NSA Warrantless Surveillance (2001–2007)
   HOME

TheInfoList



OR:

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — was the
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, phone calls, Internet activities, text messages and other forms of communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lay within the U.S. Critics claimed that the program was an effort to silence critics of the Bush administration and its handling of several controversial issues. Under public pressure, the Administration allegedly ended the program in January 2007 and resumed seeking warrants from the Foreign Intelligence Surveillance Court (FISC). In 2008,
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
passed the FISA Amendments Act of 2008, which relaxed some of the original FISC requirements. During the Obama administration, the U.S. Department of Justice (DOJ) continued to defend the warrantless surveillance program in court, arguing that a ruling on the merits would reveal state secrets. In April 2009, officials at the DOJ acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISC's authority, but claimed that the acts were unintentional and proceeded to continue overcollection of communications.


History

A week after the 9/11 attacks, Congress passed the Authorization for Use of Military Force Against Terrorists (AUMF), which inaugurated the " War on Terror". It later featured heavily in arguments over the NSA program. Soon after the 9/11 attacks, President Bush established the President's Surveillance Program. As part of the program, the Terrorist Surveillance Program was established pursuant to an
executive order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of the ...
that authorized the NSA to surveil certain telephone calls without obtaining a warrant (see ). The complete details of the executive order are not public, but according to administration statements, the authorization covers communication originating overseas from or to a person suspected of having links to terrorist organizations or their affiliates even when the other party to the call is within the US. In October 2001, Congress passed the Patriot Act, which granted the administration broad powers to fight terrorism. The Bush administration used these powers to bypass the FISC and directed the NSA to spy directly on
al-Qaeda , image = Flag of Jihad.svg , caption = Jihadist flag, Flag used by various al-Qaeda factions , founder = Osama bin Laden{{Assassinated, Killing of Osama bin Laden , leaders = {{Plainlist, * Osama bin Lad ...
via a new NSA electronic surveillance program. Reports at the time indicate that "apparently accidental ... technical glitches at the National Security Agency" resulted in the interception of communications that were between two U.S. parties. This act was challenged by multiple groups, including
Congress A congress is a formal meeting of the representatives of different countries, constituent states, organizations, trade unions, political parties, or other groups. The term originated in Late Middle English to denote an encounter (meeting of ...
, as
unconstitutional In constitutional law, constitutionality is said to be the condition of acting in accordance with an applicable constitution; "Webster On Line" the status of a law, a procedure, or an act's accordance with the laws or set forth in the applic ...
. The precise scope of the program remains secret, but the NSA was provided total, unsupervised access to all fiber-optic communications between the nation's largest telecommunication companies' major interconnected locations, encompassing phone conversations, email, Internet activity, text messages and corporate private network traffic. FISA makes it illegal to intentionally engage in electronic surveillance as an official act or to disclose or use information obtained by such surveillance under as an official act, knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000, up to five years in prison or both. The Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine, up to five years in prison, or both. After an article about the program, (which had been code-named
Stellar Wind A stellar wind is a flow of gas ejected from the stellar atmosphere, upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spheri ...
), was published in ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence. The ''Times'' had published the story after learning that the Bush administration was considering seeking a court injunction to block publication. Bill Keller, the newspaper's executive editor, had withheld the story from publication since before the 2004 Presidential Election. The published story was essentially the same that reporters James Risen and Eric Lichtblau had submitted in 2004. The delay drew criticism, claiming that an earlier publication could have changed the election's outcome. In a December 2008 interview, former Justice Department employee Thomas Tamm claimed to be the initial whistle-blower. The FBI began investigating leaks about the program in 2005, assigning 25 agents and five prosecutors. Attorney and author
Glenn Greenwald Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer. In 1996, Greenwald founded a law firm concentrating on First Amendment to the United States Constitution, First Amendment litigation. He began blo ...
argued: Gonzales said the program authorized warrantless intercepts where the government had "a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda" and that one party to the conversation was "outside of the United States". The revelation raised immediate concern among elected officials, civil rights activists, legal scholars and the public at large about the legality and constitutionality of the program and its potential for abuse. The controversy expanded to include the press's role in exposing a classified program, Congress's role and responsibility of executive oversight and the scope and extent of presidential powers. CRS released a report on the NSA program, "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", on January 5, 2006 that concluded: On January 18, 2006 the
Congressional Research Service The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
released another report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions". That report found that " sed upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, found no specific statutory basis for limiting briefings on the terrorist surveillance program. However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".


Legal action

While not directly ruling on the legality of domestic surveillance, the Supreme Court can be seen as having come down on both sides of the Constitution/statute question, in somewhat analogous circumstances. In '' Hamdi v. Rumsfeld'' (2004) the government claimed that AUMF authorized the detention of U.S. citizens designated as an enemy combatant despite its lack of specific language to that effect and notwithstanding the provisions of (a) that forbids the government to detain an American citizen except by act of Congress. In that case, the Court ruled: However, in '' Hamdan v. Rumsfeld'' the Court rejected the government's argument that AUMF implicitly authorized the President to establish military commissions in violation of the
Uniform Code of Military Justice The Uniform Code of Military Justice (UCMJ) is the foundation of the system of military justice of the armed forces of the United States. The UCMJ was established by the United States Congress in accordance with their constitutional authority ...
. The Court held: In footnote 23, the Court rejected the notion that Congress is impotent to regulate the exercise of executive war powers: Dozens of civil suits against the government and telecommunications companies over the program were consolidated before the chief judge of the Northern District of California, Vaughn R. Walker. One of the cases was a class-action lawsuit against
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
, focusing on allegations that the company had provided the NSA with its customers' phone and Internet communications for a data-mining operation. Plaintiffs in a second case were the al-Haramain Foundation and two of its lawyers. On August 17, 2006, Judge Anna Diggs Taylor of the United States District Court for the Eastern District of Michigan ruled in '' ACLU v. NSA'' that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of ISA or Title III. She wrote: In August 2007, a three-judge panel of the
United States Court of Appeals for the Ninth Circuit The United States Court of Appeals for the Ninth Circuit (in case citations, 9th Cir.) is the U.S. federal court of appeals that has appellate jurisdiction over the U.S. district courts for the following federal judicial districts: * Distric ...
heard arguments in two lawsuits challenging the program. On November 16, 2007, the three judges— M. Margaret McKeown, Michael Daly Hawkins and Harry Pregerson—issued a 27-page ruling that the al-Haramain Foundation could not introduce a key piece of evidence because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret." In a question-and-answer session published on August 22,
Director of National Intelligence The director of national intelligence (DNI) is a Cabinet of the United States#Current Cabinet and Cabinet-rank officials, cabinet-level Federal government of the United States, United States government intelligence and security official. The p ...
Mike McConnell first confirmed that the private sector had helped the program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies." Plaintiffs in the AT&T suit subsequently moved to have McConnell's acknowledgement admitted as evidence. In a related legal development, on October 13, 2007, Joseph Nacchio, the former CEO of Qwest Communications, appealed an April 2007 insider trading conviction by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified NSA program that the company thought might be illegal. He claimed that the NSA approached Qwest about participating in a warrantless surveillance program more than six months before 9/11. Nacchio used the allegation to show why his stock sale was not improper. According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11. On January 20, 2006, cosponsors Senator
Patrick Leahy Patrick Joseph Leahy ( ; born March 31, 1940) is an American politician and attorney who represented Vermont in the United States Senate from 1975 to 2023. A member of the Democratic Party (United States), Democratic Party, he also was the pr ...
and Ted Kennedy introduced Senate Resolution 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens". This non-binding resolution died without debate. On September 28, 2006, the U.S. House of Representatives passed the Electronic Surveillance Modernization Act (H.R. 5825).House Passes Wilson FISA Bill
, Press Release, September 29, 2006.
It died in the Senate. Three competing, mutually exclusive, bills—the Terrorist Surveillance Act of 2006 (S.2455), the National Security Surveillance Act of 2006 (S.2455) and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) – were referred for debate to the full Senate,Conflicting Bills on Warrantless Surveillance Advance in Senate
, Secrecy News, September 14, 2006
but did not pass. Each of these bills would have broadened the statutory authorization for electronic surveillance, while subjecting it to some restrictions.


Termination

On January 17, 2007, Gonzales informed Senate leaders that the program would not be reauthorized. "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.


Further legal action

The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
(ACLU) sued NSA over the program. Detroit District Court judge Anna Diggs Taylor ruled on August 17, 2006 that the program was illegal under FISA as well as unconstitutional under the First and Fourth amendments of the
Constitution A constitution is the aggregate of fundamental principles or established precedents that constitute the legal basis of a polity, organization or other type of entity, and commonly determines how that entity is to be governed. When these pri ...
. Judicial Watch, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case". '' ACLU v. NSA'' was dismissed on January 31, 2007 by the
United States Court of Appeals for the Sixth Circuit The United States Court of Appeals for the Sixth Circuit (in case citations, 6th Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * Eastern District of Kentucky * Western District of K ...
. The court did not rule on the spying program's legality. Instead, it declared that the plaintiffs did not have
standing Standing, also referred to as orthostasis, is a position in which the body is held in an upright (orthostatic) position and supported only by the feet. Although seemingly static, the body rocks slightly back and forth from the ankle in the ...
to sue because they could not demonstrate that they had been direct targets of the program. The Supreme Court let the ruling stand. On August 17, 2007, FISC said it would consider a request by the ACLU that asked the court to make public its recent, classified rulings on the scope of the government's wiretapping powers.
FISC Under the Merovingians and Carolingians, the fisc (from Latin '' fiscus,'' whence we derive "fiscal") applied to the royal demesne which paid taxes, entirely in kind, from which the royal household was meant to be supported, though it rarely was. ...
presiding judge Colleen Kollar-Kotelly signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing". The FISC ordered the government to respond on the issue by August 31. On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion. On February 19, 2008, the U.S. Supreme Court, without comment, turned down an ACLU appeal, letting stand the earlier decision dismissing the case. On September 18, 2008, the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
(EFF) sued the NSA, President Bush, Vice President Cheney, Cheney's chief of staff David Addington, Gonzales and other government agencies and individuals who ordered or participated in the program. They sued on behalf of AT&T customers. An earlier, ongoing suit ('' Hepting v. AT&T'') by the EFF bogged down over the recent FISA changes. On January 23, 2009, the Obama administration adopted the same position as its predecessor when it urged Judge Walker to set aside a ruling in ''Al-Haramain Islamic Foundation et al. v. Obama, et al.'' The Obama administration sided with the Bush administration in its legal defense of July 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the program, according to Attorney General Eric Holder. On March 31, 2010, Judge Walker ruled that the program was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable for damages. In 2012, the Ninth Circuit vacated the judgment against the United States and affirmed the district court's dismissal of the claim.


Proposed FISA amendments

Several commentators raised the issue of whether FISA needed to be amended to address foreign intelligence needs, technology developments and advanced technical intelligence gathering. The intent was to provide programmatic approvals of surveillance of foreign terrorist communications, so that they could then legally be used as evidence for FISA warrants. ''Fixing Surveillance''; ''Why We Listen'', ''The Eavesdropping Debate We Should be Having''; ''A New Surveillance Act''; ''A historical solution to the Bush spying issue,'' ''Whispering Wires and Warrantless Wiretaps'' address FISA's inadequacies in the post-9/11 context. The Bush administration contended that amendment was unnecessary because they claimed that the President had inherent authority to approve the NSA program, and that the process of amending FISA might require disclosure of classified information that could harm national security. In response, Senator Leahy said, "If you do not even attempt to persuade Congress to amend the law, you must abide by the law as written." President Bush claimed that the law did not apply because the Constitution gave him "inherent authority" to act. Some politicians and commentators used "difficult, if not impossible" to argue that the administration believed Congress would have rejected an amendment. In his written "Responses to Questions from Senator Specter" in which Specter specifically asked why the administration had not sought to amend FISA, Gonzales wrote: Competing legislative proposals to authorize the NSA program subject to Congressional or FISC oversight were the subject of Congressional hearings. On March 16, 2006, Senators Mike DeWine, Lindsey Graham, Chuck Hagel and Olympia Snowe introduced the Terrorist Surveillance Act of 2006 (S.2455), that gave the President limited statutory authority to conduct electronic surveillance of suspected terrorists in the US, subject to enhanced Congressional oversight. That day Specter introduced the National Security Surveillance Act of 2006 (S.2453), which would amend FISA to grant retroactive amnesty for warrantless surveillance conducted under presidential authority and provide FISC jurisdiction to review, authorize and oversee "electronic surveillance programs". On May 24, 2006, Specter and Feinstein introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) denoting FISA as the exclusive means to conduct foreign intelligence surveillance. On September 13, 2006, the Senate Judiciary Committee voted to approve all three, mutually exclusive bills, thus, leaving it to the full Senate to resolve. On July 18, 2006, U.S. Representative Heather Wilson introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson's bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack. Surveillance beyond the initially authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006 the House of Representatives passed Wilson's bill and it was referred to the Senate. Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISC oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (already passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).


FISC order

On January 18, 2007, Gonzales told the Senate Judiciary Committee, The ruling by the FISC was the result of a two-year effort between the White House and the court to find a way to obtain court approval that also would "allow the necessary speed and agility" to find terrorists, Gonzales said in a letter to the top committee members. The court order on January 10 will do that, Gonzales wrote. Senior Justice department officials would not say whether the orders provided individual warrants for each wiretap or whether the court had given blanket legal approval for the entire NSA program. The ACLU said in a statement that "without more information about what the secret FISC has authorized, there is no way to determine whether the NSA's current activities are lawful". Law professor Chip Pitts argued that substantial legal questions remain regarding the core NSA program as well as the related data mining program (and the use of National Security Letters), despite the government's apparently bringing the NSA program within the purview of FISA.


FISCR ruling

In August 2008, the United States Foreign Intelligence Surveillance Court of Review (FISCR) affirmed the constitutionality of the Protect America Act of 2007 in a heavily redacted opinion released on January 15, 2009, only the second such public ruling since the enactment of the FISA Act.


Relevant constitutional, statutory and administrative provisions


U.S. Constitution


Article I and II

Article I vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The Supreme Court has used the "necessary and proper" clause to affirm broad Congressional authority to legislate as it sees fit in the domestic arena, but has limited its application in foreign affairs. In the landmark '' US v. Curtiss-Wright'' (1936) decision, Justice George Sutherland for the Court: Article II vests the President with power as " Commander in Chief of the Army and Navy of the United States," and requires that the President "shall take Care that the Laws be faithfully executed".


Fourth Amendment

The Fourth Amendment is part of the Bill of Rights and prohibits "unreasonable" searches and seizures by the government. A search warrant must be judicially sanctioned, based on
probable cause In United States criminal law, probable cause is the legal standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal and for a court's issuing of a search warrant. One definition of the standar ...
, supported by oath or affirmation (usually by a
law enforcement officer A law enforcement officer (LEO), or police officer or peace officer in North American English, is a public-sector or private-sector employee whose duties primarily involve the enforcement of laws, protecting life & property, keeping the peace, ...
), particularly describing the place to be searched and the persons or things to be seized, limited in scope (according to specific information supplied to the issuing court). It is solely a right of the people that neither the Executive nor
Legislative branch A legislature (, ) is a deliberative assembly with the authority, legal authority to make laws for a Polity, political entity such as a Sovereign state, country, nation or city on behalf of the people therein. They are often contrasted with th ...
can lawfully abrogate, even if acting in concert: no
statute A statute is a law or formal written enactment of a legislature. Statutes typically declare, command or prohibit something. Statutes are distinguished from court law and unwritten law (also known as common law) in that they are the expressed wil ...
can make an unreasonable search reasonable. The term "unreasonable" connotes the sense that a constitutional search has a rational basis, that it is not an excessive imposition upon the individual given the circumstances and is in accordance with societal norms. It relies on judges to be sufficiently independent of the authorities seeking warrants that they can render an impartial decision. Evidence obtained in an unconstitutional search is inadmissible in a criminal trial (with certain exceptions). The Fourth Amendment explicitly allows reasonable searches, including searches without warrant in specific circumstances. Such circumstances include the persons, property and papers of individuals crossing the border of the United States and those of paroled felons; prison inmates, public schools and government offices; and of international mail. Although these are undertaken pursuant to a statute or an
executive order In the United States, an executive order is a directive by the president of the United States that manages operations of the federal government. The legal or constitutional basis for executive orders has multiple sources. Article Two of the ...
, they derive their legitimacy from the Amendment, rather than these.


Ninth and Tenth Amendments

The Tenth Amendment explicitly states that powers neither granted to the federal government nor prohibited to the states are reserved to the states or the people. The Ninth Amendment states, "The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people." The Ninth Amendment bars denial of unenumerated rights if the denial is based on the "enumeration of certain rights" in the Constitution, but does not bar denial of unenumerated rights if the denial is based on the "enumeration of certain powers" in the Constitution.


Related Court opinions

The
Supreme Court In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
has historically used Article II to justify wide deference to the President in foreign affairs. Two historical and recent cases define the secret wiretapping by the NSA. ''Curtiss-Wright'': The extent of the President's power as Commander-in-Chief has never been fully defined, but two Supreme Court cases are considered seminal in this area: '' Youngstown Sheet and Tube Co. v. Sawyer'' (1952) and ''Curtiss-Wright''. The Supreme Court held in '' Katz v. United States'' (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore require a warrant. The
Supreme Court In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
held in '' Smith v Maryland'' (1979) that a judicial warrant is required for the government to acquire the content of electronic communications. However,
subpoena A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
s but not warrants are required for the business records ( ''metadata'') of their communications, data such as the numbers that an individual has phoned, when and, to a limited degree, where the phone conversation occurred. The protection of "private conversations" has been held to apply only to conversations where the participants have manifested both a desire and a reasonable expectation that their conversation is indeed private and that no other party is privy to it. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war. Various Circuit Courts upheld warrantless surveillance when the target was a
foreign agent A foreign agent is any person or entity actively carrying out the interests of a foreign principal while located in another host country, generally outside the Diplomatic immunity, protections offered to those working in their official capacity fo ...
residing abroad, a foreign agent residing in the US and a US citizen abroad.
United States v. Bin Laden
'', 126 F.Supp.2d 264 (S.D.N.Y. 2000)
The exception does not apply when both the target and the threat were deemed domestic. The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the Supreme Court, but occurred in the case of
Aldrich Ames Aldrich Hazen Ames (; born May 26, 1941) is an American former Central Intelligence Agency, CIA counterintelligence officer who was convicted of espionage on behalf of the Soviet Union and Russia in 1994. He is serving a life sentence, without th ...
. The law recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad. In '' United States v. Verdugo-Urquidez'', the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant was required to engage in even physical searches of non-U.S. citizens abroad. In 1985 the Supreme Court established the "border search exception", which permits warrantless searches at the US border "or its functional equivalent" in '' United States v. Montoya De Hernandez'', 473 U.S. 531, 538. The US can do so as a sovereign nation to protect its interests. Courts have explicitly included computer hard drives within the exception (''United States v. Ickes'', 393 F.3d 501 4th Cir. 2005), while ''United States v. Ramsey'', explicitly included all international postal mail. The Supreme Court has not ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. Multiple Circuit Court rulings uphold the constitutionality of warrantless searches or the admissibility of evidence so obtained. In ''United States v. Bin Laden'', the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States."


National Security Act of 1947

The National Security Act of 1947 requires Presidential findings for covert acts. SEC. 503. 0 U.S.C. 413b(a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States." Under § 501–503, codified as 50 USC § 413-§ 413b, the President is required to keep Congressional intelligence committees "fully and currently" informed of U.S. intelligence activities, "consistent with ... protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." For covert actions, from which intelligence gathering activities are specifically excluded in § 413b(e)(1), the President is specifically permitted to limit reporting to selected Members.


Foreign Intelligence Surveillance Act

The 1978 Foreign Intelligence Surveillance Act (FISA) regulates government agencies' physical searches and electronic surveillance, in cases wherein a significant purpose is to gather foreign intelligence information. "Foreign intelligence information" is defined in as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power,
sabotage Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
or international terrorism. FISA defines a "foreign power" as a foreign government or any faction(s) of a foreign government not substantially composed of US persons, or any entity directed or controlled by a foreign government. FISA provides for both
criminal In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
and civil liability for intentional electronic surveillance under color of law except as authorized by statute. FISA specifies two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the Foreign Intelligence Surveillance Court (FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant if "there is
probable cause In United States criminal law, probable cause is the legal standard by which police authorities have reason to obtain a warrant for the arrest of a suspected criminal and for a court's issuing of a search warrant. One definition of the standar ...
to believe that ... the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. § 1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. § 1802(a)(1). In 2002, the
United States Foreign Intelligence Surveillance Court of Review The United States Foreign Intelligence Surveillance Court of Review (FISCR) is a U.S. federal court whose sole purpose is to review denials of applications for electronic surveillance warrants (called FISA warrants) by the United States Foreign ...
(Court of Review) met for the first time and issued an opinion ('' In re: Sealed Case No. 02-001''). They noted that all of the Federal courts of appeal had considered the issue and concluded that constitutional power allowed the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exists" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power." (2)(f) provides in part that FISA "shall be the exclusive means by which electronic surveillance, as defined in ... and the intercept of domestic ommunicationsmay be conducted". The statute includes a criminal sanctions subpart granting an exception, "unless authorized by statute".


Authorization for the Use of Military Force

The Authorization for Use of Military Force was passed by Congress shortly after the 9/11 attacks. AUMF was used to justify the Patriot Act and related laws. It explicitly states in Section 2:


USA PATRIOT Act

Section 215 of the PATRIOT act authorized the FBI to subpoena some or all business records from a business record holder using a warrant applied for in the Foreign Intelligence Surveillance Court.


Terrorist surveillance program

The
legality Legality, in respect of an act, agreement, or contract is the state of being consistent with the law or of being lawful or unlawful in a given jurisdiction, and the construct of power. ''Merriam-Webster'' defines legality as "1: attachment to or ...
of surveillance involving US persons and extent of this authorization is the core of this controversy which includes: * Constitutional issues concerning the
separation of powers The separation of powers principle functionally differentiates several types of state (polity), state power (usually Legislature#Legislation, law-making, adjudication, and Executive (government)#Function, execution) and requires these operat ...
and the Fourth Amendment immunities * The program's effectiveness and scope * The legality of the leaking and publication of classified information and their implications for national security * Adequacy of FISA as a tool for fighting terrorism


Technical and operational details

Because of its highly classified status, the implementation of the TSP is not fairly known by the public. Once Mark Klein, a retired
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
communications technician, submitted an
affidavit An ( ; Medieval Latin for "he has declared under oath") is a written statement voluntarily made by an ''affiant'' or ''deposition (law), deponent'' under an oath or affirmation which is administered by a person who is authorized to do so by la ...
describing technical details known to him personally in support of the 2006 '' Hepting v. AT&T'' court ''case''. Klein's January 16, 2004 statement included additional details regarding the construction of an NSA monitoring facility in Room 641A of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which were occupied by AT&T. According to Klein's affidavit, the NSA-equipped room used equipment built by Narus Corporation to intercept and analyze communications traffic, as well as to perform data-mining. Experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on Klein's affidavits and those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States government that regulates communications by radio, television, wire, internet, wi-fi, satellite, and cable across the United States. The FCC maintains j ...
. They concluded that the likely architecture of the system created serious security risks, including the danger that it could be exploited by unauthorized users, criminally misused by trusted insiders or abused by government agents. David Addington – at that time legal counsel to former Vice President
Dick Cheney Richard Bruce Cheney ( ; born January 30, 1941) is an American former politician and businessman who served as the 46th vice president of the United States from 2001 to 2009 under President George W. Bush. He has been called vice presidency o ...
– was reported to be the author of the controlling legal and technical documents for the program.


Legal issues

While the dispute over the NSA program was waged on multiple fronts, the legal dispute pitted Bush and Obama administrations against opponents in Congress and elsewhere. Supporters claimed that the President's Constitutional duties as commander in chief allowed him to take all necessary steps in wartime to protect the nation and that AUMF activated those powers. Opponents countered by claiming that instead that existing statutes (predominantly FISA) circumscribed those powers, including during wartime. Formally, the question can be seen as a disagreement over whether Constitutional or statutory law should rule in this case. As the debate continued, other arguments were advanced.


Constitutional issues

The constitutional debate surrounding the program is principally about
separation of powers The separation of powers principle functionally differentiates several types of state (polity), state power (usually Legislature#Legislation, law-making, adjudication, and Executive (government)#Function, execution) and requires these operat ...
. If no "fair reading" of FISA can satisfy the canon of avoidance, these issues must be decided at the appellate level. In such a separation of powers dispute, Congress bears burden of proof to establish its supremacy: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.


Article I and II

Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence is a historical point of contention between the Executive and Legislative branches. In other rulings has been recognized as "fundamentally incident to the waging of war".U.S. Department of Justice White Paper on NSA Legal Authoritie
"Legal Authorities Supporting the Activities of the National Security Agency Described by the President" (pdf)
January 19, 2006.
''"Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information"'', published by The
Congressional Research Service The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
stated: The same report repeats the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such is within their purview to regulate, and further that Congress may "tailor the President's use of an inherent constitutional power":


Fourth Amendment

The Bush administration claimed that the administration viewed the unanimity of pre-FISA Circuit Court decisions as vindicating their argument that warrantless foreign-intelligence surveillance authority existed prior to and subsequent to FISA and that this derived its authority from the Executive's inherent Article II powers, which may not be encroached upon by statute.


District Court findings

Even some legal experts who agreed with the outcome of ACLU v. NSA criticized the opinion's reasoning. Glenn Greenwald argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they focused solely on standing and state secrets grounds).


FISA practicality

FISA grants FISC the exclusive power to authorize surveillance of US persons as part of foreign intelligence gathering and makes no separate provision for surveillance in wartime. The interpretation of FISA's exclusivity clause is central because both sides agree that the NSA program operated outside FISA. If FISA is the controlling authority, the program is illegal. The "no constitutional issue" critique is that Congress has the authority to legislate in this area under Article I and the Fourth Amendment, while the "constitutional conflict" critique claims that the delineation between Congressional and Executive authority in this area is unclear, but that FISA's exclusivity clause shows that Congress had established a role for itself in this arena. The Bush administration argued both that the President had the necessary power based solely on the Constitution and that conforming to FISA was not practical given the circumstances. Assistant Attorney General for Legislative Affairs, William Moschella, wrote: FBI Special Agent Coleen Rowley, in her capacity as legal counsel to the Minneapolis Field Office recounted how FISA procedural hurdles had hampered the FBI's investigation of Zacarias Moussaoui (the so-called "20th hijacker") prior to the 9/11 attacks. Among the factors she cited were the complexity of the application, the amount of detailed information required, confusion by field operatives about the standard of probable cause required by the FISC and the strength of the required link to a foreign power. At his appearance before the Senate Judiciary Committee in June 2002, FBI Director
Robert Mueller Robert Swan Mueller III (; born August 7, 1944) is an American lawyer who served as the sixth director of the Federal Bureau of Investigation (FBI) from 2001 to 2013. A graduate of Princeton University and New York University, Mueller served a ...
responded to questions about the Rowley allegations, testifying that unlike normal criminal procedures, FISA warrant applications are "complex and detailed", requiring the intervention of FBI Headquarters (FBIHQ) personnel trained in a specialized procedure (the "Woods" procedure) to ensure accuracy. The Supreme Court made no ruling on this question. However, on June 29, 2006, in ''Hamdan'', the Supreme Court rejected an analogous argument. Writing for the majority, Justice
John Paul Stevens John Paul Stevens (April 20, 1920 â€“ July 16, 2019) was an American lawyer and jurist who served as an associate justice of the Supreme Court of the United States from 1975 to 2010. At the time of his retirement, he was the second-oldes ...
, while ruling that "the AUMF activated the President's war powers, and that those powers include the authority to convene military commissions in appropriate circumstances" (citations omitted), held that nothing in the AUMF language expanded or altered the Uniform Code of Military Justice (which governs military commissions.) Stevens distinguished ''Hamdan'' from ''Hamdi'' (in which AUMF language was found to override the explicit language regarding detention in 18 U.S.C. § 4001(a)) in that ''Hamdan'' would require a "Repeal by implication" of the UCMJ.


Authorizing statute

The Bush administration held that AUMF enables warrantless surveillance because it is an authorizing statute. An Obama Department of Justice whitepaper interpreted FISA's "except as authorized by statute" clause to mean that Congress allowed for future legislative statute(s) to provide exceptions to the FISA warrant requirements and that the AUMF was such a statute. They further claimed that AUMF implicitly provided executive authority to authorize warrantless surveillance. This argument is based on AUMF language, specifically, the acknowledgment of the President's Constitutional authority contained in the preamble: and the language in the resolution; The Obama administration further claimed that Title II of the USA PATRIOT Act entitled '' Enhanced Surveillance Procedures'' also allowed the program, Obama stated that Americans' civil liberties were protected and that purely domestic wiretapping was conducted only pursuant to warrants. Because FISA authorizes the President to bypass the FISC only during the first 15 days of a war declared by Congress, the argument claimed the AUMF implicitly gave the President the necessary power (as would any Congressional declaration of war). However, as a declaration of war encompasses all military actions so declared, including any otherwise constrained by Congress, the administration held that FISA set a presumptive minimum, which might be extended (explicitly or implicitly) by a declaration.


Corporate confidentiality analysis

Corporate secrecy is also an issue. In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity". However, Chief Judge Walker stated, during the September 12, 2008 hearing in the EFF class-action lawsuit, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.


Duty to notify Congress

The Bush administration contended that with regard to the NSA program, it had fulfilled its notification obligations by briefing key members of Congress (thirteen individuals between the 107th and 109th Congressional sessions) more than a dozen times, but they were forbidden from sharing that information with other members or staff. The CRS report asserted that the specific statutory notification procedure for covert action did not apply to the NSA program. It is not clear whether a restricted notification procedure intended to protect sources and methods was expressly prohibited. Additionally, the sources and methods exception requires a factual determination as to whether it should apply to disclosure of the program itself or only to specific aspects. Peter J. Wallison, former
White House Counsel The White House Counsel is a senior staff appointee of the president of the United States whose role is to advise the president on all legal issues concerning the president and their administration. The White House counsel also oversees the Off ...
to President
Ronald Reagan Ronald Wilson Reagan (February 6, 1911 – June 5, 2004) was an American politician and actor who served as the 40th president of the United States from 1981 to 1989. He was a member of the Republican Party (United States), Republican Party a ...
stated, "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."


War Powers Resolution

The majority of legal arguments supporting the program were based on the
War Powers Resolution The War Powers Resolution (also known as the War Powers Resolution of 1973 or the War Powers Act) () is a federal law intended to check the U.S. president's power to commit the United States to ...
. The War Powers Resolution has been questioned since its creation, and its application to the NSA program was questioned.


US citizens

No
declaration of war A declaration of war is a formal act by which one state announces existing or impending war activity against another. The declaration is a performative speech act (or the public signing of a document) by an authorized party of a national gov ...
explicitly applied to US citizens. Under the War Powers Resolution the only option to include them was to enact an encompassing authorization of the use of military force. The AUMF did not explicitly do so. Under AUMF, "nations, organizations or persons" must be identified as having planned, authorized, committed, aided or harbored the (9/11) attackers. Military force is thereby limited to those parties. Since no US citizens were alleged to be involved in the 9/11 attacks, and since AUMF strictly states that war-time enemies are those who were involved in 9/11, including US citizens in general exceeds these provisions. Opinions that actions stemming from the Patriot Act are constitutional follow from the AUMF. Since AUMF wartime powers do not explicitly apply to US citizens in general, they are exempted from its provision as a function of Ninth Amendment unenumerated rights. Therefore, Patriot Act provisions that are unconstitutionally (violating the first, fourth and other amendments) applied to US citizens are not rescued by the AUMF.


Other arguments

Philip Heymann claimed Bush had misstated the '' In re: Sealed Case No. 02-001'' ruling that supported Congressional regulation of surveillance. Heymann said, "The bottom line is, I know of no electronic surveillance for intelligence purposes since the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a Law of the United States, United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil. (in seeming disagreement with the FISC of Review finding) and that the President's admissions constituted sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence. Law professor John C. Eastman compared the Congressional Research Service, CRS and United States Department of Justice, DOJ reports and concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war." Law professor Orin Kerr argued that the part of ''In re: Sealed Case No. 02-001'' that dealt with FISA (rather than the Fourth Amendment) was nonbinding Obiter dictum, ''obiter dicta'' and that the argument did not restrict Congress's power to regulate the executive in general. Separately Kerr argued for wireless surveillance based on the fact that the border search exception permits searches at the border "or its functional equivalent." ('' United States v. Montoya De Hernandez'', 473 U.S. 531, 538 (1985)). As a sovereign nation the US can inspect goods crossing the border. The ruling interpreted the Fourth Amendment to permit such searches. Courts have applied the border search exception to computers and hard drives, e.g., ''United States v. Ickes'', 393 F.3d 501 (4th Cir. 2005) Case law does not treat data differently than physical objects. Case law applies the exception to international airports and international mail (''United States v. Ramsey''). Case law is phrased broadly. The exception could analogously apply to monitoring an ISP or telephony provider. U.S. District Judge Dee Benson, who served on the FISC, stated that he was unclear on why the FISC's emergency authority would not meet the administration's stated "need to move quickly". The court was also concerned about "whether the administration had misled their court about its sources of information on possible terrorism suspects ... [as this] could taint the integrity of the court's work." Judge Richard A. Posner, Richard Posner opined that FISA "retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist."


Related issues


Earlier warrantless surveillance

The Bush administration compared the NSA warrantless surveillance program with historical wartime warrantless searches in the US, going back to the time of the nation's founding. Critics pointed out that the first warrantless surveillance occurred before the adoption of the U.S. Constitution, and the other historical precedents cited by the administration were before FISA's passage and therefore did not directly contravene federal law. Earlier electronic surveillance by the federal government such as Project SHAMROCK, led to reform legislation in the 1970s. Advancing technology presented novel questions as early as 1985. Executive order (United States), Executive orders by previous administrations including Presidents Bill Clinton, Clinton and Jimmy Carter, Carter authorized their Attorneys General to exercise authority with respect to both options under FISA. Clinton's executive order authorized his Attorney General "[pursuant] to section 302(a)(1)" to conduct physical searches without court order "if the Attorney General makes the certifications required by that section".


Unitary Executive theory

The Unitary Executive theory as interpreted by John Yoo et al., supported the Bush administration's Constitutional argument. He argued that the President had the "inherent authority to conduct warrantless searches to obtain foreign intelligence". The United States Court of Appeals for the District of Columbia Circuit, United States Court of Appeals for the District of Columbia ruled that the President's authority as commander-in-chief extends to the "independent authority to repel aggressive acts ... without specific congressional authorization" and without court review of the "level of force selected". Whether such declarations applying to foreign intelligence are or must be in compliance with FISA has been examined by few courts.


Classified information


Leaks

No single law criminalizes the leaking of classified information. Statutes prohibit leaking certain types of classified information under certain circumstances. One such law is ; it was tacked on to the Espionage Act of 1917. It is known as the 'SIGINT' statute, meaning signals intelligence. This statute says: This statute is not limited in application to only federal government employees. However, the Code of Federal Regulations suggests the statute may apply primarily to the "[c]ommunication of classified information by Government officer or employee". 50 USCS § 783 (2005). A statutory procedure allows a "whistleblower" in the intelligence community to report concerns with the propriety of a secret program. The Intelligence Community Whistleblower Protection Act of 1998, Pub. L. 105–272, Title VII, 112 Stat. 2413 (1998) essentially provides for disclosure to the agency Inspector General, and if the result of that is unsatisfactory, appeal to the Congressional Intelligence Committees. Former NSA official Russ Tice asked to testify under the terms of the Intelligence Community Whistleblower Protection Act, in order to provide information to these committees about "highly classified Special Access Programs, or SAPs, that were improperly carried out by both the NSA and the Defense Intelligence Agency". Executive Order 13292, which sets up the U.S. security classification system, provides (Sec 1.7) that "[i]n no case shall information be classified in order to conceal violations of law". Given doubts about the legality of the overall program, the classification of its existence may not have been valid under E.O. 13292.


Publication of classified information

It is unlikely that a media outlet could be held liable for publishing classified information under established Supreme Court precedent. In ''Bartnicki v. Vopper'', 532 U.S. 514, the Supreme Court held that the First Amendment precluded liability for a media defendant for publication of illegally obtained communications that the media defendant itself did nothing illegal to obtain, if the topic involves a public controversy. Due to the suit's procedural position, the Court accepted that intercepting information that was ultimately broadcast by the defendant was initially illegal (in violation of ECPA), but nonetheless gave the radio station a pass because it did nothing itself illegal to obtain the information. Nor could the government have prevented the publication of the classified information by obtaining an injunction. In the Pentagon Papers case, (''New York Times Co. v. U.S.'', ), the Supreme Court held that injunctions against the publication of classified information (''United States-Vietnam Relations, 1945–1967: A Study Prepared by The Department of Defense'' – a 47-volume, 7,000-page, top-secret United States Department of Defense history of the United States' involvement in the Vietnam War) were unconstitutional prior restraints and that the government had not met the heavy Legal burden of proof, burden of proof required for prior restraint. The ''1917 Espionage Act'', aside from the Signals intelligence, SIGINT provision discussed above, only criminalizes 'national defense' information, not 'classified' information. Although the Justice Department as a matter of law sees no exemption for the press, as a matter of fact it has refrained from prosecuting: On the other hand, Sean McGahan of Northeastern University stated,


Responses and analyses


Administration response to press coverage

On December 17, 2005, President Bush addressed the growing controversy in his weekly radio broadcast. He stated that he was using his authority as President, as Commander in Chief and such authority as the Congress had given him, to intercept international communications of "people with known links to al Qaeda and related terrorist organizations". He added that before intercepting any communications, "the government must have information that establishes a clear link to these terrorist networks." He speculated that had the right communications been intercepted, perhaps the 9/11 attacks could have been prevented. He said the NSA program was re-authorized every 45 days, having at that time been reauthorized "more than 30 times"; it was reviewed by DOJ and NSA lawyers "including NSA's general counsel and inspector general", and Congress leaders had been briefed "more than a dozen times". In a speech in Buffalo, New York on April 20, 2004, he said that: And again, during a speech at Kansas State University on January 23, 2006, President Bush mentioned the program, and added that it was "what I would call a terrorist surveillance program", intended to "best ... use information to protect the American people", and that: During a speech in New York on January 19, 2006 Vice President Cheney commented on the controversy, stating that a "vital requirement in the war on terror is that we use whatever means are appropriate to try to find out the intentions of the enemy," that complacency towards further attack was dangerous, and that the lack of another major attack since 2001 was due to "round the clock efforts" and "decisive policies", and "more than luck." He stated: In a press conference on December 19 held by both Attorney General Gonzales and General Michael Hayden (general), Michael Hayden, the Principal Deputy Director for National Intelligence, General Hayden claimed, "This program has been successful in detecting and preventing attacks inside the United States." He stated that even an emergency authorization under FISA required marshaling arguments and "looping paperwork around". Hayden implied that decisions on whom to intercept under the wiretapping program were being made on the spot by a shift supervisor and another person, but refused to discuss details of the specific requirements for speed. Beginning in mid-January 2006 public discussion increased on the legality of the terrorist surveillance program. DOJ sent a 42-page white paper to Congress on January 19, 2006 stating the grounds upon which it was felt the NSA program was legal, which restated and elaborated on reasoning Gonzales used at the December press conference. Gonzales spoke again on January 24, claiming that Congress had given the President the authority to order surveillance without going through the courts, and that normal procedures to order surveillance were too slow and cumbersome. General Hayden stressed the NSA's respect for the Fourth Amendment, stating at the National Press Club (United States), National Press Club on January 23, 2006, "Had this program been in effect prior to 9/11, it is my professional judgment that we would have detected some of the 9/11 al Qaeda operatives in the United States, and we would have identified them as such." In a speech on January 25, 2006, President Bush said, "I have the authority, both from the Constitution and the Congress, to undertake this vital program," telling the House Republican Caucus at their February 10 conference in Maryland that "I wake up every morning thinking about a future attack, and therefore, a lot of my thinking, and a lot of the decisions I make are based upon the attack that hurt us." President Bush reacted to a May 10 domestic call records article by restating his position, that it is "not mining or trolling through the personal lives of millions of innocent Americans".


Congressional response

Three days after news broke about the NSA program, a bipartisan group of Senators—Democrats Dianne Feinstein, Carl Levin, Ron Wyden and Republicans Chuck Hagel and Olympia Snowe, wrote to the United States Senate Committee on the Judiciary, Judiciary and United States Senate Select Committee on Intelligence, Intelligence Committee chairs and ranking members requesting the two committees to "seek to answer the factual and legal questions" about the program. On January 20, 2006, in response to the administration's asserted claim to base the NSA program in part on the AUMF, Senators Leahy and Kennedy introduced Senate Resolution 350 that purported to express a "sense of the Senate" that the AUMF "does not authorize warrantless domestic surveillance of United States citizens". It was not reported out of committee. In introducing their resolution to committee, they quoted Supreme Court Justice Sandra Day O'Connor's opinion that even war "is not a blank check for the President when it comes to the rights of the Nation's citizens". Additionally, they asserted that the DOJ legal justification was a "manipulation of the law" similar to other "overreaching" and "twisted interpretations" in recent times. Leahy and Kennedy also asserted that Gonzales had "admitted" at a press conference on December 19, 2005, that the Administration did not seek to amend FISA to authorize the NSA spying program because it was advised that "it was not something we could likely get." (However, as noted below under "Proposed Amendments to FISA", Gonzales made clear that what he actually said was that such an amendment was "not something [they] could likely get" without disclosing the nature of the program and operational limitations and that it was believed that such disclosure would be damaging to national security.) Leahy and Kennedy asserted that the procedures adopted for the NSA program, specifically the 45-day reapproval cycle was "not good enough" because the review group were executive branch appointees. Finally, they concluded that Congressional and Judicial oversight were fundamental and should not be unilaterally discarded. In February 2008, the Bush administration backed a new version of FISA that would grant telecom companies retroactive immunity from lawsuits stemming from surveillance. On March 14, the House passed a bill that did not grant such immunity.


Anonymity networks

Edward Snowden copied and leaked thousands of classified NSA documents to journalists. The information revealed the access of some federal agencies to the public's online identity and led to wider use anonymizing technologies. In late 2013, soon after Snowden's leaks, it was loosely calculated that encrypted browsing software, such as Tor (anonymity network), Tor, I2P and Freenet had "combined to more than double in size ... and approximately 1,050,000 total machines 'legitimately' use the networks on a daily basis, amounting to an anonymous population that is about 0.011 percent of all machines currently connected to the Internet." Given that these tools are designed to protect the identity and privacy of their users, an exact calculation of the growth of the anonymous population cannot be accurately rendered, but all estimates predict rapid growth. These networks were accused of supporting illegal activity. They can be used for the illicit trade of drugs, guns and pornography. However, Tor executive director Roger Dingledine claimed that the "hidden services" represent only 2 percent of total traffic on Tor's network. This fact suggests that the large majority of those who use it do so in order to protect their normal browsing activity, an effort to protect their personal values of privacy rather than to participate in illegal activity.


Trade-off between security and liberty

Polls analyzed the trade-off between security and liberty. A June 2015 poll conducted by Gallup asked participants if the US should take all the necessary steps to prevent terrorist attacks even if civil liberties are violated. 30% of respondents agreed: 65% instead said take steps, but do not violate civil liberties. In a 2004 Pew poll, 60% of respondents rejected the idea of sacrificing privacy and freedom in the name of security. By 2014 a similar Pew poll found that 74% of respondents preferred privacy, while 22% said the opposite. Pew noted that Post-9/11, post 9/11 surveys revealed that in the periods during which prominent incidents that related to privacy and security first came up, the majority of respondents favored an ideology of "security first", while maintaining that a dramatic reduction in civil liberties should be avoided. Events often caused Americans to back allow government to investigate suspected terrorists more effectively, even if those steps might infringe on the privacy of ordinary citizens. The majority of respondents reject steps that translate into extreme intrusion into their lives. Various administrations claimed that reducing privacy protections reduces obstacles that anti-terrorism agencies face attempting to foil terrorist attacks and that fewer privacy protections makes it more difficult for terrorist groups to operate.


See also

* ''Clapper v. Amnesty International'' – 2013 Supreme Court decision * Communications Assistance for Law Enforcement Act * Criticism of the War on Terror * Data mining * Deep packet inspection * ECHELON * Edward Snowden * Electronic Privacy Information Center v. Department of Justice *
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a Law of the United States, United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.Hepting v. AT&T'' * HTLINGUAL – a CIA project to intercept mail destined for the Soviet Union and China that operated from 1952 until 1973. * Information Awareness Office * ''In the First Circle'', Alexander Solzhenytsin * Mark Riebling * Mass surveillance * NSA call database * National Security Agency#Wiretapping programs, NSA wiretapping programs * Omnibus Crime Control and Safe Streets Act of 1968 * PRISM (surveillance program), PRISM – the program that replaced the warrantless surveillance program * Reichstag Fire Decree * Room 641A * Secure communication * Terrorist Surveillance Program – details of the program itself * Trailblazer Project


References


External links

* NSA Spying Scandal is repeating Hewlett-Packard Spying Scandal (2006) story â€
Read HP Pretexting Scandal
(pdf) by Faraz Davani, publisher Scribd, August 14, 2011
U.S. Department of Justice White Paper on NSA Legal Authorities
''Legal Authorities Supporting the Activities of the National Security Agency Described by the President'', January 19, 2006
Department of Justice Letter to the Senate Select Intelligence Committee
December 22 (PDF) via Federation of American Scientists

* [https://fas.org/sgp/crs/intel/RL30465.pdf The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and Recent Judicial Decisions] – Congressional Research Service – April 2005 via Federation of American Scientists * FindLaw News Document Archive fo
National Security Agency (NSA)
* Cornell Law

* [https://fas.org/irp/agency/doj/fisa/ FAS FISA Resource Page] * Response by the American Bar Association: *
Letter to George W. Bush
(pdf) from ABA President Michael S. Greco, dated February 13, 2006 *
Resolution
(26-page pdf) from the ABA denouncing the warrantless wiretaps * David Alan Jordan
Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol
– Boston College Law Review, Vol. 47, 2006
''Washington Monthly'' blog post on an opposed conservative reaction


partly on this issue * FindLaw News Document Archive fo

* ''The New York Review of Books''
ON NSA SPYING: A LETTER TO CONGRESS
(Volume 53, Number 2, February 9, 2006) * JENNIFER VAN BERGEN

Findlaw (Monday, January 9, 2006) * [https://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer The Secret Sharer: Is Thomas Drake an enemy of the state?] A reportage by ''The New Yorker''s Jane Mayer from May 23, 2011 about the prosecution against Thomas Andrews Drake in general and in particular in the context of the NSA warrantless surveillance controversy * Swire, Peter P.
"The System of Foreign Intelligence Surveillance Law"
– ''George Washington Law Review'', Vol. 72, 2004
C-SPAN videos (require RealPlayer)

Whistleblower says NSA violations bigger
United Press International, February 14, 2006
Letter from Senator Pat Roberts to Senator Arlen Specter
Senator defends NSA program legality, February 3, 2006 via Federation of American Scientists * ''Washington Post''s overview


ACLU v. NSA ruling
which held that the NSA warrantless surveillance program is illegal and unconstitutional and must be halted immediately.
"NSA warrantless wiretapping is illegal" argument diagram
at HonestArgument.com
"So Judge, How Do I Get That FISA Warrant?": The Policy and Procedure for Conducting Electronic Surveillance
The Army Lawyer, October 1997
Amicus Filed in NSA Wiretapping Case
* * * * * {{DEFAULTSORT:Nsa Warrantless Surveillance Controversy Counterterrorism in the United States Emergency laws in the United States Espionage scandals and incidents George W. Bush administration controversies Obama administration controversies Privacy of telecommunications Privacy in the United States United States national security policy Surveillance scandals National Security Agency operations