. . . . "After analyzing that network, requests for wiretaps, searches, and other procedures can be conducted against the phone numbers and their owners who are associated with the terrorist phone number." .