Additional Questions Concerning Use of the EINSTEIN 2.0 Intrusion-Detection System ( 2009 )


Menu:
  •              Additional Questions Concerning Use of the
    EINSTEIN 2.0 Intrusion-Detection System
    The deployment of an intrusion-detection system known as the EINSTEIN 2.0 program
    on the unclassified computer networks of the Executive Branch is consistent with the
    federal and state laws discussed in this opinion.
    Under the best reading of the statute, the EINSTEIN 2.0 program would not violate
    section 705 of the Communications Act, because it would fall within section 705’s
    exception permitting a person to “divulge” a communication through “authorized
    channels of transmission or reception,” which allows either the sender or the recipient
    of an Internet communication to convey the required authorization by consenting to a
    communication’s disclosure, including by clicking through an approved log-on banner
    or signing the computer-user agreement in order to gain access to a government-owned
    information system.
    If section 2702(a)(3) of the Stored Communications Act applied to the EINSTEIN 2.0
    program, the exception in section 2702(c)(1)(C) permitting disclosure based on “the
    lawful consent of the customer or subscriber” would also apply, because in this context
    the government, and no other party, should be understood as the “customer or sub-
    scriber” of the Internet service provider.
    If a state law imposed requirements on the EINSTEIN 2.0 program exceeding those
    imposed by these federal statutes, it would stand as an obstacle to the accomplishment
    and execution of the full purposes and objectives of Congress and therefore be unen-
    forceable under the Supremacy Clause of the Constitution.
    August 14, 2009
    MEMORANDUM OPINION FOR THE
    ASSOCIATE DEPUTY ATTORNEY GENERAL
    You have asked us to address whether the deployment of an intru-
    sion-detection system known as the “EINSTEIN 2.0” program on the
    unclassified computer networks of the Executive Branch is consistent
    with (1) section 705(a) of the Communications Act of 1934, as amended,
    47 U.S.C. § 605(a) (2006); (2) the provision of the Stored Communica-
    tions Act codified at 18 U.S.C. § 2702(a)(3) (2006); and (3) state laws
    concerning interception or electronic surveillance. For the reasons given
    below, we conclude that it is. 1
    1 We solicited the views of the Criminal Division and National Security Division on
    each of these questions. Both components concur in our conclusions.
    269
    
    33 Op. O.L.C. 269
     (2009)
    I.
    You have asked whether by engaging in any of the activities that are
    part of the EINSTEIN 2.0 program, 2 the Department of Agriculture
    (“USDA”), the Department of Homeland Security (“DHS”), or the
    relevant Internet service provider (“ISP”) would violate section 705(a)
    of the Communications Act of 1934, as amended, 47 U.S.C. § 605(a)
    (2006). Although this is a novel question, and the statute is hardly a model
    of clarity, we conclude that under the best reading of the statute, the
    EINSTEIN 2.0 activities would not violate section 705.
    In pertinent part, section 705 provides:
    Except as authorized by chapter 119, title 18 [i.e., the Wiretap
    Act], no person receiving, assisting in receiving, transmitting, or as-
    sisting in transmitting, any interstate or foreign communication by
    wire or radio shall divulge or publish the existence, contents, sub-
    stance, purport, effect, or meaning thereof, except through author-
    ized channels of transmission or reception,
    (1) to any person other than the addressee, his agent, or attor-
    ney,
    (2) to a person employed or authorized to forward such com-
    munication to its destination,
    (3) to proper accounting or distributing officers of the various
    communicating centers over which the communication may be
    passed,
    (4) to the master of a ship under whom he is serving,
    (5) in response to a subpena issued by a court of competent ju-
    risdiction, or
    (6) on demand of other lawful authority.
    47 U.S.C. § 605(a). 3 The Communications Act defines “person” in 47
    U.S.C. § 153(32) (2006) to “include[] an individual, partnership, associa-
    2  These activities are described in detail in a memorandum of this Office. See Use of
    the EINSTEIN 2.0 Intrusion-Detection System to Protect Unclassified Computer Networks
    in the Executive Branch, 
    33 Op. O.L.C. 63
     (2009) (“EINSTEIN 2.0 Opinion”).
    3 Section 705 contains additional prohibitions, such as on the “intercept[ion] [of] any
    radio communication and divulg[ing] or publish[ing]” of its contents, and on the use for
    personal benefit of radio communications intercepted or received without authorization.
    270
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    tion, joint-stock company, trust, or corporation.” “[C]ommunication by
    wire” is defined as “the transmission of writing, signs, signals, pictures,
    and sounds of all kinds by aid of wire, cable, or other like connection
    between the points of origin and reception of such transmission, including
    all instrumentalities, facilities, apparatus, and services (among other
    things, the receipt, forwarding, and delivery of communications) inci-
    dental to such transmission.” 
    Id.
     § 153(52). 4
    Although the scope of section 705’s prohibition is not entirely clear on
    its face, case law supports reading the provision as a general bar on a
    “person receiving, assisting in receiving, transmitting, or assisting in
    transmitting” wire or radio communications from “divulg[ing]” or “pub-
    lish[ing]” such communications to persons other than the addressee, his
    agent or attorney, except “through authorized channels of transmission or
    reception,” as “authorized by” the Wiretap Act, or in the circumstances
    enumerated in clauses (2) through (6). In United States v. Finn, 
    502 F.2d 938
    , 942 (7th Cir. 1974), for instance, the court identified the “absurdi-
    ties” that would result from a literal reading of the text, including that
    “[c]lauses (2) through (6) would be rendered meaningless, for all of those
    categories are completely covered by the more general clause (1).” Simi-
    larly, reading clause (6) as a prohibition “would forbid divulgence of a
    communication ‘on demand of other lawful authority,’” thereby “ren-
    der[ing] all such demands unlawful and by its own terms [] eliminat[ing]
    the very category to which it refers.” Instead, the court concluded, clauses
    (2) through (6) should be read “as exceptions to the general prohibition of
    clause (1),” a construction the court viewed as “the only way to give
    effect to the Congressional intent.” 
    Id.
     Finn is consistent with a line of
    precedents interpreting the pre-Wiretap Act version of this provision,
    Except for the first sentence of section 705 quoted above, these additional provisions
    extend only to “radio” communications, which are not at issue here. See 47 U.S.C.
    § 605(a); id. § 153(33) (defining “radio communication” to “mean[] the transmission by
    radio of writing, signs, signals, pictures, and sounds of all kinds”).
    4 This definition of “wire communication” is substantially similar to the definition
    of “electronic communication” under the Wiretap Act, 18 U.S.C. § 2510(12) (2006),
    which includes “any transfer of signs, signals, writing, images, sounds, data, or intelli-
    gence of any nature transmitted in whole or in part by a wire, radio, electromagnetic,
    photoelectronic or photooptical system that affects interstate or foreign commerce.” Cf.
    id. § 2510(1) (defining “wire communication” under the Wiretap Act to mean an “aural
    transfer”).
    271
    
    33 Op. O.L.C. 269
     (2009)
    which contained substantially similar language. For instance, in Nardone
    v. United States, 
    302 U.S. 379
    , 380–81 (1937), the Supreme Court charac-
    terized the version of section 705 then in effect as providing that “no
    person who, as an employee, has to do with the sending or receiving of
    any interstate communication by wire shall divulge or publish it or its
    substance to anyone other than the addressee or his authorized representa-
    tive or to authorized fellow employees, save in response to a subpoena
    issued by a court of competent jurisdiction or on demand of other lawful
    authority.” 5 See also Hanna v. United States, 
    404 F.2d 405
    , 408–09 (5th
    Cir. 1968) (“[I]nformation thus lawfully obtained may be divulged ‘in
    response to a subpoena issued by a court of competent jurisdiction, or on
    demand of other lawful authority.’” (quoting section 705)); Bubis v.
    United States, 
    384 F.2d 643
    , 646–47 (9th Cir. 1967) (“[N]o . . . person
    shall divulge or publish the existence, contents, substance, purport, or
    effect of any such communication to anyone other than the addressee or
    his authorized representative, or to authorized fellow employees, or in
    response to a subpoena issued by a court of competent jurisdiction, or on
    The version of the statute at issue in Nardone provided that:
    5
    No person receiving or assisting in receiving, or transmitting, or assisting in
    transmitting, any interstate or foreign communication by wire or radio shall divulge
    or publish the existence, contents, substance, purport, effect, or meaning thereof,
    except through authorized channels of transmission or reception, to any person oth-
    er than the addressee, his agent, or attorney, or to a person employed or authorized
    to forward such communication to its destination, or to proper accounting or dis-
    tributing officers of the various communicating centers over which the communica-
    tion may be passed, or to the master of a ship under whom he is serving, or in re-
    sponse to a subpena issued by a court of competent jurisdiction, or on demand of
    other lawful authority; and no person not being authorized by the sender shall inter-
    cept any communication and divulge or publish the existence, contents, substance,
    purport, effect, or meaning of such intercepted communication to any person; and
    no person not being entitled thereto shall receive or assist in receiving any inter-
    state or foreign communication by wire or radio and use the same or any infor-
    mation therein contained for his own benefit or for the benefit of another not enti-
    tled thereto; and no person having received such intercepted communication or
    having become acquainted with the contents, substance, purport, effect, or meaning
    of the same or any part therof, knowing that such information was so obtained,
    shall divulge or publish the existence, contents, substance, purport, effect, or mean-
    ing of the same or any part thereof, or use the same or any information therein con-
    tained for his own benefit or for the benefit of another not entitled thereto . . . .
    Communications Act of 1934, Pub. L. No. 73-416, § 605, 48 Stat. 1064, 1103–04.
    272
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    demand of other lawful authority.”); Brandon v. United States, 
    382 F.2d 607
    , 611 (10th Cir. 1967) (similar).
    Although our research has not uncovered any case law applying sec-
    tion 705 in the context of cybersecurity activities, we conclude that the
    EINSTEIN 2.0 program falls within section 705’s authorization to “di-
    vulge” a communication through an “authorized channel[] of transmission
    or reception.” We assume for purposes of this analysis—but do not de-
    cide—that federal-systems Internet traffic would constitute “communica-
    tion[s] by wire” under section 705, that the EINSTEIN 2.0 program would
    involve “divulg[ence] or publi[cation]” of the contents of such communi-
    cations, that DHS or USDA would be a “person receiving, assisting in
    receiving, transmitting, or assisting in transmitting” such communica-
    tions, and that the program would not be “authorized by” the Wiretap
    Act. 6
    6 A number of those assumptions may not be necessary, and thus there may be addi-
    tional bases for concluding that the EINSTEIN 2.0 program would not violate section
    705. An argument might be made, for instance, that program activities are “authorized by”
    the Wiretap Act for purposes of section 705 because they are not affirmatively prohibited
    by that Act. Compare United States v. Freeman, 
    524 F.2d 337
    , 340 & n.5 (7th Cir. 1976)
    (phrase “[e]xcept as authorized by [the Wiretap Act]” in section 705 “permits” telephone
    companies to protect their rights or property pursuant to the relevant exception in 18
    U.S.C. § 2511(2)(a)(i)), with EINSTEIN 2.0 Opinion, 33 Op. O.L.C. at 103 (concluding
    that “the better reading” of a related exception in FISA for conduct “authorized by” the
    Wiretap Act was to refer to affirmative “orders” obtained under that Act, rather than
    activities that “merely are not prohibited by those statutes”). Although we need not, and
    do not, resolve this question here, we note that such a reading of section 705 would not
    only incorporate the Wiretap Act’s consent exception, see 18 U.S.C. § 2511(2)(a)(ii)
    (2006), but would also appear to import wholesale all of the statutory exceptions found in
    that Act, cf., e.g., id. § 2511(2)(a)(i) (“rights or property”), essentially collapsing section
    705 and the Wiretap Act into a single standard, notwithstanding that section 705(a)
    retained, by its plain terms, an independent limitation regarding wire communications.
    It might separately be contended that any disclosure of communications by the service
    provider to DHS would occur on “demand of other lawful authority,” although here DHS
    has entered into an agreement with USDA and thus arguably is not “demand[ing]”
    disclosure of communications. Cf. Brown v. Continental Tel. Co., 
    670 F.2d 1364
    , 1365–
    66 (4th Cir. 1982) (request for records and telephone bills served on telephone company
    by Attorney for the Commonwealth was a “demand of . . . lawful authority” under section
    705 because the statute’s plain text contemplated the release of protected information “to
    appropriate authorities in response to a demand less compelling than a subpoena”). And
    with respect to any conduct of USDA or DHS that is potentially within the scope of
    section 705, there is some question whether the first sentence of section 705 applies to
    273
    
    33 Op. O.L.C. 269
     (2009)
    We begin with the text of section 705, which expressly permits a “di-
    vulge[nce] or publi[cation]” of a wire communication made “through
    authorized channels of transmission or reception.” We believe the plain
    language of section 705 is fairly interpreted to include the EINSTEIN
    scanning sensors as a “channel[] of transmission or reception” of Internet
    communications, particularly where a party to the communication has, as
    here, expressly authorized such scanning. In reaching this conclusion, we
    have considered the potential ambiguities concerning both what consti-
    tutes a “channel of transmission or reception” and what constitutes a
    channel that has been “authorized” for purposes of section 705.
    As to the first issue, we are aware of a narrower construction of the
    phrase “channel[] of transmission or reception” that would be limited to
    the channel through which the communication actually passes from recip-
    ient to sender. Under such a reading, section 705 would prohibit, inter
    alia, forwarding of a mirror copy of federal systems Internet traffic to
    EINSTEIN 2.0 sensors for processing, see EINSTEIN 2.0 Opinion, 33
    Op. O.L.C. at 67–68, or DHS’s disclosure to another federal agency if that
    disclosure did not involve transmitting the communication to its recipient,
    unless one of the other express exceptions in the statute applied. But the
    text of the section does not by terms compel that narrower reading, given
    the placement of the relevant phrase. That phrase is located where it could
    be read to qualify the prohibition against divulgence to third parties, and
    thus to indicate that the channels being referenced are those that might be
    used to reach third parties. Indeed, the phrase itself, in its second appear-
    ance in the section, is not limited to channels of transmission by “wire,”
    government employees. Compare United States v. Hall, 
    488 F.2d 193
    , 195 (9th Cir. 1973)
    (superseded on other grounds) (“The legislative history [] explicitly shows that Congress
    intended to exclude law enforcement officers from the purview of the new [section
    705]”); S. Rep. No. 90-1097, at 108 (1968) (“[The first sentence of section 705] is
    designed to regulate the conduct of communications personnel.”); and Int’l Cablevision,
    Inc. v. Sykes, 
    75 F.3d 123
    , 131 n.4 (2d Cir. 1996) (similar), with Nardone, 
    302 U.S. at 381
    (“Taken at face value the phrase ‘no person’ [in the pre-Wiretap Act version of section
    705] comprehends federal agents[.]”); and United States v. Sugden, 
    226 F.2d 281
     (9th Cir.
    1955) (interpreting pre-Wiretap Act version of section 705 to permit FCC agents to “listen
    [to radio communications] for the purpose of enforcing the [Communications] [A]ct” but
    to require exclusion of evidence, in a criminal prosecution unrelated to violations of that
    Act, obtained by FCC agents who intercepted defendant’s short range radio transmis-
    sions). We need not, and do not, resolve these issues in light of our conclusion that the
    exercise falls within section 705’s “authorized channels of transmission” provision.
    274
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    suggesting a potentially broad conception of the means by which commu-
    nications may be passed along. Furthermore, the text is not clear that the
    channel in question must be the one through which the original communi-
    cation travels, as the text specifically refers to the divulgence, not of the
    communication itself, but of its substance or meaning. Insofar as the
    phrase “channels of transmission or reception” qualifies the divulgence,
    as its placement indicates, it is clearly intended to refer to channels other
    than those through which the communication flows.
    As to whether the channel would be “authorized” for purposes of sec-
    tion 705, the dictionary defines “authorized” as “having authority[;] . . .
    recognized as having authority[;] . . . approved,” and defines “authori-
    ty” as, inter alia, “justifying grounds: basis, warrant.” Webster’s Third
    New International Dictionary 146 (3d ed. 1993). The statute does not
    specify the source or nature of the “authoriz[ation]” required. As a
    matter of ordinary meaning, the term “authorized” is certainly broad
    enough to encompass either the sender or receiver of a communication
    expressly authorizing—by means of indicating consent to—divulgence
    or publication. This reading is also supported by the terms of section
    705’s second sentence, which states that “[n]o person not being author-
    ized by the sender shall intercept any radio communication and divulge
    or publish” that communication. 47 U.S.C. § 605(a) (emphasis added).
    That Congress chose the unqualified term “authorized” in the first
    sentence, while expressly limiting which party could authorize disclo-
    sure in the second, suggests an intent that the term be given a broader
    reading in the former instance. 7 We therefore would interpret the phrase
    “authorized channels of transmission or reception” to permit either the
    sender or the recipient of an Internet communication to convey the
    required authorization by consenting to a communication’s disclosure
    in the context of the EINSTEIN 2.0 system.
    Although we are not aware of any judicial precedent directly on point,
    we draw support for this reading of the statute from case law analyzing
    7 Our reading of “authorized” arguably also draws support from, and is entirely con-
    sistent with, the use of the word “authorizing” in the text of section 705(b), which con-
    templates a “marketing system” for satellite communications in which “agents have been
    lawfully designated for the purpose of authorizing private viewing by individuals” and
    “individuals receiving [satellite] programming ha[ve] obtained authorization for private
    viewing under that [marketing] system.” 47 U.S.C. § 605(b).
    275
    
    33 Op. O.L.C. 269
     (2009)
    consent by either the sender or receiver of a communication in determin-
    ing whether interception or divulgence of a telephone call violated certain
    related provisions in section 705. In Rathbun v. United States, 
    355 U.S. 107
     (1957), for instance, the Supreme Court held that the second clause of
    the version of section 705 then in effect (which provided that “no person
    not being authorized by the sender shall intercept any communication and
    divulge or publish the existence, contents, substance, purport, effect, or
    meaning of such intercepted communication to any person,” see supra
    note 5) was not violated where the recipient of a phone call asked the
    police to listen to the call on an extension telephone in his home. The
    Court concluded, notwithstanding the statute’s specific reference to the
    “authoriz[ation] [of] the sender,” that “there ha[d] been no ‘interception’
    as Congress intended that the word be used.” 355 U.S. at 109. The Court
    looked to another related provision of section 705, which then prohibited
    any person from “receiv[ing] or assist[ing] in receiving any interstate or
    foreign communication by wire or radio and us[ing] the same or any
    information therein contained for his own benefit.” That provision, the
    Court explained, gave “[t]he clear inference . . . that one entitled to re-
    ceive the communication may use it for his own benefit or have another
    use it for him.” Id. at 110. In dictum the Court further observed that even
    the defendant in that case conceded that under section 705 “either party
    may record the [telephone] conversation and publish it.” Id.
    Similarly, in Weiss v. United States, 
    308 U.S. 321
     (1939), the Court
    held evidence to be inadmissible in a criminal trial where federal agents
    had violated the same provision of section 705 as in Rathbun (the prohibi-
    tion against any person “not being authorized by the sender” intercepting
    and divulging communications) by tapping the defendant’s intrastate
    phone calls. In rejecting the government’s argument that the defendant’s
    trial testimony about the intercepted conversations constituted consent,
    the Court relied on the fact that “divulgence was not consented to by
    either of the parties to any of the telephone conversations.” 
    Id. at 330
    (emphasis added). More recently, in United States v. Hodge, 
    539 F.2d 898
    (6th Cir. 1976), the court rejected a defendant’s claim that agents of the
    Drug Enforcement Agency had violated section 705 by recording tele-
    phone conversations between the defendant and a government informant.
    (The informant in the case had consented to the DEA monitoring.) The
    court quoted section 705 in full before tersely dismissing the defendant’s
    claim, explaining that “[i]t is well settled that there is no violation of the
    276
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    [Communications] Act if the interception was, as here, authorized by a
    party to the conversation.” 
    Id. at 905
    . 8
    Although these cases do not interpret the phrase in section 705 upon
    which we rely here, they provide at least indirect support for reading the
    word “authorized,” which appears without qualification as to the scope of
    the persons encompassed by it, to permit the recipient of a communication
    (either a federal agency, in the case of communications directly to that
    agency, or individual federal employees, in the case of communications to
    those employees) to consent to and thereby authorize the communica-
    tion’s disclosure in the context of the EINSTEIN 2.0 program. 9 At a
    minimum, our reading of the unqualified word “authorized” is consistent
    with what appears to have been the prior understanding that the statute
    was not, absent an express limitation regarding the scope of any consent
    exception, intended to require two-party consent for any such exception to
    apply.
    As we explain below, we believe that under our reading of section 705,
    the manifestations of consent by USDA in conjunction with those of
    8 A modern line of cases brought by plaintiff corporations to prevent the unauthorized
    reception or transmission of satellite television signals has focused on the consent of the
    sending party in determining whether a “divulg[ence]” was “authorized.” See, e.g.,
    National Satellite Sports, Inc. v. Eliadis, Inc., 
    253 F.3d 900
    , 916 –17 (6th Cir. 2001)
    (holding that private cable company had violated section 705 by selling the broadcast
    transmission of a boxing match to a commercial customer, when the company was only
    authorized by the program’s originator to distribute it to residential customers). We do not
    read these cases as negating the relevance of the precedents discussed above, which
    contemplate consent by either party to communications such as telephone calls. For one
    thing, the modern case law does not purport to overrule or limit the precedents discussed
    above. More significantly, in this line of cases there is no contention that the recipient of a
    licensed commercial broadcast—who often acts pursuant to a contractual agreement with
    the originator—is “authorized” to distribute the material beyond the terms of that agree-
    ment.
    9 In light of this case law, we do not believe the existence of an express consent excep-
    tion in the Wiretap Act requires a contrary interpretation of “authorized channel[] of
    transmission or reception” in section 705. When Congress reenacted the language of
    section 705 in the 1968 Wiretap Act, it did so against the settled background of case law
    interpreting the pre-Wiretap Act statute to allow consensual interception. By reenacting
    statutory text that was in large part identical to the preexisting language, and by indicating
    no disapproval of settled case law, Congress can be understood to have left in place the
    established meaning of the text it employed rather than to have impliedly precluded
    recognition of a consent exception.
    277
    
    33 Op. O.L.C. 269
     (2009)
    individual federal employees using government information systems are
    sufficient to avoid a violation of that provision by the ISP, DHS, or
    USDA, in conjunction with the authorized operation of the EINSTEIN 2.0
    system. First, with respect to potential violations by the service provider,
    we believe any “divulge[nce]” of communications would occur through
    an “authorized channel[] of transmission or reception.” As to any disclo-
    sure by the provider of communications between third parties and USDA,
    the agency has “authorized” the service provider to disclose such commu-
    nications to DHS by virtue of the Memorandum of Agreement between
    USDA and DHS, which memorializes USDA’s consent to the scanning of
    its Internet traffic for cybersecurity purposes. As to disclosure by the
    service provider of communications addressed to or sent by individual
    employees, we have previously concluded that a federal employee’s valid,
    voluntary consent to the scanning of Internet traffic is apparent from his
    clicking through an approved log-on banner or signing the computer-user
    agreement in order to gain access to a government-owned information
    system, see EINSTEIN 2.0 Opinion, 33 Op. O.L.C. at 98, and we believe
    this consent would foreclose any claim that the service provider would
    violate section 705 by transmitting communications through the intrusion-
    detection sensors operated by DHS because it would authorize any result-
    ing divulgence.
    We similarly conclude that the same consents—by USDA and USDA
    employees—“authorize” DHS to “divulge” the communications to any
    other authorized agency without running afoul of the prohibition in sec-
    tion 705. As to communications involving the agency itself, USDA has
    expressly consented to any such disclosures by DHS through the Memo-
    randum of Agreement and other documents detailing the operation of the
    EINSTEIN 2.0 program. As to communications involving individual
    employees, the model log-on banner and computer-user agreement dis-
    cussed in our EINSTEIN 2.0 Opinion state expressly that “[a]ny commu-
    nications or data transiting or stored on this information system may be
    disclosed or used for any lawful government purpose.” 33 Op. O.L.C. at
    70. The scope of the employee’s consent to disclosure for any “lawful
    government purpose” is informed by our separate conclusion in the con-
    text of 18 U.S.C. § 2511 that DHS is “authorized by law” to conduct an
    exercise involving EINSTEIN technology, as described in the implemen-
    tation plan governing that exercise, by virtue of several affirmative statu-
    tory authorities, particularly a recent appropriations statute providing
    278
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    funding for the precise exercise in question, as well as DHS’s organic
    statute and the Federal Information Security Management Act.
    Finally, we believe the log-on banner and computer-user agreements
    discussed above would also be sufficient to foreclose any claim that
    USDA would violate section 705 by divulging to DHS, through its partic-
    ipation in EINSTEIN 2.0, the contents of communications addressed to its
    employees.
    This reading of section 705 is consistent with the conclusion in our
    EINSTEIN 2.0 Opinion that the EINSTEIN 2.0 program would not violate
    parallel non-disclosure provisions contained in the Wiretap Act. Section
    2511(3) of title 18, U.S. Code, provides that “a person or entity providing
    an electronic communication service to the public shall not intentionally
    divulge the contents of any communication . . . while in transmission on
    that service to any person or entity other than an addressee or intended
    recipient of such communication or an agent of such addressee or intend-
    ed recipient,” except “with the lawful consent of the originator or any
    addressee or intended recipient of such communication,” or “to a person
    employed or authorized, or whose facilities are used, to forward such
    communication to its destination.” Our EINSTEIN 2.0 Opinion conclud-
    ed that EINSTEIN 2.0 would not unlawfully “divulge” the contents of
    Internet communications within the meaning of section 2511(3), both
    because the participating agency and its employees would have manifest-
    ed consent to the scanning, and “because the federal government is ‘au-
    thorized,’ and its ‘facilities are used, to forward such communications to
    [their] destination.’” 33 Op. O.L.C. at 96. With respect to individual
    federal employees, we further noted that Internet communications cannot
    reach employees at work without routing through the government’s com-
    puter systems. Id. Thus, even if section 705 is not read by terms to incor-
    porate this exception, we find it significant that the exception we conclude
    section 705 adopts is hardly a novel one in this area. We are also not
    aware of any legislative history that indicates a congressional intention to
    preclude recognition of such an exception here.
    II.
    We believe the EINSTEIN 2.0 system would also comply with the pro-
    vision of the Stored Communications Act (“SCA”), codified at 18 U.S.C.
    § 2702(a)(3), that provides that “a provider of remote computing service
    279
    
    33 Op. O.L.C. 269
     (2009)
    or electronic communication service to the public shall not knowingly
    divulge a record or other information pertaining to a subscriber to or
    customer of such service (not including the contents of communications
    covered by [section 2702(a)(1) or (a)(2)]) to any governmental entity.”
    Insofar as the EINSTEIN 2.0 system examines, in real time, Internet
    traffic-flow data that is not retained by the ISP, there may be grounds to
    assert that this provision is simply inapplicable, because the data in ques-
    tion is not a “record or other information” within the possession of the
    ISP. Even assuming, however, that section 2702(a)(3) by its terms may
    apply to EINSTEIN 2.0, we believe that the statutory exception permitting
    disclosure based on “the lawful consent of the customer or subscriber”
    would apply. 18 U.S.C. § 2702(c)(1)(C) (2006). That is because we be-
    lieve that in this context the government, and no other party, should be
    understood as the “customer or subscriber” of the ISP for purposes of
    this exception. On this view, even assuming that non-content informa-
    tion obtained from or with the assistance of the ISP regarding Internet
    traffic that passed onto or off of the government’s system would qualify
    as “record[s] or other information” under the SCA, these “record[s] or
    other information” would “pertain[] to” the government as a “subscriber
    to or customer of [the ISP’s] service,” and the government could there-
    fore provide “lawful consent” to divulge this information. 18 U.S.C.
    § 2702(c)(2).
    This construction of the statute fits naturally with the plain text: insofar
    as a government agency has contracted with an ISP for Internet service,
    the government is indisputably a “customer” (if not also a subscriber) of
    the ISP. In accordance with this view, the Ninth Circuit has characterized
    a municipality as a “subscriber” of a text-messaging service where the
    municipality contracted with the service to provide two-way text pagers
    to police officers and other municipal employees. See Quon v. Arch
    Wireless Operating Co., 
    529 F.3d 892
    , 895, 903 (9th Cir. 2008).
    Insofar as end users such as individual employees hold a protected pri-
    vacy interest in non-content information, the employer’s consent to dis-
    closure might violate some legal obligation of the employer, but it would
    not create liability for the ISP under the SCA, since the ISP had obtained
    the necessary consent of its “customer or subscriber.” In any event, in our
    case, the individual employees have also consented to the disclosure, so
    disclosure should not violate any SCA-protected interest of theirs (even
    if they are also somehow “customers or subscribers” of the ISP). Nor
    280
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    does there appear to be any Fourth Amendment issue with the disclosure.
    Not only have the employees here consented to the disclosure, but courts
    have generally concluded that there is no reasonable expectation of
    privacy in non-content information provided to an ISP. See, e.g., United
    States v. Perrine, 
    518 F.3d 1196
    , 1204–05 (10th Cir. 2008) (collecting
    cases); Freedman v. America Online, Inc., 
    412 F. Supp. 2d 174
    , 181–82
    (D. Conn. 2005).
    We recognize the concern that non-content information pertaining to
    one customer or subscriber (such as the government in our case) could
    include information pertaining to other customers or subscribers of the
    ISP insofar as those other parties have sent or received traffic from the
    first customers/subscriber’s computers. But we do not believe the SCA
    should be read to require separate consent from both customers/sub-
    scribers in that circumstance. Such records or information “pertain” to the
    customer/subscriber providing consent, even if they reveal information
    about other customers/subscribers too, so under the plain text of the
    statute one-party consent seems sufficient for disclosure. Indeed, any
    other interpretation would yield the odd result that a customer’s ability to
    consent to disclosure of its information would depend on whether other
    parties it telephoned or emailed happened to be customers of the same
    provider. Also, unlike content information, which relates to discrete
    messages each with a particular sender and particular recipients, the
    “record or other information” covered by section 2702(a)(3) often in-
    volves an aggregation of data—the total record of a customer/subscriber’s
    Internet traffic or phone calls, for example—that is unique to the individ-
    ual customer/subscriber and for which (as a result) no other party could
    provide meaningful consent. Information regarding other custom-
    ers/subscribers who have not provided consent could of course be dis-
    closed under this analysis only to the extent that such information is
    contained in a “record or other information” pertaining to the customer or
    subscriber who has provided lawful consent (here, the government).
    Furthermore, the SCA’s consent exception for content information ex-
    pressly allows one-party consent—either the “originator” or the “address-
    ee” or “intended recipient” of the communication may authorize disclo-
    sure of its contents, 18 U.S.C. § 2702(b)(3)—and it would be anomalous
    if the provisions on non-content information, which are generally less
    restrictive, imposed a more stringent consent requirement than those for
    content information. Cf. In re American Airlines, Inc. Privacy Litig., 370
    281
    
    33 Op. O.L.C. 269
     (2009)
    F. Supp. 2d 552, 561 (N.D. Tex. 2005) (construing statute to allow any
    intended recipient of a communication to authorize disclosure of content
    information). Congress appears to have adopted the current SCA provi-
    sions on non-content information in part to bring those provisions more in
    line with provisions on content information. Before 2001, the SCA pro-
    vided only that a provider could disclose “a record or other information
    pertaining to a subscriber to or customer of [the provider’s] service (not
    including [content information]) to any person other than a governmental
    entity” and that the provider generally could disclose such records or
    information to a governmental entity “only when the governmental entity
    . . . ha[d] the consent of the subscriber or customer to such disclosure” or
    satisfied one of several other enumerated exceptions. See 18 U.S.C.
    § 2703(c) (2000); Pub. L. No. 99-508, § 201, 100 Stat. 1848, 1860 (1986).
    Congress amended the statute to provide that, even without an affirmative
    government request, the provider may disclose records and information
    covered by section 2702(a)(3) “with the lawful consent of the customer
    or subscriber” or in certain other specified circumstances. See 18 U.S.C.
    § 2702(c)(2) (Supp. I 2001); Pub. L. No. 107-56, § 212(a)(1)(E), 115
    Stat. 272, 284 (2001). As explained in the legislative history, Congress
    intended this change “to allow communications providers to disclose non-
    content information (such as the subscriber’s login records).” H.R. Rep.
    No. 107-236, pt. 1, at 58 (2001). Under pre-2001 law, the House Judiciary
    Committee explained, “the communications provider [was] expressly
    permitted to disclose content information but not expressly permitted to
    provide non-content information. This change would cure this problem
    and would permit the disclosure of the less-protected information, parallel
    to the disclosure of the more protected information.” Id.; see also 147
    Cong. Rec. 19,001, 19,009 (statement of Sen. Leahy) (discussing 2001
    amendments and observing that “the right to disclose the content of com-
    munications necessarily implies the less intrusive ability to disclose non-
    content records”). In addition, although we are aware of little relevant
    legislative history bearing directly on the meaning of “consent” in section
    2702(a)(3), the legislative history of the SCA as originally enacted sug-
    gests that Congress understood background legal principles to allow one-
    party consent, which arguably supports construing consent provisions of
    the statute in accordance with that understanding. See S. Rep. No. 99-541,
    at 3 (1986) (observing that “because [information on remote computer
    systems] is subject to control by a third party computer operator, the
    282
    Additional Questions Concerning Use of EINSTEIN 2.0 Intrusion-Detection System
    information may be subject to no constitutional privacy protection” (citing
    United States v. Miller, 
    425 U.S. 435
     (1976))).
    III.
    Finally, we do not believe the EINSTEIN 2.0 program impermissibly
    infringes state wiretapping and communication privacy laws. See, e.g.,
    Fla. Stat. Ann. § 934.03(3)(d) (West 2009); 18 Pa. Cons. Stat. Ann.
    § 5704(4) (West Supp. 2009); Md. Code Ann., Cts. & Jud. Proc. § 10-
    402(c)(3) (Lexis Nexis 2009); Cal. Penal Code § 631(a) (West 1999). To
    the extent that such laws purported to apply to the conduct of federal
    agencies and agents conducting authorized EINSTEIN 2.0 operations and
    imposed requirements that exceeded those imposed by the federal statutes
    discussed above and in our EINSTEIN 2.0 Opinion, they would “stand[]
    as an obstacle to the accomplishment and execution of the full purposes
    and objectives of Congress,” and be unenforceable under the Supremacy
    Clause. Hines v. Davidowitz, 
    312 U.S. 52
    , 67 (1941); see also Geier v.
    Am. Honda Motor Co., 
    529 U.S. 861
    , 873 (2000); Old Dominion Branch
    v. Austin, 
    418 U.S. 264
     (1974); Bansal v. Russ, 
    513 F. Supp. 2d 264
    , 283
    (E.D. Pa. 2007) (concluding that “federal officers participating in a feder-
    al investigation are not required to follow” state wiretapping law contain-
    ing additional requirements not present in the federal Wiretap Act, be-
    cause in such circumstances, “the state law would stand as an obstacle to
    federal law enforcement”); Johnson v. Maryland, 
    254 U.S. 51
     (1920); cf.
    United States v. Adams, 
    694 F.2d 200
    , 201 (9th Cir. 1982) (“evidence
    obtained from a consensual wiretap conforming to 18 U.S.C. § 2511(2)(c)
    is admissible in federal court proceedings without regard to state law”).
    DAVID J. BARRON
    Acting Assistant Attorney General
    Office of Legal Counsel
    283