the right to privacy in light of president's programs

Upload: scribdforced

Post on 06-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    1/51

    The Right to Privacy in Light of Presidents'Programs: What Project MIN ARET 's A dmissionsReveal about Modem Surveillance of AmericansBy Lisa GravesThis is the way the world ends. This is the way the w orld ends. This is theway the world ends. Not with a bang but a whimper.-T .S . Eliot , "The H ollow M en"Introduction

    Some at this symposium suggested abandoning the concept of privacyaltogether' while others swept it away with the wave of a hand, dismissingthe rubric of rules as the "fog of law."^ Ou tside this convening, som e havelong lamented the death of privacy^ and some radical theorists have argued itwas never bom in the first place."* Still, others have refused to concede eitherexistential ground and have fought valiantly to preserve this cherished valueand what it protects.^ I, for one, am not ready to relinquish the idea ofprivacy, especially at this juncture in America's history.

    * Lisa Graves is the Executive Director of the Center for Media and Democracy, Some of theanalysis in this Article is the result of conversations with my colleagues in the civil liberties andnational security community and elsewhere over the past few years, including policy experts andallies such as Michelle Richardson, Kate Martin, Suzanne Spaulding, Nancy Chang, Wendy Patten,Mike German, Shahid Buttar, James Dempsey, Patrice McDermott, Lynne Bradley, Kate Rhudy,and Cadence Mertz, as well as former Congressman Bob Barr, Bruce Fein, and John Dean, plusexperts in litigation and strategy such as Ann Beeson, Jameel Jaffer, Melissa Goodman, CindyCohn, Kevin Bankston, and Lee Tien, and many others too numerous to name, I am also veryappreciative of the research assistance and fme editing of Brendan Fischer, University of WisconsinLaw Class of 2011 , Any mistakes, of course, remain my own. And I am grateful to ProfessorBobby Chesney of The University of Texas School of Law for this invitation as well as to mycolleagues at the Symposium and the students on the Texas Law Review,

    1, See Benjamin Wittes, Brookings Inst,, Panel 1: National Security, Privacy, and Technology(I), at the TEXA S LAW REVIEW SYM POSIUM: LAW AT THE INTERSECTION OF NATION AL SECURITY,PRIVACY, AND TECHNOLOGY (Feb, 5, 2 0 1 0 ), http://www,texaslrev,com/symposium/listen (arguingthat the gathering of personal data violates some unidentified value but that value is not "privacy"),

    2, Kim Taipale, Executive Dir,, Ctr, for Advanced Studies in Sei, and Tech, Policy, RemarksPanel 5: Accountability Mechanisms, Symposium, supra note 1,3, See, e.g.. A, Michael Froomkin, The Death of Privacy?, 52 STAN, L, REV, 1 461, 1 475-1 50 1(2 0 0 0 ) (detailing pre-9/1 1 technologies that were destroying informational privacy),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    2/51

    1856 Texas Law Review [Vol. 88:1855

    Instead, we must reclaim privacy and re-emphasize its status as anintegral component of human freedom and dignity in spite of the downwardspiral ofthe law's conception of privacy; indeed, because of this spira l. Ifwe do not do so now w e may never be able to reclaim it. The intersection ofnational security "needs" and omni-surveillance technological capacitymarketed to us by corporations as great new tools of convenience to connectwith our family, friends, and colleagues but also powerfully intms ive tools inthe hands of the govemment^is simply too dangerous to essential libertyand to genuine security to be l^ft largely unpatrolled.*In my view, the constitutional touchstone of "reasonableness" is just toomalleable to protect against the real dangers of the symbiotic relationshipbetween the govemment and corporations, let alone the insatiable desire ofthe govemm ent to know m ore. And these were my fears before G oogle wasa word, let alone an empire;^ before most of the transactions of daily lifewere transmuted into traffic on the Intemet; and before a handful ofmurderers dramatically toppled the World Trade Center and smashed into thePentagon in 2001.Shortly after these world-altering events emerged at the outset of the

    21st century, the Adm inistration of President George W. Bush and VicePresident R ichard B . Cheney claimed "plenary"^ power, especially in theareas of search and seizure and other acquisition activities, in the name of"national security." This was a policy arena that had been govem ed by theConstitution's Fourth Amendment as well as a web of lawthe ForeignIntelligence Surveillance Act (FISA),' executive orders, and agency miesthat had been agreed to by the political branches in the aftermath of the lastadministration that had claimed unlimited power to conduct warrantlesssearches of Am ericans' comm unications in the name of national security, theNixon Presidency."*

    (arguing that the interception of private eommunications violates the First and FourthAmendments); As this Article goes to press. Judge Vaughn Walker issued a ruling in favor of theplaintiffs in their challenge to warrantless wiretapping in the al Haramain case. In re Nat 'l Sec,Agency Telecomms, Records Litig,, MDL Docket No, 06-1791, 2010 WL 1244349 (N,D, Cal, Mar,31,2010),6, Credit for this visualization is due Alex Joel, the Civil Liberties Protection Officer of theOffice of the Director of National Intelligenee, who described his official role at this intersectionduring the Symposium, See Alex Joel, Civil Liberties Prot, Officer, Office of the Dir, of Nat'lIntelligence, Panel 2: National Security, Privacy and Technology (II), Symposium, supra note 1,7, See Google, Corporate Information, Google Milestones, http://www,google,com/intl/en/

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    3/51

    2010] The Right to Privacy in Light of Presidents' Programs 1857

    The main goal of this Article is to question what an unreasonable searchand a reasonable expectation of privacy mean in the national security contextin the aftermath of the changes made, or urged, by the Bush Administration.Rather than explore these issues abstractly, I want to view them through alens from the past, not simply because "what's past is prologue,"" butbecause I think this will illuminate some of the crucial issues obscured in therecent debates over the Bush Administration's warrantless wiretappingactivities.This examination is informed by viewing, in the new light of morerecent information, declassified descriptions of the Signals Intelligence(SIGINT) activities during the period around the passage of FISA.'^Specifically, this Article will examine the contemporaneous statements of theNational Security Agency (NSA)in particular, a declassified JusticeDepartment memoranda from 1976 by Dougald McMillan (the McMillanMemo)'' 'about the controversial classified program of PresidentRichard M. Nixon called Project MIN AR ET .''' These admissions shed lighton statements about Bush and Cheney's more recent classified and highlycontroversial program that was known as the "President's Program" (PP)until it was publicly rebranded as the "Terrorist Surveillance Program"

    (TSP).'^When viewed together, these and other recent public statements helpclarify the legal argum ents about incidentally collected infonna tion. Theyalso underscore the need for greater public understanding and debate over

    search and seize outside of the limitations of the Fourth Amendment when acting to obtainintelligence for national security purposes).11. WILLIAM SH AKESPEARE, TH E TEMPEST 34 (Chauncey B. Tinker ed., Yale U. Press 1918).12. Signals intelligence involves both communications intelligence and electronics intelligence.If the infonnation intercepted is transmitted by foreign powers it frequently needs to be decrypted,so cryptanalysis plays a significant role in SIGINT as well. SeeJeffrey T. Richelson, THE U.S.

    INTELLIGENCE COMMUNITY 180 (4th ed. 1999).13. DOUGALD D. M C M I L L A N , U.S. D E P ' T OF JUSTICE, REPORT ON INQUIRY INTO CIA-

    RELATED ELECTRONIC SURVEILLANCE ACTIVITIES (1976), available at http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/index.htm. The memo was originally released 1982 in responseto a Freedom of Information Act request by James Bamford, who has written key books on theNSA's activities, including TH E PUZZLE PALACE (1983) and most recently THE SHADOW FACTORY:TH E ULTRA-SECRET NSA FROM 9/11 TO THE EAVESDROPPING ON AMERICA (2008).

    14. MCMILLAN, supra note 13, at 26.15. The PP has also been described as including extensive "data-mining" activities and w ithout

    adequate privacy protections for Americans. SeeShane H arris, H omeland Sec. and IntelligenceCorrespondent, Nat'l Journal, Address at the Brookings Institution: The Rise of America'sSurveillance State (Mar. 11, 2010), available at http://www.brookings.edu/~/media/Files/

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    4/51

    1858 Texas Law Review [Vol. 88:1855

    abstract terms of art that are now goveming the NSA's collection activity,namely "minimization rules" to "min imize" the use of information "lawfullyacqu ired." This is especially important because we have not yet been able toobtain any altemative enforcement of the warrant requirement via litigatingover the PP's expanded analysis of Americans' private communications.'*My hypothesis is that FISA has been amended to ratify the NSA settingup shop within the United States to monitor the ocean of information flowingthrough U.S.-based electronic communications providers and Intemet serviceproviders (ISPs) in search of foreign intelligence information. I believe that

    the NSA's politico-military leadership considers communications ofAmericans thus obtained to be "incidental" to their foreign intelligencegathering efforts and, once lawfully acquired under this schema, to be fairgame for ongoing analysis to some undisclosed extent.This accessibility exposes potentially enormous quantities of personalinformation about Americanstransmitted daily via various ISPs and othercorporate digital platformsto virtually etemal search and analysis by theNS A, at least in theory.'^ And, right now , this program is primarily govem edby secret new minimization rules written by the Executive Branch, approved

    by FISA Court judges handpicked by Chief Justices John Roberts andWilliam Rehnquist, and shared in some way with some serving oncongressional committees, oversight committees which I fear have beencaptured in some ways by the Intelligence Community they are charged withregulating,'^This Article questions the constitutionality of such collection and arguesthat this activity demonstrates the fundamental failure of a reasonablenesstest to adequately protect American's rights and interests in privacy, liberty,and security. Both security and liberty are gravely harmed by accep ting the

    porousalmost nonexistent and nearly unenforceableboundaries for theprotection of what should be considered the inalienable rights of Americans.This Article identifies critical information missing from the public discourse,a deficiency that prevents the American people from making genuinelyinformed democratic judgments about how best to protect our nationour

    16, Se e Electronic Frontier Foundation, EFF 's Case Against AT&T, http://www ,efforg/nsa/hepting (explaining that, iri June of 2009, a judge dismissed dozens of cases brought againsttelecommunications companies for collaborating with the NSA to wiretap Americans'communications without warrants),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    5/51

    2010] The Right to Privacy in Light of Pre sidents' Program s 1859

    nation as a whole, not only our land and our infrastructure, but also theconstitutionally secured blessings of liberty that help guarantee our freedom.This Article begins by describing in general terms the FourthAmendment parameters for acquisition of our information and two modemstrains of judicial thought about reasonableness versus warrants forgovemment surveillance. The Article then examines certain declassifiedinformation about Project MINA RE T. It will then examine key statementsby the Bush Administration about the PP and its rationale. The Articleconcludes with some observations about what this means for the privacy ofthe substance and transactions of Americans' daily life and the need forgreater protections for the sake of liberty, security, and our future as a freepeople.I. Corpo rate and Govem ment Interests and Constitutional PrivacyA . Corporate "Freedom " and Incentives to C ollect Information

    Even before September 11th, I feared that the Fourth Amendment'sinterpretation would lead to major contractions in privacy based onirresistible technological advances.'^ That is because the Fourth Amendm enthas been constmed primarily to constrain the govemment, not corporations.^"

    19, The C onstitution states,The right of the people to be secure in their persons, houses, papers, and effects,against unreasonable searches and seizures, shall not be violated, and no Warrants shallissue, but upon probable cause, supported by Oath or affirmation, and particularlydescribing the place to be searched, and the persons or things to be seized,U,S, CONST, amend, IV,

    20, See, e.g.. United States v, Jacobsen, 466 U,S, 109, 113 (1984) ("This Court has , , ,consistently construed this protection as proscribing only govemmental action; it is whollyinapplicable 'to a search or seizure, even an unreasonable one, effected by a private individual notacting as an agent of the Govemment or with the participation or knowledge of any govemmentalofficial,'"). Although I am citing this precedent, I do not wish to give credit to this decision ascorrectly decided but merely acknowledge that it reflects the view of a majority of the SupremeCourt at that time, I believe Justice White, in his concurrence, was correct to challenge thisproposition, and that Justices Brennan and Marshall, in their dissent, had the better argument on thefacts of this case. Furthermore, I disagree with this line of cases as a whole because there is nothingin the plain language ofthe first half of the Fourth Am endment that would necessarily limit its reachto only govemment actors: "[tjhe right of the people to be secure in their persons, houses, papers,and effects, against unreasonable searches and seizures, shall not be violated , , , ," U,S, CONST,amend, IV, Only the second half of the Fourth Amendm ent refers to the rules for obtaining judicialapproval for a search: "no Warrants shall issue, but upon probable cause, supported by Oath oraffirmation, and particularly describing the place to be searched, and the persons or things to be

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    6/51

    1860 Texas Law Review [Vol. 88:1855

    And, generally, corporations by their nature are market-driven adopters ofnew techno logies to maxim ize profit and m inimize fraud or theft,^' and so farthere has been almost no commercial downside to monitoring customers and"great" upsides to gathering information about us as consumers and thenanalyzing and marketing it, "commodifying" us.' ^ Accordingly, unlessclosely regulated by statute, corporations could deploy unlimited newtechnologies to monitor, and also charge for, activitiesespecially whenserving as a necessary or convenient conduit for personal activities such asbanking, communicating, or getting medical treatmentand thus erode ourreasonable expectations of privacy without violating the Constitution, asinterpreted.

    My thesis was that the govemment could and would ride piggyback oncorporate know ledge and information gathering techniques. And, my worrywas that the claim would be that the American people had no constitutionallycognizable privacy interests against the govemment knowing what theprivate sector knows about them. That is, although the govem men t could noteasily get away with being the search or seizure "innovator," it could ride thecoattails of the for-profit sector, hunting and gathering on the fields ofpersonal information accumulated by various corporations.This is so because today's dominant constitutional test that has emergedis not whether the govemment has a warrant but whether yo u have a"reasonable expectation of privacy"^'' regarding the infonnation thegovernm ent seeks. And, if you had already "shared " information aboutyourself with a company, how could you successfully defend against thegovem ment know ing it too? How ever, in my view, simply because yourbank, phone company, and doctor knows information about you should notmean that the govemm ent is entitled to it.

    In fact, the Supreme Court recognized that just because your phoneconversations pass through the phone company does not mean that you have

    tnay be in conflict, especially when one considers the narrow minds of some drafters, such as themen who amended the Civil Rights Act of 1964 to limit discrimination on the basis of sex in thehopes that the societal norm of discrimination against women would make this a poison pill to sinkthe bi l l , I would be surprised, however, i f some of those who rat ified the Fourth Am endm ent didnot intend or hope i t would protect against unreasonable searches and seizures, no matter whetherthe searchers were employed by the Bri t ish Crown or the chartered East India Trading Company,although the conventional wisdom is that the Bill of Rights was intended to constrain only thefederal govemment, not private part ies. See Jack Goldsmith & Daryl Levinson, Law for States:International Law, Constitutional Law, Public Law, 122 HARV, L, REV, 179 1, 1853 (200 9) ("M any

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    7/51

    2010] The Right to Privacy in Light of Pres iden ts' Program s 1861

    waived any privacy rights against the govem ment listening to them.' '' But,the Court subsequently ruled that the telephone toll information, meaning thenumbers dialed and kept as part of a phone bill, are not subject to the warrantrequirement on the grounds that there is no cognizable constitutional privacyinterest in numbers dialed.^^ The Court's view was rejected in part byCongress which passed rules goveming the use of "trap and trace" devicesand pen registers as well as other transactional data albeit at a lowerstandard.^^ And, recently, a federal court hand-p icked by the Ch ief Justice ofthe Supreme Court has permitted Americans' conversations to be collectedby the govemment without a warrant, based on a "reasonableness" theory.^^These mlings, some incorrect in my view, are discussed below.B. Two ofthe Views ofthe Fourth Am endment an d Electronic Surveillance:

    Warrants Versus ReasonablenessL Warrants to Protect Against "the U ninvited Ear. "Almost acentury ago, before telephones were a widely available communicationnecessity, a narrow-minded majority of the Supreme Court ruled that theFourth Amendment's protections for "persons, houses, papers, and effects"was not intended to give any protection to an American's phone calls fromwarran tless eavesdropping.' ^ It was not until 1967 that the Supreme Court,

    24, Se e id. at 352 ("One w ho occupies [a telephone booth], shuts the door behind him, and paysthe toll that permits him to place a call is surely entitled to assume that the words he utters into themouthpiece will not be broadcast to the world,"),25, Smith V, Maryland, 442 U,S, 735, 742 (1979),26, See Electronic Communications Privacy Act of 1986, Pub, L, No, 99-508, 100 Stat, 1868(codified as amended at 18 U,S,C, 3121 (2006)) (requiring w arrants for pen registers and traceand trap devices); Froomkin, supra note 3, at 1522 (discussing the small number of statutes thatplace limits on the distribution of "transactional data" including the Fair Credit Reporting Act andthe Cable Com munications Privacy Act),27, Se e infra section I(B)(2),28, Olmstead v. United States, 277 U,S, 438 (1928), In this pernicious decision from theprohibition era. Chief Justice William H, Taft argued that phone calls did not deserve the sameprotection as sealed letters under the Fourth Amendment, asserting:The amendment does not forbid what was done here: There was no searching. Therewas no seizure. The evidence was secured by the use ofthe sense of hearing and thatonly. There was no entry ofthe houses or offices o fthe defendants. By the inventionof the telephone 50 years ago, and its applieatiori for the purpose of extendingcomm unications, one can talk with another at a far distant place. The language of the

    amendment cannot be extended and expanded to include telephone wires, reaching tothe whole world from the defendant's house or office. The intervening wires are notpart of his house or office, any more than are the highways along whieh they are

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    8/51

    1862 Texas Law Review [Vol. 88:1855

    under the leadership of Chief Justice Earl Warren, corrected this severelycramped interpretation of the Fourth Amendment that had left Americans'telephone conversations constitutionally vulnerable to warrantlesssurveillance by the governm ent.^' In Katz v. United States^'^ the Court ruledthat the Fourth Amendment required the govemment to obtain a searchwarrant before wiretapping an Am erican's conversations.^' The Courtnoted that "[t]he premise that property interests control the right of theGovemment to search and seize has been discredited" and thus physicaltrespass was not required for a search to count under the Fourth Amendment;"[t]o read the Constitution more narrowly is to ignore the vital role that thepublic telephone has com e to play in private communication."^^

    Congress responded to the Supreme Co urt's Katz decision and Berger v.New York^^ decided the same term, by creating new rules to govern theissuance of warrants for electronic surveillance in the United States in theW iretap Act.^'' These new rules, how ever, included a statutory ca rve-outstating that "[njothing contained in this chapter or in section 605 of theCommunications Act of 1934 (48 Stat. 1143; 47 U.S.C. 605) shall limit theconstitutional power of the President . . . to obtain foreign intelligenceinformation deemed essential to the security of the Un ited ^

    LOY. L.A. L. REV. 2063, 2065 (2005) (putting Sealia in a group of neo-conservative thinkers); cfHarvery A. Silvergate & Philip G. Cormier, Old Wine in New B ottles: Cyberspace and the CriminalLaw, B. B. J., May/June 1997, at 12-13 (noting that, traditionally, computer communications havefrightened the "old order" and this partially caused the Supreme Court's slow recognition of theFourth Am endmen t's reach beyond physical papers and effects).29 . See Katz v. United States, 389 U.S. 347, 359 (1967) (holding that the surveillance inquestion did not pass the scrutiny required by the Fourth A mendment).30. Id .31 . Id . This case involved a challenge to govemment eavesdropping on a man m aking a call ina public phone booth, a device that now seems like little more than a quaint literary device to aid inthe transformation of Superman. The govemment argued that the defendant did not deserve privacyin this public space as he could be observed entering the booth, but the Court reasoned,[W]hat he sought to exclude when he entered the booth was not the intruding eyeitwas the uninvited ear. He did not shed his right to do so simply because he made hiscalls from a place where he might be seen. No less than an individual in a businessoffice, in a friend's apartment, or in a taxicab, a person in a telephone booth may relyupon the protection of the Fourth Amendment. One who occupies it, shuts the doorbehind him, and pays the toll that permits him to place a call is surely entitled toassume that the words he utters into the mouthpiece w ill not be broadcast to the world.

    Id . at 352 (intemal citations om itted). In so reasoning, the Court overruled Olmstead's deeplyflawed analysis.

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    9/51

    2010] The Right to Privacy in Light of Presidents ' Program s 1863

    According to the declassified McMillan Memo (the Justice Department's1976 intemal memoranda on the MINARET program), in order to "assurethat NSA's operations would not be affected by the legislation, NSA GeneralCounsel participated in the drafting of 18 U.S.C. 2511(3), which wasincorporated" in the 1968 Act.^*Secretly, after the Wiretap Act passed, the NSA General Counselreported internally that the effect of this "presidential exception" was "toremove any doubt as to the legality of the SIGINT and COMSEC activitiesof the Executive Branch of the Government :""[The language] preclude[d] an interpretation that the prohibitionsagainst wiretapping or electronic surveillance techniques in other lawapplies to SIGINT and COMSEC activities of the federal government.Wiretapping and electronic surveillance techniques, are, therefore,legally recognized as means for the federal govemment to acquireforeign intelligence information and to monitor U.S. classifiedcommunications to assess their protection against exploitation byforeign intelligence activities.^^This exemption from the Wiretap Act was subsequently repealed byF IS A ." The N SA 's involvement in drafting the exemption is not generally

    known, and it was not public at the time that the Supreme Court took up acase challenging the Nixon Administration's warrantless wiretapping ofAmericans under a claim of national security necessity, before FISA wasenac ted o r even envisioned.'*"

    [n]othing contained in this chapter, or section 605 of the Communications Act of 1934,shall be deemed to affect the acquisition by the United States Govemment of foreignintelligence infonnation fro m intemationai or foreign communications by means otherthan electronic surveillance , , , and procedures in this chapter and the ForeignIntelligence Surveillance Act of 1978 shall be the exclusive means by which electronicsurveillance , ,, and the interception of domestic wire and oral communications may beconducted,

    36, MCMILLAN, ,sMpra note 13, at 85,37, Id . COMSEC, as distinct from SIGINT, refers to communications security to protectinformation transmitted by the Department of Defense via special equipment or encryption. SeeJames E, Meason, Military Intelligence and the American Citizen, 12 HARV, J, L, & PUB, POL'Y

    541, 542 n,3, 549 n,37 (1989) (denning SIGINT as the intelligence discipline focusing oninterception, processing, and analysis of intercepted-signals information and COMSEC as the NSAprogram aimed at preventing unauthorized access, disclosure, acquisition, manipulation,modification, or loss of key govemment information while it is being transmitted),38, MCMILLAN, supra note 13, at 85, The McMillan Memo also notes that: "NSA Counselsought, in his initially proposed draft of U,S,C, 2511(3), to insure that no information obtained in

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    10/51

    1864 Texas Law Review [Vol. 88:1855

    In that decision, known as the Keith case. President Nixon's AttomeyGeneral John Mitchell had authorized warrantless wiretaps under anotherexception written into 2511(3) ofthe Wiretap Act: nothing in this Act shall"limit the constitutional power of the President to take such measures as hedeems necessary to protect the United States against the overthrow of theGovemment by force or other unlawful means, or against any other clear andpresent danger to the structure or existence of the Go vernm ent."'" TheSupreme Court unanimously ruled that this provision was unconstitutionaland reaffirmed the vitality ofthe warrant clause, stating:Though the Fourth Amendment speaks broadly of "unreasonablesearches and seizures," the definition of "reasonableness" tums, atleast in part, on the more specific commands of the warrant clause.Some have argued that "[t]he relevant test is not whether it isreasonable to procure a search warrant, but whether the search wasreasonable." This view, however, overlooks the second clause of theAmendment. The warrant clause of the Fourth Amendment is notdead language."*^Specifically, the Court declared that "Fourth Amendment freedoms

    cannot properly be guaranteed if domestic security surveillances may beconduc ted solely within the discretion oft he Executive Branch."'' The Courtadded that "[t]he Fourth Amendment does not contemplate the executiveofficers of Govem ment as neutral and disinterested m a g is tr a te s. .. . Thehistorical judgment, which the Fourth Amendment accepts, is thatunreviewed executive discretion may yield too readily to pressures to obtainincriminating evidence and overlook potential invasions of privacy andpro tected speech."'"* ,The Court did note that the question of foreign intelligence

    surveillancethe other part o fth e old 2511(3) as opposed to the dom esticnational security surveillance was not at issue in that case.'*' That is, therewas no demonstration of collaboration between foreign powers and theAm ericans who were subject to warrantless wiretaps.''* This obse rvationthis dictahas been relied on by some to suggest that the Court would nothave required a warrant had a case involving foreign intelligence come

    41 , Wiretap Act 2511(3),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    11/51

    2010] The Right to Privacy inLight ofPresidents ' Program s 1865

    before it."*^ But, it is not unusual for the Court to indicate what it is not rulingon, which is bydefinition not a ruling.''^In fact, other declassified materials from the era indicate that a keyreason the Ford Administration decided to negotiate with Congress aboutFISA was its fear of a broad Supreme Court ruling in favor of warrants forforeign intelligence gathering that intercepts Americans' communications.This concem likely arose from Keith's reasoning that Americans' FourthAmendment freedoms cannot be guaranteed if surveillance was conductedsolely within the discretion of the Executive Branch. And the FordAdministration had much to fear on this point because in the six yearsbetween the Court's ruling in the Keith case and the passage of FISA,Congress had conducted extensive investigations into foreign intelligencesurveillance practices and documented innumerable violations of Americans 'r ights. ' 'Indeed, shortly before FISA was passed, the D.C. Circuit, sitting enbane, ruled in favor of a w arrant requirement in a case involving warrantlesssurveillance based on a foreign intelligence rationale.^" That case , theZweibon case, has been treated by proponents of warrantless surveillance asthe outlier in requiring a warrant for foreign intelligence-related surveillancethat involves Americans, but that view ignores the history of the situation.The Zweibon case's historical context is very relevantthe decision wasissued in June 1975, after Seymour Hersh's front-page New York Times storyexposing Project MINARET's extensive govemment spying on Americans.^'And the decision was issued after the Senate had authorized a specialcommittee led by Republican Frank Church to investigate these revelationsand the CIA's other secret activities known as "the family jewels."^^ Starting

    47, See, e.g.. United States v, Truong Dinh H ung, 629 F,2d 908, 913 (4th Cir, 1980) (assertingthat "[t]he needs of the executive are so compelling in the area of foreign intelligence, unlike thearea of domestic security, that a uniform warrant requirement would, following Keith, 'undulyfrustrate' the President in carrying out his foreign affairs responsibilities,"),48, See Hanzen Paper Co, v. Biggins, 507 U,S, 604, 609-10 (1993) (noting that the Court wasnot deciding based on whether a disparate impact theory of liability is available under the ADEA);Humphrey's Executor v. United States, 295 U,S, 602, 627 (1935) (reasoning that dicta may befollowed, but is not binding),49, .See, e.g., MCMILLAN, ,5u/7ra note 13 (compiling "fmdings with respect to CIA electronicsurveillance activities"),50, See Zweibon v, Mitchell, 516 F,2d 594, 614 (D,C, Cir, 1975) (plurality opinion) (holdingthat a warrant must be obtained if the subject of surveillance is neither an agent of nor acting incollaboration with a foreign power),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    12/51

    1866 Texas Law Review [Vol. 88:1855

    in January 1975, the Church Committee "interviewed over 800 officials, held250 executive and 21 public hearings, probing widespread intelligenceabuses by the CIA, FBI and NSA"^^ during the first nine months of 1975,after discovering that the secret agency called NSA even existed.Despite Zweibon, opponents of a warrant requirement claim theirposition is supported by two other cases. United States v. Butenko^'^ andUnited States v. Brown.^^ However, not only did these cases merely followthe dicta in Keith, but, more importantly, the decisions predate SeymourHersh's MINARET expos and the Church Committee's investigations

    demonstrating how foreign intelligence gathering had been used to violatethe privacy rights of countless A mericans. To rely on those cases is to ignorethe historical context almost entirely. W arrant opponents also point toUnited States v. Truong Dinh Hung,^^ which, despite being issued after FISAcodified a warrant requirement in foreign intelligence electronic surveillanceon these shores, incoherently suggested that a warrant was not required. Inany case, under the facts in Truong which occurred before FISA was passed,a determination of individualized probable cause was made by the AttomeyGeneral as a predicate to the electronic surveillance, not a free-floatinggeneral claim of reasonableness when gathering foreign intelligence.Although FISA's passage pretermitted a Supreme Court ruling on thewarrant requirement, I believe the Court would likely have issued a rulingconsistent with Zweibon. This appears especially likely because the ChurchCommittee's revelations demonstrated that the reasoning in Keiththat theFourth Amendment could not be enforced if left solely to the ExecutiveBranch had been vindicated, as it were, by the Church investigation. And,because the only new member of the Court between the Keith case and thepassage of FISA was Justice John Paul Stevens, " it seems unlikely that acourt constituted of nearly the same panel as Keith, post-Church, wouldchange course and accept a blanket foreign intelligence carve out. I thinkthis is a much truer picture ofthe lay ofthe land in the mid- to late-1970s.But for Congress's intervention in passing FISA to mandate warrants forboth targeted and untargeted electronic surveillance of Americans on theseshores, the Court would likely have reached a similar result to Keith forforeign intelligence gathering that affects Americans.

    Family Jewels, http://w\vw,gwu,edu/~nsarchiv/NSAEBB/NSA EBB222/index,htm (providing access

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    13/51

    2010] The Right to Privacy in Light of Pre siden ts' Program s 1867

    2. The Persistence of the "Reasonableness " Argument.Still, somehave tried to ignore Zweibon and the historical momentum to insist that thereasonableness, not a warrant requirement, must be the operative standard inthe foreign intelligen ce area.^^ Two main cases issued within the context ofFISA, as opposed to Truong, Brown, and Butenko, have either referenced ortaken this position. These decisions were made by three-judge panels hand-picked by Chief Justices Rehnquist or Roberts;^^ they included only judgesappointed to the federal bench by Republican presidents;*" and they heardoral argum ent only from the Execu tive Branch.*' It is very difficult toconsider these rulings to be fair in any traditional sense of the word.In the 2002 decision. In re Sealed Case^^ the Court of Review issued aper curiam opinion described by John Yoo*^ as plainly written by the judgefor whom he clerked. Judge Laurence S ilberman . This case was the veryfirst appeal ever from a decision of the FISA Court and under that court'sprocedures only the Govemment had the power to appeal because it was theonly party to even know how the FISA Court ruled and on what basis.^''The USA PATRIOT Act had changed the statutory standard in 2001 topermit FISA warrants even if the primary purpose of an intelligenceinvestigation into someone in the United States was for criminalprosecution.*^ In 2002, the Justice Departmen t issued rules on how to hand lethe change in this standard from a requirement that foreign intelligence be"the purpose" of the surveillance to the new requirement that it only be "asignificant purpose,"** meaning that prosecution could be the dominantpurpo se, with a foreign intelligence hook. The FISA lower court ruledagainst these new rules in part because of the different standards, in someregards, for probable cause under FISA versus the criminal code (which

    58 . See, e.g.. In re Sealed Case, 310 F.3d 717, 741-42 (FISA Ct. Rev. 2002) (emphasizing theitnportanee of the reasonableness standard and downplaying the importance of Zweibon); U.S. v.Bin Laden 126 F. Supp. 2d 264, 277, 284-85 (S.D.N.Y. 2000) (highlighting reasonableness asparamount in determining the constitutionality of foreign intelligence activity).59 . See Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 103, 92 Stat.1783, 1788 (codified at 50 U.S.C. 1803 (2006)) ("The Chief Justice shall publicly designate threejudges. . .from the United States district courts or courts of appeals who together shall havejurisdiction to review denial of any application made under this act.").60. Bob Egelko, War on Terrorism: Legal Affairs: Spy C ourt to Review Prosecutors ' Powers;Ashcroft 's Appeal forLooser RulesGoes to Panel, S.F. CHRON., Sept. 1, 2002, at A 3.61 . See FISA Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat. 2436, 2452 (to be

    codified in scattered sections of 50 U.S.C.) ("The Government may file a petition with the ForeignIntelligence Surveillance Court of Review for review of an order. . . .") (emphasis added); In re

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    14/51

    1868. Texas Law Review [Vol. 88 :18 55

    might permit anend run around traditional probable cause).*^ The FISACourt of Review took up this case at the request of the Justice Department.*^The Bush Administration inessence had changed the FISA rules basedupon Yoo's secret 2001 OLC analysis, where he asserted that theadministration was free to lower the standard for intelligence collection,despite the mandate of statute. How ever, Y oo 's analysis went beyond asimple determination of the administration's ability to bypass or alter FISA'srequirements, and, under an expansive recasting of the Fourth Amendment,argued that the President did not really need to go through FISA's warrantrequirements at all, and could even conduct awarrantless search as long as itwas "reasonable."*' Yoo wrote that "a warrantless search can beconstitutional 'when special needs, beyond the normal need of lawenforcement, make the warrant and probable-cause requirementimpracticable." (Subsequently, Y oo 's analysis of the requirements of FISAand the notion of unlimited executive power with regard to the PP wasconsidered so severely flawed that it had to be withdrawn by the JusticeDepartment.^' The Bush White House's insistence onfollowing his analysisof the PP's legality even after serious intemal legal questions were raisedabout it almost provoked the resignation of the Acting Attomey General,

    James Comey, and others.)^^ At the time of the one-sided oral argument tothe FISA Court of Review in 2002, however, these problems were notknown. And it seems likely not all of the govemment attomeys involved inthe appeal over the Patriot Act amendments to FISA knew in2002 that Yoohad secretly taken aHamiltonian, king-like, view of executive pow er and had"authorized" activities, on behalf of O LC and the Justice Department, outsideof FISA's exclusive procedures based on results-oriented rationales thatminimized statutory requirements and anycase law to the contrary. At least

    67 , See In re Sealed Case, 310 F,3d at 737 ("The FISA court expressed concem that unlessFISA were 'construed' in the fashion that it did, the govemment could use a FISA order as animproper substitute for an ordinary criminal warrant under Title III,"),68 , See Alison Buxton, Inre Sealed Case,- Security and th e Culture of Distrust, 29 OKLA, CITY,U, L, REV, 917, 922 (2004) ("The Justice Department appealed two FISA Court orders authorizingelectronic surveillance on the ground that the court improperly imposed restrictions on thegovem ment's foreign-intelligence gathering procedures,"),69, See SHANE HARRIS, THE WATCHERS: THE RISE OF AMERICA'S SURVEILLANCE STATE167 -69 (2010) (discussing how Y oo went beyond the question posed and tried toequate warrantless

    wiretapping of Americans with aschool district's random drug testing),70, Id71, OF

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    15/51

    2010] The Right to Privacy in Light of Presidents ' Program s 1869

    two of the men in the room at the oral argument did know the administrationhad concluded it was not even bound by FISA's legal requirements: JohnYoo and Chen ey's right-hand man, David Add ington. And, at that argum ent,Solicitor General Ted Olson argued, among other things, that warrants werenot required for foreign intelligence gathering, despite FISA's command,even though that was not germ ane to the issues in the case. ^Judge Silberman took the lead in oral argument in this case and,according to Yoo, the opinion was written in his voice; it included dictarecasting legal history and arguing that a reasonableness test should govemthis area, not warrants. At the one-sided oral argum ent. Judge Silberman

    argued that the constitutional test was reasonableness, not a warrant, and "thekey to the reasonableness of any search is the exterior threat," which is notwhat Congress determined in FISA nor what the DC Circuit (the court towhich President Reagan appointed him) had last ruled on this issue inZweibon nor even how a reasonable search had been evaluated generally inother cases (with reference to one's reasonable expectations of privacy).^"*Judge Silberman practically led DOJ at the argument suggesting "[t]here aretwo w ays to look at this. One can say this is not covered by the Con stitutionaltogether because it' s inherent executive power. The second way is to say,well, it's a reasonable search because the threat is so great even if it wasconstitutionally covered."^^ Rem ember, this was the very first decision toever be issued by the FISA Court of Review.'*

    These may seem like unusual positions for a jud ge to take sitting on apanel given authority to handle appeals arising from the very statute JudgeSilberman was arguing for eviscerating. However,- it must be noted thatJudge Silberman was handpicked for this special court by Chief JusticeRehnquist, whose record demonstrated significant hostility to civil liberties.And Judge Silberman had a particularly unusual distinctionhe had actuallytestified against the passage of FISA, arguing that warrants should not be

    73, Id .74, See U,S, v, Belfield, 692 F,2d 141, 145 n,15 (D,C, Cir, 1982) (noting that in a prior D,C,Cireuit decision "the plurality suggested in dicta that [warrantless surveillance of Americans togather foreign intelligence] might be unconstitutional"); Transcript of Hearing at 73, In re SealedCase, 310 F,3d 717 (FISA Ct, Rev, 2002) (No, 02-001) available at http://w2,eff,org/Privacy/Surveillance/FISCR/20030128-fiscr-transcript,pdf; see also 50 U,S,C, 1804 (1978) (amended2008) (requiring that a federal officer receive approval from both the Attomey General and aForeign Intelligence Surveillance judge before he can obtain a court order authorizing foreignintelligenee electronic surveillanc e);,75, Transcript of Hearing, supra note 78, at 73 -74 ,

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    16/51

    1870 Texas Law Review [Vol. 88:1855

    required and that the courts were not fit to adjudicate cases involving foreignintelligence.^^ To suggest that he and two other Reagan appointees go t theFourth Amendment analysis right in this case's dicta is more than I cancountenance. (Judge Silberman, by the way, was subsequently aw arded thePresidential Medal of Honor by President George W . B ush in 2008^^ (thejudge had also been appointed by Bush to serve on the Robb Commission)).The second major case^" in which reasonableness was discussed, and theonly other decision ever issued by the FISA Court of Review, arose in achallenge by an Intemet service provider (ISP) to directives issued by thegovemment pursuant to the 2008 FISA Am endments Act.^' Theseamendments undermined the warrant requirements for electronic surveillanceon these shores that had been FISA 's raison d'tre.^^ This case againinvolved a special appellate review panel made up entirely by judges put onthe federal bench by Republican presidents.^^ This panel was not random lychosen as is the case in other intermediate appellate bodies in the Article IIIfederal court system;^"* this panel was handpicked by the right-wing Chief

    77, SeeForeign Intelligence Electronic Surveillance: Hearings Before theSubcomm. onLegislation of the Permanent Select Comm. on Intelligence, 95th Cong, 217 (1978) (statement ofLaurence Silberman), available at http://www,cnss,org/fisa011078,pdf (declaring that FISA was"an enormous and fundamental mistake which the Congress and the American people would havereason to regret"),78, James Gerstenzang, Silberman, Pace Receive Bush Awards, L,A, TIMES, June 12, 2008,atA16,79, See STEPHANIE SMITH, CONG, RESEARCH SERV,, COMMISSION ON THE INTELLIGENCE

    CAPABILITIES OF THE UNITED STATES REGARDING WEAPONS OF MASS DESTRUCTION:ESTABLISHMENT AND COMPOSITION 4 (2006) (naming Judge Laurence H, Silberman as co-chairperson of the commission),80, In re Directives Pursuant to Section 105B of the Foreign Intelligence Surveillance Act {Inre Directives), 551 F,3d 1004 (FISA Ct, Rev, 2008),81, FISA Amendments Act of 2008, Pub, L, No, 110-261, 122 Stat, 2436 (to be codified inscattered sections of 50 U,S,C,),82, See In re Directives, 551 F,3d at 1006 ("Subject to certain conditions, the [amendments]allowed the govemment to conduct warrantless foreign intelligence surveillance on targets(including United States persons) 'reasonably believed' tobe located outside the United States,"(citation omitted)),83, The special appellate review panel consisted of Chief Judge Selya and Senior Circuit JudgesArnold and Winter, Lyle Denniston, Intelligence Wiretap Power Upheld, SCOTUSBLOG (Jan, 15,2009, 21:38 EST), http://www,scotusblog,com. Chief Judge Selya was nominated by PresidentRonald Reagan to the First Circuit, Federal Judicial Center, Biographical Directory of Federal

    Judges: Selya, Bruce Marshall, http://www,fjc,gov/servlet/nGetInfo?jid=2140&cid=999&ctype=na&instate=na. Senior Circuit Judge Arnold was nominated to the Eighth Circuit byPresident

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    17/51

    2010] The Right to Privacy in Light of Pres iden ts' Program s 1871

    Justices of the U.S. Supreme Court, John Roberts and his predecessorRehnquist.^^ In fact, the FISA Court of Review is the only court in thehistory of the United States, it seems, that has been constituted entirely ofjudges appointed to the federal bench by a single political party, at leastaccording to the public record, since its statutory creation in 1978 over threedecades ago. That should give anyone pause.Setting this unusual p artisan distinction for a judicia l body aside, theFISA Court of Review upheld a directive issued to an ISP that argued thatthere was no foreign intelligence exception to the warrant requirement in achallenge to new powers granted by the FISA Amendments Act (FAA).^^The FISA Court of Review, however, bootstrapped such a requirement intoits decisions in part through reliance on Judge Silberman's dictaeventhough the panel acknowledged that the 2002 decision did not so rulestating that the interpretation of the decision as implicitly recognizing suchan excep tion was "plausible."^^The appellate panel then drew a parallel to the so-called special needscases (cases from the Rehnquist Court upholding random drug testing ofminors and railway workers), outside the foreign intelligence context, asdemonstrating rationales for searches to be govemed by reasonableness, not

    warrants.^^ Then , in applying a reasonab leness test, the panel found thatnational security is of the "highest o rder of magnitude."^^ It also dismissedthe idea that probable cause, prior judicial review, and particularity wereessential to determining whether a search is reasonable, and also discountedthe individualized determination that was central in the Truong case.^"Instead, the panel found that the matrix of the FAA rules^broad targetingprocedures, minimization procedures, the requirement that a significantpurpose of the collection be to gather foreign intelligence, intemal miesrelating the Executive Order 12333 and other classified informationaddedup to satisfying a Fourth Amendment reasonableness test as reconceived bythe Court of Review.^' The panel refused to entertain a facial challenge to

    85, See supra note 5,86, See In re Directives, 551 F,3d at 1011, 1012, 1010-12 (rejecting the ISP petitioner'sargument that there is no foreign intelligence warrant exception by stating "[t]hat dog will nothunt," and holding that such an exception exists "when surveillance is conducted to obtain foreignintelligence for national security purposes and is directed against foreign powers or agents offoreign powers reasonably believed to be located outside the United States"),87, See id. at 1010 ("While the Sealed Ca^e court avoided an express holding that a foreignintelligence exception exists by assuming arguendo that whether or not the warrant requirementswere met, the statute could survive on reasonableness grounds, we believe that the FISC's reading

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    18/51

    1872 Texas Law Review [Vol. 88:1855

    the FAA , rejected an "as-applied" challenge, and, behaving ostrich-like in theface of the great weight of history showing that such powers could beabused, refiised to consider any possibility of bad faith.'.^The result in the FAA challenge demonstrates the inherent flaw in thereasonableness "test." In the national security area, the test is we ightedalmost entirely in the government's favor and constitutes deference towhatever procedures the govemment chooses, even if they are nothing likewhat would be required by a warrant. This renders them, as a practicalmatter, almost impossible to successfiilly challenge, even if in other settings

    the government had not assiduously asserted that the overgrown judicialfiction of "state secrets" was an impediment to an adjudication on the meritsof challenges to these policies by civil liberties and privacy groups and thecitizens they represent. Given the expanse of time since the Keith case andthe right-wing revolution in Supreme Court interpretation since then,however, it is perhaps not unpredictable that such a one-sided judicial panelwould issue such a far-reaching ruling and never question whether such aspecially constituted panel as themselves had the constitutional authority todo so.I do think it fair to say that the Fourth Amendment has been under legalassault for much of the period since KeithP The bottom line is thatRepublican presidents appointed eleven Supreme Court Justices in a row(and the bulk of lower court judges),'" and the elections that led to theseappointments had all included "law and order" campaigns.'^ It was nosurprise that these judicial appointees embraced the erosion of many rights.'*What emerged from the counterrevolution on the Court over the lastthree decades has been a brick-by-brick curtailing of the domain of warrantsprimarily through limiting them to wiretaps of conversations or searches of

    hom es and a few other situations, subject to a variety of excep tions. An d,what was not covered by the warrant requirement was either written out of

    92. W. at 1014-15.93 . See supra text accompanying notes 57-59, 61-63 (summarizing cases that have narrowedthe central holding of Keith).94. Se e David A. Strauss & Cass R. Sunstein, The Senate, the Constitution, and theConfirmation Process, 101 YALE L.J. 1491, 1506 (1992) (noting that Republican Presidents hadeleven consecutive appointments to the Supreme Court).95. Se e Barry C. Feld, The Transformation of the Juvenile Court Part II: Race and the "CrackDown" on Youth Crime, 84 MINN. L. REV. 327, 340-50 (1999) (describing the general trend ofRepublicans to run law and order campaigns between the 1960s and 1980s).

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    19/51

    2010] The Right to Privacy in Light of Pre sidents' Program s 1873

    the Fourth Amendment's scope or govemed by whether a majority of theCourt believed the person challenging the search had a "reasonableexpectation of privacy" under the Amendment or, as articulated in the secondFISA Court of Review decision, whether the govemment's intemalprocedures for warrantless access to the contents of Americancomm unications w ere reasonable when m easured against a paramoun t threat.Now, with this foundation of the development or devolution of the caselaw, let us tum back to Project MINARET to see what light it sheds on thecurrent issues at stake.II. What Project MINARET's Watch-Listing of Americans Reveals AboutPast (and Present) An alysis of "Incidentally" Intercepted Conversations

    As noted above, in December 1974, the New York Times published afront-page story by Seymour Hersh with the headline "Huge C.I.A.Operation Reported in U.S. Against Anti-War Forces," alleging that theNixon Administration had been engaged in a program to spy on Americans'com mun ications, shocking Congress and the Am erican people.'^ Threedecades and a year later almost to the day, the New York Times published asimilar story, "Bush Lets U.S. Spy on Callers Without Courts," alleging thatthe Bush Administration was spying on American communications despitethe legal reforms and warrant requirements Congress had passed in FISA.'^These reforms had been relied upon by the American people, in the wake ofsurveillance activities revealed by Hersh and the Church Committee. But,the parallels do not begin or end with the headlines.

    There w ere also calls for criminal prosecution of CIA officers as a resultof their involvement in spying on Americans' communications and otherexcesses under the guise of national security or foreign policy needs.^'Similarly, many voices have called for criminal investigations, withsubpoena power, to examine key decisions made within the BushAdministration regarding not just surveillance activities affecting Americansbut also the torture of foreign suspects, among other highly controversialactivities. ""'And, in another parallel, the Justice Department officials in thesucceeding administrationsthose of President Gerald Ford and PresidentBarack Obam a declined prosec ution."" But, as interesting and troubling as

    97, Hersh, supra note 53, at 1,98, James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Ca llers Without Courts, N,Y, TIMES,

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    20/51

    1874 Texas Law Review [Vol. 88:1855

    these parallels are, I think the more surprising element is what a closeexamination of the declassified Ford-era memo reveals about pastsurveillance and what that means for the present, particularly because itcontains little-noticed descriptions of the technology of surveillance that bearon the most recent debates about Am ericans' comm unications and p rivacy.A . The Danger to Privacy and Liberty of Dividing the World ofComm unications in Two, Within and W ithout the U nited States

    Twenty-four years ago, Dougald McMillan wrote a secret JusticeDepartment report declining to prosecute officers at the CIA for their role inthe electronic surveillance of Americans' intemational communications aspart of President Richard M. Nixon's Project MINARET that Hersh hadrevealed.'"^ That program involved a presidential directive to the NS A to usewatch lists to search through the pool of information it was collecting as partof its SIGINT operations,'"^ which were focused on intemationalcommunications that were plucked from the sky via radio signals andreceivers as well as communications that were gathered via OperationS H A M R O C K ' S program of acquiring almost all intemational telegrams intoor out ofthe United States and analyzing them.'""*As detailed below, the NSA had divided the world in two in terms ofelectronic communications, which basically distinguished betweencommunications with at least one foreign terminal and communications thatdid not have at least one end outside the United S tates.'"^ This simple butfalse duality had the effect of treating Americans' personal intemationalcommunications the same as purely foreign intemational communicationsthat were not between Americans, at least at the point of acquisition andostensibly for the purpose of analysis.

    I think the better legal analysis would have been three categories ofcommunications: Americans' domestic communications, Americans'intemational communications, and communications not involvingAm ericans. This could have been reduced to a dualism: com mu nicationsinitiated or intended to be received by a person in the United States and allother communications as a legal matter, setting aside the technology.Since that time, the NSA and its lobbyists and proxies have made adramatic shift, based in part on the rise of the Intemet and based in part ondesire, that the world should no longer be divided in two (domestic and not

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    21/51

    2010] The Right to Privacy in Light of Pre sidents' Program s 1875

    purely d om estic), at least at the point of acquisition.'^ And, part of theirclaim was also grounded in the implicit argument that once the congressionalinvestigations ended and the dust settled in 1978, the NSA went hack to itsbusiness of using its big ears to acquire and analyze the intemationalcommunications of Americans via satellites that received radio signals.In the aftermath of the 2005 New York Times story, the Administrationfloated a bunch of legal rationales and policy argum ents for the P P .'" ' It thendecided to play offense and argue in essence that what had been done wasalways permitted, or at least intended to be permitted. It also argued that theadvent of the Intemet, with its reliance on digital communications(optical/light rather than radio wave), had rendered the agency nearly deafand so the law needed to be "modemized" to fix that.'^The first argument is difficult to square, however, with the idea thatsomething did change in the acquisition and analysis policies that did resultin President Bush issuing new "d irectives" to the NSA related to Am ericans.These directives pertained not just to the claim if al Qaeda calls you, we w antto know why . They also applied to some aspects affecting A m erica ns'communications that were so new and worrisome, and on such flimsy legalfooting, that the acting Attomey General and the Director of the FederalBureau of Investigation in the Bush Administration almost resigned when theBush Administration attempted to proceed over new Justice Departmentobjections.'"'It is also quite apparent from looking at the scope of the FISAAmendments Act that, as a statutory matter, the scope of the newsurveillance authority is about much more than al Qaeda and gives the NSAmuch more authority than it had under what Ben Powell, General Counsel tothe Director of National Intelligence, dubbed "classic FIS A ."" And, I

    106, See, e.g., Charlie Savage & James Risen, Bush-era Wiretapping Program Is Ruled Illegal;Judge Rejects 'State Secrets' Argument, BOSTON GLOBE, Apr, 1, 2010, http://www ,boston,com /news/nation/washington/articles/2010/04/01 /bush_era_wiretapping_program_is_ruled_illegal(explaining that the NSA defended its surveillance of domestic communications on the grounds thatthe President's pow ers pennit overriding FISA),107, See Risen & Lichtblau, supra note 103 (recounting some of President Bush'sconstitutional, legislative, and policy rationales for the PP),108, See id. ("[T]he existing Foreign Intelligence Surveillance Act was not written for an age ofmodem terrorism,"),109, See Joel K, Goldstein, The Contemporary Presidency: Cheney, Vice Presidential Powerand the War on Terror, 40 PRESIDENTIAL STUD, Q, 102, 118 (2010) (detailing meetings with JamesComey, acting Attomey General, and Robert Mueller, FBI director, after teaming of massive

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    22/51

    1876 Texas Law Review [Vol. 88:1855

    believe it gives the NSA a scale of access, or potential access, to Americancommunications that absolutely dwarfs what was available for analysis underProject MINA RE T, especially with the advent ofthe Intemet. Accordingly, Ibelieve we need much better protections for the freedoms of individualAmericans now that the world of communication at the point of acquisition isno longer divided in two. Let us test this hypothes is./ . The Two Realms of Electronic Comm unications Under MINAR ET.The top secret McMillan Memo, which was subsequently declassified, hasnever been thoroughly (at least publicly) analyzed as part of an assessment ofthe claims made in the recent scandal involving a presidential directive to theNSA to search through pools of information it was previously acquiring ornewly acquiring with the assistance of telecom providers following 9/11.But that memo, taken at face value, illuminates recent claims about theN SA 's activities, technology, and mission vis--vis A mericans.

    a. Purely Dom estic Comm unications of Americans.During thatJustice Department inquiry into whether CIA agents should be prosecuted fortheir involvement in the warrantless acquisition of Americancomm unications, the NS A itself described the two realms of comm unicationsfrom its vantage point. One part was the dom estic com munications network,which the NSA described as "contiguous, switched (from wire to cable tomicrowave) automatic and self-routing. Its wireless component [was a multi-channel microwave carrier system capable of carrying up to 2,000comm unications on some ch an ne ls." '" From a layperson 's standpoint, whatthat means is that calls within the United States between people in the UnitedStates involved both wired communications (the telephone lines into ourhomes and businesses, and the cables strung by the side of the road) as wellas wireless communications (the beaming of communications from one partof a state to another or across the country, which was accomplished by radiowave relays). To put it more simply, most local calls were transmitted viawires and most long distance or toll calls were transmitted at least in part viaradio w aves.

    It may come as a surprise to some that wireless domesticcommunications were available in the now ancient seeming technology ofthe 1970s,"^ even though personal wireless phones did not take off until thelate 1980s or become a practical necessity until the first decade ofthe 21stcentury ."^ How ever, after the Supreme Co urt's decision in the Katz case,Americans believed the Constitution required a warrant to tap into their

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    23/51

    2010] The Right to Privacy in Light of Pre siden ts' Program s 1877

    phones, regardless of whether some part of their call trayeled via wire orradio signals.""*Indeed, to the ordinary person, the technology used for communicatingis largely separate from their liberty and privacy interests in thecom munication itself Regardless of wh ether they use a cell pho ne, landline,Skype, Instant Messaging, or e-mail, regular Americans assume that theircommunications with their friends, family, lovers, or colleagues areprivatewhether the communication is across town, the state, the nation, orthe globeand believe their government would not capture or analyze theircom munications un less a judge o rdered such surveillance based on themdoing something wrong. "^ Some may dispute whether such an expectationof privacy is reasonable, because radio signals and Intemet communicationsmay be receivable, but the question is not properly understood to be whetherthe govemment could intercept Americans' communications, but whether itwould intercept them without a warrant predicated on probable cause ofsuspected wrongdoing. The question, at its heart, is about the relationshipbetween the govemment and the govemed or, more properly, between thesovereign people and the govem men t that represents them.

    In the McMillan Memo, the NSA described its discretionary decision tofollow the "one-terminal mle" meaning that it voluntarily focused oncommunications in which at least one terminal to, or at the end of, thecom munications was outside the United S tates."^ That is, it had the capacityto capture all radio communications, including purely domesticcommunications, but it chose not to use some of this capacity based on itsdecision to adopt the one-terminal m le. This mle relates to its conception ofintemational com mu nications, as discussed below .

    b. "International" Com munications, Purely Foreign or Not.Thesecond realm, according to the NSA's description in the McMillan Memo,was the ''international commercial radio telephone communications [to be]transmitted by high-frequency, single or multi-channel telephony whichenters the national communications network through what are known as

    114. See Katz v. United S tates, 369 U.S. 347, 353 (1967) (holding that the Fourth Am endmentprotection from unreasonable search and seizure protects Americans in telephone booths fromwarrantless wiretaps); see also Deirdre Mulligan, Reasonable Expectations in ElectronicCommunications: A Critical Perspective on the Electronic Communications Privacy Act, 72 GEO.WASH. L. REV. 1557, 1578 (2004) (arguing that the holding in Smith v. Maryland, 442 U.S. 735

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    24/51

    1878 Texas Law Review [Vol. 88:1855

    'ga tew ay s.'"" ^ The NS A described these high-frequency radio signals aseasily interceptable by, for example, ship-to-shore radios or satellite."^According to the NSA, such multi-channel transmission could be interceptedwith radio receivers and "de-channelled," unless they were encoded by"ciphony equipment" to garble the communications; however, none of thecomm ercial com munications carriers used that technology even though somegovem ments did."^ This description certainly accounts for the N S A 's use ofsatellites and parabolic receivers to intercept these signals and de-channelthem to focus on particular channels, such as those used during the Cold Warby the Soviet Union. Under this rubric, A m ericans' intem ationaicommunications were just as vulnerable to acquisition as purely foreigncommunications involving foreign nationals abroad who do not have thesame constitutional rights and interests vis--vis the U.S. govemment.Nevertheless, this picture is incom plete in a variety of wa ys. Such adepiction does not account for the fact that many intemationaicom munications did not travel via high-frequency radio.'^ For example,intemationai telegrams, which straddled the historical space between mailedletters in sealed envelopes and e-mail, were called cables because they were

    transmitted via wire, not via high-frequency radio.'^'As the Church Committee revealed, however, the NSA had beenacquiring and analyzing virtually all intemationai telegrams to or fromAmerican residents and businesses for decades under the secret OperationSHA MR OC K program.'^^ Moreover, the description did not take intoaccount that the telephone companies relied on transatlantic and transpacificcables to transmit significant portions of Americans' intemationai calls toEurope and Asia (although communications to South America relied moreheavily on radio signals, transmitted via AT&T's satellites).'^-'Communications within the contiguous land of Europe and Asia, however,were much more similar to that of the domestic United States, with some

    117, Id . at 131,118, Id119, Id120, See A SHORT HISTORY OF SUBMARINE CABLES, http ://w ww ,iscp c,o rg/i nfo nn atio n/History_of_Cables,htm (noting the weaknesses of high-frequency radio in t ransmit t ing

    intemationally, including a limited capacity and the potential for atmospheric disruptions),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    25/51

    2010] The Right to Privacy in Light of Presiden ts' Programs 1879

    communications travelling via wire and some via radio waves, making someof them easily accessible to being captured and de-channeled by the '^'2. Using the Pool of International Communications IncidentallyCollected.The McMillan Memo makes clear that Project MINARETsought to exploit the NSA's technological capacity to obtain informationabout Americans via analyzing their intemational communications.'^^According to the NSA, "The primary sources [ofthe infonnation pool] were:(l)the NSA's interception of intemational commercial carrier (ILC) voiceand non-voice communications [clause redacted]'^* and (2) copies or tapes of

    intemational messages ftimished to NSA by U.S. commercialcommunications carriers in the Shamrock operation."'^^Elsewhere in the McMillan Memo the pool of communications wasdescribed as derived exclusively from these two means of interception: "allMINARET communications apparently had at least one terminal in a foreigncountry and, excluding SHAMROCK communications, were obtainedthrough the interception of radio portions of intemational communicationsfrom sites both within and without the Un ited States."' ^ To be clear, thisdescription does not mean that the NSA could access all intemational

    communications of Americans, but that all communications that wereaccessed had been obtained in one of these two ways.3. How that Pool Was Used by President Nixon.Just six months aftertaking office. President Nixon directed the NSA to use this pool to search forinformation on specific Americans, whom he and his allies in the ExecutiveBranch had placed on a watch list.'^' So there can be no ambiguity, here isthe precise way the NSA described the scope ofth e project:MINARET (C) is established for the purpose of providing morerestrictive control and security of sensitive infonnation derived fromcommunication as processed [redacted] which contain (a) information

    1 2 4 , See, e.g., MCMILLAN, supra note 13, at 130-31 (describing ho w phone calls weretransmitted circa the creation of FISA),1 2 5 , See id. at 26 (including "U,S, organizations or individuals engaged in activities whichmight result in civil disturbances or otherwise subvert the national security" and "[m]ilitarydeserters involved in the anti-war movement" in a list of MINARET's targets),1 2 6 , Elsewhere in the report this redacted clause is not redacted and is stated as "telex" whichwas basically a telegram that was transmitted not by wire or radio but by non-aural electronicpulses. See id. at 160 ("MINARET intelligence , , , was obtained incidentally in the course ofNSA's intereeption of aural and non-aural (e,g,, telex) intemational co mm unications, and the receipt

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    26/51

    1880 Texas Law Review [Vol. 88:1855

    on foreign govemments, organizations or individuals who areattempting to influence, coordinate or control U.S. organizations orindividuals who may foment civil disturbances or otherwiseundermine the national security of the U.S. (b) information on U.S.organizations or individuals who are engaged in activities which mayresult in civil disturbances or otherwise subvert the national securityof the U.S . An equally important aspect of MINARET will be torestrict the knowledge that such infonnation is being collected andprocessed by the National Security Agency. MINARET specificallyincludes communications concerning individuals or organizationsinvolved in civil disturbances, anti-war movements/demonstrationsand military deserters involved in anti-war movements. 'Congress discovered that, as a consequence of this directive, the NSAhad about 1,200 American names, mostly persons opposing the VietnamWar, on watch lists provided by other agencies,'^' such as the Bureau, whichwas then led by FBI Director J. Edgar Hoover.'^^ In its official findings.

    Congress noted that, for example, communications mentioning the wife of aU.S. Senator had been intercepted and disseminated by the NSA, as wereconversations about a concert for peace, a jou rna list's report from SoutheastAsia to his magazine in New York, and even a pro-war activist's invitationsto speakers at a rally.'^^But, Project MINARET's focus was later expanded by President Nixonand his men.' "* By the beginn ing of 1971 , it was described in an officialmemorandum between the Department of Defense and the Department ofJusticethe scope of the NSA's searching was to obtain "[i]ntelligencebearing on: (1) Criminal activity, including d rugs. (2) Foreign Support orforeign basing of subversive activity. (3) Presidential and relatedprotection."'^^ The most significant aspect of this expansion was in the areaof analyzing communications between the United States and South Americafor infonnation relating to President Nixon's war on drugs and drug abuse.'''*

    130, MCMILLAN, supra note 13, at 26,131, S, REP, NO , 94-755, at 746 ( 1976),132, Id133, Id . at 750,134, MCMILLAN, supra note 13, at 26-27,135, Memorandum to the Secretary of Defense, the Attomey General from Vice Admiral Noel

    Gayler, Director, National Security Ageney (Jan, 26, 1971), reprinted in Intelligence Activities:Hearings on S. Res. 21 Before the S. Select Comm . to Study Governmental Operations with Respect

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    27/51

    2010] The Right to Privacy in Light of Pre sidents' Program s 1881

    This nearly three-year aspect of the project involved "the interception ofhigh-frequency radio-telephone (commercially) voice communicationsbetween the United States and several South Am erican citi es ." '" TheChurch Committee found that almost 500 Americans were focused on as partofthe drug interdiction elements of this surveillance.'^^4. Rationalizing the Analysis of Am ericans' P rivate Calls.In 1972,the Supreme Court issued its landmark decision in the Keith case, holdingthat "Fourth Amendment -eedoms cannot properly be guaranteed ifdomestic surveillances may be conducted solely within the discretion of theExecutive Bra nch ."'^' But despite this declaration. Project M INA RE T'sanalysis of its pool of communications for information about Americans didnot cease. Even though President Nixon had directed the NS A to focus onAmericans protesting the war in Vietnam, the Nixon Administration did notorder the NSA to cease collecting or analyzing intelligence on Americans'dom estic activities in light of this Supreme C ourt decision. Instead, it askedthe NSA to stop disseminating the information it was analyzing to otheragencies.The NSA responded to even this limited request by asserting that thecollection and analysis was legitimate, despite the Supreme Court's ruling inKeith. Specifically, the Director of the NSA, General Lew Allen, Jr., toldPresident Nixon's Attomey General Elliot Richardson that it did not collectdomestic intelligence per se but that such information about Americans wassimply the "by-product" of its other communications collection activities.He added:No communications intercept activities have been conducted by NSA,and no cryptologie resources have been expended solely in order toacquire messages conceming names on the Watch Lists; thosemessages we acquire always are by-products of the foreigncommunications we intercept in the course of our legitimate and wellrecognized foreign intelligence activities,'''"Accordingly, he added "I believe that our current practice conforms toyour guidance that, 'relevant information acquired by you in the routine

    and described "Liddy's role: He is an expediter to breakdown bureaucratic problems by eithergrease or dynamite," Id . at 113, Liddy was later convicted for his role in the Nixon Com mittee toRe-Elect the President's efforts to break-in to Demoeratic Headquarters at the Watergate Hotel

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    28/51

    1882 Texas Law Review [Vol. 88:1855

    pursuit of the collection of foreign intelligence information may continue tobe fumished to appropriate govemment agencies.'"''"The agency also argued that communications that were obtained thatwere not relevant to the NSA's foreign intelligence gathering purposes werediscarded and that only relevant information was disseminated.'''^ Forexample, the agency emphasized that up to 97% of the intemationalcommunications that were analyzed by computer or by human analysts wasnot retained.'''^ However, even with this high rate of pruning (or, conversely,the low rate of "selecting out" communications of Americans), by the early1970s the NSA's analysts were reading over 150,000 telegrams to or fromAmericans each month under Operation SHAMROCK and analyzing anunrevealed quantity of radio communications of Americans that were"incidental" to the N SA 's o ther activities.''*'' That is, due to the volum e ofcommunications the NSA was searching through for foreign intelligenceinformation, even taking into account that only a small percent were read byNSA analysts, the effect was to intrude on the privacy of at least 100,000Americans a month (assuming conservatively that some sent more than onetelegram a month), or at least 1.2 million per yearand that was in the1970s, before the Intemet became widely used and Americans vastlyexpanded their reliance on electronic communications devices.'''^

    Project MINARET was ultimately terminated, but it is not clear to methat in the wake of the more recent revelations of activities by the BushAdministration that it was not subsequently reconstituted, expanded, andrebranded intemally, as described more fully below. In the mid-197 0s, avigorous and skeptical Congress had thoroughly investigated ProjectMINA RET and revealed that over numerous U .S. citizens or groups had beenplaced on NSA watch lists such that any communications by them orreferencing them were sought out amid the pool of conimunicationstechnologically available to the agency. And, beyond the watch list itself.General Allen told the Church Committee that the NSA had created andshared over 3,900 reports on watch-listed Am ericans.''** And, at one pointafter the investigation had begun, he promised House Chairman Pike that theNSA was only targeting foreign-communications channels, which carriedonly a minuscule number of intemational communications by Americans,and was not "monitoring any telephone circuits terminating in the US."'''^

    141. Id .

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    29/51

    2010] The Right to Privacy in Light of Pre siden ts' Program s 1883

    That is, the "one terminal" rule had been abandoned in order to protectAmericans' intemationai communications, at least during the congressionalinvestigation. And he asserted that once Operation SHA MR OCK was shutdown, the NSA was purportedly no longer analyzing the intemationaitelegrams of m illions of A merican residents and businesses,'""^

    This snapshot of projects and operations terminated belies, to me, thetruth. As discussed below , I think it is likely that some of the activities at theheart of SHAMROCK and MINARET continued in different ways with newintemal "co ntrols," namely what w as considered to be "inc idental" collectioninvolving Americans but that did not focus on Americans "intentionally" anddid not permit the analysis of what was collected in this way. I think this ispart of the "capacity" that was tapped by the Bush Administration with theaid of certain telecomm companies and with a new focus on thecommunications of Americans, as described below, to the detriment of ourliberty and security. This shift in focus is of param ount importance and greatconsequence, constitutionally and morally, in our democracy,III. Fast Forward to 2008: Undividing the World of Communications,Revising F ISA, and Analyzing M ore Am ericans than Ever Before

    What actually happened next is subject to tremendous debate, especiallyfrom the vantage point of the first decade of the 21st century. This much ismostly undisputed: in 1978, Congress passed FISA to regulate foreignintelligence surveillance on these shores, creating a special court to hearapplications for warrants predicated on specially defined probable cause toengage in any surveillance that met the statute's definition of "electronicsurveillance."''*' Congress created a com prehensive statute to govem thissurveillance, explicitly stating that FISA and Title III were the "exclusive"rules for conducting these activities (and repealing the 1968 provision thathad statutorily exempted the NSA from criminal penalties for warrantlesselectronic surveillance).'^" It set forth rules for emergency situations andtimes of war, providing that wa rrants were still required .'^' It limited whatcounted as foreign intelligence so that the rationale for surveillance wouldnot be as broad as President Nixon attempted to stretch foreign policy to

    Center for National Security Studies) (citing a letter from Gen, Lew Allen, Dir,, Nat'l Sec, Agency,

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    30/51

    1884 Texas Law Review [Vol. 88:1855

    reach.'^^ Congress also wrote a special, broad definition of content toinclude not only the words spoken (like criminal wiretaps) but also the fact ofcommunication, length of conversations, and the parties involved;'^^ and thenit referenced that content in the definitions of electronic surveillance, asexplained below.'^''FISA barred warrantless targeting of communications to or from peoplein the United States whether by wire or radio and regardless of where theacquisition occurs (meaning even if not on these shores),'^^ which sounds onthe surface of the language like an attempt to bar Project MINARET'swa tch-listing. It barred warrantless acquisition of comm unications to or fromAmericans if acquired from a wire in the United States, even if not targetinga particular U.S . person.'^^ This seems on the surface aim ed at stopping theNSA from the bulk collection of the cables of telegram companies or othercommunications that traveled by wire to or from the United States, whichseemingly describes SHAM RO CK. FISA also barred the warrantlessacquisition of purely domestic radio communications between people in theUnited States, and it barred other warrantless listening devices directed atpeople here in the United S ta te s. '" This is, at least, what the plain languageofthe statute indicates.To hear the Bush Administration and its proxies tell the story of FISAthirty years after the law passed, FISA changed nothing because thedefinitions cleverly exem pted all of th e N SA 's SIG INT activities.'^^ It is anastonishing claim. The implication of this construction of FISA is that theNSA was statutorily and constitutionally free to restart Project MINARETwatch-listing so long as they did not search the pool of intemationalcommunications for a particular American's live intemationalcommunications by name, versus after the communication was transmifted,and that the NSA could re-engage Operation SHAMROCK so long as itmoved the operation offshore.Yet when President Jimmy Carter signed FISA into law in October1978, he stated his belief that "The bill requires, for the first time, a priorjudicial warrant for all electronic surveillance for foreign intelligencepurposes in the United States in which communications of U.S. personsmight be intercepted. It clarifies the Exe cu tive's au thority to gather foreign

    152, See Glenn Grcenwald, Echoes of the Nixon Era, SALON, July 31, 2006,http://www,salon,com/news/opinion/feature/2006/07/31/nsa (characterizing FISA as a response toeavesdropping abuses by the Executive Branch, particularly under President Nixon),

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    31/51

    2010] The Right to Privacy in Light of Pres iden ts' Program s 1885

    intelligence hy electronic su rveillance in the United States."'^^ No t that suchstatements are definitive hy any means given our constitutional stmcture, buthe also stated his belief that FISAhelps to solidify the relationship of trust between the Americanpeople and their Go vem m ent. It provides a basis for the trust ofthe American people in the fact that the activities of theirintelligence agencies are both effective and lawful. It providesenough secrecy to ensure that intelligence related to nationalsecurity can be securely acquired, while permitting review by thecourts and Congress to safeguard the rights of Americans andothers.'^"Indeed, the Senate in its report on the bill noted that FISA "[was]designed . . . to curb the practice by which the Executive Branch m ayconduct warrantless electronic surveillance on its own unilateraldetermination that national security justifies it."'*' The Senate said it passedFISA to "provide the secure framework by which the Executive Branch mayconduct legitimate electronic surveillance for foreign intelligence purposeswithin the context of this Nation's commitment to privacy and individualrights."'*^One of the main points of recent disagreement surrounds the so-calledradio exception from the definitions of FISA to not include non-targetedintemationa l radio transmissions in FISA 's warrant requirement.'*^ ButCongress made clear that the exclusion of some surveillance of Americansfrom FISA's definitions "should not be viewed as congressionalauthorization of such activities as they affect the privacy interests ofAmericans," noting that "the requirements of the [F]ourth [AJmendmentwould, of course, continue to apply to this type of communicationsintelligence ac tivity," regardless of FISA.' '* In fact. Congress envisioned

    that these activities would be govemed by provisions in Senate Bill 2525,'*^but that bill never passed, and the White House issued an Executive Orderand also intemal rules, such as United States Signals IntelligenceDirective 18, to further establish mles for the collection and dissemination ofmaterial that affected Americans' privacy rights, beyond the statutory

    159, Foreign Intelligence Surveillance Act of 1978, 2 PUB, PAPERS 1853 (Oct, 25, 1978),160, Id161, S, REP, No , 95-604, pt, 1, at 8 (1978), repnnterfm 1978 U,S,C,C,A,N, 3904, 3910,162, Id at 15,163, See Legislative Proposals to Update the Foreign Intelligence Surveillance Act (FISA):

  • 8/3/2019 The Right to Privacy in Light of President's Programs

    32/51

    1886 Texas Law Review [Vol. 88:1855

    protections.'** Plus, Congress took pains in F ISA 's legislative history toemphasize that broadscale electronic surveillance, even of Americans whowere abroad, had been limited by the Executive.'*^ Con gress stated that thestatute intentionally barred the tapping of wire communications without awarrant for "either a wholly domestic telephone call or an internationaltelephone call . . . if the acquisition of the content of the call takes place inthis c o u n tr y .. . ."'*^ And, in fact, FISA even provided special rules for alimited class of communications in the U.S. to permit warrantless electronicsurveillance of special phone lines leased by foreign govemments for theirembassies here, by allowing the Attomey General to authorize suchsurveillance if there was "no reasonable likelihood" that Americans'communications would be intercepted through such orders without a warrant(this has been called the "embassy exception" or "leased-line rule ").'* ' TheAct also restricted testing of radio surveillance equipment to prevent"testing" from being a backdoor way to direct the ears of the NSA at theUnited States.' And, among other things , it provided "m inim ization" rulesto limit how information that was lawfully obtained in foreign intelligencecollection could be retained and shared.'^' These rules specifically mandatedthe destruction of Americans' communications if they were incidentallyobtained without warrants as part o