United States v. Agron Hasbajrami ( 2019 )


Menu:
  • 15-2684(L)
    United States of America v. Agron Hasbajrami
    15-2684, 17-2669
    United States of Americi. v. Agron Hasbajrami
    UNITED STATES COURT OF APPEALS
    FOR THE SECOND CIRCUIT
    August Term, 2018
    Argued; August 27, 2018                    Decided: December 18 2019
    I
    Docket No. 15-2684-L; 17-2669-CON
    UNITED STATES OF AMERICA,
    Appellee,
    -   V. -
    AGRON HASBAJRAMt
    Defendant-Appellant.
    Before:
    LYNCH, CARNEY, and DRONEY, Circuit Judges.
    Agron Hasbajrami was arrested at John F. Kennedy International Airport
    in September 2011 and charged with attempting to provide material support to a
    terrorist organization. After he pleaded guilty, the government disclosed, for the
    first time, that certain evidence involved in Hasbajrami's arrest and prosecution
    had been derived from information obtained by the government without a
    warrant pursuant to its warrantless surveillance program under Section 702 of
    the FISA Amendments Act of 2008. Hasbajrami then withdrew his initial plea
    and moved to suppress any fn1its of the Section 702 surveillance. The district
    court (Gleeson, then-].) denied the motion to suppress and Hasbajrami again
    pleaded guilty, this time pursuant to a conditional guiJty plea that allowed him
    to appeal the district court's ruling denying his motion to suppress.
    He now appeals, arguing inter alia that the warrantless surveillance and
    the collection of his communications violated the Fourth Amendment. We
    conclude that the collection of the communications of United States persons
    incidental to the lawful surveillance of non-United States persons located abroad
    does not violate the Fourth Amendment and that, to the extent that the
    government's inadvertent targeting of a United States person led to collection of
    Hasbajrami's communications, he was not harmed by that collection. -
    Because    there is insufficient information
    in either the classified or the public record in this case to permit us to determine
    whether any such querying was reasonable, and therefore permissible under the
    Fourth Amendment, we REMAND the case to the district court for further
    proceedings consistent with this opinion.
    MICHAEL K. BACHRACH,     Law Office of Michael K. Bachrach,
    New York, NY, Joshua L. Oratel, Joshua L. Dratel, P.C.,
    New York, NY, and Steve Zissou, Steve Zissou &
    Associates, Bayside, NY, for Defe,1dant-Appellant Agron
    Hasbajrami.
    SETH   D. DUCHARME, David C. James, Saritha Komatireddy,
    Assistant United States Attorneys, Joseph F. Palmer,
    Attorney, National Security Division, United States
    Department of Justice for Richard P. Donoghue, United
    Stales District Attorney for the Eastern District of New
    York, Brooklyn, NY,for the United States of America.
    2
    PATRICK TOOMEY and Ashley Gorski, American Civil Liberties
    Foundation, New York, NY, Mark Rumold and Andrew
    Crocker, Electronic Frontier Foundation, San Francisco,
    CA, Amici Curiae American Civil Liberties Union and
    Electronic Frontier Foundation.
    GERARDE. LYNCH, Circuit Judge:
    This case concerns the Fourth Amendment implications of the
    government's increasing technological capacity for electronic surveillance in
    foreign intelligence and terrorism investigations, and the balance our
    constitutional system requires between national security and individual privacy.
    On September 6, 2011, Defendant-Appellant Agron Hasbajrami
    ("Hasbajrami") was arrested as he attempted to board a flight to Turkey at John
    F. Kennedy International Airport in Queens, New York. His luggage contained a
    tent, boots, and cold-weather gear. The government, which had collected
    Hasbajrami's electronic communications, charged him with attempting to
    provide material support to a terrorist organization, alleging that he intended to
    travel to the Federally Administered Tribal Area of Pakistan, where he expected
    to join a terrorist organization, receive training, and ultimately fight "against U.S.
    forces and others in Afghanistan and Pakistan." App'x at 44. During the course
    of the prosecution, the government disclosed that it had collected some of its
    3
    evidence under the Foreign Intelligence Surveillance Act of 1978 ('''FISA"}, Pub,
    L. No. 95-511, 92 Stat. 1783 (1978), codified at 50 U.S.C. § 1801 et seq., and that it
    intended to introduce FISA-derived evidence at any eventual trial. Faced with
    the evidence, including his own incriminating communications, Hasbajrami
    ultimately pleaded guilty to attempting to provide material support to terrorists
    in violation of 18 U.S.C. § 2339A. He was sentenced to 180 months in prison.
    Hasbajrami was already serving his sentence when the government
    provided him with a supplemental letter disclosing, for the first time, that some
    of the evidence it had previously disclosed from FISA surveillance was itself the
    fruit of earlier information obtained without a warrant pursuant to Section 702 of
    the FISA Amendments Act ("Section 702"), Pub. L. No. 110-261, 122 Stat. 2436
    (2008), codified at 50 U.S.C. § 1881a.
    It is that Section 702-derived evidence - primarily electronic
    communications between Hasbajrami and individuals without ties to the United
    States and located abroad - that is at issue in this appeal. FoIIowing the
    disclosure of Section 702 surveillance, the district court Gohn Gleeson, then-J.)
    permitted Hasbajrami to withdraw his plea; Hasbajrami subsequently moved to
    suppress all evidence seized by the government under its Section 702 programs,
    4
    as well as any fruits of that surveillance, including the evidence obtained
    pursuant to FISA warrants and incul patory statements Hasbajrami made upon
    arrest. The district court denied the motion to suppress, and Hasbajrami again
    pleaded guilty, reserving his right to appeal the district court's denial of his
    suppression motion.
    The vast majority of Section 702 surveillance at issue here involves
    information the government collected about Hasbajrami incidental to its
    surveillance of other individuals without ties to the United States and located
    abroad.
    1
    This opinion has been reviewed by appropriate intelligence agencies for the
    purpose of redacting material that includes or references classified information.
    After an initial redaction, the panel met ex parte with representatives of those
    agencies in order to discuss potential substitutions or modified phrasing that
    would minimize the need for redaction, and the possibility that certain
    information referenced in the opinion could be declassified, thus further
    5
    In light of that disclosure, and the evidence in the public and classified
    record, we reach three principal conclusions:
    First, the "incidental collection" of communications
    (that is, the collection of the communications of
    individuals in the United States acquired in the course
    of the surveillance of individuals without ties to the
    United States and located abroad) is permissible under
    the Fourth Amendment. We therefore conclude, in
    agreement with the district court, that, at least insofar as
    the record available to the district court is concerned,
    the vast majority of the evidence detailed in the record
    was lawfully collected.
    Second, the "inadvertent collection" of communications
    of those located within the United States (that is, the
    acquisition of communications accidentally collected
    because an intelligence agency mistakenly believes that
    an individual is a non�United States person located
    abroad and therefore targets that individual's e-mail
    address under its Section 702 authority) raises novel
    constitutional questions. We do not reach those
    reducing the need for redaction. That meeting was transcribed for the record,
    and the transcript (which is itself classified) will be preserved as part of the
    record of this appeal in the custody of a Classified Information Security Officer
    with the Department of Justice's Litigation Security Group. The meeting was
    extremely productive, and has resulted in a modest number of changes of
    wording that do not affect the substance of the opinion, and a significant
    reduction in the amount of redacted material. It is of course regrettable that any
    part of an opinion disposing of a criminal appeal is unavailable for public
    inspection. However, we have neither the authority, nor the expertise, nor the
    inclination to overrule classification decisions made by the relevant executive
    branch agencies. We respect the need for such classification of sensitive national
    security information, and appreciate the cooperation of the agencies in the effort
    to limit the need for modifications and redactions.
    6
    questions today because we are satisfied that, to the
    extent such accidental collection occurred in this case,
    any information thus acquired did not taint the
    investigation or prosecution of Hasbajrami.
    Third, querying databases of stored information derived
    from Section 702-acquired surveillance also raises novel
    and difficult questions. Querying, depending on the
    particulars of a given case (such as what databases are
    queried, for what purpose1 and under what
    circumstances), could violate the Fourth Amendment,
    and thus require the suppression of evidence; therefore,
    a district court must ensure that any such querying was
    reasonable. But no information about any queries
    conducted as to Hasbajrami was provided to the district
    court, and the information provided to us on this
    subject is too sparse to reach a conclusion as to the
    reasonableness of any such queries conducted as to
    Hasbajrami.
    Given these conclusions, further proceedings are necessary to determine (a) what
    (if any) evidence relevant to Hasbajrami was obtained by the government by
    querying databases, (b) whether any such querying violated the Fourth
    Amendment and, if so, (c) whether any such violation tainted other lawfully­
    collected evidence. We therefore REMAND the case to the district court for
    further proceedings consistent with this opinion.
    BACKGROUND
    This appeal concerns the legal status of evidence of Hasbajrami's electronic
    communications with individuals located abroad, which was collected by the
    7
    government without a warrant pursuant to the government's authority under
    Section 702. The background to this appeal may be easily summarized:
    Hasbajrami sought to suppress evidence the government acquired under Section
    702, arguing that the government had violated his Fourth Amendment rights
    when it seized his communications without a warrant, and that those
    communications, and any information that the government later collected as the
    fruit of that initial warrantless surveillance, should therefore be suppressed. The
    district court declined to suppress the evidence, and Hasbajrami pleaded guilty
    while reserving his right to appeal the district court's decision.
    But our disposition of the case turns in part on the particulars of how
    Section 702-acquired surveillance was used in Hasbajrami's prosecution; a fuller
    accounting of the facts of Hasbajrami's case and the nature of Section 702
    surveillance is therefore necessary. First, we begin by describing Hasbajrami's
    arrest and the initial proceedings in which he pleaded guilty, the subsequent
    disclosure of Section 702 surveillance, Hasbajrami's withdrawal of his guilty
    plea, and his subsequent motion to suppress. Second, we describe in broad terms
    the operation of Section 702 surveillance. Third, we turn to the district court's
    discussion of the use of Section 702 evidence (that it was aware of) in this case,
    8
    and its denial of the suppression motion. Finally, we describe the proceedings at
    the district court following its denial of the suppression motion, and the
    proceedings on appeal.
    I.    Allegations and Initial Proceedings
    The conduct underlying Hasbajrami's prosecution occurred primarily
    between April and August, 2011. During that time, Hasbajrami communicated
    by e-mail with "Individual #1," a non-American located abroad, who Hasbajrami
    believed was associated with a terrorist organization, In those e-mails,
    Hasbajrami discussed his interest in the group's terrorist operations, and
    Individual #1 instructed Hasbajrami how he could smuggle himself into Pakistan
    to join the organization. Individual #1 also detailed means by which Hasbajrami
    could send money to him and how Hasbajrami could contact him once he
    reached Pakistan. In discussing his plans to join Individual #1 in Pakistan,
    Hasbajrami also described his arrangements for traveling to Turkey, and his
    concern that his projected route from there to Pakistan might have been
    compromised.
    Following an investigation by the agents of the Federal Bureau of
    Investigation's Joint Terrorism Task Force, Hasbajrami was arrested as he was
    9
    about to board a flight to Istanbut Turkey. His luggage contained a tent, boots,
    and cold-weather gear. Upon arrest, Hasbajrami made certain inculpatory
    statements.
    A.      Initial Proceedings
    Hasbajrami was indicted on September 8, 20lt and charged with one
    count of providing material support to terrorist organizations. At the same time,
    and as required by statute, the government gave notice that it "intend[ed] to
    offer into evidence, or otherwise use or disclose in any proceedings ...
    information obtained or derived from electronic surveillance and physical
    searches conducted pursuant to [FISAJ. 11 See Notice of Intent to Use Foreign
    Intelligence Surveillance Act Information, United States v. Hasbajrami, l:ll-cr-623
    (E.D.N.Y. filed Sept. 13, 2011), ECF No. 9.
    In discovery, Hasbajrarni was provided with evidence of his
    communications obtained pursuant to traditional FISA warrants,2 and he
    2As detailed below, this opinion will use "traditional FISA" to describe FISA
    surveillance that was authorized by statute prior to the enactment of Section 702.
    The FISA Amendments Act will be referred to as the "FAA," of which Section
    702 is one part.
    10
    eventually pleaded guilty on April 12, 2012, to one count of providing material
    sup port to terrorists. He was sentenced to 180 months' imprisonment.
    B.    Disclosure of Section 702 Surveillance, Withdrawal of Plea, and
    Motion to Suppress
    After Hasbajrami's initial plea and sentencing, and while Hasbajrami was
    serving his sentence, the government disclosed that it had coUected Hasbajrami' s
    communications under Section 702 of the FAA. 3 In a letter sent to Hasbajrami in
    February 2014, the government stated that "based on a recent determination," it
    had concluded that the information obtained from FISA surveillance that the
    government had already disclosed "was itself also derived from other collection
    pursuant to Title VII of FISA [i.e., Section 702] as to which you were aggrieved."
    App'x at 31. The government stated that "certain evidence and information ...
    that the government intended to offer into evidence or otherwise use or disclose
    3The government's provision of notice in this case was likely in response the
    Solicitor General's assertion, at oral argument before the Supreme Court in
    Clapper v. Amnesty International USA, 
    568 U.S. 398
    (2013), that prosecutors would
    provide notice to defendants in cases where evidence was derived from Section
    702 surveillance. See Charlie Savage, Door May Open Challenge to Secret Wiretaps,
    N.Y.Times (Oct. 17, 2013), at A3. While the government's policy prior to Clapper
    was not to provide notice of Section 702 surveillance, it began reviewing cases
    and providing supplemental notice in 2013. 
    Id. 11 in
    proceedings in this case was derived from acquisition of foreign intelligence
    information conducted pursuant to the FAA." 
    Id. In response
    to that disclosure, Hasbajrami sought leave to withdraw his
    plea. The district court granted that motion, finding that Hasbajrami had
    "specifically asked [his counsel] about whether warrantless wiretaps had played
    a role in his case. After [counsel] informed him that such wiretaps were not part
    of the evidence, he was more willing to plead guilty. Thus, Hasbajrami seems to
    have been misled about a fact he considered important in deciding how to
    plead." App'x at 39. Furthermore, the government's misleading notice, according
    to the district court, prevented Hasbajrami from kno wing that he could challenge
    the evidence against him on the grounds that Section 702 was unconstitutional.
    The court concluded that, prior to the letter disclosing Section 702 surveillance,
    Hasbajrami "was not sufficiently informed about the facts" to have ''made an
    intelligent decision about whether to plead guilty[.] When the government
    provided FISA notice without FAA notice, Hasbajrami was misled about an
    important aspect of his case." App'x at 38. Accordingly, the court allowed him to
    withdraw the plea and reopened the case.
    12
    Hasbajrami then moved to suppress "the fruits of all warrantless FAA
    surveillance," the motion that is at issue in this appeal. See Omnibus Motions at
    8-9, United States v. Hasbajrami, 1:ll-cr-623 (E.D.N.Y. filed Nov. 26, 2014), ECF
    No. 92 ("Suppression Motion"). He described what he sought to suppress, "the
    fruits of all warrantless FAA surveillance," as including:
    •     all evidence and information derived as a result of Title
    VII warrantless FAA surveillance;
    •     all evidence and information "obtained or derived from
    Title I and Title III PISA collection ... [that was] itself
    also derived from other collection pursuant to Title VII"
    of the FAA;
    •     Hasbajrami's custodial statements; and
    •     Any other evidence and information that the
    Government could not have obtained in this case
    through an independent source.
    
    Id. To properly
    understand the scope of Hasbajrami's motion, however, it is
    necessary to describe the statutory framework underpinning Section 702
    surveillance and the way in which the program operates in practice.
    13
    II.   Section 702 Surveillance 4
    In order to ensure national security, the United States maintains several
    programs aimed at the surveillance of those who pose threats to its safety. These
    programs each draw on a wide vari�ty of authority, including executive orders,
    statutory provisions, and agency procedures and guidance. See generally Diana
    Lee, Paulina Perlin & Joe Schottenfeld, Gathering Intelligence: Drifting Meaning and
    4 The purpose of this section is to provide the general background necessary to
    understand the parties' arguments and it is not intended to provide a
    comprehensive description of the way in which each agency implements Section
    702 surveillance. Additionally, as detailed below, each agency must seek
    approval of its Section 702 procedures each year, including changes in operation.
    Our intention is thus only to describe the program in broad terms. We note,
    moreover, that many Section 702 procedures remain highly classified, including
    the specific procedures under which the collection of Hasbajrami' s
    communications would likely have taken place. Our discussion here is drawn
    from declassified public sources and in large part from the report on Section 702
    surveillance produced by the Privacy and Civil Liberties Oversight Board. See
    Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program
    Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act
    (fuly 2, 2014), https://www.pclob.gov/library/702-Report.pdf ("PCLOB Report").
    The PCLOB is an independent agency within the executive branch, authorized
    by statute., inter alia, to "analyze and review actions the executive branch takes"
    and "ensure that liberty concerns are appropriately considered" in the
    government's development and implementation of anti-terrorism programs. See
    42 U.S.C. § 2000ee(c). The PCLOB is composed of five members, appointed by the
    President and confirmed by the Senate. 
    Id. § 2000ee(h).
           Accordingly, we discuss the program, and changes in its operation over
    time, only to the extent that the details are (a) relevant and (b) public.
    14
    the Modern Surveillance Apparatus, 10 J. of Nat'l Sec. L. & Pol'y 77 (2019)
    (describing several separate authorities for surveillance, including FISA and
    Section 702, each with separate operating standards). Hasbajrarni's appeal
    specifically implicates the government's statutory authority under FISA, first
    enacted in 1978, and more specifically the amendments to FISA, including
    Section 702, enacted in 2008. 5
    FISA was first enacted in response to revelations about the government's
    electronic surveillance of the domestic communications of United States citizens.
    See David S. Kris & J. Douglas Wilson, National Security Investigations and
    Prosecutions§ 3:7 ("Kris & Wilson"). "Traditional FISA" surveillance, as
    surveillance under the FISA has come to be known following the enactment of
    the FAA in 2008, governed surveillance inside the United States, in the context
    only of national security investigations rather than domestic criminal
    prosecutions. See 
    id. § 4:2.
    For those national security investigations, FISA
    established procedures governing the collection of information derived from
    5While Section 702 was first enacted in 2008, the fact that any e-mails tied to
    Americans were sometimes collected under its authority was not made public
    until June 2013, when "two classified [National Security Agency ("NSA")J
    collection programs were first reported by the press based on unauthorized
    disclosures of classified documents by Edward Snowden, a contractor for the
    NSA." PCLOB Report at 1.
    15
    electronic surveillance, physical searches, ''pen/trap" surveillance1 and tangible­
    things production orders, and the use of information so obtained. See 
    id. § 4:5.
    In order to initiate traditional FISA surveillance, the government must
    submit an application to a court demonstrating that there is "probable cause to
    believe that 'the target of the electronic surveillance is a foreign power or agent
    of a foreign power,' a nd that each of the specific 'facilities or places at which the
    electronic surveillance is directed is being used, or is about to be used, by a
    foreign power or an agent of a foreign power."' See 
    Clapper, 568 U.S. at 403
    (quoting FISA § 105(a)(3)). FISA applications are reviewed by two specialized
    courts: the Foreign Intelligence Surveillance Court ( 11FISC") and the Foreign
    Intelligence Surveillance Court of Review ("FISCR"),. both composed of Article
    III federal judges assigned to their role by the Chief Justice of the United States.
    See id.; Kris & Wilson § 5:1 (describing jurisdiction of FISC and FISCR).
    Applications are submitted under oath by a federal officer and must describe,
    among other things, whom the government wishes to search or surveil, the place
    or things to be searched or surveilled, the sort of information the government
    expects to gather, and the existence and nature of any prior FISA applications
    targeting the individual. See generally Kris & Wilson§ 6:2.
    16
    Traditional FISA had some limitations, however. Because each application
    required a court order, which in turn required probable cause, the government
    believed th.at, after September 11, 2001, [FISA's] requirements unduly restrict[ed
    11
    the] speed and agility" with which the government could detect and respond to
    terrorist threats. See 
    id. § 16:2
    (internal quotation marks omitted). Additionally,
    the advent of e-mail "clearly expanded traditional FISA's reach." Id.§ 16:6.
    Communications, such as phone calls, between two individuals without ties to
    the United States and located abroad were outside the purview of FISA, and any
    collection of such communications that occurred would not be constrained by its
    procedures. 
    Id. But as
    such communication increasingly came to be conducted by
    e-mail, many of those e-mails would ultimately be stored on servers within the
    United States, and thus "the government could not conduct warrantless
    survei llance in the U.S. of stored e-mail messages exchanged between two parties
    located abroad'' without following the procedures laid out in FISA. 
    Id. First enacted
    in 2008, Section 702 was intended to address some of FISA's
    perceived limitations. 6 Section 702 allows the Attorney General (" AG") and
    6President George W. Bush initially authorized the NSA "to conduct warrantless
    wiretapping of telephone and e-mail communications where one party to the
    communication was located outside the United States" and one party was
    believed to be a member of a terrorist organization. See 
    Clapper., 568 U.S. at 403
    .
    17
    Director of National Intelligence ("DNI") to "authorize jointly ... the targeting of
    persons reasonably believed to be located outside the United States to acquire
    foreign intelligence information.'' 50 U.S.C. § 1881a(a). 7 That targeting is
    primarily executed by compelling electronic service providers, including internet
    service providers and companies that maintain the communications
    infrastructure, to "immediately provide the Government with all information,
    facilities, or assistance necessary to accomplish the acquisition [of
    communications of an individual or his or her account] in a manner that will
    protect the secrecy of the acquisition and produce a minimum of interference
    with the services that such electronic communication service provider is
    providing to the target of the acquisition." 50 U.S.C. § 1881a(i)(l)(A).
    Following public revelations of the program, Congress passed the Protect
    America Act ("PAA"), Pub. L. No. 110•55, 121 Stat. 552 (2007), which far a limited
    period of time allowed the government to use surveillance procedures similar to
    those contained in the FAA. See In re Directives, 
    551 F.3d 1004
    , 1006-07 (FISA Ct.
    Rev. 2008). The PAA expired on February 16, 2008. See 
    id. at 10
    0 6 n.1.
    7 Like other sections of the FISA, Section 702's definition of "United States
    person" includes lawful permanent residents (such as Hasbajrami). See 50 U.S.C.
    § 1801(i) (defining "United States person u to be a "citizen of the United States, an
    alien lawfully admitted for permanent residence" or certain unincorporated
    associations or corporations with ties to the United States).
    18
    Section 702 differs from traditional FISA procedures in several key
    respects. First, Section 702 does not require a probable cause determination
    before undertaking surveillance. 
    Clapper, 568 U.S. at 404
    . Second, Section 702
    "does not require the Government to specify [in a FlSA application] the nature
    and location of each of the particular facilities or places at which the electronic
    surveillance will occur." 
    Id. Instead, as
    detailed below, the FISC approves Section
    702 procedures in advance, targeting non-United States persons located abroad
    as a category, and the government does not have to return to the FISC to seek
    approval before it undertakes surveillance of any specific individual or his or her
    accounts under those Section 702 procedures. See Kris & Wilson§ 17:17.
    In short, under the FAA and Section 702 the government may compel
    service providers located in the United States to provide e-mails or other
    electronic communications to, from, or about individuals the government
    believes are (a) not United States persons and (b) located abroad. 8 Both under the
    8 The FAA also contains two sections, Sections 703 and 704, that address the
    direct targeting of individual United States persons outside the United States for
    electronic surveillance. See Laura K. Donohue, Section 702 and the Collection of
    International Telephone and Internet Content, 38 Harv. J.L. & Pub. Pol'y 117, 142-44
    (2015). The procedures followed "generally reflect the structure employed by
    traditional FISA with regard to electronic surveillance and physical search.'' 
    Id. at 143.
    These sections are codified at 50 U.S.C. §§ 1881h and 1881c, and are not at
    issue in this appeal.
    19
    stahltory scheme and in practice, Section 702 surveillance unfolds in several
    different steps, each with different implications for this Court's review. The first
    step is what the statute and intelligence community refers to as "targeting,"
    followed by collection, "minimization," retention and storage, and, finally,
    dissemination and querying. 9 We will discuss each step in turn.
    A.    "Targeting"
    Targeting generally refers to the decision to surveil an individual or his or
    her channels of electronic communications, such as an e-mail address. The
    government may not "intentionally target" for Section 702 surveillance anyone
    located in the United States or a "United States person" outside the United
    States. 50 U.S.C. §§ 1881a(b)(1), (3). Nor may it target a non-United States person
    "if the purpose of such acquisition is to target a particular, known person
    reasonably believed to be in the United States.n 50 U.S.C. § 188la(b)(2).
    9 Some of these terms, such as collection, are terms of art, but their use is not
    necessarily uniform across the various government agencies or for different
    forms of surveillance. See, e.g., Lee, Perlin & Schottenfeld, Gathering Intelligence at
    95 (highlighting "definitional variances" for terms like collection, acquisition,
    and targeting across the various surveillance programs). For the purposes of
    providing background to Hasbajrami's case, we define the terms primarily as
    each is used by the PCLOB.
    20
    The precise mechanisms each agency must follow to target
    communications are not specified by the statute. Instead, Section 702 requires the
    AG and the DNI to adopt targeting procedures each year that will govern how
    the program functions at each agency tasked with Section 702 surveillance. See 50
    U.S.C. §§ 1881a(a), (d). While labelled targeting procedures, the procedures are
    just as much about who is not to be targeted under Section 702 (that is, how to
    prevent acquisition of the communications of those in the United States or who
    are United States persons) as about setting out who is to be targeted. In this
    opinion, our concern with "targeting' is with the procedures designed to protect
    the constitutional privacy rights of Americans and comply with the Fourth
    Amendment inside the United States, and not with the obviously confidential
    procedures and criteria by which United States intelligence agencies decide
    which non-United States persons located abroad are appropriate objects of
    surveillance.
    The targeting procedures are supposed to ensure that any authorized
    acquisition is "limited to targeting persons reasonably believed to be located
    outside the United States" and to "prevent the intentional acquisition of any
    communication as to which the sender and all intended recipients are known at
    21
    the time of the acquisition to be located in the United States.n 50 U.S.C.
    § 1881a(d)(l). Targeting procedures are also subject to the limitations related to
    targeting United States persons outlined above. SO U.S.C. § 1881a(b). The NSA
    and the FBI each develop targeting procedures tailored to the agency's particular
    mission and purpose in using Section 702-acquired information. PCLOB Report
    at 41-43, 47.
    Once the required procedures have been formulated, the DNI and AG
    must seek approval of their proposed targeting procedures from the FISC. 50
    U.S.C. § 1881a(d)(2). The FISC reviews the proposed standards for compliance
    with both statutory and constitutional requirements. See, e.g., In re Proceedings
    Required by 702(i) of FISA Amendments Act of 2008, No. MISC 08-01, 
    2008 WL 9487946
    , at •s (FISA Ct. Aug 27, 2008); Redacted, 
    2011 WL 10945618
    at •1 (FISA Ct.
    Oct. 3, 2011) ("Bates Decision"). In contrast to traditional domestic search
    warrants and FISA warrants, which authorize searches or seizures of specific
    persons, places, or things based on individualized probable cause, judicial
    review of Section 702 functions as a form of programmatic pre-clearance. "[T}he
    Court is required to consider whether the targeting ... procedures adopted by
    the Government meet the requirements of the statute and ... are consistent with
    22
    the Fourth Amendment. The Court is not required, in the course of this Section
    702(i} review, to reach beyond the Government's procedures and conduct a facial
    review of the constitutionality of the statute." In re Proceedings, 
    2008 WL 9487946
    ,
    at ,.5; see also PCLOB at 26·31 (describing judicial review proceedings under
    Section 702).
    Once its procedures are approved by the FISC, an agency can begin
    surveilling individuals it seeks to target. The NSA ''initiates all Section 702
    targeting, and thus makes all initial decisions pursuant to its targeting
    procedures.'' PCLOB Report at 42. According to the PCLOB, the CIA and the FBI
    can "'nominate' targets to the NSA for Section 702 targeting" but the NSA is
    required to ·"make the determination whether to initiate targeting." 
    Id. Section 702
    surveillance usually begins when an agency "tasks" a specific
    "selector" or "facility," usually an e•mail address or telephone number. See 
    id. at 32.
    Much information about the targeting standards used by the NSA remains
    classified, but generally "[i}f they are to fulfill their purposes ... [the targeting
    procedures submitted to the FISC for approval] should contain a description of
    factors that in isolation or combination justify a reasonable belief that the target is
    abroad.'' Kris & Wilson § 17:7. According to one commentator, the NSA "has
    23
    created a presumption of non-U.S. person status/' assuming "that the individual
    is a non-U.S. person" if the agency does not know its target is a United States
    person. See Donohue, Section 702 at 158.
    B.     Collection
    Once an account or facility such as an e-mail address has been targeted, the
    intelligence agencies may then begin to collect information related to that
    particular address. Such information includes e-mails to and from a given
    account, or information "about" a given account.
    1.    PRISM and Upstream Collection
    The NSA operates two separate types of collection programs which collect
    different types of information. These two programs have come to be labelled
    PRISM collection and upstream collection.
    Under PRISM, the FBI (on behalf of the NSA) sends "selectors" (for
    instance, an e-mail address) to internet service providers ("ISPs"), based in the
    United States. The ISPs are then required to provide communications sent to or
    from that selector to the NSA. See PCLOB Report at 33-34. PRISM, therefore,
    collects only the e-mails a given user sends from his or her account, and the e­
    mails he or she receives from others through that account. 
    Id. at 34.
    Collection
    24
    and review of such material happens roughly in real time, or close to real time. In
    other words, �he collected e-mails are not simply swept into a database for use at
    some unspecified future time when the database is queried, but are monitored
    and analyzed at or near the time of their collection. In that regard, the
    interception and review of electronic communications under PRISM resembles a
    traditional domestic law enforcement wiretap.
    Upstream collection is broader. Instead of compelling information from an
    ISP, the NSA instead compels information from "the providers that control the
    telecommunications backbone over which communications transit." PCLOB
    Report at 35. Upstream fills a gap in PRISM surveillance. 
    Id. If, for
    instance, an
    individual that the NSA sought to target maintained his or her e-mail account
    with a foreign internet service provider, that e-mail address would be out of
    reach of the PRISM program. In that situation, the NSA could use upstream
    collection to collect traffic to that account as it traversed the backbone. 
    Id. Upstream collection
    is broader than PRISM, in that it captures not only
    conversations to and from a given e-mail address, but also communications
    "about" that address (i.e., a conversation between two parties not themselves
    targeted that happens to mention whatever the tasked term is). See 
    id. at 37-38.
    25
    One key difference between PRISM and upstream collection is that PRISM
    collects individual communications, while upstream collects whole 1'multi­
    communication transactions," or "MCTs." 
    Id. at 39.
    "An Internet transaction
    refers to any set of data that travels across the Internet together such that it may
    be understood by a device on the Internet." 
    Id. Thus, a
    transaction might contain
    a single discrete com munication (e.g., a single e-mail), or it could contain
    "multiple discrete communications," and "[i]f a single discrete communication
    within an MCT is to, from, or about a Section 702-tasked selector, and at least one
    end of the transaction is foreign, the NSA will acquire the entire MCT" under
    upstream collection. 
    Id. The result
    is a "greater likelihood" that upstream
    collection will "result in the acquisition of wholly domestic communications and
    extraneous U.S. person information." 
    Id. at 41.
    The NSA is the only agency that
    receives upstream collection; the CIA and FBI are not provided with information
    obtained in this manner and do not store it in their databases. 
    Id. at 54.
    2.     Incidental and Inadvertent Collection
    As detailed above, the statute primarily authorizes agencies like the NSA
    to collect the e-mails of "non-United States persons" located abroad. But even if
    the government scrupulously follows the procedures intended to restrict
    26
    collection of communications to and from persons with ties to the United States,
    the agencies might still end up collecting information about United States
    persons or those located in the United States, or communications sent to or from
    a United States person or an individual located in the United States.
    Collection may sweep up those individuals' e-mails in two ways,
    conventionally referred to as "incidental collection" and "inadvertent collection."
    First, collection might be "incidental." PCLOB Report at 114. Incidental collection
    occurs when a non-targeted individual (a United States person or someone in the
    United States) communicates with a targeted non-United States person located
    abroad. Such collection would occur under PRISM, for instance, if the NSA has
    targeted the e-mail address of a non-United States person in another country,
    and a United States person e-mails that targeted individual. An ISP would be
    required to provide the NSA with any such e-mails as part of its compliance with
    a Section 702 directive targeting the non-United States party to the
    communication.
    Second, collection might be "inadvertent." 
    Id. at 116.
    Inadvertent collection
    occurs when the NSA reasonably believes that it is targeting a non-United States
    person located abroad, or does not have enough information to determine
    27
    whether an individual e-mail address or other communications facility is being
    used by a United States person or accessed from within the United States, and
    therefore presumes that the account is controlled by a foreigner outside the
    United States. The collection is characterized as "inadvertent" when the agency
    learns that the person controlling the account is a United States person after it
    has already acquired some of the person's communications. In essence,
    inadvertent collection occurs when the NSA targets United States persons or
    individuals located within the United States in error: the agency thought it was
    targeting a foreign individual abroad, but the targeted person was in fact a
    United States person or an individual located in the United States.
    C.    "Minimization"
    In general terms, minimization describes the manner in which the
    government processes communications after they have been collected and seeks
    to provide safeguards against the misuse of Section 702 information. See PCLOB
    Report at SO. The 2011 Minimization Procedures, which have been declassified,
    apply "to the acquisition, retention, use, and dissemination of non-publicly
    available information concerning unconsenting United States persons that is
    acquired by targeting non-United States persons reasonably believed to be
    28
    located outside the United States." Se,e Minimization Procedures Used by the
    National Security Agency in Connection with Acquisitions of Foreign Intelligence
    Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act of
    1978, As Amended§ 1, National Security Agency (Oct. 31, 2011),
    https://www.dni.gov/files/documents/
    Minimization%20Procedures%20Used %20By%20NSA%20In%20Connection%20
    With%20FISA%20Section%20702.pdf ("NSA 2011 Minimization Procedures").10
    As with their targeting procedures, the NSA, FBI, and CIA must seek
    yearly approval of their minimization procedures from the FISC. 50 U.S.C.
    § 1881a(e)(2). Section 702 requires that each agency also adopt procedures that
    prohibit the disclosure of information about United States persons in a manner
    that identifies them, unless that identity is necessary to understand the
    intelligence information. See 50 U.S.C.§ 1881a(e)(1) (cross-referencing 50 U.S.C.
    §§ 1821(4) and 1801(h)); see also Kris & Wilson§ 9:1. By statute, the procedures
    must ensure ''that nonpublicly available information, which is not foreign
    intelligence information ... shall not be disseminated in a manner that identifies
    These minimization procedures were submitted to the FISC for approval after
    10
    Hasbajrami' s arrest, and therefore did not govern the operation of Section 702
    during the time period relevant here.
    29
    any United States person, without such person's consent, unless such person's
    identity is necessary to understand foreign intelligence information or assess its
    importance." 50 U.S.C. § 1801(h)(2).
    Minimization procedures seek to "balance the government's need to
    acquire, retain, and disseminate forei gn intelligence information, against the
    countervailing privacy interests of U.S. persons." Kris & Wilson§ 9:1; PCLOB
    Report at 50 ("Minimization procedures are best understood as a set of controls
    on data to balance privacy and national security interests."). The meaning of the
    term as used in the FISA context is subtly different from what it means in the
    more familiar context of court-authorized domestic electronic surveillance by law
    enforcement agencies under traditional domestic wiretaps. In the latter context,
    minimization procedures generally involve stopping the monitoring of
    communications that can be determined in real time to be non-evidentiary. In the
    context of Section 702 surveillance, the information subject to minimization has
    already been collected. After review, it is either retained or destroyed;
    information is "minimized'' by non-retention. NSA analysts are instructed to
    "exercise reasonable judgment in determining whether information acquired
    must be minimized and will destroy inadvertently acquired communications of
    30
    or concerning a United States person at the earliest practicable point in the
    processing cycle at which such communication can be identified either: as clearly
    not relevant to the authorized purpose of the acquisition (e.g., the
    communication does not contain foreign intelligence information); or, as not
    containing evidence of a crime which may be disseminated under these
    procedures." 11 NSA 2011 Minimization Procedure§ 3(b)(l).
    After an NSA analyst reviews an individual e-mail communication, he or
    she will decide if the information warrants retention in the NSA's databases
    and/or dissemination to other agencies. The analyst will determine if "it is a
    domestic or foreign communication to, from, or about a target and is reasonably
    believed to contain foreign intelligence information or evidence of a crime." 
    Id. § 3(b)(4).
    Communications fitting this description will thus.be retained and
    processed; information not involving foreign intelligence information or
    evidence of a crime will be destroyed unless it meets one of several exceptions,
    11 It is not clear whether the minimization procedures' use of "inadvertent" here
    is intended broadly to invoke the word's p1ain meaning, or is used as a term of
    art to apply the provision only to communications acquired as a result of
    "inadvertent collection," as defined above, where a United States person has
    been erroneously targeted.
    31
    such as when "the communication contains information pertaining to a threat of
    serious harm to life or property." 
    Id. § 5(4).
    When an e-mail or other communication is processed and retained, the
    information will be scanned and stored. Information that "do[es] not meet the
    retention standards ... and ... [is] known to contain communications of or
    concerning United States persons" will be "destroyed upon recognition." 
    Id. § 3(c)(l).
    If a target moves to the United States, or if the NSA uncovers
    information that the target is a United States person, "acquisition from that
    person will be terminated without delay." Id.§ 3(d)(l).
    "[D]omestic communications" - all communications that do not have "at
    least one communicant outside the United States," id.§ 2(e), "will be promptly
    destroyed," except under certain conditions. Id.§ 5. Such conditions include if a
    communication is "reasonably believed to contain significant foreign intelligence
    information,'' which may be provided to the FBI (which in tum may disseminate
    information "in accordance with its minimization procedures"). 
    Id. § 5(1).
    Information that is "reasonably believed to contain evidence of a crime that has
    been, is being, or is about to be committed 11 may be "disseminated (including
    32
    United States person identities) to appropriate Federal law enforcement
    agencies." 
    Id. § 5(2).
    D.     Retention and Dissemination
    As addressed above, the minimization procedures also govern the ultimate
    retention of surveillance materials and the "reporting of acquired information
    outside of [the] intelligence agency" that collects the information. PCLOB Report
    at 64. The minimization procedures treat retention and dissemination in similar
    ways: the NSA, for instance, may retain communications "in generally the same
    situations where the NSA is permitted to disseminate ... these communications"
    to other agencies. 
    Id. at 62.
    1be retention and dissemination of information gathered under the FAA is
    also governed by the same restrictions that apply to traditional FISA. 
    Id. at 64.
    Additional protections generally apply if the NSA, for instance, seeks to
    disseminate Section 702 information con taining the identity of a United States
    person. The NSA will then "mask" the identity, deleting any identifying
    information unless certain exceptions apply. These exceptions include when "the
    U.S. person's identity is necessary to understand foreign intelligence
    33
    information, or the communication contains evidence of a crime and is being
    disseminated to law enforcement authorities." 
    Id. at 65.
    Agencies relying on NSA reporting may request that the identity of a
    United States person be unmasked. 
    Id. The NSA
    may provide that information if
    at least one additional criterion is met, including when "the identity of the
    United States person is necessary to understand foreign intelligence information"
    or the information "indicates that the United States person" is an "agent of a
    foreign power" or the "target of intelligence activities of a foreign power." NSA
    2011 Minimization Procedure § 6(b). Agencies may also request that information
    about a given e-mail address or facility be forwarded on a regular basis.
    E.    Storage and Querying
    Once communications are collected and retained or disseminated, each
    agency may establish databases to store those communications in its possession,
    and may query those stored communications to identify information of interest
    in connection with a particular investigation or agency function.
    The NSA, CIA, and FBI each maintain separate databases containing
    Section 702 information on which the agencies rely for their own purposes.
    PCLOB Report at 55-56. According to the PCLOB,. the NSA, for instance, 11 often
    34
    stores data acquired from multiple legal authorities in a single data repository.''
    PCLOB at 55. The agency then "tags" the sources for each piece of information,
    and "has systems that prevent an analyst from accessing or querying data
    acquired under a legal authority for which the analyst does not have the requisite
    training." 12 
    Id. at 55-56.
    The CIA limits access to databases that contain Section
    702-acquired information to only those agents who have had the requisite
    training. 
    Id. at 55.
    And the FBI "stores electronic data obtained from traditional
    FISA electronic surveillance and physical searches ... in the same repositories as
    the FBI stores Section 702-acquired data." 
    Id. at 59.
    An agent without requisite
    training would see whether a piece of Section 702-acquired information was
    responsive to her query, but she would not be able to view the actual underlying
    material without clearance. 
    Id. 1 'Data
    is frequently reviewed through queries, which identify
    communications that have particular characteristics specified in the query, such
    as containing a particular name or having been sent to or from a partic ular e-mail
    address." 
    Id. at 127.
    Colloquially, the parties (and those engaged in policy
    12Each agency with access to Section 702 data provides training to personnel
    regarding the proper use of Section 702 material, as well as the agency's
    minimization procedures. See PCLOB Report at 53-54. The exact training
    procedures and who is trained may vary by agency.
    35
    debates about the program) have referred to this querying capability as
    "backdoor searches."
    Originally, the minimization procedures precluded analysts from
    searching terms associated with United States persons. See Classified
    Supplemental App'x at 121-22
    In
    April 2011, the government sought approval for new minimization procedures
    that allowed the querying of terms related to United States persons. See Bates
    Decision, 
    2011 WL 10945618
    at '7-8. The FISC ultimately approved the new
    procedures in October 2011 (i.e., after Hasbajrami's arrest) because they were
    "designed to yield foreign intelligence information.'' 
    Id. at •7_
    Querying, the court
    stated, "should not be problematic in a collection that is focused on non-United
    States persons located outside the United States and that, in the aggregate, is less
    36
    likely to result in the acquisition of nonpublic information regarding non­
    consenting United States persons." 
    Id. In a
    June 2014 letter to Senator Wyden, Deirdre Walsh, Director of
    Legislative Affairs for the Office of the Director of National Intelligence, stated
    that each of the three agencies allowed querying. The NSA could query Section
    702-acquired information if it had a "reasonable basis to expect the query will
    return foreign intelligence,'' as could the CIA and the FBI. See Response to
    Question from the 5 June 2014 Hearing, Letter from Deirdre Walsh, Director of
    Legislative Affairs, to Senator Ron Wyden (June 27, 2014) ("Walsh Letter"); see
    also PCLOB Report at 57-58. The FBI is also allowed to query its own databases
    in such a way that these queries are "designed to find and extract evidence of a
    crime." Walsh Letter at 2. The FBI also will query previously acquired
    information from a variety of sources, including Section 702 when it "opens new
    national security investigations." 
    Id. at 3.
    Recently, and after the time pericxl at issue in this case, Congress enacted
    the FISA Amendments Reauthorization Act of 2017, Pub. L. No. 115-118, 132 Stat.
    3 (2018), codified at SO U.S.C. § 1881a. The act amended the FAA to require the
    agencies to develop "querying procedures" alongside their targeting and
    37
    minimization procedures and seek approval of all three sets of procedures yearly
    from the FISC. Congress also amended the FAA to require a court order in most
    cases where the FBI seeks to "access the contents of communications ... that
    were retrieved pursuant to a query made using a United States person query
    term that was not designed to find and extract foreign intelligence information.''
    50 U.S.C. § 1881a{f)(2)(A). Such querying standards were not in place when the
    surveillance at issue here occurred.
    Ill.   The District Court's Denial of Hasbajrami's Suppression Motion
    As noted above, Hasbajrami moved to suppress "the fruits of all
    warrantless FAA surveillance." See Suppression Motion at 8. He also moved for
    discovery of the FISA and Section 702 information relevant to his case.
    After the district court reviewed the relevant materials ex parte and in
    camera, it denied the suppression motion. See United States v, Hasbajrami, 1:11-cr-
    623, 
    2016 WL 1029500
    (E.D.N.Y. Feb. 18, 2016) ("Suppression Decision''). 13 It
    treated the suppression motion as an as-applied challenge to the Section 702
    surveillance used to support the government's initial application to the FISC,
    13As addressed below, the district court announced its decision on February 15,
    2015, in a text order on the docket, issued without an opinion. The redacted
    opinion was issued on the public docket in March 2016.
    38
    primarily addressing the issue of collection. 
    Id. at *7.
    First, after noting the
    ,
    distinction between PRISM and upstream collection, the court concluded that
    "[n]one of the Section 702 communications used in Title I and Title II FISA
    applications targeting the agent of the foreign power were 'about'
    communications" and therefore "the constitutionality of upstream collection
    [was] not at issue" in Hasbajrami's case. 
    Id. at *6-7.
    The district court then turned to PRISM collection. Summarizing
    precedent, the court noted that the Fourth Amendment "does not constrain the
    government from collecting the communications of non-U.S. individuals targeted
    by Section 702 surveillance." 
    Id. at .,.7,
    Although Hasbajrami was a legal
    perm.anent resident located in the United States, the court found that it was
    "non-U.S. persons who were the targets of Section 702 surveillance" and that
    Hasbajrami's e-mails were collected incidentally to the surveillance of
    individuals the court described as "legitimate targets of Section 702
    surveillance." 
    Id. The court
    concluded that the incidental interception of the
    communications of individuals in the United States was constitutional because
    the surveillance was "lawful in the first place - whether it is the domestic
    surveillance of U.S. persons pursuant to a warrant or the warrantless surveillance
    39
    of non-U.S. persons who are abroad - [and therefore] the incidental interception
    of non-targeted U.S. persons' communications with the targeted persons is also
    lawful." 
    Id. at 11-9,
    The court did not address whether any inadvertent collection related to
    Hasbajrami. It also did not address the specifics of any querying as applied to
    Hasbajrami in particular, and there does not appear to have been any fact­
    finding regarding the querying of previously-collected communications with
    identifiers related to Hasbajrami. Instead, the parties had raised querying within
    the context of whether the minimization procedures were reasonable, and the
    government argued that it was permitted to query whatever data it had lawfully
    collected even if it used identifiers it knew were associated with United States
    persons. See Gov't Mem. of Law at 71, United States v. Hasbajrami, 1:ll-c:r-623
    (E.D.N.Y. filed Dec. 23, 2014), ECF No. 97. To the extent that the district court
    considered querying, then, it appeared to adopt the government's position,
    stating in a footnote:
    That the government is able to query information
    obtained under the PRISM program, i.e. lawfully­
    obtained communications that were to or from
    legitimate targets, does not render the minimization
    procedures inadequate, as amici contend .... Here, once
    the government learned that the target was potentially
    40
    an agent of a foreign power, the government sought
    orders from the FISC for electronic surveillance and
    physical searches pursuant to Title I and Title III of
    FISA targeting an agent of a foreign power .... I agree
    with the government that "[i]t would be perverse to
    authorize the unrestricted review of lawfully collected
    information but then [] restrict the targeted review of
    the same information in response to tailored inquiries."
    Gov't Br. at 71-72.
    Suppression Decision, 
    2016 WL 1029500
    at *12 n.20.
    As for Hasbajrami's request to provide discovery to properly-cleared
    defense counsel, the district court concluded that disclosure was unnecessary. 
    Id. at "'14.
    Instead, its review was "relatively straightforward and not complex" and
    the district court was "able to evaluate the legality of the challenged surveillance
    without concluding that due process first warranted disclosure." 
    Id. at *14
    (citing
    United States v. Abu-Jihaad, 
    630 F.3d 102
    , 129 (2d Cir. 2010)).
    IV.   Further Proceedings at the District Court
    The district court denied the motion to suppress in a text order dated
    February 20, 2015. The order stated that "[a]n opinion [would] follow," but that
    the motion would be denied as to "the fruits of the FAA surveillance, including
    the defendant's post-arrest statements." App'x at 16. The court noted that it
    would hold a conference and "inquire of the government whether it intends to
    offer once again the charge bargain that was previously accepted by the
    41
    defendant, and whether it has considered the prospect of allowing the defendant
    to enter such a plea pursuant to Rule ll(a)(2), reserving his right to seek
    appellate review of [the district court's] denial of the motion to suppress
    evidence." 
    Id. The parties
    prepared for trial, but Hasbajrami in due course again pleaded
    guilty, this time to a two-count Superseding Information, which charged him
    with providing and attempting to provide material support to terrorists.
    According to the terms of the agreement, Hasbajrami:
    [A]gree[d] not to file an appeal or otherwise challenge
    ... the conviction or sentence in the event that the Court
    imposes a term of imprisonment of 180 months or
    below, with the sole and limit�d exception that,
    pursuant to Federal Rule of Criminal Procedure
    ll(a)(2), the defendant may appeal the District Court's
    February 20, 2015 denial of his motion to suppress
    evidence that was obtained or derived from
    surveillance conducted pursuant to the FISA
    Amendments Act of 2008, 50 U.S.C. §§ 1881a et seq.
    App'x at 48. Hasbajrami also consented to his removal, after serving his sentence,
    from the United States. The district court sentenced H asbajrami to a term of 180
    months' imprisonment on Count One and 12 months' imprisonment on Count
    Two, each to run consecutively.
    42
    On March 8, 2016 - more than one year after it denied the motion - the
    district court issued a redacted opinion on the public docket explaining its
    reasons for denying suppression. Hasbajrami requested that the full decision be
    released to his cleared defense counsel, so that he might better prepare his
    appeal. The court (Dora L. Irizarry,   C./.)14   held that PISA required redaction and
    that "Defendant's counsel are not entitled to view the Unredacted Opinion
    because releasing it would reveal classified foreign intelligence informatio n and
    circumvent FISA .... " United States v. Hasbajrami, l:11-cr-623, 
    2017 WL 3610595
    at "'3 (E.D.N.Y. April 6, 2017).
    V.    Proceedings on Appeal
    Hasbajrami timely filed two notices of appeal. The first addressed the
    district court's denial of Hasbajrami's motion to suppress; the second addressed
    the district court's decision to deny Hasbajrami' s counsel access to the
    unredacted and unmodified version of the suppression ruling. Both appeals were
    consolidated and argument was heard by this Court on August 27, 2018.
    At oral argument, the government was unable to represent whether or not
    identifiers related to Hasbajrami had been used in querying previously-acquired
    14By this point, the case had been transferred to Chief Judge Irizarry following
    Judge Gleeson's resignation.
    43
    Section 702 surveillance databases. This Court therefore ordered the government
    to "identify(] the record evidence that supports the proposed factual inference
    that it conducted no queries or back.door searches of Section 702 material with
    regard to Hasbajrami before or leading to the FISA court's issuance of Title I and
    Title ID warrants with respect to Hasbajrami." Order, United States v. Hasbajrami,
    Nos. 15-2684, 17-2669 {2d Cir. Sept. 4, 2018), ECF No. 203.
    Both parties filed supplemental briefing, including an additional classified
    brief from the government (which was posted, heavily redacted, on the public
    docket for this appeal).
    DISCUSSION
    Hasbajrami primarily raises an as-applied challenge to the
    constitutionality of warrantless collection and review of his communications
    under Section 702. 15 As the PCLOB notes, judicial review of Section 702
    surveillance presents particular challenges because the program:
    entails many separate decisions to monitor large
    numbers of individuals, resulting in the annual
    collection of hundreds of millions of communications of
    15Hasbajrami also raises an alternative statutory argument, arguing that
    suppression was warranted because he claims the surveillance did not comply
    with the requirements of Section 702 itself. The Court has carefully considered
    the argument, in light of the classified record, and finds it without merit.
    44
    different types, obtained through a variety of methods,
    pursuant to multiple foreign intelligence imperatives,
    and involving four intelligence agencies that each have
    their own rules governing how they may handle and
    use the communications that are acquired.
    PCLOB Report at 86. In other words, review is difficult because we must
    consider those individual "separate decisions" within the context of the program
    as a whole.16
    In this case, it is undisputed that the government possessed ample
    evidence obtained from surveillance authorized by a FISA warrant to convict
    Hasbajrami. The evidence that formed the basis for that warrant however, was
    obtained as a result of warrantless Section 702 surveillance of non-United States
    persons located abroad. Thus, the primary issue, affecting the bulk of the
    evidence against Hasbajrami, is whether the incidental collection of the
    communications of United' States persons, without a warrant, violates the Fourth
    Amendment. We conclude, as did the district court, that such collection is lawful.
    But that is not the only action involving Section 702 surveillance at issue here.
    16When reviewing a district court's denial of a motion to suppress evidence, we
    review the court's legal determinations de novo and its factual findings for clear
    error. United States v. Boles, 
    914 F.3d 95
    , 102 (2d Cir. 2019). The issues on appeal
    are legal, and therefore our review here is de nova.
    45
    We must also address inadvertent collection, storage and querying, as each of
    these issues is raised by the record.
    The record is sufficient to permit us to answer the principal question
    before us: we conclude that the district court correctly held that the incidental
    collection in this case, and the government's use of the information thus
    collected, was lawful. The record also permits us to conclude that, even assuming
    that inadvertent collection of the communications of United States persons may
    in some circumstances violate the Constitution, the effect of any such collection
    in this case was harmless beyond a reasonable doubt. The absence of evidence in
    the record regarding
    , however, prevents us from
    determining the reasonableness of any such querying
    prior to the FISC's probable-cause finding, and from fully understanding how if
    at all the results of such querying affected the subsequent conduct of the
    investigation. As a result, we must remand for further proceedings and fact­
    finding by the district court.
    46
    I.     ..,Incidental" Collection
    The primary type of Section 702 collection we must address here involves
    "incidental" collection. The government was "targeting," within the meaning of
    Section 702, the accounts of individuals located abroad who were reasonably
    believed to be agents of terrorist organizations. In collecting communications
    from those accounts, the government collected e-mails between Hasbajrami and
    In reviewing
    Hasbajrami's suppression motion, the district court focused on this incidental
    collection, ultimately concluding that a warrant was not required and the
    government's actions were reasonable.
    On appeal, Hasbajrami and the amici argue that the Fourth Amendment
    bars the incidental collection of e-mails of individuals, like Hasbajrami, located in
    47
    the United States. First, they argue that surveillance of individuals in the United
    States is per se unreasonable if it is conducted without a warrant. They also focus
    on the specific attributes of warrants - the particularity requirement, the need
    for a neutral judicial forum and a finding of probable cause - and argue that
    Section 702,. the targeting and minimization procedures, and FISC oversight do
    not provide a substitute procedure sufficient to satisfy the Fourth Amendment.
    According to Hasbajrami, the broad scope of Section 702's surveillance and the
    government's failure to seek a warrant or its equivalent render the program
    unconstitutional as applied to him and therefore requires the suppression of
    evidence acquired under the program.
    We disagree. In addressing the issues before us, we adopt an approach
    similar to that employed by the United States Court of Appeals for the Ninth
    Circuit in United States v. Mohamud, 
    843 F.3d 420
    (9th Cir. 2016). We must first
    decide whether a warrant is required for the government's incidental collection
    of the communications of United States persons. We conclude that a warrant is
    not required for such collection. But "[e]ven if a warrant is not required, a search
    is not beyond Fourth Amendment scrutiny; for it must be reasonable in its scope
    and manner of execution." Maryland v. King, 
    569 U.S. 435
    , 448 (2013); see also
    48
    
    Mohamud, 843 F.3d at 441
    . We further conclude that the incidental collection of
    Hasbajrami's e-mails was reasonable.
    A.     No Warrant was Required
    We conclude that a warrant is not required based on two well-established
    principles of Fourth Amendment law. First, the Fourth Amendment does not
    apply extraterritorially to the surveillance of persons abroad, including United
    States citizens. Second, law enforcement officers do not need to seek an additional
    warrant or probable cause determination to continue surveillance when, in the
    course of executing a warrant or engaging in other lawful search activities, they
    come upon evidence of other criminal activity outside the scope of the warrant or
    the rationale justifying the search, or the participation of individuals not the
    subject of that initial warrant or search.
    First, the Fourth Amendment (and, in particular, its warrant requirement)
    does not apply extraterritorially. See United States v. Verdugo-Urquidez, 
    494 U.S. 259
    (1990). In Verdugo-Urquidez, agents from the United States Drug Enforcement
    Agency, working alongside Mexican law enforcement, raided without a warrant
    properties in Mexico owned by the defendant. 
    Id. at 262-63.
    The agents believed
    that the defendant was the leader of a narcotics smuggling ring and they seized
    49
    documents and "a tally sheet" detailing quantities of drugs possessed and
    transported. 
    Id. Prior to
    trial, the defendant sought suppression of the evidence,
    arguing that the agents should have sought a warrant before searching his
    property. 
    Id. at 263-64.
    The Supreme Court held that suppression of the evidence was not
    required, because the Fourth Amendment does not apply to extraterritorial
    actions by law enforcement, at least where the "[the defendant] was a citizen and
    resident of Mexico with no voluntary attachment to the United States, and the
    place searched was located in Mexico." 
    Id. at 274-75.
    "Under these
    circumstances," the Court held, "the Fourth Amendment ha[d] no application."
    
    Id. at 275.
    This Court has since extended Verdugo-Urquidez's holding to conclude that
    the Warrant Oause of the Fourth Amendment does not apply to the surveillance
    of United States citizens abroad. See In re Terrorist Bombings, 
    552 F.3d 157
    , 171 (2d
    Cir. 2008). The defendant in that case, a United States citizen with a home in
    Kenya, had "urged the suppression of the evidence resulting from the ...
    [electronic] surveillance of his Kenyan telephone lines'' because it was not
    authorized by a valid warrant or, alternatively, because the surveillance was
    50
    unreasonable. 
    Id. at 160.
    This Court held that "the Fourth Amendment's Warrant
    Clause has no extraterritorial application and that foreign searches of U.S.
    citizens conducted by U.S. agents are subject only to the Fourth Amendment's
    requirement of reasonableness." 
    Id. at 171.
    \Ve determined that the searches in
    that case were ultimately reasonable and therefore suppression of the evidence
    was not required.
    Verdugo-Urquidez and In re Terrorist Bombin&s make it dear that the Fourth
    Amendment does not requirl:! the government to obtain a warrant before
    collecting the e-mails of foreign individuals abroad. Nor can there be any
    question that the electronic surveillance of foreign individuals located abroad
    who are reasonably believed to hold themselves out as agents and - of
    terrorist organizations targeting the United States is reasonable within the
    meaning of the Fourth Amendment. Efforts to monitor the activities of such
    individuals to detect and forestall possible te rrorist attacks on this country
    present a paradigm case of a compelling government interest. The protections
    extended by the Fourth Amendment to foreign individuals abroad, if any, are
    minimal and plainly outweighed by the paramount national interest in
    preventing foreign attacks on our nation and its people.
    51
    But while the warrantless surveillance of foreign individuals abroad under
    the circumstances that existed here presents no cognizable constitutional
    problem, we must nevertheless still consider what protections the Fourth
    Amendment provides individuals located within the United States who
    communicate with the foreign individuals abroad lawfully targeted under
    Section 702.
    The second Fourth Amendment principle implicated by incidental
    collection speaks directly to that concern. The Fourth Amendment generally is
    not violated when law enforcement officers, having lawfully undertaken
    electronic surveillance, whether under the authority of a warrant or an exception
    to the warrant requirement, discover and seize either evidence of criminal
    activity that they would not have had probable cause to search for in the first
    place, or the relevant conversations of an individual they did not anticipate or
    name in a warrant application. See, e.g., United States v. Donovan, 429 U.S. 413,427
    & n.15 (1977) (noting, as to domestic wiretaps, "[i]t is not a constitutional
    requirement that all those likely to be overheard engaging in incriminating
    conversations be named."); United States v. Figueroa, 757 F.2d 466,472 (2d Cir.
    1985) ("More particularly, the mere fact that Title III allows interception of
    52
    conversations of 'others as yet unknown' do es not render the statute
    unconstitutional on its face as authorizing a general warrant.'').
    This line of cases has come to be known as the "incidental overhear"
    doctrine. See, e.g., Suppression Decision, 
    2016 WL 1029500
    at ""9 (noting that
    "[ c]ourts have long dealt with the issue of incidental interception of non-targeted
    persons' communications" and collecting cases). Courts have repeatedly held
    that law enforcement agents do not need to obtain a separate warrant to collect
    conversations of persons as to whom probable cause did not previously exist
    with individuals whose oral or wire communications are being collected through
    a lawful wiretap or bug, where those conversations on their face contain
    evidence of criminal activity.17 See, e.g., 
    Donovan, 429 U.S. at 427
    & n.15; 
    Figueroa, 757 F.2d at 472
    ; see also In re Certified Question of Law, 
    858 F.3d 605
    (FISA Ct. Rev.
    2016) (finding incidental collection of content information reasonable where
    warrant was obtained only for non-content dialing information); United States v.
    17The "incidental overhear" doctrine is closely related to the "plain view"
    doctrine applied in connection with physical searches. See, e.g., Coolidge v. New
    Hampshire, 
    403 U.S. 443
    , 465-67 (1971) (describing plain view doctrine and noting
    that "[t]he doctrine serves to supplement the prior justification - whether it be
    a warrant ... , hot pursuit, search incident to lawful arrest, or some other
    legitimate reason for being pr esent unconnected with a search directed against
    the accused - and permits the warrantless seizure."}.
    53
    Stewart, 
    590 F.3d 93
    , 129 (2d Cir. 2009) (concluding. in challenge to Title I FISA
    surveillance, that "[b]ecause Stewart's co-conspirators were targeted pursuant to
    proper procedures, the Fourth Amendment did not require that Stewart also be
    identified or described as a target in order for her intercepted conversations to be
    used in a criminal prosecution.'') (internal citation omitted).
    Combining these two Fourth Amendment principles, the government may
    lawfully collect, without a warrant and pursuant to Section 702, the e-mails of
    foreign individuals located abroad who reasonably appear to constitute a
    potential threat to the United States and, once it is lawfully collecting those e-
    mails, it does not need to seek a warrant, supported by probable cause, to
    continue to collect e-mails between that person and other individuals once it is
    learned that some of those individuals are United States citizens or lawful
    permanent residents, or are located in the United States. Accord 
    Mohamud, 843 F.3d at 441
    ; see also United States v. Mohammad, 
    339 F. Supp. 3d 724
    , 748-49 (N.D.
    Ohio 2018) (applying Verdugo-Urquidez and rejecting Fourth Amendment
    challenge to Section 702 surveillance where, despite marriage to United States
    citizen, defendant lived abroad at time of offense); United States v. Muhtorov, 
    187 F. Supp. 3d 1240
    , 1258 (D. Colo. 2015) (rejecting facial and as applied challenge to
    54
    incidental collection under Section 702 and concluding that a warrant was not
    acquired and search as reasonable). That is the case even if the government
    would have needed, but did not have, a warrant or probable cause had it sought
    to collect the e-mails of the American third party in the first instance. Cf. In re
    Certified 
    Question, 858 F.3d at 604
    (framing constitutional issue as whether
    incidental content collection rendered primary dialing information collection
    unreasonable, not whether warrant would have been required for content
    collection in its own right).
    Objecting to this conclusion, Hasbajrami and amici advance several
    arguments seeking to apply the warrant requirement to Hasbajrami's case. Each
    is unavailing.
    First, they argue that Verdugo-Urquidez does not control the outcome here
    because Section 702 collection occurs in the United States. Practically speaking,
    Section 702 surveillance could occur only within the United States, as the agencies
    can compel only ISPs located in the United States to provide e-mails.
    But Fourth Amendment doctrine relating to wire or electronic
    communication does not focus on the location where the communication takes
    place. Katz v. United States, 
    389 U.S. 347
    (1967), the seminal Supreme Court
    55
    decision on the interception of such communication, holds that a person's
    privacy interest in his or her communications does not depend on whether the
    government ph ysically intrudes into a physical space in which that person has a
    property interest or an expectation of physical privacy. What matters, and what
    implicates the protection of the Fourth Amendment, is the expectation of privacy
    in the communications themselves, and therefore a warrant is required to seize
    even those communications made in a public telephone booth. Conversely, by
    the same reasoning, a person who does not have a Fourth Amendment-protected
    privacy interest in his communications, such as a foreign national resident
    abroad, does not acquire such an interest by reason of the physical location of the
    intercepting device. At least where the communication is collected essentially in
    real time as it occurs, the targeted communication, whether conducted over
    telephone wires or via the internet, occurs in the relevant sense where the person
    whose calls or e-mails are being intercepted is located, regardless of the location
    of the means used to intercept it.
    Second, Hasbajrami argues that the surveillance cannot be properly
    considered "incidental" where the government can or even does expect to collect
    conversations with people with ties to the United States or located within its
    56
    borders. While we have concerns, expressed below, about the potential scope of
    Section 702 surveillance, those concerns are less applicable where, as here,
    collection and review are occurring nearly contemporaneously and that
    collection is ancillary to lawful surveillance of a permitted target. In the nahlre of
    law enforcement, there is always a possibility that the collection of evidence
    against a person who there is already probable cause to believe is involved in
    criminal activity or who is otherwise legitimately subject to surveillance will also
    develop information about others not previously reasonably suspected of
    wrongdoing. There is no contention here that the Section 702 surveillance was
    undertaken as a pretext to collect the communications of Hasbajrami, or of any
    other identified United States person or person located in the United States. That
    the overall practice of surveilling foreigners abroad of interest to the legitimate
    purpose of gathering foreign intelligence information may predictably lead to the
    interception of communications with United States persons no more invalidates
    that practice, or requires the government to cease its surveillance of the target
    until a warrant is obtained, than the general foreseeability of intercepting
    communications with previously unknown co~conspirators undermines the
    inadvertent overhear doctrine in ordinary domestic criminal wiretapping.
    57
    11
    Finally, Hasbajrami and amid seek to distinguish the incidental overhear"
    line of cases, noting that in those cases there was already an initial warrant
    supported by probable cause. They agree, however, that "the incidental overhear
    cases simply stand for the proposition that the government need not obtain
    multiple warrants to intercept protected communications." Brief of Amici Curiae
    American Civil Liberties Union and Electronic Frontier Foundation at 15, United
    States v. Hasbajrami, No. 15-2684 (2d Cir. Oct. 23, 2017} (emphasis in original).
    That is exactly the point here: once that initial surveillance is rendered lawful by
    a warrant, a FISC order, or some other exception to the warrant requirement, an
    additional warrant is not necessary in order to collect the calls or e-mails of third
    parties. As the district court recognized, once the surveillance was "lawful in the
    first place -whether it is the domestic surveillance of U.S. persons pursuant to a
    warrant or the warrantless surveillance of non-U.S. persons who are abroad -
    the incidental interception of non-targeted U.S. persons' communications with
    the targeted persons is also lawful." Suppression Decision, 
    2016 WL 1029500
    at ""9.
    The reason why the initial surveillance was lawful does not matter to this
    conclusion.
    58
    Accordingly, the incidental collection of United States persons' e-mails
    during lawful foreign intelligence surveillance of foreigners located abroad is not
    per se unreasonable because the collection is done without a warrant.
    B.    Incidental Collection of E-mails under Section 702 is Reasonable
    Even absent a warrant requirement, however, the government's action
    must still be reasonable, at least insofar as it affects United States persons, to be
    consistent with the Fourth A mendment. 
    King, 569 U.S. at 448
    . "To determine
    whether a search is reasonable under the Fourth Amendment, we examine the
    totality of the circumstances to balance, on the one hand, the degree to which it
    intrudes upon an individual's privacy and, on the other, the degree to which it is
    needed for the promotion of legitimate government interests." ln re Terrorist
    
    Bombings, 552 F.3d at 172
    (internal quotation marks omitted).
    For the purposes of Hasbajrami's appeal, we may assume that a United
    States person ordinarily has a reasonable expectation in the privacy of his e-mails
    sufficient to trigger a Fourth Amendment reasonableness inquiry when the
    government undertakes to monitor even foreign communications in a way that
    can be expected to, and in fact does, lead to the interception of communications
    with United States persons. See, e.g., United States v. Warshak, 
    631 F.3d 266
    , 285-86
    59
    (6th Cir. 2010) (analogizing between letters and e-mails and finding reasonable
    expectation of privacy). In other words, we can assume that the government may
    not eavesdrop, without reasonable justification, on the conversations of United
    States persons (even abroad) with foreign nationals, simply because the United
    States person is interacting with a foreigner. Even assuming that a United States
    person might be understood to take some risk that the person with whom he or
    she is communicating is under surveillance, it does not follow that an American
    communicating with a foreign national must take the risk that the person with
    whom he is communicating is subject to unreasonable, or indiscriminate,
    electronic surveillance, or that communicating with foreigners subjects the
    American national himself or herself to continuing surveillance.
    But such a privacy interest can be outweighed by the government's
    "manifest need to monitor'' the communications of foreign agents of terrorist
    organizations operating abroad, and this need outweighs that interest in privacy
    and makes the incidental collection of communications between such foreigners
    and United States persons reasonable. In re Terrorist 
    Bombings, 552 F.3d at 172
    .
    Even in the context of conventional warfare, identifying domestic agents of
    foreign powers is a principal concern of intelligence-gathering. The need to
    60
    identify potential domestic co�conspirators of hostile foreign persons or groups is
    even greater in the context of informal non-state terrorist organizations and
    movements. The recruitment of persons inside the United States or the placement
    of agents here to carry out terrorist attacks is one of the very threats that make it
    vital to surveil terrorist actors abroad. The communications of terrorist
    operatives abroad with persons inside the United States is thus of particular
    importance, and at least as important as monitoring the communications of
    foreign terrorists abroad among themselves. 18
    The logic of this conclusion is dear and compelling. If it is reasonable -
    and indeed necessary to the national security - for intelligence agencies to
    monitor the communications of suspected forei gn terrorists abroad, the need to
    keep track of the potential threat from abroad does not lessen because some of
    the suspect's contacts turn out to be American nationals, or foreign nationals
    located within the United States. And when the conversations being monitored
    18The same reasoning defeats any argument that such monitoring should be
    limited to the acquisition of forei gn intelligence, and that communications
    collected for that purpose should not be made available to domestic law
    enforcement agencies. There is little point in having intelligence agencies collect
    information abroad if those agencies are not able to share what they learn with
    domestic law enforcement when the information they acquire points to ongoing
    or impending criminal activities inside our borders.
    61
    constitute evidence of criminal conspiracies between the foreign operative and
    someone located within the United States, the urgency becomes greater, not less.
    The logic of the plai n view and inadvertent overhear cases fully applies: when an
    officer executing a lawful search or electronic surveillance warrant, or otherwise
    engaged in a lawful search, comes upon evidence of a previously unsuspected
    crime, or learns of the involvement of a previously unsuspected individual, the
    officer is not required to stop and obtain a new warrant to seize the item or to
    continue monitoring the phone line for which the warrant was obtained. The
    seizure of evidence of a crime in plain view without a warrant is a reasonab le
    seizure. In the same way., when evidence of a potential crime involving an
    American comes to light during the lawful surveillance of a foreign operative
    abroad, it is entirely reasonable within the meaning of the Fourth Amendment
    for the government to continue monitoring the conversations of that operative
    with the American as well as with his or her other associates. 1'.I
    19
    Of course, if the government wishes to expand the investigation to monitor the
    communications of the newly discovered United States-connected suspect, it
    -
    would be required to obtain a conventional Title III or traditional PISA warrant
    62
    In balancing Hasbajrami's privacy interest with the government's concern
    for national security, then1 we conclude that the totality of the circumstances here
    weighs in the government's favor. The incidental collection of communications
    between targeted foreigners abroad and United States persons or persons in the
    United States is thus reasonable. For similar reasons, when the intelligence
    information properly collected raises reasonable grounds to believe that a crime
    is being committed or planned in the United States, dissemination of the
    information to a domestic law enforcement agency such as the FBI is also
    reasonable.
    In summary, the district court reached the correct conclusions regarding
    incidental collection: the initial targeting of individuals without ties to the United
    States and located abroad is lawful; there is no need for a wanant in order to
    collect incidental communications by United States persons to and from those
    individuals; and both the collection of such communications and the
    dissemination of information from such collection about potential criminal
    actions within the country to domestic law enforcement are reasonable under the
    Fourth Amendment. Were such incidental collection the only Section 702
    material relevant to Hasbajramts motion, we would simply affirm the district
    63
    court's ruling. But, as the record rurrently stands, we must also consider
    additional issues.
    II.    "Inadvertent" Collection
    The district court's ruling on the suppression motion did not address
    whether any e-mail accounts of United States persons or individuals within the
    United States, including Hasbajrami, had been "inadvertently" targeted, that is,
    targeted by mistake under the presumption that an address was controlled by a
    non-United States person.
    Upon reviewing the classified record, in particular its ex parte proceedings
    under the Classified Information Procedures Act ("CIP A"), 18 U.S.C. app. 3, § 1 et
    seq., it is clear that the district court was made aware of one instance of the direct
    targeting of an e-mail account controlled by a United States person that resulted
    in the collection of Hasbajrami's communications. Before the incidental collection
    discussed above, the NSA had directly targeted at least one such e-mail address.
    Like the later incidental collection, the NSA had originally been monitoring
    communications with individuals it reasonably believed were non-United States
    persons located abroad, and as a result discovered an e-mail from the United
    States person. At that time, however, NSA analysts concluded, wrongly, that the
    64
    account holder was not a United States person. The NSA therefore tasked the
    account (a different account than those that were the subject of incidental
    collection detailed above) in its own right, and collected communications from
    the account for several weeks. The agency eventually detasked the account after
    it concluded it was not yielding significant intelligence information, but it did
    not initially purge the information because it did not discover until later that the
    account holder was a United States person. The related Section 702-acquired
    material, which included communications to and/or from Hasbajrami, stayed in
    NSA databases, however, and was not disseminated to domestic law
    enforcement, until the agency conducted a search of these databases in 2014
    following the initiation of Hasbajrami's prosecution.
    The inadvertent collection of communications raises complicated
    questions. First, as a statutory matter, Section 702 prohibits the targeting of e­
    mail accounts that the government knows to be maintained by United States
    persons.   See 50 U.S.C. § 1881a(b). But the statute thus appears to prohibit only
    knowing or intentional targeting, and not to address situations where the
    government is mistaken, reasonably or unreasonably. Does the express
    prohibition of targeting accounts known to be those of United States persons
    65
    implicitly authorize the targeting of any account not known with certainty to be
    that of a United States person? If there is evidence of a high likelihood that the
    account belongs to a United States person and the government proceeds to target
    it without taking steps to investigate further, does the willful blindness standard,
    which equates such deliberate indifference to actual knowledge in many legal
    contexts, apply? Cf. Global-Tech Appliances, Inc. v. SEB S.A., 
    563 U.S. 754
    , 766-69
    (2011) (discussing willful blindness doctrine).
    Second1 the Fourth Amendment calculus for such collection would be
    different than the one employed in considering incidental collection. Incidental
    collection is justified because the "target" of the surveillance cannot rely on the
    Fourth Amendment's protections, as discussed above. But a United States citizen
    or lawful permanent resident, located in the United States, assuming a
    reasonable expectation of privacy, would be protected by the Fourth
    Amendment. Is the Fourth Amendment prohibition of "unreasonable" searches
    violated if the government unreasonably (recklessly or negligently) concludes
    that the targeted account is that of a foreigner located abroad? Is it permissible
    for the government to adopt a presumption that, under all circumstances or in
    the presence of one or more key indicia, an account holder whose identity is
    66
    unclear should be treated as foreign? Would the later discovery that the account
    did indeed belong to a United States person require the minimization, or the
    suppression in a criminal case, of inadvertently collected conversations?
    A district court reviewing a motion to suppress evidence inadvertently
    collected (or derived from inadvertent collection) would have to address these
    issues, and perhaps others, in deciding whether the government's reliance on
    inadvertent collection in an investigation or prosecution was reasonable within
    the meaning of the Fourth Amendment.
    But we need not decide those questions today because we are satisfied that
    any inadvertent collection disclosed to the district court was harmless. The
    interception of communications from the inadvertently targeted account was
    brief, lasting only approximately two weeks. The materials collected, whatever
    they were, were not used in applying for the FISA warrant - indeed, their very
    existence seems to have been unknown to anyone involved in the criminal
    investigation of Hasbajrami, as the inadvertent targeting of the account in
    question was not even discovered by th e government until well into the
    prosecution of this case. And finally, the collection was terminated because the
    government itself determined that nothing of any intelligence value was being
    67
    learned. Presumably that conclusion would not have been reached if the
    collected conversations were indicative of criminal terrorist plots, or were of
    evidentiary value to a criminal investigation.
    Thus, even assuming arguendo that there was some legal infirmity in the
    decision to begin collection despite uncertainty about the status of the account, or
    to continue it once at least some evidence pointing to a possible United States
    source for the account was discovered, we conclude, even in the context of a
    conditional guilty plea, that the failure to suppress the results of that collection
    was harmless beyond any reasonable doubt.
    III.   Querying
    There is a third issue in this case, however: the storage of Section 702
    information in databases and the subsequent querying of those databases by the
    government. The district court did not make any findings regarding whether the
    NSA, the FBI or any other agency queried databases with regard to Hasbajrami
    prior to the FISC order. Instead, it appeared to accept the government's
    argument, framed within the context of a discussion of whether the minimization
    procedures provided adequate protections so as to make collection reasonable,
    that the government could freely query information it had lawfully acquired
    68
    without further Fourth Amendment inquiry. See Suppression Dedsion, 
    2016 WL 1029500
    at *12 n.20 ("I agree with the government that it would be perverse to
    authorize the unrestricted review of lawfully collected information but then
    restrict the targeted review of the same information in response to tailored
    inquires.") (internal alterations and quotation marks omitted).
    The government renewed this argument on appeal. FoUowing oral
    argument, during which the government would neither confirm nor deny
    whether it had queried any databases of Section 702-acquired information, this
    Court ordered further briefing. The government
    Cov't Supplemental Classified Br. at 6-7 (emphasis added).
    69
    Like inadvertent collection, the storage and querying of information raises
    challenging constitutional questions, to which there are few dear answers in the
    case law. Cf. In re 
    Directives, 551 F.3d at 1015
    (dismissing petitioner's concerns,
    under the PAA, because the "government assures us that it does not maintain a
    database of incidentally collected information from non-targeted United States
    persons, and there is no evidence to the contrary."). The issue was not addressed
    by the Ninth Circuit inMohamud, which explicitly left open the question of
    whether "the incidental overhear doctrine permits the unconstitutional and
    widespread retention and querying of the incidentally collected information,"
    stating that the issue was "not before [the 
    court]." 843 F.3d at 440
    n.24. The
    district court in Mohamud did reach the question, however, and it concluded that
    the "subsequent querying of a§ 702 collection, even if U.S. person identifiers are
    used, is not a separate search and does not make § 702 surveillance unreasonable
    under the Fourth Amendment." United States v. Mohamud, No. 3:10-cr-475-KI-1,
    
    2014 WL 2866749
    , at *26 (D. Or. June 24, 2014), affd, 
    843 F.3d 420
    (9th Cir. 2016).
    We do not find that logic persuasive. Storage has little significance in its
    own right: the lawfully-collected communications, even of United States persons,
    continue to serve the same foreign intelligence purpose in the continued
    70
    surveillance of a foreign operative, whether his interlocutor is a United States
    person or a citizen and resident of some other country. The material is justifiably
    retained, not to keep tabs on a United States person, but to keep tabs on the non­
    United States person abroad who has been targeted.20
    But querying that stored data does have important Fourth Amendment
    implications, and those implications counsel in favor of considering querying a
    separate Fourth Amendment event that, in itself, must be reasonable. Our
    reasoning is based on three considerations.
    First, courts have increasingly recognized the need for additional probable
    cause or reasonableness assessments to support a search of information or objects
    that the government has lawfully collected. It is true that the FBI does not need
    an additional warrant to go down to its evidence locker and look through a box
    of evidence it collected from a crime scene. But lawful collection alone is not
    always enough to justify a future search.
    In Riley v. California, the Supreme Court held that a warrant was necessary
    to search a cell phone, even when that cell phone was lawfully seized pursuant to
    20The considerations might be different if the storage involved data responsive to
    a warrant and retained for the purpose of a domestic criminal prosecution. This
    Court, sitting en bane, considered similar issues in United States v. Ganias, 
    824 F.3d 199
    (2d Cir. 2016), although we ultimately did not need to decide them.
    71
    a search incident to a lawful arrest. 
    573 U.S. 373
    , 401 (2014). Several circuit court
    decisions have reached similar conclusions. In United States v. Sedaghaty, for
    instance, the government had searched a defendant's home pursuant to a
    warrant focused on tax violations. 728 F.3d 885,912 (9th Cir. 2013). Agents seized
    nine computers, which forensic experts searched with "an evolving list of search
    terms" in order "to comb through the computers for useful materials,"
    eventually finding evidence confirming the defendant was supporting Chechen
    terrorist groups. 
    Id. The Ninth
    Circuit concluded that the searches beyond the
    scope of the warrant were improper, noting that the government "should not be
    able to comb through [the defendant's] computers plucking out new forms of
    evidence that the investigating agents have decided may be useful" after it failed
    to find evidence of willfulness regarding the tax returns. 
    Id. at 913.
    To do so
    required a new warrant, even though the government already had access to the
    machines and had lawfully seized them. See also United States v. Runyan, 
    275 F.3d 449
    , 464-65 (5th Cir. 2001) (finding that police exceeded the scope of a private
    search when they "examined disks that the private searchers did not examine"
    and would have required a warrant to do so); United States v. Mulder, 
    808 F.2d 1346
    , 1349 (2d Cir. 1987) (holding that a separate warrant was needed to test
    72
    packages in suitcase for drugs, even though the suitcase was lawfully sei.1.ed via
    private search).
    Second, Section 702 is sweeping in its technological capacity and broad in
    its scope. In the case of the incidental collection discussed above, - was
    collecting and reviewing e�mails for its own foreign intelligence purposes in
    , and reporting �vidence that it obtained suggesting
    on-going criminal activity in the United States. Such activity is closely analogous
    to precedents drawn from traditional domestic criminal wiretapping. As
    discussed above, it is not difficult to conclude that, like "incidentally overheard"
    criminal conversations and evidence of crimes seized in plain view, the collection
    and use of information obtained in this way is reasonable within the meaning of
    the Fourth Amendment.
    But the vast technological capabilities of the Section 702 program,
    estimated by the PCLOB as totaling nearly 250 million e-mails annually by 2011
    and likely larger numbers since then, may mean that analysts are not reviewing
    each of those e-mails contemporaneously with their collection. PCLOB Report at
    116, 128-29. If such a vast body of information is simply stored in a database,
    available for review by request from domestic law enforcement agencies solely
    73
    on the speculative possibility that evidence of interest to agents investigating a
    particular individual might be found there, the program begins to look more like
    a dragnet, and a query more like a general warrant, and less like an individual
    officer going to the evidence locker to check a previously-acquired piece of
    evidence against some newfound insight
    The Supreme Court has expressed increasing concern about the interaction
    between Fourth Amendment precedent and evolving government technological
    capabilities. Riley rested in part on the fact that "[c]ell phones ... place vast
    quantities of personal information literally in the hands of 
    individuals." 573 U.S. at 386
    . "A search of the information on a cell phone [ therefore] bears little
    resemblance to the type of physical search considered" in past cases. Id.; see also
    
    Ganias, 824 F.3d at 217-18
    (noting privacy implications of expansive technology
    and data storage). And in Carpenter, the Court concluded that a warrant (or a
    valid substitute) was required to acquire cell-site records, even though they were
    stored by a third party and under traditi onal Fourth Amendment doctrine a
    cellphone user would not have an expectation of privacy in such information:
    We decline to grant the state unrestricted access to a
    wireless carrier's database of physical location
    information. In light of the deeply revealing nahlre of
    [this information], its depth, breadth, and
    74
    comprehensive reach, and the inescapable and
    automatic nature of its collection, the fact that such
    information is gathered by a third party does not make
    it any less deserving of Fourth Amendment protection.
    The Government's acquisition of the cell-site records
    here was a search under that Amendment.
    Carpenter v. United States, 
    138 S. Ct. 2206
    , 2223 (2018).
    Third, as a practical matter, querying is problematic because it may make
    it easier to target wide-ranging information about a given United States person at
    a point when the government knows it is investigating such a person. Section 702
    forbids the government from targeting a non-United States person as a backdoor
    way of targeting a United States person. 50 U.S.C. § 1881a(b). But, as detailed
    above, in the course of its intelligence gathering operations, the NSA may have
    collected all sorts of information about an individual, the sum of which may
    resemble what the NSA would have gathered if it had directly targeted that
    individual in the first place. To permit that information to be accessed
    indiscriminately, for domestic law enforcement purposes, without any reason to
    believe that the individual is involved in any criminal activity and or even that
    any information about the person is likely to be in the database, just to see if
    there is anything incriminating in any conversations that might happen to be
    there, would be at odds with the bedrock Fourth Amendment concept that law
    75
    enforcement agents may not invade the privacy of individuals without some
    objective reason to believe that evidence of crime will be found by a search.
    Treating querying as a Fourth Amendment event and requiring the query itself
    to be reasonable provides a backstop to protect the privacy interests of United
    States persons and ensure that they are not being improperly targeted.
    Fourth, much may dep end on who is querying what database. There is a
    potentially significant difference between, for example, the FBI querying its own
    database and the FBI requesting that the NSA query its far larger archive of
    collected communications, collected pursuant to a broader mandate. As we
    understand the public sources of information about the collection and use of
    Section 702 material, the FBI maintains its own records of communications
    provided to it by the NSA. See PCLOB Report at 58-59. Such communications
    presumably were provided because review of the material properly collected by
    the NSA under Section 702 uncovered evidence of criminal activity (relating to
    terrorism or otherwise), and were appropriately communicated to domestic law
    enforcement. Just as the FBI may act on such information where it requires
    immediate criminal investigation, it may well be appropriate for the agency to
    retain the information and store it for later review when other legitimate
    76
    evidence or leads make that information relevant to an on-going investigation.
    Such a review of the agency's own files is arguably analogous to traditional law
    enforcement techniques; evidence lawfully collected does not always accumulate
    to a sufficient quantity to warrant an immediate arrest or indictment, but may be
    retained and later reviewed when additional evidence is developed. FBI queries
    directed to a larger archive of millions of communications collected and stored
    by the NSA for foreign intelligence purposes, on the chance that something in
    those files might contain incriminating information about a person of interest to
    domestic law enforcement, raise different concerns.
    What kinds of querying, subject to what limitations, under what
    procedures, are reasonable within the meaning of the Fourth Amendment, and
    when (if ever) such querying of one or more databases, maintained by an agency
    of the United States for information about a United States person, might require
    a warrant, are difficult and sensitive questions. We do not purport to answer
    them here, or even to canvass all of the considerations that may prove relevant or
    the various type s of querying that may raise distinct problems.
    Indeed, we cannot do so on the sparse record presented. We do not know
    what databases were queried by whom, for what reasons, what (if any)
    77
    information was uncovered by such queries, or what (if any) use was made of
    any information uncovered. The government has represented that no
    information derived from any such queries was presented to the FISC to obtain
    the FISA warrant, but has not addressed whether any such information
    contributed to the investigation in other ways.
    Given these considerations, the district court here must conduct an inquiry
    into whether any querying of databases of Section 702-acquired information
    using terms related to Hasbajrami was lawful under the Fourth Amendment. Fo r
    today we need only reiterate that "the ultimate touchstone of the Fourth
    Amendment is reasonableness." 
    Riley, 573 U.S. at 381
    ; cf Abu 
    4Jihaad, 630 F.3d at 121-22
    (stating that, even in the application of the warrant requirement, the
    requirement is "flexible, so that different standards may be compatible with the
    Fourth Amendment in light of the different purposes and practical
    considerations at issue.") (internal quotation marks and citations omitted).
    We cannot, and should not, go further, pending development of a more
    complete record by the district court on remand, and an assessment by the
    78
    district court as to whether whatever was done was consistent with the Fourth
    Amendment and whether, if there was any illegality, any evidence should have
    been suppressed in response to Hasbajrami' s motion.21
    IV.   Hasbajrami's Conditional Plea and Resolution of the Motion to
    Suppress
    As addressed above, there is still an open issue as to what queries of
    Section 702-acquired information occurred in this case, whether any such queries
    were reasonable and, if unreasonable, whether the queried information tainted
    the application before the FISC or in some other way would lead to the
    suppression of any evidence.
    But in its post•argument briefing, the government argues that even if it did
    query Section 702 databases, that action ultimately could not matter because the
    11On November 14, 2019, Hasbajrami filed a Rule 280) letter alerting this Court
    to three recently declassified opinions from the FISC and FISCR. See In re
    DNI/AG 702(h) Certifications 2018, 
    941 F.3d 547
    (FISA Ct. Rev. 2019); Redacted
    (FISA Ct. Sep. 4 , 2019); Redacted, 
    2018 WL 9909971
    (PISA Ct. O ct. 18, 2018). Based
    on our review, we do not believe that these opinions substantively affect our
    decision because, even to the extent that their approach differs from ours, they
    are not binding on this Court. Since we are remanding for the district court to
    further assess this issue with the benefit of a more complete record, we decline to
    engage further at this time. We did not find it necessary to review the unredacted
    versions of these opinions in reaching this conclusion and, therefore,
    Hasbajrami's request for access to the unredacted versions of these opinions is
    DENIED.
    79
    communications collected as a result of incidental collection would provide an
    independent source sufficient to support the FISC's probable cause
    determination. Gov't Supplemental Classified Br. at 9 (arguing that "this Court's
    analysis should be limited to alleged 'searches' where a causal link can be drawn
    between the search and the acquisition of the evidence that Hasbajrami seeks to
    suppress.").
    The government relies primarily on Murray v. United States, 
    487 U.S. 533
    (1988). In Murray, federal law enforcement agents surveilling the defendant
    witnessed him drive into a warehouse in South Boston. 
    Id. at 535.
    Agents
    arrested the defendant and a co-conspirator after they drove away from the
    warehouse and, upon arrest, the agents discovered marijuana in the defendant's
    truck. The agents then forced entry into the warehouse, where they "observed in
    plain view numerous burlap-wrapped bales that were later found to contain
    marijuana. They left without disturbing the bales, kept the warehouse under
    surveillance," and re-entered only after obtaining a warrant. 
    Id. In a
    pplying for
    the warrant, however, the agents did not advise the court of their prior entry;
    they also did not rely on their observations of the contents of the warehouse in
    order to establish probable cause. 
    Id. at 536.
    The Supreme Court held that
    80
    suppression of the evidence eventually seized from the warehouse would not be
    required "if the warrant-authorized search of the warehouse was an independent
    source of the challenged evidence.'' 
    Id. at 543-44.
    Although "[k)nowledge that the
    marijuana was in the warehouse was assuredly acquired at the time of the
    unlawful entry ... it was also acquired at the time of entry pursuant to the
    warrant, and if that later acquisition was not the result of the earlier entry there is
    no reason why the independent source doctrine should not apply. 1' 
    Id. at 541.
    Even assuming the government was querying databases simultaneously
    with its incidental collection activities, according to the government's position its
    agents would be analogous to the agents in Murray. Their subjective
    understanding of the evidence might have been affected by the fruits of an
    unreasonable search, and had they relied on that evidence in support of a
    warrant application they might not be able to use the evidence obtained by
    executing that warrant. But, according to the government, if the information they
    placed before the FISC, and that court's subsequent probable cause
    determination, rested on other information, that "later acquisition was not the
    result of the earlier [search]1' and so "there is no reason why the independent
    source doctrine should not apply." 
    Id. at 541.
    81
    We cannot apply the independent source doctrine on the record currently
    before us. Had this case gone to trial, our task would be significantly different.
    Under those circumstances, we could have undertaken to trace, as the Ninth
    Circuit did in Mohamud, 843 F .3d at 438 & n.21, individual pieces of evidence that
    had actually been presented to the jury at that trial in order to assess whether
    those pieces of evidence had been obtained consistent with the Fourth
    Amendment. And if individual pieces of evidence needed to be suppressed, the
    Court could then decide whether the admission of any given piece of evidence
    was harmless when compared to all the legally obtained evidence that was
    ultimately presented at trial.
    But we are not reviewing the acquisition of evidence used at a trial. Rather,
    Hasbajrami's appeal reaches us following a conditional plea made pursuant to
    Rule ll(a}(2) of the Federal Rules of Criminal Procedure. Rule l l(a)(2) provides
    that:
    With the consent of the court and the government, a
    defendant may enter a conditional plea of guilty or nolo
    contendere, reserving in writing the right to have an
    appellate court review an adverse determination of a
    specified pretrial motion. A defendant who prevails on
    appeal may then withdraw the plea.
    82
    According to the Advisory Committee Notes to the 1983 Amendments,
    conditional pleas should be permitted 11only when the decision of the court of
    appeals will dispose of the case either by allowing the plea to stand or by such
    action as compelling dismissal of the indictment or suppressing essential
    evidence." See also United States v. Bundy, 
    392 F.3d 641
    , 647-48 {4th Cir. 2004). The
    classic example of a case in which that standard is met is a narcotics case in
    which the evidence sought to be suppressed is the very basis of the charge. The
    suppression of the evidence would end the case; if the evidence is admissible,
    guilt is assured; if not, no evidence of guilt remains. The situation is more
    problematic and complicated, however, where the suppression of some but not
    all of the evidence in the case is a possible outcome.
    Our sister circuits have applied a harmless error calculation when
    evaluating whether an opportunity to withdra,w a plea is a necessary remedy
    after it is determined on appeal that the challenged district court ruling was, in
    whole or in part, erroneous. See, e.g., United States v. Lustig, 
    830 F.3d 1075
    , 1086
    (9th Cir. 2016); United States v. Rivera-Nevarez, 
    418 F.3d 1104
    (10th Cir. 2005)
    (affirming conviction on harmless error where conviction was upheld on
    83
    grounds not considered by district court). 22 Those courts have applied the
    harmless error rule by asking "whether the erroneous suppression ruling could
    have affected [the defendant's] decision to plead guilty.'' 
    Lustig, 830 F.3d at 1086
    .
    But the record here is murky. It is clear that the presence or absence of
    Section 702 surveillance affected Hasbajrami' s initial decision to plead guilty.
    Indeed, it was because the district court was convinced that Hasbajrami's initial
    decision to plead guilty was predicated in part on his lawyers' assurance that the
    government had represented that there was no warrantless surveillance in his
    case that it granted the defense motion to withdraw Hasbajrami's first guilty plea
    when those representations were revealed to have been inaccurate. App'x at 39
    (noting that Hasbajrami "specifically asked [his counsel] about whether
    warrantless wiretaps had played a role in his case. After they informed him that
    such wiretaps were not part of the evidence, he was more willing to plead
    guilty."). Moreover, Hasbajrami moved to suppress all Section 702 material
    22The Advisory Committee also considered Fed. R. Crim. P. ll(h)'s harmless
    error calculus to apply, but it noted that, without full factual development,
    invocation of the harmless error rule would be difficult. The Committee noted,
    however, that "relatively few appellate decisions result in affirmance upon
    [harmless error]. Thus it will only rarely be true that the conditional plea device
    will cause an appellate court to consider constitutional questions which could
    otherwise have been avoided by invocation of the doctrine of harmless error."
    Fed. R. Crim. P. 11, advisory committee's notes to 1983 amendments.
    84
    collected by the government, including matter that was not presented to the FISC
    to obtain the traditional FISA warrant. What is unclear is just how much Section
    702-acquired information would remain, after further fact-finding at the district
    court. It may be that, after a full evaluation of the record in light of Hasbajrami's
    motion to suppress, the evidence available to the government remains very much
    intact. For all we know, any queries conducted by the government may have
    been entirely reasonable, they may not have yielded any evidence at all, and any
    material that was uncovered even by a putatively unconstitutional query may
    not have affected the investigation in any way.
    However those matters would be decided on remand, though, we cannot
    predict here whether any such queries were constitutionally questionable, or
    whether any information derived from such queries should itself have been
    suppressed, or directly or indirectly tainted the warrant application. And,
    without being able to fully predict or decide either of those issues, we also cannot
    adequately predict whether a potentially-altered evidentiary landscape "could
    have affected [Hasbajrami's] decision to plead guilty." 
    Lustig, 830 F.3d at 1086
    ;
    see also United States v. uake, 
    95 F.3d 409
    , 420-421 (6th Cir. 1996) (noting that Fed.
    R. Crim. P. ll(a)(2) addresses the situation in which "the defendant is fully
    85
    successful on appeal," and not "the effect of a partially successful appeal/ but
    vacating judgment because "[ defendant was] successful in excluding what
    appears to be the most damning evidence against him.") (emphasis in original).
    Taking these considerations into account, then, we are left with a posture
    similar to that faced by this Court in United States v. Wong Ching Hing, 
    867 F.2d 754
    (2d Cir. 1989). The defendant in that case had reserved his right to appeal the
    district court's failure to suppress roadside statements made to police without
    Miranda warnings, as well as subsequent statements made at a police station. 
    Id. at 756.
    This Court, like the district court, found that the roadside statements were
    voluntary and that supp ression was therefore unnecessary as to those. 
    Id. But the
    defendant had made two separate sets of statements to law enforcement once
    detained at the police station. The first set was made to the state police, and it did
    not add anything to what he had voluntarily provided at the initial stop. The
    second set of statements, however, was made to a DEA agent and "formed the
    basis of the information to which Wong pled guilty," which charged him with
    making a false statement. 
    Id. The Court
    concluded that the circumstances "may well warrant the
    conclusion that the detention was not valid as a Terry stop." 
    Id. at 758.
    But it was
    86
    unclear what effect such a holding would have on Wong's legal position, because
    the record was not clear as to whether the conditional guilty plea was
    "conditioned upon the government's being successful in admitting all of the
    statements or any one of them." 
    Id. at 758
    (emphasis added). The Court therefore
    vacated the judgment and remanded to the district court for "further
    proceedings," noting that the government had also urged affirmance on an
    alternative ground and that "the parties will not be precluded from asserting
    new arguments" on remand. ld.
    We therefore follow a similar course of action here. Because the district
    court was not even aware whether such querying had occurred, and because
    even we have not been advised as to what was done, for what reasons, and with
    what results, we remand to the district court to determine the facts, consistent
    with the considerations stated above, and to decide in the first instance, based on
    its fachlal findings, whether there was a constitutional violation in this particular
    case, and what (if any) evidence would need to be suppressed if there was
    indeed a violation. Similarly, we leave it to the district court to determine, in the
    first instance., whether any exceptions to the exclusionary rule, such as a good
    87
    faith exception, might apply in this case. 23 Finally, we leave it to the district court
    to determine, if any evidence should have been suppressed, whether the failure
    to suppress that evidence was harmless, and if it was not what remedy is
    appropriate.
    On remand, the district court should undertake whatever proceedings are
    necessary, consistent with the considerations stated above. To the extent that any
    decisions must be made about what information is to be presented to
    appropriately-cleared defense counsel, such decisions too are best left to the
    district court after it becomes clear what the inquiry about querying will
    involve. 24 Cf 
    Abu-Jihaad, 630 F.3d at 129
    (noting that, under FISA, disclosure is
    23
    The government has argued before this Court that the good faith exception
    would apply. Because of the incomplete record here, we take no position as to
    whether the exception applies.
    24 Hasbajrami argues   on appeal that his due proces s rights would be violated if
    he is not provided with an unredacted or unmodified version of the district
    court's order. He concedes, however, that the argument would be rendered moot
    if this Court reverses on either constitutional or statutory grounds. After
    reviewing the minor redactions, we conclude that the limited information
    redacted from the district court's opinion could not have substantially affected
    Hasbajrami' s due process rights in this appeal. In any event, we undertook de
    novo review and we are satisfied that the limited redactions in the portions of this
    opinion relating to the district court's rulings do not require disclosure to the
    defense at this time . We therefore deny Hasbajrami's request to unseal or to
    disclose to the defense team the redacted portions of the district court opinion.
    As addressed above, however, the district court remains free to consider, in the
    88
    exception and ex parte, in camera review is the rule, and that the review of
    materials that are "relatively straightforward and not complex" may not
    necessarily require adversarial testing).
    CONCLUSION
    Based on the foregoing considerations, we REMAND to the di strict court
    for further proceedings consistent with this opinion.
    first instance, what if any classified material, including the government's Rule
    280) letter and the redacted portions of this opinion relating to querying, should
    be provided to properly-cleared defense counsel on remand, consistent with the
    requirements of CIPA and FISA. We therefore DENY Hasbajrami's February 8,
    2019 motion for disclosure of the government's Rule 280) letter, without
    prejudice to renewal before the district court on remand.
    89