United States v. Bradley Joseph Steiger

                                                               [PUBLISH]


               IN THE UNITED STATES COURT OF APPEALS
                                                                    FILED
                       FOR THE ELEVENTH CIRCUIT           U.S. COURT OF APPEALS
                                                            ELEVENTH CIRCUIT
                                                               January 14, 2003
                              _________________              THOMAS K. KAHN
                                                                   CLERK
                    Nos. 01-15788, 01-16100 and 01-16269
                            __________________
                      D. C. Docket No. 00-0017-CR-N


UNITED STATES OF AMERICA,

                                                  Plaintiff-Appellee,

                                     versus


BRADLEY JOSEPH STEIGER,
                                                  Defendant-Appellant.

                            ___________________

              Appeals from the United States District Court for the
                          Middle District of Alabama
                           ___________________

                              (January 14, 2003)


Before DUBINA, MARCUS and GOODWIN*, Circuit Judges.




      *
       Honorable Alfred T. Goodwin, United States Circuit Judge for the Ninth
Circuit, sitting by designation.
GOODWIN, Circuit Judge:

      Bradley Steiger appeals his convictions for sexual exploitation of children

(18 U.S.C. § 2251(a)), possession of a computer containing child pornography (18

U.S.C. § 2252A(a)(5)(B)), and receipt of child pornography through interstate and

foreign commerce (18 U.S.C. § 2252(a)(2)(A)). He challenges the district court’s

conclusion that neither the Fourth Amendment nor Title III of the Omnibus Crime

Control and Safe Streets Act of 1968, as amended by the Electronic

Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (1986)

(“ECPA”), codified at 18 U.S.C. §§ 2510-2522 (“The Wiretap Act”), warranted

suppression of the evidence used to convict him. We affirm.

                                        I.

      The Montgomery, Alabama Police Department (“MPD”) initiated an

investigation of Steiger when an unidentified person (“anonymous source” or

“source”) sent the following e-mail on July 16, 2000:

      I found a child molester on the net. I’m not sure if he is abusing his
      own child or a child he kidnaped. He is from Montgomery, Alabama.
      As you see he is torturing the kid. She is 5-6 y.o. His face is seen
      clearly on some of the pictures. I know his name, internet account,
      home address and I can see when he is online. What should I do? Can
      I send all the pics and info I have to these emails?

      Regards

      P.S. He is a doctor or a paramedic.
                                         2
The anonymous source attached to this e-mail an electronic image file containing a

picture of a white male sexually abusing a young white female who appeared to be

approximately four to six years of age.

      On July 17, 2000, Captain Kevin Murphy of the MPD replied, asking the

anonymous source to call him at his office. The source responded that he was from

Turkey and could not afford an overseas phone call, but could send everything by e-

mail. Captain Murphy then sent an e-mail stating: “Please feel free to send the

information that you have.” The source next sent an e-mail with eight attached

images showing an adult white male nude from the waist down fondling and

pressing the young girl against his body in various positions and exposing her

genitalia. One picture depicted clamps connected to a chain attached to the child’s

labia. The girl was nude in several photographs and partially dressed in others. The

anonymous e-mail again identified the molester as “Brad Steiger,” and provided

Steiger’s Internet service account information with AT&T WorldNet, possible

home address, telephone number used to connect to the Internet, and a fax number.

      The anonymous source also informed Captain Murphy that he had Steiger’s

“i.p. number with local (Turkish) time.” An IP number, also known as an Internet

Protocol (“IP”) address, “is the unique address assigned to a particular computer

connected to the Internet. All computers connected to the Internet have an IP


                                          3
address.” Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth

Amendment Privacy, 75 S. Cal. L. Rev. 1083, 1145 (2002). “IP addresses are either

static—associated with one computer—or dynamically assigned. The latter is

usually the case for patrons of dial-up Internet Service Providers (ISP). . . . Static

addresses are undoubtedly easier to trace, but ISPs generally log the assignments of

their dynamic addresses.” Elbert Lin, Prioritizing Privacy: A Constitutional

Response to the Internet, 17 Berkeley Tech. L. J. 1085, 1104 n.101 (2002).

      Captain Murphy viewed the eight images, and, on July 19, asked the source

to send Steiger’s IP address. The source sent three IP addresses used by Steiger on

July 14 and 15; thus, it appears that Steiger’s Internet Service Provider assigned

dynamic IP addresses for each login. Apparently without being asked to do so, the

source sent an e-mail to the MPD on July 19 providing Steiger’s checking account

records. On July 21, the source sent another e-mail that identified specific folders

where pornographic pictures were stored on Steiger’s computer.

      Captain Murphy collected the information the source provided and referred it

to Special Agent Margaret Faulkner of the FBI, who viewed the images and verified

the details the anonymous source provided in his first two e-mails. She issued a

subpoena to Security at AT&T Worldnet Service, who advised Agent Faulkner that

the Internet account the anonymous source referred to was registered to a Brad


                                           4
Steiger at the home address the source provided. Agent Faulkner then performed an

Alabama Driver’s License check and obtained a “photo ID” copy of the license

issued to a “Bradley Joseph Steiger.” She concluded that the photo “appeared

identical to the white male subject depicted in the photographs with the young girl.”

She also checked with the Alabama Medical Board and determined that a “Brad

Steiger” had a license to dispense medicine as a practitioner in Alabama and had

worked as an emergency room physician in Montgomery. Agent Faulkner went to

the hospital where the Medical Board indicated Steiger had been working and

showed one of the pictures of Steiger with the young girl. A security officer

identified the man as Brad Steiger, a doctor who had been seen around the hospital

on occasion. Agent Faulkner then learned that Steiger had become employed by a

hospital in Selma, Alabama. She also discovered that Steiger then resided at an

address different from the one the source supplied.

      Agent Faulkner next prepared an affidavit in support of a search warrant in

which she stated that “an anonymous source . . . had located a child molester on the

Internet.” The affidavit described the pictures the anonymous source sent on July

17 without mentioning that the source had obtained the evidence by “hacking” into

Steiger’s computer. Agent Faulkner also described in the affidavit the steps she

took to corroborate the information the anonymous source provided. After


                                          5
obtaining a warrant, law enforcement officers searched Steiger’s home and seized

his computer and related equipment, as well as leg restraints, clamps connected to a

chain, and what appeared to be a blindfold.

      A federal grand jury returned an indictment against Steiger on November 9,

2000, charging violation of various federal statutes involving sexual exploitation of

minors. Count I alleged violation of 18 U.S.C. § 2251(a) (inducing a minor to

engage in sexually explicit conduct to produce visual depictions such as exhibition

of the genitals and pubic area of a minor); Count II alleged a second violation of §

2251(a); Count III alleged violation of 18 U.S.C. § 2252(a)(5)(B) (knowing

possession of a computer containing three or more images of child pornography);

Count IV alleged violation of 18 U.S.C. § 2252(a)(2)(A) (knowing receipt of child

pornography); Count V alleged violation of 18 U.S.C. § 2423(a) (knowing

transportation of minor in interstate commerce with intent that the person engage in

sexual activity); and Count VI alleged a second violation of § 2423(a).

      An FBI agent stationed in Turkey attempted to interview the source at the end

of November 2000 to determine how he had acquired the information regarding

Steiger that he sent to the MPD. But the source was adamant about not revealing

his identity, but explained in an e-mail on November 30, 2000 how he obtained that

information:


                                          6
      I will not tell you my name or meet you. . . . If I tell you my name and
      make an official interview with you, that guy and his lawyer will know
      all about me so I will have an overseas enemy.

      I’m not a computer freak. I’m a 33 years [sic] old professional. I have
      a family. I don’t want to risk my peace because of a hobby. I’ll
      answer some of your possible questions.

      Do [sic] I know him before?

      No. I catched [sic] at least 2000 child pornography collectors with my
      trap. 3 of them including this guy was [sic] producing their own. The
      other two realized whats [sic] going on and cut the connection.

      How did I know his home address, his fax number, etc?

      I couldn’t find him on white pages so I searched all the ms word
      documents in his pc and found this document . . . .

      How did I get access to his pc?

      I used the well known trojan horse named subseven. . . . I made it
      undetectable so av softwares [sic] couldnt [sic] see it and bind it with a
      fake program. After this I posed it to the news group
      “alt.binaries.pictures.erotica.pre-teen” where one can find 1000s of
      sick people.

      If you have any more questions, just mail me. I tell you again “I WILL
      NEVER TELL YOU MY NAME AND NEVER MEET YOU.”
After Steiger downloaded the fake picture the source posted to the news group, the

Trojan Horse program permitted the source to enter into Steiger’s computer via the

Internet and find the images and identifying information he sent to the MPD.

      Steiger filed several motions to suppress, claiming, inter alia, that: (1) the

evidence asserted in support of the search warrant was obtained in violation of the

                                           7
Fourth Amendment; (2) Agent Faulkner failed sufficiently to corroborate the

information the source supplied; (3) Agent Faulkner intentionally omitted material

evidence from her affidavit by failing to inform the magistrate that the source had

obtained the information by hacking into Steiger’s computer; and (4) the

information the source obtained was inadmissible under the Wiretap Act. A

magistrate judge recommended denial of Steiger’s first motion to suppress. The

district court adopted the magistrate’s findings and denied the motion.

      Steiger then filed a motion for reconsideration, as well as a motion for leave

to argue in person. Steiger’s motion seeking to argue pro se was limited at this time

to oral argument before the district court on his motion to suppress. He indicated

his intent in this motion to have “counsel present to assist him in other

proceedings.” The parties then submitted additional briefs on various aspects of

their arguments. In one submission, Steiger responded to the government’s Fourth

Amendment position stating: “The defense is not relying upon the ‘agent of

government’ defense although it was an argument mentioned in the early stages of

the case (before having full disclosure).”

      The district court again denied the motion to suppress, holding that Steiger

had abandoned his agent-of-the-government theory. The court alternatively

reasoned that even if that argument had not been abandoned, the anonymous source


                                             8
had acted as a private individual. There was no proof that the source acted as a

government agent, and, therefore, his acts did not implicate the Fourth Amendment.

Without deciding whether the Wiretap Act applied, the district court also held that

the Act did not include suppression as a remedy because the provisions addressing

suppression did not refer to electronic communications.

      The district court subsequently denied as untimely myriad successive motions

to suppress and motions for reconsideration in which Steiger asserted, inter alia,

that he had not abandoned his agent-of-the-government argument and that the

anonymous source was “actually a ‘confidential governmental agent’ who by his

actions has conducted an unlawful ‘search’ of [Steiger’s] computer at the direction

of an ‘unknown agency’ and has conducted an elaborate ruse to obscure his identity

and to protect the agency for whom he is or was working. . . .” The district court

also denied these motions on their merits because Steiger had produced no facts to

meet his burden of proving the source acted as a government agent, finding that “all

[Steiger had was] mere speculation and conjecture.”

      After the prosecution had presented its case, the defense moved for a directed

verdict of acquittal on each of the charges. The district court granted the motion in

part by dismissing Count V (interstate transportation of a minor). After the case

went to the jury, Steiger filed a motion to waive counsel and proceed pro se,


                                          9
contending that his attorney had provided ineffective assistance of counsel. After

questioning Steiger and strongly recommending that he allow Christine Freeman

from the Federal Defender’s Office to represent him, the district court granted

Steiger’s motion to proceed pro se and appointed Freeman as standby counsel.

      The jury then found Steiger guilty on Counts I-IV and VI. Steiger, with the

assistance of Freeman, moved for acquittal or a new trial, and later for

reconsideration of the verdict for Counts II and IV. The district court granted the

motions in part by acquitting Steiger on Counts II and VI (second violations of

statutes charged in Counts I and V). It then entered a judgment and conviction on

Counts I, III, and IV, and sentenced Steiger to 210 months in prison and 3 years of

supervised release.

                                          II.

A.    The Fourth Amendment

      Steiger claims that the search warrant was obtained in violation of his Fourth

Amendment right against unreasonable searches and seizures because it was based

in part on information from an anonymous source who hacked into his computer.

Steiger first argues that the district court erred in finding he had abandoned his

agent-of-the-government theory. We need not reach the correctness of that finding

because the record is clear that the source acted at all material times as a private


                                           10
individual. The district court correctly held that suppression was not warranted on

this ground.

      A search by a private person does not implicate the Fourth Amendment

unless he acts as an instrument or agent of the government. United States v. Ford,

765 F.2d 1088, 1090 (11th Cir. 1985). For a private person to be considered an

agent of the government, we look to two critical factors: (1) whether the

government knew of and acquiesced in the intrusive conduct, and (2) whether the

private actor’s purpose was to assist law enforcement efforts rather than to further

his own ends. See United States v. Simpson, 904 F.2d 607, 610 (11th Cir. 1990)

(citing United States v. Miller, 688 F.2d 652, 657 (9th Cir. 1982)); see also Ford,

765 F.2d at 1090 (holding that the district court properly denied motion to suppress

where there was no evidence that the government “had any pre-knowledge of the

search [or] that the agents openly encouraged or cooperated in the search”).

      The district court’s finding of probable cause for the search warrant was

based on the information provided in the anonymous source’s first and second e-

mails, together with Agent Faulkner’s affidavit describing how she personally

corroborated that information. The information conveyed in those two e-mails was

limited to that which the source had acquired before making any contact with the

MPD. Thus, even assuming arguendo that the MPD tacitly encouraged further


                                          11
nonconsensual searches, the information relied on in support of the

warrant—graphic images showing Steiger sexually abusing a young child and

identifying information regarding Steiger which Agent Faulkner thoroughly

corroborated—more than sufficed to establish probable cause.

      We also reject Steiger’s argument for suppression based on Agent Faulkner’s

failure to advise the judge who issued the warrant how the source obtained the

information he sent to the MPD. Steiger asserts that no judge would have found

probable cause knowing that the source had hacked into his computer. But he

supplies no authority for this assertion. To justify suppression of evidence seized

under a warrant, the alleged deliberate or reckless failure to include material

information in the affidavit must conceal information that would defeat probable

cause. See United States v. Cross, 928 F.2d 1030, 1040 (11th Cir. 1991); see also

United States v. Jenkins, 901 F.2d 1075, 1080 (11th Cir. 1990) (Minor or

immaterial omissions from the affidavit will not invalidate a warrant where the

omitted information, if furnished, would not have precluded a finding of probable

cause.). And we must give “great deference” to a lower court’s determination that

the totality of the circumstances supported a finding of probable cause. United

States v. Brundidge, 170 F.3d 1350, 1352 (11th Cir. 1999).




                                          12
      Agent Faulkner put the magistrate judge on notice regarding the manner in

which she had received the information asserted in support of the warrant—i.e., that

it came from an anonymous source who claimed to have found a child molester on

the Internet. Because information obtained by a private person is not subject to the

Fourth Amendment’s exclusionary rule, a statement that the anonymous source had

hacked into Steiger’s computer to obtain that information would not have affected

the magistrate’s finding of probable cause.

B.    The Wiretap Act

      Unlike the Fourth Amendment, the Wiretap Act applies to private conduct as

well as to governmental agents. The Act denounces certain “interceptions.”

Steiger’s argument that the district court should have granted his motion to suppress

pursuant to the Wiretap Act presents two questions of first impression in this

Circuit: (1) whether the anonymous source “intercepted” any “electronic

communications” in violation of the Wiretap Act; and (2) if so, whether any of the

Act’s provisions require suppression. The district court declined to address the

threshold issue and instead ruled that even if the source had intercepted electronic

communications in violation of the Wiretap Act, the Act’s provisions provide for

suppression only with respect to unlawful interceptions of oral or wire

communications. Steiger concedes that the Wiretap Act expressly provides for


                                          13
suppression only with respect to unlawfully intercepted oral and wire

communications. See 18 U.S.C. §§ 2515, 2518(10)(a). But he asserts that

suppression of unlawfully seized electronic communications is available by

negative implication under 18 U.S.C. § 2517(3), which authorizes disclosure of

electronic evidence at trial if it was acquired in accordance with the Wiretap Act.

He also claims that the Wiretap Act authorizes suppression of evidence seized in

violation of the Fourth Amendment.

      We hold that the anonymous source did not intercept electronic

communications in violation of the Wiretap Act. We also hold that while the

Wiretap Act clearly provides criminal and civil sanctions for the unlawful

interception of electronic communications, see 18 U.S.C. §§ 2511(1), (4), (5), 2520,

the Act provides no basis for moving to suppress such communications.

      (1)    The anonymous source did not intercept electronic communications in
             violation of the Wiretap Act when he hacked into Steiger’s computer.

      In 1986, Title I of the ECPA amended the federal Wiretap Act, which

previously had addressed only interception of wire and oral communications, to

also address interception of electronic communications. See Pub.L. No. 99-508,

100 Stat. 1848; S.Rep. No. 99-541, at 3 (1986), reprinted in 1986 U.S.C.C.A.N.

3555, 3557; 18 U.S.C. §§ 2510(12); 2511(1)(a); Konop v. Hawaiian Airlines, Inc,

302 F.3d 868, 874 (9th Cir. 2002). At the same time, Title II of the ECPA created

                                          14
the Stored Communications Act (“SCA”) to cover access to stored communications

and records. See Pub.L. No. 99-508, 100 Stat. 1848; S.Rep. No. 99-541, at 3

(1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3557; 18 U.S.C. § 2701(a); Konop,

302 F.3d at 874. We begin our analysis by agreeing with the Ninth Circuit that

      the intersection of these two statutes is a complex, often convoluted,
      area of the law. [T]he difficulty is compounded by the fact that the
      ECPA was written prior to the advent of the Internet and the World
      Wide Web. As a result, the existing statutory framework is ill-suited to
      address modern forms of communication . . . . Courts have struggled
      to analyze problems involving modern technology within the confines
      of this statutory framework, often with unsatisfying results. [U]ntil
      Congress brings the laws in line with modern technology, protection of
      the Internet . . . will remain a confusing and uncertain area of the law.

Konop, 302 F.3d at 874 (internal quotation marks and citations omitted) (collecting

law review articles criticizing judicial interpretations of the ECPA).

      The Wiretap Act generally prohibits the intentional “interception” of “wire,

oral, or electronic communications.” See 18 U.S.C. § 2511(1). Thus, we must

decide whether any information the source provided in his first two e-mails to the

MPD falls within the definition of “electronic communications,” and, if so, whether

the source “intercepted” that information within the meaning of the Act.

      “Electronic communications” are defined in the Wiretap Act as “any transfer

of signs, signals, writing, images, sounds, data, or intelligence of any nature

transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or


                                          15
photooptical system that affects interstate or foreign commerce.” 18 U.S.C. §

2510(12). At least one Circuit has held that information stored on a server and

conveyed from a private website to users clearly falls within the definition of

“electronic communications.” Konop, 302 F.3d at 876. Here, the source penetrated

Steiger’s computer by using a “Trojan Horse” virus that enabled him to discover

and download files stored on Steiger’s hard drive. That information was transferred

from Steiger’s computer to the source over one of the specified media and thus falls

within the Wiretap Act’s definition of “electronic communications.”

      “Interception” is defined as “the aural or other acquisition of the contents of

any wire, electronic, or oral communication through the use of any electronic,

mechanical, or other device.” 18 U.S.C. § 2510(4). The Circuits which have

interpreted this definition as applied to electronic communications have held that it

encompasses only acquisitions contemporaneous with transmission. See Konop,

302 F.3d at 878-89 (withdrawing previous panel opinion at 236 F.3d 1035 (9th Cir.

2001) holding to the contrary); Steve Jackson Games, Inc. v. United States Secret

Serv., 36 F.3d 457 (5th Cir. 1994); see also United States v. Smith, 155 F.3d 1051

(9th Cir. 1998).

      The Fifth Circuit observed in Steve Jackson Games that, before Congress

enacted the ECPA, federal courts had read “intercept” to mean the acquisition of a


                                          16
communication contemporaneous with transmission. 36 F.3d at 460 (citing United

States v. Turk, 526 F.2d 654, 658 (5th Cir. 1976)). The Steve Jackson Games court

further explained that in passing the ECPA, Congress intended to retain the

previous definition of “intercept” while amending the Wiretap Act to cover

interceptions of electronic communications. 36 F.3d at 462. But the Fifth Circuit

reasoned that the word “intercept” could not describe identical conduct with respect

to both wire and electronic communications, because they were defined differently.

Steve Jackson Games, 36 F.3d at 461-62. Specifically, the ECPA redefined the

term “wire communication” to include electronic storage of the communication, but

omitted reference to storage from its definition of “electronic communication.” See

18 U.S.C. § 2510(1) (2000) (defining “wire communication”); 18 U.S.C. §

2510(12) (2000) (defining “electronic communication”).

      This textual difference illustrates Congress’ intent that one could “intercept”

a wire communication in storage, but could not “intercept” a similarly situated

electronic communication:

      Congress’ use of the word “transfer” in the definition of “electronic
      communication,” and its omission in that definition of the phrase “any
      electronic storage of such communication” . . . reflects that Congress
      did not intend for “intercept” to apply to “electronic communications”
      when those communications are in “electronic storage.”




                                         17
Steve Jackson Games, 36 F.3d at 461-62; see also Konop, 302 F.3d at 877. The

Ninth Circuit in Konop explained that it already had relied on “the same textual

distinction as the Fifth Circuit” to conclude in Smith “that wire communications in

storage could be ‘intercepted’ under the Wiretap Act”:

      Congress’ inclusion of storage in the definition of “wire
      communication” militated in favor of a broad definition of the term
      “intercept” with respect to wire communications, one that included
      acquisition of a communication subsequent to transmission. [With
      respect to wire communications only, the prior definition of
      “intercept”—acquisition contemporaneous with transmission—had
      been overruled by the ECPA. On the other hand [Smith] suggested a
      narrower definition of “intercept” was still appropriate with regard to
      electronic communications. . . .

302 F.3d at 877-78 (citing Smith, 155 F.3d at 1057).

      The Konop court also noted that Congress’ recent amendment to the Wiretap

Act eliminating “storage” from the definition of “wire communication” provides

further support to the analysis relied on in Steve Jackson Games and Smith:

      By eliminating storage from the definition of wire communication,
      Congress essentially reinstated the pre-ECPA definition of
      “intercept”—acquisition contemporaneous with transmission—with
      respect to wire communications. The purpose of the recent amendment
      was to reduce protection of voice mail messages to the lower level of
      protection provided other electronically stored communications. When
      Congress passed the USA PATRIOT Act, it was aware of the narrow
      definition courts had given the term “intercept” with respect to
      electronic communications, but chose not to change or modify that
      definition. To the contrary, it modified the statute to make that
      definition applicable to voice mail messages as well. Congress,


                                         18
      therefore, accepted and implicitly approved the judicial definition of
      “intercept” as acquisition contemporaneous with transmission.

302 F.3d at 878 (internal citations omitted). Indeed, as Konop pointed out, this

definition is “consistent with the ordinary meaning of ‘intercept,’ which is ‘to stop,

seize, or interrupt in progress or course before arrival.’” Id. (quoting Webster’s

Ninth New Collegiate Dictionary 630 (1985)).

      The Fifth and Ninth Circuits’ reasoning is persuasive and we hold that a

contemporaneous interception—i.e., an acquisition during “flight”—is required to

implicate the Wiretap Act with respect to electronic communications.

      The Ninth and Fifth Circuits also concluded that their reading of the Wiretap

Act “is consistent with the structure of the ECPA, which created the SCA for the

express purpose of addressing ‘access to stored . . . electronic communications and

transactional records.’” Konop, 302 F.3d at 878-79 (emphasis in original) (quoting

S.Rep. No. 99-541 at 3); Steve Jackson Games, 36 F.3d at 463. These two cases

reasoned that

      [t]he level of protection provided stored communications under the
      SCA is considerably less than that provided by communications
      covered by the Wiretap Act. . . . [If] acquisition of a stored
      communication were an interception under the Wiretap Act, the
      government would have to comply with the more burdensome, more
      restrictive procedures of the Wiretap Act to do exactly what Congress
      apparently authorized it to do under the less burdensome procedures of
      the SCA. Congress could not have intended this result.


                                          19
Konop, 302 F.3d at 879; see also Steve Jackson Games, 36 F.3d at 463.

      Though we agree with the Fifth and Ninth Circuits’ interpretation of the

Wiretap Act, we do not rely on this particular reasoning in doing so. See generally

Konop, 302 F.3d at 889 (Reinhardt, J., dissenting in part) (explaining that “[t]he

majority’s interpretation of the Wiretap Act depends in part on a tortured reading of

the Stored Communications Act”). The SCA creates criminal and civil penalties,

but no exclusionary remedy, for unauthorized access to a “facility through which an

electronic communication service is provided” to “obtain[], alter[], or prevent[]

authorized access to a wire or electronic communication while it is in electronic

storage in such system.” 18 U.S.C. § 2701 (emphasis added); see also 18 U.S.C. §§

2707, 2708. “Electronic communication service” is defined as “any service which

provides users thereof the ability to send or receive wire or electronic

communications.” 18 U.S.C. § 2510(15). The SCA also generally prohibits an

entity providing an electronic communication service to the public from disclosing

information absent an applicable exception. See 18 U.S.C. § 2702. Thus, the SCA

clearly applies, for example, to information stored with a phone company, Internet

Service Provider (ISP), or electronic bulletin board system (BBS).

      The SCA, however, does not appear to apply to the source’s hacking into

Steiger’s computer to download images and identifying information stored on his


                                          20
hard-drive because there is no evidence to suggest that Steiger’s computer

maintained any “electronic communication service” as defined in 18 U.S.C. §

2510(15). Cf. Konop, 302 F.3d at 879-80 (finding SCA applicable to information

stored on a BBS); Steve Jackson Games, 36 F.3d at 462-64 (applying SCA to

information stored on a secure website accessed by third-party users). We note,

however that the SCA may apply to the extent the source accessed and retrieved any

information stored with Steiger’s Internet service provider. In sum, our reading of

the Wiretap Act to cover only real-time interception of electronic communications,

together with the apparent non-applicability of the SCA to hacking into personal

computers to retrieve information stored therein, reveals a legislative hiatus in the

current laws purporting to protect privacy in electronic communications. This

hiatus creates no remedy.

      We now turn to the issue of whether the anonymous source acquired any

electronic communications contemporaneously with their transmission. The Ninth

Circuit in Konop held that viewing a private website by way of the Internet without

authorization did not constitute an interception of electronic communications in

violation of the Wiretap Act because such unauthorized viewing merely gained

access to stored electronic communications. 302 F.3d at 879. Similarly, the Fifth

Circuit in Steve Jackson Games rejected an argument that seizure of a computer


                                          21
used to operate an electronic bulletin board system (BBS) constituted an

interception of the stored but unread e-mail contained on that system, reasoning that

e-mail stored on the BBS’ computer hard drive was no longer in transmission and

thus could not be intercepted within the meaning of the Wiretap Act. 36 F.3d at

461.

       Indeed, under the narrow reading of the Wiretap Act we adopt from the Fifth

and Ninth Circuits, very few seizures of electronic communications from computers

will constitute “interceptions.”

       [T]here is only a narrow window during which an E-mail interception
       may occur—the seconds or mili-seconds before which a newly
       composed message is saved to any temporary location following a send
       command. Therefore, unless some type of automatic routing software
       is used (for example, a duplicate of all of an employee’s messages are
       automatically sent to the employee’s boss), interception of E-mail
       within the prohibition of [the Wiretap Act] is virtually impossible.

Jarrod J. White, E-Mail @Work.com: Employer Monitoring of Employee E-Mail, 48

Ala. L. Rev. 1079, 1083 (1997).

       In this case, there is nothing to suggest that any of the information provided

in the source’s e-mails to the MPD was obtained through contemporaneous

acquisition of electronic communications while in flight. Rather, the evidence

shows that the source used a Trojan Horse virus that enabled him to access and

download information stored on Steiger’s personal computer. This conduct, while


                                          22
possibly tortious, does not constitute an interception of electronic communications

in violation of the Wiretap Act.

      (2)    Suppression is not a remedy under the Wiretap Act with respect to
             unlawfully seized electronic communications.

      Even if Steiger could demonstrate that the actions of the source constituted an

“interception” in violation of the Wiretap Act, the suppression provision in the Act

provides no basis for moving to suppress electronic communications. By its terms,

18 U.S.C. § 2515 applies only to “wire or oral communication[s],” and not to

“electronic communications”:

      Whenever any wire or oral communication has been intercepted, no part of
      the contents of such communication and no evidence derived therefrom may
      be received in evidence in any trial, hearing, or other proceeding in or before
      any court, grand jury, department, officer, agency, regulatory body,
      legislative committee, or other authority of the United States, a State, or a
      political subdivision thereof if the disclosure of that information would be in
      violation of this chapter.

18 U.S.C. § 2515. Despite the fact that the ECPA amended numerous sections of

the Wiretap Act to include “electronic communications,” the ECPA did not amend

§ 2515. Further, although, as noted by Steiger, Congress considered amending §

2515 in the USA Patriot Act to “extend[] the statutory exclusion rule in 18 U.S.C. §

2515 to electronic communications,” the Act was passed without such an

amendment. Compare H.R. Rep. No. 236(I), at 8 (2001), with USA Patriot Act,

Pub. L. No. 107-56, 115 Stat. 272 (2001).

                                         23
      “[I]t is generally presumed that Congress acts intentionally and purposely

when it includes particular language in one section of a statute but omits it in

another,” BFP v. Resolution Trust Corp., 511 U.S. 531, 536 (1994) (citing Chicago

v. Envtl. Def. Fund, 511 U.S. 328, 338 (1994) (internal quotation marks omitted)).

That presumption is made even stronger when, as here, Congress has amended a

statute to include certain language in some, but not all, provisions of the statute.

      Case law supports this conclusion. In United States v. Meriwether, the Sixth

Circuit held that it could not “under the ECPA grant appellant’s requested

remedy—suppression [because t]he ECPA does not provide an independent

statutory remedy of suppression for interceptions of electronic communications.”

917 F.2d 955, 960 (6th Cir. 1990) (citations omitted); see also, e.g., United States v.

Reyes, 922 F.Supp. 818, 837 (S.D.N.Y. 1996) (holding that exclusion of evidence is

not a remedy for the ECPA violation).

      To the extent Steiger argues that §§ 2517 and 2518(10)(c) create a

suppression remedy for unlawful interceptions of electronic communications under

the statute,1 the legislative history makes clear that a statutory suppression remedy


      1
       18 U.S.C. § 2517 delineates the limitations on privileged disclosure of any
wire, oral, or electronic communications obtained by investigative or law
enforcement officers through the procedures explicated in § 2518.
“[A]pplication[s] for an order authorizing or approving the interception of a wire,
                                                                        (continued...)
                                           24
does not exist for unlawful interceptions of “electronic communications.” As the



      1
        (...continued)
oral, or electronic communication under this chapter shall be made in writing upon
oath or affirmation to a judge of competent jurisdiction and shall state the
applicant's authority to make such application.” 18 U.S.C. § 2518(1). Section
2518 explains in part the contents required for such an application, the character of
an order that may be entered by the federal courts authorizing or approving the
interception of any wire, oral or electronic communication under the Act, and
procedures by which law enforcement or investigative officers may intercept wire,
oral or electronic communications in “emergency situation[s].” 18 U.S.C. § 2518.
Further, § 2518 authorizes persons aggrieved by a violation of the Act:

             [T]o move to suppress the contents of any wire or oral
      communication intercepted pursuant to [the Act], or evidence derived
      therefrom, on the grounds that-- (i) the communication was
      unlawfully intercepted; (ii) the order of authorization or approval
      under which it was intercepted is insufficient on its face; or (iii) the
      interception was not made in conformity with the order of
      authorization or approval.

18 U.S.C. § 2518(10)(a). However, § 2518 also explains that “[t]he remedies and
sanctions described in this chapter with respect to the interception of electronic
communications are the only judicial remedies and sanctions for nonconstitutional
violations of this chapter involving such communications.” 18 U.S.C. §
2518(10)(c). In addition to the suppression remedy of § 2515, an aggrieved person
can, in a civil action, recover “(1) such preliminary and other equitable or
declaratory relief as may be appropriate; (2) damages under subsection (c) and
punitive damages in appropriate cases; and (3) a reasonable attorney's fee and other
litigation costs reasonably incurred.” 18 U.S.C. § 2520(b). Notably, as with §
2515, none of these provisions provide a mechanism by which an aggrieved person
can move for suppression of “electronic communications.”




                                          25
Government notes, the Senate Report accompanying the ECPA discusses the

ECPA’s addition of 2518(10)(c), stating:

      Subsection 101(e) of the Electronic Communications Privacy Act amends
      subsection 2518(10) of title 18 to add a paragraph (c) which provides that
      with respect to the interception of electronic communications, the remedies
      and sanctions described in this chapter are the only judicial remedies and
      sanctions available for nonconstitutional violations of this chapter involving
      such communications. In the event that there is a violation of law of a
      constitutional magnitude, the court involved in a subsequent trial will apply
      the existing Constitutional law with respect to the exclusionary rule.

             The purpose of this provision is to underscore that, as a result of
      discussions with the Justice Department, the [ECPA] does not apply
      the statutory exclusionary rule contained in Title III of the Omnibus
      Crime Control and Safe Streets Act of 1968 to the interception of
      electronic communications.

S. Rep. No. 99-541, at 23. The omission of “electronic communications” from

section 2515 is dispositive. The Wiretap Act does not provide a suppression

remedy for electronic communications unlawfully acquired under the Act.

                                         IV.

      Because this case implicates neither the Fourth Amendment nor the Wiretap

Act, we AFFIRM the judgment of the district court.




                                           26