Lead Opinion
BATCHELDER, J., delivered the judgment of the court. GIBBONS, J. (pp. 688-93), delivered a separate opinion concurring in the judgment only.
GILMAN, J. (pp. 693-720), delivered a separate dissenting opinion.
OPINION
The United States National Security Agency (“NSA”) appeals from the decision of the District Court for the Eastern District of Michigan that granted summary judgment against the NSA and imposed a permanent injunction. The plaintiffs are a collection of associations and individuals led by the American Civil Liberties Union, and they cross-appeal. Because we cannot find that any of the plaintiffs have standing for any of their claims, we must vacate the district court’s order and remand for dismissal of the entire action.
I.
Sometime after the September 11, 2001, terrorist attacks, President Bush authorized the NSA to begin a counter-terrorism operation that has come to be known as the Terrorist Surveillance Program (“TSP”). Although the specifics remain undisclosed, it has been publicly acknowledged that the TSP includes the interception (i.e., wiretapping), without warrants, of telephone and email communications where one party to the communication is located outside the United States and the NSA has “a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qae-da, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.” See Press Briefing by Att’y Gen. Alberto Gonzales and Gen. Michael Hayden, Principal Deputy Dir. for Nat’l Intelligence (Dec. 19, 2005), available at http://www.whitehouse.gov/news/releases/ 2005/12/print/20051219-l.html (last visited July 2, 2007).
The plaintiffs in this action include journalists, academics, and lawyers who regu
The plaintiffs filed suit in the Eastern District of Michigan, seeking a permanent injunction against the NSA’s continuation of the TSP and a declaration that two particular aspects of the TSP — warrantless •wiretapping and data mining — violate the First and Fourth Amendments, the Sepa
The NSA had invoked the State Secrets Doctrine
In deciding the merits, the district court construed the Fourth Amendment as an absolute rule that “requires prior warrants for any reasonable search,” ACLU v. NSA
IT IS HEREBY ORDERED that Defendants [i.e., NSA], its agents, employees, representatives, and any other persons or entities in active concert or participation with Defendants, are permanently enjoined from directly or indirectly utilizing the Terrorist Surveillance Program (hereinafter ‘TSP’) in any way, including, but not limited to, conducting warrantless wiretaps of telephone and internet communications, in contravention of the Foreign Intelligence Surveillance Act (hereinafter ‘FISA’) and Title III;
IT IS FURTHER ORDERED AND DECLARED that the TSP violates the Separation of Powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA and Title III[.]
ACLUv. NSA E.D. Mich. Dist. Court, No. 2:06-CV-10204, “Judgment and Permanent Injunction Order” (Aug. 17, 2006). The NSA moved for a stay of the injunction pending appeal, which the district court denied. Meanwhile, the NSA appealed, arguing that the plaintiffs lacked standing and that the State Secrets Doctrine prevented adjudication on the merits. This court stayed the injunction pending the outcome of this appeal. See ACLU v. NSA
II.
This appeal presents a number of serious issues,
Standing is an aspect of justiciability, Worth v. Seldin,
The “particular plaintiffs” to this action are a diverse group of associations and individuals, and it would require a rigorous undertaking to assure that each has standing to litigate. However, for purposes of the asserted declaratory judgment — though not necessarily for the requested injunction
As for the “particular claims,” the plaintiffs have asserted six separate claims or causes of action — three constitutional (First Amendment, Fourth Amendment,
The conduct giving rise to the alleged injuries is undisputed: the NSA (1) eavesdrops, (2) without warrants, (3) on international telephone and email communications in which at least one of the parties is reasonably suspected of al Qaeda ties. The plaintiffs’ objection to this conduct is also undisputed, and they demand that the NSA discontinue it. The plaintiffs do not contend — nor could they — that the mere practice of wiretapping (i.e., eavesdropping) is, by itself, unconstitutional, illegal, or even improper. Rather, the plaintiffs object to the NSA’s eavesdropping without warrants, specifically FISA warrants with their associated limitations and minimization requirements. See 50 U.S.C. §§ 1804-06. According to the plaintiffs, it is the absence of these warrants that renders the NSA’s conduct illegal and unconstitutional. But the plaintiffs do not — and because of the State Secrets Doctrine cannot — produce any evidence that any of their own communications have ever been intercepted by the NSA, under the TSP, or without warrants. Instead, they assert a mere belief, which they contend is reasonable and which they label a “well founded belief,” that: their overseas contacts are the types of people targeted by the NSA; the plaintiffs are consequently subjected to the NSA’s eavesdropping; the eavesdropping leads the NSA to discover (and possibly disclose) private or privileged information; and the mere possibility of such discovery (or disclosure) has injured them in three particular ways.
Notably, the plaintiffs do not allege as injury that they personally, either as individuals or associations, anticipate or fear any form of direct reprisal by the government (e.g., the NSA, the Justice Department, the Department of Homeland Security, etc.), such as criminal prosecution, deportation, administrative inquiry, civil litigation, or even public exposure. The injuries that these plaintiffs allege are not so direct; they are more amorphous and necessitate a pointed description.
The plaintiffs’ primary alleged injury— the first of three — is their inability to communicate with their overseas contacts by telephone or email due to their self-governing ethical obligations.
The second alleged injury — and the only one expressly addressed by the district court — is the “chilling effect” on the overseas contacts’ willingness to communicate with the plaintiffs by telephone or email. Under this claim, the immediate injury results directly from the actions of the overseas contacts who, the plaintiffs contend, fear that the NSA’s discovery of otherwise private or privileged information (being communicated by telephone or email) will lead to some direct reprisal by the United States government, their own governments, or others. This fear causes the overseas contacts to refuse to communicate with the plaintiffs by telephone or email, and this refusal to communicate burdens the plaintiffs in the performance of their jobs or other lawful objectives, because, in order to pursue their chosen professions or organizational objectives, the plaintiffs must travel overseas to meet with these contacts in person. This injury manifests itself as both an added expense and an added burden.
The plaintiffs’ third alleged injury is the NSA’s violation of their legitimate expectation of privacy in their overseas telephone and email communications. Under this claim, the immediate injury comes directly
This third kind of injury, unlike the other two, is direct and personal; under this theory, the NSA has directly invaded the plaintiffs’ interest and proof of such invasion is all that is necessary to establish standing. If, for instance, a plaintiff could demonstrate that her privacy had actually been breached (i.e., that her communications had actually been wiretapped), then she would have standing to assert a Fourth Amendment cause of action for breach of privacy.
One other issue demands attention, namely, that the plaintiffs’ failure to subject themselves to actual harm does not, by itself, prevent a finding that they have standing — specifically, it does not deprive them of the right to seek declaratory judgment. See 28 U.S.C. § 2201(a) (empowering courts to “declare the rights and other legal relations of any interested party seeking such declaration, whether or not further relief is or could be sought”). Implicit in each of the plaintiffs’ alleged injuries is the underlying possibility — which the plaintiffs label a “well founded belief’ and seek to treat as a probability or even a certainty — that the NSA is presently intercepting, or will eventually intercept, communications to or from one or more of these particular plaintiffs, and that such interception would be detrimental to the plaintiffs’ clients, sources, or overseas contacts. This is the premise upon which the plaintiffs’ entire theory is built. But even though the plaintiffs’ beliefs — based on their superior knowledge of their contacts’
A plaintiffs refusal to engage in potentially harmful activities is the typical substance of a declaratory judgment action and does not, by itself, preclude a finding that the plaintiff has standing. See Med-Immune, Inc. v. Genentech, Inc., 549 U.S. •-,
Thus, in crafting their declaratory judgment action, the plaintiffs have attempted (unsuccessfully) to navigate the obstacles to stating a justiciable claim. By refraining from communications (i.e., the potentially harmful conduct), the plaintiffs have negated any possibility that the NSA will ever actually intercept their communications and thereby avoided the anticipated harm — this is typical of declaratory judgment and perfectly permissible. See Med-Immune,
Therefore, the injury that would support a declaratory judgment action (i.e., the anticipated interception of communications resulting in harm to the contacts) is too speculative, and the injury that is imminent and concrete (i.e., the burden on professional performance) does not support a declaratory judgment action. This general proposition — the doctrine of standing — is explained more fully in the sections of the analysis regarding each, individual cause of action.
III.
By claiming six causes of action, the plaintiffs have actually engaged in a thinly veiled, though perfectly acceptable, ruse. To call a spade a spade, the plaintiffs have only one claim, namely, breach of privacy, based on a purported violation of the Fourth Amendment or FISA — i.e., the plaintiffs do not want the NS A listening to their phone calls or reading their emails. That is really all there is to it. On a straightforward reading, this claim does not implicate the First Amendment.
At this point, it becomes apparent that my analysis of whether the plaintiffs have standing diverges at a fundamental level from that of the concurring and dissenting opinions. They each employ a single, broad, all-encompassing analysis, with which they attempt to account for all of the plaintiffs’ alleged injuries, requested remedies, and legal claims. As much as I would prefer that resolution of this question were so simple, I believe the law demands a particularized analysis of the plaintiffs’ three alleged injuries, six asserted legal claims, and two requested forms of relief. See Cuno,
A comprehensive analysis of all six claims in a single opinion, however, invites some overlap of legal doctrine, precedent, and reasoning. Such overlap similarly invites ambiguity, confusion, and misapplication. To avoid this pitfall, I define the plaintiffs’ alleged injuries precisely, confine each cause of action to its own section, and take special care to ensure that I do not improperly carry precedent or legal doctrine from one cause of action to another. The benefit of precision will, I hope, outweigh any annoyance created by strict compartmentalization or redundancy.
IV.
The analytical approach to the determination of standing for constitutional claims differs from the approach to statutory claims. See Sierra Club v. Morton,
Whether a party has a sufficient stake in an otherwise justiciable controversy to obtain judicial resolution of that controversy is what has traditionally been referred to as the question of standing to sue. Where the party does not rely on any specific statute authorizing invocation of the judicial process, the question of standing depends upon whether the party has alleged such a personal stake in the outcome of the controversy, as to ensure that the dispute sought to be adjudicated will be presented in an adversary context and in a form historically viewed as capable of judicial resolution. Where, however, Congress has authorized public officials to perform certain functions according to law, and has provided by statute for judicial review of those actions under certain circumstances, the inquiry as to standing must begin with a determination of whether the statute in question authorizes review at the behest of the plaintiff.
Id. (quotation marks and citations omitted). The Court clarified:
Congress may not confer jurisdiction on Art. Ill federal courts to render advisory opinions, or to entertain ‘friendly’ suits, or to resolve ‘political questions,’ because suits of this character are inconsistent with the judicial function under Art. III. But where a dispute is otherwise justiciable, the question whether the litigant is a ‘proper party to request an adjudication of a particular issue,’ is one within the power of Congress to determine.
Id. at 732 n. 3,
A. Constitutional Claims
“The irreducible constitutional minimum of standing contains, three requirements”: “[1] injury in fact, [2] causation, and [3] redressability.” Steel Co.,
1. First Amendment
The plaintiffs allege that the NSA has, by conducting the warrantless wiretaps, violated the free speech and free association clauses of the First Amendment. The district court assumed that the plaintiffs had engaged in certain “protected expression,” apparently referring to the telephone and email communications. Although the plaintiffs’ painstaking efforts to keep these communications confidential belies the contention that this case involves expression,
Injury in Fact
“Art. Ill requires the party who invokes the court’s authority to show that he personally has suffered some actual or threatened injury as a result of the putatively illegal conduct of the defendant.” Valley Forge Christian Coll. v. Ams. United for Sep. of Church & State, Inc.,
The Supreme Court framed the question in Laird,
In recent years [we have] found in a number of cases that constitutional violations may arise from the deterrent, or ‘chilling,’ effect of governmental regulations that fall short of a direct prohibition against the exercise of First Amendment rights. In none of these cases, however, did the chilling effect arise merely from the individual’s knowledge that a governmental agency was engaged in certain activities or from the individual’s concomitant fear that, armed with the fruits of those activities, the agency might in the future take some other and additional action detrimental to that individual. Rather, in each of these cases, the challenged exercise of governmental power was regulatory, "proscriptive, or compulsory in nature, and the complainant was either presently or prospectively subject to the regulations, proscriptions, or compulsions that he was challenging.
Id. at 11,
I cannot subscribe to a view that the reason the injury in Laird was insufficient was because the plaintiffs alleged “only” chilled speech and that, by something “more,” the Laird Court meant more subjective injury or other injuries that derive from the chilled speech. The plaintiffs in Laird were political activists and the speech being chilled was political speech. Laird,
Therefore, to allege a sufficient injury under the First Amendment, a plaintiff must establish that he or she is regulated, constrained, or compelled directly by the government’s actions, instead of by his or her own subjective chill. Laird,
The harm of ‘chilling effect’ is to be distinguished from the immediate threat of concrete, harmful action. The former consists of present deterrence [of the plaintiff, by the government,] from First Amendment conduct because of the difficulty [that plaintiff has in] determining the application of a [government practice] to that conduct, and will not by itself support standing.
Id. “ ‘Chilling effect’ is cited as the reason why the governmental imposition is invalid [under the First Amendment] rather than as the harm which entitles the plaintiffs to challenge it.” Id. at 1378. In an attempt to establish harm, the Reagan plaintiffs claimed that they were “especially likely to be targets of the unlawful [surveillance] authorized by the order,” but the court explained:
Even if it were conceded that ... the plaintiffs [were] at greater risk than the public at large, that would still fall far short of the ‘genuine threat’ required to support this theory of standing, as opposed to mere ‘speculative’ harm. It must be borne in mind that this order does not direct intelligence-gathering activities against all persons who could conceivably come within its scope, but merely authorizes them.
Id. at 1380 (citations omitted). The Reagan court therefore held that the plaintiffs failed to satisfy the injury-in-fact requirement because they did not allege that “any direct governmental constraint” was “threatened or even contemplated against them.” Id. The present case is no different.
The plaintiffs here contend that the NSA has inflicted First Amendment injury in two ways, both of which prevent them
Even accepting this as a good faith assertion and assuming the factual statements are true, the plaintiffs’ first injury still involves two purely speculative fears: (1) that the NSA will actually intercept the plaintiffs’ particular communications, and (2) that armed with the fruit of those interceptions, the NSA will take action detrimental to the contacts. If, on the other hand, the plaintiffs could be assured that the NSA would not intercept their communications, or, if interception occurs, that no harm would befall the overseas contacts, then the NSA could continue the TSP wiretapping without harm to the plaintiffs.
Moreover, even if their allegations are true, the plaintiffs still allege only a subjective apprehension and a personal (self-imposed) unwillingness to communicate, which fall squarely within Laird,
The plaintiffs attempt to distinguish Laird. They first contend that they have alleged a chilling of their own communications, whereas the Laird plaintiffs did not. But the Laird plaintiffs alleged the same amount (or lack) of personalized surveillance as the present plaintiffs claim, and both alleged a chilling of their own communications. Even if this distinction were accurate, it would not alter Laird’s holding that federal courts lack jurisdiction over eases in which the plaintiff “alleges that the exercise of his First Amendment rights is being chilled by the mere existence, without more, of a governmental investigative and data-gathering activity.” Laird,
The plaintiffs have directed us to several- other decisions as support for their assertion that their professional injuries constitute something “more” than subjective chill. See, e.g., Meese v. Keene,
In Meese v. Keene,
In Ozonoff v. Berzak,
Finally, in Patón v. LaPrade,
I find no basis — either factual or legal— upon which to distinguish Laird from the First Amendment claim raised by the plaintiffs here, and I conclude that Laird controls this claim. But let me reemphasize, just to be perfectly clear, that I do
The plaintiffs’ second injury is the unwillingness of their overseas contacts, clients, witnesses, and sources to communicate by telephone or email, due to their fear that the NSA will intercept the communications. The district court, in its standing analysis, framed the issue this way:
The Plaintiffs in this case are not claiming simply that the [NSAJ’s surveillance has ‘chilled’ them from making international calls to sources and clients.1 -24 -1 Rather, they claim that Defendants’ surveillance has chilled their sources, clients, and potential witnesses from communicating with them. The alleged effect on Plaintiffs is a concrete, actual inability to communicate with witnesses, sources, clients and others without great expense which has significantly crippled Plaintiffs, at a minimum, in their ability to report the news and competently and effectively represent their clients.
ACLU v. NSA,
In Presbyterian Church v. United States,
When congregants are chilled from participating in worship activities [and]'refuse to attend church services because they fear the government is spying on them and taping their every utterance, all as alleged in the complaint, we think a church .suffers organizational injury because its ability to carry out its ministries has been impaired.
Id. at 522 (emphasis added). The Ninth Circuit then distinguished Laird: ■
Although Laird establishes that a litigant’s allegation that it has suffered a subjective ‘chill’ does not necessarily*666 confer Article III standing, Laird, does not control this case. The churches in this case are not claiming simply that the INS surveillance has ‘chilled’ them from holding worship services. Rather, they claim that the INS surveillance has chilled individual congregants from attending worship services, and that this effect on the congregants has in turn interfered with the churches’ ability to carry out their ministries. The alleged effect on the churches is not a mere subjective chill on their worship activities; it is a concrete, demonstrable decrease in attendance at those worship activities. The injury to the churches is ‘distinct and palpable.’ Laird has no application here.
Id. (citations omitted).
In one sense, the Ninth Circuit’s decision could be read as concluding that the churches suffered injury based on the actions of third parties (i.e., individual parishioners) — a reading that supports the plaintiffs’ arguments in favor of standing.
Having acknowledged these alternative interpretations of Presbyterian Church, it is unnecessary to resolve that issue definitively on this record. Injury in fact is but one of the criteria necessary to establish standing, and ultimately, it is not determinative of this case. Either of the other two criteria — causation or redressability— might ultimately defeat the plaintiffs’ claim of standing, even if the plaintiffs’ alleged injury is deemed adequate to state an injury in fact.
Causation
“[F]ederal plaintiffs must allege some threatened or actual injury resulting from the putatively illegal action before a federal court may assume jurisdiction.” Simon,
In the present case, the “putatively illegal action” is the NSA’s interception of overseas communications without warrants (specifically FISA warrants), and the “threatened or actual injury” is the added cost of in-person communication with the overseas contacts (or correspondingly, the diminished performance resulting from the inability to communicate). Therefore, to show causation, the plaintiffs must show that, but for the lack of warrants (or FISA compliance), they would not incur this added cost. There are two causal pathways based on the two types of alleged injury. In the first: (1) the NSA’s warrantless wiretapping, (2) creates in the plaintiffs a “well founded belief’ that their overseas telephone and email communications are being intercepted, which (3) requires the plaintiffs to refrain from these communications (i.e., chills communication), and (4) compels the plaintiffs to travel overseas to meet personally with these contacts in order to satisfy their professional responsibilities, thereby (5) causing the plaintiffs to incur additional costs. In the second: (1) the NSA’s warrantless wiretapping (2) causes the “well founded belief,” which (3) compels the overseas contacts to refuse to communicate by telephone or email (i.e., chills communication), thereby (4) requiring in-person communication, with its (5) associated additional costs. The district court attempted to articulate this relationship: “All of the Plaintiffs contend that the TSP has caused clients, witnesses and sources to discontinue their communications with plaintiffs out of fear that their communications will be intercepted.” ACLU v. NSA
The underpinning of the second step is questionable. The plaintiffs allege that they have a “well founded belief’ that their overseas contacts are likely targets of the NSA and that their conversations are being intercepted. The plaintiffs have no evidence, however, that the NSA has actually intercepted (or will actually intercept) any of their conversations. No matter what the plaintiffs and others might find “reasonable,” the evidence establishes only a possibility — not a probability or certainty — that these calls might be intercepted, that the information might be disclosed or disseminated, or that this might lead to some harm to the overseas contacts. While this lack of evidence is not, by itself, enough to disprove causation, the absence of this evidence makes the plaintiffs’ showing of causation less certain and the likelihood of causation more speculative.
The third step is unsupportable. In this step, the plaintiffs allege, and the district court found, that it is the absence of a warrant (and all that goes with it
A wiretap is always “secret” — that is its very purpose — and because of this secrecy, neither the plaintiffs nor their overseas contacts would know, with or without a warrant, whether their communications were being tapped. Therefore, the NSA’s secret possession of a warrant would have no more effect on the subjective willingness or unwillingness of these parties to “freely engage in conversations and correspond via email,” see ACLU v. NSA
The plaintiffs have argued that if the NSA were to conduct its surveillance in compliance with FISA, they would no longer feel compelled to cease their international telephone and email communications.
The imposition of FISA requirements into this scenario would not change the likelihood that these overseas contacts are the types of people who the plaintiffs believe would be monitored. Nor would it change the plaintiffs’ “well founded belief’ that the NSA is intercepting their communications with these individuals, the plaintiffs’ ethical obligations, or the overseas contacts’ subjective fears. Even under the plaintiffs’ depiction, it would merely assure the plaintiffs and their contacts that — while their international telephone and email communications with al Qaeda affiliates are still just as likely to be intercepted — the NSA will obtain FISA Court orders, which will presumably limit the duration and content of the acquisition and the use and dissemination of the acquired information. The plaintiffs, however, have not asserted, explained, or proven how a change in the duration or content of the NSA’s interceptions — purely hypothetical changes that are unknown and unknowable based on the established record and the State Secrets Doctrine — would alleviate their fears. Specifically, the plaintiffs have' not proffered any types or topics of communication, from which they are currently refraining, but about which— upon the imposition of FISA’s limitations and protections — they would thereafter “freely engage in conversations and correspond[ence] via email.” See ACLU v. NSA
Some plaintiffs (especially those who are lawyers) assert that the imposition of FISA minimization — to limit the use and dissemination of the information acquired — would relieve their fears sufficiently to satisfy their ethical obligations because it would ensure that those communications would remain confidential and privileged in the event of a subsequent criminal prosecution, removal proceeding, military tribunal, etc. Therefore, they argue, imposition of FISA requirements would alter the type and content of their communications. This theory, however, is predicated on the assumption that their current fears and apprehensions are justified — and there is no support for this assumption. First, there is no evidence in the current record from which to presume that the information collected by the NSA via warrantless wiretapping will be used or disclosed for any purpose other than national security. Next, there is no evidence in the record from which to presume that the NSA is not complying with, .or even exceeding, FISA’s restrictions on the acquisition, retention, use, or disclosure of this information (i.e., FISA’s minimization techniques). Finally, there is no basis to presume that traditional post-hoc remedies, such as the Exclusionary Rule or FISA’s civil suit provision, 50 U.S.C. § 1810, would not adequately deter the use or dissemination of this information. Consequently, this disconnect in the plaintiffs’ theory is unavoidable, and the plaintiffs’ injury is not fairly traceable to the mere absence of FISA compliance.
Under the plaintiffs’ second form of injury (i.e., the refusal by the overseas contacts to communicate by telephone or email), this third step in the causal pathway is further disrupted by the independent decisions of the third-party overseas contacts. In Simon, the Supreme Court held that, due to the independence of third-party actors, its plaintiffs could not
The complaint here alleged only that [the government], by the adoption of Revenue Ruling 69-545, had ‘encouraged’ [the third-party] hospitals to deny services to [the indigent plaintiffs] .... [But, it] is purely speculative whether the denials of service [i.e., the alleged harm] specified in the complaint fairly can be traced to [the government’s] ‘encouragement’ or instead result from decisions made by the [third-party] hospitals without regard to the tax implications [i.e., government conduct].
Simon,
The plaintiffs have not shown a sufficient causal connection between the complained-of conduct (i.e., the absence of a warrant or FISA protection) and the alleged harm (i.e., the inability to communicate). This inadequacy is further exemplified in the analysis of redressability.
Redressability
“Relief that does not remedy the injury suffered cannot bootstrap a plaintiff into federal court; that is the very essence of the redressability requirement.” Steel Co.,
In the present case, the plaintiffs requested a declaratory judgment and an injunction. They theorize that their injury (i.e., deficient professional performance or the additional cost of in-person communication) will be redressed by a declaration that the NSA’s practice of warrantless wiretapping is unlawful, because it naturally follows that the unlawful conduct will be prohibited. The declaratory judgment thus forms the basis for an injunction prohibiting interception of communications without FISA compliance. The district court agreed, declaring the NSA’s conduct illegal and imposing an injunction, on the
The TSP is designed and operated for the prevention of terrorism, and the NSA is interested only in telephone and email communications in which one party to the communication is located outside the United States and the NSA has a “reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.” It is reasonable to assume that the FISA Court would authorize the interception of this type of communication, See 50 U.S.C. § 1805, and keeping this likelihood in mind, the issuance of FISA warrants would not relieve any of the plaintiffs’ fears of being overheard; it would relieve them only of the fear that the information might be disseminated or used against them. See 50 U.S.C. §§ 1804(a)(5); 1801(b)(l)-(4); 1806(a) & (h) (minimization requirements).
Neither will the requested injunctive relief increase the likelihood that the plaintiffs and their overseas contacts will resume telephone or email communications. As discussed previously, “warrantless” and “secret” are unrelated things. All wiretaps are secret, and the plaintiffs are not challenging the secret nature, but only the warrantless nature, of the TSP. Because all wiretaps are secret, neither the plaintiffs nor their overseas contacts would know — with or without warrants — whether
The district court’s injunction is also insufficient to relieve the plaintiffs’ fear of reprisal against their contacts. A warrant requirement will not protect the overseas contacts from prosecution in all circumstances, see In re Sealed Case,
Similarly, to the extent the plaintiffs or their contacts fear some misconduct by the NSA (in the discovery, disclosure, or dissemination of the information), the mere requirement of a warrant, FISA or otherwise, will not guarantee the prevention of that misconduct, and therefore fails to satisfy the redressability element. In Leeke v. Timmerman,
Consequently, the district court’s declaration against warrantless wiretaps is insufficient to redress the plaintiffs’ alleged injury because the plaintiffs’ self-imposed burden on communications would survive the issuance of FISA warrants. The only way to redress the injury would be to enjoin all wiretaps, even those for which warrants are issued and for which full prior notice is given to the parties being tapped. Only then would the plaintiffs be relieved of their fear that their contacts are likely under surveillance, the contacts be relieved of their fear of surveillance, and the parties be able to “freely engage in conversations and correspond via email without concern.” Because such a broad
For the foregoing reasons, the plaintiffs in the present action have no standing to pursue their First Amendment claim. Even if they could demonstrate injury, they cannot establish causation, and their alleged injury is not redressable by the remedy they seek.
2. Fourth Amendment
The plaintiffs allege that the NSA has, by conducting the warrantless wiretaps, violated the “plaintiffs’ privacy rights guaranteed by the Fourth Amendment.” The district court — asserting a heretofore unprecedented, absolute rule that the Fourth Amendment “requires prior warrants for any reasonable search,” ACLU v. NSA,
However, the Supreme Court has made clear that Fourth Amendment rights are “personal rights” which, unlike First Amendment rights, may not be asserted vicariously. See Rakas v. Illinois,
Under petitioners’ target theory, a court could determine that a defendant had standing [] without having to inquire into the substantive question of whether the challenged search or seizure violated the Fourth Amendment rights of that particular defendant. However, having rejected petitioners’ target theory and reaffirmed the principle that the rights assured by the Fourth Amendment are personal rights, which may be enforced [ ] only at the instance of one whose own protection was infringed by the search and seizure, the question necessarily arises whether it serves any useful analytical purpose to consider this principle a matter of standing, distinct from the merits of a defendant’s Fourth Amendment claim.... Rigorous application of the principle that the rights secured by this Amendment are personal, in place of a notion of ‘standing,’ will produce no additional situations in which evidence must be excluded. The inquiry under either approach is the same. But we think the better analysis forth-rightly focuses on the extent of a particular defendant’s rights under the Fourth Amendment, rather than on any theoretically separate, but invariably intertwined concept of standing.
Id. at 138-39,
The plaintiffs do not, and cannot,
3. Separation of Powers
The plaintiffs allege that the NSA has, by conducting the warrantless wiretaps, “violated] the principle of the separation of powers because [the NSA’s conduct] was authorized by President Bush in excess of his Executive authority under Article II of the United States Constitution and is contrary to limits imposed by Congress.” This two-part accusation-— that President Bush (1) exceeded his presidential authority under the Constitution, and (2) violated a statutory limit imposed upon that authority by Congress — presupposes that the Constitution gives Congress the authority to impose limits on the President’s powers under the present circumstances. The district court agreed with the plaintiffs’ allegation in toto, and declared the NSA’s conduct a violation of the Separation of Powers Doctrine. See ACLU v. NSA,
A plaintiff asserting a claim under the Separation of Powers Doctrine must, like all other plaintiffs seeking to bring a claim in federal court, demonstrate injury in fact, causation, and redressability. INS v. Chadha,
To prove causation, the plaintiffs must connect the alleged separation-of-powers violation (“the putatively illegal action”) to the burden on the performance of their professional obligations (the alleged injury). See Simon,
This record simply does not permit the kind of particularized analysis that is required to determine causation. Ignoring for a moment the first two steps in the analysis, it is clear that the third and fourth are problematic. The plaintiffs have presented no evidence to support their alleged “well founded belief’ that their conversations are being intercepted. The evidence establishes only a possibili
It is also unclear from the record whether the plaintiffs’ or their contacts’ refusal to communicate can fairly be traced to the President’s authorization of an ambiguous warrantless wiretapping program, or if that same refusal would exist regardless of the authorization of the TSP. And any wiretap would be merely one component of counter-terrorist or military intelligence surveillance. Those such as the present plaintiffs, who choose to communicate with individuals located overseas who are by the plaintiffs’ own reckoning individuals reasonably suspected to be al Qaeda terrorists, affiliates, or supporters, should expect that those communications will be subject to heightened monitoring and surveillance for national security or military purposes. Therefore, the plaintiffs have no evidence to support a conclusion that the President’s authorization of the TSP would have any more effect on the parties’ respective apprehensions than would the broader circumstances of the War on Terror and heightened national security.
Because the plaintiffs cannot demonstrate that the alleged violation of the Separation of Powers has caused their injury, they lack standing to litigate their separation-of-powers claim. It is therefore not necessary to address redressability, the third element of standing.
Finally, I note that the district court stated that, unless it found standing for these plaintiffs, the President’s action would be insulated from judicial review. This idea, however, is neither novel nor persuasive. “The assumption that if respondents have no standing to sue, no one would have standing, is not a reason to find standing.” Schlesinger v. Reservists Comm, to Stop the War,
The Supreme Court has confronted this suggestion and expressly rejected it, explaining its reasoning at some length:
It can be argued that if respondent is not permitted to litigate this issue, no one can do so. In a very real sense, the absence of any particular individual or class to litigate these claims gives support to the argument that the subject matter is committed to the surveillance of Congress, and ultimately to the political process. Any other conclusion would mean that the Founding Fathers intended to set up something in the nature of an Athenian democracy or a New England town meeting to oversee the conduct of the National Government by means of lawsuits in federal courts. The Constitution created a representative Government with the representatives directly responsible to their constituents at stated periods of two, four, and six years; that the Constitution does not afford a judicial remedy does not, of course, completely disable the citizen who is not satisfied with the ‘ground rules’ established by the Congress for reporting expenditures of the Executive Branch. Lack of standing within the narrow confines of Art. Ill jurisdiction does not impair the right to assert his views in the political forum or at the polls. Slow, cumbersome, and unresponsive though the traditional electoral process may be thought at times, our system provides for changing members of the political branches when dissatisfied citizens convince a sufficient number of their fellow electors that elected representatives are delinquent in performing duties committed to them.
United States v. Richardson,
The plaintiffs allege that the President, as an actor in our tripartite system of government, exceeds his constitutional authority by authorizing the NSA to engage in warrantless wiretaps of overseas communications under the TSP. But this court, not unlike the President, has constitutional limits of its own and, despite the important national interests at stake, cannot exceed its allotted authority. See Steel Co.,
B. Statutory Claims
In addition to their three constitutional claims, the plaintiffs present statutory claims under the APA, Title III, and FISA (or a combination thereof). The first step is to consider whether any of these statutes “authorize[] review at the behest of the plaintiff[s]” — i.e., whether these statutes (1) govern the NSA’s challenged conduct and (2) provide the plaintiffs a means of judicial review. See Sierra Club,
This standing analysis includes consideration of both constitutional and prudential principles. Elk Grove Unified Sch. Dist. v. Newdow,
1. Administrative Procedures Act
The Administrative Procedures Act (“APA”), 5 U.S.C. §§ 101-913, governs the conduct of federal administrative agencies, which presumably includes the NSA, See 5 U.S.C. § 701(b)(1). The APA provides
“Agency action” is defined in the APA as “the whole or part of an agency rule, order, license, sanction, relief, or the equivalent or denial thereof, or failure to act.” 5 U.S.C. § 551(13). This definition is divided into three parts “begin[ning] with a list of five categories of decisions made or outcomes implemented by an agency — agency rule, order, license, sanction[, or] relief.” Norton v. S. Utah Wilderness Alliance,
All of those categories involve circumscribed, discrete agency actions, as their definitions make clear: [1] ‘an agency statement of ... future effect designed to implement, interpret, or prescribe law or policy’ (rule); [2] ‘a final disposition ... in a matter other than rule making’ (order); [3] a ‘permit ... or other form of permission’ (license); [4] a ‘prohibition ... or taking [of] other compulsory or restrictive action’ (sanction); or [5] a ‘grant of money, assistance, license, authority,’ etc., or ‘recognition of a claim, right, immunity,’ etc., or ‘taking of other action on the application or petition of, and beneficial to, a person’ (relief).
Id. (quoting 5 U.S.C. §§ 551(4), (6), (8), (10), (11)) (emphasis added). The second part of the “agency action” definition— “the equivalent or denial thereof’ — must be a discrete action or the denial of a discrete action, otherwise it would not be equivalent to the five listed categories. Id. And the final part of the definition — a “failure to act” — is “properly understood as a failure to take an agency action.” Id. Under Supreme Court precedent, classic examples of “agency action” include the issuance of an agency opinion, see Bennett,
Here, however, the plaintiffs are not complaining of “agency action” as defined in the APA, and the record contains no evidence that would support such a finding. The plaintiffs challenge the NSA’s warrantless interception of overseas communications, the NSA’s failure to comply with FISA’s warrant requirements, and the NSA’s presumed failure to comply with FISA’s minimization procedures. This is conduct, not “agency action.” Furthermore, there is no authority to support the invocation of the APA to challenge generalized conduct.
Looking at the “five categories” of enumerated “agency action,” the NSA’s surveillance activities, as described by the three facts of record, do not constitute, nor are they conducted pursuant to, any agency rule, order, license, sanction, or relief. Although the plaintiffs labeled the NSA’s surveillance activities as “the Program,” and the district court labeled it the “TSP,” the NSA’s wiretapping is actually just gen
The plaintiffs do not complain of anything equivalent to agency action, which also requires some discrete action by the NSA. See Norton,
No matter how the plaintiffs’ claims are characterized, they do not challenge agency action as it is defined in the APA. Accordingly, the plaintiffs have not asserted a viable cause of action under the APA.
2. Title III
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“Title III”), 18 U.S.C. §§ 2510-22, generally regulates the government’s interception of wire, oral, and electronic communications. See United States v. Ojeda Rios,
Nothing contained in this [statute (i.e., Title III) ] ... shall be deemed to affect [1] the acquisition by the United States Government of foreign intelligence information from international or foreign communications, or [2] foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communi*680 cations system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and [3] procedures in this [statute (i.e., Title III) ] ... and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.
18 U.S.C. § 2511(2)(f). When this statutory language is parsed into its three individual clauses, its limitations become clear. The first clause disclaims Title III applicability generally — acknowledging that Title III does not apply to “the acquisition by the United States Government of foreign intelligence information from international or foreign communications.” The second clause disclaims Title III applicability specifically — recognizing that Title III does not govern “foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in [FISA].” The final clause, which is known as the “exclusivity provision,” recognizes the respective roles of Title III and FISA, by stating that the “procedures in [Title III] and [FISA] shall be the exclusive means by which electronic surveillance, as defined in section 101 of [FISA] and the interception of domestic wire, oral, and electronic communications may be conducted.”
The first clause of § 2511(2)(f)— stating that Title III does not govern the acquisition of “foreign intelligence information from international or foreign communications” — expressly disclaims application of Title III to surveillance activities of the type at issue in the present case. The NS A monitors international communications for the purpose of acquiring foreign intelligence about terrorist organizations; this type of surveillance falls squarely under the disclaimer found in the first clause of § 2511(2)(f). By its own terms, then, Title III does not apply to the conduct of which the plaintiffs complain.
Because the first clause of § 2511(2)(f) expressly disclaims Title Ill’s application
It is likewise unnecessary, at this point, to delve into the numerous issues raised by the third clause, i.e., the exclusivity provision. The exclusivity provision differs from the first two clauses of § 2511(2)(f), in that it does not merely disclaim Title Ill’s application. Instead, it states that Title III and FISA shall be the “exclusive means” by which particular types of surveillance may occur, thus prescribing the separate roles of Title III and FISA, rather than the application of Title III alone. The plaintiffs assert a statutory cause of action for the NSA’s alleged violation of the exclusivity provision, which I address separately in Section IV.B.4, infra. It is, therefore, unnecessary to dissect the exclusivity provision at this point in the analysis.
Because the first clause of § 2511(2)(f) states that Title III does not apply to the internationally focused surveillance activities challenged in this case, the plaintiffs have not asserted a viable cause of action under Title III.
3. FISA
The Foreign Intelligence Surveillance Act of 1978 (“FISA”), 50 U.S.C. § 1801 et seq., — as the separate and distinct counterpart to Title III — governs the interception of electronic communications involving foreign intelligence information. See 50 U.S.C. § 1802(a)(1). FISA is fraught with detailed statutory definitions and is expressly limited, by its own terms, to situations in which the President has authorized “electronic surveillance,” as defined in 50 U.S.C. § 1801(f), for the purposes of acquiring “foreign intelligence information,” as defined in 50 U.S.C. § 1801(e).
First, the surveillance in question must acquire “foreign intelligence information,” which includes “information that relates to ... the ability of the United States to protect against ... international terrorism.” 50 U.S.C. § 1801(e)(1)(B). In the present case, the NSA intercepts communications in which it has a “reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.” See Press Briefing by Att’y Gen. Aberto Gonzales and Gen. Michael Hayden, Principal Deputy Dir. for Nat’l Intelligence (Dec. 19, 2005), available at http://www.whitehouse. gov/news/releases/2005/12/print/20051219l.html (last visited July 2, 2007) (emphasis added). The proclaimed purpose is to prevent future terrorist attacks, see id. (“This is a very concentrated, very limited program focused at gaining information about our enemy.”), and thus the NSA’s
Next, the interception must occur by “electronic surveillance.” According to the plaintiffs, the government’s admission that it intercepts telephone and email communications — which involve electronic media and are generally considered, in common parlance, forms of electronic communications — is tantamount to admitting that the NSA engaged in “electronic surveillance” for purposes of FISA. This argument fails upon recognition that “electronic surveillance” has a very particular, detailed meaning under FISA — a legal definition that requires careful consideration of numerous factors such as the types of communications acquired, the location of the parties to the acquired communications, the location where the acquisition occurred, the location of any surveillance, device, and the reasonableness of the parties’ expectation of privacy. See 50 U.S.C. § 1801(f).
Finally, even assuming, arguendo, that FISA applies to the NSA’s warrant-less wiretapping, the plaintiffs cannot sustain a claim under FISA. FISA’s civil suit provision permits an “aggrieved person” to bring a cause of action for a violation of that statute:
An aggrieved person, other than a foreign power or an agent of a foreign power, as defined in [50 U.S.C. § 1801(a) or (b)(1)(A)], respectively, who has been subjected to an electronic surveillance or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of [50 U.S.C. § 1809] shall have a cause of action against any person who committed such violation and shall be entitled to recover—
(a) actual damages, but not less than liquidated damages of $ 1,000 or $ 100*683 per day for each day of violation, whichever is greater;
(b) punitive damages; and
(c) reasonable attorney’s fees and other investigation and litigation costs reasonably incurred.
50 U.S.C. § 1810 (emphasis added). There are at least three reasons why the plaintiffs cannot maintain their claims under FISA’s statutory authorization. First, the plaintiffs have not alleged, and the record does not contain sufficient facts from which to conclude, that they are “aggrieved persons.” FISA defines an “aggrieved person” as “a person who is the target of an electronic surveillance or any other person whose communications or activities were subject to electronic surveillance.” 50 U.S.C. § 1801 (k). “[T]he term [aggrieved person] is intended to be coextensive [with], but no broader than, those persons who have standing to raise claims under the Fourth Amendment with respect to electronic surveillance.” H.R.Rep. No. 95-1283, at 66 (1978), reprinted at 1978 U.S.C.C.A.N. 3904. (citing Alderman v. United States,
4. The Exclusivity Provision
The plaintiffs attempt to bring an ambiguous statutory cause of action under Title III and FISA jointly, based on their allegation that the TSP violates the “exclusivity provision” of § 2511(2)(f). The exclusivity provision states that Title III and FISA “shall be the exclusive means by which electronic surveillance, as defined in section 101 of [FISA], and the interception of domestic wire, oral, and electronic communications may be conducted.” 18 U.S.C. § 2511(2)(f). This provision contains two separate and independent, albeit parallel, statements: (1) Title III “shall be the exclusive means by which ... the interception of domestic wire, oral, and electronic communications may be conducted,” and (2) FISA “shall be the exclusive means by which electronic surveillance, as defined in section 101 of [FISA] ... may be conducted.” This provision does not foreclose the possibility that the government may engage in certain surveillance activities that are outside of the strictures of both Title III and FISA.
The plaintiffs cannot assert a viable cause of action under this provision. It is undisputed that the NSA intercepts international, rather than domestic, communications, so, as already explained, Title III does not apply. Moreover, because the plaintiffs have not shown, and cannot show, that the NSA engages in activities satisfying the statutory definition of “electronic surveillance,” the plaintiffs cannot demonstrate that FISA does apply. Consequently, this entire provision is inapplicable to the present circumstances.
The plaintiffs, however, read this provision as stating that Title III and FISA are together the “exclusive means” by which the NSA can intercept any com-
The plaintiffs’ theory is premised on the assertion that FISA and Title III, collectively, require warrants for the legal interception of any and all communications, and appears to be that because the NSA has publicly admitted to intercepting certain overseas communications without warrants, one must infer that the NSA has violated one or the other of these two statutes. The consequence of this inference — the plaintiffs would have us find— is a violation of § 2511(2)(f), which is not a violation of either Title III or FISA individually, but instead a violation of the collective application of the two. Thus, according to the plaintiffs, the NSA has violated the “exclusivity provision” of § 2511(2)(f), and based on this (presumed) violation, the plaintiffs have standing to bring a cause of action under this statutory provision.
The intended inferential “logic” of the plaintiffs’ theory falls apart upon recognition of their faulty premise. As previously explained, “electronic surveillance” under FISA does not cover all types of foreign surveillance, but instead has a very particular and detailed definition. The plaintiffs point to no provision in FISA, Title III, or any other statute that states that the four definitions “electronic surveillance” listed in FISA are the only kind of “electronic surveillance” that could ever be conducted. And the fact that the “exclusivity provision” is expressly limited to electronic surveillance “as defined in section 101 of [FISA]” leaves room to infer that other electronic surveillance is possible. Therefore, the plaintiffs cannot prove that FISA applies. More importantly, this inability to prove that the interceptions are “electronic surveillance” does not, as the plaintiffs theorize, lead to an inescapable conclusion that Title III applies. It simply means that FISA does not apply. On the other hand, it is irrefutable under the first clause of § 2511(2)(f) that Title III does not apply to this case because the NSA’s wiretapping activities are focused on international, rather than domestic, communications. To read this entire statute in the way that the plaintiffs suggest is to create an internal contradiction, which courts are loath to do. Rather, the unavailability of the evidence necessary to prove (or disprove) that the NSA is engaging in “electronic surveillance” compels a conclusion that the plaintiffs cannot demonstrate that either statute applies.
But even assuming, arguendo, that the plaintiffs have posited a proper reading of the exclusivity provision, and that the NSA’s warrantless wiretapping violates that provision, “the fact that a federal statute has been violated and some person harmed does not automatically give rise to a private cause of action in favor of that person.” Cannon v. Univ. of Chicago, 441
The exclusivity provision does not appear to create such an implied cause of action. In cases where a court implies a cause of action, “the statute in question at least prohibit[s] certain' conduct or create[s] federal rights in favor of private parties.” Id. at 569,
When considering statutory claims, “the inquiry as to standing must begin with a determination of whether the statute in question authorizes review at the behest of the plaintiff.” Sierra Club,
C. Additional Considerations
Having proceeded methodically through the standing analysis, I address the plaintiffs’ only remaining arguments, which defy classification under a compartmentalized approach. Under the first of these arguments, the plaintiffs rely heavily on the Supreme Court’s decision in Friends of the Earth, Inc. v. Laidlaw Environmental Services, Inc.,
Laidlaw is a case involving particular statutory claims and well-defined environmental injuries, however, and differs significantly from the present context, which involves dramatically different statutory claims and far less palpable alleged injuries. In this sense, it is noteworthy that the Laidlaw Court explicitly confined its injury-in-fact reasoning to environmental
Setting aside the fact that Laidlaw is an environmental case involving a particular, statutorily-created claim, the Court’s analysis in Laidlaw remains unpersuasive in the present context. The Laidlaw Court found that the plaintiffs had standing to challenge Laidlaw’s discharge of pollutants into a river because the discharge “curtail[ed] their recreational use of that waterway and would subject them to other economic and aesthetic harms.” Id. at 184,
The plaintiffs’ assertion that numerous other district courts have found standing to challenge the TSP is also unpersuasive. Other cases involving non-similarly situated plaintiffs are typically irrelevant to the issue of standing because standing reflects whether “a particular person is a proper party to maintain the action.” Flast,
Based on the evidence in the record, as applied in the foregoing analysis, none of the plaintiffs in the present case is able to establish standing for any of the asserted claims. At oral argument, we asked the plaintiffs’ counsel if we should remand for further proceedings on the issue of standing. Counsel asserted that the plaintiffs’ injuries were clear and undisputed in the record and there was no need to remand for a hearing or admission of additional evidence on this issue. But even to the extent that additional evidence may exist, which might establish standing for one or more of the plaintiffs on one or more of their claims, discovery of such evidence would, under the circumstances of this case, be prevented by the State Secrets Doctrine. See, e.g., Reynolds,
V.
The district court dismissed the data mining aspect of the plaintiffs’ claim, finding that the plaintiffs could not establish a prima facie case without resorting to privileged information. ACLU v. NSA,
A thorough review of the complaint, the district court opinion, and the arguments presented on appeal, makes it clear that the plaintiffs allege no separate injury in connection with the alleged data-mining aspect of the TSP. Therefore, this standing analysis applies equally, and the plaintiffs’ cross-appeal must be dismissed for lack of jurisdiction. See Steel Co.,
VI.
We hold that the plaintiffs do not have standing to assert their claims in federal
Notes
. In Hepting v. AT & T Corp., the District Court for the Northern District of California collected and documented certain publicly available information, which provides some background and context for the present case:
'In the weeks following the [September 11, 2001] terrorist attacks on our Nation, I authorized the National Security Agency, consistent with U.S. law and the Constitution, to intercept the international communications of people with known links to Al Qaeda and related terrorist organizations. Before we intercept these communications, the Government must have information that establishes a clear link to these terrorist networks.’
"[Transcript] available at http://www. whitehouse.gov/news/releases/2005/12/prin1/ 20051217.html (last visited July 19, 2006). The President also described the mechanism by which the program is authorized and reviewed:
'The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist threats to the continuity of our Government and the threat of catastrophic damage to our homeland. During each assessment, previous activities under the authorization are reviewed. The review includes approval by our Nation’s top legal officials, including the Attorney General and the Counsel to the President. I have reauthorized this program more than 30 times since the September the 11th attacks, and I intend to do so for as long as our Nation faces a continuing threat from Al Qaeda and related groups.
‘The NSA’s activities under this authorization are thoroughly reviewed by the Justice Department and NSA’s top legal officials, including NSA's General Counsel and Inspector General. Leaders in Congress have been briefed more than a dozen times on this authorization and the activities conducted under it. Intelligence officials involved in this activity also receive extensive training to ensure they perform their duties consistent with the letter and intent of the authorization.'
“Id.
"Attorney General Alberto Gonzales subsequently confirmed that this program intercepts 'contents of communications where ... one party to the communication is outside the United States’ and the government has 'a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.' [Press Briefing] available at http://www.whitehouse. gov/news/releases/2005/12/ prin1/20051219— l.html (last visited July 19, 2005). The Attorney General also noted, 'This [program] is not about wiretapping everyone. This is a very concentrated, very limited program focused at gaining information about our enemy.’ Id. at 5. The President has also made a public statement, of which the court takes judicial notice, that the government's 'international activities strictly target al Qaeda and their known affiliates,’ 'the government does not listen to domestic phone calls without court approval’ and the government is 'not mining or trolling through the personal lives of millions of innocent Americans.’ The White House, President Bush Discusses NSA Surveillance Program (May 11, 2006), [available at] http://www. whitehouse.gov/news/releases/2006/05/ 20060511-l.html (last visited July 19, 2005).” Hepting v. AT & T Corp.,
. The State Secrets Doctrine has two applications: a rule of evidentiary privilege, see United States v. Reynolds,
. The plaintiffs have not challenged on appeal either the invocation or the grant of the state secrets privilege and that issue is not before the court. At oral argument, Judge Gilman asked the plaintiffs' counsel if the court should remand for further fact-finding in support of standing. Counsel asserted that the plaintiffs' injuries were clear and undisputed in the record and there was no need to remand for a hearing or admission of additional evidence on this issue. To be sure, the parties dispute the implications of the privilege (i.e., whether the publicly available information about the TSP is sufficient to establish their claims), but it would not be appropriate to inquire, sua sponte, into the propriety of the NSA’s invocation of the privilege, the district court's grant of the privilege, or the scope of the privilege granted.
The government provided the district court an opportunity to review certain, secret documents, in camera and under seal, as support for the invocation of the state secrets privilege. The government provided each member of this panel with an opportunity to review those same documents, also in camera and under seal, in order to provide a complete district-court record on appeal. Finally, the government provided each member of this panel an opportunity to review, in camera and under seal, certain additional, privileged documents as support for the government’s contention that the appeal had been rendered moot. See fn. 4, infra. At the behest of the government, I reviewed these privileged documents, but their contents — being privileged— are excluded from our consideration and I have not relied on any of that information in this opinion. The state secrets privilege granted by the district court has been maintained on appeal and this opinion is decided solely on the publicly available information that was admitted by the district court and made a part of its record.
. On January 10, 2007, "a Judge of the Foreign Intelligence Surveillance Court issued orders authorizing the government to target for collection international communications into or out of the United States where there is probable cause to believe that one of the communicants is a member or agent of al Qaeda or an associated terrorist organization.” Letter from Att’y Gen. Alberto Gonzales to Chair, of the Comm, on the Judiciary Patrick Leahy (Jan. 17, 2007), available at http://graphics8.nytimes.com/packages/pdP politics/20060117gonzales_Letter.pdf (last visited July 2, 2007). According to a letter written by the Attorney General, "any electronic surveillance that was occurring as part of the [TSP] will now be conduct subject to the approval of the Foreign Intelligence Surveillance Court.” Id. The NSA filed a submission with this court, discussing the implication of the intervening FISA Court order and contending that the case should be dismissed as moot. The plaintiffs filed a response, disputing any notion that this appeal had been rendered moot by the FISA Court order. Based on the analysis presented herein, it is unnecessary to reach the issue of intervening mootness. See Friends of the Earth, Inc. v. Laidlaw Envtl. Servs., Inc.,
. On the merits of this appeal, this court is presented with a cascade of serious questions. Has the NSA violated the United States Constitution — -the First Amendment, the Fourth Amendment, or the Separation of Powers Doctrine? Or, has the NSA violated federal statute — the APA, FISA, or Title III? If the NSA has violated a federal statute, is that
. "[A] plaintiff must demonstrate standing separately for each form of relief sought.” Laidlaw,
. After argument on this appeal, the plaintiffs filed a citation to supplemental authority, urging us to rely on the Supreme Court's recent decision in Massachusetts v. EPA, 549 U.S. -,
. The plaintiffs, in the plain language of their complaint, actually assert only one statutory cause of action, predicated on the APA, 5 U.S.C. § 702 (2000). They claim that the NSA violated the "substantive provisions” of FISA and Title III, and contend that this establishes standing for an APA cause of action even if they cannot establish standing to litigate a cause of action under either FISA's or Title Ill's civil suit provisions (i.e., under the relevant statutes). Because the APA itself has no applicability in the present circumstances, See Section IV.B.l, the plaintiffs' references to FISA and Title III are construed liberally in this opinion, as assertions of independent causes of action under each, to consider whether the plaintiffs had standing to litigate their case despite the possible inartfulness of their pleading.
. This injury, as alleged, actually appears to implicate the Fifth or Sixth Amendments, see, e.g., United States v. Robel,
. Some plaintiffs appear to describe this injury as an untenable choice, in which they must decide between their "professional duty” (i.e., completing the job) and complying with their ethical duties. Even accepting, ar-guendo, that these plaintiffs are bound by these duties, this description is incorrect. While these circumstances demand that the plaintiffs comply with both obligations, this dual compliance is "tenable”; compliance with both obligations will simply be more costly, time consuming, and burdensome. The obligations are not conflicting or mutually exclusive. The choice is actually between paying the cost of this dual compliance or not completing the job, and therefore, the "injury” is the added cost of completing the job, in compliance with the ethical duties, under the present circumstances.
. At oral argument, the plaintiffs' counsel conceded that it would be unprecedented for a court to find standing for a person to litigate a Fourth Amendment cause of action without any evidence that the defendant (i.e., government) had actually subjected that particular person to an illegal search or seizure. The plaintiffs’ briefs are not to the contrary.
. As will be discussed in Section IV.A.l, however, she could not — under this scenario — establish standing to litigate a First Amendment cause of action. See Laird v. Tatum,
. Note that a legal determination of objective reasonableness would require additional specific information about the mechanics of the TSP, such as the number of communications being intercepted, the percentage of the total that number represents, the actual selection and screening process, the actual retention, dissemination, and disclosure policy, etc. This information is unavailable due to the State Secrets Doctrine. See Reynolds,
. To clarify: If the plaintiffs and their overseas contacts were to proceed with the telephone and email communications, in disregard of the TSP (thereby incurring no additional cost, burden, or diminution of professional performance), and none of their communications were ever actually intercepted by the NSA, then there would be no injury to these plaintiffs due to the NSA's conduct. Under this scenario, even if the NSA, unbeknownst to the plaintiffs, did intercept a communication, there would be no tangible injury until the NSA disclosed the information (presumably in a manner demonstrating a direct injury to the plaintiffs or their contacts). Therefore, it is only by refraining from the communications that the plaintiffs can transmute a speculative future injury into an actual present injury.
. See Gordon v. Warren Consol. Bd. ofEduc.,
. See Section IV.A.2 (citing Rakas v. Illinois,
. At oral argument, the plaintiffs’ counsel conceded that it would be unprecedented for a court to find standing for a person to litigate a Fourth Amendment cause of action without any evidence that the defendant (i.e., government) had actually subjected that particular person to an illegal search or seizure. The plaintiffs’ briefs are not to the contrary.
. See, e.g., Eisenstadt v. Baird,
. Sierra Club twice acknowledges that courts reach this analysis only where it is determined that the controversy at issue is "other
. There is, in fact, a certain view that this is not a First Amendment issue at all. See Gordon v. Warren Consol. Bd. of Educ.,
. Laird involved a First Amendment claim. I do not assert or imply that Laird's holding, which I narrowly construe as regarding only a subjective chill on First Amendment rights, extends to any other causes of action.
. As discussed in Section II, this scenario could result in a breach of the plaintiffs' privacy under the Fourth Amendment, but the present analysis concerns only the First Amendment cause of action. The Fourth Amendment, and harms attributable to a defendant’s breach of its protections, necessitate a different analysis. See Section IV.A.2.
. The plaintiffs who are lawyers take this argument one step further, alleging that their concerns render them incapable of communicating with their clients and others, which their duty of zealous representation to these clients demands. Because they assume with their "well founded belief” that their communications will be intercepted, they assert that knowingly engaging in such communications would breach their duty to keep those communications confidential. Therefore, they argue, their professionally imposed ethical obligations make the alleged effects more acute. As a lawyer, I am certainly mindful of these concerns, but I cannot escape the fact that they are premised on the plaintiffs' duties to their clients, and not on a personal harm to themselves. A client, after all, can waive such confidentiality, and if a fully informed overseas client who does not fear the NSA chooses to communicate with full awareness that the NSA might be listening, then the lawyer would not breach any duty by engaging in such communication.
. In fact, the plaintiffs are claiming that the NSA's surveillance (coupled with their own ethical obligations) has chilled them from making international calls to sources and clients, as has been discussed throughout this opinion thus far. The district court simply misunderstood the extent of the plaintiffs' claims.
. In finding an injury on this theory — the unwillingness of the plaintiffs’ overseas contacts to communicate due to their fear that the NSA is eavesdropping — the district court relied on affidavits submitted by several of the individual plaintiffs. None of the overseas contacts provided an affidavit or testimony of their alleged fear; the theory is based solely on the plaintiffs’ own testimony, which is self-serving and may be inadmissible as hearsay. Ultimately, however, the questionable character of this evidence has no bearing on this injuiy-in-fact analysis, because the outcome is the same even if I assume it to be true.
. But see the discussion of the causation element in this First Amendment analysis, infra, regarding the difficulties of obtaining standing based on the conduct of third-party actors.
. The plaintiffs have not claimed membership in any overriding "organization” that would include the plaintiffs and the overseas contacts. There has been no suggestion that the plaintiff journalists, academics, or lawyers are members of al Qaeda, or that their overseas contacts — presumably suspected by the NSA of being al Qaeda operatives or affiliates — are (or desire to be) members of some organization of American journalists, academics, or lawyers.
.Certain plaintiffs are organizations (American Civil Liberties Union, Council on American Islamic Relations, Greenpeace) and it is therefore possible that these plaintiffs, on a different record, might assert organizational injury.
. The well-known Fourth Amendment warrant requirement involves interjection of a neutral and detached magistrate, demonstration of probable cause, and description of the things to be seized or the place to be searched. See Dalia v. United States,
. FISA’s applicability (i.e., the plaintiffs’ standing to bring a cause of action under FISA) is addressed separately in Section IV. B.3, infra. The present discussion, which concerns only the plaintiffs’ assertion that their First Amendment injuries are caused by the NSA’s failure to comply with FISA (or would be redressed by imposing FISA’s requirements), assumes FISA’s applicability and does not address standing vis a vis a FISA cause of action.
. FISA does not necessarily prohibit even the interception of attorney-client communications. Because FISA states that "[n]o otherwise privileged communication obtained in accordance with [FISA] shall lose its privileged character,” 50 U.S.C. § 1806(a), it therefore follows that FISA, at least in some instances, authorizes the interception of privileged communications, which presumably includes communications between attorney and client. For example, FISA might not prohibit the interception of attorney-client communications under circumstances where the NSA adheres to a policy of complete non-disclosure. Due to the State Secrets Doctrine, the plaintiffs do not (and cannot) know whether the NSA actually adheres to a policy of complete non-disclosure, but based on the record evidence, it certainly remains possible. The plaintiffs have never alleged, nor is there evidence in the present record to suggest, that the information collected by the NSA under the TSP has been disclosed to anyone for any purpose. See ACLU v. NSA,
. The plaintiffs' prospective inability to assert that any of their personal communications have been intercepted is due to the State Secrets Doctrine. See Reynolds, 345 U.S. at ' 10,
. The plaintiffs’ prospective inability to assert that any of their personal communications have been intercepted is due to the State Secrets Doctrine. See Reynolds,
. Raines stands for the proposition that Congress cannot enact a statute that directly grants standing to a plaintiff who otherwise does not satisfy the Article III requirements. But Raines does not indicate that Congress cannot provide standing indirectly by enacting a statute that creates a new legal interest, “the invasion of which will confer standing.” See Simon,
. The Supreme Court first announced the zone-of-interest test in a case involving the APA, stating that "[t]he question of standing ... concerns ... whether the interest sought to be protected by the complainant is arguably within the zone of interest to be protected or regulated by the statute or constitutional guarantee in question.” Ass'n of Data Processing Serv. Orgs., Inc. v. Camp,
. Admittedly, this provision is seldom considered from the present viewpoint, and is generally considered as merely the means by which Congress waived sovereign immunity in actions seeking relief other than money damages. See Presbyterian Church,
. It is noteworthy that the plaintiffs' APA claim fails for an additional reason. To the extent the plaintiffs rely on the APA provision allowing judicial review for “final agency action for which there is no other adequate remedy in a court,” See 5 U.S.C. § 704 (emphasis added), they must demonstrate that the alleged agency action is "final.” "As a general matter, two conditions must be satisfied for agency action to be 'final.' " Bennett,
. This third clause is discussed in further detail in Section IV.B.4, infra, titled "The Exclusivity Provision."
. Even assuming, arguendo, that Title III applies to the NSA's internationally focused surveillance activities, the plaintiffs cannot maintain the action for relief brought in this case. Title III prescribes equitable relief in only a few instances, none of which applies here. Two provisions in Title III authorize injunctive relief for claims brought by the government. See, e.g., 18 U.S.C. § 2521 ("the Attorney General may initiate a civil action ... to enjoin” a violation of Title III); § 251 l(5)(a)(ii)(A) ("the Federal Government shall be entitled to appropriate injunctive relief” when a “person” violates 18 U.S.C. § 2511(5)). Because the plaintiffs are not representatives of or otherwise affiliated with the federal government, neither of these provisions permits injunctive relief in this case. Another Title III provision authorizes "any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of [Title III]” to ‘ recover declaratory or equitable relief from a "person or entity, other than the United States, which engaged in that violation.” 18 U.S.C. § 2520(a) (emphasis added). This provision does not help the plaintiffs because under these provisions neither declaratory nor in-junctive relief is available against the United States government and the plaintiffs cannot prove interception.
. FISA defines "electronic surveillance” in exactly four ways:
(1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes;
(2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511 (2)(i) of title 18, United States Code;
(3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or
(4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.
50 U.S.C. § 1801(f). The present record, which contains three facts regarding the TSP, offers no indication as to where the interception may occur or where any surveillance device is located. Nor does it offer any basis to conclude that particular people located in the United States are being targeted.
. This, of course, begs the question of why Congress would define "electronic surveillance” — in four explicit ways — if, as the plaintiffs contend, a demonstration that the interception is "electronic surveillance” is unnecessary.
. Even assuming, arguendo, that Laidlaw assists in establishing a cognizable and concrete injury, the obstacles to causation and redress-ability present here were absent there. Moreover, Laidlaw’s redressability analysis is entirely inapplicable to the present case. The redressability analysis in Laidlaw considered whether civil penalties paid to the government, rather than the plaintiffs, could redress the plaintiffs’ alleged injuries. Laidlaw,
. Although Judge Batchelder clearly disagrees about the depth of treatment required, at least with respect to the plaintiffs’ constitutional claims and FISA claim, she appears to agree that the plaintiffs' failure to demonstrate that they have been subject to the TSP is fatal to their constitutional standing. (See Batchelder Op. 658-59 (discussing all the claims generally and FISA specifically); id. at 661-62, 667 (First Amendment); id. at 673 (Fourth Amendment); id. at 674 (Separation of Powers).) We may differ, however, with respect to the plaintiffs' other statutory claims because Judge Batchelder determines that the statutes do not apply without reaching the issue of constitutional standing. My reading of Supreme Court precedent suggests that we must reach the constitutional standing issue first with respect to all the claims. See Steel Co. v. Citizens for a Better Env’t,
Concurrence Opinion
concurring.
The disposition of all of the plaintiffs’ claims depends upon the single fact that the plaintiffs have failed to provide evidence that they are personally subject to the TSP. Without this evidence, on a motion for summary judgment, the plaintiffs cannot establish standing for any of their claims, constitutional or statutory.
The case or controversy requirement in Article III of the Constitution determines the power of the federal courts to entertain a suit, establishing an “irreducible constitutional minimum of standing” that is required for both constitutional and statutory claims. See Lujan v. Defenders of Wildlife,
Judge Gilman’s opinion arrives at the opposite conclusion, relying exclusively on its reading of Laidlaw. It concludes that the attorney-plaintiffs need not show that they have ever been or will ever be actual subjects of surveillance but rather only the “reasonableness of their fear” that they will be subjects of surveillance. (Gilman Op. 697, 704.) In doing so, Judge Gilman transforms the holding in Laidlaw, under which the plaintiffs who were in fact subject to defendant’s conduct had standing because they reasonably feared harm from that conduct, into a much broader proposition, under which plaintiffs may establish standing by showing merely that they possess a reasonable fear of being subject to defendant’s allegedly harmful conduct. This distinction is critical to “[t]he relevant showing for purposes of Article III standing, ... injury to the plaintiff,” Laidlaw,
The Laidlaw majority’s discussion of Lyons and its observations about the Laidlaw plaintiffs explain exactly why plaintiffs here are like the plaintiff in Lyons, who lacked standing, and unlike those in Laidlaw, who had standing. Like the plaintiffs in Laidlaw and Lyons, the plaintiffs in the present case may have a reasonable fear of harm from the defen
Judge Gilman’s attempt to distinguish Lyons from the case at bar is directly contrary to the Supreme Court’s own reading of that case. It is immaterial that the likelihood that Lyons would be subject to the chokehold policy may be far more remote than the likelihood that the attorney-plaintiffs in this case may be subject to the warrantless surveillance policy. (See Gil-man Op. 698-99.) As Laidlaw makes clear, a plaintiff must be actually subject to the defendant’s conduct, not simply afraid of being subject to it, regardless of how reasonable that fear may be. The Supreme Court’s distinction between Laid-law and Lyons was one of kind, not degree. See Laidlaw, 528 U.S. at .184,
Judge Gilman attempts to distinguish United Presbyterian Church on its facts by confounding the different injuries alleged in that case. The plaintiffs in that case alleged three different kinds of injuries: (1) “the ‘chilling’ of constitutionally protected activities,” United Presbyterian Church,
Unlike the plaintiffs in United Presbyterian Church and this ease, in every case cited by Judge Gilman in which standing was found, the plaintiff was clearly subject to conduct of the defendant about which the plaintiff complained. See Meese v. Keene,
In applying any understanding of constitutional standing, it is important to recognize the burden of proof required. “The party invoking federal jurisdiction bears the burden of establishing the[ ] elements” of standing. Defenders of Wildlife,
Under any understanding of constitutional standing, the plaintiffs afe ultimately prevented from establishing standing because of the state secrets privilege.
. This is not to say that a plaintiff lacks standing until a defendant has acted. A "genuine threat” of enforcement of a policy against a plaintiff who is demonstrably subject to that policy supports standing. See Steffel v. Thompson,
. Judge Batchelder's decision does not discuss the implications of the state secrets privilege because, under her reading of Laird v. Tatum,
It is not clear to me that Laird must be read this way. The language in Laird about regulation, proscription, and compulsion to me seems merely descriptive of the facts in prior cases in which the Supreme Court had found standing. Laird could be read as holding that when the only harm alleged is chilled speech, then the exercise of governmental power must be regulatory, proscriptive, or compulsory in nature. See Laird,
In any event, even under Judge Batchel-der’s reasoning, the state secrets privilege plays a prominent role that must be acknowledged. Because of the state secrets privilege, the plaintiffs are unable to conduct discovery to determine if information from the TSP is used in such a way as to satisfy the requirements that Judge Batchelder finds in Laird.
. Judge Gilman's opinion does not dispute the majority opinion’s contention that the plaintiffs' standing would be undermined if the NSA hypothetically adhered to a policy of complete nondisclosure, but rather criticizes the analysis as speculation. (Gilman Op. 705.) It correctly notes that we cannot know whether such a policy exists “[ajbsent a public revelation from the NSA.” (Gilman Op.
Dissenting Opinion
dissenting.
My colleagues conclude that the plaintiffs have not established standing to bring their challenge to the Bush Administration’s so-called Terrorist Surveillance Program (TSP). A fundamental disagreement exists between the two of them and myself on what is required to show standing and whether any of the plaintiffs have met that requirement. Because of that disagreement, I respectfully dissent. Moreover, I would affirm the judgment of the district court because I am persuaded that the TSP as originally implemented violated the Foreign Intelligence Surveillance Act of 1978 (FISA).
I. ANALYSIS
A. Procedural posture
This case comes to us in a relatively unique procedural posture. In the district court, the plaintiffs moved for partial summary judgment. They filed a statement of undisputed facts in support of that motion. The government then filed its own motion to dismiss or, in the alternative, a motion for summary judgment. In this motion, the government asserted that the plaintiffs could not establish standing and that the state-secrets privilege barred their claims. But the government did not contest the plaintiffs’ statement of undisputed facts or provide its own statement of undisputed facts. The district court was therefore bound by the requirements of Rule 56(e) of the Federal Rules of Civil Procedure, which provides as follows:
When a motion for summary judgment is made and supported as provided in this rule, an adverse party may not rest upon the mere allegations or denials of the adverse party’s pleading, but the adverse party’s response, by affidavits or as otherwise provided in this rule, must set forth specific facts showing that there is a genuine issue for trial. If the adverse party does not so respond, summary judgment, if appropriate, shall be entered against the adverse party.
After reviewing the affidavits and related supporting material submitted in support of the plaintiffs’ motion, the district court found that they had set forth the necessary facts to meet the prerequisites for standing. The court then considered the plaintiffs’ claims on the merits and granted their motion as to all but their datamining claim.
Despite this procedural posture, the lead opinion asserts that the record presently before us contains only “three publicly acknowledged facts about the TSP — (1) it eavesdrops, (2) without warrants, (3) on international telephone and email communications in which at least one of the parties is a suspected al Qaeda affiliate.”
B. Standing
1. Injury in fact
Article III of the U.S. Constitution “requires the party who invokes the court’s authority to show that he personally has suffered some actual or threatened injury as a result of the putatively illegal conduct of the defendant.” Valley Forge Christian Coll. v. Ams. United for Separation of Church & State, Inc.,
Moreover, as the lead opinion acknowledges, only one plaintiff need establish standing to satisfy Article Ill’s ease-or-controversy requirement. Mass. v. Envtl. Prot. Agency, — U.S. -,
The lead opinion criticizes the attorney-plaintiffs for asserting multiple causes of action despite “hav[ing] one claim,” but this is hardly a “ruse,” whether “perfectly acceptable” or not as the lead opinion would have it. Lead Op. at 657. The Supreme Court’s recent decision in DaimlerChrysler Corp. v. Cuno, — U.S.-,
I now return to the first element of the standing analysis. Despite the willingness of the lead opinion to assume that the attorney-plaintiffs’ asserted injuries could be “deemed adequate to state an injury in fact,” Lead Op. at 666, its analysis sug
The attorney-plaintiffs assert a claim for the injuries flowing from the failure of the TSP to comply with FISA’s requirements that “minimization procedures” be utilized to protect privileged communications— such as between attorneys and their clients — from interception or, if intercepted, from subsequent disclosure. Contrary to the lead opinion’s characterization of the attorney-plaintiffs’ assertions, the harm alleged here in fact “causes the plaintiffs to refrain from” potentially harmful conduct. Lead Op. at 656. I find that the distinction the lead opinion attempts to draw between a harm that causes an injury and a harm that results from an injury is ultimately unpersuasive. To my mind, the attorney-plaintiffs have articulated an actual or imminent harm flowing from the TSP.
The lead opinion’s contrary view is largely based on its reading of the D.C. Circuit's interpretation of Laird; namely, that “a plaintiff must establish that he or she is regulated, constrained, or compelled directly by the government’s actions, instead of by his or her own subjective chill.” Lead Op. at 661 (citing Laird
On appeal, the government contends that any litigation about the TSP must be premised on the three general facts that the government has publicly disclosed: (1) the TSP exists, (2) it operates without warrants, and (3) it intercepts “only communications that originate or conclude in a foreign country, and only if there are reasonable grounds to believe that a party to the communication is affiliated with al Qae-da.” According to the government, the plaintiffs cannot demonstrate that they were actually targets of the TSP and thus-cannot show more than a “subjective chill” on their activities. The government asserts that the plaintiffs cannot establish standing because the state-secrets privilege prevents us from testing the plaintiffs’ allegations that they have been or likely will be subject to surveillance under the TSP. Moreover, the government argues that the plaintiffs improperly seek to assert the rights of third parties, such as their overseas contacts, clients, and
The attorney-plaintiffs respond that they have suffered concrete, particularized injuries as a result of the TSP. Specifically, they contend that the TSP puts them in the position of abrogating their duties under applicable professional-responsibility rules if they communicate with clients and contacts via telephone or email. The TSP, in short, allegedly prevents them from doing their jobs. Specifically, the attorney-plaintiffs contend that they have had to travel internationally for face-to-face meetings at a significant expense in terms of time and money. They claim that then-ability to conduct research and factfinding has been limited, if not entirely thwarted, as a result.
The attorney-plaintiffs, as part of then-representation of clients accused of being enemy combatants or of providing aid to organizations designated as terrorist groups, declare that they have conducted internet research on terrorism, religion, politics, and human-rights issues in parts of the Middle East and South Asia. They further state that they have reviewed web sites where topics including jihad, kidnapping, and other terrorist acts are discussed. As part of their work on behalf of their clients, these attorneys have communicated with potential witnesses, experts, lawyers, and other individuals who live and work outside the United States about subjects such as terrorism, jihad, and al-Qae-da. The attorney-plaintiffs contend that because of the TSP, they have ceased telephone or email communications about substantive issues with their overseas contacts. This is because the TSP, unlike FISA, provides no minimization procedures to protect attorney-client communications.
Under FISA, an application for an order authorizing surveillance must include a description of the minimization procedures that will be utilized to protect privileged communications. 50 U.S.C. § 1804(a)(5). “Minimization procedures” are “specific procedures ... that are reasonably designed ... to minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons.” 50 U.S.C. § 1801(h)(1); see also 50 U.S.C. §§ 1801(h)(2)-(4) (providing a further definition of the term). Privileged communications remain such under FISA. 50 U.S.C. § 1806(a) (“No otherwise privileged communication obtained in accordance with, or in violation of, the provisions of this subchapter shall lose its privileged character.”); id. § 1806(h).
As noted above, the lead opinion finds that Laird controls this case. Lead Op. at 664-65. Although the lead opinion then asserts that it limits its application of Laird to only the attorney-plaintiffs’ First Amendment claim, its analysis suggests otherwise. Laird addressed the question of “whether the jurisdiction of a federal court properly may be invoked by a complainant who alleges that the exercise of his First Amendment rights is being chilled by the mere existence, without more, of a governmental investigative and data-gathering activity that is alleged to be broader in scope than is reasonably necessary for the accomplishment of a valid governmental purpose.”
I believe that the attorney-plaintiffs here allege a distinct set of facts that is legally distinguishable from those set forth in Laird. Unlike in the present case, the Laird plaintiffs simply articulated “speculative apprehensiveness that the Army may at some future date misuse the information in some way that would cause direct harm to [them].”
In contrast to Laird, the attorney-plaintiffs here complain of specific present harms, not simply of some generalized fear of the future misuse of intercepted communications. The TSP forces them to decide between breaching their duty of confidentiality to their clients and breaching their duty to provide zealous representation. Neither position is tenable. The attorney-plaintiffs must travel to meet in person with clients and sources in order to avoid the risk of TSP surveillance. Unlike the situation in Laird, the attorney-plaintiffs in the present case allege that the government is listening in on private person-to-person communications that are not open to the public. These are communications that any reasonable person would understand to be private. The attorney-plaintiffs have thus identified concrete harms to themselves flowing from their reasonable fear that the TSP will intercept privileged communications between themselves and their clients.
To survive the government’s standing-to-sue challenge, the attorney-plaintiffs do not have to demonstrate that their past communications have in fact been intercepted by the TSP. In Laidlaw, for example, the Supreme Court found that environmental groups had standing to sue a polluter where their members declared “that they would use the nearby North Tyger River for recreation if Laidlaw were not discharging pollutants into it.”
A similar conclusion was reached by the Fourth Circuit in Friends of the Earth, Inc. v. Gaston Copper Recycling Corp.,
Both the Laidlaw and the Gaston Copper plaintiffs asserted more than “a mere academic or philosophical interest,” Gaston Copper,
The concurring opinion also criticizes my interpretation of Laidlaw, describing it as “transforming] the holding” in that case. Concurring Op. at 689. I do not believe that this characterization holds up under scrutiny. In discussing the case, the concurring opinion describes the Laidlaw plaintiffs as “in fact subject to defendant’s conduct” of discharging pollutants in excess of permitted amounts into the North Tyger River. Id. (emphasis omitted). The Supreme Court, to be sure, noted that “it is undisputed that Laidlaw’s unlawful conduct ... was occurring,” but nonetheless found nothing “improbable about the proposition that a company’s continuous and pervasive illegal discharges of pollutants into a river would cause nearby residents to curtail their recreational use of that waterway and would subject them to other economic and aesthetic harms.” Laidlaw,
The concurring opinion then argues, in reference to the Laidlaw plaintiffs, that their “fear of harm from the defendant’s undisputed conduct — conduct that would also undisputably affect plaintiffs personally if they undertook their desired activities — was sufficient to support standing.” Concurring Op. at 689 (emphasis in original). Similarly, the concurring opinion acknowledges that “the plaintiffs in the present case may have a reasonable fear of harm from the defendants’ conduct.” Id. It goes on to state, however, that the attorney-plaintiffs lack standing because they “must be actually subject to the defendant’s conduct, not simply afraid of being subject to it.” Id. Because I believe that the plaintiffs in the present case are “actually subject to the defendant’s conduct” within the meaning of Laidlaw, I respectfully disagree with my colleague’s conclusion.
To my mind, the concurring opinion describes, rather than distinguishes, the situation of the attorney-plaintiffs. The concurring opinion would hold that the attorney-plaintiffs must demonstrate that they have personally been subject to surveillance under the TSP in order to have standing to sue. This is akin to Laid-law’s argument that the plaintiffs should have been required to demonstrate that Laidlaw’s mercury discharge violations caused them to “sustain[] or facet ] the threat of any ‘injury in fact’ from Laid-law’s activities.” Laidlaw,
Both the lead and concurring opinions proceed to analogize the present case to
Pushing the lead opinion’s reasoning still further, the concurring opinion argues that the attorney-plaintiffs “can show nothing more than a fear” of “being subject to a government policy of surveillance.” Concurring Op. at 690. “By contrast, if the Laidlaw plaintiffs had resumed their abandoned activities, they would definitely have been subject to the defendant’s conduct — ■ illegal discharge into the river.” Id. The concurring opinion then asserts that “[t]he Supreme Court’s distinction between Laid-law and Lyons was one of kind, not degree.” Id. But I find no support for this assertion, and my colleague’s reliance on a quotation from Laidlaw for this point strikes me as unpersuasive.
In fact, the Laidlaw plaintiffs were personally affected by the defendant’s conduct whether they used the waterway or not. Nothing in Laidlaw required that the plaintiffs demonstrate that they were all equally likely to be affected by the pollutants, that the pollutants were evenly dispersed through the waterway, or that a plaintiff swimming in the river was more likely than a plaintiff canoeing on the river to be injured. All that was required was that they demonstrate that, given Paid-law’s undisputed conduct, they possessed a reasonable fear of harm. This holds equally true for the attorney-plaintiffs in the present case. The existence of the TSP is undisputed and these plaintiffs are personally affected by the TSP whether they engage in targeted communications or not. In sum, I believe that the distinction between Laidlaw and Lyons is in fact one of degree, and that the attorney-plaintiffs here occupy a position far closer to the former than to the latter.
The other case to which the lead opinion analogizes the present suit is United Presbyterian Church v. Reagan,
In dismissing the complaint, the D.C. Circuit followed Laird in concluding that the plaintiffs had alleged no more than a subjective chill. Id. at 1378-81. The facts in the present case are substantially different, however, with even the concurring opinion acknowledging that “[h]ere the plaintiffs’ professional injuries are arguably a harm beyond chilled speech.” Concurring Op. at 692 n. 3. To be sure, several of the groups in United Presbyterian Church claimed that they had experienced direct injury, such as interception of their mail, disruption of their events, and infiltration of their meetings. United Presbyterian Church,
Here, in contrast, the attorney-plaintiffs have provided a connection between their injury and the TSP. Specifically, officials in the Bush Administration have publicly stated that the TSP involves “intercepts” of “international calls” and “communications” where the government “ha[s] a reasonable basis to conclude that one party to • the communication is a member of al Qae-da, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.” Press Briefing by Alberto Gonzales, Att’y Gen., and Gen. Michael Hayden, Principal Deputy Dir. for Nat’l Intelligence (Dec. 19, 2005), http://www.whitehouse.gov/news/ releases/2005/12/print/20051219-l.html. These are exactly the types of clients that the attorney-plaintiffs represent. The TSP therefore constitutes a “genuine threat” of harm to the attorney-plaintiffs, see Steffel v. Thompson,
A number of cases have distinguished Laird in situations such as this where the plaintiffs have suffered professional injuries. In Mee se v. Keene,
Another example is Ozonojf v. Berzak,
A final example comes from the Third Circuit case of Patón v. LaPrade,
The lead opinion attempts to distinguish these cases and others like them on the basis that they challenged the “regulatory, proscriptive, or compulsory” exercise of governmental power to which the complainants were presently or prospectively subject. Lead Op. at 660 (quoting United Presbyterian Church,
What I believe distinguishes Meese, Ozo-noff, Patón, and the like from Laird is that the plaintiffs in the first-named cases successfully explained the “precise connection between the mere existence of the challenged system and their alleged chill.” Laird,
Finally, the concurring opinion would find that the state-secrets privilege prevents the attorney-plaintiffs from establishing an injury in fact. Concurring Op. at 692 (“[T]he state secrets privilege has prevented the plaintiffs from conducting discovery that might allow them to establish that they are personally subject to the TSP, as I believe constitutional standing requires.”). But this reading expands the
The privilege is typically invoked with respect to specific requests for discovery. See, e.g., Jabata v. Kelley,
But unlike in Jabata or Tenenbaum, the attorney-plaintiffs here seek no additional discovery from the defendants. Instead, the attorney-plaintiffs argue that they have established standing based on the facts in the public record. This issue highlights what I believe to be the key difference between the lead and concurring opinions on the one hand and my opinion on the other. My colleagues believe that the attorney-plaintiffs must establish that they were actually subject to surveillance under the TSP, whereas I conclude that a demonstration of a reasonable, well-founded fear that has resulted in actual and particularized injury suffices. My reading of the caselaw leads me to conclude that the state-secrets privilege is not so broad as to bar the attorney-plaintiffs from making such a showing.
In short, the critical question in this case is not whether the attorney-plaintiffs have actually been surveilled — because, as the lead opinion aptly notes, a wiretap by its nature is meant to be unknown to its targets — but whether the “reasonableness of the fear” of such surveillance is sufficient to establish that they have suffered actual, imminent, concrete, or particularized harm from the government’s alleged unlawful action. See Laidlaw,
2. Causation
The plaintiffs must next demonstrate a causal connection between the injury asserted and the government’s alleged conduct. This means that “a federal court [can] act only to redress injury that fairly can be traced to the challenged action of the defendant, and not ... that results from the independent action of some third party not before the court.” Simon v. E. Ky. Welfare Rights Org.,
In the present case, the lead opinion finds that the attorney-plaintiffs have failed to establish causation due to its characterization of their “two causal pathways based on the two types of alleged
Based upon my reading of the complaint and the subsequent motion for partial summary judgment, I believe that the lead opinion has miseharacterized the attorney-plaintiffs’ allegations. What the attorney-plaintiffs themselves allege, in fact, is that the existence of the TSP outside of FISA’s minimization procedures has prevented them from communicating by telephone and by email with their clients, contacts, and sources, thus either compelling them to violate their ethical obligations, or requiring them to undertake costly overseas trips; in short, the TSP has prevented them from doing their jobs. In response, the lead opinion asserts that “there is no evidence in the record from which to presume that the NSA is not complying with, or even exceeding, FISA’s restrictions on the acquisition, retention, use, or disclosure of [the information acquired] (i.e., FISA’s minimization techniques).” Lead Op. at 669.
This unsupported assertion is belied by statements on the public record from Executive Branch officials. With respect to the acquisition of information, the TSP has been described as having a “softer trigger” than FISA, Press Briefing by Alberto Gonzales, Att’y Gen., and Gen. Michael Hayden, Principal Dep’y Dir. for Nat’l Intel. (Dec. 19, 2005), http://www.whitehouse. gov/news/releases/2005/12/print/20051219l.html, and one that uses a “reasonable belief’ standard rather than FISA’s probable cause standard for surveillance. See Remarks by Gen. Michael V. Hayden, Principal Dep’y Dir. of Nat’l Intel., Address to the Nat’l Press Club, Jan. 28, 2006, http://www.dni.gov/speeches/ 20060123_speech.htm. A senior official in the Department of Justice further informed Congress in 2006 that, “[although the [TSP] does not specifically target the communications of attorneys or physicians, calls involving such persons would not be categorically excluded from interception. ...” Letter from William E. Moschel-la, Assistant Att’y Gen., to the Honorable F. James Sensenbrenner, Jr. (Mar. 24, 2006), at 55, http://www.fas.org/irp/agency/ doj/fisa/doj032406.pdf.
To be sure, the Bush Administration has also asserted that “procedures are in place to protect U.S. privacy rights, including applicable procedures required by Executive Order 12333 and approved by the Attorney General, that govern acquisition, retention, and dissemination of information relating to U.S. persons.” Id. A review of this Executive Order, however, reveals that it makes no mention of protecting privileged communications. See Exec. Or
Which characterization of injury one accepts will largely determine the causation prong (as well as the redressability prong discussed below) of the standing analysis. As one distinguished commentator has noted,
[t]he central problem in the causation cases is not whether there is a causal nexus among injury, remedy, and illegality; it is how to characterize the relevant injury. Whether the injury is due to the defendant’s conduct, or likely to be remedied by a decree in his favor, depends on how the injury is described.
Cass R. Sunstein, Standing and the Privatization of Public Law, 88 Colum. L.Rev. 1432, 1464 (1988).
The lead opinion focuses primarily on the lack of evidence that “the NSA has actually intercepted (or will actually intercept) any of [the plaintiffs’] conversations,” and on the “the absence of a warrant (and all that goes with it).” Lead Op. at 667 (footnote and emphasis omitted). But as I discussed earlier in Part I.A.I., the attorney-plaintiffs need show only the reasonableness of their fear, not that their fear has in fact been realized. See, e.g., Laid-law,
Since learning of the existence and operation of the TSP, the attorney-plaintiffs contend that they have ceased communicating by telephone or email about sensitive subjects with their clients and contacts. Whether the potential surveillance is conducted pursuant to a warrant is not the gravamen of their complaint. Their concern is directed at the impact of the TSP on their ability to perform their jobs. The causation requirement does not demand that the government’s conduct be the “sole cause” of the attorney-plaintiffs’ injury, only that the injury be “fairly traceable” to that conduct. See Simon,
3. Redressability
This leaves the issue of whether the attorney-plaintiffs’ injury “will be redressed by a favorable decision.” Laid-law,
FISA might not prohibit the interception of attorney-client communications under circumstances where the NSA adheres to a policy of complete non-disclosure. Due to the State Secrets Doctrine, the plaintiffs do not (and cannot) know whether the NSA actually adheres*705 to a policy of complete non-disclosure, but based on the record evidence, it certainly remains possible.
Lead Op. at 671 n. 31. That proposition, however, is itself speculation, as the lead opinion concedes. Absent a public revelation from the NSA, the attorney-plaintiffs (or anyone else, for that matter) will simply never know whether a nondisclosure policy in fact exists.
In the face of this uncertainty, the attorney-plaintiffs must presume the absence of such a policy. Their ethical obligations require them to do so, lest they run the risk of revealing confidential and possibly incriminating information directly to the government. The reasonable concern about the possibility of disclosure — not the disclosure itself — triggers those- obligations. Similarly, the simple assertion that
[t]he TSP is designed and operated for the prevention of terrorism, and the NSA is interested only in telephone and email communications in which one party to the communication is located outside the United States and the NSA has a ‘reasonable basis to conclude that one party to the communication is a member of[, affiliated with,] or working in support of al Qaeda/
Lead Op. at 671, does not mean that the TSP is not and could not be used to facilitate criminal investigation. Cf. In re Sealed Case,
The lead opinion contends that there is a lack of “evidence in the present record to suggestf ] that the information collected by the NSA under the TSP has been disclosed to anyone for any purpose.” Lead Op. at 671 n. 31. But see AL-Haramain Islamic Found, v. Bush,
The lead opinion’s second point is premised on 50 U.S.C. § 1805(f), which sets forth the emergency-based exceptions to the normal FISA procedures. It cites this subsection for the proposition that “FISA’s general requirement that electronic surveillance may proceed only upon issuance of a FISA Court warrant is not absolute, as FISA provides for instances in which a prior warrant may be unnecessary, at least for a short period of time.” Lead Op. at 671 n. 31. I agree that FISA’s warrant requirement is “not absolute)” But the “warrant requirement” is besides the point. Instead, FISA’s minimization procedures regarding the use of wiretapped information are the only FISA protections that ultimately bear on the redressability prong of the standing analysis in the present ease. The point is that these minimization procedures are “absolute” even though the warrant requirement is not. See 50 U.S.C. § 1805(f) (“If the Attorney General authorizes such emergency employment of electronic surveillance, he shall require that the minimization procedures required by this subchapter for the issuance of a judicial order be followed.”) (emphasis added).
Admittedly, the Supreme Court has furnished little guidance regarding the scope of the redressability inquiry beyond requiring a “‘direct’ relationship between
The Court in Laidlaw found that the plaintiffs had satisfied the redressability prong even though the defendant, during the course of the appeal, had voluntarily ceased the conduct that had initially given rise to the lawsuit.
Deterrence, in short, is an especially appropriate consideration where, as here, the alleged harm is not “wholly past” but, as publicly acknowledged by the government, instead “ongoing at the time of the complaint and ... could continue into the future.” Laidlaw,
The facts alleged by the attorney-plaintiffs here fit this language to a “T.” Each of them “faces the threat” that the TSP will harm them in the future, the TSP was undisputedly ongoing at the time that the attorney-plaintiffs filed their lawsuit, and the district court’s injunction “effectively abates” the TSP and “prevents its recurrence.” The lead opinion’s parting assertion that “[t]he only way to redress the injury would be to enjoin all wiretaps, even those for which warrants are issued and for which full prior notice is given to the parties being tapped,” Lead Op. at 672, provides rhetorical flourish but significantly overstates the attorney-plaintiffs’ allegations. Simply requiring that the Executive Branch conform its surveillance-gathering activities to governing law, including the requirements of FISA, will redress the attorney-plaintiffs’ injury. More is not needed. I therefore conclude that the attorney-plaintiffs have satisfied the redressability prong of the standing analysis.
The attorney-plaintiffs must satisfy the requirements of prudential standing in addition to satisfying the Article III constitutional requirements. Specifically, they must demonstrate that they are asserting their own interests rather than those of a third party, see Allen v. Wright,
a. Generalized grievance and personal interest
Prudential-standing requirements preclude litigation in federal court “when the asserted harm is a ‘generalized grievance’ shared in substantially equal measure by all of a large class of citizens,” or where a plaintiff seeks to “rest his claim to relief on the legal rights or interests of third parties.” Worth v. Seldin,
In the present case, the attorney-plaintiffs have alleged specific and concrete injuries to themselves and to their ability to engage in their professional work due to the operation of the TSP. They allege that they are unable to engage in telephone and email communications with clients and contacts because the identity of those clients and contacts, some of whom have been charged with links to terrorism or terrorist organizations, fall within the ambit of the TSP. Because the government has admitted that the TSP has operated outside of FISA and does not distinguish attorneys from any other person whose telephone or email communications might be under electronic surveillance, the attorney-plaintiffs have been unable, consistent with their ethical responsibilities to their clients and to the bar, to engage in privileged communications. They must instead incur the significant financial and professional burden of traveling to meet in person with clients and contacts.
The TSP has thus injured the attorney-plaintiffs both personally and professionally. For these reasons and for the reasons previously discussed in my analysis of injury in fact in Part I.B.1. above, I conclude that the attorney-plaintiffs are asserting personalized, individual harms rather than generalized grievances or the rights of a third party.
b. Zone of interests
The zone-of-interests test is the other prudential standing requirement that the attorney-plaintiffs must satisfy. They must show that they are arguably within the zone of interests of “a relevant statute.” 5 U.S.C. § 702; Clarke,
In the present case, the attorney-plaintiffs do not raise a cause of action under FISA or under Title III; instead, their cause of action arises under the APA. Under § 702 of the APA, “[a] person suffering legal wrong because of agency action, or adversely affected or aggrieved by agency action within the meaning of a relevant statute, is entitled to judicial review thereof.” 5 U.S.C. § 702. A plaintiff must therefore “identify some agency action that affects him in the specified fashion.” Lujan v. Nat’l Wildlife Fed’n,
The Supreme Court said in Lujan “that to be adversely affected or aggrieved ... within the meaning of a statute, the plaintiff must establish that the injury he complains of ... falls within the zone of interests sought to be protected by the statutory provision whose violation forms the legal basis for his complaint.” Id. (quotation marks omitted). “In determining whether the petitioners have standing under the zone-of-interests test to bring their APA claims, we look not to the terms of the [relevant statute’s] citizen-suit provision, but to the substantive provisions of the [statute], the alleged violations of which serve as the gravamen of the complaint.” Bennett,
FISA includes a civil-liability provision, which states that
[a]n aggrieved person, other than a foreign power or an agent of a foreign power, as defined in section 1801(a) or (b)(1)(A) of this title, respectively, who has been subjected to an electronic surveillance or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of section 1809 of this title shall have a cause of action against any person who committed such violation and shall be entitled to recover [actual and punitive damages and reasonable attorney fees and costs].
50 U.S.C. § 1810. The lead opinion asserts that the attorney-plaintiffs cannot establish that they have a right to sue because they are not “aggrieved persons” under FISA. An “aggrieved person” is defined as “a person who is the target of an electronic surveillance or any other person whose communications or activities were subject to electronic surveillance.” 50 U.S.C. § 1801(k). According to the lead opinion, because the plaintiffs “have not shown that they were actually the target of, or subject to, the NSA’s surveillance,” they cannot establish a cause of action under FISA. Lead Op. at 683.
The attorney-plaintiffs’ challenge, however, is precisely that the TSP has operated outside of FISA despite the fact that Congress has declared FISA to be the “exclusive means” for the government to engage in electronic surveillance for foreign intelligence purposes in this country. 18 U.S.C. § 2511(2)(f). They rely on provisions of FISA and of Title III of the
The lead opinion contends that Title III cannot support standing because the statute provides that “[n]othing contained in this chapter or chapter 121 or 206 of this title, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign communications.” 18 U.S.C. § 2511(2)(f). Lead Op. at 679. But this reading of the statute ignores the remainder of the sentence. In full, section (2)(f) states as follows:
Nothing contained in this chapter or chapter 121 or 206 of this title, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign communications, or foreign intelligence activities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.
(Emphasis added.) In light of the fact that Title III deals only with domestic wiretaps to obtain intelligence information relating to certain specified offenses, See 18 U.S.C. § 2516, the above-quoted subsection makes quite clear that FISA “shall be the exclusive means by which electronic surveillance [for foreign intelligence purposes] ... may be conducted.” Id. (emphasis added).
The lead opinion contends, however, that the “exclusive means” provision of Title III and FISA should be read “as two separate and independent, albeit parallel, statements.” Lead Op. at 683. Accordingly, the lead opinion asserts, “[t]his provision does not foreclose the possibility that the government may engage in certain surveillance activities that are outside of the strictures of both Title III and FISA.” Id. But the lead opinion provides no legal support for this novel statutory interpretation and none is apparent to me. This, in my opinion, flies directly in the face of the plain language of FISA and its legislative history. I note, moreover, that the government announced in January of this year that the TSP would henceforth be conducted under the aegis of the FISA Court of Review.
The language of both the FISA statute and its legislative history is explicit: FISA was specifically drafted “to curb the practice by which the Executive [B]ranch may conduct warrantless electronic surveillance on its own unilateral determination that national security justifies it.” S.Rep. No. 95-604, pt. I, at 8, reprinted at 1978 U.S.C.C.A.N. 3904, 3910; see also id. at 3908. When debating FISA, Congress made clear that it intended to prevent the Executive Branch from engaging in electronic surveillance in the United States without judicial oversight, even during times of war. See S.Rep. No. 95-701, at 47, reprinted at 1978 U.S.C.C.A.N. 3973, 4016 (“This bill will establish the exclusive United States law governing electronic surveillance in the United States for foreign intelligence purposes.”).
Finally, S. 1566 spells out that the Executive cannot engage in electronic surveillance within the United States without a prior judicial warrant. This is accomplished by repealing the so-called executive “inherent pówer” disclaimer clause currently found in section 2511(3) of Title 18, United States Code. S. 1566 provides instead that its statutory procedures (and those found in chapter 119 of title 18) “shall be the exclusive means” for conducting electronic surveillance, as defined in the legislation,- in the United States. The highly controversial disclaimer has often been cited as evidence of a congressional ratification of the President’s inherent constitutional power to engage in electronic surveillance in order to obtain foreign intelligence information essential to the national security. Despite the admonition of the Supreme Court that the language of the disclaimer was “neutral” and did not reflect any such congressional recognition of inherent power, the section has been a major source of controversy. By repealing section 2511(3) and expressly stating that the statutory warrant procedures spelled out in the law must be followed in conducting electronic surveillance in the United States, this legislation ends the eight-year debate over the meaning and scope of the inherent power disclaimer clause.
S.Rep. No. 95-604, pt. I, at 6-7, reprinted at 1978 U.S.C.C.A.N. 3904, 3908. In fact, Congress rejected language that would have made FISA and Title III the “exclusive statutory means” under which electronic surveillance could be conducted, instead adopting language that made those statutes simply the “exclusive means ” governing such surveillance. See H.R.-Conf. Rep. No. 95-1720, at 35, reprinted at 1978 U.S.C.C.A.N. 4048, 4064 (emphasis added).
More to the point, the government has publicly admitted that the TSP has operated outside of the FISA and Title III statutory framework, and that the TSP engages in “electronic surveillance.” Press Briefing by Alberto Gonzales, Att’y Gen., and Gen. Michael Hayden, Principal Deputy Dir. for Nat’l Intelligence (Dec. 19, 2005), http://www.whitehouse.gov/news/releases/ 2005/12/print/20051219-l.html (General Hayden: “I can say unequivocally that we have used this program in lieu of [the FISA processes] and this program has been successful.”). In January of 2007, in fact, the Bush Administration announced that it had reached a secret agreement with the Foreign Intelligence Surveillance Court (FISC) whereby the TSP would comply with FISA, a further acknowledgment that the TSP had previously been operating without FISA approval. See Letter from Alberto Gonzales, Att’y Gen., to the Honorable Patrick Leahy & the Honorable Arlen Specter (Jan. 17, 2007), at 1 (“[A]ny electronic surveillance that was occurring as part of the Terrorist Surveillance Program will now be conducted subject to the approval of the Foreign Intelligence Surveillance Court.”), http:// leahy.senate.gov/press/200701/1-17-07% 20 AG% 20to% 20PJL% 20Re% 20FISA% 20 Court.pdf; see also Dan Eggen, Spy Court’s Orders Stir Debate on Hill, Wash. Post, Jan. 19, 2007, at A06 (reporting on the reaction to the Bush administration’s announcement “that it will dismantle the controversial counterterrorism surveillance program run by the National Security Agency and instead conduct the eavesdropping under the authority of the secret Foreign Intelligence Surveillance Court, which issues warrants in spy and terrorism cases”).
The lead opinion, however, repeats the government’s assertion that none of the
Moreover, the government’s contention lacks merit. The Attorney General has publicly acknowledged that FISA “requires a court order before, engaging in this kind of surveillance ... unless otherwise authorized by Congress.” Press Briefing by Alberto Gonzales, Att’y Gen., and Gen. Michael Hayden, Principal Dep’y Dir. for Nat’l Intel. (Dec. 19, 2005), http:// www.whitehouse.gov/news/releases/2005/ 12/print/20051219-l.html. (Emphasis added.) Other Administration officials have similarly characterized the TSP as being used “in lieu of’ FISA. Id. These statements indicate that the TSP in fact captures electronic surveillance as defined by FISA, despite the belated effort of Executive Branch officials to disavow this acknowledgment.
There is no doubt in my mind that the attorney-plaintiffs have established that the injury complained of falls within the zone of interests sought to be protected by these statutes. Accordingly, I conclude that they have satisfied the prudential-standing requirements.
5. Standing summary
For all of the reasons discussed above, I believe that the attorney-plaintiffs have satisfied both the constitutional and prudential requirements for standing to sue. I therefore conclude that the attorney-plaintiffs are entitled to proceed with their claims against the government for the injuries allegedly flowing from the operation of the TSP.
C. Mootness
The last procedural hurdle that the plaintiffs must overcome is the question of mootness. Article III of the Constitution limits the jurisdiction of the federal courts to “actual, ongoing controversies.” Honig v. Doe,
As a result of these orders, electronic surveillance that had been occurring under the TSP “will now be conducted subject to the approval” of the FISC, and “the President has determined not to reauthorize” the TSP. Id. at 1-2. The government, in short, decided to voluntarily cease electronic surveillance of international communications in this country outside of FISA. On the ground that such surveillance would henceforth be FISA-compliant, the government argues that we should dismiss
Under well-established Supreme Court precedent, the “voluntary cessation of allegedly illegal conduct does not deprive the tribunal of power to hear and determine the case, i.e., does not make the case moot,” United States v. W.T. Grant Co.,
But the government continues to assert that the TSP did not violate the Constitution or any federal statute prior to the January 2007 FISC orders. Instead, it contends -that “[a]n independent judicial body — the FISA court — has now acted to provide additional and wholly sufficient legal authority for the activity in question.” The government accordingly argues that it “has in no sense terminated its conduct in response to plaintiffs’ suit,” but rather that the FISC orders “provide[ ] legal authority that plaintiffs claimed was absent.” Both in its briefs and at oral argument, the government insisted that the FISC orders represent an independent “intervening act of a coordinate branch of government” that suffices to render the voluntary-cessation exception inapplicable.
But the government acknowledged at oral argument that the President maintains that he has the authority to “opt out” of the FISA framework at any time and to reauthorize the TSP or a similar program. The government also conceded that the FISC orders were actively sought by the Executive Branch, and that the President decided that he would comply with the orders only “after determining that the [FISC] order[s] provide[d] the necessary speed and agility” for TSP-style surveillance. Most recently, the Director of National Intelligence stated during a congressional hearing that the government continued to believe that the President has the authority under Article II of the Constitution to order the NSA to conduct war-rantless electronic surveillance. James Risen, Administration Pulls Back on Surveillance Agreement, N.Y. Times, May 2, 2007, at A18. These facts do not support a conclusion that it is “absolutely clear that the allegedly wrongful behavior could not reasonably be expected to recur.” Concentrated Phosphate,
D. Merits
Without expressing an opinion concerning the analysis of the district court, I would affirm its judgment because I conclude that the TSP violates FISA and Title III and that the President does not have the inherent authority to act in disregard of those statutes. The clearest ground for deciding the merits of this appeal is the plaintiffs’ statutory claim, just as the clearest argument for standing is presented by the attorney-plaintiffs. This is not to say that the plaintiffs’ other causes of action lack merit, but simply that this case can, and therefore should, be decided on the narrowest grounds possible. See, e.g., City of Cleburne v. Cleburne Living Ctr.,
1. The TSP violated FISA and Title III
The government contends that “it would be imprudent ... to address plaintiffs’ FISA claim without a district court decision addressing the predicate questions necessary to the resolution of that claim in the first instance.” This argument overlooks the fact that an appellate court possessed of proper jurisdiction can affirm on any ground fairly supported by the record. See In re Cleveland Tankers, Inc.,
Both FISA and Title III expressly prohibit electronic surveillance outside of their statutory frameworks, as set forth in Part I.B.4.b. above. The language used is unequivocal. In enacting FISA, Congress directed that electronic surveillance conducted inside the United States for foreign intelligence purposes was to be undertaken only as authorized by specific federal statutory authority. See 50 U.S.C. § 1809. Title III criminalizes the interception and disclosure of wire, oral, and electronic communications except under certain specified exceptions. See 18 U.S.C. § 2511(2)(f). The statute clearly states that chapter 119 and FISA “shall be the exclusive means by which electronic surveillance ... and the interception of domestic wire, oral, and electronic communications may be conducted.” Id. (emphasis added).
In construing statutory language, we assume that “Congress said what it meant.” United States v. LaBonte,
Congress has thus unequivocally declared that FISA and Title III are the exclusive means by which electronic surveillance is permitted. No other authorization can comply with the law. Congress further emphasized this point by criminalizing the undertaking of electronic surveillance not authorized by statute in two separate places in the U.S.Code. See 50 U.S.C. § 1809; 18 U.S.C. § 2511(1) & (2)(e). The government, however, contends that Congress authorized the TSP in the aftermath of the September 11, 2001 attacks by enacting the Authorization for Use of Military Force (AUMF), Pub.L. No. 107-40, 115 Stat. 224 (Sept. 18, 2001). In addition, the government notes that “foreign intelligence gathering is ... vital to the successful prosecution of war.”
But FISA itself expressly and specifically restricts the President’s authority even in times of war. The statute provides that “[n]otwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance without a court order under this subchapter to acquire foreign intelligence information for a period not to exceed fifteen calendar days following a declaration of war by the Congress.” 50 U.S.C. § 1811. FISA thus limits warrantless electronic surveillance to the first 15 days following a declaration of war, a more formal action than even the enactment of an authorization for the use of force. This 15-day period of warrant-less surveillance was enacted to permit “consideration of any amendment to this Act that may be appropriate during a wartime emergency.” H.R. Conf. Rep. 95-1720, at 34, reprinted at 1978 U.S.C.C.A.N. 4048, 4063.
To be sure, Congress in 1978 likely did not contemplate a situation such as the one that arose with the attacks of September 11, 2001. But in the aftermath of those attacks, Congress has shown itself both willing and able to consider appropriate amendments to FISA. Congress has in fact amended FISA multiple times since September 11, 2001, increasing the President’s authority by permitting “roving” wiretaps and expanding the permissible use of pen-register devices. See USA PATRIOT Act of 2001, Pub.L. No. 107-56 §§ 206, 214, as amended by Pub.L. No. 109-177, §§ 108, 128 (codified as amended at 50 U.S.C. § 1805 and 18 U.S.C. § 1842).
But Congress has never suspended FISA’s application nor altered the 15-day limit on warrantless electronic surveillance. Id. The Attorney General has in fact acknowledged that the Bush Administration has never sought an amendment to FISA that might have provided authorization for the TSP or a similar program because certain members of Congress allegedly informed the Administration that such an amendment would be “difficult, if not impossible” to obtain. Press Briefing by Alberto Gonzales, Att’y Gen., http:// www.whitehouse.gov/news/releases/2005/ 12/20051219-l.html.
Yet the TSP is precisely the type of program that FISA was enacted to oversee. A senior Department of Justice official has conceded that the TSP involved warrantless electronic surveillance of communications into and out of the United States. Letter from William Mosehella, Assistant Att’y Gen., to the Honorable Pat Roberts, the Honorable John D. Rockefeller, IV, the Honorable Peter Hoekstra, & the Honorable Jane Harman (Dec. 22, 2005), at 1-3, http://www.nationalreview. com/pdi/12% 2022% 2005% 20NSA% 201et-ter.pdf. The TSP, in addition, operated without a court order. Press Briefing by Alberto Gonzales, Att’y Gen., http://www. whitehouse.gov/news/releases/2005/12/ print/20051219-l.html.
In arguing that the TSP did not violate FISA, the government contends that Con
[t]hat the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.
Pub.L. No. 107-40, 115 Stat. 224 (Sept. 18, 2001).
According to the government, the AUMF provides the authorization necessary to satisfy FISA’s prohibition on electronic surveillance “except as authorized by statute.” See 50 U.S.C. § 1809(a). No reference to surveillance, however, is found in the AUMF. Instead, the government’s argument rests on a general inference to be drawn from the AUMF; in other words, that the phrase “all necessary and appropriate force” encompasses electronic surveillance by implication. But this interpretation of the AUMF directly conflicts with the specific statutory language of both FISA and Title III.
In particular, the government’s argument requires us to accept that the AUMF has implicitly repealed the “exclusive means” provision of Title III. See 18 U.S.C. § 2511(2)(f). The problem with this position is that neither the caselaw nor the rules of statutory construction support the government’s argument. Certainly the express language of the AUMF cannot sustain such an interpretation because, as noted above, it says nothing about electronic surveillance. In 18 U.S.C. § 2511, Congress criminalized the undertaking of electronic surveillance except as “specifically provided in this chapter” or as authorized by FISA. The AUMF is neither “in this chapter” nor designated as an amendment to FISA. In order to give the government’s argument effect then, the AUMF must either repeal the “exclusive means” provision of the original FISA legislation as codified in Title III or work in conjunction with FISA.
“Repeals by implication are not favored,” Ex parte Yerger,
FISA, as noted previously, includes explicit provisions for wartime usage. The government argues that if the AUMF has not implicitly repealed the exclusive-means provision, then the AUMF and FISA must be in conflict, and that the AUMF should trump FISA. This disregards the fact that shortly after enacting the AUMF, Congress amended certain provisions of FISA through its enactment of the USA PATRIOT Act, as described above. Congress thus saw no conflict between FISA and the AUMF. Cf. Al-Marri v. Wright,
In addition, the government’s argument completely ignores two fundamental principles of statutory construction. The first relevant principle is that when interpreting potentially conflicting statutes, “a more specific statute will be given precedence over a more general one, regardless of their temporal sequence.” Busic v. United States,
To read the statutes as the government suggests would render FISA’s provisions relating to wartime usage mere surplus-age. Such a reading'would run counter to the second relevant principle of statutory construction that requires courts to “give effect, if possible, to every clause and word of a statute.” Montclair v. Ramsdell,
In addition, the government’s reading of the phrase “except as authorized by statute” strains the legislative record. See Elizabeth B. Bazan & Jennifer K. Elsea, Cong. Research Serv., Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information, at 40 (Jan. 5, 2006), http://www.fas.org/sgp/crs/intel/m010506. pdf (noting that “the legislative history appears to reflect an intention that the phrase ‘authorized by statute’ was a reference to chapter 119 of Title 18 of the U.S.Code (Title III) and to FISA itself, rather than having a broader meaning”). I accordingly believe that the legislative history does not support the government’s reading.
The government also contends that the AUMF can be read as a more specific statute than FISA based on recent Supreme Court jurisprudence. In Hamdi v. Rumsfeld,
Finally, the Supreme Court’s more recent decision in Hamdan v. Rumsfeld, — U.S.-,
The same observation holds true in the present case. Nothing in the AUMF suggests that Congress intended to “expand or alter the authorization” set forth in FISA. Moreover, the text and the legislative history of FISA and Title III make quite clear that the TSP or a similar program can be authorized only through those two statutes. The TSP plainly violated FISA and Title III and, unless there exists some authority for the President to supersede this statutory authority, was therefore unlawful.
2. Inherent authority
The government’s final defense is that the Constitution grants the President the “inherent authority” to “intercept the international communications of those affiliated with al Qaeda.” A contrary position would, according to the government, “present a grave constitutional question of the highest order.” For that reason, the government contends that we should follow the canon of constitutional avoidance and construe FISA and the AUMF to avoid any constitutional conflict. See Edward J. DeBartolo Corp. v. Fla. Gulf Coast Bldg. & Constr. Trades Council,
But the canon of constitutional avoidance “is not a method of adjudicating constitutional questions by other means.” Clark v. Martinez,
The Constitution divides the nation’s war powers between the Executive and the Legislative Branches. See U.S. Const, art. I, § 8 (setting forth the powers of Congress) & art. II, § 2 (setting forth the powers of the President); see also Youngs
The Constitution expressly grants Congress the power to make laws in the context of national defense. Id Moreover, the Constitution requires the President to conform to duly enacted laws. U.S. Const, art. II, § 3 (“[H]e shall take Care that the Laws be faithfully executed.”). This requirement endures even in times of war. In Little v. Bárreme,
The Supreme Court fully addressed the question of the inherent authority of the President in Youngstown. There, the Court struck down President Truman’s executive order to seize domestic steel-production facilities during the Korean war. In his famous concurring opinion, Justice Jackson described our tripartite system as one of “separateness but interdependence, autonomy but reciprocity.” Youngstown,
1. When the President acts pursuant to an express or implied authorization of Congress, his authority is at its maximum, for it includes all that he possesses in his own right plus all that Congress can delegate....
2. When the President acts in absence of either a congressional grant or denial of authority, he can only rely upon his own independent powers, but there is a zone of twilight in which he and Congress may have concurrent authority, or in which its distribution is uncertain....
3. When the President takes measures incompatible with the expressed or implied will of Congress, his power is at its lowest ebb, for then he can rely only upon his own constitutional powers minus any constitutional powers of Congress over the matter.
Id at 635-37,
When the President acts in Zone 3, “[cjourts can sustain exclusive Presidential control in such a case only by disabling the Congress from acting upon the subject. Presidential claim to a power at once so conclusive and preclusive must be scrutinized with caution, for what is at stake is the equilibrium established by our constitutional system.” Id at 637-38,
We must thus determine into which zone the TSP fits. From that determination,
The government, however, turns to a case from the Foreign Intelligence Surveillance Court of Review as support for its argument that the President has “inherent constitutional authority to conduct war-rantless foreign intelligence surveillance.” See In re Sealed Case,
The Sealed Case court discussed Truong for the purpose of determining whether the Fourth Circuit had articulated the proper constitutional standard for evaluating a Fourth Amendment challenge to FISA. Id. at 742-44. Finding that Truong did set forth the proper standard, the Sealed Case court applied the same standard to uphold the post-PATRIOT Act version of FISA against a Fourth Amendment challenge. Id. at 742. In sum, the dicta in Sealed Case cannot overcome the fact that Congress has unequivocally acted within its constitutional power to limit the President’s authority over warrantless electronic surveillance within this country.
Finally, all of the courts to have considered the question of whether FISA was constitutional before the statute was amended by the USA PATRIOT Act of 2001 have in fact upheld the statute. See United States v. Nicholson,
E. Plaintiffs’ datamining cross-appeal
The plaintiffs raise a cross-appeal from the district court’s grant of summary judgment to the government on the plaintiffs’ datamining claim. After a careful review of the record, I conclude that the district court’s analysis of this issue and of the preclusive effect of the state-secrets privilege is persuasive. I would therefore not disturb the district court’s judgment on the plaintiffs’ datamining claim.
The closest question in this case, in my opinion, is whether the plaintiffs have the standing to sue. Once past that hurdle, however, the rest gets progressively easier. Mootness is not a problem because of the government’s position that it retains the right to opt out of the FISA regime whenever it chooses. Its AUMF and inherent-authority arguments are' weak in light of existing precedent and the rules of statutory construction. Finally, when faced with the clear wording of FISA and Title III that these statutes provide the “exclusive means” for the government to engage in electronic surveillance within the United States for foreign intelligence purposes, the conclusion becomes inescapable that the TSP was unlawful. I would therefore affirm the judgment of the district court.
JUDGMENT
THIS CAUSE was heard on the record from the district court and was argued by counsel.
IN CONSIDERATION WHEREOF, it is ORDERED that the order of the district court is VACATED and the case is REMANDED with instructions to DISMISS the case for lack of jurisdiction.
