Prather v. AT&T, Inc.

847 F.3d 1097, 2017 WL 506900, 2017 U.S. App. LEXIS 2092
CourtCourt of Appeals for the Ninth Circuit
DecidedFebruary 6, 2017
Docket13-17489
StatusPublished
Cited by42 cases

This text of 847 F.3d 1097 (Prather v. AT&T, Inc.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Prather v. AT&T, Inc., 847 F.3d 1097, 2017 WL 506900, 2017 U.S. App. LEXIS 2092 (9th Cir. 2017).

Opinion

OPINION

SESSIONS, District Judge:

OVERVIEW

John C. Prather, a longtime state prosecutor, brought a qui tam action alleging that the largest telecommunications (“tele-com”) companies in the United States were fraudulently overcharging the federal government for surveillance services. The district court dismissed Prather’s action under the False Claims Act’s (“FCA”) public disclosure bar, which states that once allegations of fraud have entered the public domain a person may not bring a qui tam action unless he can prove that he was an original source of those allegations. See 31 U.S.C. § 3730(e)(4) (2006). For the reasons set forth below, we agree that Prather did not qualify as an original source and affirm.

FACTUAL BACKGROUND

Prather served as an attorney in state government for over thirty years. He began his service as an Assistant Attorney General in his native state of North Carolina, then moved to New York and joined the office of the Manhattan District Attorney. In 1989 he became the Deputy Chief of the Frauds Bureau in that office, and in 1992 was appointed Senior Investigative Counsel in the Rackets Bureau. He joined the New York Office of the Attorney General (“NYOAG”) in 1999. From 2002 to 2008, Prather served as the Deputy Attorney General in charge of the NYOAG’s Organized Crime Task Force (“OCTF”). When he initiated this qui tam action, he was serving as the Deputy Inspector General for Investigation in the Metropolitan Transportation Authority, Office of the Inspector General.

During his many years as a government attorney, Prather supervised hundreds of wiretaps. The OCTF alone conducted over 200 wiretaps per year. As head of the OCTF, Prather was authorized to determine when it was necessary to seek court permission to use wiretaps, and to personally apply for eavesdropping warrants. He also reviewed telecom companies’ rate sheets and developed surveillance budgets.

Until the mid-1990s, most wiretaps required the manual “bugging” of a phone or phone line. To bug a phone line, law enforcement would either physically attach a device to the phone wire or place a bug inside the phone itself. The phone company would then set up a separate line into which law enforcement could dial and listen to the conversations taking place over the bugged line. The separate line was essentially the same as any other business *1100 or residential phone line provided by the phone company.

With the emergence of cellular phones, this method of bugging telephones was no longer effective. In 1994, Congress passed the Communications Assistance to Law Enforcement Agencies Act (“CALEA”), authorizing the payment of $500 million to telecom companies for investment in the hardware and software necessary to maintain law enforcement’s ability to effectively eavesdrop despite technological developments in telecommunications. See 47 U.'S.C. § 1001-1010. Prather alleges that as a result of these upgrades, phone companies can now, “by a simple flick of a switch,” duplicate and forward to law enforcement both a call’s audio content and its associated information, such as caller identification. ER 188.

By law, the government is required to pay the telecom companies for their assistance with eavesdropping procedures. The Omnibus Crime Control and Safe Streets Act of 1968 (“OCCSSA”), as amended, requires phone carriers to “furnish the applicant [requesting eavesdropping] forthwith all information, facilities, and technical assistance necessary to accomplish the interception unobtrusively and with a minimum of interference with the services that such provider ... is according the person whose communications are to be intercepted.” 18 U.S.C. § 2518(4). In turn, law enforcement must compensate carriers for the “reasonable expenses incurred in providing such facilities or assistance.” Id.

The OCCSSA does not define “reasonable expenses.” Nor does the more-recently enacted CALEA reference the reimbursement provision in the OCCSSA. In 2002, the Federal Communications Commission (“FCC”) issued an Order and Final Rule stating that “carriers can recover at least a portion of their CALEA software and hardware costs by charging to [law enforcement agencies], for each electronic surveillance order authorized by the CA-LEA, a fee that includes recovery of capital costs, as well as recovery of the specific costs associated with each order.” In re Commc’ns Assistance for Law Enforcement Act, 17 FCC Red. 6896, 6917 ¶ 60 (2002).

Prather claims that the telecom companies have used CALEA to overcharge law enforcement agencies for wiretaps and related surveillance • assistance. He asserts that although the work involved in providing a wiretap has decreased since the technological changes funded by CALEA, charges for such services have generally increased tenfold since the law was passed. Prather allegedly witnessed these price increases himself through his work as a prosecutor, and as a result of information he obtained from telecom company representatives.

Prather claims that he spoke with his superiors at the NYOAG about the suspected overcharges as early as 1999. He reportedly raised similar concerns with the Manhattan District Attorney’s Office. There is no allegation that he spoke to or otherwise alerted the federal government prior to 2004, when the FCC requested input from law enforcement agencies about their wiretap costs. The FCC inquiry was spurred by a joint petition submitted by the DOJ, FBI, and DEA seeking a review of those costs. Among the issues identified by the petition was the need to “clarify the cost methodology and financial responsibility associated with intercept provisioning.” ER 232, 299-802. The petition also asked the FCC to reverse its 2002 Order allowing carriers to recover CALEA-related costs, including capital investments, through intercept charges.

The FCC issued a formal request for comment on the joint petition on March 12, 2004. New York Attorney General Elliot Spitzer was among those who submitted *1101 comments. Prather contends he had to convince the person who was preparing the NYOAG’s comments, Susanna Zwer-ling, to include allegations of overcharging. Zwerling eventually requested that Prather submit affidavits as part of the NYOAG’s official submission, the first of which was dated April 12, 2004, and received by the FCC on April 14, 2004. ER 24-32, 33-42; SER 49, 85-87, 137-72. While the affidavits were generated during Prather’s work hours, on his work computer, and submitted in his official capacity, SER 86-88, 90-91, Prather submits that nothing in his role as the head of the' OCTF compelled him to raise the issue of overcharging with either the New York Attorney General or the FCC.

Other law enforcement agencies also offered comments in response to the FCC’s request. Some of those comments were submitted before those of the NYOAG. SER 110-19. Several comments expressed concerns about excessive charges. Id. On April 27, 2004, the DOJ, FBI, and DEA replied with their own concerns about intercept fees.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
847 F.3d 1097, 2017 WL 506900, 2017 U.S. App. LEXIS 2092, Counsel Stack Legal Research, https://law.counselstack.com/opinion/prather-v-att-inc-ca9-2017.