is considerably more intrusive than a typical search. The 15-minute delay is because of technical limitations; it is as fast as Facebook can provide the information. Even though it seeks extensive information from private user accounts that does not yet exist, in as close to real time as possible, the State argues that, in light of the 15-minute delay, it is obtaining “stored communications,” which do not require a wiretap order. Nowhere else in the nation has law enforcement sought prospective communications from Facebook users’ accounts without presenting a wiretap order. In the two matters under review, trial courts quashed the State’s request for prospective information based on a Communications Data Warrant (CDW), which is the equivalent of a search warrant and can be issued on a showing of probable cause. The Appellate Division consolidated the cases and held that the State could obtain prospective electronic communications with a CDW, reasoning that the wiretap statute applied to the contemporaneous interception of electronic communications, not efforts to access communications in storage. 471 N.J. Super. 430, 455-56, 459 (App. Div. 2022). To ensure compliance “with the federal and state constitutions and [New Jersey’s] warrant procedures,” however, the Appellate Division imposed a 10-day limit on the duration of the CDWs, importing the shorter deadline from Rule 3:5-5(a), which sets a time limit for the execution of search warrants. Id. at 463, 465. The Court granted Facebook leave to appeal, 251 N.J. 378 (2022), and the State leave to cross-appeal the 10-day limit, 252 N.J. 36 (2022). HELD: Based on the language and structure of the relevant statutes, the State’s request for information from users’ accounts invokes heightened privacy protections. 1 The nearly contemporaneous acquisition of electronic communications here is the functional equivalent of wiretap surveillance and is therefore entitled to greater constitutional protection. New Jersey’s wiretap act applies in this case to safeguard individual privacy rights under the relevant statutes and the State Constitution. 1. The protections guaranteed by the Fourth Amendment to the United States Constitution and Article I, Paragraph 7 of the New Jersey Constitution extend to government surveillance of private conversations. The Supreme Court’s landmark opinions in Berger v. New York, 388 U.S. 41 (1967), and Katz v. United States, 389 U.S. 347 (1967), outlined principles to protect individual privacy rights in the area of electronic surveillance. In response to those cases, Congress enacted the Federal Wiretap Act in 1968. 18 U.S.C. §§ 2510 to 2520. New Jersey then enacted the State Wiretap Act, modeled after federal law. Like its federal counterpart, the State Act defines “intercept” as “the aural or other acquisition of the contents of any wire, electronic or oral communication through the use of any electronic, mechanical, or other device.” N.J.S.A. 2A:156A-2(c); 18 U.S.C. § 2510(4). The law includes numerous protections, and courts strictly construe the State Wiretap Act to protect individual privacy rights. State v. Ates, 217 N.J. 253, 268 (2014). (pp. 12-17) 2. Stored communications are governed by a different group of statutory provisions. In 1986, Congress enacted the Electronic Communications and Privacy Act (ECPA) to update privacy protections in light of dramatic changes in technology. The ECPA added “electronic” communications to the definition of “intercept” in the Federal Wiretap Act. It also created what is known as the Stored Communications Act (SCA), 18 U.S.C. §§ 2701 to 2713, which focuses on electronic information in storage. New Jersey enacted similar legislation in 1993. The federal and the state stored communications statutes define “electronic communications” and “electronic storage” in nearly identical terms, but they differ in the way they discuss access to stored electronic communications maintained by service providers. Federal law authorizes government entities to require disclosure of a communication “that is in electronic storage” for 180 days or less pursuant to a warrant, or that “has been in electronic storage” for more than 180 days pursuant to a warrant or other specified means. 18 U.S.C. § 2703(a) (emphases added). The parallel New Jersey statute, by contrast, makes no mention of “electronic storage.” See N.J.S.A. 2A:156A-29(a). Neither federal nor state law includes enhanced protections for the disclosure of the contents of stored electronic communications. (pp. 18-21) 3. The Court first considers whether the electronic communications the State seeks are covered by New Jersey’s equivalent to the SCA. Neither the federal nor the state version of the SCA expressly authorizes disclosure of future communications. See 18 U.S.C. § 2703(a); N.J.S.A. 2A:156A-29(a). The commonsense meaning of the words in the federal SCA -- “is in electronic storage” and “has been in electronic storage” -- do not include content or data that “will be” in storage at a later point in 2 time. The Court explains why the Federal Dictionary Act does not apply. Although some provisions of the ECPA apply to prospective surveillance activities, the SCA, which governs “stored” communications, does not. And the State’s argument fares no better under the State Wiretap Act. The New Jersey Legislature did not incorporate language about electronic storage in N.J.S.A. 2A:156A-29(a). In addition, reflecting the structure of the ECPA, the state code addresses wiretap interceptions at N.J.S.A. 2A:156A-1 to -26 and stored communications at N.J.S.A. 2A:156A-27 to -34. The forward-looking aspects of the act appear in the wiretap sections only, not in the sections about stored communications. The federal and state statutes do not support the use of a warrant to access the contents of prospective electronic communications. (pp. 22-27) 4. The Court next considers whether the requests for information in this appeal are subject to the enhanced privacy protections of the wiretap acts. The State argues the wiretap acts do not apply because the stored messages it seeks will not be intercepted contemporaneously, in real time. Although multiple federal circuits have held that an “intercept” must occur contemporaneously with transmission, the word “contemporaneous” does not appear in the ECPA or its state counterpart. Those rulings stem instead from a Fifth Circuit decision that preceded the ECPA and held that the term “intercept” in the 1968 Federal Wiretap Act required contemporaneity. And, significantly, those federal rulings involved purely historical communications, such as cassette tapes, prior postings on a password-protected website, and stored emails. In none of those cases did anyone access communications either while they were in flight or nearly contemporaneously to their transmission. Some Circuit Courts have raised questions about the contemporaneity requirement. (pp. 27-32) 5. A strict contemporaneity rule adopted before the advent of the Internet would not be a good fit to address the situations technology presents today. Nor would it be consistent with the underlying purpose of the wiretap statutes -- to protect individual privacy. From a practical standpoint, if a strict contemporaneity approach applied, law enforcement would never need to apply for a wiretap order to obtain future electronic communications on an ongoing basis. It would be only natural to apply instead for a CDW, which is easier to obtain but has fewer safeguards for privacy. And in time, as technology improves, today’s unavoidable 15-minute delay may well get shorter. The logical extension of the State’s position is that law enforcement could avoid the requirements of the wiretap acts by simply asking Facebook to wait a few minutes, while data is stored, before providing electronic communications on an ongoing, future basis. That cannot be right given the underlying aim of the statutes. Based on the language, structure, and intent of the State Wiretap Act, it applies to the near real-time acquisition of prospective electronic communications. Attempts to acquire electronic communications every 15 minutes, for 30 days into 3 the future, are not covered by New Jersey’s equivalent of the SCA. They are instead subject to the requirements of the State Wiretap Act. (pp. 32-33) 6. The wiretap statutes are infused with constitutional considerations, as identified in Berger and Katz. The Constitution sets the benchmark for a reasonable search: the use of a warrant based on probable cause. When a lesser expectation of privacy is involved, or when a search involves a minimal intrusion on an individual’s privacy, fewer protections are required. The same is true in reverse. More intrusive searches call for enhanced protections. Here, the privacy interests at stake and the level of intrusion are substantial. There are no limits to the content the State seeks, yet the CDW orders have no minimization requirements. In essence, the State seeks the functional equivalent of a wiretap -- but without the added safeguards the wiretap acts require. If it were possible to obtain the contents of future electronic communications from Facebook in real time, the parties agree the wiretap statutes and protections would apply. The same privacy interests exist here. A warrant based on probable cause is not enough to monitor prospective electronic communications in nearly real time, on an ongoing basis. The principles set forth in Berger and its progeny require the State to make a heightened showing and adhere to the additional safeguards provided in the wiretap acts. The Court’s conclusion is grounded in the privacy protections the State Constitution guarantees. (pp. 34-39) 7. Reviewing the required enhanced protections and time limits established by the State Wiretap Act, the Court notes that the 10-day time limit set forth in Rule 3:5-5 is not the right benchmark. The Rule does not apply here. Nor does it resolve any of the statutory or constitutional concerns the CDWs present. Facebook contends the CDWs are flawed because they represent “the equivalent of a series of intrusions, searches, and seizures pursuant to a single showing of probable cause.” The heightened protections of the Wiretap Act address that concern. The Court affirms at the same time the principles in State v. Earls, 214 N.J. 564 (2013). (pp. 39-40) 8. Turning to additional arguments raised by the State, the Court explains why the CDWs here are not anticipatory warrants and why the reasonable continuation doctrine does not apply. (pp. 40-43) 9. The Court’s ruling appears to align with practices elsewhere. The arguments presented do not identify any jurisdictions, other than New Jersey, which have sought prospective electronic communications based on a search warrant. (p. 43) REVERSED. The specified portions of the CDWs are QUASHED. JUSTICES PATTERSON, SOLOMON, PIERRE-LOUIS, and WAINER APTER join in CHIEF JUSTICE RABNER’s opinion. JUSTICE FASCIALE and JUDGE SABATINO (temporarily assigned) did not participate. 4 SUPREME COURT OF NEW JERSEY A-61 September Term 2021 A-7 September Term 2022 087054 Facebook, Inc., Plaintiff-Appellant/Cross-Respondent, v. State of New Jersey, Defendant-Respondent/Cross-Appellant. In re the Application of the State of New Jersey for a Communications Data Warrant Authorizing the Obtaining of the Contents of Records from Facebook, Inc. On appeal from the Superior Court, Appellate Division, whose opinion is reported at 471 N.J. Super. 430 (App. Div. 2022). Argued Decided March 13, 2023 June 29, 2023 Seth P. Waxman (Wilmer Cutler Pickering Hale and Dorr) of the District of Columbia bar, admitted pro hac vice, argued the cause for appellant/cross-respondent Facebook, Inc. (Javerbaum, Wurgaft, Hicks, Kahn, Wikstrom & Sinins, attorneys; Rubin Sinins, Seth P. Waxman, Ronald C. Machen (Wilmer Cutler Pickering Hale and Dorr) of the District of Columbia bar, admitted pro hac vice, Catherine M.A. Carroll (Wilmer Cutler Pickering Hale and Dorr) of the District of Columbia and 1 Virginia bars, admitted pro hac vice, John K. Roche (Perkins Coie) of the District of Columbia, Virginia, and Maryland bars, admitted pro hac vice, Mikella M. Hurley (Perkins Coie) of the District of Columbia and New York bars, admitted pro hac vice, and George P. Varghese (Wilmer Cutler Pickering Hale and Dorr) of the Massachusetts and Pennsylvania bars, admitted pro hac vice, on the briefs). Sarah C. Hunt, Deputy Attorney General, argued the cause for respondent/cross-appellant State of New Jersey (Matthew J. Platkin, Attorney General, attorney; Sarah C. Hunt, of counsel and on the briefs, and Lila B. Leonard, Deputy Attorney General, on the briefs). Jennifer Stisa Granick (American Civil Liberties Union) of the California bar, admitted pro hac vice, argued the cause for amici curiae American Civil Liberties Union and American Civil Liberties Union of New Jersey (American Civil Liberties Union of New Jersey Foundation, and American Civil Liberties Union Foundation, attorneys; Alexander Shalom, Jeanne LoCicero, and Jennifer Stisa Granick, on the brief). Erez Liebermann argued the cause for amici curiae Microsoft Corporation and Google, LLC (Debevoise & Plimpton and Herrick Feinstein, attorneys; Erez Liebermann, Michelle M. Sekowski, and James Pastore (Debevoise & Plimpton) of the New York bar, admitted pro hac vice, on the brief). Brian J. Neary argued the cause for amicus curiae New Jersey State Bar Association (Jeralyn L. Lawrence, President, New Jersey State Bar Association, attorneys; Jeralyn L. Lawrence, of counsel, and Brian J. Neary, Robert B. Hille, Holly A. Maynard, James H. Maynard, and Matheu D. Nunn, on the brief). Peter T. Blum, Assistant Deputy Public Defender, submitted a brief on behalf of amicus curiae Public 2 Defender of New Jersey (Joseph E. Krakora, Public Defender, attorney; Peter T. Blum, of counsel and on the brief). Geoffrey S. Brounell submitted a brief on behalf of amici curiae Center for Democracy & Technology, Electronic Privacy Information Center, and Electronic Frontier Foundation (Davis Wright Tremaine, attorneys; Geoffrey S. Brounell, David M. Gossett, of the District of Columbia and Illinois bars, admitted pro hac vice, and MaryAnn T. Almeida, of the District of Columbia and Washington bars, admitted pro hac vice, on the brief). CHIEF JUSTICE RABNER delivered the opinion of the Court. In this case, law enforcement officers seek to compel Facebook to provide the contents of two users’ accounts every 15 minutes for 30 days into the future. The 15-minute delay is because of technical limitations; it is as fast as Facebook can provide the information. To conduct a search, the State ordinarily must demonstrate there is probable cause to believe evidence of a crime will be found at a particular place and must obtain a warrant. Gaining access to private communications in real time, however, is considerably more intrusive than a typical search. In those instances, the State must satisfy certain heightened requirements and apply for a wiretap order, which requires an enhanced showing -- one beyond probable cause. 3 That approach attempts to balance law enforcement’s legitimate need to investigate crime and the reasonable privacy rights that individuals possess. Here, even though the State seeks extensive information from private user accounts that does not yet exist, in as close to real time as possible, it claims it only needs to show probable cause. For support, the State presents argument s based on statutes that govern stored communications and wiretap interceptions. In short, the State argues that because of the brief 15-minute delay involved, it is obtaining “stored communications” rather than intercepting live ones, so fewer safeguards apply. We do not agree. And nowhere else in the nation has law enforcement sought prospective communications from Facebook users’ accounts without presenting a wiretap order. Based on the language and structure of the relevant statutes, we find that the State’s request for information from users’ accounts invokes heightened privacy protections. We also find that the nearly contemporaneous acquisition of electronic communications here is the functional equivalent of wiretap surveillance and is therefore entitled to greater constitutional protection. Two trial courts quashed the State’s request for prospective information based on a Communications Data Warrant (CDW), the equivalent of a search warrant. The Appellate Division, however, concluded that a showing of 4 probable cause under a CDW was sufficient and ordered Facebook to turn over future electronic communications. We now reverse that judgment and hold that the protections of New Jersey’s wiretap act apply in this case in order to safeguard individual privacy rights under the relevant statutes and the State Constitution. I. A CDW is “the equivalent of a search warrant.” State v. Lunsford, 226 N.J. 129, 133 (2016). Like a standard search warrant, a CDW can be issued based on a showing of probable cause. State v. Finesmith (Finesmith II), 408 N.J. Super. 206, 212 (App. Div. 2009). It “is not subject to the more restrictive procedures and enhanced protections of the Wiretap Act.” Ibid. In March 2021, the New Jersey State Police applied for a CDW to obtain electronic information from the Facebook1 account of “Maurice” -- a pseudonym for the account holder. Maurice was under investigation for various drug-related offenses. A trial court judge in the Mercer Vicinage granted the CDW application on March 5, 2021. In an unrelated case the same month, the Atlantic County Sheriff’s Office applied for a CDW for information from another Facebook user’s 1 Facebook, Inc. changed its name to Meta Platforms, Inc. in October 2021, months after court proceedings in this matter began. Consistent with filings throughout the case, we continue to use the name Facebook. 5 account. “Anthony,” another pseudonym, was under investigation for gang- and drug-related offenses. A judge in the Atlantic Vicinage granted the CDW on March 16, 2021. Using slightly different wording, the CDWs sought, among other things, the names, addresses, phone numbers, and email addresses associated with the accounts, as well as the contents of “stored electronic communications.” The latter category included “real time access to email with attachments, whether opened or unopened”; “private messaging content”; and “real time access to media . . . uploaded to the account[s],” including images, videos, audio files, and “the contents of private messages in all message folders.” The Atlantic CDW also specified Messenger chats; the Mercer CDW specified “posts, comments, [and] messages.” Although both CDWs sought “real time” access to data, the Atlantic CDW noted that “[a]ny ‘real time’ data obtained from Facebook Inc. is stored on the respective servers and then provided to law enforcement officials in approximately 15 minute intervals.” The CDWs ordered Facebook not to reveal the existence of the investigation for 180 days in the Mercer order, and until further order of the court in the Atlantic order. 6 The warrants directed Facebook to disclose the contents of both historical and future communications. Law enforcement sought all communications dating back to December 1, 2020 in the Mercer matter and to January 1, 2021 in the Atlantic matter. Facebook turned over those historical records, and they are not part of this appeal. The CDWs also required Facebook to provide the contents of all future communications for the next 30 days in “real time” -- that is, every 15 minutes. Facebook did not produce any prospective communications and moved to quash that part of the CDWs. Both trial court judges granted Facebook’s motion. The trial court in the Mercer matter observed that ongoing disclosures “in 15-minute increments . . . is the closest that the State can possibly get to real-time interception.” The court rejected a narrow construction of the term “interception” in the wiretap statute as “being limited solely to . . . instantaneous transmission.” The court also noted that the “prolonged period of intrusion on an individual’s privacy” for 30 days “raises legitimate concerns.” The trial court in the Atlantic matter underscored “the right of every citizen to enjoy privacy in their communications.” The court observed that the disclosure of future communications every 15 minutes is “tantamount to eavesdropping.” The “series of intrusions,” the court concluded, needs “to be 7 authorized not just by a search warrant with probable cause, but with a wiretap warrant which has heightened protections.” The Appellate Division granted the State’s motions for leave to appeal and consolidated the two cases. The appellate court held that the State could obtain prospective electronic communications with a CDW but only for a 10- day period. Facebook, Inc. v. State, 471 N.J. Super. 430, 459, 465 (App. Div. 2022). The Appellate Division reasoned that the wiretap statute applied to the contemporaneous interception of electronic communications, not efforts to access communications in storage. Id. at 455-56. Because the communications the State sought were not “in flight” and had been stored on Facebook’s servers, the court found the wiretap act did not apply. Id. at 457. The Appellate Division instead concluded that the request was governed by federal and state statutes relating to stored communications. Id. at 458-59. The appellate court found that the text of both the federal and state statutes, which we turn to later, encompasses past and prospective communications, that is, “electronic communications not yet in storage when legal process issues.” Id. at 459-62. To ensure compliance “with the federal and state constitutions and [New Jersey’s] warrant procedures,” however, the Appellate Division imposed a 10- 8 day limit on the duration of the CDWs. Id. at 465. The court imported the shorter deadline from Rule 3:5-5(a), which sets a time limit for the execution of search warrants. Id. at 463, 465. To obtain communications beyond 10 days, the court held the State must apply for a new CDW based on a new showing of probable cause. Ibid. The Appellate Division denied Facebook’s motion for reconsideration. We granted its motion for leave to appeal, 251 N.J. 378 (2022), and the State’s motion for leave to cross-appeal the 10-day limitation, 252 N.J. 36 (2022). We also granted leave to participate as amici curiae to the American Civil Liberties Union and the American Civil Liberties Union of New Jersey (jointly, the ACLU); the New Jersey State Bar Association (NJSBA); the Office of the Public Defender; Microsoft Corporation and Google, LLC, participating together; and the Center for Democracy & Technology, Electronic Privacy Information Center, and Electronic Frontier Foundation, participating together (collectively, the Center). II. Facebook argues that neither federal nor state statutory law authorizes the use of a search warrant to compel disclosure of the contents of prospective communications. Facebook instead maintains that the challenged searches are governed by the enhanced privacy protections of the wiretap acts. 9 Facebook also contends that the Appellate Division’s decision contravenes the Federal and State Constitutions, which bar multiple intrusions based on a single warrant. Facebook argues as well that the CDWs are not anticipatory warrants and cannot be justified under the reasonable continuation doctrine. The Attorney General, on behalf of the State, submits that the judgment of the Appellate Division should be upheld except for the 10-day limitation imposed on the CDWs. Because the State contends that it seeks only stored electronic communications and not contemporaneous interceptions, it argues that the wiretap acts do not apply. The State also maintains that no language in the relevant statutes about stored communications distinguishes between historical and prospective communications. The Attorney General additionally argues that continuing disclosure of stored electronic communications under a CDW is constitutional. According to the State, CDWs are appropriate anticipatory warrants; the 15-minute installments satisfy the reasonable continuation doctrine; and the overall intrusion on privacy is reasonable. Finally, the Attorney General challenges the 10-day limitation imposed by the Appellate Division. The State contends the appellate court incorrectly relied on ---- Rule 3:5-5 to arrive at that limit. 10 Amici all support Facebook’s position. The ACLU emphasizes that “data surveillance” today is “far more invasive” than “wiretaps of old.” As a result, the ACLU urges the Court to apply wiretap-like protections, as does the NJSBA. Microsoft and Google represent that no other jurisdiction has sought ongoing, prospective surveillance of electronic communications based on a warrant. The companies state that when law enforcement agencies outside of New Jersey have made similar requests, they have presented wiretap orders. The Center warns that the appellate ruling will have a profound negative effect on the personal liberty of surveillance targets as well as the individuals with whom they communicate. The Public Defender argues more broadly that heightened wiretap-like protections should apply to all efforts by law enforcement to examine large swaths of private electronic communications -- both historical and prospective. Access to entire social media accounts, the Public Defender submits, provides a vast amount of private information about subscribers. III. This appeal presents a straightforward question: whether law enforcement officials can obtain the contents of electronic communications from a Facebook account prospectively -- every 15 minutes for 30 days into 11 the future -- based solely on a showing of probable cause. The answer raises intricate questions about (1) the meaning of the statutes that govern the disclosure of stored communications and wiretap surveillance, and (2) the scope of the constitutional principles that led to the enactment of those laws. We begin by tracing the history of the relevant statutes. A. In nearly identical language, the Fourth Amendment to the United States Constitution and Article I, Paragraph 7 of the New Jersey Constitution protect “against unreasonable searches and seizures.” Both constitutions state that warrants must be supported by probable cause and must describe with particularity “the place to be searched” and the “things to be seized.” The particularity requirement was designed to repudiate “general warrants known as writs of assistance” that “officers of the Crown had” used to “bedevil[] the colonists.” State v. Feliciano, 224 N.J. 351, 366 (2016) (quoting Stanford v. Texas, 379 U.S. 476, 481 (1965)). The requirement served to “prevent . . . ‘wide-ranging exploratory searches.’” Ibid. (quoting Maryland v. Garrison, 480 U.S. 79, 84 (1987)). The use of open-ended, general warrants had been condemned as “the worst instrument of arbitrary power,” Boyd v. United States, 116 U.S. 616, 625 (1886) (internal quotation 12 omitted), and “was a motivating factor behind the Declaration of Independence,” Berger v. New York, 388 U.S. 41, 58 (1967). The protections guaranteed by the Federal and State Constitutions extend to government surveillance of private conversations. See generally Berger, 388 U.S. 41; Katz v. United States, 389 U.S. 347 (1967); Feliciano, 224 N.J. 351. As the Supreme Court has explained, “[t]he need for particularity . . . is especially great in the case of eavesdropping,” which “involves an intrusion on privacy that is broad in scope.” Berger, 388 U.S. at 56. The Supreme Court’s landmark opinions in Berger and Katz “outlined certain principles to protect individual privacy rights in the area of electronic surveillance.” Feliciano, 224 N.J. at 367. In Berger, the Court traced the evolution of surveillance methods from the “ancient practice” of eavesdropping -- “listen[ing] by naked ear under the eaves of houses” -- to intercepting telegraph signals, and from wiretapping telephone lines to planting small electronic listening devices or “bugs.” 388 U.S. at 45-47. With the advent of “electronic eavesdropping,” a number of states attempted to regulate the practice. Id. at 47-49. The Berger Court struck down a New York law that authorized the government to record communications based on a “reasonable ground to believe that evidence of crime may be thus obtained.” Id. at 54. The Court 13 identified various flaws in the law: it did not require proof that “any particular offense has been or is being committed”; failed to require officers “to describe with particularity the conversations” to be recorded; allowed for the indiscriminate seizure of conversations with anyone in the area of the recording device “without regard to their connection with the crime under investigation”; had no provisions to stop intercepting communications when “the conversation sought [was] seized” or give notice to the person surveilled; and did not require judicial oversight. Id. at 58-60. The Court also criticized the statute for authorizing two months of interception, “the equivalent of a series of intrusions, searches, and seizures pursuant to a single showing of probable cause,” and for permitting extensions on the very grounds on which the original order was issued. Id. at 59. For those and other reasons, the Court found the statute as “offensive” as the general warrants used in colonial times. Id. at 58. The Supreme Court issued its decision in Katz later the same year. 389 U.S. 347. In that case, the Court rejected a claim that eavesdropping on calls made from a public telephone booth did not implicate the Fourth Amendment. Katz emphasized that the Fourth Amendment protects “people, not places,” and required the government to obtain a warrant before “electronically listening to and recording” private conversations. Id. at 351, 353, 358. 14 B. In response to Berger and Katz, Congress enacted Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Federal Wiretap Act), 18 U.S.C. §§ 2510 to 2520. United States v. U.S. Dist. Ct., 407 U.S. 297, 302 (1972). New Jersey followed suit later that year and enacted the New Jersey Wiretapping and Electronic Surveillance Control Act (the State Wiretap Act), modeled after federal law. See L. 1968, c. 409 (codified at N.J.S.A. 2A:156A-1 to -26); State v. Ates, 217 N.J. 253, 269 (2014). Like its federal counterpart, the State Wiretap Act empowers prosecutors to apply for a court order that authorizes law enforcement officers to intercept wire, electronic, and oral communications. N.J.S.A. 2A:156A-8; 18 U.S.C. § 2516. The law defines “intercept” as “the aural or other acquisition of the contents of any wire, electronic or oral communication through the use of any electronic, mechanical, or other device.” N.J.S.A. 2A:156A-2(c); see also 18 U.S.C. § 2510(4) (same). The Act also limits interceptions to investigations of specified serious offenses. N.J.S.A. 2A:156A-8; see also 18 U.S.C. § 2516. Among other things, wiretap applications must include “[a] particular statement of facts showing that other normal investigative procedures . . . have been tried and have failed or reasonably appear to be unlikely to succeed if 15 tried or to be too dangerous to employ.” N.J.S.A. 2A:156A-9(c); see also 18 U.S.C. § 2518(3)(c) (similar). Wiretap orders must contain strict procedures “to minimize or eliminate the interception of . . . communications not otherwise subject to interception.” N.J.S.A. 2A:156A-12(f); see also 18 U.S.C. § 2518(5) (similar). That is accomplished through “extrinsic” and “intrinsic” minimization. State v. Catania, 85 N.J. 418, 429 (1981). Extrinsic minimization calls for “limiting the hours and total duration of interception.” Ibid.; see N.J.S.A. 2A:156A-12(f). Intrinsic minimization “on a call-by-call basis” is also required. Catania, 85 N.J. at 429, 434. Officers must make reasonable efforts to “terminat[e] the interception of individual phone calls . . . as it becomes apparent . . . that the call is not relevant to the investigation.” Id. at 429. Law enforcement officials must also minimize the interception of privileged communications. See, e.g., State v. Terry, 218 N.J. 224, 245 (2014) (spousal communications). “[M]onitoring of [a] conversation must cease immediately” “once the parties have been identified and the conversation between them is determined to be nonpertinent or privileged.” United States v. DePalma, 461 F. Supp. 800, 821 (S.D.N.Y. 1978) (discussing “privileged communications between husband-wife, attorney-client and doctor-patient”); 16 see also United States v. Chagra, 754 F.2d 1181, 1182 (5th Cir. 1985) (“[The Federal Wiretap Act] requires the interception of privileged communications to be minimized.”). Under state law, wiretap orders are limited in time to only as long as necessary to achieve their objective or a maximum of 20 days. N.J.S.A. 2A:156A-12(f); see also 18 U.S.C. § 2518(5) (up to 30 days). Extensions or renewals can be granted for two additional periods of up to 10 days. N.J.S.A. 2A:156A-12(f); see also 18 U.S.C. § 2518(5) (extensions up to 30 days). Federal and state law empower judges to require prosecutors to present periodic reports of “what progress has been made toward achievement of the authorized objective and the need for continued interception.” N.J.S.A. 2A:156A-12(h); 18 U.S.C. § 2518(6). The reporting requirement allows for judicial oversight of wiretap interceptions. As added protections, the Act provides for the sealing of applications and orders, and notice to individuals whose conversations were intercepted. N.J.S.A. 2A:156A-15 (sealing); id. at -16 (notice); see also 18 U.S.C. § 2518(8)(b), (d) (same). Courts must strictly construe the State Wiretap Act to protect individual privacy rights. Ates, 217 N.J. at 268. 17 C. Stored communications are governed by a different group of statutory provisions. In 1986, Congress enacted the Electronic Communications and Privacy Act (ECPA) “to update and clarify Federal privacy protections and standards in light of dramatic changes in new computer and telecommunication technologies.” S. Rep. 99-541, at 1 (1986), as reprinted in 1986 U.S.C.C.A.N. 3555. Title I of the ECPA amended the Federal Wiretap Act and, among other things, added “electronic” communications to the definition of “intercept.” Pub. L. No. 99-508, § 101(a)(3)(B), 100 Stat. 1848, 1848 (1986) (codified at 18 U.S.C. § 2510(4)). The term had already encompassed “wire” and “oral” communications. Pub. L. No. 90-351, 82 Stat. 211, 212 (1968). The ECPA thus imposed similar restrictions on the interception of electronic communications. Title II created what is commonly known as the Stored Communications Act (SCA), which focuses on electronic information in storage. 18 U.S.C. 18 §§ 2701 to 2713. Title III addresses “pen registers” and “trap-and-trace” devices.2 18 U.S.C. §§ 3121 to 3127. New Jersey enacted similar legislation in 1993. The Legislature added new provisions to the State Wiretap Act that largely conform to the Federal SCA. L. 1993, c. 29, §§ 21 to 28 (codified at N.J.S.A. 2A:156A-27 to -34). The new law also protected “electronic” communications by adding the term to the definition of “intercept” under the Wiretap Act. Id. § 1 (codified at N.J.S.A. 2A:156A-2(c)). The State Wiretap Act defines “electronic communication” as “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectric or photo-optical system that affects interstate, intrastate or foreign commerce,” not including “[a]ny wire or oral communication.” N.J.S.A. 2A:156A-2(m); see also 18 U.S.C. § 2510(12) (omitting “intrastate”). Federal and state law define “electronic storage” as “[a]ny temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and . . . [a]ny storage of such communication 2 Pen registers capture phone numbers of outgoing calls placed from a target phone line. Trap-and-trace devices record phone numbers of incoming calls to the target phone. 18 U.S.C. § 3127(3), (4). Neither device captures the content of conversations. Ibid. 19 by an electronic communication service for purpose of backup protection of the communication.” N.J.S.A. 2A:156A-2(q); 18 U.S.C. § 2510(17). The two statutes differ, however, in the way they discuss access to stored electronic communications maintained by service providers. Federal law authorizes government entities to require disclosure “of the contents of a wire or electronic communication, that is in electronic storage” for 180 days or less pursuant to a warrant, or “has been in electronic storage” for more than 180 days, pursuant either to a warrant, administrative subpoena, or court order.3 18 U.S.C. § 2703(a) (emphases added). The parallel New Jersey statute, by contrast, makes no mention of “electronic storage.” The statute instead states that “[a] law enforcement agency, but no other governmental entity, may require” a service provider to disclose “the contents of an electronic communication” pursuant to a warrant. N.J.S.A. 2A:156A-29(a). 3 Federal law states that administrative subpoenas or court orders may be used in certain instances that are not relevant to this appeal. 18 U.S.C. § 2703(a), (b). In United States v. Warshak, however, the Sixth Circuit held that “[t]he government may not compel a commercial [internet service provider] to turn over the contents of a subscriber’s emails without first obtaining a warrant based on probable cause,” and that, “to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.” 631 F.3d 266, 288 (6th Cir. 2010). 20 Neither federal nor state law includes enhanced protections for the disclosure of the contents of stored electronic communications. IV. Facebook contends the wiretap statutes and the laws that govern stored communications divide generally along the following line: wiretap acts apply to requests to intercept future communications, and laws relating to stored communications cover the disclosure of past communications. The State disputes that distinction. It argues instead that the pivotal question is whether communications are acquired “in flight” -- contemporaneous with their transmission -- or from storage. Under the State’s reading of the statutes, laws relating to stored communications encompass future communications so long as they are in electronic storage at the moment law enforcement obtains them. As noted earlier, the State requested the contents of prospective electronic communications -- for 30 days into the future -- to be delivered every 15 minutes. In writing and at oral argument, Facebook explained that the 15-minute delay is “as near to real time as technologically possible” -- a point the State does not dispute. As the CDW recognizes, Facebook cannot provide communications to the State at the same time as they are created and transmitted. For technical reasons, Facebook must briefly store users’ electronic communications before it can forward them to others. 21 A. Against that backdrop, we first consider whether the electronic communications the State seeks to obtain are covered by New Jersey’s equivalent to the Federal Stored Communications Act. We review that question, as well as other legal issues, de novo. State v. Gomes, 253 N.J. 6, 16 (2023). 1. The paramount goal when interpreting a statute is to “determine and give effect to the Legislature’s intent.” State v. Lopez-Carrera, 245 N.J. 596, 612 (2021) (quoting In re Registrant H.D., 241 N.J. 412, 418 (2020)). The plain language of a statute “is typically the best indicator of intent.” Id. at 613 (quoting State v. McCray, 243 N.J. 196, 208 (2020)). We “also look to other parts of the statute for context.” Malanga v. Township of West Orange, 253 N.J. 291, 310 (2023). When the text is clear, our inquiry is complete. Id. at 311. If the language is ambiguous, we may consider extrinsic materials. Ibid. Because the State Wiretap Act closely models federal law, “we give ‘careful consideration to federal decisions interpreting the federal statute.’” Feliciano, 224 N.J. at 371 (quoting Ates, 217 N.J. at 269). At the same time, we recognize that state law is more restrictive and provides greater protections in several areas. See, e.g., Catania, 85 N.J. at 438-39 (reviewing sections of 22 the State Wiretap Act that “laid down stricter wiretapping guidelines than did Congress”). States, of course, may enact laws that afford citizens additional privacy protections. Id. at 436. 2. We begin with the text of the statutes. Neither the federal nor the state version of the SCA expressly authorizes disclosure of future communications. Once again, federal law provides for the disclosure of the contents of a wire communication that “is in electronic storage” for 180 days or less or “has been in electronic storage” for more than 180 days. 18 U.S.C. § 2703(a). State law simply provides for disclosure of content information; the Legislature did not incorporate language about electronic storage or time spent there in the state code. N.J.S.A. 2A:156A-29(a). The commonsense meaning of the words in the federal SCA -- “is in electronic storage” and “has been in electronic storage” -- do not include content or data that “will be” in storage at a later point in time. The State thus relies on the Federal Dictionary Act in support of its claim that the SCA encompasses both present and future stored communications -- an argument that applies only to the federal statute. The Dictionary Act provides that “[i]n determining the meaning of any Act of Congress, unless the context indicates otherwise . . . words used in the 23 present tense include the future as well as the present.” 1 U.S.C. § 1 (emphasis added). But when “the definition in [the Dictionary Act] seems not to fit,” the phrase “‘unless the context indicates otherwise’ has a real job to do.” Rowland v. Cal. Men’s Colony, Unit II Men’s Advisory Council, 506 U.S. 194, 200 (1993). For context here, we look to the overall structure of the Electronic Communications Privacy Act. As noted earlier, it has several components: Title I addresses the Federal Wiretap Act, 18 U.S.C. §§ 2510 to 2521; Title II, the Stored Communications Act, id. §§ 2701 to 2713; and Title III, pen registers and trap-and-trace orders, id. §§ 3121 to 3127. Facebook points out that Titles I and III apply to prospective surveillance activities -- like the interception of future conversations and the use of devices to collect data about future communications. Those Titles include forward-looking provisions that limit the amount of time to monitor or gather information and offer procedures for “renewal, reporting, minimization, and sealing.” In re Application of U.S. for an Order Authorizing Prospective & Continuous Release of Cell Site Location Records (S.D. Tex. Order), 31 F. Supp. 3d 889, 895 (S.D. Tex. 2014). But Title II, which governs “stored” communications, does not contain those features. See In re Application of U.S. for an Order (1) Authorizing the 24 Use of a Pen Reg. & a Trap & Trace Device & (2) Authorizing Release of Subscriber Info. &/or Cell Site Info. (E.D.N.Y. Order), 396 F. Supp. 2d 294, 309 (E.D.N.Y. 2005) (“[T]he profound structural differences between the SCA and the electronic surveillance statutes suggest that Congress did not intend the former to be a vehicle for allowing prospective, real-time surveillance.”).4 Other courts have similarly observed that the structure of the Stored Communications Act reveals that it covers past, not future, communications. See, e.g., In re Application of U.S. for an Order Authorizing the Installation & Use of a Pen Reg. Device, a Trap & Trace Device, & for Geographic Location Info., 497 F. Supp. 2d 301, 309 (D.P.R. 2007) (“Congress’s decision not to include in the SCA any provisions typical of prospective surveillance statutes indicates its intent that the SCA be used for the disclosure of historic and not prospective data.”); In re Application of U.S. for Orders Authorizing 4 E.D.N.Y. Order concluded that the SCA did not empower the government to obtain cell-site information on a prospective, real-time basis. 396 F. Supp. 2d at 295, 314. Instead, the government must demonstrate probable cause pursuant to Fed. R. Crim. P. 41. Id. at 321. The United States Supreme Court held in Carpenter v. United States that a warrant based on probable cause is required for law enforcement to obtain historical cell-site location information. ___ U.S. ___; 138 S. Ct. 2206, 2221 (2018). The Carpenter Court did not address the collection of real-time cell-site information. Id. at 2220. This Court, in State v. Earls, 214 N.J. 564, 569 (2013), held that law enforcement officials could obtain cell-phone location information provided they made a sufficient showing of probable cause. The Court based its ruling on the State Constitution, not on an interpretation of the State Wiretap Act. Id. at 589. 25 Installation & Use of Pen Regs. & Caller Identification Devices, 416 F. Supp. 2d 390, 395 (D. Md. 2006) (“The structure of the SCA shows that the statute does not contemplate orders for prospective information.”); E.D.N.Y. Order, 396 F. Supp. 2d at 314 (“[The SCA] does not authorize a court to enter a prospective order to turn over data as it is captured.”); In re Application for Pen Reg. & Trap/Trace Device with Cell Site Location Auth., 396 F. Supp. 2d 747, 760 (S.D. Tex. 2005) (“[T]he entire focus of the SCA is to describe the circumstances under which the government can compel disclosure of existing communications and transaction records in the hands of third party service providers.”). In short, Title II was not designed to apply to future events. As a result, because “the context [of the statute] indicates otherwise,” the default rules of the Federal Dictionary Act do not apply. See 1 U.S.C. § 1. The State’s argument fares no better under the State Wiretap Act. Starting with the law’s text, the New Jersey Legislature did not incorporate language about electronic storage from the federal statute when it described how to access the contents of electronic communications. Compare N.J.S.A. 2A:156A-29(a), with 18 U.S.C. § 2703(a). Although we generally look to federal law to interpret comparable provisions of the State Wiretap Act, Feliciano, 224 N.J. at 371, in this instance the State Legislature parted 26 company with Congress. As a result, whether the phrase “is in electronic storage” in the Federal Wiretap Act encompasses prospective communications does not reveal much about the State Act’s arguably more limited coverage. In addition, the State Wiretap Act reflects the ECPA’s structure. The state code addresses wiretap interceptions at sections 1 to 26 and stored communications at sections 27 to 34. N.J.S.A. 2A:156A-1 to -34. The forward-looking aspects of the act appear in the wiretap sections only. For those reasons, the language and structure of the federal and state statutes do not support the use of a warrant to access the contents of prospective electronic communications. B. Facebook contends the requests for information in this appeal are subject to the enhanced privacy protections of the wiretap acts. We first consider that claim in the context of the relevant statutes. The State argues the wiretap acts do not apply because the stored messages it seeks will not be intercepted contemporaneously, in real time. Beyond that, the State submits that to read the SCA in a way that excludes future communications from its reach would nullify the contemporaneity requirement of the wiretap acts or leave future stored communications without a home in the legislative scheme. 27 1. Multiple federal circuits have “held that an ‘intercept’ under the ECPA must occur contemporaneously with transmission.” Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107, 113 (3d Cir. 2003); accord United States v. Steiger, 318 F.3d 1039, 1048-49 (11th Cir. 2003); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 878 (9th Cir. 2002); Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 462 (5th Cir. 1994).5 The word “contemporaneous” does not appear in the ECPA or its state counterpart. The above rulings stem from the Fifth Circuit’s conclusion in United States v. Turk, a case that preceded the ECPA. 526 F.2d 654 (5th Cir. 1976). Turk stated that the term “intercept” in the 1968 Federal Wiretap Act required contemporaneous acquisition of a communication. Id. at 658-59. Post-ECPA Circuit Courts followed suit and reasoned that when it enacted the ECPA, Congress intended to retain the prior “judicial definition” given to “intercept.” Konop, 302 F.3d at 878. Those courts also found the “conclusion [was] consistent with the ordinary meaning of ‘intercept,’ which is ‘to stop, seize, or interrupt in progress or course before arrival.’” Ibid. (quoting 5 In In re Application of the State for Communications Data Warrants to Obtain the Contents of Stored Communications from Twitter, Inc., 448 N.J. Super. 471, 485 (App. Div. 2017), and Finesmith II, 408 N.J. Super. at 211-12, the Appellate Division agreed with federal courts that find interception contemplates the contemporaneous acquisition of communications. 28 Webster’s Ninth New Collegiate Dictionary 630 (1985)). Under that line of reasoning, communications that have arrived at their destination or are “in storage” can no longer be intercepted. For additional support, the State points to the definition of electronic communications in the statutes: the “transfer of signs, signals, writings, images, sounds, data, or intelligence.” N.J.S.A. 2A:156A-2(m); 18 U.S.C. § 2510(12) (emphasis added). Once a transfer is complete, the State contends, the information is no longer subject to the wiretap acts. Some Circuit Courts have raised questions about the contemporaneity requirement. The First Circuit, in United States v. Councilman, addressed whether copying incoming emails sent by a third party to the defendant’s customers, before they could read the messages, violated the Federal Wiretap Act. 418 F.3d 67, 70-71 (1st Cir. 2005) (en banc). The defendant’s company acted as an email provider that managed the email service. Id. at 70. The defendant claimed that because the messages were stored, not intercepted, at the time they were copied, the Wiretap Act did not apply. Id. at 72. The Court of Appeals disagreed. It found “that the term ‘electronic communication’ includes transient electronic storage that is intrinsic to the communication process.” Id. at 79. For the same reason, it concluded the 29 messages were “intercepted” under the Wiretap Act even though they were in transient electronic storage. Ibid. In reaching that conclusion, the appellate court declined to address “whether the term ‘intercept’ applies only to” the acquisition of messages “contemporaneously with [their] transmission.” Id. at 80. The First Circuit cited its prior precedent in In re Pharmatrak, Inc. Privacy Litigation, which expressed “concern . . . about the judicial interpretation of a statute written prior to the widespread usage of the internet . . . in a case involving purported interceptions of online communications.” 329 F.3d 9, 21 (1st Cir. 2003) (cited at Councilman, 418 F.3d at 80). Pharmatrak noted “the storage-transit dichotomy adopted by earlier courts may be less than apt to address” recent technological developments. Ibid. In Councilman, the court chose not to “plunge into that morass.” 418 F.3d at 80. The Seventh Circuit in United States v. Szymuszkiewicz addressed a similar situation in which a defendant configured his supervisor’s email account to automatically forward all incoming messages to the defendant’s email account. 622 F.3d 701, 703 (7th Cir. 2010). The server sent copies within a second. Id. at 704. The defendant asserted he should have been charged under the SCA, not the Wiretap Act, because the emails were not intercepted in flight; they were forwarded to him after they had arrived in the 30 supervisor’s inbox. Ibid. The Circuit Court rejected the claim, noting the delay would have been “no more than an eyeblink,” which is “contemporaneous by any standard.” Id. at 706. The Sixth Circuit follows the line of authority that interprets “intercept” to require the contemporaneous acquisition of a communication. Luis v. Zang, 833 F.3d 619, 627-28 (6th Cir. 2016). The Circuit Court, however, also includes “near real-time monitoring” within the meaning of the Wiretap Act. Id. at 631 (emphasis added). 2. As noted earlier, neither the federal nor the state wiretap statute contains a contemporaneity requirement. The rule stems from federal cases that interpret the federal statute. And the facts underlying those cases are telling. The above federal cases that adopted a strict contemporaneity rule involved purely historical communications. In Turk, for example, an officer listened to two cassette tapes seized from a car. 526 F.2d at 656. In Steve Jackson Games, officers read 162 private unread emails stored on a computer that operated an electronic bulletin board. 36 F.3d at 459-60. A private employer in Konop accessed an employee’s password-protected website and read prior postings located there. 302 F.3d at 872-73. Steiger and Fraser, likewise, involved access to the contents of a computer, 318 F.3d at 1043-44, 31 and to emails saved on a server, 352 F.3d at 110. In none of those cases did anyone access communications either while they were in flight or nearly contemporaneously to their transmission. The communications were plainly not intercepted in or close to real time. Imagine instead an attempt by law enforcement to gain broad access to future electronic communications, including private messages, within 15 minutes, the earliest possible moment they are available, for 30 days -- the very situation this case presents. A strict contemporaneity rule adopted before the advent of the Internet would not be a good fit to address that or other situations technology presents today. Nor would such a rule be consistent with the underlying purpose of the wiretap statutes -- to protect individual privacy. In addition, from a practical standpoint, if a strict contemporaneity approach applied, law enforcement today would never need to apply for a wiretap order to obtain future electronic communications from Facebook users’ accounts on an ongoing basis. With either a wiretap order or a CDW, the State today cannot receive information from Facebook any sooner than 15 minutes after a communication has been transmitted. In light of that reality, it would be only natural for law enforcement to apply for a CDW, which is easier to obtain but has fewer safeguards for individual privacy. 32 The State’s argument raises yet other, similar concerns. In time, as technology improves, today’s unavoidable 15-minute delay may well get shorter and shorter. The logical extension of the State’s position is that law enforcement could avoid the requirements and protections of the wiretap acts by simply asking Facebook to wait a few minutes, while data is stored, before providing electronic communications on an ongoing, future basis. That cannot be right given the underlying aim of the statutes. Based on the language, structure, and intent of the State Wiretap Act, we find that it applies to the near real-time acquisition of prospective electronic communications. C. For those reasons, we conclude that attempts to acquire electronic communications every 15 minutes, for 30 days into the future, are not covered by New Jersey’s equivalent of the Stored Communications Act. We find they are instead subject to the requirements of the State Wiretap Act.6 6 The parties also discuss the way the wiretap statutes treat the acquisition of voicemails. The ECPA added the electronic storage of voicemails to the federal definition of “wire communication” in 1986, see Pub. L. No. 99-508, § 101(a)(1)(D), and our Legislature did likewise in 1993, see L. 1993, c. 29, § 2(a). Congress rescinded that change in 2001 as part of the USA Patriot Act, Pub. L. No. 107-56, § 209, 115 Stat. 272, 283 (2001), and returned stored “voicemail messages to the lower level of protection provided other electronically stored communications,” Konop, 302 F.3d at 878. The State Legislature did not. See N.J.S.A. 2A:156A-2(a). Because the debate does not 33 V. The arguments of the parties and amici also raise constitutional concerns. Ordinarily, “we strive to avoid . . . constitutional questions unless required to” consider them. Comm. to Recall Menendez v. Wells, 204 N.J. 79, 95 (2010). If a case can be decided on statutory grounds, we do so “for sound jurisprudential reasons.” Harris v. McRae, 448 U.S. 297, 306-07 (1980). We assess whether constitutional principles also require additional protections in this case for a particular reason: the wiretap statutes themselves are infused with constitutional considerations. As noted earlier, Congress crafted the Federal Wiretap Act to address a series of constitutional concerns the Supreme Court identified in Berger and Katz. U.S. Dist. Ct., 407 U.S. at 302. New Jersey then modeled its statute after the federal law. Ates, 217 N.J. at 269. Neither Congress nor the State Legislature started with a blank slate; they attempted to follow constitutional commands when they enacted special protections from wiretapping. We therefore turn to constitutional considerations implicated in this appeal after we resolve a preliminary issue. provide persuasive authority for the questions before the Court, we do not consider the issue further. 34 A. For the first time, the State now argues that Facebook’s privacy interest is not the same as an individual who might later be prosecuted based on information obtained through the CDWs. The State contends that distinction is relevant to any reasonableness analysis, but it does not argue that Facebook lacks standing to challenge the CDW orders. Instead, the State contends that defendants later charged with crimes based on evidence obtained through a CDW can assert their privacy interests and contest the orders when they are prosecuted. We consider the reasonableness of the CDWs under all the relevant circumstances, not the narrower prism the State now advances. B. When federal and state legislators drafted the wiretap statutes in 1967 and 1968, they could not have envisioned the technological advances of the last five decades. Hardly anyone could foresee that 50 years later, electronic messages could be transmitted, stored, and made available to law enforcement officials all within minutes. Yet the constitutional principles underlying the Supreme Court’s ruling in Berger remain relevant. And those principles call for heightened protections -- similar to what is required for wiretap 35 interceptions -- when law enforcement officials acquire and monitor prospective electronic communications in nearly real time. Reasonableness is the touchstone of the Fourth Amendment. State v. Bruzzese, 94 N.J. 210, 217 (1983). To assess whether a search is reasonable, courts balance the State’s legitimate interest in investigating criminal conduct and protecting the public against the level of intrusion on a person’s privacy. See New Jersey v. T.L.O., 469 U.S. 325, 337 (1985). The Constitution sets the benchmark for a reasonable search: the use of a warrant based on probable cause. U.S. Const. amend. IV; N.J. Const. art. I, ¶ 7. When a lesser expectation of privacy is involved, or when a “search involves a minimal intrusion” on an individual’s privacy, the Fourth Amendment requires correspondingly fewer protections. Winston v. Lee, 470 U.S. 753, 767 (1985). The same is true in reverse. More intrusive searches call for enhanced protections, as Berger demonstrates. Examples abound in the law. Law enforcement officers, for example, can obtain basic Internet subscriber information with a grand jury subpoena. State v. Reid, 194 N.J. 386, 404 (2008). “More intrusive records, like cell- phone location information, are entitled to greater protection,” Lunsford, 226 N.J. at 132, and require a search warrant based upon probable cause, State v. Earls, 214 N.J. 564, 588 (2013). 36 Similarly, in another area, officers need only reasonable and articulable suspicion that a person is engaged in criminal activity to conduct an investigative stop. Terry v. Ohio, 392 U.S. 1, 30 (1968). But to frisk the individual, a brief but more serious intrusion on personal security, the police need reason to believe the person is armed and dangerous. Id. at 27. And to search a private home, the “first among equals” when it comes to privacy interests, officers must demonstrate probable cause and obtain a warrant. State v. Wright, 221 N.J. 456, 467-68 (2015) (quoting Florida v. Jardines, 569 U.S. 1, 6 (2013)). When the level of intrusion or the privacy interest is greater still, the Fourth Amendment calls for heightened protections. “[E]avesdropping and wiretapping, search of a private home during the nighttime, or intrusions into the human body” may, “because of their unusual degree of intrusiveness, require more than the usual quantum of probable cause.” 2 Wayne R. LaFave et al., Criminal Procedure, § 3.3(b) (4th ed. 2022). The above examples illustrate a simple principle: “the greater the degree of intrusion into [private areas] by the government, the greater the level of protection” the Constitution requires. Lunsford, 226 N.J. at 131; see also Winston, 470 U.S. at 767 (“[W]hen the State seeks to intrude upon an area in 37 which our society recognizes a significantly heightened privacy interest, a more substantial justification is required to make the search ‘reasonable.’”). In this appeal, the privacy interests at stake and the level of intrusion are substantial. A person’s unfiltered private conversations can be quite revealing. See State v. McQueen, 248 N.J. 26, 49 (2021) (noting that monitoring telephone conversations “peer[s] ‘into the most private sanctums of people’s lives’” (quoting State v. Manning, 240 N.J. 308, 328 (2020))). And nearly contemporaneous access to a wide array of prospective electronic communications, every 15 minutes for a full month into the future, is highly intrusive. There are no limits to the content the State seeks here. In addition to public posts by Facebook users, the proposed orders encompass private communications of all sorts, including any messages to one’s spouse, cleric, doctor, or lawyer. Yet the CDW orders have no minimization requirements. In essence, the State seeks the functional equivalent of a wiretap -- but without the added safeguards the wiretap acts require. If it were possible for the State to obtain the contents of future electronic communications from Facebook in real time, the parties agree the wiretap statutes and their protections would apply. The same privacy interests exist when the identical 38 content is disclosed, just minutes after it is transmitted, for an extended period of time into the future. As a result, we find that a warrant based on probable cause is not enough to monitor prospective electronic communications in nearly real time, on an ongoing basis, under the constitution. The principles set forth in Berger and its progeny require the State to make a heightened showing and adhere to the additional safeguards provided in the wiretap acts. Our conclusion is grounded in the privacy protections the State Constitution guarantees. See Earls, 214 N.J. at 589. The required enhanced protections include a particularized showing of need, N.J.S.A. 2A:156A-9(c); minimization procedures, both extrinsic, id. at -12(f), and intrinsic, Catania, 85 N.J. at 434; judicial oversight and reporting, N.J.S.A. 2A:156A-12(h); and notice, id. at -16, among others.7 The time limits of the Wiretap Act should also apply: the State may obtain disclosures for up to 20 days, with possible extensions or renewals for additional 10-day periods. Id. at -12(f). 7 Facebook challenged only the disclosure of prospective communications. It disclosed historical communications, which are not part of this appeal. Nonetheless, the State is obliged to take steps to ensure it does not review or rely on privileged information contained in past communications -- as it would during the physical search of a home or another location. 39 The 10-day time limit set forth in Rule 3:5-5 is not the right benchmark. See Facebook, 471 N.J. Super. at 464-65. The Rule requires that search warrants be executed promptly after they are issued to ensure “that probable cause supporting the warrant does not dissipate” before the search is conducted. State v. Carangelo, 151 N.J. Super. 138, 150 (Law Div. 1977). The Rule does not apply here. Nor does it resolve any of the statutory or constitutional concerns the CDWs present. Facebook advances another constitutional concern as well. Citing Berger, 388 U.S. at 59, Facebook contends the CDWs are flawed because they represent “the equivalent of a series of intrusions, searches, and seizures pursuant to a single showing of probable cause.” The heightened protections of the Wiretap Act address that concern. We note at the same time that we affirm the principles in this Court’s ruling in Earls, 214 N.J. 564. VI. The State presents two other arguments to defend its use of CDWs. First, it points to a body of law relating to anticipatory warrants. That type of warrant is based on “probable cause that at some future time (but not presently) certain evidence of crime will be located at a specified place.” United States v. Grubbs, 547 U.S. 90, 94 (2006) (quoting 2 Wayne R. LaFave, Search and Seizure, § 3.7(c) (4th ed. 2004)). 40 Anticipatory warrants are typically conditioned on a triggering event that would establish probable cause to search. Ibid. The anticipated delivery of contraband to a residence, for example, could establish probable cause to search the home provided there is also probable cause to believe the delivery will take place. Id. at 96-97. The CDWs here are not anticipatory warrants. They are not based on the likelihood of an event that will supply probable cause to search in the future. They rest on a traditional assertion that probable cause to search -- to capture future electronic communications -- exists at the moment the warrants are signed. Second, the State relies on the reasonable continuation doctrine. Under that principle, the “police may in some circumstances temporarily suspend a search authorized by a warrant and re-enter the premises at a later time to continue the search.” State v. Finesmith (Finesmith I), 406 N.J. Super. 510, 519 (App. Div. 2009). The later “entry must . . . be a continuation of the original search, [and not] a new and separate search.” Ibid. (omission in original) (quoting United States v. Keszthelyi, 308 F.3d 557, 569 (6th Cir. 2002)). And “the decision to conduct a second entry to continue the search must be reasonable under the totality of the circumstances.” Ibid. (quoting Keszthelyi, 308 F.3d at 569). The doctrine, however, does not authorize a 41 second search based on a single warrant “that is not a continuation of the first.” State v. Carrillo, 469 N.J. Super. 318, 339 (App. Div. 2021). The Appellate Division applied the doctrine in Finesmith I. In that case, the police arrived at the defendant’s home with a warrant to search for all computers located there. 406 N.J. Super. at 520. Members of the search team found evidence of child pornography on a computer in the basement, left for the defendant’s office after he told them an additional laptop was located there, and later returned to continue the search at the home after the defendant said the laptop was in a van in the garage. Id. at 515-17. The appellate court upheld the search. Id. at 521. It observed that “but for the fact” the defendant said his laptop was elsewhere, the search of the home would have continued until the police found the item. Ibid. The court also noted that officers returned immediately when they learned the laptop was in the garage. Ibid. Under the circumstances, the Appellate Division found the second entry was a reasonable continuation of the original search, not a new and separate one. Ibid.; accord State v. Hai Kim Nguyen, 419 N.J. Super. 413, 427 (App. Div. 2011) (upholding a second search of the roof of a car “within a short time after the original search” as a reasonable continuation); see also Michigan v. Tyler, 436 U.S. 499, 511 (1978) (finding that arson investigators who left the scene at 4 a.m. because of darkness, steam, and 42 smoke could continue their lawful investigation and seize evidence shortly after daylight). The reasonable continuation doctrine does not apply here. Law enforcement would not be returning to continue or complete a single search that had been interrupted. Instead, the CDWs seek newly created evidence from Facebook every 15 minutes for the next 30 days. VII. Although no court has addressed an application like this one, today’s ruling appears to align with practices elsewhere. According to Facebook, it “has received thousands of requests from law enforcement for contents of prospective communications,” and “access is obtained via a wiretap order” “in every other jurisdiction.” Microsoft and Google, as friends of the court, advise that law enforcement in 2021 made more than 140,000 requests for user data , including more than 25,000 for content information, “[b]ut just 16 of those requests were for ongoing, prospective surveillance of electronic communications, and all of those took the form of wiretap orders.” The arguments presented do not identify any federal or state jurisdictions, other than New Jersey, which have sought prospective electronic communications based on a search warrant. 43 VIII. For the reasons outlined above, we reverse the judgment of the Appellate Division and quash the parts of the CDWs that direct Facebook to provide prospective electronic communications. JUSTICES PATTERSON, SOLOMON, PIERRE-LOUIS, and WAINER APTER join in CHIEF JUSTICE RABNER’s opinion. JUSTICE FASCIALE and JUDGE SABATINO (temporarily assigned) did not participate. 44