Beruflich Dokumente
Kultur Dokumente
most dangerous
moment of any movement for justice is when you seem to be succeeding .
His point was this: When your adversary is more powerful than you are, they are in a position to define what
surveillance authorities. The USA Freedom Act will leave the government
with a range of powerful surveillance tools. These include:
Section 702 of the Foreign Intelligence Surveillance Act Amendments Act (FISA):
Unlike the NSA's metadata surveillance program, collection under FISA's Section
702 captures the content of communications. This could include emails,
instant messages, Facebook Inc messages, Web browsing history and
more. Section 702 has been used by the NSA to justify mass collection of
data directly from the physical infrastructure of communications
providers.
Executive Order 12333: Issued by President Reagan in 1981, it allows the
executive branch to spy on foreigners with no regulation by Congress.
Millions of innocent foreigners' communications are collected, including
any containing Americans' communications.
Pen Registers: These allow the government to collect dialing, routing, addressing
or signaling information, including telephone numbers dialed and Internet
metadata, such as IP addresses and email headers.
FISA's Business Records Provision: This allows the government to obtain
business records from transportation carriers and storage facilities. The government
routinely considers private communications to be business records.
An ECPA D Order: Under Section 2703(d) of the Electronic Communications
Privacy Act (ECPA), the government can get a court order for information from
communications providers about their customers, including the sorts of metadata
the government gets with Section 215. The government must provide specific and
articulable facts showing that there are reasonable grounds to believe that the
records or other information sought, are relevant and material to an ongoing
criminal investigation.
National Security Letters (NSLs): Similar to subpoenas, NSLs allow intelligence
agencies to collect records from telecommunications providers, financial
institutions, credit reporting bureaus, travel agencies and other entities. Nearly all
NSLs include gag orders, which prevent the target from telling anyone they have
been served with an NSL. The government can use NSLs to collect much the
same information as Section 215. NSLs have been routinely misused.
Administrative Subpoenas: Many federal agencies have the authority to issue
subpoenas for customer records in their normal course of business. These
authorities are extremely widespread, comprising 335 different statutes
by one count.
All of these authorities continue to exist as before. Perhaps worst of all,
however, an Obama administration official confirmed last Wednesday that the
government would ask the secretive Foreign Intelligence Surveillance Court to
certify that the NSA's Section 215 bulk records collection was part of an ongoing
investigation, and could therefore continue indefinitely until the investigation
into terrorism is someday over.
Freedom Act: The Law Isn't on Your Side
Besides almost certainly being unconstitutional, the government's abuse
of these surveillance powers since 2001 is both illegal and useless. A
federal appeals court ruled the NSA's bulk metadata program illegal last
month, saying most members of Congress never intended for the Patriot
Act to be interpreted that way. Moreover, a presidential panel concluded
that the information gleaned from the NSA's spying on Americans was
not essential to preventing [terrorist] attacks and could readily have been
obtained in a timely manner using conventional [court] orders.
The law wasn't on your side under the Patriot Act, and it isn't on your side
now. You need to continue to take steps to secure your own privacy and
sovereignty from these outrages and I will continue to help you to do so.
(Jason Young Green, JD Candidate 2016, UNC Chapel Hill, Certified Information
Privacy Professional, Abcrailing Against Cyber Imperialism: Discussing The Issues
Surrounding The Pending Appeal Of United States V. Microsoft Corp.; North Carolina
Journal of Law & Technology, Online Edition; 16 N.C. J.L. & Tech. On. 172 JRS)
Privacy rights of the individual are constantly at war with effective law
enforcement principles. Alexander, as head of the NSA, was entrusted with the
duty to protect the United States from terrorist threats both at home and abroad.
The steps that he took to analyze and act on data that he collected that led to the
reduction of U.S. soldier deaths are noteworthy. n54 However, the government did
not fail in its mission to "collect it all" in its execution, but in its oversight. n55 Gen.
Alexander frequently points out that the NSA collection programs are subject to
oversight by Congress as well as the U.S. Foreign Intelligence Surveillance Court.
n56 However, the proceedings of these two bodies are secret. n57 This lack of
transparent oversight has given the NSA a wide berth in its operations, in
violation of the FIPPS that both EU and U.S. privacy frameworks are based on,
specifically the fundamentals of Notice and Consent. n58 By having secret FISA
court orders and ECPA warrants that are rarely, if ever, unsealed, citizens
targeted by NSA are never notified of the invasion of their privacy, and
thus have no control over it. n59 It is this lack of oversight that has allowed
the NSA collection mechanism to run rampant and is precisely what must be
addressed.
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
Klayman offers some reason for optimism among civil libertarians: Not only did an
Article III court decide a post-9/11 abuse of power case on its merits, but that
decision held that the NSA surveillance at issue was likely in violation of
the Fourth Amendment. Whether appellate courts will follow the line of
reasoning in Klayman as opposed to that of Clapper II and Smith, however, remains
unclear. n99 It is also difficult to predict how the U.S. Supreme Court will
respond when confronted with this matter. On the one hand, individual members
of the Court have expressed skepticism as to the appropriateness of
judicial review in matters of national security-related surveillance. n100 On
the other, the Court as a whole has recently shown significant interest in
rethinking the parameters of government surveillance. In the 2012 case
United States v. Jones, the Court found that warrantless GPS tracking of an
individual's movements for an extended period of time contravened the parameters
set in Smith. n101 The two concurrences in Jones further suggested reworkings of
the Smith framework in light of changing technology and an increased need for
robust privacy protection given the government's ability to access telephonic data
with ease. n102 The opinion in Klayman focused on Jones to illustrate the
need to rethink the nature and scope of privacy given the vastly different
use of technology of today as compared to the 1970s, when Smith was
decided. n103 In mid-2014, the Supreme Court followed this rightsprotective line of reasoning when it decided Riley v. California, holding that
warrantless searches of the electronic contents of an arrestee's cell phone
were in [*88] violation of the Fourth Amendment protections against
unreasonable search and seizure. n104
These rights-protective perspectives - offered by justices with different
political and theoretical perspectives - may offer a preview of a significant
jurisprudential shift not only in hearing security-related cases on their merits, but
in finding for plaintiffs alleging privacy and civil liberties infringements. However,
the historically deferential attitude of courts toward matters of national
security, a stance that has only compounded in the post-9/11 context,
suggests that this may continue to be an uphill battle for civil libertarians.
n105
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
Article III courts have consistently been wary of wading into the debate over
surveillance, almost always dismissing cases in the post-9/11 context on
procedural or secrecy grounds, n84 despite n85 the net effect of precluding
even those individuals with concrete evidence that their privacy and civil
liberties had been infringed from having their grievances heard. n86
Although the Snowden disclosures have given more purchase to plaintiffs
challenging data collection and surveillance, some Article III courts continue to
find that plaintiffs have no grounds to stop the NSA's data and metadata
collection, retention, and analysis.
The case of Clapper v. Amnesty International, n87 decided in early 2013, prior to
the Snowden disclosures, exemplifies the traditional lack of relief available to
plaintiffs in Article III courts. In Clapper, plaintiffs, including attorneys,
non-profit humanitarian organizations, and journalists, alleged that their
ability to communicate with and advise overseas clients and sources was
severely compromised by the fact that their phone calls were likely being
surveilled by the NSA or other U.S. government agencies. The United States
Supreme Court dismissed plaintiffs' suit on standing grounds, holding that
plaintiffs "cannot manufacture standing merely by inflicting harm on
themselves based on their fears of hypothetical future harm that is not
certainly impending." n88
Immediately after Snowden's June 2013 disclosures that the telephony data of
all U.S. persons is being systematically collected and stored by the NSA, the ability
of plaintiffs to clear the procedural hurdle of standing improved, since the
"fears of hypothetical future harm" that allowed the Clapper majority to dismiss that
case were no longer hypothetical, but publicly known as fact. However, the
question of whether plaintiffs were granted any substantive relief is yet to be
determined, since district courts have come to differing conclusions on the
question of the metadata collection program's constitutionality.
[*86] In American Civil Liberties Union v. Clapper ("Clapper II"), filed days after the
initial Snowden disclosures, n89 the ACLU and other organizations claimed that the
NSA's metadata collection and retention program violated their First and Fourth
amendment rights by inhibiting their ability to speak freely with clients and by
unreasonably searching and seizing their communications. n90 Judge Pauley of
the Southern District of New York rejected these claims, holding that
although the metadata "if plumbed ... can reveal a rich profile of every individual,"
n91 under the long-standing precedent of Smith v. Maryland, n92 plaintiffs had no
reasonable expectation of privacy over their telephony metadata. Further,
Judge Pauley accepted the government's position that the metadata was necessary
in disrupting several terrorist threats, and that such counterterrorism work could not
have occurred without the vast trove of data available through the NSA Metadata
Program. n93
With similar facts and claims, n94 Judge Leon of the District Court of the
District of Columbia in Klayman v. Obama differed from the Clapper II court
and concluded that the constitutionality, statutory authority and efficacy of
the NSA's bulk metadata collection program is, at best, questionable. n95
Judge Leon used these distinctions of both scope and depth of surveillance to
establish that the NSA metadata program constituted a search for Fourth
Amendment purposes. n96 In a particularly remarkable analysis, Judge Leon
reasoned that the continuously expanding use of technology in the
everyday lives of most Americans justified a greater expectation of privacy
over information that is shared electronically, not an ever-shrinking realm
of protection over personal privacy. n97
Having established that a search occurred, Judge Leon considered the plaintiffs'
request for preliminary injunctive relief, finding that there was a [*87] significant
likelihood that the plaintiffs would succeed in demonstrating that the surveillance
and searches were unreasonable and, therefore, unconstitutional. To do so, he
touched upon the intrusive nature of the search and, differing significantly
from Judge Pauley in Clapper II, found that the government had not made a showing
that the NSA Metadata Program was necessary to the government's
counterterrorism efforts. n98
(Cyrus, senior business editor at Ars Technica, has reported for The Economist,
Wired, The New York Times, Deutsche Welle English, the Canadian Broadcasting
Corporation, Public Radio International, National Public Radio, the Australian
Broadcasting Corporation, B.A. in Political Economy from the University of California,
Berkeley and M.S. from the Columbia University Graduate School of Journalism;
January 1, 2015; http://arstechnica.com/tech-policy/2015/01/if-the-supreme-courttackles-the-nsa-in-2015-itll-be-one-of-these-five-cases/ -- JRS)
Roughly a year and a half since the first Snowden disclosures, there's already been
a judicial order to shut down the National Security Agency's bulk metadata
collection program. The lawsuit filed by Larry Klayman, a veteran conservative
activist, would essentially put a stop to unchecked NSA surveillance. And at the
start of 2015, he remains the only plaintiff whose case has won when fighting for
privacy against the newly understood government monitoring. However, it's
currently a victory in name onlythe judicial order in Klayman was stayed pending
the governments appeal.
Klayman v. Obama is only one of a number of notable national security and
surveillance-related civil and criminal cases stemming fully or partially from
the Snowden documents. In 2014, a handful of these advanced far enough
through the legal system that 2015 is likely to be a big year for privacy policy.
One or more could even end up before the Supreme Court.
"I think it's impossible to tell which case will be the one that does it, but I
believe that, ultimately, the Supreme Court will have to step in and decide
Trumanite network holds within its power something far greater than the ability to
recommend higher import duties or more windmills or even gargantuan corporate
bailouts : it has the power to kill and arrest and jail , the power to see and
hear and read peoples every word and action, the power to instill fear
and suspicion, the power to quash investigations and quell speech, the
power to shape public debate or to curtail it, and the power to hide its
deeds and evade its weak-kneed overseers. It holds, in short, the power
of irreversibility. No democracy worthy of its name can permit that power
to escape the control of the people.
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
Indeed, the ability to participate in and affect the political debate and process lies at
the heart of Lesson Five. Throughout the FISA debates, this fact was stated
dramatically over and over again, sometimes in dire tones by people with access to
Americas deepest held secrets such as Senator Frank Church, whose
committee reports in the wake of Watergate remain seminal sources to
this day. His analysis is stark, declaring that surveillance powers could: at
any time be turned around on the American people, and no American
would have any privacy left, such is the capability to monitor everything:
telephone conversations, telegrams, it doesnt matter. There would be no place
to hide . . . The NSA could impose total tyranny [and] we must see to it
this agency and all agencies that possess this technology operate within
the law and under proper supervision, so that we never cross that abyss.
That is the abyss from which there is no return.211
Senator Muskie put it more diplomatically at the very first hearing after the
Watergate break-in: In our democracy, the decision to invade the privacy of
an American citizen or of anyone living in America must be made with a
full regard for the constitutional rights which could thus be jeopardized.
Such a decision should not be made lightly or arbitrarily by the Executive
Branch . . . . It is governments first responsibility to safeguard the rights and
liberties of its citizens.212 Representative Drinan perhaps put it most cogently: It
should be remembered too that the liberty of the people is at least as
important as the marginal increment in intelligence information which we
acquire through the inherently indiscriminate method of electronic
surveillance. As the District Judge in the Pentagon Papers case cogently observed:
The security of the nation is not at the ramparts alone. Security also lies
in the value of our free institutions. 213
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
Finally, in 2013, the FISA court received an additional layer of insulation from review
when the Supreme Court decided Clapper v. Amnesty International. n82 In Clapper,
the Court rejected an opportunity to rule on the constitutional merits of many of the
post-9/11 changes to FISA by holding that the plaintiffs lacked standing to bring the
action. In a 5-4 opinion authored by Justice Alito, the Court held that plaintiffs' fear
that they would be subject to surveillance in the future was "too speculative" to
establish standing. n83
Ultimately, new laws, amendments to FISA, secret rulings of the FISA court, and
Clapper are partially responsible for landing us where we are today--in a
surveillance environment in which it is possible for the government to
collect data on essentially every phone call made in the United States. In
fact, in light of all of these changes, it would be unfair to place all of the blame on
the drafters of the original FISA statute for the Act's inability to weather the 9/11
storm and the concurrent technology revolution. Nonetheless, the reality is that
even without the Patriot Act, the FAA, and Clapper, FISA was destined to implode
because of fundamental flaws in its structure. FISA may have been ambushed by
subsequent events but it is not blameless for its own demise. FISA may no longer be
recognizable relative to its initial incarnation, but the seeds of its destruction in its
original structure surely are and they shed light on the lessons that FISA teaches for
the future. It is to those flaws and those lessons that we now turn.
Time is of the essence. After the Supreme Court's decision in Clapper, one
commentator wrote: "Absent a radical sea change from the courts, or more
likely intervention from the Congress, the coffin is slamming shut on the ability
of private citizens and civil liberties groups to challenge government
counterterrorism policies." n84 That ominous prognosis punctuates the
urgency of learning from the past if we are to halt the march toward
democracy's extinction, a march led by the very institutions that the
Framers created to sustain it.
(Waris Husain, Esq., adjunct professor at Howard University School of Law, faculty
adviser for Goler Teal Butcher International Moot Court Team, currently pursuing his
S.J.D. at American University Washington College of Law, writing a comparative
dissertation focusing on the Supreme Courts of the United States, Pakistan and
India, LL.M. in international human rights and international business from
Washington College of Law, JD Howard University, BA in government from the
College of William and Mary; Surveillance And Law Enforcement: Tools In The Fight
Against Terror In A Comparative Study Of The United States And Pakistan; 21 ILSA J
Int'l & Comp L 25; ILSA Journal of International & Comparative Law, Fall 2014 JRS)
A. Conclusion The continued proliferation of terrorism and the growing
trend of governments overriding their citizens' protections for a fair trial
and privacy require new methods that both ensure a nation's safety and
uphold its humanitarian, constitutional, and international values. The
General Assembly of United Nations affirmed that,
[R]espect for human rights and the rule of law [is] the fundamental basis for the
fight against terrorism . . . . [Member States] reaffirm[ed] that the promotion and
protection of human rights for all and respect for the rule of law are essential to all
components of the Strategy, and recognized that effective counterterrorism
measures and the protection of human rights are not conflicting goals, but
complementary and mutually reinforcing. n212
[*57] Therefore, it is incumbent upon nations to deal with terrorism in a
similar manner as other long running domestic criminal problems. Nations
like the United States and Pakistan must try to strike the fine balance
between security and freedom. In the alternative, if one is to concede the
invocations of the emergency rule that legitimize wholesale abrogation of
fundamental civil rights under certain circumstances, three phenomena
will occur concurrently, as they have been in the United States and Pakistan
recently. The executive branch will expand categorizations of "national
security" to be able to exclusively, secretively, and unilaterally control
more parts of the government, thereby disturbing the system of checks
and balances. The judicial branch will continue to both compromise its
own power by deferring to the executive branch, and lose institutional
power through the passage of anti-judiciary and anti-terrorism legislation
like the PATRIOT Act. Lastly, if current trend concerning the suspension of
constitutional protections for terrorism continues, it will challenge the
jurisprudence developed for over 200 years concerning the right of
citizens to privacy, dignity, information, and a fair trial.
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
Lesson Five is certainly related to Lesson One (Pay Attention to the Core Values of
the Republic). A government of the people, by the people, and for the
people is a core value distilled by Lincoln and known to every schoolchild in
America. As basic and obvious as it may seem, its relevance to questions about
next steps in the surveillance debate cannot be overstated. The simple
fact is that secrecy has bred distance between the government and the
governed in profound ways. Indeed, we have arrived at a point in our
history where government actions related to intelligence gathering are
only discernable if an individual commits a criminal actEdward Snowden
being the prime current example. While people disagree about his motives and how
he should be viewed and treated, few would argue with the fact that but for
Snowdens actions, the microscope under which we currently have placed
our surveillance policies would not exist. That fact should tell us
something: The government is acting in ways that do not respect Lincolns
words, which we drill into our children as a first lesson in civics.
The response to these assertions is that the threat is so extraordinary and
the pace of technology so breathtaking that there is nothing that can or
should be done to curb the governments expanding surveillance
practices. Yes, the argument goes, transparency in a democracy is important,
and yes, the people should participate in the decision-making that affects their lives
and rights, particularly the rights to expression and privacy, but those aspirations
must give way if we are to protect our democratic values. Absolute
secrecy and the pervasive gathering of information, aided by revolutionary
technologies that keep us safe, the argument concludes, are necessary
imperatives. In reality, to accept that argument is to end the argument.
Such reductionist logic can only result in the unbridled, unchecked
authority of the Executive Branch. It has the ring of the argument made
during the Vietnam War that we had to burn the village in order to save
it.198 It also assumes that the middle ground that FISA sought to achieve
in 1978, and which hopefully we continue to search for today, does not exist.
Former Virginia Attorney General Ken Cuccinelli and our colleague Mark Fitzgibbons
have published a new op-ed on the Fourth Amendment in the Washington Examiner
and it makes a point that has been all too overlooked in the debate over the future
of the Patriot Act and other Obama Fourth Amendment abuses.
"Americans do not and cannot trust government to be benevolent - nor
should they. This is part of the reason our Constitution was written as it
was in the first place. And this truth has been proven again and again in
modern times, by so many recent official misdeeds and falsehoods coming from
the mouthpieces of government - including prosecutorial misconduct that has had
grave consequences and serious criminal penalties for its victims."
What makes the Patriot Act debate stand out say Cuccinelli and Fitzgibbons is that
some people in positions of responsibility deny that there is even a Fourth
Amendment problem with arbitrarily collecting the metadata of all customer records
from telephone companies.
This mass collection is not merely an expansion of power beyond previous
Fourth Amendment interpretation they say, it also sets dangerous
precedent that all metadata is subject to government's taking without a
warrant signed by a judge after a showing of probable cause that the law may
have been violated.
"Metadata" is everywhere observe Fitzgibbons and Cuccinelli. It runs our websites
and social media pages and underlies the accounting and financial records of
businesses. Government is already banging on both of these doors, with the Federal
Communications Commission trying to seize control of the Internet and the
Consumer Financial Protection Agency claiming blank-check authority over business
records. A metadata "exception" to the Fourth Amendment could give
government unchecked power over business, free speech, freedom of
association, religious liberty and more.
Making matters worse, they say more than 300 federal statutes authorize
government agencies to issue "administrative subpoenas" unilaterally.
Bypassing neutral judges and probable cause, government agencies may
obtain private records of individuals and businesses, Fourth Amendment
be damned.
The Constitution's Bill of Rights was written in broad strokes in the context of the
era. The First Amendment freedom of the press, naturally extended to radio, then
television, neither of which existed when the Bill of Rights was adopted. The
Fourth Amendment's protections of "papers and effects," which are
private records and property, should naturally extend to metadata. The
(Luke M.; law professor at Univ. of Louisville; The Forgotten Right to Be Secure;
Hastings Law Journal, Vol. 65:713, Apr 2014; http://ssrn.com/abstract=2302850
JRS)
This Article locates a solution to the problem of regulatory delay in the text of the
Constitution. 13 The Fourth Amendment has traditionally been interpreted by courts
to safeguard a mere right to not be subjected to unreasonable searches or
seizures.14 In other words, the Amendment is read to guarantee nothing beyond
the right to be spared an unreasonable search or seizure.15 In 2013, the Supreme
Court reaffirmed the conventional spared reading of the Fourth Amendment in
Clapper v. Amnesty International.16 In Clapper, all nine Justices agreed that
communications surveillance programs do not violate an individuals Fourth
Amendment rights before the government succeeds in intercepting or acquiring
that individuals communications.17 The Court made clear, once again, that the
Fourth Amendment is not violated by attempts or threats to conduct an
unreasonable search or seizure.18 Nor are an individuals Fourth Amendment rights
violated by the existence of a vast surveillance program that happens to spare the
individual claimant. 19
The Fourth Amendment can be read, however, to safeguard more than a
right to be spared an unreasonable search or seizure.20 The Amendment
provides for [t]he right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures.21
Unlike its textual counterparts (such as search, seizure, and unreasonable),
the to be secure phraseology remains largely forgotten: it is treated on
mere occasion by commentators;22 and it has been left undefined in the case
law.23 Historical and textual analyses of to be secure, however, suggest
the existence of a Fourth Amendment right to protection against
unreasonable searches and seizures, and perhaps a right to be free from
fear against such government action. Support for these interpretations
of to be secure rest in the dictionary definitions of secure,24 the
structure of the Fourth Amendment,25 and founding-era discourse
concerning searches and seizures, which regularly emphasized the harms
attributable to the potentiality of unreasonable searches and seizures.26
(Megan; J.D. Candidate 2015, University of California, Hastings College of the Law;
The New Data Marketplace: Protecting Personal Data, Electronic Communications,
and Individual Privacy in the Age of Mass Surveillance Through a Return to a
Property-Based Approach to the Fourth Amendment; Hastings Constitutional Law
Quarterly; 42 Hastings Const. L.Q. 577 JRS)
The Relevant Statues Fail to Protect the Public When Agencies Exceed Their
Authority Under the Statutes In Jewel v. National Security Agency, a lawsuit filed by
the Electronic Frontier Foundation (EFF), a putative class of plaintiffs made up of
AT&T customers sought legal and equitable relief for violations of federal
constitutional rights, FISA, and ECPA.30 They alleged that the NSA, in cooperation
with AT&T, engaged in the collection of communications passing through AT&Ts
network at its Folsom Street Facility without satisfying the FISA and ECPA
requirements of reasonable suspicion that the target is a foreign power or agent and
reasonable suspicion that the information is relevant to a criminal investigation or to
an investigation to protect against international terrorism and spying.31 Many of the
EFFs allegations are supported by credible evidence and have been admitted, to
some extent, by the government.32 This lawsuit and other lawsuits filed over the
last five years demonstrate that, regardless of the constitutionality of FISA or ECPA,
FISA and ECPA provide little protection for the public when the government refuses
to adhere to them.33
ECPA and FISA are supposed to limit the collection and use of personal data and
electronic communications.34 The National Security Agencys mass surveillance
programs, conducted pursuant to ECPA and FISA, however, have swept up
massive amounts of data and content that would be ancillary to any
individual application for a wiretap. While this is a tremendous invasion of
privacy, the crux of the constitutional issue is that limits on the use of that
data and information have proven to be ineffective. So, not only is the NSA
abrogating its front end responsibilities and obligations under ECPA and FISA in
operation of its mass surveillance programs, the data and content are in turn being
improperly utilized in ordinary criminal prosecutions without any fallback protection
from the Fourth Amendment. Failure to comply with FISA and the ECPA is
what makes the Courts Fourth Amendment jurisprudence so critical. The
Fourth Amendment is the legal protection of last resort where Congresss
statutory protections have failed. It is the ultimate backstop.35
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
If the PCLOB is able to exert some degree of soft power in influencing national
security decision-making, then the judiciary represents hard power that could
be used to force the protection of civil liberties where it might not
otherwise occur. The FISC should be reformed to include a public advocate
lobbying on behalf of privacy concerns, making the process genuinely adversarial
and strengthening the FISC against charges that it merely rubber stamps
applications from the intelligence community. n190 Article III courts need to
follow the lead of Judge Leon in Klayman in conceptualizing privacy as broad
and defensible, even in a world where electronics-based communication is
dominant and relatively easy for the government to collect. If the judicial
defense of privacy were combined with the possibility of liability for
violations of that privacy, it is likely that this would incentivize increased
self-policing among the members of the intelligence community.
Ext: Tyranny/Democracy
Unfettered surveillance crushes freedom and privacy
Brand, 2015
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
To stress the importance of the relationship of the government to the governed is not a novel concept. The debates during the 1970s
Tunney demanded answers to the same questions that are relevant today: We want to know who, if anyone,
controls surveillance technology. And can we assure American taxpayers that their scarce dollars are being spent
for their benefit and not for the creation of an Orwellian nightmare that will haunt them and their children for
decades to come?201
Moreover, Tunneys frustration with the answers that had been forthcoming
echoed the frustration that many feel today: To date our investigations
have been discouraging. No one seems to be in charge. New technologies
are developed and seem to be allowed to speak without thought for their
future social and political ramifications or for the ease with which they can
be surreptitiously abused.
202
Senator Tunneys focus, as the name of his subcommittee implied, was on the impact of science and technology on
democratic institutions. The conversation about the relationship of the government to the governed, however,
extended well beyond those confines. It was also about the abuse of political power in the time of Watergate when,
in Senator Kennedys words, a blanket of fear had swept the country.203 Senator Tunney, in his opening remarks
quoted New York Times columnist James Reston, who had connected the dots between technology, power, and the
protection of our right, as citizens, to participate in our democracy. Reston observed that what has happened here
over the last postwar generation is that the scientific capacity to use the arts of wartime espionage on private
citizens has greatly expanded while the political capacity to control all this has actually declined.204
S. 1566. Senator Kennedy, the bills chief proponent, who had split with Senator Tunney over the legislation, fully
understood that the ability of a citizen to participate in our democracy was at stake. In November 1977, when he
presented the Judiciary Committees report regarding S. 1566 to the full Senate, Kennedy spoke directly to his
concerns about the chilling effect of surveillance on the populace at large, noting:
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
The importance of an independent judiciary to maintaining effective
checks and balances necessary to sustain the Republic has often been
cited from the likes of Thomas Jefferson to Andrew Jackson to modern figures who occupy varying positions along the political spectrum. Thomas
Jefferson surely understood the need for an independent judiciary despite being the most vocal of the Founding Fathers about the dangers of judicial
overreach:
The dignity and stability of government in all its branches, the morals of
the people and every blessing of society depend so much upon an upright
and skillful administration of justice, that the judicial power ought to be
distinct from both the legislative and executive and independent upon
both, that so it may be a check upon both, as both should be checks upon
that.140
Consider Jackson: All the rights secured to the citizens under the
Constitution are worth nothing, and a mere bubble, except guaranteed to
them by an independent and virtuous Judiciary .141
A bevy of modern commentators on all points on the political spectrum echo similar
thoughts from the likes of Caroline Kennedy (The bedrock of our democracy is the rule
of law and that means we have to have an independent judiciary, judges
who can make decisions independent of the political winds that are
blowing142) to President George W. Bushs Solicitor General Ted Olson ([I]n this country we
accept the decisions of judges, even when we disagree on the merits,
because the process itself is vastly more important than any individual
decision. Our courts are essential to an orderly, lawful society [which]
would crumble if we did not respect the judicial process and the judges
who make it work.143) to conservative columnist Charles Krauthammer (Let us have a bit of sanity
here. One of the glories of American democracy is the independence of the
judiciary. The deference and reverence it enjoys are priceless assets and
judicial independence and supremacy are necessary checks on the tyranny
of popular majorities.144).
Taken together, the Federalist papers formula for the separation of powers demanded a
precarious balance that required vigilance to maintain. Hamilton and Madison put it
this way: A dependence on the people is, no doubt, the primary control on the government; but experience has
taught mankind the necessity of auxiliary precautions.145 The separation of powers detailed in the new
Constitution has proved to be effective and durable and the necessary auxiliary precautions that Hamilton and
Madison envisioned. FISA, however, would prove to be otherwise.
some defenders
have said that it may well have been a mistake to in-elude [*17] the judiciary within
these procedures rather than let the President take full political responsibility for the use
constitutionally required, even to the point of including judicial and Congressional oversight of such surveillance. Indeed,
and abuse of such measures. This objection is a formidable one, requiring serious analysis of the scope and limits of both the President's executive power
combatants in the field without any "due process of law" and may indefinitely incarcerate prisoners of war for the duration of hostilities. Neither of these
measures can constitutionally be done to American citizens domestically in time of peace or war. Nor can they be done to foreign nationals in peacetime.
Those who would justify these programs under the war power are
abandoning the domestic model. Therefore, any reliance on Katz's
"reasonable expectation of privacy" doctrine, or Smith's "third-party
doctrine," are make-weights and merely confuse the issue. You cannot defend the
program using the "third-party" doctrine and then, when pressed on that
argument, change the subject to the war power. Any war power argument
must stand and fall on its own. Perhaps for this reason, in its recent brief in the ACLU's challenge to the NSA data
seizures, the government did not assert the war power and never denied that the Fourth Amendment applied to this situation. Although the
government does rely on a "national security" theory of why the program
is "reasonable" under the Fourth Amendment, even if it could be said to be
reasonable to seize the phone records of every American in the interest of
national security, this rationale cannot justify using the NSA data for
domestic law enforcement purposes--as we are learning may well have
occurred--or any other comparable data collection program that is used for domestic law enforcement purposes. That such
mission creep has already occurred, albeit in secret, underscores the
danger of allowing such bulk data seizures in the first place. [*18] That
defenders of this program will alternate between the domestic and war
models of constitutional power signals that the conflict in which we are
currently engaged does not fit neatly within either. The domestic model
assumes that government is using its police powers to protect the rights
of its citizens from others who are also members of the community. When
citizens are accused of violating the rights of others that define the social
compact, they deserve the benefit of the doubt before they are subjected
to punishment. And we must be very careful to protect the civil liberties of the people from those in law enforcement who would abuse
are typically limited to a geographically confined theater of combat. Wars between nations have both a beginning and end, and extraordinary war powers
expire with the conflict that necessitated their use. If the "cold war" between the United States and the USSR muddied the distinction between the
domestic and war powers of the Congress and the President, what is sometimes called the "long war" against radical Islamic NGOs has threatened its
If the battle ground is considered to include the territory of the United States, the enemy
is hidden among the population, and such conflicts know no definitive end,
adherence to the war power model threatens to completely subsume the
protections of civil liberties afforded by the domestic model. In essence,
the means of war are then turned against the People themselves to
identify an enemy within. Even if some blending of the models is warranted and that is what the original FISA and Patriot Acts
collapse.
were attempting to accomplish, it makes it all the more essential that the government not exceed the limits defined by these statutes.
Construing Section 215 as broadly as the government now urges, and the FISA court has ruled in its secret opinions,
threatens the very balance between the wartime and domestic models
that Congress was presumably trying to strike. For this reason, the courts should avoid the constitutional
issues by [*19] holding that Section 215 of the PATRIOT Act does not authorize the bulk seizure of the telephone and email communications records of all
Americans.
importantly, the broader lessons we should be taking away from the surveillance reform conversation that Snowden
started.
To understand the significance of these other authorities, itll help to describe their aims: Executive Order 12333,
issued in 1981, is directed at the overseas interception of communications both metadata and content of noncitizens outside the United States, who, under a 1990 Supreme Court decision, categorically lack Fourth
Amendment rights. The 2008 FISA Amendments Act was enacted to close a loophole that new technology had
helped to create, where non-citizens outside the United States were nevertheless communicating through servers
or other telecommunications infrastructure located stateside, which the government could not surveil under the
executive order.
But Executive Order 12333 and the 2008 FISA statute, by focusing on
individuals who fall outside the Fourth Amendment, capitalize on the lack
of constitutionally required individualized assessments and instead allow
the government to engage in bulk collection of such information as if it
were using an industrial vacuum cleaner to pick up individual particles of
dirt.
Its easy to see how these authorities could cause diplomatic headaches (as, for example, with the contretemps
most commentators
have assumed that, at least legally, the validity of these programs turns on their
overseas focus. After all, if the government is only targeting the communications of non-citizens outside the
surrounding U.S. surveillance of German Chancellor Angela Merkels cell phone). But
citizens and non-citizens lawfully present in the United States will also be
collected, albeit incidentally, as the government puts it. After all, when thousands of
unrelated emails and other electronic communications are bundled
together in a packet that travels through an Internet switch thats
physically located in the United States (for the 2008 statute) or overseas (for Executive
Order 12333), its simply not possible for the government to only collect the
communications between non-U.S. citizens and leave the others
untouched, any more so than its possible for a vacuum to segregate
particles of dirt.
To be sure, the U.S. government doesnt dispute that it routinely collects the
communications of U.S. citizens. Instead, it has argued that any potential for abuse is mitigated by
so-called minimization requirements procedural rules that require the relevant intelligence agency to take
steps to avoid the improper retention and use of communications collected under these authorities.
has been proven again and again in modern times, by so many recent official misdeeds and falsehoods coming from
the mouthpieces of government including prosecutorial misconduct that has had grave consequences and
serious criminal penalties for its victims.
For example, when the Benghazi attack occurred, killing four American diplomats, the Obama administration lied
and blamed a maker of an anti-Muslim film. And it is bad enough to see the IRS claiming to have "lost" emails and
allowing hackers to steal private taxpayer information from its systems. But that seems tame compared to other
malicious, targeted abuses of power against individuals, businesses and property.
so-called minimization requirements procedural rules that require the relevant intelligence agency to take
steps to avoid the improper retention and use of communications collected under these authorities.
The governments defense, as weve come to learn, is flawed in two vital respects: First, as several since-disclosed
opinions from the FISA Court have made clear,
Section 215.There is no question that, from a privacy perspective, these programs are far more pernicious than
havent. And although the 2008 FISA Amendments Act is also set to expire on December 31, 2017 the
debate over Section 215 leaves little reason to believe that well have it then, either.
NSA has panvasive access to all internet communication -violates the 1st and 4th amendments and SOP, but immune from
Court review
Slobogin, March 2015
(Christopher, Milton Underwood Professor of Law, Vanderbilt University Law School,
has been cited in almost 3,000 law review articles and treatises and more than 100
judicial opinions, including three U.S. Supreme Court decisions, Fulbright Scholar,
J.D., LL.M. University of Virginia
A.B. Princeton University; Symposium Issue: The Future of National Security Law:
Standing and Covert Surveillance; Pepperdine Law Review; 42 Pepp. L. Rev. 517
JRS)
Thanks to Edward Snowden,
images of millions of Yahoo users since at least 2008.13 A newly disclosed malware program known as Turbine
allegedly allows the NSA to hack into computers, computer networks, and phone networks.
One
calculation holds that the NSA touches roughly half of all Internet
communications and that, because 68% of those communications are spam, the agency may have
access to all meaningful communication on the Internet. 16
Most of this surveillance takes place without any type of judicial authorization,
17 or is authorized only by the Foreign Intelligence Surveillance Court (FISC), which operates i n
secret.18 Although regulation of these practices has recently ramped up, even today the decision
about what to collect and what to target and query is largely in the hands
of executive agency officials.19 Thus, good arguments can be made that
much, if not all, of this surveillance is unconstitutional under the Fourth
Amendment, the First Amendment, separation of powers doctrine, or
some combination thereof.20 But these arguments may never be fully
fleshed out in the courts because of the Supreme Courts standing
doctrine.
14 Today Turbine affects thousands of people but it is predicted to soon to reach millions.15
legal
and policy constraints on intelligence gathering were loosened
significantly in the wake of the September 11 attacks. As discussed below, the PATRIOT Act
prevent the attacks of September 11 was not attributable to a lack of legal authority. n8 Nonetheless, the
arguably authorized the collection and storage of domestic telephony and internet metadata n9 and the collection
and content searches [*73] of substantial amounts of foreign telephone and internet communications, n10 thereby
giving the intelligence community a much larger "haystack" of information from which to attempt to glean details of
emerging and ongoing terrorist threats. n11 This shift generated critiques from civil libertarians and lawmakers, n12
However, the tenor of the public debate became more contentious in June 2013, when then-National Security
Agency (NSA) contractor Edward Snowden began revealing classified documents detailing the scope of NSA
surveillance on foreign and U.S. persons in order to prompt public scrutiny and debate over the programs. Snowden
revealed, among many other things, that the NSA was engaged in the practice of collecting and retaining the
metadata of all U.S. telephone customers for five years (the "NSA Metadata Program"), and had been running
searches through that metadata when there was a "reasonable, articulable suspicion" that a particular telephone
number was associated with potential terrorist activity. n14
This program - with its broad scope, lack of particularized suspicion, and lengthy duration of data retention provides a useful vehicle through which to analyze the question of meaningful accountability over warrantless
government surveillance more generally. n15 Snowden's revelations over the year following the publication of his
initial disclosure continued to foster debate and demands for [*74] better oversight of the NSA. n16 The
administration initiated various review mechanisms, n17 Congress convened oversight hearings, n18 and the public
engaged in a vigorous debate as to the legality, efficacy, and morality of the NSA's activities, particularly the bulk
collection and retention for several years of telephony and internet metadata of U.S. persons.
storage of data. n25 Compounding these statutory authorities, the executive branch has likely sought its own
nonpublic legal guidance in the form of secret legal opinions from the Office of Legal Counsel memoranda n26 and
other Department of Justice memoranda defending the legality and efficacy of the surveillance program. n27
The surveillance and data collection that are part of the NSA Metadata
Program have been largely validated by two forms of relatively weak
judicial review: Article III courts have, until recently, largely refused to
hear the merits of cases challenging the government surveillance, instead
finding that plaintiffs are unable to satisfy the standing requirement , n28 or
dismissing suits at the pleadings stage due to invocations of the state
secrets privilege by the government. n29 The Foreign Intelligence Surveillance Court
(FISC), tasked with determining the legality of many of the government's surveillance requests , has largely
acquiesced to the government's requests over the years. n30 Cases litigated after the Snowden
revelations of June 2013 suggest, however, that the judicial deference offered to the government in
many previous counterterrorism cases may be curtailed in light of public attention and
critique of the NSA Metadata Program, as well as a [*76] reinvigorated
judicial embrace of the privacy protections embodied in the Fourth
Amendment. n31
(Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and
Global Justice, University of San Francisco School of Law. Dean, University of San
Francisco School of Law, 1999-2013. A.B., University of California, Berkeley, 1966;
J.D., University of California, Berkeley, 1969; Eavesdropping on Our Founding
Fathers: How a Return to the Republic's Core Democratic Values Can Help Us
Resolve the Surveillance Crisis; Harvard National Security Journal; 6 Harv. Nat'l Sec.
J. 1 JRS)
The notion of the separation of powers assumes that each branch of government is accountable to the citizenry for
share responsibility for the most sensitive intelligence activities and show that our system of checks and balances
example, responding to charges that the FISA courts secrecy would undermine its integrity and the ability to check
Executive Branch actions, Senator Kennedy responded in ways that future events would prove devastatingly
inaccurate:
There is no judicial secrecy today [at the time of FISAs consideration], because the courts are not part of the
process at all. It is the executive branch that exercises the secret and uncontrolled discretion, free from any
statutory restraint. And even if a lenient judge is quick to rubberstamp 99 out of 100 applications, the everpresent
possibility that this application will be the one rejected by the court should act as an effective deterrent for
abuses.179
the September 11, 2001 attacks, the court approved 14,036 warrants and did not reject any. The eleven denials
came after 2002, but in the ten-year period from 2002 to 2012, the court granted 19,906 warrants, 6,804 more
warrants granted than in the twenty-one years preceding the attacks. As noted, former FISA court judge James
Robertson, now a critic of the court and a proponent for its reform, denied that the court acted as a rubber
stamp.181 The statistics, however, overwhelmingly suggest otherwise. Senator Kennedys hoped for a deterrent
proved to be a pipedream.
(Martin Flumenbaum and Brad S. Karp are members of Paul, Weiss, Rifkind, Wharton
& Garrison. Philip S. May, a litigation associate at the firm, assisted in the
preparation of this column; Government Collection of Telephone Metadata Exceeds
Statute's Authority; New York Law Journal;
http://www.newyorklawjournal.com/id=1202730150541/Government-Collection-ofTelephone-Metadata-Exceeds-Statutes-Authority#ixzz3eTbTl25G JRS)
Plaintiffs also mounted constitutional challenges to the
program, arguing that even if the telephone metadata program was authorized by
statute, it violated the First and Fourth Amendments . Because the court found the program
exceeded its statutory authorization, the court did not analyze plaintiffs' First Amendment claims and
discussed the Fourth Amendment claims without reaching a conclusion .
In discussing the Fourth Amendment implications of the telephone metadata program, the court noted
the particularly complicated notions of privacy following the Supreme
Court's decision in U.S. v. Jones,21 in which five of the Supreme Court justices,
speaking through concurring opinions, suggested that a surveillance program that takes
into account large amounts of information generated in the digital age by
carrying out routine tasks might violate the Fourth Amendment. The court also
Constitutional Claims.
noted that, at the time the case was decided, Congress was debating the U.S. Freedom Act of 2015, which had just
passed the House Judiciary Committee, and could moot the issues presented by the telephone metadata program in
its current form.
Judge Sack's Concurrence. Sack issued a concurring opinion to "offer[ ] several additional observations about the
import of [the] decision."22 Sack observed that because the court's decision turned on the statutory authority for
the program rather than its constitutionality, Congress could overturn the decision by explicitly authorizing such a
program. Sack also discussed the challenges the FISC and all Article III courts face in closing their doors to
adjudicate issues of classified and sensitive materials. He discussed the importance of adversary proceedings in our
court system, even when the courtroom doors must be sealed to the general public, analogizing FISC hearings to
the Pentagon Papers case.23
called upon once again to determine the legality of future surveillance programs.
(Kelsey, J.D., UF Levin College of Law (Expected 2016), B.A., University of Florida,
Political Science and Women's Studies; How USA Freedom Impacts Ongoing NSA
Litigation; https://www.eff.org/deeplinks/2015/06/how-usa-freedom-impactsongoing-nsa-litigation -- JRS)
First Unitarian v. NSA solely targets the NSAs bulk collection of telephone records. In First Unitarian, EFF is
pursuing First Amendment, Fourth Amendment, and statutory challenges to this program, so the passage
of USA Freedom will have an impact on our claims. While the court denied EFFs most recent request for a hearing,
EFF will continue to pursue these claims to ensure that the court fully considers the issues raised by the NSAs
phone records program.
Jewel v. NSA is EFFs longest-standing case against the NSAs dragnet surveillance. Jewel challenges the NSAs bulk
USA
Freedom addresses the bulk collection of telephony metadata, but it
notably neglects the collection of Internet communications under Section
702 of the FISA Amendment Act. The court ruled for the government on
EFFs Fourth Amendment challenge to the collection of Internet content
(and EFF is appealing this decision in the Ninth Circuit), but the court has yet to rule
on the constitutionality or permissibility of the mass surveillance of telephone records. In addition to
pursuing our appeal in the Ninth Circuit, EFF will continue to push forward on our
other claims in the district court.
Expect similar issues to arise in other NSA spying cases that EFF has supported as an
amicus Klayman v. Obama and ACLU v. Clapper. Currently, Klayman is under review following
oral argument in the D.C. Circuit, which is considering the district courts ruling that the bulk
collection of telephony metadata, the collection of Internet metadata, and Internet content surveillance.
collection of telephone records is likely unconstitutional. Klayman recently filed a supplemental brief stressing the
importance of the appeal continuing despite USA Freedom given the NSAs pattern of illegal and unconstitutional
acts for an extended period of time. Meanwhile, the Second Circuits historic ruling in Clapper not only held the
bulk collection of telephone records exceeded congressional authorization, it also directly raised the possibility of
Congress addressing the NSAs reliance on Section 215 of the Patriot Act for its telephone records program.
Congress has since spoken with the passage of USA Freedom, so the extent of the Second Circuits deference to
Congress relating to the 180-day transition period will be a significant issue as it considers supplemental briefing
from the parties on whether the ACLUs claim is moot.
Richard Raysman is a partner at Holland & Knight and Peter Brown is the principal at
Peter Brown & Associates; How Has Digital Ubiquity Affected Fourth Amendment
Law?; New York Law Journal;
http://www.newyorklawjournal.com/id=1202728535476/How-Has-Digital-UbiquityAffected-Fourth-Amendment-Law#ixzz3eVZI52AM
http://www.newyorklawjournal.com/id=1202728535476/How-Has-Digital-UbiquityAffected-Fourth-Amendment-Law#ixzz3eVYB5zo9 JRS)
Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information
about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history
that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with
unwanted
disclosure of such information can be highly damaging.
Perhaps in no situation can such disclosure be as injurious as when the
recipient of the information is a representative of law enforcement. Given the
even a rudimentary technical knowledge of the device's operating system. Needless to say,
protection from an unreasonable search and seizure enumerated in our constitution that give ballast to notions of
privacy and autonomy, questions have arisen from the Founding as to when a law enforcement search can square
That the
devices now function as virtual warehouses of information has
with these rights, particularly when it is effectuated without the imprimatur of a warrant.
aforementioned
(Andrew, Professor, Fordham Law School; Faculty Adviser to the Center on National
Security at Fordham Law; J.D., Yale Law School, A.B., Harvard College, formerly
Climenko Fellow at Harvard Law School, attorney in private practice, and federal
judicial clerk; Essay: Disappearing Legal Black Holes And Converging Domains:
Changing Individual Rights Protection In National Security And Foreign Affairs;
Columbia Law Review; 115 Colum. L. Rev. 1029 JRS)
B. Role and Self-Conception of the Supreme Court and Federal Judiciary
Certain institutional changes within the U.S. government, notably the rise to prominence and power of the Supreme
Today, the
Court's fairly aggressive vision of judicial supremacy, especially in the
area of individual rights, is clearly supportive of further convergence and
closing of legal black holes.
Court, seem conceptually and historically linked to convergence and closing of legal black holes.
In Marbury v. Madison, the Court sketched a very limited role for judicial review. First, the Court emphasized that its
duty and power to say what the law was could properly be exercised only in service of the court's duty to provide a
remedy for violations of an individual's private right. n206 Second, the Court broadly described categories of
"political" issues that could not be decided judicially but lay within the "constitutional or legal discretion" of another
branch. n207 And, famously, the Court exercised the power of judicial review in service of limiting the Court's power
in the particular case before it and ducking confrontation with the President and Congress.
But in a gradual process spanning centuries, the modern imperial Court emerged from these humble beginnings. Only two acts of
Congress were declared unconstitutional in the entire period prior to the Civil War (in Marbury and Dred Scott). n208 The pace
The
Court barely maintains any longer the fiction that it decides constitutional
issues only when it unavoidably must to protect an individual's private
rights. It is often very self-conscious and forthright about its modern role
of declaring constitutional doctrines and rules that will operate prospectively as binding rules of
law applicable [*1070] to all government actors facing circumstances within the scope of those rules or doctrines. n210 The
scope, density, and ambition of the modern Court's constitutional
jurisprudence are astounding. It is difficult to think of any important area of social, political, economic, or
quickened over the subsequent decades. As of 2002, a Government Printing Office publication had counted 157. n209
The Court is less and less willing to see any zones of U.S. government
activity as categorically immune to judicial review and oversigh t. n211 At the
Supreme Court level, if not yet in the lower federal courts, the scope of things considered nonjusticiable political
questions has shrunk. Out of quasi-departmentalist beginnings, the modern Court has decided that it "alone among
the three branches has been allocated the power to provide the full substantive meaning of all constitutional
liberties.
Among the many cases percolating through the courts involving the use of
cell site geo-location data, one case to definitely watch is that of United States v.
Graham. Argued before the Fourth Circuit in December, the case
challenges the governments warrantless collection of historical cell cite
location data for a whopping 221 days. At issue is whether or not the
suspect retains a reasonable expectation of privacy in the data even
though it had been transmitted to a third party doctrine the cell phone
provider.
The 11th Circuit addressed an analogous issue in United States v. Davis,
concluding that the government does need a warrant to collect historical
cell site data. (See Jennifer Granicks discussion of the case here.) And its an issue
thats been addressed by the Third Circuit as well. My prediction: A Circuit split,
if one develops, will spark Supreme Court review. (See Orin Kerrs discussion
of some related cases here.)
(Cyrus, senior business editor at Ars Technica, has reported for The Economist,
Wired, The New York Times, Deutsche Welle English, the Canadian Broadcasting
Corporation, Public Radio International, National Public Radio, the Australian
Broadcasting Corporation, B.A. in Political Economy from the University of California,
Berkeley and M.S. from the Columbia University Graduate School of Journalism;
January 1, 2015; http://arstechnica.com/tech-policy/2015/01/if-the-supreme-courttackles-the-nsa-in-2015-itll-be-one-of-these-five-cases/ -- JRS)
Klayman filed his federal lawsuit at the District of Columbia District Court on June 6, 2013, the day after the first
published disclosures from the Snowden leaks. That initial revelation showed that Verizon routinely handed over all
metadata on its customers to the NSA. So as a Verizon customer, Klayman argued that his constitutional rightsnot
to mention the rights of all other Verizon customerswere violated as the result of this data handover. The
government relied on the third-party doctrine in its defense.
Judge Richard Leon, a Republican appointee, agreed with Klaymans argument. As he wrote in a December
16, 2013 memorandum opinion: Indeed, the question in this case can more properly be
styled as follows: when do present-day circumstancesthe evolutions in
the Government's surveillance capabilities, citizens' phone habits, and the
relationship between the NSA and telecom companiesbecome so
thoroughly unlike those considered by the Supreme Court 34 years ago
that a precedent like Smith simply does not apply? The answer,
unfortunately for the government, is now.
In sum, the Smith pen register and the ongoing NSA Bulk Telephony
Metadata Program have so many significant distinctions between them
that I cannot possibly navigate these uncharted Fourth Amendment
waters using as my North Star a case that predates the rise of cell phones.
Unlike any of the other metadata-related cases thus far, Judge Leon ordered the government
to immediately halt the Bulk Telephony Metadata Program and to destroy
"any such metadata in its possession that was collected through the bulk
collection program." However, he noted, "in light of the significant
national security interests at stake in this case and the novelty of the
constitutional issues, I will stay my order pending appeal."
In early November 2014, Klayman arrived at that appeal. The case was heard again,
this time before the District of Columbia Circuit Court of Appeals. A ruling is
expected in the forthcoming months.
Klayman is likely the first domino. There are a few other current cases
making similar claims, and one is from June 2013 in fact. Like Klayman, Smith v. Obama
argues that the government is violating plaintiff Anna Smith's rights by routinely
collecting her metadata. Initially, a lower federal court in Idaho found that Smith "has no expectation of
privacy in the telephone numbers that she dials." The case was heard at the 9th Circuit Court of Appeals in Seattle
in December, and that appellate court is likely to rule sometime early in 2015.
Jones and Riley signal the Court is aware of the need for
change
Farivar 2015
(Cyrus, senior business editor at Ars Technica, has reported for The Economist,
Wired, The New York Times, Deutsche Welle English, the Canadian Broadcasting
Corporation, Public Radio International, National Public Radio, the Australian
Broadcasting Corporation, B.A. in Political Economy from the University of California,
Berkeley and M.S. from the Columbia University Graduate School of Journalism;
January 1, 2015; http://arstechnica.com/tech-policy/2015/01/if-the-supreme-courttackles-the-nsa-in-2015-itll-be-one-of-these-five-cases/ -- JRS)
the government's general
justification for the legality of bulk metadata collection: the third-party
doctrine.
Before outlining the relevant cases, it's important to note
This theory was codified most recently from a 1979 Supreme Court decision in Smith v. Maryland. In the case, the
court found that individuals do not have an inherent privacy right to data that has already been disclosed to a third
party. So with telecom data for instance, the government has posited that because a call from one person to
another forcibly transits Verizons network, those two parties have already shared that data with Verizon. Therefore,
the government argues, such data can't be private, and its OK to collect it.
legal experts say that recent surveillance and privacy Supreme Court
decisions could lead the courts to reconsider . The first Snowden revelation (published in
But
June 2013) was that Verizon (and presumably other telecom firms) are routinely handing over all call records to the
NSA. The metadata records include the date, times, and lengths of the calls.
In October 2013, the third-party doctrine was upheld. A Foreign Intelligence Surveillance Act Court (FISA Court)
judge ruled that there was no privacy interest in such metadata collected and analyzed by the NSA. In short, if it's
OK to collect third-party data on one person, it's OK to collect it on a bunch of people.
Put another way, where one individual does not have a Fourth Amendment interest, grouping together a large
number of similarly situated individuals cannot result in a Fourth Amendment interest springing into existence ex
nihilo.
In sum, because the Application at issue here concerns only the production of call detail records or "telephony
metadata" belonging to a telephone company, and not the contents of communications, Smith v. Maryland compels
the conclusion that there is no Fourth Amendment impediment to the collection. Furthermore, for the reasons stated
inand discussed above, this Court finds that the volume of records being acquired does not alter this conclusion.
Indeed, there is no legal basis for this Court to find otherwise.
two recent Supreme Court cases: United States v. Jones (2012) and Riley v.
California (2014). Both were decided by rare unanimous opinions , and both indicate an
awareness that modern tech has changed reasonable privacy. Jones determined
But consider
that law enforcement does not have the authority to place a GPS tracker on a suspect without a warrant.
Meanwhile, the court found in Riley that law enforcement cannot search a persons phone incident to arrest without
a warrant.
"[These cases] are strong signs that the Supreme Court is aware that rules
that were created in a period of time when the court analyzed targeted
surveillance do not blindly apply where the government is collecting huge
quantities of information," Patrick Toomey, an attorney with the American Civil Liberties Union, told
Ars.
world and given the sweeping surveillance powers given to the U.S.
intelligence community under the Patriot Act.
Over the last few years, however, mobile phones have begun to carve out their own
legal niche separate from landlines.
In 2014, the U.S. Supreme Court ruled in Riley v. California that in order to
search a mobile phone confiscated in an arrest, law enforcement officials
must first obtain a warrant.
Chief Justice John Roberts noted in the majority opinion: Modern cell phones
are not just another technological convenience. With all they contain and
all they may reveal, they hold for many Americans the privacies of life.
The fact that technology now allows an individual to carry such
information in his hand does not make the information any less worthy of
the protection for which the founders fought.
Less than a year later, the Second Circuit Court of Appeals ruled in ACLU v. Clapper that section 215 of the Patriot
Act, which allowed for the collection of mobile phone metadata, was unconstitutional. The ruling was seen by many
as spurring Congress to pass the Freedom Act, which shifted the burden of bulk collection from the intelligence
community where the data therein could be accessed at will to the wireless service providers, who now have to
retain the data for an unspecified amount of time so it can be accessed by the government with a proper warrant.
Shifting the burden has left deep concerns and unanswered questions. Key among those is who is issuing the
warrants?
Currently, warrants for any kind of international communication are issued to federal agents by the Foreign
Intelligence Surveillance Court, a rotating panel of 11 judges whose identities are secret and who meet in
Washington, D.C.
The proceedings of these meetings are also secret. In response to what is perceived by many as a continued
invasion of privacy, several tech companies have started to look at encrypting phone data, which has caused the
government to begin to look at diluting such encryption so it is still accessible to law enforcement.
From a letter sent to the Obama administration by several technology leaders and civil rights groups: More than
undermining every Americans cybersecurity and the nations economic security, introducing new vulnerabilities to
weaken encrypted products in the U.S. would also undermine human rights and information security around the
globe. If American companies maintain the ability to unlock their customers data and devices on request,
governments other than the United States will demand the same access, and will also be emboldened to demand
the same capability from their native companies. The U.S. government, having made the same demands, will have
little room to object.
constitutionality of the Military Commissions Act, which was later declared unconstitutional by the United States
Supreme Court in Boumediene v. Bush. But one judge, Judge David Sentelle, who is known as a national security
expert, joined the DC Circuit's opinion, another judge, Judge Janice Rogers Brown, a conservative with a decided
libertarian bent, dissented. The third judge on Klayman's panel is the 78-year-old Stephen Williams, appointed by
Ronald Reagan."
Brian Owsley, himself a former federal district judge in Texas and now a
law professor at Indiana Tech, told Ars that he didnt think that partisan
politics was a good predictor of outcomes. "There are people on both the
right and the left who are finding common ground in voicing a myriad of
privacy concerns."
However, Radack, Snowdens lawyer, thinks Klayman will face an uphill
battle.
"Judges Brown and Sentelle are the more conservative justices on the panel and are very
likely to defer to agency authority in this case as they have in the past
(Sentelle wrote an opinion in 2010 arguing that the right of habeas corpus does not extend to those detained at
The government has admitted it collects metadata for all of our telephone communications, but says
the data collected does not include the content of the calls.
In response to lawsuits challenging the constitutionality of the program, two federal judges
The judicial analyses of both Leon and Pauley turn on their differing
interpretations of the 1979 U.S. Supreme Court decision, Smith v. Maryland. In Smith, a
robbery victim reported she had received threatening and obscene phone
calls from someone who claimed to be the robber. Without obtaining a
warrant, the police installed a pen register, which revealed a telephone in
the defendant's home had been used to call the victim. The Supreme Court
held that a person has no reasonable expectation of privacy in the
numbers dialed from his telephone because he voluntarily transmits them
to his phone company.
Leon distinguished Smith from the NSA program, saying that whether a pen register constitutes a "search" is "a far
cry from the issue in [the NSA] case." Leon wrote, "When do present-day circumstancesthe evolution of the
Government's surveillance capabilities, citizens' phone habits, and the relationship between the NSA and telecom
companiesbecome so thoroughly unlike those considered by the Supreme Court thirty-four years ago that a
precedent like Smith simply does not apply? The answer, unfortunately for the Government, is now."
Then Leon cited the 2012 Supreme Court case of United States v. Jones, in which five justices found that law
enforcement's use of a GPS device to track the movements of a vehicle for nearly a month violated a reasonable
expectation of privacy. "Significantly," Leon wrote, "the justices did so without questioning the validity of the Court's
1983 decision in United States v. Knotts, that the use of a tracking beeper does not constitute a search because '[a]
person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his
movements from one place to another.'" Leon contrasted the short-range, short-term tracking device used in Knotts
with the constant month-long surveillance achieved with the GPS device attached to Jones's car.
Unlike the "highly-limited data collection" in Smith, Leon noted, "[t]he NSA
telephony metadata program, on the other hand, involves the creation
and maintenance of a historical database containing five years' worth of
data. And I might add, there is the very real prospect that the program
will go on for as long as America is combating terrorism, which
realistically could be forever!" He called the NSA program "effectively a
joint intelligence-gathering operation [between telecom companies and]
the Government."
"[T]he almost-Orwellian technology that enables the Government to store
and analyze the phone metadata of every telephone user in the United
States is unlike anything that could have been conceived in 1979," Leon
exclaimed, calling it "the stuff of science fiction." He cited Justice Scalia's opinion in Kyllo v. United States, which
held the use of a thermal imaging device, that measures heat waste emanating from a house, constitutes a
"search." Justice Scalia was concerned about increasing invasions of privacy occasioned by developing technology.
Leon wrote, "I
Quoting Justice Sotomayor's concurrence in Jones, Leon noted the breadth of information our cell phone records
reveal, including "familial, political, professional, religious, and sexual associations."
Having determined that people have a subjective expectation of privacy in their historical record of telephony
metadata, Leon turned to whether that subjective expectation is one that society considers "reasonable." A
"search" must ordinarily be based on individualized suspicion of wrongdoing in order to be "reasonable." One
exception is when there are "special needs," beyond the need for ordinary law enforcement (such as the need to
protect children from drugs).
"To my knowledge, however, no court has ever recognized a special need sufficient to justify continuous, daily
searches of virtually every American citizen without any particularized suspicion," Leon wrote. "In effect," he
continued, "the Government urges me to be the first non-FISC judge to sanction such a dragnet."
Leon stated that fifteen different FISC judges have issued 35 orders
authorizing the metadata collection program. But, Leon wrote, FISC Judge
Reggie Walton determined the NSA has engaged in "systematic
noncompliance" and repeatedly made misrepresentations and inaccurate
statements about the program to the FISC judges. And Presiding FISC
Judge John Bates noted "a substantial misrepresentation [by the
government] regarding the scope of a major collection program."
Significantly, Leon noted that "the Government does not cite a single instance in which analysis of the NSA's bulk
metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving any
objective that was time-sensitive in nature."
Pauley's analysis of the Fourth Amendment issue was brief. He explained that prior to the September 11th terrorist
attacks, the NSA intercepted seven calls made by hijacker Khalid al-Mihdhar to an al-Qaeda safe house in Yemen.
But the overseas signal intelligence capabilities the NSA used could not capture al-Mihdhar's telephone number
identifier; thus, the NSA mistakenly concluded that al-Mihdhar was not in the United States. Pauley wrote:
"Telephony metadata would have furnished the missing information and might have permitted the NSA to notify the
Federal Bureau of Investigation (FBI) of the fact that al-Mihdhar was calling the Yemeni safe house from inside the
United States."
"If plumbed," Pauley noted, the telephony metadata program "can reveal a rich profile of every individual as well as
a comprehensive record of people's association with one another." He noted, "the Government acknowledged that
since May 2006, it has collected [telephony metadata] for substantially every telephone call in the United States,
including calls between the United States and a foreign country and calls entirely within the United States."
But, unlike Leon, Pauley found Smith v. Maryland controls the NSA case. He quoted Smith: "Telephone users ...
typically know that they must convey numerical information to the telephone company; that the telephone
company has facilities for recording this information; and that the telephone company does in fact record this
information for a variety of legitimate business purposes." Thus, Pauley wrote, when a person voluntarily gives
information to a third party, "he forfeits his right to privacy in the information."
While Leon's distinction between Smith and the NSA program turned on the breadth of information collected by the
NSA, Pauley opined, "The collection of breathtaking amounts of information unprotected by the Fourth Amendment
does not transform that sweep into a Fourth Amendment search." And whereas Leon's detailed analysis
demonstrated how Jones leads to the result that the NSA program probably violates the Fourth Amendment, Pauley
failed to meaningfully distinguish Jones from the NSA case, merely noting that the Jones court did not overrule
Smith.
Leon's decision is the better-reasoned opinion.
Looking ahead
This issue is headed to the Court of Appeals. From there, it will likely go
the Supreme Court. The high court checked and balanced President George
W. Bush when he overstepped his legal authority by establishing military
commissions that violated due process, and attempted to deny
constitutional habeas corpus to Guantanamo detainees. It remains to be
seen whether the court will likewise refuse to cower before President
Barack Obama's claim of unfettered executive authority to conduct
dragnet surveillance. If the court allows the NSA to continue its metadata
collection, we will reside in what can only be characterized as a police
state.
On the policy side, both the Congressionally mandated Privacy and Civil
Liberties Oversight Board (PCLOB) and the presidents Review Group on
Intelligence and Communications Technologies (RGICT) recommended that
the metadata collection program should end as they currently exist.
PCLOB, in particular, concluded in January 2014 that the governments metadata collection program "lacks a viable
legal foundation under Section 215 [of the Patriot Act], implicates constitutional concerns under the First and Fourth
Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited
value As a result, the board recommends that the government end the program."
The RGICT recommended that the NSA not be allowed to hold all that metadata in-house. Either way, both
conclusions are simply advisorythey are not binding law by any means. The metadata program still functions in
essentially the same way that it did before the American public heard of Edward Snowden.
"Over
the last year, the governments privacy boards have taken the view
that this unusually intrusive program is unnecessary," Patrick Toomey, an attorney
with the American Civil Liberties Union (ACLU), told Ars. "Im hopeful that [the appellate court] will find that this is
(Linda, Pulitzer Prize winner, Senior Research Scholar in Law, the Knight
Distinguished Journalist in Residence, and Joseph Goldstein Lecturer in Law at Yale
Law School, NYT writer on the Supreme Court and the law since 1978, BA Radcliffe
(Harvard) and Masters from Yale Law; Weve Got Your Number; Jan. 22, 2014;
http://www.nytimes.com/2014/01/23/opinion/greenhouse-weve-got-yournumber.html?_r=0 JRS)
This case, Smith v. Maryland, was no big deal in its day . (And the defendant in the gardenvariety case that led to the decision was no criminal mastermind -- he was making harassing calls from his home
phone.) The majority opinion was only 11 pages long. There were three dissenting votes, but the dissenting
opinions lacked passion. After Justice Blackmun circulated his final draft in June 1979, Chief Justice Warren E. Burger
responded by agreeing that the urge for privacy does not rise to the level of a constitutionally protected right. The
chief justice added that Congress could require a warrant but the Constitution does not.
He ended his note with a lighthearted P.S.: Im going to use a public phone for my calls to my bookie.
Thirty-five years later, telephones and their users privacy concerns are obviously no
joking matter. They are the question of the hour. Constitutional challenges to the National Security Agencys bulk
telephone data collection produced opposing Federal District Court rulings last month, and the issue
appears
Meanwhile, the justices last week accepted two cases with less obvious national security implications
but much greater relevance to many Americans: whether the police need a warrant in order to search
the contents of a cellphone of a person they have just arrested. These cases, United States v. Wurie
and Riley v. California, will probably be argued in April and decided in June.
All the cases will be dissected in minute detail in the coming months, but thats not my goal here. Im
interested in the ultimate answers, of course, but what I find most intriguing at the moment is
watching how judges respond to the challenge of figuring out how old precedents fit with new realities.
The fit is awkward at best; the Supreme Courts description of a pen register -- a mechanical
device that records on a paper tape the numbers dialed on a telephone by monitoring the electrical impulses
how the law develops in a system ostensibly governed by precedent, the progress of these cases promises to be the
best show in town.
only after robust public debate and a constitutional amendment that is itself worded specifically enough to govern
As for Section 702 of FISA, the Supreme Court has held that the Fourth Amendment does not protect foreigners
from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant
requirement when foreign-targeted searches result in the collection of vast stores of citizens communications.
precedent under the Constitution for the governments seizing such vast
amounts of revealing data on innocent Americans communications.
The government has made a mockery of that protection by relying on
select Supreme Court cases, decided before the era of the public Internet
and cellphones, to argue that citizens have no expectation of privacy in
either phone metadata or in e-mails or other private electronic messages
that it stores with third parties.
This hairsplitting is inimical to privacy and contrary to what at least five
justices ruled just last year in a case called United States v. Jones. One of the most conservative
justices on the Court, Samuel A. Alito Jr., wrote that where even public information
about individuals is monitored over the long term, at some point,
government crosses a line and must comply with the protections of the
Fourth Amendment. That principle is, if anything, even more true for
Americans sensitive nonpublic information like phone metadata and social
networking activity.
We may never know all the details of the mass surveillance programs, but we know this: The
administration has justified them through abuse of language, intentional
evasion of statutory protections, secret, unreviewable investigative
procedures and constitutional arguments that make a mockery of the
governments professed concern with protecting Americans privacy. Its
time to call the N.S.A.s mass surveillance programs what they are:
criminal.
search of a cell phone was unconstitutional; later expressing qualms about the warrantless search of data located in
Care Act, argued the 2004 medical marijuana case of Gonzalez v. Raich before the U.S. Supreme Court, won 2008
Guggenheim Fellowship in Constitutional Studies, publications include more than one hundred articles and reviews,
as well as nine books, including Restoring the Lost Constitution: The Presumption of Liberty, Oxford Introductions to
U.S. Law: Contracts, Contracts: Cases and Doctrine, and Constitutional Law: Cases in Context, B.A., Northwestern,
J.D., Harvard; Jim Harper Global Policy Counsel of the Bitcoin Foundation, Senior Fellow at Cato, formerly counsel to
committees in both the U.S. House and Senate, and provided government relations counsel to PayPal, VeriSign, and
other companies in tech, telecom and e-commerce, original member of the U.S. Department of Homeland Securitys
Data Privacy and Integrity Advisory Committee, co-edited the book Terrorizing Ourselves: How U.S.
Counterterrorism Policy Is Failing and How to Fix It, J.D. from UC Hastings College of Law; Why NSAs Bulk Data
Seizures Are Illegal and Unconstitutional; Oct. 21, 2013; http://www.fed-soc.org/publications/detail/why-nsas-bulkdata-seizures-are-illegal-and-unconstitutional -- JRS)
the Fourth Amendment was adopted to prevent, among other things, what
"general" or non-specific warrants, which were blanket
authorizations for British authorities to search for contraband wherever
they might choose. In response to this abuse, the Fourth Amendment
requires [*6] the things to be searched or seized under a warrant to be
described "particularly." n13
With this in mind, the problem with the data collection orders issued to
Verizon and other telecommunications companies becomes obvious . These orders require
We know that
were called
the company to produce "on an ongoing daily basis . . . all call detail records." n14 Because they are not
The Constitution's Bill of Rights was written in broad strokes in the context of the era. The First Amendment freedom
of the press, naturally extended to radio, then television, neither of which existed when the Bill of Rights was
To preserve the Fourth Amendment, certain reforms would be useful in clarifying it for the 21st Century, and
there should be no
presumption that private records in the possession of private third parties
may be taken by the government without probable cause . Also, all warrants
and that includes administrative subpoenas should be issued only by
neutral judges or magistrates to preserve the separation of powers
inherent in the Fourth Amendment. Because warrants are issued in
chambers, there is no danger in matters of national security.
correcting mistakes of judicial, executive and legislative interpretation. First,
In Virginia, we have participated in promoting a "21st Century Fourth Amendment" that includes these needed
reforms and more, including tightening the definition of probable cause to ensure valid laws are being enforced.
These originalist reforms make sense for all the states, and even for the federal government, in protecting our
security from Orwellian government.
B. Recommendations
The general recommendation to both the United States and Pakistan regarding
surveillance laws is to reevaluate the way in which the government and its
intelligence agencies interpret the balance between security and privacy.
There should be an increased reliance on the historical protections
afforded to citizens through physical searches by analogizing them to
modern surveillance practices. Both Pakistan and the United States have developed
laws and common law practices that require the state to respect the
privacy of its citizens by limiting the scope of its searches, which should
The
warrant requirement is an embodiment of this right, and should continue
to be applied for terrorism cases in both Pakistan, through the Fair Trial Act, and the United States,
through the FISA courts.
surveillance process in order to hold the authorities accountable for their duty to uphold the security-privacy balance.
For the United States, the executive branch and FISA courts themselves should reconsider easing the burden of
proof for investigating authorities dealing with terrorism, and should maintain the "probable cause" standard or
something near it in order to allow the government to investigate properly without intruding on the rights of
citizens. In Pakistan, the Fair Trial Act should either be amended or interpreted by the Supreme Court as requiring
proof of probable cause for warrant requesting agencies, rather than the "reasonable suspicion" standard currently
in place.
The wall between criminal investigation and intelligence gathering should be reconstructed in order to limit the
scope of surveillance that international intelligence agencies can engage in domestically. For the United States,
there needs to be a restructuring of the surveillance process to prohibit the CIA from being able to either receive
warrants from the FISA courts to monitor citizens, or worse, to do so without a warrant. The FBI and local police
authorities should continue to share information and conduct surveillance in pursuit of criminal prosecutions. In
Pakistan, the Fair Trial Act should be reexamined to place a greater emphasis on the power of local police in
investigating terrorist plots through electronic surveillance, shifting this power out of the hands of the nation's
intelligence agencies like the lSI.
Further, while the target of warrant should likely not be informed of the government's monitoring as is required in
physical searches, there must [*59] be something that holds intelligence agencies and police accountable for their
actions. These officials often rely on governmental immunity to avoid punishment for carrying out abuses of the
surveillance process. Therefore, a personal enforcement mechanism is the only way to hold these individuals
accountable. Both countries should consider allowing the same judicial body that grants warrants the power to hold
intelligence officers in contempt of court if they are attempting to abuse the warrant process, either by bringing
frivolous requests or failing to abide by the limitations required by the warrant.
hold the state accountable for when it wishes to invade the privacy or freedom guaranteed to its citizens. Holding the state
accountable for its duties does not equate to co-opting or assisting terrorism, but rather, is an ideological assault against the lawless
(Luke M.; law professor at Univ. of Louisville; The Forgotten Right to Be Secure;
Hastings Law Journal, Vol. 65:713, Apr 2014; http://ssrn.com/abstract=2302850
JRS)
The Fourth Amendment can be read, however, to safeguard more than a right
to be spared an unreasonable search or seizure.20 The Amendment provides for
[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches
the to be
secure phraseology remains largely forgotten: it is treated on mere occasion by
commentators;22 and it has been left undefined in the case law.23 Historical and textual analyses
of to be secure, however, suggest the existence of a Fourth Amendment
right to protection against unreasonable searches and seizures, and
perhaps a right to be free from fear against such government action.
Support for these interpretations of to be secure rest in the dictionary
definitions of secure,24 the structure of the Fourth Amendment,25 and
and seizures.21 Unlike its textual counterparts (such as search, seizure, and unreasonable),
(Evan R. C.; J.D. Candidate, May 2015, Temple University Beasley School of Law; Note & Comment:
Pulling Back The Veil Of Secrecy: Standing To Challenge The Government's Electronic Surveillance
Activities; Temple Political & Civil Rights Law Review; 24 Temp. Pol. & Civ. Rts. L. Rev. 185; Fall 2014
JRS)
The Klayman and ACLU v. Clapper decisions demonstrate the potential for the
judiciary to subject government surveillance to meaningful scrutiny . n306
Specifically, there must be a review process that is open and adversarial, as opposed to the one-sided, closed
hearings before the FISC in which judges consider only arguments from the government and operate in secret. n307
Conclusion Looking back at the events of 2013, in light of the extensive legislative history of government electronic
surveillance, one can see the problems currently facing those who seek to challenge the constitutionality of the
government's activities. While the Snowden leaks revealed the scope of some, but certainly not all, of the
government's electronic surveillance,
which could potentially jeopardize national security. Rather, it means a system where an adversarial process creates
the proper balance between national security and the protection of individual privacy.
Courts existing trespass jurisprudence can be applied to personal data and electronic communications
demonstrates that vesting property rights in those intangibles in order to facilitate application of the trespass
theory will provide more Fourth Amendment protection. Analyzing surveillance of e-mail and other electronic
communications under a trespass theory would be novel in the criminal context, but not in the civil context, which
further demonstrates the ease by which the Court could apply its trespass theory of the Fourth Amendment to
electronic communications and personal effects.99 A return to a property basis is valuable for additional reasons,
however.
C. Property Law Concepts More Accurately Represent Public Conceptions of Electronic Communications, Personal
Harmony between the law and public expectations of what the law should
be is important for the integrity of the Fourth Amendment, the courts, and
our judicial system. As Lon Fuller articulated in his famous book, The Morality of Law, there is a
reciprocal relationship between the government and the public, and where
the public does not feel the laws are just or that the government will
honor them, the citizens fidelity to the law will be tested .102 If people conceive of
their personal data and electronic communications as property, then a congruent legal framework would vest
individuals with property rights in that content, or as Patricia Mell describes it, their electronic persona.103
judicial opinions, including three U.S. Supreme Court decisions, Fulbright Scholar,
J.D., LL.M. University of Virginia, A.B. Princeton University; Symposium Issue: The
Future of National Security Law: Standing and Covert Surveillance; Pepperdine Law
Review; 42 Pepp. L. Rev. 517 JRS)
Consider, first, Professor Luke Milligans interpretation of the first eight words of the Fourth Amendment, to wit,
[t]he right of the people to be secure against unreasonable searches and seizures.102 Pointing to colonial
dictionaries, case law, legislation and literature, Professor Milligan argues that the Fourth Amendments choice of
the words [t]he right of the people and to be secure, combined with the colonists clear disdain for general
warrants, demonstrates that the framers were as worried about the oppression caused by a regime of unreasonable
citizen ought to have standing to challenge a statute on a chilling theory. To assure the efficient use of judicial
resources, adequate advocacy and the other positive attributes associated with the case and controversy
requirement, plaintiffs should have to show, as the plaintiffs in Clapper did,105 that the government has officially
adopted an unregulated surveillance program that has affected their communications in specifiable ways. More
plaintiffs should only have standing if they can show: (1) the
existence of a surveillance program that does not adhere to traditional
Fourth Amendment constraints (i.e., a warrant based on particularized
probable cause),106 which (2) causes a significant, concrete and reasonable (i.e., not a fanciful
or paranoid) modification of the plaintiffs typical methods of communicating
specifically,
with other people, particularly (given the Fourth Amendments focus) their private methods of communicating. For
prudential reasons, the plaintiffs might also be required to demonstrate that (3) the inhibited activity is not criminal
in nature and that (4) the covert nature of the surveillance program means that it is not likely to be challenged
through another judicial forum.
Richard Raysman is a partner at Holland & Knight and Peter Brown is the principal at
Peter Brown & Associates; How Has Digital Ubiquity Affected Fourth Amendment
Law?; New York Law Journal;
http://www.newyorklawjournal.com/id=1202728535476/How-Has-Digital-UbiquityAffected-Fourth-Amendment-Law#ixzz3eVZI52AM
http://www.newyorklawjournal.com/id=1202728535476/How-Has-Digital-UbiquityAffected-Fourth-Amendment-Law#ixzz3eVYB5zo9 JRS)
Conclusion As Riley and its progeny epitomize, Fourth Amendment jurisprudence has been
permanently altered as a result of the proliferation of data storage devices, namely
smart phones and PCs. After all, some of the most forceful language from the majority opinion in Riley
elucidates why a search of a purse versus an examination of a hard drive is an irreconcilable dissimilarity. The
requirement remain unchecked, while others appear anachronistic. The exceptions contingent on the consent or
prior search of a device remain largely intact, as whether by choice or not, one's privacy interests in personal
information, no matter how damning or testimonial, is diminished once it has been divulged to someone other than
law enforcement. However, even when such interest is weakened,
information that can be gleaned from a cursory glance at contacts, messages, files, and metadata, even
during an ostensibly targeted search as in Lichtenberger, warrants a reassessment of law
enforcement rights to this information, even after it is no longer technically private.
modern cell phones are hardly "just another technological convenience," and in fact could contain and reveal "the
how much such ability will be constricted remains largely uncertain, but the trend heretofore has favored the
accused, even in milieus in which governmental interests are reiterated to be at their apogee.
one could argue that the separation of powers rationale for a narrow
standing doctrine is stronger in the context of panvasive surveillance than
in many other settings. When a government action affects virtually
everyone, the popularly-elected legislative branch could be said to be the
best source of any remedy sought.78 The generalized grievance rule noted above is a means of
Indeed,
implementing this notion.79 It results in a denial of standing when the relief sought no more directly and tangibly
benefits [the plaintiff] than it does the public at large.80 Thus, the Court has often denied standing in so-called
taxpayer lawsuits, as well as in suits involving claims that the environment or other general interests have been
harmed by governmental action or inaction.81
recognized this point. That case involved a claim that the government had erroneously categorized an organization
as a political committee for election campaign purposes, resulting in the plaintiffs inability to force the
organization to abide by statutory spending reporting requirements.84 In deciding that the plaintiffs had standing to
argued
that courts should still be quite willing to protect participational values associated
with voting, political involvement, government transparency, and the
like.114 Those are the values, Ely argued, (1) with which our Constitution
has preeminently and most successfully concerned itself, (2) whose
imposition is not incompatible with, but on the contrary supports, the American system of
representative democracy, and (3) that courts set apart from the political process are
uniquely situated to impose.115 According to Ely, the Constitution establishes a process of
thought courts should resist gleaning substantive meaning from amorphous constitutional language, he
unconstrained surveillance,
especially of our intellectual activities, threatens a cognitive revolution
that cuts at the core of the freedom of the mind that our political
institutions presuppose.120 This is a chilling argument, but a chilling
argument framed in terms of its impact on the political process, not on
individual rights.
Professor Richards provides a hint with his observation that
According to the Supreme Court, these standing requirements exist for two
reasons. First, they implement Article III of the Constitution, which limits federal court jurisdiction to certain Cases
and Controversies.68 The case-and-controversy requirement helps ensure that litigants advocate the case
diligently, maximizes efficient use of scarce judicial resources, limits judicial inquiries into those matters most
conducive to investigation through the adversarial process, and minimizes the issuance of advisory opinions
unelucidated by a specific fact pattern.69 The second reason for the standing requirement, and the one emphasized
In the covert surveillance context, the first rationale should not carry much weight. As in Clapper, the parties will
often be composed of lawyers and human rights activists, who can be counted on to pursue their constitutional
claims aggressively.73 Amicus briefs can and will fill any gaps in constitutional argumentation left by the parties, at
least at the ultimate appellate stages of the litigation.74 Further, if the challenge is a facial one or is aimed at the
surveillance program as a whole (e.g., an attack on the bulk collection process or on the hop rule75), any ambiguity
about how the program worked in a particular instance against a particular plaintiff will not affect the ability of the
court to resolve the issues raised. If and when the courts determine that the program is constitutional on its face,
as-applied challenges could be subject to more demanding standing requirements, analogous to what Clapper
imposed, or to limitations in the discovery process.76
when the
Fourth Amendment is the basis for the claim, the Supreme Court has
explicitly conflated standing with the Amendments substance. In Rakas v.
the close relationship between standing and the scope of the right in question.131 Indeed,
Illinois, 132 the Court stated that the decision as to whether a defendant can make a Fourth Amendment claim
forthrightly focuses on the extent of a particular defendants rights under the Fourth Amendment, rather than on
any theoretically separate, but invariably intertwined concept of standing.133 If a government action is not a
Fourth Amendment search vis--vis the litigant, Rakas held, then the litigant lacks standing to challenge it.
If
information (here phone companies and Internet service providers) will in turn divulge it to the government.137
The same type of analysis might limit standing in cases brought under the First
Amendment. As the Court intimated in Clapper, 138 one could conclude that even if
speech and association are inhibited by surveillance, that inhibition proximately
results from the individuals choices, not from anything the government has done to
the individual.139 On this view, even if an individual can show that he or she was
targeted, standing to contest surveillance does not exist unless and until the
government uses the seized information against the individual, because otherwise a
colorable claim that a constitutionally cognizable interest was infringed cannot be
made.
The Clapper plaintiffs wanted to argue that interception of phone calls under section
702 of FISA violated both the Fourth Amendment and the First Amendment.90 They
contended they had standing to make these claims because their concern about
having their overseas conversations intercepted by the NSA compromised their
ability to locate witnesses, cultivate sources, obtain information, and communicate
confidential information to their clients.91 They also alleged that, as a result of
their concern about the NSAs surveillance, they had ceased engaging in phone
and email communications with certain people, and that they had undertaken
costly and burdensome measures to protect confidentiality of their
communications.92 In short, the plaintiffs argued that Section 702 of FISA chilled
their communications overseas.
The Second Circuit granted standing on the ground that the plaintiffs fear of
surveillance was not fanciful, paranoid, or otherwise unreasonable.93 But the
Supreme Court disagreed. A five-member majority concluded that such a fear is
insufficient to create standing,94 most prominently citing Laird v. Tatum, 95 a
Supreme Court decision that had denied standing to plaintiffs wanting to challenge
what they hypothesized were the militarys efforts to investigate and compile
dossiers on them.96 The Laird Court concluded that the ability to challenge a
government surveillance practice cannot be derived from a chilling effect
aris[ing] merely from the individuals knowledge that a governmental
agency was engaged in certain activities or from the individuals
concomitant fear that, armed with the fruits of those activities, the agency
might in the future take some other and additional action detrimental to
that individual.97 Taken literally, this language would deny standing not only on
Clappers facts, but even if the plaintiffs had been able to show that their calls had
been intercepted;98 only use of the intercepts against them would trigger standing
under Laird.
Whether the Court meant to sanction that result is not clear. But at a minimum
Clapper and Laird appear to firmly reject any standing argument based on
the claim that the challenged government program inhibits certain types
of behavior, absent a further showing that the government has or
certainly will take more direct action against the challengers.99 That the
Court really meant certainly was brought home by the fact that it refused to find
standing despite the dissents persuasive arguments that there was a very high
likelihood the government had used and would continue to use section 702 as
authority to intercept at least some of the plaintiffs communications.100
What the majority failed to recognize is that, while the chilling effect
described by the Clapper plaintiffs did not definitively prove their calls had
been intercepted, it certainly undermined the political process that,
according to Clapper, standing doctrine is meant to protect.101 Two recent
articles provide the building blocks for this argument.
A.B. Princeton University; Symposium Issue: The Future of National Security Law:
Standing and Covert Surveillance; Pepperdine Law Review; 42 Pepp. L. Rev. 517
JRS)
90. Clapper v. Amnesty Intl USA, 133 S. Ct. 1138, 1146 (2013). The plaintiffs also
argued that section 702 violated Article IIIs case and controversy requirement and
separation of powers principles by allowing the Foreign Intelligence Surveillance
Court to issue a warrant in the absence of a case or controversy. See Amnesty Intl
USA v. McConnell, 646 F. Supp. 2d 633, 64243 (S.D.N.Y. 2009), vacated sub nom.
Amnesty Intl USA v. Clapper, 638 F.3d 118 (2d Cir. 2011),
It noted that the Foreign Intelligence Surveillance Act requires that the government give notice when it intends to
use or disclose [any] information obtained or derived from [electronic surveillance] in a criminal prosecution, and
pointed out that, armed with such notice, the defendant could mount a challenge to section 702.26
Intelligence Surveillance Court to represent the interests of those whose information is queried, a procedure
endorsed by President Obamas special commission and included in the administrations recently proposed
legislation.59 But whether such an advocates office could be counted on to overcome its governmental provenance
and the nonchalance that can come from proceeding in secret to develop into a vigorous advocate for individual
constitutional claims is at best unclear.60 Moreover, the advocates ability to appeal an adverse decision by the
FISC is tenuous.61
In sum,
under current law as construed by the Supreme Court, may not be challengeable as a practical
matter. Programs that could be blatantly unconstitutional might be allowed to continue unless and until the
government practice that has occasioned as much controversy as the NSAs surveillance ought to be subject to
such review if a plausible standing argument can be made. The next two parts of this Article proffer such
arguments.
(Megan; J.D. Candidate 2015, University of California, Hastings College of the Law;
The New Data Marketplace: Protecting Personal Data, Electronic Communications,
and Individual Privacy in the Age of Mass Surveillance Through a Return to a
Property-Based Approach to the Fourth Amendment; Hastings Constitutional Law
Quarterly; 42 Hastings Const. L.Q. 577 JRS)
The Supreme Courts Fourth Amendment Jurisprudence Does Not Adequately Protect the Rights and Interests of the
Public Because it Excludes Modern Means of Communication and Data Generated Through the Use of Web-Based
rights are implicated, provides almost no protection from unreasonable searches and seizures or the use of
evidence illegally obtained by the NSA in criminal prosecutions.36
The Fourth Amendment states: The right of the people to be secure in their persons, houses, papers, and effects
against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable
cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or
things to be seized.37
The text of the Fourth Amendment enumerates different property items, the enumeration of
which has given rise to a longstanding property-based approach to the Fourth
Amendment.38 As early as 1886, the Court interpreted a search under the
Fourth Amendment as occurring when the government violated a property
interest, such as physical intrusion into the home or review of ones
personal documents.39 While the Court has explicitly refrained from
overruling this trespass theory of the Fourth Amendment, it is no longer
the only controlling doctrine.40
In Katz v. United States, the Court took steps to adopt a privacybased approach to the Fourth Amendment instead
of a formalistic property-based approach.41 In Katz, the majority, led by Justice Stewart, held that the Fourth
Amendment protects people, not just constitutionally protected areas, and accordingly, that a search takes place
where the government violates an individuals privacy.42 The Katz approach that the Court has adopted since
rendering a decision in the case is actually the approach articulated by Justice Harlan in his concurring opinion in
Katz.
the federal
government can use it the same way British authorities used papers
seized with general warrants for later perusal to see if they revealed
anything criminal. The NSA data seizures make possible fishing expeditions into the phone calling patterns
of nearly all Americans, except for terrorists, who will now avoid using their phones. n43
If this is the result, then there must be a flaw somewhere in the
constitutional doctrine that produced it. And indeed the fault lies in the
misuse of the "third-party doctrine" as well as in Katz's problematic
concept of the reasonable expectation of privacy.
B. Misapplying Katz and Smith
The key to understanding the flaw in the government's theory is to remember that the Fourth
Amendment was, above all else, the solution to the problem of general or
nonspecific warrants. n44 In Smith v. Maryland, n45 a pen register was placed by the phone company
records pursuant to later investigations. n42 Once in possession of the data, however,
on a particular person about whom there was a reasonable suspicion--though perhaps not probable cause for
seeking a search warrant. n46 Indeed, previous applications of the third party doctrine to business records, such
[*11] as bank records or emails, have concerned investigations of a particular person or company. n47
a pen register constitutes a 'search' within the meaning of the Fourth Amendment,'-- under the
a far cry from the issue in this
case. n48
use of
For Judge Leon, the question to be decided today is: When do present-day circumstances --the evolutions in the
government's surveillance capabilities, citizens' phone habits, and the relationship between the NSA and telecom
companies--become so thoroughly unlike those considered by the Supreme Court thirty-five years ago that a
precedent like Smith simply does not apply? The answer, unfortunately for the Government, is now. n49
(Andrew Crocker, staff attorney on the Electronic Frontier Foundations civil liberties
team, BA and JD from Harvard, formerly worked at Berkman Center for Internet and
Society, the American Civil Liberties Unions Speech, Privacy, and Technology
Project, and the Center for Democracy and Technology, M.F.A. in creative writing
from New York University; Rainey Reitman, director of the activism team at the
Electronic Frontier Foundation, Chief Operating Officer and co-founder of the
Freedom of the Press Foundation, winner of 2013 Hugh M. Hefner First Amendment
Award in Journalism, BA Bard College; https://www.eff.org/deeplinks/2015/07/sameold-fisa-court-thoughts-opinion-extending-mass-surveillance-6-more-months -- JRS)
The court thumbs its nose at the Second Circuits view that bulk telephone metadata surveillance is illegal. In a
landmark decision in May, the U.S. Court of Appeals for the Second Circuit found in ACLU v Clapper that mass
and criticized reasoning in ACLU v. Clapper. Most troublingly, the court largely doubled down on the wildly expansive
interpretation of the word relevance in Section 215 from previous FISA Court opinions. Although nothing required
it to reach the same conclusion as the Second Circuit, the FISA Courts unnecessary dismissiveness is reminiscent of
some of its one-sided opinions of old. In light of the FISA Courts opinion, the ACLU said it will ask the Second Circuit
for an injunction stopping the program from going back into effect.
This is a case from the 1970s that found that people who use the telephone dont have an expectation of privacy
because they are sharing the fact that they are making a phone call with the telephone company itself, and thus
the government has a right to access data about what phone calls are made and to whom without a judge-issued
the Second Circuit found that the program wasnt authorized by the Patriot Act,
did not reach the constitutional issue, but it indicated there were
significant constitutional concerns. Even so, were hopeful that in one of the
pending lawsuits challenging the program, including EFFs case Smith v. Obama, ACLU v. Clapper, or
Klayman v. Obama, a circuit court will disagree with the FISA Court and issue a
ruling soon holding that the program is in fact unconstitutional.
search warrant. Because
it
when this case does get back to the Supreme Court--as I hope it will if Congress
Court should also reconsider the
"reasonable expectation of privacy" concept of Katz. As Justice Alito observed two
But
terms ago in his concurring opinion in the GPS tracker case of United States v. Jones, n52 the "Katz expectation-ofprivacy test... involves a degree of circularity, and judges are apt to confuse their own expectations of privacy with
those of the hypothetical reasonable person to which the Katz test looks." n53 In addition, "the Katz test rests on
the assumption that this hypothetical reasonable person has a well-developed and stable set of privacy
expectations." n54
apartment, or in a taxicab, a person in a telephone booth may rely upon the protection of the Fourth Amendment.
One who occupies it, shuts the door behind him, and pays the toll that permits him to place a call is surely entitled
to assume that the words he utters into the mouthpiece will not be broadcast to the world. n58
(Megan; J.D. Candidate 2015, University of California, Hastings College of the Law;
The New Data Marketplace: Protecting Personal Data, Electronic Communications,
and Individual Privacy in the Age of Mass Surveillance Through a Return to a
Property-Based Approach to the Fourth Amendment; Hastings Constitutional Law
Quarterly; 42 Hastings Const. L.Q. 577 JRS)
IV. A Trespass Approach to the Fourth Amendment is Preferable to Katz and Any Attempts to Reform a Privacy Based
warrantless wiretapping programs there has been a flurry of scholarship declaring the end of privacy and examining
made in diversifying the bench, but Supreme Court justices still come from a particularly privileged segment of
society and apply precedent crafted over hundreds of years by an even less diverse bench.118
Of the
current justices, all nine attended Ivy League law schools, primarily
Harvard and Yale.119 The continued existence of an Ivy League track to
the judiciary ensures that the justices are not from backgrounds or
currently in positions that allow them to truly understand what the public
and everyday Americans, Justice Harlans society, consider reasonable.120 Additionally,
the method of determining a reasonable expectation of privacy is subject to wide variation depending on the
methodology used to calculate it.121 The NSA mass surveillance programs are now public knowledge, so it would
be technically unreasonable for the public to maintain a reasonable expectation of privacy in their personal data
and electronic communications. Clearly, applying the standard in that way would result in an untenable and absurd
result. Nonetheless, that is the very logic that animates the Courts original collapsing of the concepts of secrecy
and privacy in Smith v. Maryland. 122
When one has arranged one's affairs using physics, or the laws of property
and contract, to conceal information from preying eyes, government
agents may not use surreptitious means or novel technologies like thermal
imaging to defeat those arrangements without obtaining a warrant that conforms to the requirement of the Fourth
The law of
property 'naturally enough influence[s]' our 'shared social expectations' of
what places should be free from governmental incursions." n71
Smith v. Maryland need not be reversed to distinguish its application
in a case involving a search of a home, property concepts and privacy concepts should so align.
CP answers
Congressional oversight fails the executive branch lies to
Congress
Setty, 2015
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
The extent of congressional knowledge regarding the NSA Metadata Program is not fully known to the public and
has been the subject of significant debate. Nonetheless ,
disclosures.
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
The FISC differs from Article III courts in numerous ways: Its statutory scope is limited to
matters of foreign intelligence gathering; its judges are appointed in the sole discretion
of the Chief Justice of the United States Supreme Court; its proceedings are
secret; its opinions are often secret or are published in heavily [*83] redacted form; and its
process is not adversarial as only government lawyers make arguments
defending the legality of the surveillance being contemplated. n70 Many of these
differences bring into doubt the legitimacy of the court, its ability to
afford adequate due process regarding civil liberties concerns, and its ability to uphold the
rule of law in terms of government accountability. Compounding this legitimacy deficit is
the FISC's own loosening of the relevance standard under Section 215 of the PATRIOT
Act such that the FISC has found that bulk data collection without any
particularized threat or connection to terrorism is legally permissible. n71
Historically, the FISC has rejected NSA surveillance applications too infrequently
to be considered a substantial check on government overreach as an ex ante
matter. n72 As an ex post matter, it is unclear to what extent the FISC's work guarantees any meaningful
accountability over NSA surveillance activities. On the one hand, because the FISC lacks an adversarial process and
has no independent investigatory authority, the FISC only addresses ex post compliance problems when the
example, in 2011, the FISC found one aspect of the surveillance program - brought to its attention months after the
program went into effect n75 - to be unconstitutional. n76 Additionally, in one declassified opinion, the FISC
critiques the NSA's sloppy over-collection of metadata of U.S. communications, and questions the efficacy of bulk
data collection as a national security measure. n77
[*84] saving all metadata and running daily metadata against an "alert list" of
approximately 17,800 phone numbers, only 10% of which had met FISC's legal standard for reasonable suspicion.
On the other hand, the fact that the NSA itself has brought potential compliance incidents to the notice of the FISC
consistent controls are in place. Further, the self-reporting of these compliance incidents does not in any way allow
for discourse over the larger structural questions surrounding the surveillance programs.
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
the ability of the FISC to act as an effective check on NSA
overreaching is severely limited by the secrecy and lack of information
available to the FISC judges. Judge Reggie B. Walton, formerly the Chief Judge of the
FISC, lamented that "the FISC is forced to rely upon the accuracy of the
information that is provided to the Court ... . The FISC does not have the
capacity to investigate issues of noncompliance ... ." n81 The ability of the NSA to not
Finally,
only gather and retain bulk metadata, but also to build in backdoor access into data files despite private encryption
efforts has been largely sanctioned by the FISC based on NSA representations as to the seriousness of the security
(Sudha, Professor of Law and Associate Dean for Faculty Development & Intellectual
Life, Western New England University School of Law; Harlan Fiske Stone Scholar
from Columbia Law School and A.B. in History, concentration in comparative civil
rights, with honors from Stanford University; Stanford Journal of International Law;
Winter 2015; 51 Stan. J Int'l L. 69; Surveillance, Secrecy, and the Search for
Meaningful Accountability JRS)
Leaks like that of Snowden, combined with rigorous and responsible press coverage, can provide some level of
constraint on and accountability over intelligence community activity. n179 However, the tendency toward public
inertia and the possibility that democratic institutions will not actually provide a substantive check on the
surveillance apparatus n180 suggest weakness in relying solely on this approach. Further, the crackdown on leaking
and the treatment of whistleblowers as criminals, even prior to Snowden's disclosures, n181 combined with
heightened security measures, means that reliance on leaking as a meaningful structural check is misplaced.
Tinkering with the structure inside of the NSA also seems to achieve more in
terms of burnishing a veneer of accountability rather than creating
genuine oversight. It is hard to understand how various proposed reforms, such as
appointing a civilian to oversee the NSA n182 or creating a more
adversarial internal review process within the NSA, n183 would increase
accountability and transparency. For the executive branch, it seems more likely that
pressure from business and corporate interests trying to retain consumer business n184
may shape NSA parameters for mass data collection and domestic surveillance in some respects,
n185 but will likely not lead to institutional or structural changes as to the
government's approach to surveillance without additional pressure from
the public.
1st Amendment
SQ already chilling journalism
Slobogin, March 2015
Professors Milligan and Richards are the beginning of a rejoinder to the Courts decision in Clapper. But one might
still ask how their arguments are, at bottom, any different from the chilling argument rejected by the Court in
Clapper and Laird. Without further elaboration, they are not. What is needed is an explanation of why unregulated
surveillance undermines the political system that standing doctrine ostensibly is meant to preserve.