`
`
`
`IN RE SEARCH WARRANT NO. 16-
`960-M-1 TO GOOGLE
`
`IN RE SEARCH WARRANT NO. 16-
`1061-M TO GOOGLE
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE EASTERN DISTRICT OF PENNSYLVANIA
`
`:
`:
`:
`:
`:
`
`MJ NO. 16-960
`
`
`MJ NO. 16-1061
`
`Juan R. Sánchez, J.
`
`
`
`MEMORANDUM
`
`August 17, 2017
`
`Google Inc. seeks review of United States Magistrate Judge Thomas J. Rueter’s February
`
`3, 2017, Order granting the government’s motions to compel Google to fully comply with two
`
`warrants issued pursuant to § 2703 of the Stored Communications Act (SCA), 18 U.S.C.
`
`§§ 2701-2712. The warrants require Google to disclose to the Federal Bureau of Investigation
`
`electronic communications and other records and information associated with four Google
`
`accounts belonging to United States citizens in connection with two domestic wire fraud
`
`investigations. Google objects to the Order insofar as it requires Google to produce data the
`
`company has elected to store on servers located outside of the United States, asserting that
`
`enforcing the warrants as to such data would constitute an unlawful extraterritorial application of
`
`the SCA, as the Second Circuit Court of Appeals held in In re a Warrant to Search a Certain E-
`
`Mail Account Controlled & Maintained by Microsoft Corp., 829 F.3d 197 (2d Cir. 2016)
`
`[hereinafter Microsoft], reh’g en banc denied, 855 F.3d 53 (2d Cir. 2017) [hereinafter Microsoft
`
`Reh’g]. Although Google and each of the account holders in question are based in the United
`
`States, Google contends it is the physical location of the data to be retrieved—which Google, not
`
`the account holder, controls, and which Google can change at any time for its own business
`
`purposes—that determines whether the statute is being applied extraterritorially. Because this
`
`Court agrees with the government that it is the location of the provider and where it will disclose
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 2 of 24
`
`the data that matter in the extraterritoriality analysis, and because Google can retrieve and
`
`produce the outstanding data only in the United States, the Court agrees with the Magistrate
`
`Judge’s conclusion that fully enforcing the warrants as to the accounts in question constitutes a
`
`permissible domestic application of the SCA. The Order granting the government’s motions to
`
`compel will therefore be affirmed.
`
`BACKGROUND
`
`
`
`Google is a United States-based technology company that offers a variety of different
`
`online and communications services, including email. See Stip. ¶ 1. Although Google’s
`
`corporate headquarters are located in California, the company stores user data in a number of
`
`different locations both within and outside of the United States. Id. ¶¶ 1-2. Google operates a
`
`“state-of-the-art intelligent network” that automatically moves some types of data, including
`
`some of the data at issue in this case, from one network location to another “as frequently as
`
`needed to optimize for performance, reliability and other efficiencies.” Id. ¶ 4. In addition, for
`
`some types of data—for example, a Word document attached to an email—the network breaks
`
`individual user files into component parts, or “shards,” and stores the shards in different network
`
`locations in different countries at the same time.1 Id. ¶ 3, Tr. 4. As a result, at any given point in
`
`time, data for a particular Google user may be stored not only outside of the country in which the
`
`user is located, but in multiple different countries, and the location of the user’s data may change
`
`at any time based on the needs of the network. See Stip. ¶¶ 3-4. Thus, for example, the network
`
`
`1 When applied to some types of files, this “sharding” process generates individual shards that
`are incomprehensible on their own and become comprehensible only when the file is fully
`reassembled. See Oral Arg. Tr. 4-5, Apr. 18, 2017 [hereinafter cited as “Tr. __”] (explaining
`shards are “not like pieces of a puzzle, where if you got six of the seven pieces, you could make
`out six-sevenths of the documents”; rather, “[y]ou can’t make out anything comprehensible
`unless you have all seven”).
`
`
`
`
`2
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 3 of 24
`
`may change the location of data between the time a warrant is sought and the time it is served on
`
`Google. See id. ¶ 4.
`
`
`
`In August 2016, Judge Rueter issued the first of the two warrants in question in this case.
`
`The warrant directs Google to provide the FBI with copies of communications and certain other
`
`categories of information associated with three Google accounts “stored at premises controlled
`
`by Google,” and then authorizes the government to seize certain material from the information
`
`received. The government sought the warrant as part of an ongoing wire fraud investigation,
`
`whose target is both a citizen and resident of the United States, and all three Google accounts to
`
`which the warrant pertains belong to citizens and residents of the United States. The victim of
`
`the fraud under investigation is likewise located in the United States. In issuing the warrant,
`
`Judge Rueter found the government had demonstrated there was probable cause to believe that
`
`evidence of the fraud exists in the Google accounts.
`
`
`
`Later the same month, United States Magistrate Judge M. Faith Angell issued the second
`
`warrant in question, requiring Google to produce to the FBI communications and other records
`
`and information associated with a single Google account belonging to the domestic target of a
`
`separate wire fraud investigation with a United States-based victim. Like the earlier warrant, this
`
`later warrant directs Google to provide the government with copies of certain categories of
`
`information associated with the account “located on [Google’s] e mail servers” and authorizes
`
`the government
`
`to seize
`
`from Google’s production certain
`
`files, documents, and
`
`communications. In issuing the warrant, Judge Angell found the government had shown there
`
`was probable cause to believe the target’s Google account contains evidence of the fraud.
`
`
`
`Both warrants were directed to Google at its headquarters in California, and Google’s
`
`responses to the warrants were handled by the company’s Legal Investigations Support team in
`
`
`
`3
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 4 of 24
`
`California. See Stip. ¶ 6; Tr. 32. Support team members are the only Google personnel
`
`authorized to access the content of user communications in order to produce such materials in
`
`response to legal process, and all support team members are located in the United States. See
`
`Stip. ¶ 5. In response to each warrant, Google searched for and retrieved from its network all
`
`responsive information stored at locations in the United States, a process that involves sending a
`
`series of queries from Google’s headquarters in California to the company’s data centers,
`
`directing the servers in those data centers to identify, isolate, and retrieve responsive material for
`
`Google to produce to the government. See Tr. 6-7, 30-31. All of the Google personnel involved
`
`in this process are located in California. See id. at 32. While Google produced to the
`
`government all of the responsive information it confirmed was stored in the United States, it did
`
`not produce data not known to be located in the United States. See Stip. ¶¶ 7-8. Rather, Google
`
`withheld such data based on the Microsoft decision in which the Second Circuit held “the SCA
`
`does not authorize a U.S. court to issue and enforce an SCA warrant against a United States-
`
`based service provider for the contents of a customer’s electronic communications stored on
`
`servers located outside the United States.” 829 F.3d at 222.2
`
`
`
`The government thereafter moved to compel Google to fully comply with each warrant,
`
`and the matters were consolidated for argument and disposition. On February 3, 2017, Judge
`
`Rueter issued a Memorandum of Decision and Order concluding that requiring Google to fully
`
`comply with the warrants did not constitute an extraterritorial application of the SCA and
`
`granting the government’s motions to compel. Google objects to this Order, taking issue with
`
`
`2 Prior to the Microsoft decision, when responding to a warrant, Google would query its network
`without regard to where on the network responsive information was located. See Tr. 7.
`Following the Microsoft decision, however, Google began limiting its queries to data centers
`located in the United States. See id. at 7-8.
`
`
`
`
`4
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 5 of 24
`
`the Magistrate Judge’s extraterritoriality analysis. Following briefing of the issue by the parties
`
`and amici,3 this Court held oral argument in this matter on April 18, 2017.
`
`DISCUSSION4
`
`
`
`The warrants in question were issued pursuant to the SCA, and it is the reach of the
`
`SCA’s warrant provision that is at issue in this case; hence, the Court’s analysis starts with the
`
`statute itself. Enacted as part of the Electronic Communications Privacy Act of 1986 (ECPA),
`
`the SCA grew out of congressional concern about the lack of privacy protection under existing
`
`
`3 Amicus briefs urging the Court to reject the Magistrate Judge’s ruling were submitted on behalf
`of Yahoo, Inc. and on behalf of Microsoft Corporation, Amazon.com, Cisco Systems, Inc., and
`Apple Inc.
`
` 4
`
` Because these matters were never referred to a magistrate judge by a judge of this court, as
`contemplated by 28 U.S.C. § 636(b)(1)(A) or (b)(1)(B), the Order granting the government’s
`motions to compel Google’s full compliance with the SCA warrants is best understood as an
`exercise of the Magistrate Judge’s jurisdiction under 28 U.S.C. § 636(b)(3), which permits a
`magistrate judge to be assigned “such additional duties,” beyond those that may be assigned
`under § 636(b)(1)(A) or (b)(1)(B), “as are not inconsistent with the Constitution and laws of the
`United States.” See In re Search of Info. Associated with [Redacted]@gmail.com that Is Stored
`at Premises Controlled by Google, Inc., No. 16-mj-757, 2017 WL 3445634, at *4 (D.D.C. July
`31, 2017). Unlike § 636(b)(1)(A) and (b)(1)(B), § 636(b)(3) does not specify a standard of
`review. Rather, the applicable standard depends upon whether the matter more closely
`resembles a pretrial motion that may be referred under § 636(b)(1)(A), in which case it is subject
`to review under § 636(b)(1)(A)’s “clearly erroneous or contrary to law” standard, or whether it
`more closely resembles one of the eight categories of motions excepted from § 636(b)(1)(A), in
`which case it is subject to de novo review under § 636(b)(1)(B). See NLRB v. Frazier, 966 F.2d
`812, 816 (3d Cir. 1992). In Frazier, the Third Circuit Court of Appeals held that a motion to
`enforce a subpoena to require a witness to testify in a proceeding before an administrative
`agency was analogous to a dispositive motion and therefore subject to de novo review, id. at 817-
`18, and the case thus provides some support for the conclusion that the de novo standard is
`applicable here. The Court need not decide the issue, however, as this case turns on a question
`of law, and even under the clearly erroneous or contrary to law standard, such questions are
`subject to plenary review. See Haines v. Liggett Grp. Inc., 975 F.2d 81, 91 (3d Cir. 1992)
`(holding the “contrary to law” standard in § 636(b)(1)(A) “indicates plenary review as to matters
`of law”); see also Blunt v. Lower Merion Sch. Dist., 767 F.3d 247, 264 n.30 (3d Cir. 2014)
`(discerning “no difference between the plenary and de novo standards of review”).
`
`
`
`
`5
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 6 of 24
`
`federal law for electronic communications in the control of third party computer operators.5 As
`
`the Third Circuit previously observed, the SCA “was born from congressional recognition that
`
`neither existing federal statutes nor the Fourth Amendment protected against potential intrusions
`
`on individual privacy arising from illicit access to ‘stored communications in remote computing
`
`operations and large data banks that stored e-mails.’” In re Google Inc. Cookie Placement
`
`Consumer Privacy Litig., 806 F.3d 125, 145 (3d Cir. 2015) (quoting Garcia v. City of Laredo,
`
`702 F.3d 788, 791 (5th Cir. 2012)). The SCA addressed this problem by creating “a set of
`
`Fourth Amendment-like privacy protections by statute” for electronic communications held by
`
`two types of network service providers: providers of “electronic communication service” and
`
`providers of “remote computing service.”6 See Orin S. Kerr, A User’s Guide to the Stored
`
`Communications Act, and a Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev. 1208,
`
`1212-14 (2004); see also Sams v. Yahoo! Inc., 713 F.3d 1175, 1179 (9th Cir. 2013).
`
`
`
`The SCA’s main substantive provisions appear in the first three sections of the Act.
`
`Section 2701 prohibits unauthorized access to “a facility through which an electronic
`
`
`5 See S. Rep. No. 99-541, at 3 (1986), reprinted in 1986 U.S.C.C.A.N. 3555, 3557 (concluding
`that stored wire and electronic communications—because they are “subject to control by . . .
`third party computer operator[s]” and thus may not be subject to constitutional privacy
`protection—“may be open to possible wrongful use and public disclosure by law enforcement
`authorities as well as unauthorized private parties”); id. at 5 (noting the lack of “Federal statutory
`standards to protect the privacy and security of communications transmitted by new noncommon
`carrier communications services or new forms of
`telecommunications and computer
`technology”).
`
` 6
`
` For purposes of the SCA, “electronic communication service” means “any service which
`provides to users thereof the ability to send or receive wire or electronic communications.” 18
`U.S.C. § 2510(15). “[R]emote computing service” refers to “the provision to the public of
`computer storage or processing services by means of an electronic communications system.” Id.
`§ 2711(2).
` An “electronic communications system,”
`in
`turn,
`is “any wire, radio,
`electromagnetic, photooptical or photoelectronic facilities for the transmission of wire or
`electronic communications, and any computer facilities or related electronic equipment for the
`electronic storage of such communications.” Id. § 2510(14).
`
`
`
`
`6
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 7 of 24
`
`communication service is provided,” making it unlawful to “intentionally access[] without
`
`authorization” or to “intentionally exceed an authorization to access” such a facility and thereby
`
`to “obtain[], alter[], or prevent[] authorized access to a wire or electronic communication while it
`
`is in electronic storage in such system,” and providing criminal penalties for a violation. 18
`
`U.S.C. § 2701(a).7 This prohibition against unauthorized access does not apply, however, “with
`
`respect to conduct authorized . . . by the person or entity providing a wire or electronic
`
`communications service.” Id. § 2701(c)(1). Section 2701 thus does not prohibit a service
`
`provider from accessing communications stored on its own system. See Fraser v. Nationwide
`
`Mut. Ins. Co., 352 F.3d 107, 115 (3d Cir. 2004) (interpreting Ҥ 2701(c) literally to except from
`
`[§ 2701(a)’s] protection all searches by communications service providers”); In re Yahoo Mail
`
`Litig., 7 F. Supp. 3d 1016, 1026-27 (N.D. Cal. 2014) (“The SCA grants immunity to 18 U.S.C.
`
`§ 2701(a) claims to electronic communication service providers . . . for accessing content on
`
`their own servers.”).
`
`
`
`Whereas § 2701(a) prohibits unauthorized access to stored communications by third
`
`parties, §§ 2702 and 2703 govern disclosure of such communications by providers of electronic
`
`communication service or remote computing service. Section 2702 prohibits providers from
`
`“knowingly divulg[ing]” the contents of stored communications and other subscriber records and
`
`information, except as specifically permitted therein, including “as otherwise authorized in
`
`section 2703.” Id. § 2702(a), (c)(1). And § 2703 sets forth the conditions under which the
`
`government may require providers to disclose the contents of stored communications and other
`
`
`7 A separate SCA provision, 18 U.S.C. § 2707, provides a private civil cause of action for
`knowing or intentional violations of § 2701(a).
`
`
`
`
`7
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 8 of 24
`
`subscriber records and information, notwithstanding the general prohibition on disclosure in
`
`§ 2702. Id. § 2703(a)-(c).
`
`
`
`Section 2703 establishes three main forms of legal process by which the government may
`
`require a provider to disclose subscriber information in its possession: (1) “a warrant issued
`
`using the procedures described in the Federal Rules of Criminal Procedure (or, in the case of a
`
`State court, issued using State warrant procedures),” id. § 2703(a), (b)(1)(A), (c)(1)(A); (2) a
`
`“court order for disclosure” (or a “§ 2703(d) order”) issued based on an offer by the government
`
`of “specific and articulable facts showing that there are reasonable grounds to believe that the
`
`contents of a wire or electronic communication, or the records or other information sought, are
`
`relevant and material to an ongoing criminal investigation,” id. § 2703(d); and (3) “an
`
`administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury
`
`or trial subpoena,” id. § 2703(b)(1)(B)(i), (c)(2). The particular form of legal process the
`
`government must obtain depends on the type of information it seeks, with more intrusive
`
`disclosures requiring a higher showing by the government. To require a provider to disclose the
`
`contents of wire or electronic communications, the government must obtain a warrant, unless
`
`prior notice is provided to the affected subscriber.8 Id. § 2703(a), (b)(1)(A). If notice is
`
`provided, the government may require a provider to disclose the contents of communications
`
`(other than those in storage with a provider of electronic communication service for 180 days or
`
`less) by obtaining a § 2703(d) order or a subpoena. Id. § 2703(b)(1)(B). Lesser forms of process
`
`are required for non-content information. The government may require a provider to disclose
`
`non-content records and other information pertaining to a subscriber by obtaining a § 2703(d)
`
`
`8 A warrant is always required to obtain disclosure of the contents of a wire or electronic
`communication in electronic storage for 180 days or less from a provider of electronic
`communication service, regardless of whether prior notice is provided. 18 U.S.C. § 2703(a).
`
`
`
`
`8
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 9 of 24
`
`order,9 id. § 2703(c)(1)(B), and may require disclosure of certain basic subscriber information
`
`and transactional records by way of a subpoena, id. § 2703(c)(2), though for either type of
`
`information, the government may also elect to proceed by warrant.
`
`
`
`The issue in this case is whether enforcing the SCA warrants in question to require
`
`Google to produce communications and other subscriber data stored on servers located outside
`
`the United States constitutes an extraterritorial application of the statute. In analyzing this issue,
`
`the Court starts with the presumption against extraterritoriality, “a longstanding principle of
`
`American law ‘that legislation of Congress, unless a contrary intent appears, is meant to apply
`
`only within the territorial jurisdiction of the United Sates.’” EEOC v. Arabian Am. Oil Co., 499
`
`U.S. 244, 248 (1991) (quoting Foley Bros., Inc. v. Filardo, 336 U.S. 281, 285 (1949)). Under
`
`this presumption, unless a statute reflects “clearly expressed congressional intent” that it is to
`
`apply extraterritorially, it will be “construed to have only domestic application.” RJR Nabisco,
`
`Inc. v. European Cmty., 136 S. Ct. 2090, 2100 (2016). Although the presumption serves in part
`
`“to avoid the international discord that can result when U.S. law is applied to conduct in foreign
`
`countries,” it also “reflects the more prosaic ‘commonsense notion that Congress generally
`
`legislates with domestic concerns in mind.’” Id. (quoting Smith v. United States, 507 U.S. 197,
`
`204 n.5 (1993)). The presumption thus applies “regardless of whether there is a risk of conflict
`
`between the American statute and a foreign law.” Id. (quoting Morrison v. Nat’l Austl. Bank
`
`Ltd., 561 U.S. 247, 255 (2010)).
`
`
`9 The government may also obtain disclosure of such non-content records and information with
`the subscriber’s consent or, where the subscriber is engaged in telemarketing and the government
`seeks the information in connection with a telemarketing fraud investigation, by formal written
`request. 18 U.S.C. § 2703(c)(1)(C), (D).
`
`
`
`
`9
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 10 of 24
`
`
`
`The Supreme Court has developed a “two-step framework for analyzing extraterritoriality
`
`issues.” Id. at 2101. First, the court must determine “whether the presumption against
`
`extraterritoriality has been rebutted—that is, whether the statute gives a clear, affirmative
`
`indication that it applies extraterritorially.” Id. If so, then the statute applies extraterritorially,
`
`subject only to “the limits Congress has (or has not) imposed on [its] foreign application.” Id. If
`
`the presumption has not been rebutted, then the statute is not extraterritorial, and the court must
`
`determine, at the second step of the analysis, “whether the case involves a domestic application
`
`of the statute,” id., or, put differently, “whether the domestic contacts [of the case] are sufficient
`
`to avoid triggering the presumption [against extraterritoriality] at all,” Microsoft, 829 F.3d at 216
`
`(quoting Mastafa v. Chevron Corp., 770 F.3d 170, 182 (2d Cir. 2014)). In making this
`
`determination, the court must discern the statute’s “focus” and identify where the conduct
`
`relevant to that focus occurred. “If the conduct relevant to the statute’s focus occurred in the
`
`United States, then the case involves a permissible domestic application even if other conduct
`
`occurred abroad.” RJR Nabisco, 136 S. Ct. at 2101. If, however, “the conduct relevant to the
`
`focus occurred in a foreign country, then the case involves an impermissible extraterritorial
`
`application regardless of any other conduct that occurred in U.S. territory.” Id.
`
`
`
`Applying this extraterritoriality analysis, the Second Circuit held in Microsoft that
`
`enforcing an SCA warrant to require a domestic service provider to disclose subscriber data
`
`stored outside the United States would constitute an extraterritorial application of the statute.
`
`829 F.3d at 221-22. At the first step of the analysis, the court concluded Congress did not intend
`
`the SCA’s warrant provision to apply extraterritorially, a point the government had conceded.
`
`Id. at 210 & n.19, 216. Proceeding to the second step, the court held the focus of the SCA’s
`
`warrant provision
`
`is on “protecting
`
`the privacy of
`
`the content of a user’s stored
`
`
`
`10
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 11 of 24
`
`communications.” Id. at 217. The court then concluded the conduct relevant to this statutory
`
`focus is the provider’s invasion of its customer’s privacy, which, in the court’s view “takes place
`
`under the SCA where the customer’s protected content is accessed—here, where it is seized by
`
`Microsoft [the provider], acting as an agent of the government.” Id. at 220. Because the content
`
`subject to the warrant in the Microsoft case “[wa]s located in, and would be seized from,
`
`[Microsoft’s] Dublin datacenter,” the court concluded the conduct relevant to the statute’s
`
`focus—the invasion of privacy—also would occur outside the United States, and enforcing the
`
`warrant as to such content would therefore “constitute[] an unlawful extraterritorial application
`
`of the Act.” Id. at 220-21.
`
`
`
`A significant factor in the court’s extraterritoriality analysis was the SCA’s use of the
`
`term “warrant,” a form of legal process traditionally understood to authorize searches and
`
`seizures only within the United States. See United States v. Verdugo-Urquidez, 494 U.S. 259,
`
`274 (1990) (remarking that a U.S. warrant authorizing a search of a defendant’s residence in
`
`Mexico “would be a dead letter outside the United States”). Given the territorial limitations
`
`traditionally associated with warrants—which typically “identify discrete objects and places, and
`
`restrict the government’s ability to act . . . outside of the place identified, which must be
`
`described in the document,” Microsoft, 829 F.3d at 212—the court found the statute’s use of the
`
`term warrant supported the conclusion that “an SCA warrant may reach only data stored within
`
`United States boundaries,” id. at 221.10
`
`
`10 A concurring panel member disagreed with the majority’s characterization of the SCA’s
`warrant requirement, observing an SCA warrant is not a traditional search warrant, and
`concluding that Congress’s use of the term warrant was intended to invoke not the territorial
`limitations but the privacy protections traditionally associated with warrants—namely, “the
`requirement that an independent judicial officer determine that probable cause exists to believe
`that a crime has been committed and that evidence of that crime may be found in the
`communications demanded.” Microsoft, 829 F.3d at 226-28 n.6 (Lynch, J., concurring). While
`
`
`
`11
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 12 of 24
`
`
`
`Although the panel decision in the Microsoft case was unanimous, the decision drew
`
`vigorous opposition from other judges of the Second Circuit when the case came before the full
`
`court on the government’s petition for rehearing en banc. The petition was denied by an equally
`
`divided court, but the denial generated four separate dissents by judges who agreed that
`
`enforcing an SCA warrant to require a domestic service provider to disclose information in the
`
`provider’s possession, which the provider can access within the United States, constitutes a
`
`domestic application of the statute’s warrant provision, regardless of where the provider has
`
`elected to store the information. See Microsoft Reh’g, 855 F.3d at 61-62 (Jacobs, J., dissenting);
`
`id. at 66-68 (Cabranes, J., dissenting); id. at 70-73 (Raggi, J., dissenting); id. at 75-76 (Droney,
`
`J., dissenting). The Microsoft court’s analysis has also been rejected by every magistrate judge
`
`and district court that has considered the issue to date, including the Magistrate Judge in this
`
`case.11
`
`
`the concurring judge did not view the term warrant as dispositive of the instrument’s reach, the
`judge nevertheless agreed with the panel majority that the warrant at issue could not be enforced
`as to communications stored on servers located abroad given the lack of any indication that
`Congress had considered the implications of such an application of the statute, particularly as to
`communications belonging to foreign nationals.
`
`11 See In re Search of Content that Is Stored at Premises Controlled by Google Inc. and as
`Further Described in Attachment A, No. 16-mc-80263 (N.D. Cal. Aug. 14, 2017), aff’g 2017 WL
`In
`re Search of
`Info. Associated with
`1487625
`(N.D. Cal. Apr. 25, 2017);
`[Redacted]@gmail.com that Is Stored at Premises Controlled by Google, Inc., No. 16-mj-757,
`2017 WL 3445634 (D.D.C. July 31, 2017), aff’g 2017 WL 2480752 (D.D.C. June 2, 2017); In re
`Search of Info. Associated with Accounts Identified as [Redacted]@gmail.com and Others
`Identified in Attachment A that Are Stored at Premises Controlled by Google Inc., No. 16-mj-
`2197, 2017 WL 3263351 (C.D. Cal. July 13, 2017); In re Search Warrant to Google, Inc., Mag.
`No. 16-4116, 2017 WL 2985391 (D.N.J. July 10, 2017) (objections filed); In re Two Email
`Accounts Stored at Google, Inc., No. 17-M-1235, 2017 WL 2838156 (E.D. Wisc. June 30, 2017)
`(objections filed); In re Search of Premises Located at [Redacted]@yahoo.com, No. 17-mj-1238
`(M.D. Fla. Apr. 7, 2017); In re Search Warrant No. 16-960-M-01 to Google, 232 F. Supp. 3d
`708 (E.D. Pa. Feb. 3, 2017).
`
`
`
`
`12
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 13 of 24
`
`
`
`Having withheld the foreign-stored communications and information the government
`
`seeks based on the Microsoft decision, Google urges this Court to follow a variation of the panel
`
`majority’s extraterritoriality analysis in this case. As in the Microsoft case, there is no dispute as
`
`to the first step of the extraterritoriality analysis. The parties here agree that § 2703 gives no
`
`indication Congress intended for that provision to apply extraterritorially. See Google’s Br. 3;
`
`Government’s Opp’n Br. 18. The dispute instead centers on the second step of the analysis, at
`
`which the Court must determine whether this case involves a domestic application of the SCA by
`
`identifying the focus of the statute and where “the conduct relevant to the statute’s focus”
`
`occurred. RJR Nabisco, 136 S. Ct. at 2101.
`
`
`
`Google argues the focus of the SCA is on protecting the privacy of electronic
`
`communications. As to § 2703 in particular, Google argues this provision protects the privacy of
`
`communications and other subscriber data by requiring the government to obtain one of the
`
`enumerated forms of legal process in order to compel a provider to disclose such information.
`
`Google maintains that where the required form of process is a warrant, the conduct relevant to
`
`the SCA’s privacy focus includes the search and seizure process Google must undertake in order
`
`to disclose the requested communications to the government—i.e., the searching, accessing, and
`
`retrieval of the compelled communications—a process that, in Google’s view, occurs primarily
`
`where the communications are stored. In making this argument, Google emphasizes the SCA’s
`
`use of the term warrant, asserting that in using this term of art, Congress would have intended to
`
`convey the term’s widely accepted meaning as “a form of legal process authorizing the execution
`
`of a search of private places and a seizure of private things,” and that such places and things
`
`must be located in the United States to be within a warrant’s territorial reach. See Google’s
`
`Reply Br. 3-4.
`
`
`
`13
`
`
`
`Case 2:16-mj-01061-JS Document 73 Filed 08/17/17 Page 14 of 24
`
`
`
`The government disputes Google’s characterization of the warrant authorized by § 2703,
`
`arguing an SCA warrant is not a traditional search warrant but its own form of process. The
`
`government contends that unlike a traditional warrant, which is executed with respect to a place,
`
`an SCA warrant is directed to a person—the service provider from which the government seeks
`
`to compel disclosure of subscriber information. In the government’s view, because an SCA
`
`warrant operates with respect to a person, rather than a place, so long as the enforcing court has
`
`personal jurisdiction over the provider, the warrant may be enforced to reach information in the
`
`provider’s custody or control, regardless of the location of the information, consistent with the
`
`law governing other forms of compelled disclosure. As to the Supreme Court’s extraterritoriality
`
`framework, the government argues the focus of § 2703 is compelled disclosure, as disclosure is
`
`the end result of each of the forms of process outlined therein and is thus the basic conduct the
`
`statute regulates. The government maintains the conduct relevant to the compelled disclosure
`
`focus is the compulsion, which “occurs in the United States, on United States providers, and in
`
`United States courts.” Gov’t’s Opp’