NSA warrantless surveillance (2001–2007) explained

NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — was the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program.[1] In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, phone calls, Internet activities, text messages and other forms of communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lays within the U.S.

Critics claimed that the program was an effort to silence critics of the Bush administration and its handling of several controversial issues. Under public pressure, the Administration allegedly ended the program in January 2007 and resumed seeking warrants from the Foreign Intelligence Surveillance Court (FISC).[2] In 2008, Congress passed the FISA Amendments Act of 2008, which relaxed some of the original FISC requirements.

During the Obama administration, the U.S. Department of Justice (DOJ) continued to defend the warrantless surveillance program in court, arguing that a ruling on the merits would reveal state secrets.[3] In April 2009, officials at the DOJ acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISC's authority, but claimed that the acts were unintentional and had since been rectified.[4]

History

A week after the 9/11 attacks, Congress passed the Authorization for Use of Military Force Against Terrorists (AUMF), which inaugurated the "War on Terror". It later featured heavily in arguments over the NSA program.

Soon after the 9/11 attacks, President Bush established the President's Surveillance Program. As part of the program, the Terrorist Surveillance Program was established pursuant to an executive order that authorized the NSA to surveil certain telephone calls without obtaining a warrant (see). The complete details of the executive order are not public, but according to administration statements,[5] the authorization covers communication originating overseas from or to a person suspected of having links to terrorist organizations or their affiliates even when the other party to the call is within the US.

In October 2001, Congress passed the Patriot Act, which granted the administration broad powers to fight terrorism.[6] The Bush administration used these powers to bypass the FISC and directed the NSA to spy directly on al-Qaeda via a new NSA electronic surveillance program. Reports at the time indicate that "apparently accidental ... technical glitches at the National Security Agency" resulted in the interception of communications that were between two U.S. parties.[7] This act was challenged by multiple groups, including Congress, as unconstitutional.

The precise scope of the program remains secret, but the NSA was provided total, unsupervised access to all fiber-optic communications between the nation's largest telecommunication companies' major interconnected locations, encompassing phone conversations, email, Internet activity, text messages and corporate private network traffic.[8]

FISA makes it illegal to intentionally engage in electronic surveillance as an official act or to disclose or use information obtained by such surveillance under as an official act, knowing that it was not authorized by statute; this is punishable with a fine of up to $10,000, up to five years in prison or both.[9] The Wiretap Act prohibits any person from illegally intercepting, disclosing, using or divulging phone calls or electronic communications; this is punishable with a fine, up to five years in prison, or both.[10]

After an article about the program, (which had been code-named Stellar Wind), was published in The New York Times on December 16, 2005, Attorney General Alberto Gonzales confirmed its existence.[11] [12] [13] The Times had published the story after learning that the Bush administration was considering seeking a court injunction to block publication.[14] Bill Keller, the newspaper's executive editor, had withheld the story from publication since before the 2004 Presidential Election. The published story was essentially the same that reporters James Risen and Eric Lichtblau had submitted in 2004. The delay drew criticism, claiming that an earlier publication could have changed the election's outcome.[15] In a December 2008 interview, former Justice Department employee Thomas Tamm claimed to be the initial whistle-blower.[16] The FBI began investigating leaks about the program in 2005, assigning 25 agents and five prosecutors.

Attorney and author Glenn Greenwald argued:[17]

Gonzales said the program authorized warrantless intercepts where the government had "a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda" and that one party to the conversation was "outside of the United States".[18] The revelation raised immediate concern among elected officials, civil rights activists, legal scholars and the public at large about the legality and constitutionality of the program and its potential for abuse. The controversy expanded to include the press's role in exposing a classified program, Congress's role and responsibility of executive oversight and the scope and extent of presidential powers.[19]

CRS released a report on the NSA program, "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", on January 5, 2006 that concluded:

On January 18, 2006 the Congressional Research Service released another report, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions".[20] [21] That report found that "[b]ased upon publicly reported descriptions of the program, the NSA surveillance program would appear to fall more closely under the definition of an intelligence collection program, rather than qualify as a covert action program as defined by statute", and, therefore, found no specific statutory basis for limiting briefings on the terrorist surveillance program.[22] However, the report goes on to note in its concluding paragraph that limited disclosure is also permitted under the statute "in order to protect intelligence sources and methods".[23]

Legal action

While not directly ruling on the legality of domestic surveillance, the Supreme Court can be seen as having come down on both sides of the Constitution/statute question, in somewhat analogous circumstances.

In Hamdi v. Rumsfeld (2004) the government claimed that AUMF authorized the detention of U.S. citizens designated as an enemy combatant despite its lack of specific language to that effect and notwithstanding the provisions of (a) that forbids the government to detain an American citizen except by act of Congress. In that case, the Court ruled:

However, in Hamdan v. Rumsfeld the Court rejected the government's argument that AUMF implicitly authorized the President to establish military commissions in violation of the Uniform Code of Military Justice. The Court held:

In footnote 23, the Court rejected the notion that Congress is impotent to regulate the exercise of executive war powers:

Dozens of civil suits against the government and telecommunications companies over the program were consolidated before the chief judge of the Northern District of California, Vaughn R. Walker. One of the cases was a class-action lawsuit against AT&T, focusing on allegations that the company had provided the NSA with its customers' phone and Internet communications for a data-mining operation. Plaintiffs in a second case were the al-Haramain Foundation and two of its lawyers.[24] [25]

On August 17, 2006, Judge Anna Diggs Taylor of the United States District Court for the Eastern District of Michigan ruled in ACLU v. NSA that the Terrorist Surveillance Program was unconstitutional under the Fourth and First Amendments and enjoined the NSA from using the program to conduct electronic surveillance "in contravention of [FISA or Title III]". She wrote:[26]

In August 2007, a three-judge panel of the United States Court of Appeals for the Ninth Circuit heard arguments in two lawsuits challenging the program. On November 16, 2007, the three judges—M. Margaret McKeown, Michael Daly Hawkins and Harry Pregerson—issued a 27-page ruling that the al-Haramain Foundation could not introduce a key piece of evidence because it fell under the government's claim of state secrets, although the judges said that "In light of extensive government disclosures, the government is hard-pressed to sustain its claim that the very subject matter of the litigation is a state secret."[27] [28]

In a question-and-answer session published on August 22, Director of National Intelligence Mike McConnell first confirmed that the private sector had helped the program. McConnell argued that the companies deserved immunity for their help: "Now if you play out the suits at the value they're claimed, it would bankrupt these companies."[29] Plaintiffs in the AT&T suit subsequently moved to have McConnell's acknowledgement admitted as evidence.[30]

In a related legal development, on October 13, 2007, Joseph Nacchio, the former CEO of Qwest Communications, appealed an April 2007 insider trading conviction by alleging that the government withdrew opportunities for contracts worth hundreds of millions of dollars after Qwest refused to participate in an unidentified NSA program that the company thought might be illegal. He claimed that the NSA approached Qwest about participating in a warrantless surveillance program more than six months before 9/11. Nacchio used the allegation to show why his stock sale was not improper.[31] According to a lawsuit filed against other telecommunications companies for violating customer privacy, AT&T began preparing facilities for the NSA to monitor "phone call information and Internet traffic" seven months before 9/11.[32]

On January 20, 2006, cosponsors Senator Patrick Leahy and Ted Kennedy introduced Senate Resolution 350, a resolution "expressing the sense of the Senate that Senate Joint Resolution 23 (107th Congress), as adopted by the Senate on September 14, 2001, and subsequently enacted as the Authorization for Use of Military Force does not authorize warrantless domestic surveillance of United States citizens".[33] [34] This non-binding resolution died without debate.[35]

On September 28, 2006, the U.S. House of Representatives passed the Electronic Surveillance Modernization Act (H.R. 5825).[36] It died in the Senate. Three competing, mutually exclusive, bills—the Terrorist Surveillance Act of 2006 (S.2455), the National Security Surveillance Act of 2006 (S.2455) and the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) – were referred for debate to the full Senate,[37] but did not pass. Each of these bills would have broadened the statutory authorization for electronic surveillance, while subjecting it to some restrictions.

Termination

On January 17, 2007, Gonzales informed Senate leaders that the program would not be reauthorized. "Any electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court," according to his letter.[38]

Further legal action

The American Civil Liberties Union (ACLU) sued NSA over the program. Detroit District Court judge Anna Diggs Taylor ruled on August 17, 2006 that the program was illegal under FISA as well as unconstitutional under the First and Fourth amendments of the Constitution.[39] [40] [41] Judicial Watch, a watchdog group, discovered that at the time of the ruling Taylor "serves as a secretary and trustee for a foundation that donated funds to the ACLU of Michigan, a plaintiff in the case".[42]

ACLU v. NSA was dismissed on January 31, 2007 by the United States Court of Appeals for the Sixth Circuit.[43] The court did not rule on the spying program's legality. Instead, it declared that the plaintiffs did not have standing to sue because they could not demonstrate that they had been direct targets of the program.[44] The Supreme Court let the ruling stand.

On August 17, 2007, FISC said it would consider a request by the ACLU that asked the court to make public its recent, classified rulings on the scope of the government's wiretapping powers. FISC presiding judge Colleen Kollar-Kotelly signed an order calling the ACLU's motion "an unprecedented request that warrants further briefing".[45] The FISC ordered the government to respond on the issue by August 31.[46] [47] On the August 31 deadline, the National Security Division of the Justice Department filed a response in opposition to the ACLU's motion.[48] On February 19, 2008, the U.S. Supreme Court, without comment, turned down an ACLU appeal, letting stand the earlier decision dismissing the case.[49]

On September 18, 2008, the Electronic Frontier Foundation (EFF) sued the NSA, President Bush, Vice President Cheney, Cheney's chief of staff David Addington, Gonzales and other government agencies and individuals who ordered or participated in the program. They sued on behalf of AT&T customers. An earlier, ongoing suit (Hepting v. AT&T) by the EFF bogged down over the recent FISA changes.[50] [51]

On January 23, 2009, the Obama administration adopted the same position as its predecessor when it urged Judge Walker to set aside a ruling in Al-Haramain Islamic Foundation et al. v. Obama, et al.[52] The Obama administration sided with the Bush administration in its legal defense of July 2008 legislation that immunized the nation's telecommunications companies from lawsuits accusing them of complicity in the program, according to Attorney General Eric Holder.[53]

On March 31, 2010, Judge Walker ruled that the program was illegal when it intercepted phone calls of Al Haramain. Declaring that the plaintiffs had been "subjected to unlawful surveillance", the judge said the government was liable for damages.[54] In 2012, the Ninth Circuit vacated the judgment against the United States and affirmed the district court's dismissal of the claim.[55]

Proposed FISA amendments

Several commentators raised the issue of whether FISA needed to be amended to address foreign intelligence needs, technology developments and advanced technical intelligence gathering. The intent was to provide programmatic approvals of surveillance of foreign terrorist communications, so that they could then legally be used as evidence for FISA warrants. Fixing Surveillance;[56] Why We Listen,[57] The Eavesdropping Debate We Should be Having;[58] A New Surveillance Act;[59] A historical solution to the Bush spying issue,[60] Whispering Wires and Warrantless Wiretaps[61] address FISA's inadequacies in the post-9/11 context.

The Bush administration contended that amendment was unnecessary because they claimed that the President had inherent authority to approve the NSA program, and that the process of amending FISA might require disclosure of classified information that could harm national security. In response, Senator Leahy said, "If you do not even attempt to persuade Congress to amend the law, you must abide by the law as written."[62] President Bush claimed that the law did not apply because the Constitution gave him "inherent authority" to act.[63] [64]

Some politicians and commentators used "difficult, if not impossible" to argue that the administration believed Congress would have rejected an amendment. In his written "Responses to Questions from Senator Specter" in which Specter specifically asked why the administration had not sought to amend FISA,[65] Gonzales wrote:

Competing legislative proposals to authorize the NSA program subject to Congressional or FISC oversight were the subject of Congressional hearings.[66] On March 16, 2006, Senators Mike DeWine, Lindsey Graham, Chuck Hagel and Olympia Snowe introduced the Terrorist Surveillance Act of 2006 (S.2455),[67] [68] that gave the President limited statutory authority to conduct electronic surveillance of suspected terrorists in the US, subject to enhanced Congressional oversight. That day Specter introduced the National Security Surveillance Act of 2006 (S.2453),[69] [70] which would amend FISA to grant retroactive amnesty[71] for warrantless surveillance conducted under presidential authority and provide FISC jurisdiction to review, authorize and oversee "electronic surveillance programs". On May 24, 2006, Specter and Feinstein introduced the Foreign Intelligence Surveillance Improvement and Enhancement Act of 2006 (S.3001) denoting FISA as the exclusive means to conduct foreign intelligence surveillance.

On September 13, 2006, the Senate Judiciary Committee voted to approve all three, mutually exclusive bills, thus, leaving it to the full Senate to resolve.

On July 18, 2006, U.S. Representative Heather Wilson introduced the Electronic Surveillance Modernization Act (H.R. 5825). Wilson's bill would give the President the authority to authorize electronic surveillance of international phone calls and e-mail linked specifically to identified terrorist groups immediately following or in anticipation of an armed or terrorist attack. Surveillance beyond the initially authorized period would require a FISA warrant or a presidential certification to Congress. On September 28, 2006 the House of Representatives passed Wilson's bill and it was referred to the Senate.

Each of these bills would in some form broaden the statutory authorization for electronic surveillance, while still subjecting it to some restrictions. The Specter-Feinstein bill would extend the peacetime period for obtaining retroactive warrants to seven days and implement other changes to facilitate eavesdropping while maintaining FISC oversight. The DeWine bill, the Specter bill, and the Electronic Surveillance Modernization Act (already passed by the House) would all authorize some limited forms or periods of warrantless electronic surveillance subject to additional programmatic oversight by either the FISC (Specter bill) or Congress (DeWine and Wilson bills).

FISC order

On January 18, 2007, Gonzales told the Senate Judiciary Committee,

The ruling by the FISC was the result of a two-year effort between the White House and the court to find a way to obtain court approval that also would "allow the necessary speed and agility" to find terrorists, Gonzales said in a letter to the top committee members. The court order on January 10 will do that, Gonzales wrote. Senior Justice department officials would not say whether the orders provided individual warrants for each wiretap or whether the court had given blanket legal approval for the entire NSA program. The ACLU said in a statement that "without more information about what the secret FISC has authorized, there is no way to determine whether the NSA's current activities are lawful".[72] Law professor Chip Pitts argued that substantial legal questions remain regarding the core NSA program as well as the related data mining program (and the use of National Security Letters), despite the government's apparently bringing the NSA program within the purview of FISA.[73]

FISCR ruling

In August 2008, the United States Foreign Intelligence Surveillance Court of Review (FISCR) affirmed the constitutionality of the Protect America Act of 2007 in a heavily redacted opinion released on January 15, 2009, only the second such public ruling since the enactment of the FISA Act.[74] [75] [76] [77] [78]

Relevant constitutional, statutory and administrative provisions

U.S. Constitution

Article I and II

Article I vests Congress with the sole authority "To make Rules for the Government and Regulation of the land and naval Forces" and "To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof." The Supreme Court has used the "necessary and proper" clause to affirm broad Congressional authority to legislate as it sees fit in the domestic arena,[79] but has limited its application in foreign affairs. In the landmark US v. Curtiss-Wright (1936) decision, Justice George Sutherland for the Court:

Article II vests the President with power as "Commander in Chief of the Army and Navy of the United States," and requires that the President "shall take Care that the Laws be faithfully executed".

Fourth Amendment

The Fourth Amendment is part of the Bill of Rights and prohibits "unreasonable" searches and seizures by the government. A search warrant must be judicially sanctioned, based on probable cause, supported by oath or affirmation (usually by a law enforcement officer), particularly describing the place to be searched and the persons or things to be seized, limited in scope (according to specific information supplied to the issuing court). It is solely a right of the people that neither the Executive nor Legislative branch can lawfully abrogate, even if acting in concert: no statute can make an unreasonable search reasonable.

The term "unreasonable" connotes the sense that a constitutional search has a rational basis, that it is not an excessive imposition upon the individual given the circumstances and is in accordance with societal norms. It relies on judges to be sufficiently independent of the authorities seeking warrants that they can render an impartial decision. Evidence obtained in an unconstitutional search is inadmissible in a criminal trial (with certain exceptions).

The Fourth Amendment explicitly allows reasonable searches, including searches without warrant in specific circumstances. Such circumstances include the persons, property and papers of individuals crossing the border of the United States and those of paroled felons; prison inmates, public schools and government offices; and of international mail. Although these are undertaken pursuant to a statute or an executive order, they derive their legitimacy from the Amendment, rather than these.

Ninth and Tenth Amendments

The Tenth Amendment explicitly states that powers neither granted to the federal government nor prohibited to the states are reserved to the states or the people. The Ninth Amendment states, "The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people."

The Ninth Amendment bars denial of unenumerated rights if the denial is based on the "enumeration of certain rights" in the Constitution, but does not bar denial of unenumerated rights if the denial is based on the "enumeration of certain powers" in the Constitution.[80]

Related Court opinions

The Supreme Court has historically used Article II to justify wide deference to the President in foreign affairs.[81] Two historical and recent cases define the secret wiretapping by the NSA. Curtiss-Wright:

The extent of the President's power as Commander-in-Chief has never been fully defined, but two Supreme Court cases are considered seminal in this area:[82] [83] Youngstown Sheet and Tube Co. v. Sawyer (1952) and Curtiss-Wright.

The Supreme Court held in Katz v. United States (1967), that the monitoring and recording of private conversations within the United States constitutes a "search" for Fourth Amendment purposes, and therefore require a warrant.

The Supreme Court held in Smith v Maryland (1979) that a judicial warrant is required for the government to acquire the content of electronic communications. However, subpoenas but not warrants are required for the business records (metadata) of their communications, data such as the numbers that an individual has phoned, when and, to a limited degree, where the phone conversation occurred.

The protection of "private conversations" has been held to apply only to conversations where the participants have manifested both a desire and a reasonable expectation that their conversation is indeed private and that no other party is privy to it. In the absence of such a reasonable expectation, the Fourth Amendment does not apply, and surveillance without warrant does not violate it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war.

Various Circuit Courts upheld warrantless surveillance when the target was a foreign agent residing abroad,[84] [85] a foreign agent residing in the US[86] [87] [88] [89] and a US citizen abroad.[90] The exception does not apply when both the target and the threat were deemed domestic.[91] The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed by the Supreme Court, but occurred in the case of Aldrich Ames.[92]

The law recognizes a distinction between domestic surveillance taking place within U.S. borders and foreign surveillance of non-U.S. persons either in the U.S. or abroad.[93] In United States v. Verdugo-Urquidez, the Supreme Court reaffirmed the principle that the Constitution does not extend protection to non-U.S. persons located outside of the United States, so no warrant was required to engage in even physical searches of non-U.S. citizens abroad.

In 1985 the Supreme Court established the "border search exception", which permits warrantless searches at the US border "or its functional equivalent" in United States v. Montoya De Hernandez, 473 U.S. 531, 538. The US can do so as a sovereign nation to protect its interests. Courts have explicitly included computer hard drives within the exception (United States v. Ickes, 393 F.3d 501 4th Cir. 2005), while United States v. Ramsey, explicitly included all international postal mail.

The Supreme Court has not ruled on the constitutionality of warrantless searches targeting foreign powers or their agents within the US. Multiple Circuit Court rulings uphold the constitutionality of warrantless searches or the admissibility of evidence so obtained.[94] In United States v. Bin Laden, the Second Circuit noted that "no court, prior to FISA, that was faced with the choice, imposed a warrant requirement for foreign intelligence searches undertaken within the United States."[95]

National Security Act of 1947

The National Security Act of 1947[96] requires Presidential findings for covert acts. SEC. 503. [50 U.S.C. 413b] (a) (5) of that act states: "A finding may not authorize any action that would violate the Constitution or any statute of the United States."

Under § 501–503, codified as 50 USC § 413-§ 413b,[97] the President is required to keep Congressional intelligence committees "fully and currently" informed of U.S. intelligence activities, "consistent with ... protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." For covert actions, from which intelligence gathering activities are specifically excluded in § 413b(e)(1), the President is specifically permitted to limit reporting to selected Members.[98]

Foreign Intelligence Surveillance Act

See main article: Foreign Intelligence Surveillance Act. The 1978 Foreign Intelligence Surveillance Act (FISA) regulates government agencies' physical searches and electronic surveillance, in cases wherein a significant purpose is to gather foreign intelligence information. "Foreign intelligence information" is defined in as information necessary to protect the U.S. or its allies against actual or potential attack from a foreign power, sabotage or international terrorism. FISA defines a "foreign power" as a foreign government or any faction(s) of a foreign government not substantially composed of US persons, or any entity directed or controlled by a foreign government. FISA provides for both criminal and civil liability for intentional electronic surveillance under color of law except as authorized by statute.

FISA specifies two documents for the authorization of surveillance. First, FISA allows the Justice Department to obtain warrants from the Foreign Intelligence Surveillance Court (FISC) before or up to 72 hours after the beginning of the surveillance. FISA authorizes a FISC judge to issue a warrant if "there is probable cause to believe that ... the target of the electronic surveillance is a foreign power or an agent of a foreign power." 50 U.S.C. § 1805(a)(3). Second, FISA permits the President or his delegate to authorize warrantless surveillance for the collection of foreign intelligence if "there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party". 50 U.S.C. § 1802(a)(1).[99]

In 2002, the United States Foreign Intelligence Surveillance Court of Review (Court of Review) met for the first time and issued an opinion (). They noted that all of the Federal courts of appeal had considered the issue and concluded that constitutional power allowed the president to conduct warrantless foreign intelligence surveillance. Furthermore, based on these rulings it "took for granted such power exists" and ruled that under this presumption, "FISA could not encroach on the president's constitutional power."

(2)(f) provides in part that FISA "shall be the exclusive means by which electronic surveillance, as defined in ... and the intercept of domestic [communications] may be conducted". The statute includes a criminal sanctions subpart granting an exception, "unless authorized by statute".

Authorization for the Use of Military Force

The Authorization for Use of Military Force was passed by Congress shortly after the 9/11 attacks. AUMF was used to justify the Patriot Act and related laws. It explicitly states in Section 2:

USA PATRIOT Act

Section 215 of the PATRIOT act authorized the FBI to subpoena some or all business records from a business record holder using a warrant applied for in the Foreign Intelligence Surveillance Court.

Terrorist surveillance program

See main article: Terrorist Surveillance Program. The legality of surveillance involving US persons and extent of this authorization is the core of this controversy which includes:

Technical and operational details

Because of its highly classified status, the implementation of the TSP is not fairly known by the public. Once Mark Klein, a retired AT&T communications technician, submitted an affidavit describing technical details known to him personally in support of the 2006 Hepting v. AT&T court case.[102] [103]

Klein's January 16, 2004 statement included additional details regarding the construction of an NSA monitoring facility in Room 641A of 611 Folsom Street in San Francisco, the site of a large SBC phone building, three floors of which were occupied by AT&T.<ref>Web site: AT&T Whistle-Blower's Evidence . CommonDreams.org Newscenter . May 17, 2006 . August 15, 2007 . dead . https://web.archive.org/web/20070613191804/http://www.commondreams.org/headlines06/0517-10.htm . June 13, 2007 . mdy . [104]

According to Klein's affidavit, the NSA-equipped room used equipment built by Narus Corporation to intercept and analyze communications traffic, as well as to perform data-mining.[105]

Experts from academia and the computing industry analyzed potential security risks posed by the NSA program, based on Klein's affidavits and those of expert witness J. Scott Marcus, a designer of large-scale IP-based data networks, former CTO at GTE Internetworking and at Genuity, and former senior advisor for Internet Technology at the Federal Communications Commission.[106] They concluded that the likely architecture of the system created serious security risks, including the danger that it could be exploited by unauthorized users, criminally misused by trusted insiders or abused by government agents.[107]

David Addington – at that time legal counsel to former Vice President Dick Cheney – was reported to be the author of the controlling legal and technical documents for the program.[108] [109] [110]

Legal issues

While the dispute over the NSA program was waged on multiple fronts, the legal dispute pitted Bush and Obama administrations against opponents in Congress and elsewhere. Supporters claimed that the President's Constitutional duties as commander in chief allowed him to take all necessary steps in wartime to protect the nation and that AUMF activated those powers. Opponents countered by claiming that instead that existing statutes (predominantly FISA) circumscribed those powers, including during wartime.[111]

Formally, the question can be seen as a disagreement over whether Constitutional or statutory law should rule in this case.[112]

As the debate continued, other arguments were advanced.

Constitutional issues

The constitutional debate surrounding the program is principally about separation of powers. If no "fair reading" of FISA can satisfy the canon of avoidance, these issues must be decided at the appellate level. In such a separation of powers dispute, Congress bears burden of proof to establish its supremacy: the Executive branch enjoys the presumption of authority until an Appellate Court rules against it.[113]

Article I and II

Whether "proper exercise" of Congressional war powers includes authority to regulate the gathering of foreign intelligence is a historical point of contention between the Executive and Legislative branches. In other rulings [114] has been recognized as "fundamentally incident to the waging of war".[115] [116]

"Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information", published by The Congressional Research Service stated:

The same report repeats the Congressional view that intelligence gathered within the U.S. and where "one party is a U.S. person" qualifies as domestic in nature and as such is within their purview to regulate, and further that Congress may "tailor the President's use of an inherent constitutional power":

Fourth Amendment

The Bush administration claimed that the administration viewed the unanimity of pre-FISA Circuit Court decisions as vindicating their argument that warrantless foreign-intelligence surveillance authority existed prior to and subsequent to FISA and that this derived its authority from the Executive's inherent Article II powers, which may not be encroached upon by statute.[117]

District Court findings

Even some legal experts who agreed with the outcome of ACLU v. NSA criticized the opinion's reasoning.[118] Glenn Greenwald argued that the perceived flaws in the opinion in fact reflect the Department of Justice's refusal to argue the legal merits of the program (they focused solely on standing and state secrets grounds).[119]

FISA practicality

FISA grants FISC the exclusive power to authorize surveillance of US persons as part of foreign intelligence gathering and makes no separate provision for surveillance in wartime. The interpretation of FISA's exclusivity clause is central because both sides agree that the NSA program operated outside FISA. If FISA is the controlling authority, the program is illegal.[120]

The "no constitutional issue" critique is that Congress has the authority to legislate in this area under Article I and the Fourth Amendment,[121] while the "constitutional conflict" critique[122] claims that the delineation between Congressional and Executive authority in this area is unclear,[123] but that FISA's exclusivity clause shows that Congress had established a role for itself in this arena.

The Bush administration argued both that the President had the necessary power based solely on the Constitution and that conforming to FISA was not practical given the circumstances. Assistant Attorney General for Legislative Affairs, William Moschella, wrote:

FBI Special Agent Coleen Rowley, in her capacity as legal counsel to the Minneapolis Field Office[124] recounted how FISA procedural hurdles had hampered the FBI's investigation of Zacarias Moussaoui (the so-called "20th hijacker") prior to the 9/11 attacks. Among the factors she cited were the complexity of the application, the amount of detailed information required, confusion by field operatives about the standard of probable cause required by the FISC and the strength of the required link to a foreign power. At his appearance before the Senate Judiciary Committee in June 2002, FBI Director Robert Mueller responded to questions about the Rowley allegations, testifying that unlike normal criminal procedures, FISA warrant applications are "complex and detailed", requiring the intervention of FBI Headquarters (FBIHQ) personnel trained in a specialized procedure (the "Woods" procedure) to ensure accuracy.[125]

The Supreme Court made no ruling on this question. However, on June 29, 2006, in Hamdan, the Supreme Court rejected an analogous argument. Writing for the majority, Justice John Paul Stevens, while ruling that "the AUMF activated the President's war powers, and that those powers include the authority to convene military commissions in appropriate circumstances" (citations omitted), held that nothing in the AUMF language expanded or altered the Uniform Code of Military Justice (which governs military commissions.) Stevens distinguished Hamdan from Hamdi (in which AUMF language was found to override the explicit language regarding detention in 18 U.S.C. § 4001(a)) in that Hamdan would require a "Repeal by implication" of the UCMJ.

Authorizing statute

The Bush administration held that AUMF enables warrantless surveillance because it is an authorizing statute.

An Obama Department of Justice whitepaper interpreted FISA's "except as authorized by statute" clause to mean that Congress allowed for future legislative statute(s) to provide exceptions to the FISA warrant requirements[126] and that the AUMF was such a statute. They further claimed that AUMF implicitly provided executive authority to authorize warrantless surveillance.

This argument is based on AUMF language, specifically, the acknowledgment of the President's Constitutional authority contained in the preamble:

and the language in the resolution;

The Obama administration further claimed that Title II of the USA PATRIOT Act entitled Enhanced Surveillance Procedures also allowed the program,[127] Obama stated that Americans' civil liberties were protected and that purely domestic wiretapping was conducted only pursuant to warrants.[128]

Because FISA authorizes the President to bypass the FISC only during the first 15 days of a war declared by Congress, the argument claimed the AUMF implicitly gave the President the necessary power (as would any Congressional declaration of war). However, as a declaration of war encompasses all military actions so declared, including any otherwise constrained by Congress, the administration held that FISA set a presumptive minimum, which might be extended (explicitly or implicitly) by a declaration.

Corporate confidentiality analysis

Corporate secrecy is also an issue. In a letter to the EFF, AT&T objected to the filing of the documents in any manner, saying that they contain sensitive trade secrets and could be "used to 'hack' into the AT&T network, compromising its integrity".[129] However, Chief Judge Walker stated, during the September 12, 2008 hearing in the EFF class-action lawsuit, that the Klein evidence could be presented in court, effectively ruling that AT&T's trade secret and security claims were unfounded.

Duty to notify Congress

The Bush administration contended that with regard to the NSA program, it had fulfilled its notification obligations by briefing key members of Congress (thirteen individuals between the 107th and 109th Congressional sessions) more than a dozen times,[130] but they were forbidden from sharing that information with other members or staff.

The CRS report asserted that the specific statutory notification procedure for covert action did not apply to the NSA program. It is not clear whether a restricted notification procedure intended to protect sources and methods was expressly prohibited. Additionally, the sources and methods exception requires a factual determination as to whether it should apply to disclosure of the program itself or only to specific aspects.

Peter J. Wallison, former White House Counsel to President Ronald Reagan stated, "It is true, of course, that a president's failure to report to Congress when he is required to do so by law is a serious matter, but in reality the reporting requirement was a technicality that a President could not be expected to know about."[131]

War Powers Resolution

The majority of legal arguments supporting the program were based on the War Powers Resolution. The War Powers Resolution has been questioned since its creation, and its application to the NSA program was questioned.

US citizens

No declaration of war explicitly applied to US citizens. Under the War Powers Resolution the only option to include them was to enact an encompassing authorization of the use of military force. The AUMF did not explicitly do so. Under AUMF, "nations, organizations or persons" must be identified as having planned, authorized, committed, aided or harbored the (9/11) attackers. Military force is thereby limited to those parties. Since no US citizens were alleged to be involved in the 9/11 attacks, and since AUMF strictly states that war-time enemies are those who were involved in 9/11, including US citizens in general exceeds these provisions.

Opinions that actions stemming from the Patriot Act are constitutional follow from the AUMF. Since AUMF wartime powers do not explicitly apply to US citizens in general, they are exempted from its provision as a function of Ninth Amendment unenumerated rights. Therefore, Patriot Act provisions that are unconstitutionally (violating the first, fourth and other amendments) applied to US citizens are not rescued by the AUMF.

Other arguments

Philip Heymann claimed Bush had misstated the ruling that supported Congressional regulation of surveillance. Heymann said, "The bottom line is, I know of no electronic surveillance for intelligence purposes since the Foreign Intelligence Surveillance Act was passed that was not done under the ... statute."[132]

Cole, Epstein, Heynmann, Beth Nolan, Curtis Bradley, Geoffrey Stone, Harold Koh, Kathleen Sullivan, Laurence Tribe, Martin Lederman, Ronald Dworkin, Walter Dellinger, William Sessions and William Van Alstyne wrote, "the Justice Department's defense of what it concedes was secret and warrantless electronic surveillance of persons within the United States fails to identify any plausible legal authority for such surveillance."[133] They summarized:

Law school dean Robert Reinstein asserted that the warrantless domestic spying program is[134] [135]

Law professor Robert M. Bloom and William J. Dunn, a former Defense Department intelligence analyst, claimed:[136]

Law professor Jordan Paust argued:[137]

Law Dean Harold Koh, Suzanne Spaulding and John Dean contended that FISA was controlling,[138] (in seeming disagreement with the FISC of Review finding) and that the President's admissions constituted sufficient evidence of a violation of the Fourth Amendment, without requiring further factual evidence.

Law professor John C. Eastman compared the CRS and DOJ reports and concluded instead that under the Constitution and ratified by both historical and Supreme Court precedent, "the President clearly has the authority to conduct surveillance of enemy communications in time of war and of the communications to and from those he reasonably believes are affiliated with our enemies. Moreover, it should go without saying that such activities are a fundamental incident of war."[139]

Law professor Orin Kerr argued that the part of In re: Sealed Case No. 02-001 that dealt with FISA (rather than the Fourth Amendment) was nonbinding obiter dicta and that the argument did not restrict Congress's power to regulate the executive in general.[140] Separately Kerr argued for wireless surveillance based on the fact that the border search exception permits searches at the border "or its functional equivalent." (United States v. Montoya De Hernandez, 473 U.S. 531, 538 (1985)). As a sovereign nation the US can inspect goods crossing the border. The ruling interpreted the Fourth Amendment to permit such searches. Courts have applied the border search exception to computers and hard drives, e.g., United States v. Ickes, 393 F.3d 501 (4th Cir. 2005) Case law does not treat data differently than physical objects. Case law applies the exception to international airports and international mail (United States v. Ramsey). Case law is phrased broadly. The exception could analogously apply to monitoring an ISP or telephony provider.[141] [142]

U.S. District Judge Dee Benson, who served on the FISC, stated that he was unclear on why the FISC's emergency authority would not meet the administration's stated "need to move quickly".[143] [144] The court was also concerned about "whether the administration had misled their court about its sources of information on possible terrorism suspects ... [as this] could taint the integrity of the court's work."[145]

Judge Richard Posner opined that FISA "retains value as a framework for monitoring the communications of known terrorists, but it is hopeless as a framework for detecting terrorists. [FISA] requires that surveillance be conducted pursuant to warrants based on probable cause to believe that the target of surveillance is a terrorist, when the desperate need is to find out who is a terrorist."[146]

Related issues

Earlier warrantless surveillance

See main article: Warrantless searches in the United States. The Bush administration compared the NSA warrantless surveillance program with historical wartime warrantless searches in the US, going back to the time of the nation's founding.

Critics pointed out that the first warrantless surveillance occurred before the adoption of the U.S. Constitution, and the other historical precedents cited by the administration were before FISA's passage and therefore did not directly contravene federal law. Earlier electronic surveillance by the federal government such as Project SHAMROCK, led to reform legislation in the 1970s.[147] Advancing technology presented novel questions as early as 1985.[148]

Executive orders by previous administrations including Presidents Clinton and Carter authorized their Attorneys General to exercise authority with respect to both options under FISA.[149] [150] Clinton's executive order authorized his Attorney General "[pursuant] to section 302(a)(1)" to conduct physical searches without court order "if the Attorney General makes the certifications required by that section".

Unitary Executive theory

The Unitary Executive theory as interpreted by John Yoo et al., supported the Bush administration's Constitutional argument. He argued that the President had the "inherent authority to conduct warrantless searches to obtain foreign intelligence".[151] [152]

The United States Court of Appeals for the District of Columbia ruled that the President's authority as commander-in-chief extends to the "independent authority to repel aggressive acts ... without specific congressional authorization" and without court review of the "level of force selected".[153] Whether such declarations applying to foreign intelligence are or must be in compliance with FISA has been examined by few courts.

Classified information

Leaks

No single law criminalizes the leaking of classified information. Statutes prohibit leaking certain types of classified information under certain circumstances. One such law is ; it was tacked on to the Espionage Act of 1917. It is known as the 'SIGINT' statute, meaning signals intelligence. This statute says:

This statute is not limited in application to only federal government employees. However, the Code of Federal Regulations suggests the statute may apply primarily to the "[c]ommunication of classified information by Government officer or employee". 50 USCS § 783 (2005).

A statutory procedure[154] allows a "whistleblower" in the intelligence community to report concerns with the propriety of a secret program. The Intelligence Community Whistleblower Protection Act of 1998, Pub. L. 105–272, Title VII, 112 Stat. 2413 (1998) essentially provides for disclosure to the agency Inspector General, and if the result of that is unsatisfactory, appeal to the Congressional Intelligence Committees. Former NSA official Russ Tice asked to testify under the terms of the Intelligence Community Whistleblower Protection Act, in order to provide information to these committees about "highly classified Special Access Programs, or SAPs, that were improperly carried out by both the NSA and the Defense Intelligence Agency".[155]

Executive Order 13292, which sets up the U.S. security classification system, provides (Sec 1.7) that "[i]n no case shall information be classified in order to conceal violations of law".

Given doubts about the legality of the overall program, the classification of its existence may not have been valid under E.O. 13292.[156]

Publication of classified information

It is unlikely that a media outlet could be held liable for publishing classified information under established Supreme Court precedent. In Bartnicki v. Vopper, 532 U.S. 514,[157] the Supreme Court held that the First Amendment precluded liability for a media defendant for publication of illegally obtained communications that the media defendant itself did nothing illegal to obtain, if the topic involves a public controversy. Due to the suit's procedural position, the Court accepted that intercepting information that was ultimately broadcast by the defendant was initially illegal (in violation of ECPA), but nonetheless gave the radio station a pass because it did nothing itself illegal to obtain the information.

Nor could the government have prevented the publication of the classified information by obtaining an injunction. In the Pentagon Papers case, (New York Times Co. v. U.S.,),[158] the Supreme Court held that injunctions against the publication of classified information (United States-Vietnam Relations, 1945–1967: A Study Prepared by The Department of Defense – a 47-volume, 7,000-page, top-secret United States Department of Defense history of the United States' involvement in the Vietnam War) were unconstitutional prior restraints and that the government had not met the heavy burden of proof required for prior restraint.

The 1917 Espionage Act, aside from the SIGINT provision discussed above, only criminalizes 'national defense' information, not 'classified' information. Although the Justice Department as a matter of law sees no exemption for the press, as a matter of fact it has refrained from prosecuting:

On the other hand, Sean McGahan of Northeastern University stated,

Responses and analyses

Administration response to press coverage

On December 17, 2005, President Bush addressed the growing controversy in his weekly radio broadcast.[159] He stated that he was using his authority as President, as Commander in Chief and such authority as the Congress had given him, to intercept international communications of "people with known links to al Qaeda and related terrorist organizations". He added that before intercepting any communications, "the government must have information that establishes a clear link to these terrorist networks." He speculated that had the right communications been intercepted, perhaps the 9/11 attacks could have been prevented. He said the NSA program was re-authorized every 45 days, having at that time been reauthorized "more than 30 times"; it was reviewed by DOJ and NSA lawyers "including NSA's general counsel and inspector general", and Congress leaders had been briefed "more than a dozen times".[160]

In a speech in Buffalo, New York on April 20, 2004, he said that:

And again, during a speech at Kansas State University on January 23, 2006, President Bush mentioned the program, and added that it was "what I would call a terrorist surveillance program", intended to "best ... use information to protect the American people",[161] and that:

During a speech[162] in New York on January 19, 2006 Vice President Cheney commented on the controversy, stating that a "vital requirement in the war on terror is that we use whatever means are appropriate to try to find out the intentions of the enemy," that complacency towards further attack was dangerous, and that the lack of another major attack since 2001 was due to "round the clock efforts" and "decisive policies", and "more than luck." He stated:

In a press conference on December 19 held by both Attorney General Gonzales and General Michael Hayden, the Principal Deputy Director for National Intelligence, General Hayden claimed, "This program has been successful in detecting and preventing attacks inside the United States." He stated that even an emergency authorization under FISA required marshaling arguments and "looping paperwork around". Hayden implied that decisions on whom to intercept under the wiretapping program were being made on the spot by a shift supervisor and another person, but refused to discuss details of the specific requirements for speed.

Beginning in mid-January 2006 public discussion increased on the legality of the terrorist surveillance program.[163]

DOJ sent a 42-page white paper to Congress on January 19, 2006 stating the grounds upon which it was felt the NSA program was legal, which restated and elaborated on reasoning Gonzales used at the December press conference.[164] Gonzales spoke again on January 24, claiming that Congress had given the President the authority to order surveillance without going through the courts, and that normal procedures to order surveillance were too slow and cumbersome.[165]

General Hayden stressed the NSA's respect for the Fourth Amendment, stating at the National Press Club on January 23, 2006, "Had this program been in effect prior to 9/11, it is my professional judgment that we would have detected some of the 9/11 al Qaeda operatives in the United States, and we would have identified them as such."[166]

In a speech on January 25, 2006, President Bush said, "I have the authority, both from the Constitution and the Congress, to undertake this vital program,"[167] telling the House Republican Caucus at their February 10 conference in Maryland that "I wake up every morning thinking about a future attack, and therefore, a lot of my thinking, and a lot of the decisions I make are based upon the attack that hurt us."[168]

President Bush reacted to a May 10 domestic call records article by restating his position, that it is "not mining or trolling through the personal lives of millions of innocent Americans".[169]

Congressional response

Three days after news broke about the NSA program, a bipartisan group of Senators—Democrats Dianne Feinstein, Carl Levin, Ron Wyden and Republicans Chuck Hagel and Olympia Snowe, wrote to the Judiciary and Intelligence Committee chairs and ranking members requesting the two committees to "seek to answer the factual and legal questions" about the program.

On January 20, 2006, in response to the administration's asserted claim to base the NSA program in part on the AUMF, Senators Leahy and Kennedy introduced Senate Resolution 350 that purported to express a "sense of the Senate" that the AUMF "does not authorize warrantless domestic surveillance of United States citizens". It was not reported out of committee.

In introducing their resolution to committee,[170] they quoted Supreme Court Justice Sandra Day O'Connor's opinion that even war "is not a blank check for the President when it comes to the rights of the Nation's citizens".

Additionally, they asserted that the DOJ legal justification was a "manipulation of the law" similar to other "overreaching" and "twisted interpretations" in recent times. Leahy and Kennedy also asserted that Gonzales had "admitted" at a press conference on December 19, 2005, that the Administration did not seek to amend FISA to authorize the NSA spying program because it was advised that "it was not something we could likely get." (However, as noted below under "Proposed Amendments to FISA", Gonzales made clear that what he actually said was that such an amendment was "not something [they] could likely get" without disclosing the nature of the program and operational limitations and that it was believed that such disclosure would be damaging to national security.)

Leahy and Kennedy asserted that the procedures adopted for the NSA program, specifically the 45-day reapproval cycle was "not good enough" because the review group were executive branch appointees. Finally, they concluded that Congressional and Judicial oversight were fundamental and should not be unilaterally discarded.

In February 2008, the Bush administration backed a new version of FISA that would grant telecom companies retroactive immunity from lawsuits stemming from surveillance. On March 14, the House passed a bill that did not grant such immunity.

Anonymity networks

Edward Snowden copied and leaked thousands of classified NSA documents to journalists. The information revealed the access of some federal agencies to the public's online identity and led to wider use anonymizing technologies. In late 2013, soon after Snowden's leaks, it was loosely calculated that encrypted browsing software, such as Tor, I2P and Freenet had "combined to more than double in size ... and approximately 1,050,000 total machines 'legitimately' use the networks on a daily basis, amounting to an anonymous population that is about 0.011 percent of all machines currently connected to the Internet."[171] Given that these tools are designed to protect the identity and privacy of their users, an exact calculation of the growth of the anonymous population cannot be accurately rendered, but all estimates predict rapid growth.

These networks were accused of supporting illegal activity. They can be used for the illicit trade of drugs, guns and pornography. However, Tor executive director Roger Dingledine claimed that the "hidden services" represent only 2 percent of total traffic on Tor's network.[172] This fact suggests that the large majority of those who use it do so in order to protect their normal browsing activity, an effort to protect their personal values of privacy rather than to participate in illegal activity.

Trade-off between security and liberty

Polls analyzed the trade-off between security and liberty. A June 2015 poll conducted by Gallup asked participants if the US should take all the necessary steps to prevent terrorist attacks even if civil liberties are violated. 30% of respondents agreed: 65% instead said take steps, but do not violate civil liberties.[173]

In a 2004 Pew poll, 60% of respondents rejected the idea of sacrificing privacy and freedom in the name of security.[174] By 2014 a similar Pew poll found that 74% of respondents preferred privacy, while 22% said the opposite. Pew noted that post 9/11 surveys revealed that in the periods during which prominent incidents that related to privacy and security first came up, the majority of respondents favored an ideology of "security first", while maintaining that a dramatic reduction in civil liberties should be avoided. Events often caused Americans to back allow government to investigate suspected terrorists more effectively, even if those steps might infringe on the privacy of ordinary citizens. The majority of respondents reject steps that translate into extreme intrusion into their lives.[175]

Various administrations claimed that reducing privacy protections reduces obstacles that anti-terrorism agencies face attempting to foil terrorist attacks and that fewer privacy protections makes it more difficult for terrorist groups to operate.[176]

See also

External links

Notes and References

  1. News: White House Begins New Effort to Defend Surveillance Program . The New York Times . David E. . Sanger . John . O'Neil . January 23, 2006.
  2. News: Gonzales_Letter. The New York Times. January 18, 2007. https://web.archive.org/web/20070120183203/http://graphics8.nytimes.com/packages/pdf/politics/20060117gonzales_Letter.pdf. January 20, 2007. live.
  3. News: Federal Judge Finds N.S.A. Wiretaps Were Illegal . Charlie . Savage . James . Risen . March 31, 2010 . The New York Times . February 22, 2017 . https://web.archive.org/web/20170319114537/http://www.nytimes.com/2010/04/01/us/01nsa.html . March 19, 2017 . live .
  4. News: Officials Say U.S. Wiretaps Exceeded Law . . The New York Times . April 15, 2009 . September 5, 2012 . https://web.archive.org/web/20120902055056/http://www.nytimes.com/2009/04/16/us/16nsa.html . September 2, 2012 . live .
  5. Prepared Statement of Hon. Alberto R. Gonzales, Attorney General of the United States. February 6, 2006. US Department of Justice.
  6. Banks. Christopher P.. 2010-01-01. Security and Freedom After September 11. Public Integrity. 13. 1. 5–24. 10.2753/pin1099-9922130101. 141765924. 1099-9922.
  7. News: Spying Program Snared U.S. Calls. The New York Times. James Risen . Eric Lichtblau . amp . December 21, 2005. May 28, 2006.
  8. Web site: AT&T's Role in Dragnet Surveillance of Millions of Its Customers . .
  9. Web site: US CODE: Title 50, section 1809. Criminal sanctions.
  10. Web site: US CODE: Title 18, section 2511. Interception and disclosure of wire, oral, or electronic communications prohibited.
  11. News: Bush Lets U.S. Spy on Callers Without Courts. December 29, 2012. The New York Times. December 16, 2005. James Risen . Eric Lichtblau . amp .
  12. Web site: Bush Lets U.S. Spy on Callers Without Courts . NYT's Risen & Lichtblau's December 16, 2005 Bush Lets U.S. Spy on Callers Without Courts . February 18, 2006 . dead . https://web.archive.org/web/20060206162614/http://www.commondreams.org/headlines05/1216-01.htm . February 6, 2006 . mdy . via commondreams.org
  13. News: Eavesdropping and the Election: An Answer on the Question of Timing . The New York Times . Byron . Calame . August 13, 2006 . May 20, 2010.
  14. Web site: The Education of a 9/11 Reporter: The inside drama behind the Times' warrantless wiretapping story.. Lichtblau. Eric. Slate. March 26, 2008. March 31, 2008. https://web.archive.org/web/20111205064425/http://www.slate.com/articles/news_and_politics/politics/2008/03/the_education_of_a_911_reporter.html. December 5, 2011. live.
  15. Web site: What the Times knew, and when it knew it . Grieve . Tim . . August 14, 2006 . June 22, 2008.
  16. Web site: The Fed Who Blew the Whistle . Isikoff . Michael . . December 13, 2008 . December 13, 2008.
  17. Web site: NSA legal arguments. Greenwald. Glenn. February 19, 2006. Glenngreenwald.blogspot.com. February 23, 2013. https://web.archive.org/web/20130307175517/http://glenngreenwald.blogspot.com/2006/02/nsa-legal-arguments.html. March 7, 2013. live.
  18. The White House . December 19, 2005 . Press Briefing by Attorney General Alberto Gonzales and General Michael Hayden, Principal Deputy Director for National Intelligence . September 5, 2017 . https://web.archive.org/web/20180128032304/https://georgewbush-whitehouse.archives.gov/news/releases/2005/12/print/20051219-1.html . January 28, 2018 . live .
  19. Web site: Debate on warrantless wiretapping legality . January 23, 2007 . January 29, 2008 . https://web.archive.org/web/20080129235544/http://www.cruxlux.com/debate/50/the-warrantless-wiretapping-of-americans-by-the-bush-adminis .
  20. Web site: FindLaw. Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions. January 1, 2006. https://web.archive.org/web/20060130190732/http://news.findlaw.com/hdocs/docs/nsa/crs11806rpt.pdf. January 30, 2006. live.
  21. News: Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions. Cumming. Alfred. January 18, 2006. Federation of American Scientists. April 4, 2015. https://web.archive.org/web/20150718205953/http://www.fas.org/sgp/crs/intel/m011806.pdf. July 18, 2015. live.
  22. "If the NSA surveillance program were to consider an intelligence collection program, limiting congressional notification of the NSA program to the Gang of Eight, which some Members who were briefed about the program contend, would appear to be inconsistent with the law, which requires that the 'congressional intelligence committees be kept fully and currently informed of all intelligence activities', other than those involving covert actions." – excerpted from the Congressional Research Service publication, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions"
  23. "The executive branch may assert that the mere discussion of the NSA program generally could expose certain intelligence sources and methods to disclosure, thus making it necessary to limit the number of those knowledgeable of the program in order to reduce the risk of such disclosure occurring." – excerpted from the Congressional Research Service publication, "Statutory Procedures Under Which Congress Is To Be Informed of U.S. Intelligence Activities, Including Covert Actions"
  24. News: Adam. Liptak. U.S. Defends Surveillance to 3 Skeptical Judges. August 16, 2007. The New York Times. February 22, 2017. https://web.archive.org/web/20180116161734/http://www.nytimes.com/2007/08/16/washington/16nsa.html. January 16, 2018. live.
  25. News: Bob. Egelko. Classified evidence debated: Court likely to allow suit against AT&T, reject wiretap case . August 16, 2007 . San Francisco Chronicle .
  26. http://www.mied.uscourts.gov/eGov/taylorpdf/06%2010204.pdf Ruling
  27. Web site: For Publication United States Court of Appeals for the Ninth Circuit. November 16, 2007. United States Court of Appeals for the Ninth Circuit. December 21, 2009. https://web.archive.org/web/20090514133512/http://www.ca9.uscourts.gov/datastore/opinions/2007/11/15/0636083.pdf. May 14, 2009. live.
  28. News: Eric. Lichtblau. Court Bars Secret Papers in Eavesdropping Case. November 17, 2007. The New York Times. February 22, 2017. https://web.archive.org/web/20180315070543/http://www.nytimes.com/2007/11/17/washington/17nsa.html?pagewanted=print. March 15, 2018. live.
  29. News: Transcript: Debate on the foreign intelligence surveillance act . https://archive.today/20120731104224/http://www.elpasotimes.com/ci_6685679 . dead . July 31, 2012 . Chris . Roberts . August 22, 2007 . El Paso Times .
  30. News: Ellen. Nakashima. AT&T Plaintiffs Cite McConnell Remarks. Admission of Telecom Firms' Involvement in Warrantless Wiretaps Sought as Evidence. September 1, 2007. The Washington Post.
  31. News: Ellen Nakashima . Dan Eggen . amp . Former CEO Says U.S. Punished Phone Firm. Qwest Feared NSA Plan Was Illegal, Filing Says. October 13, 2007. The Washington Post.
  32. News: Scott . Shane . Former Phone Chief Says Spy Agency Sought Surveillance Help Before 9/11 . October 14, 2007 . . October 14, 2007.
  33. Web site: Proposed Resolution. Authorization for Use of Military Force (Public Law 107-40) does not authorize warrantless domestic surveillance of United States citizens. https://web.archive.org/web/20060126214740/http://leahy.senate.gov/press/200601/UpdatedAUMF+Resolution+1-19.pdf. January 26, 2006. January 20, 2006.
  34. Leahy on Friday Introduces Resolution Underscoring That Congress Did Not Authorize Illegal Spying on Americans. January 20, 2006. U.S. Senator Patrick Leahy. dead. https://web.archive.org/web/20060125203726/http://leahy.senate.gov/press/200601/012006.html. January 25, 2006. mdy-all.
  35. Web site: S.RES.350 – THOMAS (Library of Congress). https://web.archive.org/web/20160114025331/http://thomas.loc.gov/cgi-bin/bdquery/z?d109:s.res.00350:. dead. January 14, 2016. Thomas.loc.gov. February 23, 2013.
  36. http://wilson.house.gov/NewsAction.asp?FormMode=Releases&ID=1309 House Passes Wilson FISA Bill
  37. https://fas.org/blog/secrecy/2006/09/conflicting_bills_on_warrantle.html Conflicting Bills on Warrantless Surveillance Advance in Senate
  38. Web site: Congressional Record: January 17, 2007, Congressional Record: January 17, 2007. Federation of American Scientists. February 23, 2013. https://web.archive.org/web/20130414170240/http://www.fas.org/irp/congress/2007_cr/fisa011707.html. April 14, 2013. live.
  39. Web site: Findlaw: PDF archive of judicial ruling. February 23, 2013. https://web.archive.org/web/20130112211357/http://fl1.findlaw.com/news.findlaw.com/nytimes/docs/nsa/aclunsa81706opn.pdf. January 12, 2013. live.
  40. Wired News: Judge Halts NSA Snooping. Ryan Singel. August 17, 2006. Wired. February 23, 2013.
  41. News: Judge Finds Wiretap Actions Violate the Law. Liptak. Adam. Lichtblau. Eric. The New York Times. August 18, 2006.
  42. Web site: US District Judge Who Presided Over Government Wiretapping Case May Have Had Conflict of Interest. August 21, 2006. Judicial Watch. https://web.archive.org/web/20080327032011/http://www.judicialwatch.org/printer_5862.shtml. March 27, 2008. dead. February 20, 2008. mdy-all.
  43. News: Lawsuit Against Wiretaps Rejected; Case's Plaintiffs Have No Standing, Appeals Court Rules. The Washington Post. July 7, 2007. February 20, 2008. Amy. Goldstein.
  44. Web site: \\ca6cin4\opinions\OPINS.TXT\07a0253p-06.txt . February 23, 2013 . https://web.archive.org/web/20130115071422/http://www.ca6.uscourts.gov/opinions.pdf/07a0253p-06.pdf . January 15, 2013 . live .
  45. Web site: IN RE MOTION FOR RELEASE OF COURT RECORDS Docket Number MISC 07-01. August 17, 2007. United States Foreign Intelligence Surveillance Court. December 4, 2016. https://web.archive.org/web/20121007155006/http://www.aclu.org/pdfs/safefree/fisc_order_08162007.pdf. October 7, 2012. live.
  46. News: Court Weighs Making Public Rulings on U.S. Wiretapping. Lichtblau. Eric. August 18, 2007. The New York Times. February 22, 2017. https://web.archive.org/web/20180116153446/http://www.nytimes.com/2007/08/18/us/nationalspecial3/18fisa.html. January 16, 2018. live.
  47. News: Secret Court Asks For White House View on Inquiry. Eggen. Dan. August 18, 2007. The Washington Post. ACLU Seeking Rulings Issued on Warrantless Wiretapping. September 5, 2017. https://web.archive.org/web/20180315200250/http://www.washingtonpost.com/wp-dyn/content/article/2007/08/17/AR2007081701923_pf.html. March 15, 2018. live.
  48. Web site: OPPOSITION TO THE AMERICAN CIVIL LIBERTIES UNION'S MOTION FOR RELEASE OF COURT RECORDS Docket Number: MISC. 07-01. August 31, 2007. United States Department of Justice National Security Division. December 4, 2016. https://web.archive.org/web/20121007155011/http://www.aclu.org/pdfs/safefree/dojresponse_fisc_request.pdf. October 7, 2012. live.
  49. News: Court Rejects ACLU Challenge to Wiretaps. Associated Press. February 19, 2008. February 20, 2008. dead. https://web.archive.org/web/20080304143202/http://ap.google.com/article/ALeqM5jyusZ2V1ACKGV2iJuGVmuPUERi_QD8UTICG00. March 4, 2008. mdy-all.
  50. Web site: Jewel v National Security Agency. September 18, 2018. March 1, 2018. https://web.archive.org/web/20180528044116/https://www.eff.org/files/filenode/jewel/jewel.complaint.pdf. May 28, 2018. live.
  51. Web site: EFF sues Dubya over warrantless surveillance. theregister.co.uk. August 10, 2017. https://web.archive.org/web/20170810141100/https://www.theregister.co.uk/2008/09/18/eff_sues_bush/. August 10, 2017. live.
  52. Kravets . David . Obama Sides With Bush in Spy Case . Wired . February 23, 2013 . January 22, 2009 . https://web.archive.org/web/20090425084300/http://blog.wired.com/27bstroke6/2009/01/obama-sides-wit.html . April 25, 2009 . live .
  53. Kravets . David . Obama to Defend Telco Spy Immunity . Wired . 2001-09-11 . 2014-03-18 . https://web.archive.org/web/20090302060805/http://blog.wired.com//27bstroke6//2009//01//obama-to-fight.html . March 2, 2009 . live .
  54. News: Federal Judge Finds N.S.A. Wiretaps Were Illegal . The New York Times . Charlie . Savage . James . Risen . March 31, 2010 . February 22, 2017 . https://web.archive.org/web/20170319114537/http://www.nytimes.com/2010/04/01/us/01nsa.html . March 19, 2017 . live .
  55. Book: Civil Actions Against the United States, Its Agencies, Officers and Employees. 2013. Westlaw, Thomson Reuters. § 1:5.
  56. News: Fixing surveillance. K.A. Taipale. James Jay Carafano. January 25, 2006. The Washington Times. https://web.archive.org/web/20061202001709/http://www.heritage.org/Press/Commentary/ed012706a.cfm. December 2, 2006. dead. mdy-all.
  57. News: Why We Listen. Bobbitt. Phillip. January 30, 2006. The New York Times. February 22, 2017. https://web.archive.org/web/20160114025331/http://www.nytimes.com/2006/01/30/opinion/30bobbitt.html. January 14, 2016. live.
  58. News: The Eavesdropping Debate We Should be Having. Bryan Cunnigham. Daniel B. Prieto. February 5, 2006. The Denver Post. https://web.archive.org/web/20060901135852/http://bcsia.ksg.harvard.edu/publication.cfm?program=CORE&ctype=article&item_id=1373. September 1, 2006. dead. mdy-all.
  59. News: A New Surveillance Act. Posner. Richard A.. February 15, 2006. The Wall Street Journal. August 9, 2017. https://web.archive.org/web/20170809132108/https://www.wsj.com/articles/SB113996743590074183. August 9, 2017. live.
  60. https://www.chicagotribune.com/news/opinion/chi-0602120419feb12,0,6895976.story?coll=chi-newsopinioncommentary-hed A historical solution to the Bush spying issue
  61. Taipale. K. A.. June 2006. Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance. N.Y.U. Rev. L. & Security, No. 8. 889120.
  62. Statement of The Honorable Patrick Leahy. February 6, 2006. U.S. Senate Committee on the Judiciary. February 8, 2006. https://web.archive.org/web/20060210131544/http://judiciary.senate.gov/member_statement.cfm?id=1727&wit_id=2629. February 10, 2006. dead.
  63. Web site: NSA Spying on Americans Is Illegal | American Civil Liberties Union. December 29, 2005. Aclu.org. February 23, 2013. https://web.archive.org/web/20091019084422/http://www.aclu.org/privacy/spying/23279res20051229.html. October 19, 2009. live.
  64. Web site: Democrats Continue to Attack Terrorist Surveillance Program. November 29, 2012. Georgewbush-whitehouse.archives.gov. February 23, 2013. https://web.archive.org/web/20130610101949/http://georgewbush-whitehouse.archives.gov/news/releases/2006/01/print/20060122.html. June 10, 2013. live.
  65. http://childedlaw.org/publiclaw/pdf/gonzalesanswers.pdf "Responses to Questions from Senator Specter"
  66. Web site: FIS linking to 2006 FISA Congressional Hearings material. Fas.org. February 23, 2013. https://web.archive.org/web/20121102132018/http://www.fas.org/irp/congress/2006_hr/index.html#fisa4. November 2, 2012. live.
  67. Web site: Press Release of Senator DeWine. Fas.org. February 23, 2013. https://web.archive.org/web/20121126111142/http://www.fas.org/irp/congress/2006_cr/dewine031606.html. November 26, 2012. live.
  68. Web site: Dewine Bill as introduced. February 23, 2013. https://web.archive.org/web/20130707053122/https://www.cdt.org/security/20060324dewinebill.pdf. July 7, 2013. live.
  69. Web site: Specter Floor Statement. February 23, 2013. https://web.archive.org/web/20120904112507/http://information-retrieval.info/docs/SpecterFloorStmt.pdf. September 4, 2012. live.
  70. Web site: Specter Bill as introduced. February 23, 2013. https://web.archive.org/web/20120722061605/http://information-retrieval.info/docs/NSAFinal.pdf. July 22, 2012. live.
  71. https://www.washingtonpost.com/wp-dyn/content/article/2006/06/08/AR2006060801992.html "Specter Offers Compromise on NSA Surveillance"
  72. News: Bush cedes authority on spy program. Siobhan Gorman. January 18, 2007. Chicago Tribune.
  73. Chip Pitts. March 15, 2007. The End of Illegal Domestic Spying? Don't Count on It. dead. Washington Spectator. https://archive.today/20070927034053/http://www.washingtonspectator.com/articles/20070315surveillance_1.cfm. September 27, 2007. mdy-all.
  74. News: Court Affirms Wiretapping Without Warrants. Risen. James. January 16, 2009. The New York Times. January 16, 2009. Lichtblau. Eric. https://web.archive.org/web/20130328012330/http://www.nytimes.com/2009/01/16/washington/16fisa.html?_r=1&hp. March 28, 2013. live.
  75. News: Court Backs U.S. Wiretapping. Perez. Evan. January 16, 2009. The Wall Street Journal, January 16, 2009. January 16, 2009.
  76. News: Intelligence Court Releases Ruling in Favor of Warrantless Wiretapping. January 16, 2009. The Washington Post, January 15, 2009. January 16, 2009.
  77. Web site: Court ruling endorses Bush surveillance policy. https://web.archive.org/web/20090117180553/http://www.google.com/hostednews/ap/article/ALeqM5g9Q7M6scz4PEW8SuEo_bpOer6ZAQD95NRD1G0. dead. January 17, 2009. Associated Press, January 15, 2009. January 16, 2009.
  78. Web site: No. 08-01 IN RE: DIRECTIVE (Redacted) * PURSUANT TO SECTION 105B OF THE FOREIGN INTELLIGENCE SURVEILLANCE ACT (redacted tect) ON PETITION FOR REVIEW OF A DECISION OF THE UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT. August 22, 2008. United States Foreign Intelligence Surveillance Court of Review. https://web.archive.org/web/20090117194044/http://www.uscourts.gov/newsroom/2009/FISCR_Opinion.pdf?WT.cg_n=FISCROpinion_WhatsNew_homepage. January 17, 2009. dead. January 16, 2009.
  79. [McCulloch v. Maryland]
  80. http://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=CASE&court=US&vol=330&page=75 United Public Workers v. Mitchell, 330 U.S. 75 (1947)
  81. King. Kimi Lynn. Meernik. James. December 1999. The Supreme Court and the Powers of the Executive: The Adjudication of Foreign Policy. Political Research Quarterly. 52. 4. 801. 10.2307/449187. 449187.
  82. "Any neutral assessment of the important separation of powers questions at issue here warranted a thorough consideration of Curtiss-Wright and the theory of presidential power it recognized (as well as the even more long-standing precedent on which the decision in Curtiss-Wright relied, including The Prize Cases, 67 U.S. (2 Black) 635" – PROFESSOR JOHN C. EASTMAN in his solicited letter to the Senate Judiciary Committee
  83. "The Steel Seizure Case12 is frequently cited as providing a framework for the courts to decide the extent of the President's authority, particularly in matters involving national security." CRS, "Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information"
  84. United States v. Duggan, 743 F.2d 59, 72 (2d Cir. 1984) (citing cases)
  85. Web site: Justice Dept Supplemental Brief to the U.S. Foreign Intelligence Court of Review. Fas.org. February 23, 2013.
  86. Clay v. United States,
  87. United States v. Brown, 484 F.2d 418 (5th Cir. 1973)
  88. United States v. Butenko, 494 F.2d 593 (3rd Cir. 1974)
  89. United States v. Truong Dinh Hung, 629 F.2d 908 (4th Cir. 1980)
  90. United States v. Bin Laden , 126 F.Supp.2d 264 (S.D.N.Y. 2000)
  91. United States v. U.S. District Court,
  92. News: Clinton Claimed Authority to Order No-Warrant Searches – Does anyone remember that?. York. Byron. December 20, 2005. National Review. July 1, 2007. https://web.archive.org/web/20070504042611/http://nationalreview.com/york/york200512200946.asp. May 4, 2007. live.
  93. David Alan Jordan."Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol" . Boston College Law Review. May 2006. Last access date January 23, 2007
  94. Circuit courts applying Keith to the foreign intelligence context have affirmed the existence of a foreign intelligence exception to the warrant requirement for searches conducted within the United States which target foreign powers or their agents. See United States v. Clay, 430 F.2d 165, 171 (5th Cir.1970); United States v. Brown, 484 F.2d 418, 426 (5th Cir.1973); United States v. Butenko, 494 F.2d 593, 605 (3d Cir.1974); United States v. Buck, 548 F.2d 871, 875 (9th Cir.1977); United States v. Truong Dinh Hung, 629 F.2d 908, 913 (4th Cir.1980)
  95. United States v. Usama bin Laden. Dist. Court, SD New York. F.Supp.2d. 93. 484. 2000. https://scholar.google.com/scholar_case?hl=en&amp;as_sdt=2,22&amp;case=14432880949103009491&amp;scilh=0. June 12, 2013.
  96. Web site: U.S. INTELLIGENCE Community. National Security Act of 1947. https://web.archive.org/web/20080512165955/http://www.intelligence.gov/0-natsecact_1947.shtml. May 12, 2008. dead. January 1, 2006. mdy.
  97. https://www.law.cornell.edu/uscode/uscode50/usc_sup_01_50_10_15_20_III.html Title 50, Chapter 15, Subchapter III ACCOUNTABILITY FOR INTELLIGENCE ACTIVITIES
  98. Web site: 50 USC § 413b. Law.cornell.edu. February 23, 2013.
  99. Web site: Cornell Law . 50 U.S.C. § 1802(a)(1) . January 1, 2006.
  100. News: Bergman, Lichtblau . Shane, and Van Natta Jr. . Spy Agency Data After 11 September Led F.B.I. to Dead Ends . January 17, 2006 . The New York Times . February 22, 2017 . https://web.archive.org/web/20160521183458/http://www.nytimes.com/2006/01/17/politics/17spy.html . May 21, 2016 . live .
  101. News: . Barton Gellman . A01 . Surveillance Net Yields Few Suspects – NSA's Hunt for Terrorists Scrutinizes Thousands of Americans, but Most Are Later Cleared . February 5, 2006 . The Washington Post . September 5, 2017 . https://web.archive.org/web/20170427183009/http://www.washingtonpost.com/wp-dyn/content/article/2006/02/04/AR2006020401373.html . April 27, 2017 . live .
  102. Whistle-Blower Outs NSA Spy Room. Wired. Ryan Singel. April 7, 2006. August 15, 2007. https://web.archive.org/web/20080430142924/http://www.wired.com/science/discoveries/news/2006/04/70619. April 30, 2008. live.
  103. Web site: "Spying on the Home Front" – Interview with Mark Klein. Public Broadcasting System. Frontline. January 9, 2007. August 15, 2007. https://web.archive.org/web/20070809030838/http://www.pbs.org/wgbh/pages/frontline/homefront/interviews/klein.html. August 9, 2007. live.
  104. Web site: Klein's "2004 Package". PBS Frontline. May 17, 2007. August 15, 2007. https://web.archive.org/web/20080227135041/http://www.pbs.org/wgbh/pages/frontline/homefront/etc/kleindoc.pdf. February 27, 2008. live.
  105. Web site: NarusInsight Intercept Suite. October 18, 2007 . https://web.archive.org/web/20071018035437/http://www.narus.com/products/intercept.html . October 18, 2007.
  106. Web site: DECLARATION OF J. SCOTT MARCUS IN SUPPORT OF PLAINTIFF'S MOTION FOR PRELIMINARY INJUNCTION. March 29, 2006. February 6, 2008. https://web.archive.org/web/20080216080328/http://www.eff.org/files/filenode/att/SER_marcus_decl.pdf. February 16, 2008. live.
  107. . Risking Communications Security: Potential Hazards of the Protect America Act . Institute of Electrical and Electronics Engineers Security and Privacy . February 5, 2008 . 10.1109/MSP.2008.17 . February 5, 2008 . 6 . 24 . 874506 . https://web.archive.org/web/20080227135042/http://www.crypto.com/papers/paa-ieee.pdf . February 27, 2008 . dead . mdy-all .
  108. News: Conflict Over Spying Led White House to Brink. Barton Gelman. The Washington Post. September 14, 2008. May 28, 2012. https://web.archive.org/web/20121112023753/http://www.washingtonpost.com/wp-dyn/content/article/2008/09/13/AR2008091302284_pf.html. November 12, 2012. live.
  109. Web site: To What Extent Did the Government Monitor Phone, Internet Activity After 9/11? . PBS Newshour . June 28, 2013 . June 29, 2013 . https://web.archive.org/web/20130630033027/http://www.pbs.org/newshour/bb/nation/jan-june13/snowden2_06-28.html . June 30, 2013 . live .
  110. News: NSA inspector general report on email and internet data collection under Stellar Wind – full document . The Guardian . June 27, 2013 . June 28, 2013 . London.
  111. News: Legal memorandum of David S. Kris, former Deputy Attorney General for national security. January 25, 2006. The Washington Post.
  112. Web site: Cornell University – Constitutional law . Law.cornell.edu . February 23, 2013 . https://web.archive.org/web/20130120153737/http://www.law.cornell.edu/wex/index.php/Constitutional_law . January 20, 2013 . live .
  113. Web site: Constitutional Rights Foundation. 2020-10-31. www.crf-usa.org.
  114. Hasian. Marouf. January 2006. Unitary Executives, Rhetorical Histories, and the National Security Agency's Strategic Remembrances of the Foreign Intelligence Surveillance Act (FISA). Free Speech Yearbook. 43. 1. 1–19. 10.1080/08997225.2006.10556326. 155825691. 0899-7225.
  115. U.S. Department of Justice White Paper on NSA Legal Authorities "Legal Authorities Supporting the Activities of the National Security Agency Described by the President" (pdf) January 19, 2006.
  116. Congressional Research Service . January 5, 2006 . Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information .
  117. Web site: DOJ/Attorney General Gonzales' responses to the House Judiciary Committee's oversight questions regarding the NSA Terrorist Surveillance Program, March 24, 2006. February 23, 2013.
  118. Adam Liptak, "Experts Fault Reasoning in Surveillance Decision", New York Times, August 19, 2006.
  119. http://glenngreenwald.blogspot.com/2006/08/grading-law-professors-apologies-due.html "Grading the law professors; apologies due Judge Taylor"
  120. That Congress sees this as domestic intelligence can be inferred from the CRS position paper, "Congress has asserted itself with respect to domestic surveillance, but has largely left matters involving overseas surveillance to executive self-regulation, subject to congressional oversight and willingness to provide funds."
  121. See for example,Cole, Epstein, Heynmann Open Letter to Congress
    Congress indisputably has authority to regulate electronic surveillance within the United States, as it has done in FISA. Where Congress has so regulated, the President can act in contravention of statute only if his authority is exclusive, that is, not subject to the check of statutory regulation.
  122. News: Legal memorandum of David S. Kris, former Deputy Attorney General for national security. January 25, 2006. The Washington Post. September 5, 2017. https://web.archive.org/web/20160114025330/http://www.washingtonpost.com/wp-srv/nation/documents/NSAProgramQuestions.pdf. January 14, 2016. live.
  123. The CRS report itself notes "A review of the history of intelligence collection and its regulation by Congress suggests that the two political branches have never quite achieved a meeting of the minds regarding their respective powers."
  124. Web site: Coleen Rowley's Memo to FBI Director Robert Mueller. Apfn.org. February 23, 2013. https://web.archive.org/web/20190920090649/http://www.apfn.org/apfn/WTC_whistleblower1.htm. September 20, 2019. dead.
  125. Web site: FBI Director Mueller Explains the Significance of the Woods Procedures. February 23, 2013.
  126. DOJ fact sheet:The NSA Program to Detect and Prevent Terrorist Attacks – Myth vs Reality. January 27, 2006. U.S. Department of Justice. 2014-03-18. https://web.archive.org/web/20071204090917/http://www.usdoj.gov/ag/readingroom/surveillance16.pdf. December 4, 2007. live.
  127. Book: Edgar, Timothy H. Beyond snowden: privacy, mass surveillance, and the struggle to reform the NSA. Brookings Institution Press. 2017.
  128. Web site: Remarks by the President in a Conversation on the USA Patriot Act. Georgewbush-whitehouse.archives.gov. February 23, 2013. https://web.archive.org/web/20130610131232/http://georgewbush-whitehouse.archives.gov/news/releases/2004/04/print/20040420-2.html. June 10, 2013. live.
  129. Whistle-Blower Outs NSA Spy Room . Wired . April 7, 2006 . dead . https://web.archive.org/web/20080430142924/http://www.wired.com/science/discoveries/news/2006/04/70619 . April 30, 2008 .
  130. Book: Zegart, Amy B. Eyes on Spies: Congress and the United States Intelligence Community. Hoover Press. 2013.
  131. News: Ronald Reagan: The Power of Conviction and the Success of His Presidency. Wallison. Peter J.. Westview Press. 2003. 190. 0-8133-4046-2. registration.
  132. News: Charlie . Savage . Specialists doubt legality of wiretaps . February 2, 2006 . . April 16, 2020 . https://web.archive.org/web/20160304135938/http://www.boston.com/news/nation/articles/2006/02/02/specialists_doubt_legality_of_wiretaps/ . March 4, 2016 . live .
  133. On NSA Spying: A Letter to Congress by Ronald Dworkin, Kathleen M. Sullivan, and Laurence H. Tribe . The New York Review of Books . February 23, 2013 . https://web.archive.org/web/20100330192918/http://www.nybooks.com/articles/18650 . March 30, 2010 . live . Alstyne . William Van . Stone . Geoffrey . Sessions . William S. . Nolan . Beth . Lederman . Martin . Koh . Harold Hongju . Heymann . Philip B. . Epstein . Richard . Dellinger . Walter . Bradley . Curtis . Cole . David . Tribe . Laurence H. . Sullivan . Kathleen M. . Dworkin . Ronald .
  134. News: Legal Rationale by Justice Dept. on Spying Effort . Eric . Lichtblau . James . Risenjan . January 20, 2006 . . February 22, 2017 . https://web.archive.org/web/20151229193053/http://www.nytimes.com/2006/01/20/politics/20nsa.html . December 29, 2015 . live .
  135. News: Lichtblau. Eric. Risen. James. 2006-01-20. Legal Rationale by Justice Dept. on Spying Effort. en-US. The New York Times. 2021-04-24. 0362-4331.
  136. Robert M. . Bloom . William J. . Dunn . The Constitutional Infirmity of Warrantless NSA Surveillance: The Abuse of Presidential Power and the Injury to the Fourth Amendment . William & Mary Bill of Rights Journal . 15 . 147–202 . 2006 . 926997 .
  137. Web site: JURIST – Forum: Not Authorized By Law: Domestic Spying and Congressional Consent . Jurist.law.pitt.edu . 2014-03-18 . https://web.archive.org/web/20051227042140/http://jurist.law.pitt.edu/forumy/2005/12/not-authorized-by-law-domestic-spying.php . December 27, 2005 . live .
  138. News: Power Play – Did Bush Roll Past the Legal Stop Signs?. Spaulding. Suzanne E.. December 25, 2005. The Washington Post. B01. September 5, 2017. https://web.archive.org/web/20180315200249/http://www.washingtonpost.com/wp-dyn/content/article/2005/12/23/AR2005122302050.html. March 15, 2018. live.
  139. NSA Eastman Letter. January 27, 2006. House Judiciary Committee. dead. https://web.archive.org/web/20060224214356/http://judiciary.house.gov/media/pdfs/nsaeastmanltr.pdf. February 24, 2006. mdy-all.
  140. Web site: The Volokh Conspiracy Blog. The NSA Surveillance Program and the Article II Argument. December 29, 2005. https://web.archive.org/web/20060513080025/http://volokh.com/posts/1135893533.shtml. May 13, 2006. live.
  141. Web site: George Washington Law School Profile. gwu.edu. https://web.archive.org/web/20050405231606/http://www.law.gwu.edu/faculty/profile.asp?ID=3568. April 5, 2005. dead. mdy-all.
  142. Web site: Orin Kerr Bibliography at GWU. gwu.edu. https://web.archive.org/web/20070213011233/http://www.law.gwu.edu/Bibliography/showbibPRINT.asp?uid=3568. February 13, 2007. dead. mdy-all.
  143. News: Judges of secret court briefed on NSA activity. January 10, 2006. Associated Press.
  144. News: Judges on Surveillance Court To Be Briefed on Spy Program. Leonnig. Carol D.. December 22, 2005. The Washington Post. Linzer. Dafna. A01. Carol D. Leonnig. Dafna Linzer. September 5, 2017. https://web.archive.org/web/20170220024646/http://www.washingtonpost.com/wp-dyn/content/article/2005/12/21/AR2005122102326.html. February 20, 2017. live.
  145. News: Surveillance Court Is Seeking Answers – Judges Were Unaware of Eavesdropping. Leonnig. Carol D.. January 5, 2006. The Washington Post. Carol D. Leonnig. September 5, 2017. https://web.archive.org/web/20180316214523/http://www.washingtonpost.com/wp-dyn/content/article/2006/01/04/AR2006010401864.html. March 16, 2018. live.
  146. https://www.wsj.com/articles/SB113996743590074183 A New Surveillance Act
  147. Web site: National Security Archive at George Washington University . Wiretap Debate Déjà Vu . February 4, 2006 . https://web.archive.org/web/20060207023252/http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/index.htm . February 7, 2006 . live .
  148. Web site: Princeton University . The OTA Legacy . February 1, 2006 . dead . https://web.archive.org/web/20060209171940/http://www.wws.princeton.edu/ota/ . February 9, 2006 . mdy-all .
  149. Web site: Federation of American Scientists . Exercise Of Certain Authority Respecting Electronic Surveillance – EO 12139 . January 1, 2006 . https://web.archive.org/web/20051231060635/http://www.fas.org/irp/offdocs/eo12139.htm . December 31, 2005 . live .
  150. Web site: Executive Order 12949. Federation of American Scientists. January 1, 2006. https://web.archive.org/web/20051231063229/http://www.fas.org/irp/offdocs/eo/eo-12949.htm. December 31, 2005. live.
  151. News: Administration Paper Defends Spy Program. Leonnig. Carol D.. Carol D. Leonnig. January 20, 2006. The Washington Post. June 23, 2009. https://web.archive.org/web/20080515141848/http://www.washingtonpost.com/wp-dyn/content/article/2006/01/19/AR2006011903276.html. May 15, 2008. live.
  152. Ignoring FISA
  153. Campbell v. Clinton, 203 F.3d 19 (D.C. Cir. 2000
  154. Web site: INTELLIGENCE AUTHORIZATION ACT FOR FISCAL YEAR 1999. October 20, 1998.
  155. Web site: Washington . The . NSA whistleblower asks to testify . The Washington Times . January 4, 2006 . February 23, 2013 . https://web.archive.org/web/20061216014237/http://www.washingtontimes.com/national/20060104-114052-6606r.htm . December 16, 2006 . live .
  156. Kaminer. Joan Gibson. The future of Freedom of Information: An analysis of the impact of executive orders on the freedom of information act national security exemptions.. University of Maryland, College Park.
  157. Web site: FindLaw | Cases and Codes . Caselaw.lp.findlaw.com . February 23, 2013 . https://web.archive.org/web/20130218121231/http://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=case&court=us&vol=532&page=514 . February 18, 2013 . live .
  158. Web site: FindLaw | Cases and Codes . Caselaw.lp.findlaw.com . February 23, 2013 . https://web.archive.org/web/20130218121221/http://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=case&court=us&vol=403&page=713 . February 18, 2013 . live .
  159. [s:Presidential Radio Address – 17 December 2005]
  160. Web site: President's December 17, 2005 Radio Address . Georgewbush-whitehouse.archives.gov . February 23, 2013 . https://web.archive.org/web/20130609220554/http://georgewbush-whitehouse.archives.gov/news/releases/2005/12/print/20051217.html . June 9, 2013 . live .
  161. The White House . January 23, 2006 . President Discusses Global War on Terror at Kansas State University . September 5, 2017 . https://web.archive.org/web/20160304195411/http://georgewbush-whitehouse.archives.gov/news/releases/2006/01/print/20060123-4.html . March 4, 2016 . live .
  162. The White House . January 19, 2006 . Vice President's Remarks on Iraq and the War on Terror at the Manhattan Institute for Policy Research . September 5, 2017 . https://web.archive.org/web/20180316152558/https://georgewbush-whitehouse.archives.gov/news/releases/2006/01/print/20060119-5.html . March 16, 2018 . live .
  163. News: Eric. Lichtblau. Administration Lays Out Legal Case for Wiretapping Program . January 19, 2006 . The New York Times . May 20, 2010.
  164. Web site: hotlineblog . US Department of Justice White Paper on NSA Legal Authorities . https://web.archive.org/web/20060218054524/http://hotlineblog.nationaljournal.com/archives/White%20Paper%20on%20NSA%20Legal%20Authorities.pdf . dead . February 18, 2006 . January 19, 2006.
  165. http://www.usdoj.gov/archive/ag/speeches/2006/ag_speech_0601241.html Attorney General Alberto Gonzales' speech at Georgetown University
  166. Web site: John Pike . General Hayden's address to the National Press Club on January 23, 2006 . Globalsecurity.org . January 23, 2006 . February 23, 2013 . https://web.archive.org/web/20130327223654/http://www.globalsecurity.org/intell/library/news/2006/intell-060123-dni01.htm . March 27, 2013 . live .
  167. The White House . January 25, 2006 . President Visits National Security Agency .
  168. News: Jennifer . Loven . Update 19: Bush Reveals Rationale Behind Surveillance . February 10, 2006 . Forbes . https://web.archive.org/web/20060227202800/http://www.forbes.com/technology/ebusiness/feeds/ap/2006/02/10/ap2517004.html. dead. February 27, 2006.
  169. News: Bush says U.S. not 'trolling through personal lives' . CNN . May 11, 2006 . dead . https://web.archive.org/web/20060615052647/http://www.cnn.com/2006/POLITICS/05/11/nsa.phonerecords/index.html . June 15, 2006 .
  170. The following statements are taken from the Library of Congress records, pages S137 – S139. Online versions: p.137, p.138, p.139 (PDF).
  171. Web site: O'Neill. Patrick. Tor and the rise of anonymity networks. The Daily Dot. October 24, 2013. April 21, 2016. https://web.archive.org/web/20160509021940/http://www.dailydot.com/technology/tor-freenet-i2p-anonymous-network/. May 9, 2016. live.
  172. Greenberg. Andy. Over 80 Percent of Dark-Web Visits Relate to Pedophilia, Study Finds. Wired. March 10, 2017. https://web.archive.org/web/20170313135841/https://www.wired.com/2014/12/80-percent-dark-web-visits-relate-pedophilia-study-finds/. March 13, 2017. live.
  173. Web site: Jones. Jeffrey. Americans Still Say Liberties Should Trump Anti-Terrorism. Gallup. June 10, 2015. 27 October 2017. https://web.archive.org/web/20171107011322/http://news.gallup.com/poll/183548/americans-say-liberties-trump-anti-terrorism.aspx. November 7, 2017. live.
  174. Web site: Gao. George. What Americans think about NSA surveillance, national security and privacy. Pew Research Center. May 29, 2015 . November 9, 2017. https://web.archive.org/web/20171110004911/http://www.pewresearch.org/fact-tank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/. November 10, 2017. live.
  175. Web site: Raine. Lee. Maniam. Shiva. Americans feel the tensions between privacy and security concerns. Pew Research. February 19, 2016 . November 9, 2017. https://web.archive.org/web/20171110061655/http://www.pewresearch.org/fact-tank/2016/02/19/americans-feel-the-tensions-between-privacy-and-security-concerns/. November 10, 2017. live.
  176. Dragu. Tiberiu. Is There a Trade-off between Security and Liberty? Executive Bias, Privacy Protections, and Terrorism Prevention. The American Political Science Review. February 2011. 105. 1. 65. 41480827. 10.1017/S0003055410000614. 144032377.