NSA Warrantless Surveillance (2001–2007)
   HOME

TheInfoList



OR:

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — refers to the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally
foreign intelligence Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments d ...
by the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collect ...
(NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a
FISA warrant The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign po ...
, the
phone calls A telephone call is a connection over a telephone network between the called party and the calling party. First telephone call The first telephone call was made on March 10, 1876, by Alexander Graham Bell. Bell demonstrated his ability to "ta ...
, Internet activity, text messages and other communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lay within the U.S. Critics claimed that the program was an effort to silence critics of the Administration and its handling of several controversial issues. Under public pressure, the Administration allegedly ended the program in January 2007 and resumed seeking warrants from the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants a ...
(FISC). In 2008
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
passed the FISA Amendments Act of 2008, which relaxed some of the original FISC requirements. During the Obama administration, the
U.S. Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United State ...
(DOJ) continued to defend the warrantless surveillance program in court, arguing that a ruling on the merits would reveal state secrets. In April 2009 officials at DOJ acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISC's authority, but claimed that the acts were unintentional and had since been rectified.


History

A week after the
9/11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
, Congress passed the
Authorization for Use of Military Force Against Terrorists The Authorization for Use of Military Force (AUMF) (, ) is a joint resolution of the United States Congress which became law on September 18, 2001, authorizing the use of the United States Armed Forces against those responsible for the September ...
(AUMF), which inaugurated the "
War on Terror The war on terror, officially the Global War on Terrorism (GWOT), is an ongoing international counterterrorism military campaign initiated by the United States following the September 11 attacks. The main targets of the campaign are militant ...
". It later featured heavily in arguments over the NSA program. Soon after the
9/11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
President Bush established the President's Surveillance Program. As part of the program, the Terrorist Surveillance Program was established pursuant to an
executive order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of t ...
that authorized the NSA to surveil certain telephone calls without obtaining a warrant (see ). The complete details of the executive order are not public, but according to administration statements, the authorization covers communication originating overseas from or to a person suspected of having links to terrorist organizations or their affiliates even when the other party to the call is within the US. In October 2001, Congress passed the
Patriot Act The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appro ...
, which granted the administration broad powers to fight terrorism. The Bush administration used these powers to bypass the FISC and directed the NSA to spy directly on al-Qaeda via a new
NSA electronic surveillance program The Terrorist Surveillance Program was an electronic surveillance program implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program, w ...
. Reports at the time indicate that an "apparently accidental" "glitch" resulted in the interception of communications that were between two U.S. parties. This act was challenged by multiple groups, including
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
, as unconstitutional. The precise scope of the program remains secret, but the NSA was provided total, unsupervised access to all fiber-optic communications between the nation's largest telecommunication companies' major interconnected locations, encompassing phone conversations, email, Internet activity, text messages and corporate private network traffic. FISA makes it illegal to intentionally engage in electronic surveillance as an official act or to disclose or use information obtained by such surveillance under as an official act, knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000, up to five years in prison or both. The
Wiretap Act The Omnibus Crime Control and Safe Streets Act of 1968 (, codified at ''et seq.'') was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Admi ...
prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine, up to five years in prison, or both. After an article about the program, (which had been code-named Stellar Wind), was published in ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid d ...
'' on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence. The ''Times'' had published the story after learning that the Bush administration was considering seeking a court injunction to block publication.
Bill Keller Bill Keller (born January 18, 1949) is an American journalist. He was the founding editor-in-chief of '' The Marshall Project'', a nonprofit that reports on criminal justice in the United States. Previously, he was a columnist for ''The New Yo ...
, the newspaper's executive editor, had withheld the story from publication since before the 2004 Presidential Election. The published story was essentially the same that reporters
James Risen James Risen (born April 27, 1955) is an American journalist for ''The Intercept''. He previously worked for ''The New York Times'' and before that for ''Los Angeles Times''. He has written or co-written many articles concerning U.S. government ...
and
Eric Lichtblau Eric Lichtblau (born 1965) is an American journalist, reporting for ''The New York Times'' in the Washington bureau, as well as the ''Los Angeles Times'', ''Time'' magazine, ''The New Yorker'', and the CNN network's investigative news unit. He ha ...
had submitted in 2004. The delay drew criticism, claiming that an earlier publication could have changed the election's outcome. In a December 2008 interview, former Justice Department employee
Thomas Tamm Thomas Tamm (born 1952) is a public defender in Washington County, Maryland. He formerly worked as an attorney in the United States Department of Justice (USDOJ) Office of Intelligence Policy and Review during 2004 when senior Justice officials res ...
claimed to be the initial whistle-blower. The FBI began investigating leaks about the program in 2005, assigning 25 agents and 5 prosecutors. Attorney and author
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substac ...
argued: Gonzales said the program authorized warrantless intercepts where the government had "a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda" and that one party to the conversation was "outside of the United States". The revelation raised immediate concern among elected officials, civil right activists, legal scholars and the public at large about the legality and constitutionality of the program and its potential for abuse. The controversy expanded to include the press's role in exposing a classified program, Congress's role and responsibility of executive oversight and the scope and extent of presidential powers. CRS released a report on the NSA program, "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", on January 5, 2006 that concluded: On January 18, 2006 the
Congressional Research Service The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
released another report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions". That report found that " sed upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, found no specific statutory basis for limiting briefings on the terrorist surveillance program. However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".


Legal action

While not directly ruling on the legality of domestic surveillance, the Supreme Court can be seen as having come down on both sides of the Constitution/statute question, in somewhat analogous circumstances. In ''
Hamdi v. Rumsfeld ''Hamdi v. Rumsfeld'', 542 U.S. 507 (2004), is a United States Supreme Court case in which the Court recognized the power of the U.S. government to detain enemy combatants, including U.S. citizens, but ruled that detainees who are U.S. citizens m ...
'' (2004) the government claimed that AUMF authorized the detention of U.S. citizens designated as an
enemy combatant Enemy combatant is a person who, either lawfully or unlawfully, engages in hostilities for the other side in an armed conflict. Usually enemy combatants are members of the armed forces of the state with which another state is at war. In the case ...
despite its lack of specific language to that effect and notwithstanding the provisions of (a) that forbids the government to detain an American citizen except by act of Congress. In that case, the Court ruled: However, in ''
Hamdan v. Rumsfeld ''Hamdan v. Rumsfeld'', 548 U.S. 557 (2006), is a case in which the Supreme Court of the United States held that military commissions set up by the Bush administration to try detainees at Guantanamo Bay violated both the Uniform Code of Mili ...
'' the Court rejected the government's argument that AUMF implicitly authorized the President to establish military commissions in violation of the
Uniform Code of Military Justice The Uniform Code of Military Justice (UCMJ, 10 U.S.C. §§ 801–946 is the foundation of military law in the United States. It was established by the United States Congress in accordance with the authority given by the United States Constitutio ...
. The Court held: In footnote 23, the Court rejected the notion that Congress is impotent to regulate the exercise of executive war powers: Dozens of civil suits against the government and telecommunications companies over the program were consolidated before the chief judge of the Northern District of California, Vaughn R. Walker. One of the cases was a
class-action A class action, also known as a class-action lawsuit, class suit, or representative action, is a type of lawsuit where one of the parties is a group of people who are represented collectively by a member or members of that group. The class action ...
lawsuit against
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile te ...
, focusing on allegations that the company had provided the NSA with its customers' phone and Internet communications for a data-mining operation. Plaintiffs in a second case were the
al-Haramain Foundation Al-Haramain Islamic Foundation (AHIF) was a charity foundation, based in Saudi Arabia. Under various names it had branches in Afghanistan, Albania, Bangladesh, Bosnia, Comoros, Ethiopia, India, Kenya, Malaysia, the Netherlands, Nigeria, Pakistan ...
and two of its lawyers. On August 17, 2006, Judge
Anna Diggs Taylor Anna Katherine Diggs Taylor ( Johnston; December 9, 1932 – November 4, 2017) was a United States district judge of the United States District Court for the Eastern District of Michigan. Education and career Born in Washington, D.C. as Anna ...
of the
United States District Court for the Eastern District of Michigan The United States District Court for the Eastern District of Michigan (in case citations, E.D. Mich.) is the federal district court with jurisdiction over of the eastern half of the Lower Peninsula of the State of Michigan. The Court is based ...
ruled in ''
ACLU v. NSA ''American Civil Liberties Union v. National Security Agency'', 493 F.3d 644 (6th Cir. 2007), is a case decided July 6, 2007, in which the United States Court of Appeals for the Sixth Circuit held that the plaintiffs in the case did not have stand ...
'' that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of ISA or Title III. She wrote: In August 2007, a three-judge panel of the
United States Court of Appeals for the Ninth Circuit The United States Court of Appeals for the Ninth Circuit (in case citations, 9th Cir.) is the U.S. federal court of appeals that has appellate jurisdiction over the U.S. district courts in the following federal judicial districts: * District ...
heard arguments in two lawsuits challenging the program. On November 16, 2007, the three judges— M. Margaret McKeown, Michael Daly Hawkins and Harry Pregerson—issued a 27-page ruling that the al-Haramain Foundation could not introduce a key piece of evidence because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret." In a question-and-answer session published on August 22, Director of National Intelligence Mike McConnell first confirmed that the private sector had helped the program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies." Plaintiffs in the AT&T suit subsequently moved to have McConnell's acknowledgement admitted as evidence. In a related legal development, on October 13, 2007,
Joseph Nacchio Joseph P. Nacchio (born June 22, 1949 in Brooklyn, New York) is an American executive who was chairman of the board and chief executive officer of Qwest Communications International from 1997 to 2002. Nacchio was convicted of insider trading durin ...
, the former CEO of
Qwest Communications Qwest Communications International, Inc. was a United States telecommunications carrier. Qwest provided local service in 14 western and midwestern U.S. states: Arizona, Colorado, Idaho, Iowa, Minnesota, Montana, Nebraska, New Mexico, North Dako ...
, appealed an April 2007 insider trading conviction by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified NSA program that the company thought might be illegal. He claimed that the NSA approached Qwest about participating in a warrantless surveillance program more than six months before 9/11. Nacchio used the allegation to show why his stock sale was not improper. According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11. On January 20, 2006, cosponsors Senator
Patrick Leahy Patrick Joseph Leahy (; born March 31, 1940) is an American politician and attorney who is the senior United States senator from Vermont and serves as the president pro tempore of the United States Senate. A member of the Democratic Party, ...
and
Ted Kennedy Edward Moore Kennedy (February 22, 1932 – August 25, 2009) was an American lawyer and politician who served as a United States senator from Massachusetts for almost 47 years, from 1962 until his death in 2009. A member of the Democratic ...
introduced Senate Resolution 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens". This non-binding resolution died without debate. On September 28, 2006, the
U.S. House of Representatives The United States House of Representatives, often referred to as the House of Representatives, the U.S. House, or simply the House, is the lower chamber of the United States Congress, with the Senate being the upper chamber. Together they ...
passed the
Electronic Surveillance Modernization Act The Electronic Surveillance Modernization Act ( of the 109th Congress) was passed on September 28, 2006, by a vote 232 to 191. It has been referred to the United States Senate The United States Senate is the upper chamber of the United Stat ...
(H.R. 5825).House Passes Wilson FISA Bill
, Press Release, September 29, 2006.
It died in the Senate. Three competing, mutually exclusive, bills—the Terrorist Surveillance Act of 2006 (S.2455), the National Security Surveillance Act of 2006 (S.2455) and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) – were referred for debate to the full Senate,Conflicting Bills on Warrantless Surveillance Advance in Senate
, Secrecy News, September 14, 2006
but did not pass. Each of these bills would have broadened the statutory authorization for electronic surveillance, while subjecting it to some restrictions.


Termination

On January 17, 2007, Gonzales informed Senate leaders that the program would not be reauthorized. "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.


Further legal action

The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
(ACLU) sued NSA over the program. Detroit District Court judge
Anna Diggs Taylor Anna Katherine Diggs Taylor ( Johnston; December 9, 1932 – November 4, 2017) was a United States district judge of the United States District Court for the Eastern District of Michigan. Education and career Born in Washington, D.C. as Anna ...
ruled on August 17, 2006 that the program was illegal under FISA as well as unconstitutional under the
First First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and rec ...
and Fourth amendments of the
Constitution A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organisation or other type of entity and commonly determine how that entity is to be governed. When these princ ...
.
Judicial Watch Judicial Watch (JW) is an American conservative activist group that files Freedom of Information Act (FOIA) lawsuits to investigate claimed misconduct by government officials. Founded in 1994, JW has primarily targeted Democrats, in particu ...
, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case". ''
ACLU v. NSA ''American Civil Liberties Union v. National Security Agency'', 493 F.3d 644 (6th Cir. 2007), is a case decided July 6, 2007, in which the United States Court of Appeals for the Sixth Circuit held that the plaintiffs in the case did not have stand ...
'' was dismissed on January 31, 2007 by the
United States Court of Appeals for the Sixth Circuit The United States Court of Appeals for the Sixth Circuit (in case citations, 6th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * Eastern District of Kentucky * Western District of ...
. The court did not rule on the spying program's legality. Instead, it declared that the plaintiffs did not have
standing Standing, also referred to as orthostasis, is a position in which the body is held in an ''erect'' ("orthostatic") position and supported only by the feet. Although seemingly static, the body rocks slightly back and forth from the ankle in the s ...
to sue because they could not demonstrate that they had been direct targets of the program. The Supreme Court let the ruling stand. On August 17, 2007, FISC said it would consider a request by the ACLU that asked the court to make public its recent, classified rulings on the scope of the government's wiretapping powers. FISC presiding judge
Colleen Kollar-Kotelly Colleen Constance Kollar-Kotelly (born April 17, 1943) is an American lawyer serving as a Senior United States district judge of the United States District Court for the District of Columbia and was previously presiding judge of the Foreign Inte ...
signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing". The FISC ordered the government to respond on the issue by August 31. On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion. On February 19, 2008, the
U.S. Supreme Court The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that involve a point o ...
, without comment, turned down an ACLU appeal, letting stand the earlier decision dismissing the case. On September 18, 2008, the Electronic Frontier Foundation (EFF) sued the NSA, President Bush, Vice President Cheney, Cheney's chief of staff
David Addington David Spears Addington (born January 22, 1957) is an American lawyer who was legal counsel (2001–2005) and chief of staff (2005–2009) to Vice President Dick Cheney. He was the vice president of domestic and economic policy studies at the He ...
, Gonzales and other government agencies and individuals who ordered or participated in the program. They sued on behalf of AT&T customers. An earlier, ongoing suit ('' Hepting v. AT&T'') by the EFF bogged down over the recent FISA changes. On January 23, 2009, the Obama administration adopted the same position as its predecessor when it urged Judge Walker to set aside a ruling in ''Al-Haramain Islamic Foundation et al. v. Obama, et al.'' The Obama administration sided with the Bush administration in its legal defense of July 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the program, according to Attorney General
Eric Holder Eric Himpton Holder Jr. (born January 21, 1951) is an American lawyer who served as the 82nd Attorney General of the United States from 2009 to 2015. Holder, serving in the administration of President Barack Obama, was the first African Amer ...
. On March 31, 2010, Judge Walker ruled that the program was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable for damages. In 2012, the Ninth Circuit vacated the judgment against the United States and affirmed the district court's dismissal of the claim.


Proposed FISA amendments

Several commentators raised the issue of whether FISA needed to be amended to address foreign intelligence needs, technology developments and advanced technical intelligence gathering. The intent was to provide programmatic approvals of surveillance of foreign terrorist communications, so that they could then legally be used as evidence for FISA warrants. ''Fixing Surveillance''; ''Why We Listen'', ''The Eavesdropping Debate We Should be Having''; ''A New Surveillance Act''; ''A historical solution to the Bush spying issue,'' ''Whispering Wires and Warrantless Wiretaps'' address FISA's inadequacies in the post-9/11 context. The Bush administration contended that amendment was unnecessary because they claimed that the President had inherent authority to approve the NSA program, and that the process of amending FISA might require disclosure of classified information that could harm national security. In response, Senator Leahy said, "If you do not even attempt to persuade Congress to amend the law, you must abide by the law as written." President Bush claimed that the law did not apply because the Constitution gave him "inherent authority" to act. Some politicians and commentators used "difficult, if not impossible" to argue that the administration believed Congress would have rejected an amendment. In his written "Responses to Questions from Senator Specter" in which Specter specifically asked why the administration had not sought to amend FISA, Gonzales wrote: Competing legislative proposals to authorize the NSA program subject to Congressional or FISC oversight were the subject of Congressional hearings. On March 16, 2006, Senators Mike DeWine, Lindsey Graham, Chuck Hagel and Olympia Snowe introduced the Terrorist Surveillance Act of 2006 (S.2455), that gave the President limited statutory authority to conduct electronic surveillance of suspected terrorists in the US, subject to enhanced Congressional oversight. That day Specter introduced the National Security Surveillance Act of 2006 (S.2453), which would amend FISA to grant retroactive amnesty for warrantless surveillance conducted under presidential authority and provide FISC jurisdiction to review, authorize and oversee "electronic surveillance programs". On May 24, 2006, Specter and Feinstein introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) denoting FISA as the exclusive means to conduct foreign intelligence surveillance. On September 13, 2006, the Senate Judiciary Committee voted to approve all three, mutually exclusive bills, thus, leaving it to the full Senate to resolve. On July 18, 2006, U.S. Representative Heather Wilson introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson's bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack. Surveillance beyond the initially authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006 the House of Representatives passed Wilson's bill and it was referred to the Senate. Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISC oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (already passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).


FISC order

On January 18, 2007, Gonzales told the Senate Judiciary Committee, The ruling by the FISC was the result of a two-year effort between the White House and the court to find a way to obtain court approval that also would "allow the necessary speed and agility" to find terrorists, Gonzales said in a letter to the top committee members. The court order on January 10 will do that, Gonzales wrote. Senior Justice department officials would not say whether the orders provided individual warrants for each wiretap or whether the court had given blanket legal approval for the entire NSA program. The ACLU said in a statement that "without more information about what the secret FISC has authorized, there is no way to determine whether the NSA's current activities are lawful". Law professor Chip Pitts argued that substantial legal questions remain regarding the core NSA program as well as the related data mining program (and the use of
National Security Letter A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Cre ...
s), despite the government's apparently bringing the NSA program within the purview of FISA.


FISCR ruling

In August 2008, the United States Foreign Intelligence Surveillance Court of Review (FISCR) affirmed the constitutionality of the Protect America Act of 2007 in a heavily redacted opinion released on January 15, 2009, only the second such public ruling since the enactment of the FISA Act.


Relevant constitutional, statutory and administrative provisions


U.S. Constitution


Article I and II

Article I Article One may refer to: Legal codes * Article One of the United States Constitution, pertaining to the powers of the United States Congress * Article One of the Constitution of India, pertaining to the federal nature of the republic Other us ...
vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The Supreme Court has used the "necessary and proper" clause to affirm broad Congressional authority to legislate as it sees fit in the domestic arena, but has limited its application in foreign affairs. In the landmark '' US v. Curtiss-Wright'' (1936) decision, Justice
George Sutherland George Alexander Sutherland (March 25, 1862July 18, 1942) was an English-born American jurist and politician. He served as an associate justice of the U.S. Supreme Court between 1922 and 1938. As a member of the Republican Party, he also repre ...
for the Court: Article II vests the President with power as " Commander in Chief of the Army and Navy of the United States," and requires that the President "shall take Care that the Laws be faithfully executed".


Fourth Amendment

The Fourth Amendment is part of the
Bill of Rights A bill of rights, sometimes called a declaration of rights or a charter of rights, is a list of the most important rights to the citizens of a country. The purpose is to protect those rights against infringement from public officials and pr ...
and prohibits "unreasonable" searches and seizures by the government. A search warrant must be judicially sanctioned, based on
probable cause In United States criminal law, probable cause is the standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal or the issuing of a search warrant. There is no universally accepted definition o ...
, supported by oath or affirmation (usually by a
law enforcement officer A law enforcement officer (LEO), or peace officer in North American English, is a public-sector employee whose duties primarily involve the enforcement of laws. The phrase can include campaign disclosure specialists, local police officers, ...
), particularly describing the place to be searched and the persons or things to be seized, limited in scope (according to specific information supplied to the issuing court). It is solely a right of the people that neither the
Executive Executive ( exe., exec., execu.) may refer to: Role or title * Executive, a senior management role in an organization ** Chief executive officer (CEO), one of the highest-ranking corporate officers (executives) or administrators ** Executive dir ...
nor
Legislative branch A legislature is an assembly with the authority to make laws for a political entity such as a country or city. They are often contrasted with the executive and judicial powers of government. Laws enacted by legislatures are usually known ...
can lawfully abrogate, even if acting in concert: no statute can make an unreasonable search reasonable. The term "unreasonable" connotes the sense that a constitutional search has a rational basis, that it is not an excessive imposition upon the individual given the circumstances and is in accordance with societal norms. It relies on judges to be sufficiently independent of the authorities seeking warrants that they can render an impartial decision. Evidence obtained in an unconstitutional search is inadmissible in a criminal trial (with certain exceptions). The Fourth Amendment explicitly allows reasonable searches, including searches without warrant in specific circumstances. Such circumstances include the persons, property and papers of individuals crossing the border of the United States and those of paroled felons; prison inmates, public schools and government offices; and of international mail. Although these are undertaken pursuant to a statute or an
executive order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of t ...
, they derive their legitimacy from the Amendment, rather than these.


Ninth and Tenth Amendments

The Tenth Amendment explicitly states that powers neither granted to the federal government nor prohibited to the states are reserved to the states or the people. The Ninth Amendment states, "The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people." The Ninth Amendment bars denial of unenumerated rights if the denial is based on the "enumeration of certain rights" in the Constitution, but does not bar denial of unenumerated rights if the denial is based on the "enumeration of certain powers" in the Constitution.


Related Court opinions

The Supreme Court has historically used Article II to justify wide deference to the President in foreign affairs. Two historical and recent cases define the secret wiretapping by the NSA. ''Curtiss-Wright'': The extent of the President's power as Commander-in-Chief has never been fully defined, but two Supreme Court cases are considered seminal in this area: '' Youngstown Sheet and Tube Co. v. Sawyer'' (1952) and ''Curtiss-Wright''. The Supreme Court held in ''
Katz v. United States ''Katz v. United States'', 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the protections of the Fourth Amendment to the U.S. Constituti ...
'' (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore require a warrant. The Supreme Court held in '' Smith v Maryland'' (1979) that a judicial warrant is required for the government to acquire the content of electronic communications. However,
subpoena A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
s but not warrants are required for the business records ( ''metadata'') of their communications, data such as the numbers that an individual has phoned, when and, to a limited degree, where the phone conversation occurred. The protection of "private conversations" has been held to apply only to conversations where the participants have manifested both a desire and a reasonable expectation that their conversation is indeed private and that no other party is privy to it. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war. Various Circuit Courts upheld warrantless surveillance when the target was a
foreign agent A foreign agent is any person or entity actively carrying out the interests of a foreign country while located in another host country, generally outside the protections offered to those working in their official capacity for a diplomatic missio ...
residing abroad, a foreign agent residing in the US and a US citizen abroad.
United States v. Bin Laden
'', 126 F.Supp.2d 264 (S.D.N.Y. 2000)
The exception does not apply when both the target and the threat were deemed domestic. The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the Supreme Court, but occurred in the case of
Aldrich Ames Aldrich Hazen "Rick" Ames (; born May 26, 1941) is a former Central Intelligence Agency (CIA) officer turned KGB double agent, who was convicted of espionage in 1994. He is serving a life sentence, without the possibility of parole, in the Federa ...
. The law recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad. In '' United States v. Verdugo-Urquidez'', the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant was required to engage in even physical searches of non-U.S. citizens abroad. In 1985 the Supreme Court established the "border search exception", which permits warrantless searches at the US border "or its functional equivalent" in ''
United States v. Montoya De Hernandez ''United States v. Montoya De Hernandez'', 473 U.S. 531 (1985), was a U.S. Supreme Court case regarding the Fourth Amendment's border search exception and balloon swallowing. Background Rose Elvira Montoya de Hernandez entered the United States ...
'', 473 U.S. 531, 538. The US can do so as a sovereign nation to protect its interests. Courts have explicitly included computer hard drives within the exception (''United States v. Ickes'', 393 F.3d 501 4th Cir. 2005), while ''United States v. Ramsey'', explicitly included all international postal mail. The Supreme Court has not ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. Multiple Circuit Court rulings uphold the constitutionality of warrantless searches or the admissibility of evidence so obtained. In ''United States v. Bin Laden'', the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States."


National Security Act of 1947

The National Security Act of 1947 requires Presidential findings for covert acts. SEC. 503. 0 U.S.C. 413b(a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States." Under § 501–503, codified as 50 USC § 413-§ 413b, the President is required to keep Congressional intelligence committees "fully and currently" informed of U.S. intelligence activities, "consistent with ... protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." For covert actions, from which intelligence gathering activities are specifically excluded in § 413b(e)(1), the President is specifically permitted to limit reporting to selected Members.


Foreign Intelligence Surveillance Act

The 1978 Foreign Intelligence Surveillance Act (FISA) regulates government agencies' physical searches and electronic surveillance, in cases wherein a significant purpose is to gather foreign intelligence information. "Foreign intelligence information" is defined in as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power,
sabotage Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identitie ...
or international terrorism. FISA defines a "foreign power" as a foreign government or any faction(s) of a foreign government not substantially composed of US persons, or any entity directed or controlled by a foreign government. FISA provides for both criminal and
civil Civil may refer to: *Civic virtue, or civility *Civil action, or lawsuit * Civil affairs *Civil and political rights *Civil disobedience *Civil engineering *Civil (journalism), a platform for independent journalism *Civilian, someone not a membe ...
liability for
intentional Intentions are mental states in which the agent commits themselves to a course of action. Having the plan to visit the zoo tomorrow is an example of an intention. The action plan is the ''content'' of the intention while the commitment is the ''a ...
electronic surveillance under color of law except as authorized by statute. FISA specifies two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants a ...
(FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant if "there is
probable cause In United States criminal law, probable cause is the standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal or the issuing of a search warrant. There is no universally accepted definition o ...
to believe that ... the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. § 1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. § 1802(a)(1). In 2002, the
United States Foreign Intelligence Surveillance Court of Review The United States Foreign Intelligence Surveillance Court of Review (FISCR) is a U.S. federal court whose sole purpose is to review denials of applications for electronic surveillance warrants (called FISA warrants) by the United States Foreign ...
(Court of Review) met for the first time and issued an opinion ('' In re: Sealed Case No. 02-001''). They noted that all of the Federal courts of appeal had considered the issue and concluded that constitutional power allowed the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exists" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power." (2)(f) provides in part that FISA "shall be the exclusive means by which electronic surveillance, as defined in ... and the intercept of domestic ommunicationsmay be conducted". The statute includes a criminal sanctions subpart granting an exception, "unless authorized by statute".


Authorization for the Use of Military Force

The Authorization for Use of Military Force was passed by Congress shortly after the 9/11 attacks. AUMF was used to justify the Patriot Act and related laws. It explicitly states in Section 2:


USA PATRIOT Act

Section 215 of the PATRIOT act authorized the FBI to subpoena some or all business records from a business record holder using a warrant applied for in the Foreign Intelligence Surveillance Court.


Terrorist surveillance program

The
legality Legality, in respect of an act, agreement, or contract is the state of being consistent with the law or of being lawful or unlawful in a given jurisdiction, and the construct of power. According to the Merriam-Webster Dictionary, legality is 1 : ...
of surveillance involving US persons and extent of this authorization is the core of this controversy which includes: *
Constitutional A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organisation or other type of entity and commonly determine how that entity is to be governed. When these prin ...
issues concerning the
separation of powers Separation of powers refers to the division of a state's government into branches, each with separate, independent powers and responsibilities, so that the powers of one branch are not in conflict with those of the other branches. The typic ...
and the Fourth Amendment immunities * The program's effectiveness and scope * The legality of the leaking and publication of classified information and their implications for national security * Adequacy of FISA as a tool for fighting terrorism


Technical and operational details

Because of its highly classified status, the implementation of the TSP is not fairly known by the public. Once Mark Klein, a retired
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile te ...
communications technician, submitted an
affidavit An ( ; Medieval Latin for "he has declared under oath") is a written statement voluntarily made by an ''affiant'' or '' deponent'' under an oath or affirmation which is administered by a person who is authorized to do so by law. Such a stateme ...
describing technical details known to him personally in support of the 2006 '' Hepting v. AT&T'' court ''case''. Klein's January 16, 2004 statement included additional details regarding the construction of an NSA monitoring facility in
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which were occupied by AT&T. According to Klein's affidavit, the NSA-equipped room used equipment built by Narus Corporation to intercept and analyze communications traffic, as well as to perform data-mining. Experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on Klein's affidavits and those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdicti ...
. They concluded that the likely architecture of the system created serious security risks, including the danger that it could be exploited by unauthorized users, criminally misused by trusted insiders or abused by government agents.
David Addington David Spears Addington (born January 22, 1957) is an American lawyer who was legal counsel (2001–2005) and chief of staff (2005–2009) to Vice President Dick Cheney. He was the vice president of domestic and economic policy studies at the He ...
– at that time legal counsel to former Vice President Dick Cheney – was reported to be the author of the controlling legal and technical documents for the program.


Legal issues

While the dispute over the NSA program was waged on multiple fronts, the legal dispute pitted Bush and Obama administrations against opponents in Congress and elsewhere. Supporters claimed that the President's Constitutional duties as commander in chief allowed him to take all necessary steps in wartime to protect the nation and that AUMF activated those powers. Opponents countered by claiming that instead that existing statutes (predominantly FISA) circumscribed those powers, including during wartime. Formally, the question can be seen as a disagreement over whether Constitutional or statutory law should rule in this case. As the debate continued, other arguments were advanced.


Constitutional issues

The constitutional debate surrounding the program is principally about
separation of powers Separation of powers refers to the division of a state's government into branches, each with separate, independent powers and responsibilities, so that the powers of one branch are not in conflict with those of the other branches. The typic ...
. If no "fair reading" of FISA can satisfy the canon of avoidance, these issues must be decided at the appellate level. In such a separation of powers dispute, Congress bears burden of proof to establish its supremacy: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.


Article I and II

Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence is a historical point of contention between the Executive and Legislative branches. In other rulings has been recognized as "fundamentally incident to the waging of war".U.S. Department of Justice White Paper on NSA Legal Authoritie
"Legal Authorities Supporting the Activities of the National Security Agency Described by the President" (pdf)
January 19, 2006.
''"Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information"'', published by The
Congressional Research Service The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
stated: The same report repeats the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such is within their purview to regulate, and further that Congress may "tailor the President's use of an inherent constitutional power":


Fourth Amendment

The Bush administration claimed that the administration viewed the unanimity of pre-FISA Circuit Court decisions as vindicating their argument that warrantless foreign-intelligence surveillance authority existed prior to and subsequent to FISA and that this derived its authority from the Executive's inherent Article II powers, which may not be encroached upon by statute.


District Court findings

Even some legal experts who agreed with the outcome of ACLU v. NSA criticized the opinion's reasoning. Glenn Greenwald argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they focused solely on standing and state secrets grounds).


FISA practicality

FISA grants FISC the exclusive power to authorize surveillance of US persons as part of foreign intelligence gathering and makes no separate provision for surveillance in wartime. The interpretation of FISA's exclusivity clause is central because both sides agree that the NSA program operated outside FISA. If FISA is the controlling authority, the program is illegal. The "no constitutional issue" critique is that Congress has the authority to legislate in this area under Article I and the Fourth Amendment, while the "constitutional conflict" critique claims that the delineation between Congressional and Executive authority in this area is unclear, but that FISA's exclusivity clause shows that Congress had established a role for itself in this arena. The Bush administration argued both that the President had the necessary power based solely on the Constitution and that conforming to FISA was not practical given the circumstances. Assistant Attorney General for Legislative Affairs, William Moschella, wrote: FBI Special Agent
Coleen Rowley Coleen Rowley (born December 20, 1954) is an American former FBI special agent and whistleblower, and was a Democratic-Farmer-Labor Party (DFL) candidate for Congress in Minnesota's 2nd congressional district, one of eight congressional dist ...
, in her capacity as legal counsel to the Minneapolis Field Office recounted how FISA procedural hurdles had hampered the FBI's investigation of
Zacarias Moussaoui Zacarias Moussaoui (Arabic: زكريا موسوي, '; born May 30, 1968) is a French member of al-Qaeda who pleaded guilty in U.S. federal court to conspiring to kill citizens of the United States as part of the September 11 attacks. He is se ...
(the so-called "20th hijacker") prior to the
9/11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commerci ...
. Among the factors she cited were the complexity of the application, the amount of detailed information required, confusion by field operatives about the standard of probable cause required by the FISC and the strength of the required link to a foreign power. At his appearance before the Senate Judiciary Committee in June 2002, FBI Director Robert Mueller responded to questions about the Rowley allegations, testifying that unlike normal criminal procedures, FISA warrant applications are "complex and detailed", requiring the intervention of FBI Headquarters (FBIHQ) personnel trained in a specialized procedure (the "Woods" procedure) to ensure accuracy. The Supreme Court made no ruling on this question. However, on June 29, 2006, in ''Hamdan'', the Supreme Court rejected an analogous argument. Writing for the majority, Justice John Paul Stevens, while ruling that "the AUMF activated the President's war powers, and that those powers include the authority to convene military commissions in appropriate circumstances" (citations omitted), held that nothing in the AUMF language expanded or altered the Uniform Code of Military Justice (which governs military commissions.) Stevens distinguished ''Hamdan'' from ''Hamdi'' (in which AUMF language was found to override the explicit language regarding detention in 18 U.S.C. § 4001(a)) in that ''Hamdan'' would require a "Repeal by implication" of the UCMJ.


Authorizing statute

The Bush administration held that AUMF enables warrantless surveillance because it is an authorizing statute. An Obama Department of Justice whitepaper interpreted FISA's "except as authorized by statute" clause to mean that Congress allowed for future legislative statute(s) to provide exceptions to the FISA warrant requirements and that the AUMF was such a statute. They further claimed that AUMF implicitly provided executive authority to authorize warrantless surveillance. This argument is based on AUMF language, specifically, the acknowledgment of the President's Constitutional authority contained in the preamble: and the language in the resolution; The Obama administration further claimed that Title II of the USA PATRIOT Act entitled '' Enhanced Surveillance Procedures'' also allowed the program, Obama stated that Americans' civil liberties were protected and that purely domestic wiretapping was conducted only pursuant to warrants. Because FISA authorizes the President to bypass the FISC only during the first 15 days of a war declared by Congress, the argument claimed the AUMF implicitly gave the President the necessary power (as would any Congressional declaration of war). However, as a declaration of war encompasses all military actions so declared, including any otherwise constrained by Congress, the administration held that FISA set a presumptive minimum, which might be extended (explicitly or implicitly) by a declaration.


Corporate confidentiality analysis

Corporate secrecy is also an issue. In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity". However, Chief Judge Walker stated, during the September 12, 2008 hearing in the EFF class-action lawsuit, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.


Duty to notify Congress

The Bush administration contended that with regard to the NSA program, it had fulfilled its notification obligations by briefing key members of Congress (thirteen individuals between the 107th and 109th Congressional sessions) more than a dozen times, but they were forbidden from sharing that information with other members or staff. The CRS report asserted that the specific statutory notification procedure for covert action did not apply to the NSA program. It is not clear whether a restricted notification procedure intended to protect sources and methods was expressly prohibited. Additionally, the sources and methods exception requires a factual determination as to whether it should apply to disclosure of the program itself or only to specific aspects. Peter J. Wallison, former
White House Counsel The White House counsel is a senior staff appointee of the president of the United States whose role is to advise the president on all legal issues concerning the president and their administration. The White House counsel also oversees the Of ...
to President Ronald Reagan stated, "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."


War Powers Resolution

The majority of legal arguments supporting the program were based on the
War Powers Resolution The War Powers Resolution (also known as the War Powers Resolution of 1973 or the War Powers Act) () is a federal law intended to check the U.S. president's power to commit the United States to a ...
. The War Powers Resolution has been questioned since its creation, and its application to the NSA program was questioned.


US citizens

No declaration of war explicitly applied to US citizens. Under the War Powers Resolution the only option to include them was to enact an encompassing authorization of the use of military force. The AUMF did not explicitly do so. Under AUMF, "nations, organizations or persons" must be identified as having planned, authorized, committed, aided or harbored the (9/11) attackers. Military force is thereby limited to those parties. Since no US citizens were alleged to be involved in the 9/11 attacks, and since AUMF strictly states that war-time enemies are those who were involved in 9/11, including US citizens in general exceeds these provisions. Opinions that actions stemming from the Patriot Act are constitutional follow from the AUMF. Since AUMF wartime powers do not explicitly apply to US citizens in general, they are exempted from its provision as a function of Ninth Amendment unenumerated rights. Therefore, Patriot Act provisions that are unconstitutionally (violating the first, fourth and other amendments) applied to US citizens are not rescued by the AUMF.


Other arguments

Philip Heymann Philip Benjamin Heymann (October 30, 1932 – November 30, 2021) was an American lawyer, federal prosecutor, legal scholar, and law professor who headed the Criminal Division of the Justice Department as Assistant Attorney General during the Pre ...
claimed Bush had misstated the '' In re: Sealed Case No. 02-001'' ruling that supported Congressional regulation of surveillance. Heymann said, "The bottom line is, I know of no electronic surveillance for intelligence purposes since the Foreign Intelligence Surveillance Act was passed that was not done under the ... statute." Cole, Epstein, Heynmann, Beth Nolan, Curtis Bradley, Geoffrey Stone,
Harold Koh Harold Hongju Koh (born December 8, 1954) is an American lawyer and legal scholar who served as the legal adviser of the Department of State in the Obama administration. He was nominated to this position by President Barack Obama on March 23, 20 ...
, Kathleen Sullivan,
Laurence Tribe Laurence Henry Tribe (born October 10, 1941) is an American legal scholar who is a University Professor Emeritus at Harvard University. He previously served as the Carl M. Loeb University Professor at Harvard Law School. A constitutional law sc ...
, Martin Lederman, Ronald Dworkin, Walter Dellinger, William Sessions and
William Van Alstyne William Warner Van Alstyne (February 8, 1934 – January 29, 2019) was an American attorney, law professor, and constitutional law scholar. Prior to retiring in 2012, he held the named position of Lee Professor of Law at William and Mary Law Sch ...
wrote, "the Justice Department's defense of what it concedes was secret and warrantless electronic surveillance of persons within the United States fails to identify any plausible legal authority for such surveillance." They summarized: Law school dean Robert Reinstein asserted that the warrantless domestic spying program is Law professor Robert M. Bloom and William J. Dunn, a former Defense Department intelligence analyst, claimed: Law professor Jordan Paust argued: Law Dean
Harold Koh Harold Hongju Koh (born December 8, 1954) is an American lawyer and legal scholar who served as the legal adviser of the Department of State in the Obama administration. He was nominated to this position by President Barack Obama on March 23, 20 ...
, Suzanne Spaulding and
John Dean John Wesley Dean III (born October 14, 1938) is an American former attorney who served as White House Counsel for U.S. President Richard Nixon from July 1970 until April 1973. Dean is known for his role in the cover-up of the Watergate scandal ...
contended that FISA was controlling, (in seeming disagreement with the FISC of Review finding) and that the President's admissions constituted sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence. Law professor John C. Eastman compared the CRS and DOJ reports and concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war." Law professor
Orin Kerr Orin Samuel Kerr (born June 2, 1971) is an American legal scholar and professor of law at the UC Berkeley School of Law."Faculty , UC Berkeley School of Law"Orin Kerr faculty profile/ref> He is known as a scholar in the subjects of computer crim ...
argued that the part of ''In re: Sealed Case No. 02-001'' that dealt with FISA (rather than the Fourth Amendment) was nonbinding ''obiter dicta'' and that the argument did not restrict Congress's power to regulate the executive in general. Separately Kerr argued for wireless surveillance based on the fact that the
border search exception In United States criminal law, the border search exception is a doctrine that allows searches and seizures at international borders and their functional equivalent without a warrant or probable cause. The doctrine is not regarded as an exceptio ...
permits searches at the border "or its functional equivalent." (''
United States v. Montoya De Hernandez ''United States v. Montoya De Hernandez'', 473 U.S. 531 (1985), was a U.S. Supreme Court case regarding the Fourth Amendment's border search exception and balloon swallowing. Background Rose Elvira Montoya de Hernandez entered the United States ...
'', 473 U.S. 531, 538 (1985)). As a sovereign nation the US can inspect goods crossing the border. The ruling interpreted the Fourth Amendment to permit such searches. Courts have applied the border search exception to computers and hard drives, e.g., ''United States v. Ickes'', 393 F.3d 501 (4th Cir. 2005) Case law does not treat data differently than physical objects. Case law applies the exception to international airports and international mail (''United States v. Ramsey''). Case law is phrased broadly. The exception could analogously apply to monitoring an ISP or telephony provider. U.S. District Judge Dee Benson, who served on the FISC, stated that he was unclear on why the FISC's emergency authority would not meet the administration's stated "need to move quickly". The court was also concerned about "whether the administration had misled their court about its sources of information on possible terrorism suspects ... s thiscould taint the integrity of the court's work." Judge
Richard Posner Richard Allen Posner (; born January 11, 1939) is an American jurist and legal scholar who served as a federal appellate judge on the U.S. Court of Appeals for the Seventh Circuit from 1981 to 2017. A senior lecturer at the University of Chic ...
opined that FISA "retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. ISArequires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist."


Related issues


Earlier warrantless surveillance

The Bush administration compared the NSA warrantless surveillance program with historical wartime warrantless searches in the US, going back to the time of the nation's founding. Critics pointed out that the first warrantless surveillance occurred before the adoption of the U.S. Constitution, and the other historical precedents cited by the administration were before FISA's passage and therefore did not directly contravene federal law. Earlier electronic surveillance by the federal government such as
Project SHAMROCK Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency ...
, led to reform legislation in the 1970s. Advancing technology presented novel questions as early as 1985. Executive orders by previous administrations including Presidents Clinton and
Carter Carter(s), or Carter's, Tha Carter, or The Carter(s), may refer to: Geography United States * Carter, Arkansas, an unincorporated community * Carter, Mississippi, an unincorporated community * Carter, Montana, a census-designated place * Carter ...
authorized their Attorneys General to exercise authority with respect to both options under FISA. Clinton's executive order authorized his Attorney General " ursuantto section 302(a)(1)" to conduct physical searches without court order "if the Attorney General makes the certifications required by that section".


Unitary Executive theory

The
Unitary Executive theory The unitary executive theory is a theory of United States constitutional law which holds that the President of the United States possesses the power to control the entire federal executive branch. The doctrine is rooted in Article Two of the Un ...
as interpreted by
John Yoo John Choon Yoo (; born July 10, 1967) is a Korean-born American legal scholar and former government official who serves as the Emanuel S. Heller Professor of Law at the University of California, Berkeley. Yoo became known for his legal opinions ...
et al., supported the Bush administration's Constitutional argument. He argued that the President had the "inherent authority to conduct warrantless searches to obtain foreign intelligence". The
United States Court of Appeals for the District of Columbia The United States Court of Appeals for the District of Columbia Circuit (in case citations, D.C. Cir.) is one of the thirteen United States Courts of Appeals. It has the smallest geographical jurisdiction of any of the U.S. federal appellate co ...
ruled that the President's authority as commander-in-chief extends to the "independent authority to repel aggressive acts ... without specific congressional authorization" and without court review of the "level of force selected". Whether such declarations applying to foreign intelligence are or must be in compliance with FISA has been examined by few courts.


Classified information


Leaks

No single law criminalizes the leaking of classified information. Statutes prohibit leaking certain types of classified information under certain circumstances. One such law is ; it was tacked on to the
Espionage Act of 1917 The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code (War ...
. It is known as the 'SIGINT' statute, meaning signals intelligence. This statute says: This statute is not limited in application to only federal government employees. However, the Code of Federal Regulations suggests the statute may apply primarily to the " mmunication of classified information by Government officer or employee". 50 USCS § 783 (2005). A statutory procedure allows a "
whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
" in the intelligence community to report concerns with the propriety of a secret program. The
Intelligence Community Whistleblower Protection Act The Intelligence Community Whistleblower Protection Act of 1998, amending the Central Intelligence Agency Act of 1949 and the Inspector General Act of 1978, sets forth a procedure for employees and contractors of specified federal intelligence ...
of 1998, Pub. L. 105–272, Title VII, 112 Stat. 2413 (1998) essentially provides for disclosure to the agency Inspector General, and if the result of that is unsatisfactory, appeal to the Congressional Intelligence Committees. Former
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
official Russ Tice asked to testify under the terms of the Intelligence Community Whistleblower Protection Act, in order to provide information to these committees about "highly classified Special Access Programs, or SAPs, that were improperly carried out by both the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
and the
Defense Intelligence Agency The Defense Intelligence Agency (DIA) is an intelligence agency and combat support agency of the United States Department of Defense, specializing in defense and military intelligence. A component of the Department of Defense (DoD) and the ...
". Executive Order 13292, which sets up the U.S. security classification system, provides (Sec 1.7) that " no case shall information be classified in order to conceal violations of law". Given doubts about the legality of the overall program, the classification of its existence may not have been valid under E.O. 13292.


Publication of classified information

It is unlikely that a media outlet could be held liable for publishing classified information under established Supreme Court precedent. In '' Bartnicki v. Vopper'', 532 U.S. 514, the Supreme Court held that the First Amendment precluded liability for a media defendant for publication of illegally obtained communications that the media defendant itself did nothing illegal to obtain, if the topic involves a public controversy. Due to the suit's procedural position, the Court accepted that intercepting information that was ultimately broadcast by the defendant was initially illegal (in violation of ECPA), but nonetheless gave the radio station a pass because it did nothing itself illegal to obtain the information. Nor could the government have prevented the publication of the classified information by obtaining an injunction. In the
Pentagon Papers The ''Pentagon Papers'', officially titled ''Report of the Office of the Secretary of Defense Vietnam Task Force'', is a United States Department of Defense history of the United States' political and military involvement in Vietnam from 1945 ...
case, ('' New York Times Co. v. U.S.'', ), the Supreme Court held that injunctions against the publication of classified information (''United States-Vietnam Relations, 1945–1967: A Study Prepared by The Department of Defense'' – a 47-volume, 7,000-page, top-secret
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
history of the United States' involvement in the
Vietnam War The Vietnam War (also known by other names) was a conflict in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. It was the second of the Indochina Wars and was officially fought between North Vietnam a ...
) were unconstitutional
prior restraint Prior restraint (also referred to as prior censorship or pre-publication censorship) is censorship imposed, usually by a government or institution, on expression, that prohibits particular instances of expression. It is in contrast to censorship ...
s and that the government had not met the heavy burden of proof required for prior restraint. The ''1917 Espionage Act'', aside from the
SIGINT Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
provision discussed above, only criminalizes 'national defense' information, not 'classified' information. Although the Justice Department as a matter of law sees no exemption for the press, as a matter of fact it has refrained from prosecuting: On the other hand, Sean McGahan of Northeastern University stated,


Responses and analyses


Administration response to press coverage

On December 17, 2005, President Bush addressed the growing controversy in his weekly radio broadcast. He stated that he was using his authority as President, as Commander in Chief and such authority as the Congress had given him, to intercept international communications of "people with known links to al Qaeda and related terrorist organizations". He added that before intercepting any communications, "the government must have information that establishes a clear link to these terrorist networks." He speculated that had the right communications been intercepted, perhaps the 9/11 attacks could have been prevented. He said the NSA program was re-authorized every 45 days, having at that time been reauthorized "more than 30 times"; it was reviewed by DOJ and NSA lawyers "including NSA's general counsel and inspector general", and Congress leaders had been briefed "more than a dozen times". In a speech in Buffalo, New York on April 20, 2004, he said that: And again, during a speech at Kansas State University on January 23, 2006, President Bush mentioned the program, and added that it was "what I would call a terrorist surveillance program", intended to "best ... use information to protect the American people", and that: During a speech in New York on January 19, 2006 Vice President Cheney commented on the controversy, stating that a "vital requirement in the war on terror is that we use whatever means are appropriate to try to find out the intentions of the enemy," that complacency towards further attack was dangerous, and that the lack of another major attack since 2001 was due to "round the clock efforts" and "decisive policies", and "more than luck." He stated: In a press conference on December 19 held by both Attorney General Gonzales and General Michael Hayden, the Principal Deputy Director for National Intelligence, General Hayden claimed, "This program has been successful in detecting and preventing attacks inside the United States." He stated that even an emergency authorization under FISA required marshaling arguments and "looping paperwork around". Hayden implied that decisions on whom to intercept under the wiretapping program were being made on the spot by a shift supervisor and another person, but refused to discuss details of the specific requirements for speed. Beginning in mid-January 2006 public discussion increased on the legality of the terrorist surveillance program. DOJ sent a 42-page
white paper A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. A white pape ...
to Congress on January 19, 2006 stating the grounds upon which it was felt the NSA program was legal, which restated and elaborated on reasoning Gonzales used at the December press conference. Gonzales spoke again on January 24, claiming that Congress had given the President the authority to order surveillance without going through the courts, and that normal procedures to order surveillance were too slow and cumbersome. General Hayden stressed the NSA's respect for the Fourth Amendment, stating at the
National Press Club Organizations A press club is an organization for journalists and others professionally engaged in the production and dissemination of news. A press club whose membership is defined by the press of a given country may be known as a National Press ...
on January 23, 2006, "Had this program been in effect prior to 9/11, it is my professional judgment that we would have detected some of the 9/11 al Qaeda operatives in the United States, and we would have identified them as such." In a speech on January 25, 2006, President Bush said, "I have the authority, both from the Constitution and the Congress, to undertake this vital program," telling the House Republican Caucus at their February 10 conference in Maryland that "I wake up every morning thinking about a future attack, and therefore, a lot of my thinking, and a lot of the decisions I make are based upon the attack that hurt us." President Bush reacted to a May 10 domestic call records article by restating his position, that it is "not mining or trolling through the personal lives of millions of innocent Americans".


Congressional response

Three days after news broke about the NSA program, a bipartisan group of Senators—Democrats
Dianne Feinstein Dianne Goldman Berman Feinstein ( ; born Dianne Emiel Goldman; June 22, 1933) is an American politician who serves as the senior United States senator from California, a seat she has held since 1992. A member of the Democratic Party, she wa ...
, Carl Levin, Ron Wyden and Republicans
Chuck Hagel Charles Timothy Hagel ( born October 4, 1946)Olympia Snowe Olympia Jean Snowe (; born February 21, 1947) is an American businesswoman and politician who was a United States Senator from Maine from 1995 to 2013. Snowe, a member of the Republican Party, became known for her ability to influence the outcom ...
, wrote to the
Judiciary The judiciary (also known as the judicial system, judicature, judicial branch, judiciative branch, and court or judiciary system) is the system of courts that adjudicates legal disputes/disagreements and interprets, defends, and applies the law ...
and Intelligence Committee chairs and ranking members requesting the two committees to "seek to answer the factual and legal questions" about the program. On January 20, 2006, in response to the administration's asserted claim to base the NSA program in part on the AUMF, Senators Leahy and Kennedy introduced Senate Resolution 350 that purported to express a "sense of the Senate" that the AUMF "does not authorize warrantless domestic surveillance of United States citizens". It was not reported out of committee. In introducing their resolution to committee, they quoted Supreme Court Justice Sandra Day O'Connor's opinion that even war "is not a blank check for the President when it comes to the rights of the Nation's citizens". Additionally, they asserted that the DOJ legal justification was a "manipulation of the law" similar to other "overreaching" and "twisted interpretations" in recent times. Leahy and Kennedy also asserted that Gonzales had "admitted" at a press conference on December 19, 2005, that the Administration did not seek to amend FISA to authorize the NSA spying program because it was advised that "it was not something we could likely get." (However, as noted below under "Proposed Amendments to FISA", Gonzales made clear that what he actually said was that such an amendment was "not something
hey Hey or Hey! may refer to: Music * Hey (band), a Polish rock band Albums * ''Hey'' (Andreas Bourani album) or the title song (see below), 2014 * ''Hey!'' (Julio Iglesias album) or the title song, 1980 * ''Hey!'' (Jullie album) or the title s ...
could likely get" without disclosing the nature of the program and operational limitations and that it was believed that such disclosure would be damaging to national security.) Leahy and Kennedy asserted that the procedures adopted for the NSA program, specifically the 45-day reapproval cycle was "not good enough" because the review group were executive branch appointees. Finally, they concluded that Congressional and Judicial oversight were fundamental and should not be unilaterally discarded. In February 2008, the Bush administration backed a new version of FISA that would grant telecom companies retroactive immunity from lawsuits stemming from surveillance. On March 14, the House passed a bill that did not grant such immunity.


Anonymity networks

Edward Snowden copied and leaked thousands of classified NSA documents to journalists. The information revealed the access of some federal agencies to the public's online identity and led to wider use anonymizing technologies. In late 2013, soon after Snowden's leaks, it was loosely calculated that encrypted browsing software, such as
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
,
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
and
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
had "combined to more than double in size ... and approximately 1,050,000 total machines 'legitimately' use the networks on a daily basis, amounting to an anonymous population that is about 0.011 percent of all machines currently connected to the Internet." Given that these tools are designed to protect the identity and privacy of their users, an exact calculation of the growth of the anonymous population cannot be accurately rendered, but all estimates predict rapid growth. These networks were accused of supporting illegal activity. They can be used for the illicit trade of drugs, guns and pornography. However, Tor executive director Roger Dingledine claimed that the "hidden services" represent only 2 percent of total traffic on Tor's network. This fact suggests that the large majority of those who use it do so in order to protect their normal browsing activity, an effort to protect their personal values of privacy rather than to participate in illegal activity.


Trade-off between security and liberty

Polls analyzed the trade-off between security and liberty. A June 2015 poll conducted by Gallup asked participants if the US should take all the necessary steps to prevent terrorist attacks even if civil liberties are violated. 30% of respondents agreed: 65% instead said take steps, but do not violate civil liberties. In a 2004 Pew poll, 60% of respondents rejected the idea of sacrificing privacy and freedom in the name of security. By 2014 a similar Pew poll found that 74% of respondents preferred privacy, while 22% said the opposite. Pew noted that post 9/11 surveys revealed that in the periods during which prominent incidents that related to privacy and security first came up, the majority of respondents favored an ideology of "security first", while maintaining that a dramatic reduction in civil liberties should be avoided. Events often caused Americans to back allow government to investigate suspected terrorists more effectively, even if those steps might infringe on the privacy of ordinary citizens. The majority of respondents reject steps that translate into extreme intrusion into their lives. Various administrations claimed that reducing privacy protections reduces obstacles that anti-terrorism agencies face attempting to foil terrorist attacks and that fewer privacy protections makes it more difficult for terrorist groups to operate.


See also

* '' Clapper v. Amnesty International'' – 2013 Supreme Court decision *
Communications Assistance for Law Enforcement Act The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
*
Criticism of the War on Terror Criticism of the war on terror addresses the morals, ethics, efficiency, economics, as well as other issues surrounding the war on terror. It also touches upon criticism against the phrase itself, which was branded as a misnomer. The notion of a ...
* Data mining *
Deep packet inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is oft ...
* ECHELON * Edward Snowden * Electronic Privacy Information Center v. Department of Justice * Foreign Intelligence Surveillance Act * General Michael Hayden * Global surveillance disclosures (1970–2013) *
Global surveillance whistleblowers Global surveillance whistleblowers are whistleblowers who provided public knowledge of global surveillance. Perry Fellwock Perry Fellwock revealed the existence of then ultra secretive National Security Agency (NSA) and its global mass surveillan ...
* '' Hepting v. AT&T'' * HTLINGUAL – a
CIA The Central Intelligence Agency (CIA ), known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, ...
project to intercept mail destined for the Soviet Union and China that operated from 1952 until 1973. *
Information Awareness Office The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology ...
* ''
In the First Circle ''In the First Circle'' (russian: link=no, italics=yes, В круге первом, V kruge pervom; also published as ''The First Circle'') is a novel by Russian writer Aleksandr Solzhenitsyn, released in 1968. A more complete version of the boo ...
'', Alexander Solzhenytsin * Mark Riebling * Mass surveillance *
NSA call database MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and ...
* NSA wiretapping programs *
Omnibus Crime Control and Safe Streets Act of 1968 The Omnibus Crime Control and Safe Streets Act of 1968 (, codified at ''et seq.'') was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Admi ...
*
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
– the program that replaced the warrantless surveillance program *
Reichstag Fire Decree The Reichstag Fire Decree (german: Reichstagsbrandverordnung) is the common name of the Decree of the Reich President for the Protection of People and State (german: Verordnung des Reichspräsidenten zum Schutz von Volk und Staat) issued by Germ ...
*
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
*
Secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
* Terrorist Surveillance Program – details of the program itself * Trailblazer Project


References


External links

* NSA Spying Scandal is repeating Hewlett-Packard Spying Scandal (2006) story â€
Read HP Pretexting Scandal
(pdf) by Faraz Davani, publisher Scribd, August 14, 2011
U.S. Department of Justice White Paper on NSA Legal Authorities
''Legal Authorities Supporting the Activities of the National Security Agency Described by the President'', January 19, 2006
Department of Justice Letter to the Senate Select Intelligence Committee
December 22 (PDF) via Federation of American Scientists

* ttps://fas.org/sgp/crs/intel/RL30465.pdf The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions– Congressional Research Service – April 2005 via Federation of American Scientists * FindLaw News Document Archive fo
National Security Agency (NSA)
* Cornell Law

* ttps://fas.org/irp/agency/doj/fisa/ FAS FISA Resource Page* Response by the American Bar Association: *
Letter to George W. Bush
(pdf) from ABA President Michael S. Greco, dated February 13, 2006 *
Resolution
(26-page pdf) from the ABA denouncing the warrantless wiretaps * David Alan Jordan
Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol
– Boston College Law Review, Vol. 47, 2006
''Washington Monthly'' blog post on an opposed conservative reaction


partly on this issue * FindLaw News Document Archive fo

* ''The New York Review of Books''
ON NSA SPYING: A LETTER TO CONGRESS
(Volume 53, Number 2, February 9, 2006) * JENNIFER VAN BERGEN

Findlaw (Monday, January 9, 2006) * ttps://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer The Secret Sharer: Is Thomas Drake an enemy of the state?A reportage by ''
The New Yorker ''The New Yorker'' is an American weekly magazine featuring journalism, commentary, criticism, essays, fiction, satire, cartoons, and poetry. Founded as a weekly in 1925, the magazine is published 47 times annually, with five of these issues ...
''s Jane Mayer from May 23, 2011 about the prosecution against
Thomas Andrews Drake Thomas Andrews Drake (born 1957) is a former senior executive of the National Security Agency (NSA), a decorated United States Air Force and United States Navy veteran, and a whistleblower. In 2010, the government alleged that Drake mishandled doc ...
in general and in particular in the context of the NSA warrantless surveillance controversy * Swire, Peter P.
"The System of Foreign Intelligence Surveillance Law"
– ''George Washington Law Review'', Vol. 72, 2004
C-SPAN videos (require RealPlayer)

Whistleblower says NSA violations bigger
United Press International, February 14, 2006
Letter from Senator Pat Roberts to Senator Arlen Specter
Senator defends NSA program legality, February 3, 2006 via Federation of American Scientists * ''Washington Post''s overview


ACLU v. NSA ruling
which held that the NSA warrantless surveillance program is illegal and unconstitutional and must be halted immediately.
"NSA warrantless wiretapping is illegal" argument diagram
at HonestArgument.com
"So Judge, How Do I Get That FISA Warrant?": The Policy and Procedure for Conducting Electronic Surveillance
The Army Lawyer, October 1997
Amicus Filed in NSA Wiretapping Case
{{DEFAULTSORT:Nsa Warrantless Surveillance Controversy Counterterrorism in the United States Emergency laws in the United States Espionage scandals and incidents George W. Bush administration controversies Obama administration controversies Privacy of telecommunications Privacy in the United States United States national security policy Surveillance scandals National Security Agency operations