MEMORANDUM OPINION
I. Introduction
This is a challenge to the legality of a secret program (hereinafter “TSP”) undis-putedly inaugurated by the National Security Agency (hereinafter “NSA”) at least by 2002 and continuing today, which intercepts without benefit of warrant or other judicial approval, prior or subsequent, the international telephone and internet communications of numerous persons and organizations within this country. The TSP has been acknowledged by this Administration to have been authorized by the President’s secret order during 2002 and reauthorized at least thirty times since. 1
Plaintiffs are a group of persons and organizations who, according to their affidavits, are defined by the Foreign Intelligence Surveillance Act (hereinafter “FISA”) as “U.S. persons.” 2 They conducted regular international telephone and internet communications for various un-contestedly legitimate reasons including journalism, the practice of law, and scholarship. Many of their communications are and have been with persons in the Middle East. Each Plaintiff has alleged a “well founded belief’ that he, she, or it, has been subjected to Defendants’ interceptions, and that the TSP not only injures them specifically and directly, but that the TSP substantially chills and impairs their constitutionally protected communications. Persons abroad who before the program spoke with them by telephone or internet will no longer do so.
Plaintiffs have alleged that the TSP violates their free speech and associational rights, as guaranteed by the First Amendment of the United States Constitution; their privacy rights, as guаranteed by the Fourth Amendment of the United States Constitution; the principle of the Separation of Powers because the TSP has been authorized by the President in excess of his Executive Power under Article II of the United States Constitution, and that it specifically violates the statutory limitations placed upon such interceptions by the Congress in FISA because it is conducted without observation of any of the procedures required by law, either statutory or Constitutional.
Before the Court now are several motions filed by both sides. Plaintiffs have requested a permanent injunction, alleging that they sustain irreparable damage because of the continued existence of the TSP. Plaintiffs also request a Partial Summary Judgment holding that the TSP violates the Administrative Procedures Act (“APA”); the Separation of Powers doctrine; the First and Fourth Amendments of the United States Constitution, and the statutory law.
Defendants have moved to dismiss this lawsuit, or in the alternative for Summary Judgment, on the basis of the state secrets evidentiary privilege and Plaintiffs’ lack of standing.
II. State Secrets Privilege
Defendants argue that the state secrets privilege bars Plaintiffs’ claims because *759 Plaintiffs cannot establish standing or a prima facie case for any of their claims without the use of state secrets. Further, Defendants argue that they cannot defend this case without revealing state secrets. For the reasons articulated below, the court rejects Defendants’ argument with respect to Plaintiffs’ claims challenging the TSP. The court, however, agrees with Defendants with respect to Plaintiffs’ data-mining claim and grants Defendants’ motion for summary judgment оn that claim.
The state secrets privilege is an evidentiary rule developed to prevent the disclosure of information which may be detrimental to national security. There are two distinct lines of cases covering the privilege. In the first line of cases the doctrine is more of a rule of “non-justieiability because it deprives courts of their ability to hear suits against the Government based on covert espionage agreements.”
El-Masri v. Tenet,
The secrecy which such contracts impose precludes any action for their enforcement. The publicity produced by an action would itself be a breach of a contract of that kind, and thus defeat a recovery. Totten,92 U.S. at 107 .
The Supreme Court reaffirmed
Totten
in
Tenet v. Doe,
We adhere to Totten. The state secrets privilege and the more frequent use of in camera judicial proceedings simply cannot provide the absolute protection we found necessary in enunciating the Totten rule. The possibility that a suit may proceed and an espionage relationship may be revealed, if the state secrets privilege is found not to apply, is unacceptable: “Even a small chance that some court will order disclosure of a source’s identity could well impair intelligence gathering and cause sources to ‘close up like a clam.’ ” (citations omitted). Tenet,544 U.S. at 11 ,125 S.Ct. 1230 .
The second line of cases deals with the exclusion of evidence because of the state secrets privilege. In
United States v. Reynolds,
The privilege belongs to the Government and must be asserted by it;
*760 it can neither be claimed nor waived by a private party. It is not to be lightly invoked. There must be formal claim of privilege, lodged by the head of the department which has control over the matter, after actual personal consideration by that officer. The court itself must determine whether the circumstances are appropriate for the claim of privilege, and yet do so without forcing a disclosure of the very thing the privilegе is designed to protect. Reynolds,345 U.S. at 8 ,73 S.Ct. 528 .
The Chief Justice further wrote:
In each case, the showing of necessity which is made will determine how far the court should probe in satisfying itself that the occasion for invoking the privilege is appropriate. Where there is a strong showing of necessity, the claim of privilege should not be lightly accepted, but even the most compelling necessity cannot overcome the claim of privilege if the court is ultimately satisfied that military secrets are at stake. Reynolds,345 U.S. at 11 ,73 S.Ct. 528 .
The Court sustained the Government’s claim of privilege, finding the plaintiffs’ “necessity” for the privileged information was “greatly minimized” by the fact that the plaintiffs had an available alternative.
Reynolds,
In
Halkin v. Helms,
The Government asserted the state secrets privilege and moved for dismissal for the following reasons: (1) discovery would “confirm the identity of individuals or organizations whose foreign communications were acquired by NSA”; (2) discovery would lead to the disclosure of “dates and contents of such communications”; or (3) discovery would “divulge the methods and techniques by which the communications were acquired.”
Halkin,
*761 On appeal, the District of Columbia Circuit Court affirmed the district court’s dismissal of the plaintiffs’ claims with respect to operation MINARET but reversed the court’s ruling with respect to operation SHAMROCK. In reversing the district court ruling regarding SHAMROCK, the circuit court stated:
... we think the affidavits and testimony establish the validity of the state secrets claim with respect to both SHAMROCK and MINARET acquisitions; our reasoning applies to both. There is a “reasonable danger”, (citation omitted) that confirmation or denial that a particulаr plaintiffs communications have been acquired would disclose NSA capabilities and other valuable intelligence information to a sophisticated intelligence analyst. Halkin,598 F.2d at 10 .
The case was remanded to the district court and it dismissed the plaintiffs’ claims against the NSA and the individuals connected with the NSA’s alleged monitoring.
Halkin v. Helms,
In
Halkin II,
It is self-evident that the disclosures sought here pose a “reasonable danger” to the diplomatic and military interests of the United States. Revelation of particular instances in which foreign governments assisted the CIA in conducting surveillance of dissidents could strain diplomatic relations in a number of ways-by generally embarrassing foreign governments who may wish to avoid or may even explicitly disavow allegations of CIA or United States involvements, or by rendering foreign governments or their officials subject to political or legal action by those among their own citizens who may have been subjected to surveillance in the course of dissident activity. Halkin II,690 F.2d at 993 .
Ellsberg v. Mitchell,
On appeal, the District of Columbia Circuit reversed the district court with respect to the plaintiffs’ claims regarding the Government’s admitted wiretaps, because there was no reason to “suspend the general rule that the burden is on those seeking an exemption from the Fourth Amendment warrant requirement to show the need for it.”
Ellsberg,
When properly invoked, the state secrets privilege is absolute. No competing public or private interest can be advanced to compel disclosure of information found to be protected by a claim *762 of privilege. However, because of the broad sweep of the privilege, the Supreme Court has made clear that “[i]t is not to be lightly invoked.” Thus, the privilege may not be used to shield any material not strictly necessary to prevent injury to national security; and, whenever possible, sensitive information must be disentangled from nonsensitive information to allow for the release of the latter. Ellsberg,709 F.2d at 56 .
In
Kasza v. Browner,
Not only does the state secrets privilege bar [the plaintiff] from establishing her prima facie case on any of her eleven claims, but any further proceeding in this matter would jeopardize national security. No protective procedure can salvage [the plaintiffs] suit. Kasza,133 F.3d at 1170 .
The
Kasza
court also explained that “[t]he application of the state secrets privilege can have ... three effects.”
Kasza,
The Sixth Circuit delivered its definitive opinion regarding the states secrets privilege, in
Tenenbaum v. Simonini,
We further conclude that Defendants cannot defend their conduct with respect to Tenenbaum without revealing the privileged information. Because the state secrets doctrine thus deprives Defendants of a valid defense to the Ten-enbaums’ claims, we find that the district court properly dismissed the claims. Tenenbaum,372 F.3d at 777 .
Predictably, the War on Terror of this administration has produced a vast number of cases, in which the state secrets privilege has been invoked.
4
In May of
*763
this year, a district court in the Eastern District of Virginia addressed the state secrets privilege in
El-Masri v. Tenet,
In
Hepting v. AT & T Corp.,
... it monitors “contents of communications where * * * one party to the communication is outside the United States and the government has a reasonable
basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organization affiliated with al Qaeda, or working in support of al Qaeda.” (citations omitted). Hepting,439 F.Supp.2d at 996-97 ,2006 WL 2038464 , at *19.
Accordingly Judge Walker reasoned that “[b]ased on these public disclosures,” the court could not “conclude that the existence of a certification regarding the ‘communication content’ program is a state secret.” Id.
Defendants’ assertion of thе privilege without any request for answers to any discovery has prompted this court to first analyze this case under
Totten/Tenet,
since it appears that Defendants are arguing that this case should not be subject to judicial review. As discussed
supra,
the
Totten/Tenet
cases provide an absolute bar to any kind of judicial review.
Tenet,
Defendants argue that Plaintiffs’ claims must be dismissed because Plaintiffs cannot establish standing or a prima facie case for any of its claims without the disclosure of state secrets. Moreover, Defendants argue that even if Plaintiffs are able to establish a prima facie case without revealing protected information, Defendants would be unable to defend this case without the disclosure of such information. Plaintiffs argue that Defendants’ invocation of the state secrets privilege is improper with respect to their challenges to the TSP, since no additional facts are necessary or relevant to the summary adjudication of this case. Alternatively, Plaintiffs argue, that even if the court finds that the privilege was appropriately asserted, the court should use creativity and care to devise methods which would protect the privilege but allow the case to proceed.
The “next step in the judicial inquiry into the validity of the assertion of the privilege is to determine whether the information for which the privilege is claimed qualifies as a state secret.”
El Masri,
Plaintiffs, however, maintain that this information is not relevant to the resolution of their claims, since their claims regarding the TSP are based solely on what Defendants have publicly admitted. Indeed, although the instant case appears factually similar to Halkin, in that they both involve plaintiffs challenging the legality of warrantless wiretapping, a key distinction can be drawn. Unlike Halkin or any of the eases in the Reynolds progeny, Plaintiffs here are not seeking any additional discovery to establish their claims challenging the TSP. 6
Like Judge Walker in
Hepting,
this court recognizes that simply because a factual statement has been made public it does not necessarily follow that it is true.
Hepting,
Contrary to Defendants’ arguments, the court is persuaded that Plaintiffs are able to establish a prima facie case based solely on Defendants’ public admissions regarding the TSP. Plaintiffs’ declarations establish that their communications would be monitored under the TSP. 7 Further, Plaintiffs have shown that because of the existence of the TSP, they have suffered a real and concrete harm. Plaintiffs’ declarations state undisputedly that they are stifled in their ability to vigorously conduct research, interact with sources, talk with clients and, in the case of the attorney Plaintiffs, uphold their oath of providing effective and ethical representation of their clients. 8 In addition, Plaintiffs have the additional injury of incurring substantial travel expenses as a result of having to travel and meet with clients and others relevant to their cases. Therefore, the court finds that Plaintiffs need no additional facts to establish a prima facie case for any of their claims questioning the legality of the TSP.
The court, however, is convinced that Plaintiffs cannot establish a prima facie ease to support their datamining claims without the use of privileged information and further litigation of this issue would force the disclosure of the very thing the privilege is designed to protect. Therefore, the court grants Defendants’ motion for summary judgment with respect to this claim.
Finally, Defendants assert that they cannot defend this case without the exposure of state secrets. This court disagrees. The Bush Administration has repeatedly told the general public that there is a valid basis in law for the TSP. 9 Further, Defendants have contended that the President has the authority under the AUMF and the Constitution to authorize the continued use of the TSP. Defendants have supported these arguments without revealing or relying on any classified information. Indeed, the court has reviewed the classified information and is of the *766 opinion that this information is not necessary to any viable defense to the TSP. Defendants have presented support for the argument that “it... is well-established that the President may exercise his statutory and constitutional authority to gather intelligence information about foreign enemies.” 10 Defendants cite to various sources to support this position. Consequently, the court finds Defendants’ argument that they cannot defend this case without the use of classified information to be disingenuous and without merit.
In sum, the court holds that the state secrets privilege applies to Plaintiffs’ data-mining claim and that claim is dismissed. The privilege, however, does not apply to Plaintiffs’ remaining claims challenging the validity of the TSP, since Plaintiffs are not relying on or requesting any classified information to support these claims and Defendants do not need any classified information to mount a defense against these claims. 11
III. Standing
Defendants argue that Plaintiffs do not establish their standing. They contend that Plaintiffs’ claim here is merely a subjective fear of surveillance which falls short of the type of injury necessary to establish standing. They argue that Plaintiffs’ alleged injuries are too tenuous to be recognized, not “distinct and palpable” nor “concrete and рarticularized.”
Article III of the U.S. Constitution limits the federal court’s jurisdiction to “cases” and “controversies”.
Lujan v. Defenders of Wildlife,
“An association has standing to bring suit on behalf of its members when its members would otherwise have standing to sue in their own right, the interests it seeks to protect are germane to the organization’s purpose, and neither the claim asserted nor the relief requested requires the participation of individual members in the lawsuit.”
Friends of the Earth, Inc. v. Laidlaw Environmental Services (TOC), Inc.,
“At the pleading stage, general factual allegations of injury resulting from
*767
the defendant’s conduct may suffice, for on a motion to dismiss we ‘presume that general allegations embrace those specific facts that are necessary to support the claim.’ ”
Id.
at 561,
To determine whether Plaintiffs have standing to challenge the constitutionality of the TSP, we must examine the nature of the injury-in-fact which they have alleged. “The injury must be ... ‘distinct and palpable,’ and not ‘abstract’ or ‘conjectural’ or ‘hypothetical.’ ”
National Rifle Association of America v. Magaw,
Plaintiffs here contend that the TSP has interfered with their ability to carry out their professional responsibilities in a variety of ways, including that the TSP has had a significant impact on their ability to talk with sources, locate witnesses, conduct scholarship, engage in advocacy and communicate with persons who are outside of the United States, including in the Middle East and Asia. Plaintiffs have submitted several declarations to that effect. For example, scholars and journalists such as plaintiffs Tara McKelvey, Larry Diamond, and Barnett Rubin indicate that they must conduct extensive research in the Middle East, Africa, and Asia, and must communicate with individuals abroad whom the United States government believes to be terrorist suspects or to be associated with terrorist organizations. 12 In addition, attorneys Nancy Hollander, William Swor, Joshua Dratel, Mohammed Abdrabboh, and Nabih Ayad indicate that they must also communicate with individuals abroad whom the United States government believes to be terrorist suspects or to be associated with terrorist organizations, 13 and must discuss confidential information over the phone and email with their international clients. 14 All of the Plaintiffs contend that the TSP has caused clients, witnesses and sources to discontinue their communications with plaintiffs out of fear that their communications will be intercepted. 15 They also allege injury based on the increased financial burden they incur in having to travel substantial distances to meet personally with their clients and others relevant to their cases. 16
*768 The ability to communicate confidentially is an indispensable part of the attorney-client relationship. As University of Michigan legal ethics professor Leonard Niehoff explains, attorney-client confidentiality is “central to the functioning of the attorney-client relationship and to effective representation.” 17 He further explains that Defendants’ TSP “creates an overwhelming, if not insurmountable, obstacle to effective and ethical representation” and that although Plaintiffs are resorting to other “inefficient” means for gathering information, the TSP continues to cause “substantial and ongoing harm to the attorney-client relationships and legal representations.” 18 He explains that the increased risk that privileged communications will be intercepted forces attorneys to cease telephonic and electronic communications with clients to fulfill their ethical responsibilities. 19
Defendants argue that the allegations present no more than a “chilling effect” based upon purely speculative fears that the TSP subjects the Plaintiffs to surveillance. In arguing that the injuries are not constitutionally cognizable, Defendants rely heavily on the case of
Laird v. Tatum,
In
Laird,
the plaintiffs sought declaratory and injunctive relief on their claim that their rights were being invaded by the Army’s domestic surveillance of civil disturbances and “public activities that were thought to have at least some potential for civil disorder.”
Id.
at 6,
Laird, however, must be distinguished here. The plaintiffs in Laird alleged only that they could conceivably become subject to the Army’s domestic surveillance program.
Presbyterian Church v. United States,
Although
Laird
establishes that a party’s allegation that it has suffered a subjective “chill” alone does not confer Article III standing,
Laird
does not control this case. As Justice (then Judge) Breyer has observed, “[t]he problem for the government with Laird ... lies in the key words
*769
‘without more.’ ”
Ozonoff v. Berzak,
The instant case is more akin to
Friends of the Earth,
in which the Court granted standing to environmental groups who sued a polluter under the Clean Water Act because environmental damage caused by the defendant had deterred members of the plaintiff organizations from using and enjoying certain lands and rivers.
Friends of the Earth,
Here, Plaintiffs are not asserting speculative allegations. Instead, the declarations asserted by Plaintiffs establish that they are suffering a present concrete injury in addition to a chill of their First Amendment rights. Plaintiffs would be able to continue using the telephone and email in the execution of their professional responsibilities if the Defendants were not undisputedly and admittedly conducting warrantless wiretaps of conversations. As in Friends of the Earth, this damage to their interest is sufficient to establish a concrete injury.
Numerous cases have granted standing where the plaintiffs have suffered concrete profession-related injuries comparable to those suffered by Plaintiffs here. For example, the First Circuit conferred standing upon clаimants who challenged an executive order which required applicants for employment with the World Health Organization to undergo a “loyalty” check that included an investigation into the applicant’s associations and activities. The court there determined that such an investigation would have a chilling effect on what an applicant says or does, a sufficient injury to confer standing.
Ozonoff,
These cases constitute acknowledgment that substantial burdens upon a plaintiffs professional activities are an injury sufficient to support standing. Defendants ignore the significant, concrete injuries which Plaintiffs continue to experience from Defendants’ illegal monitoring of their telephone conversations and email communications. Plaintiffs undeniably have cited to distinct, palpable, and substantial injuries that have resulted from the TSP.
This court finds that the injuries alleged by Plaintiffs are “concrete and particularized”, and not “abstract or conjectural.” The TSP is not hypothetical, it is an actual surveillance program that was admittedly instituted after September 11, 2001, and has been reauthorized by the President more than thirty times since the attacks. 21 The President has, moreover, emphasized that he intends to continue to reauthorize the TSP indefinitely. 22 Further, the court need not speculate upon the kind of activity the Plaintiffs want to engage in — they want to engage in conversations with individuals abroad without fear that their First Amendment rights are being infringed upon. Therefore, this court concludes that Plaintiffs have satisfied the requirement of alleging “actual or threatened injury” as a result of Defendants’ conduct.
It must now be determined whether Plaintiffs have shown that there is a causal connection between the injury and the complained of conduct.
Lujan,
Finally, it is likely that the injury will be redressed by the requested relief. A determination by this court that the TSP is unconstitutional and a further determination which enjoins Defendants from continued warrantless wiretapping in contravention of FISA would assure Plaintiffs and others that they could freely engage in conversations and correspond via email *771 without concern, at least without notice, that such communications were being monitored. The requested relief would thus redress the injury to Plaintiffs caused by the TSP.
Although this court is persuaded that Plaintiffs have alleged sufficient injury to establish standing, it is important to note that if the court were to deny standing based on the unsubstantiated minor distinctions drawn by Defendants, the President’s actions in warrantless wiretapping, in contravention of FISA, Title III, and the First and Fourth Amendments, would be immunized from judicial scrutiny. It was never the intent of the Framers to give the President such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. The three separate branches of government were developed as a check and balance for one another. It is within the court’s duty to ensure that power is never “condense[d] ... into a single branch of government.”
Hamdi v. Rumsfeld,
Because of the very secrecy of the activity here challenged, Plaintiffs each must be and are given standing to challenge it, because each of them, is injured and chilled substantially in the exercise of First Amendment rights so long as it continues. Indeed, as the perceived need for secrecy has apparently required that no person be notified that he is aggrieved by the activity, and there have been no prosecutions, no requests for extensions or retroactive approvals of warrants, no victim in America would be given standing to challenge this or any other unconstitutional activity, according to the Government. The activity has been acknowledged, nevertheless.
Plaintiffs have sufficiently alleged that they suffered an actual, concrete injury traceable to Defendants and redressable by this court. Accordingly, this court denies Defendants’ motion to dismiss for lack of standing.
IV. The History of Electronic Surveillance in America
Since the Court’s 1967 decision of
Katz v. U.S.,
Congress then, in 1968, enacted Title III of the Omnibus Crime Control and Safe Streets Act (hereinafter “Title III”) 24 governing all wire and electronic interceptions in the fight against certain listed major crimes. The Statute defined an “aggrieved person”, 25 and gave such person *772 standing to challenge any interception allegedly made without a judicial order supported by probable cause, after requiring notice to such person of any interception made. 26
The statute also stated content requirements for warrants and applications under oath therefor made, 27 including time, name of the target, place to be searched and proposed duration of that search, and provided that upon showing of an emergency situation, a post-interception warrant could be obtained within forty-eight hours. 28
In 1972 the court decided
U.S. v. U.S. District Court,
In 1976 the Congressional “Church Committee” 29 disclosed that every President since 1946 had engaged in warrant-less wiretaps in the name of national security, and that there had been numerous political abuses 30 , and in 1978 Congress enacted the FISA. 31
Title III specifically excluded from its coverage all interceptions of international or foreign communications; and was later amended to state that “the FISA of 1978 shall be the exclusive means by which electronic surveillance of foreign intelligence communications may be conducted.” 32
The government argues that Title Ill’s disclaimer language, at 18 U.S.C. § 2511(2)(f), that nothing therein should be construed to limit the constitutional power of the President (to make international wiretaps). In the
Keith
case, Justice Powell wrote that “Congress simply left Presidential powers where it found them”, that the disclaimer was totally neutral, and not a grant of authority.
U.S. v. U.S. District Court,
The FISA defines a “United States person” 33 to include each of Plaintiffs herein and requires a prior warrant for any domestic international interception of their communications. For various exigencies, exceptions are made. That is, the government is granted fifteen days from Congressional Declaration of War within which it may conduct intercepts before application for an order. 34 It is also granted one year, on certification by the Attorney General, 35 and seventy-two hours for other defined exigencies. 36
Those delay provisions clearly reflect the Congressional effort to balance executive needs against the privacy rights of United States persons, as recommended *773 by Justice Powell in the Keith case when he stated that:
Different standards may be compatible with the Fourth Amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the protected rights of our citizens. U.S. v. U.S. District Court,407 U.S. at 322-323 ,92 S.Ct. 2125 .
Also reflective of the balancing process Congress pursued in FISA is the requirement that interceptions may be for no longer than a ninety day duration, minimization is again required 37 , and an aggrieved person is again (as in Title III) required to be notified of proposed use and given the opportunity to file a motion to suppress. 38 Also again, alternatives to a wiretap must be found to have been exhausted or to have been ineffective. 39
A FISA judicial warrant, moreover, requires a finding of probable cause to believe that the target was either a foreign power or agent thereof, 40 not that a crime had bеen or would be committed, as Title Ill’s more stringent standard required. Finally, a special FISA court was required to be appointed, of federal judges designated by the Chief Justice. 41 They were required to hear, ex parte, all applications and make all orders 42
The FISA was essentially enacted to create a secure framework by which the Executive branch may conduct legitimate electronic surveillance for foreign intelligence while meeting our national commitment to the Fourth Amendment. It is fully described in
United States v. Falvey,
The Act was subsequently found to meet Fourth Amendment requirements constituting a reasonable balance between Gov-' ernmental needs and the protected rights of our citizens, in
United States v. Cavanagh,
Against this background the present program of warrantless wiretapping has been authorized by the administration and the present lawsuit filed.
V. The Fourth Amendment
The Constitutional Amendment which must first be discussed provides:
The right the of people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
U.S. Const. Amend. IV.
This Amendment “... was specifically propounded and ratified with the memory of ...
Entick v. Carrington,
95 Eng. Rep. 807 (1765) in mind”, stated Circuit Judge Skelly Wright in
Zweibon v. Mitchell,
*774 For it was such excesses as the use of general warrants and the writs of assistance that led to the ratification of the Fourth Amendment. In Entick v. Carrington (citation omitted), decided in 1765, one finds a striking parallel to the executive warrants utilized here. The Secretary of State had issued general executive warrants to his messengers authorizing them to roam about and to seize libelous material and libellants of the sovereign. Entick, a critic of the Crown, was the victim of one such general search during which his seditious publications were impounded. He brought a successful damage action for trespass against the messengers. The verdict was sustained on appeal. Lord Camden wrote that if such sweeping tactics were validated, then the secret cabinets and bureaus of every subject in this kingdom will be thrown open to the search and inspection of a messenger, whenever the secretary of state shall think fit to charge, or even to suspect, a person to be the author, printer, or publisher of a seditious libel.’ (citation omitted) In a related and similar proceeding, Huckle v. Money (citation omitted), the same judge who presided over Entick’s appeal held for another victim of the same despotic practice, saying ‘(t)o enter a man’s house by virtue of a nameless warrant, in order to procure evidence, is worse than the Spanish Inquisition ... ’ See also Wilkes v. Wood (citation omitted), ... [t]he tyrannical invasions described and assailed in Entick, Huckle, and Wilkes, practices which also were endured by the colonists, have been recognized as the primary abusеs which ensured the Warrant Clause a prominent place in our Bill of Rights. U.S. v. U.S. District Court,407 U.S. at 328-329 ,92 S.Ct. 2125 (Douglas, J., concurring).
Justice Powell, in writing for the court in the Keith case also wrote that:
Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. ‘It is not fit,’ said Mansfield, ‘that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer.’ (citation omitted). Lord Mansfield’s formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen’s private premises or conversation. Inherent in the concept of a warrant is its issuance by a “neutral and detached magistrate.” (citations omitted) The further requirement of “probable cause” instructs the magistrate that baseless searches shall not proceed. U.S. v. U.S. District Court,407 U.S. at 316 ,92 S.Ct. 2125 .
The Fourth Amendment, accordingly, was adopted to assure that Executive abuses of the power to search would not continue in our new nation.
Justice White wrote in 1984 in
United States v. Karo,
‘Over and again this Court has emphasized that the mandate of the (Fourth) *775 Amendment requires adherence to judicial processes,’ (citation omitted) and that searches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment— subject only to a few specifically established and well-delineated exceptions. Katz,389 U.S. at 357 ,88 S.Ct. 507 .
Justice Powell’s opinion in the Keith case also stated that:
The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute, (citation omitted) But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech. U.S. v. U.S. District Court,407 U.S. at 317 ,92 S.Ct. 2125 .
Accordingly, the Fourth Amendment, about which much has been written, in its few words requires reasonableness in all searches. It also requires prior warrants for any reasonable search, based upon prior-existing probable cause, as well as particularity as to persons, places, and things, and the interposition of a neutral magistrate between Executive branch enforcement officers and citizens.
In enacting FISA, Congress made numerous concessions to stated executive needs. They include delaying the applications for warrants until after surveillance has begun for several types of exigencies, reducing the probable cause requirement to a less stringent standard, provision of a single court of judicial experts, and extension of the duration of approved wiretaps from thirty days (under Title III) to a ninety day term.
All of the above Congressional concessions to Executive need and to the exigencies of our present situation as a people, however, have been futile. The wiretapping program here in litigation has undis-putedly been continued for at least five years, it has undisputedly been implemented without regard to FISA and of course the more stringent standards of Title III, and obviously in violation of the Fourth Amendment.
The President of the United States is himself created by that same Constitution.
VI. The First Amendment
The First Amendment provides:
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
U.S. Const. Amend. I.
This Amendment, the very first which the American people required to be made to the new Constitution, was adopted, as was the Fourth, with
Entick v. Carrington,
and the actions of the star chamber in mind. As the Court wrote in
Marcus v. Search Warrants,
Historically the struggle for freedom of speech and press in England was bound up with the issue of the scoрe of the search and seizure....
* * * *
This history was, of course, part of the intellectual matrix within which our own constitutional fabric was shaped. The Bill of Rights was fashioned against the background of knowledge that unre *776 stricted power of search and seizure could also be an instrument for stifling liberty of expression. Marcus,367 U.S. at 724, 729 ,81 S.Ct. 1708
As Justice Brennan wrote for the Court in
Dombrowski v. Pfister,
Judge Wright, in
Zweibon,
noted that the tapping of an organization’s office phone will provide the membership roster of that organization, as forbidden by
Bates v. City of Little Rock,
A governmental action to regulate speech may be justified only upon showing of a compelling governmental interest; and that the means chosen to further that interest are the least restrictive of freedom of belief and association that could be chosen.
Clark v. Library of Congress,
It must be noted that FISA explicitly admonishes that “... no United States person may be considered ... an agent of a foreign power solely upon the basis of activities protected by the First Amendment to the Constitution of the United States.” 50 U.S.C. §1805(a)(3)(A). See also
United States v. Falvey,
Finally, as Justice Powell wrote for the Court in the Keith case:
National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of ‘ordinary’ crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. ‘Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure power,’ (citation omitted). History abundantly documents the tendency of Government -however benevolent and benign its motives - to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. U.S. v. U.S. District Court,407 U.S. at 313-314 ,92 S.Ct. 2125 .
The President of the United States, a creature of the same Constitution which gave us these Amendments, has undisput-edly violated the Fourth in failing to procure judicial orders as required by FISA, and accordingly has violated the First Amendment Rights of these Plaintiffs as well.
VII. The Separation of Powers
The Constitution of the United States provides that “[a]ll legislative Powers herein granted shall be vested in a Congress of the United States....” 43 It further provides that “[t]he executive Power shall be vested in a President of the United States of America.” 44 And that *777 “... he shall take care that the laws be faithfully executed. 45
Our constitution was drafted by founders and ratified by a people who still held in vivid memory the image of King George III and his General Warrants. The concept that each form of governmental power should be separated was a well-developed one. James Madison wrote that:
The accumulation of all powers, legislative, executive, and judiciary, in the same hands, whether of one, a few, or many, and whether hereditary, self-appointed, or elective, may justly be pronounced the very definition of tyranny. The Federalist NO. 47, at 301 (James Madison).
The seminal American case in this area, and one on which the government appears to rely, is that of
Youngstown Sheet & Tube v. Sawyer,
The founders of this Nation entrusted the law-making power to the Congress alone in both good and bad times. It would do no good to recall the historical events, the fears of power and the hopes for freedom that lay behind their choice. Such a review would but confirm our holding that this seizure order cannot stand. Youngstown,343 U.S. at 589 ,72 S.Ct. 863 .
Justice Jackson’s concurring opinion in that case has become historic. He wrote that, although the Constitution had diffused powers the better to secure liberty, the powers of the President are not fixed, but fluctuate, depending upon their junctures with the actions of Congress. Thus, if the President acted pursuant to an express or implied authorization by Congress, his power was at it maximum, or zenith. If he acted in absence of Congressional action, he was in a zone of twilight reliant upon only his own independent powers.
Youngstown,
In that case, he wrote that it had been conceded that no congressional authorization existed for the Presidential seizure. Indeed, Congress had several times covered the area with statutory enactments inconsistent with the seizure. He further wrote of the President’s powers that:
The example of such unlimited executive power that must have most impressed the forefathers was the prerogative exercised by George III, and the description of its evils in the Declaration of Independence leads me to doubt that they were creating their new Executive in his image. Continental European examples were no more appealing. And if we seek instruction from our own times, we can match it only from the executive powers in those governments we disparagingly describe as totalitarian. I cannot accept the view that this clause is a grant in bulk of all conceivable executive power but regard it as an allocation to the presidential office of the generic powers thereafter stated. Id. at 641,72 S.Ct. 863 .
After analyzing the more recent experiences of Weimar, Germany, the French Republic, and Great Britain, he wrote that:
*778 This contemporary foreign experience may be inconclusive as to the wisdom of lodging emergency powers somewhere in a modern government. But it suggests that emergency powers are consistent with free government only when their control is lodged elsewhere than in the Executive who exercises them. That is the safeguard that would be nullified by our adoption of the ‘inherent powers’ formula. Nothing in my experience convinces me that such risks are warranted by any real necessity, although such powers would, of course, be an executive convenience. Id. at 652,72 S.Ct. 863 .
Justice Jackson concluded that:
With all its defects, delays and inconveniences, men have discovered no technique for long preserving free government except that the Executive be under the law, and that the law be made by parliamentary deliberations. Youngstown,343 U.S. at 655 ,72 S.Ct. 863 (Jackson, J., concurring).
Accordingly, Jackson concurred, the President had acted unlawfully.
In this case, the President has acted, undisputedly, as FISA forbids. FISA is the expressed statutory policy of our Congress. The presidential power, therefore, was exercised at its lowest ebb and cannot be sustained.
In
United States v. Moussaoui,
“[C]onsistently has given voice to, and has reaffirmed, the central judgment of the Framers of the Constitution that, within our political scheme, the separation of governmental powers into three coordinate Branches is essential to the presеrvation of liberty.” United States v. Moussaoui,365 F.3d at 305 citing Mistretta v. United States,488 U.S. 361 , 380,109 S.Ct. 647 ,102 L.Ed.2d 714 (1989)
Finally, in the case of
Clinton v. Jones,
In this case, if the teachings of Youngstown are law, the separation of powers doctrine has been violated. The President, undisputedly, has violated the provisions of FISA for a five-year period. Justice Black wrote, in Youngstown:
Nor can the seizure order be sustained because of the several constitutional provisions that grant executive power to the President.
In the. framework of our Constitution, the President’s power to see that the laws are faithfully executed refutes the idea that he is to be a lawmaker. The Constitution limits his functions in the lawmaking process to the recommending of laws he thinks wise and the vetoing of laws he thinks bad. And the Constitution is neither silent nor equivocal about who make laws which the President is to execute. The first section of the first article says that ‘All legislative powers herein granted shall be vested in a Congress of the United States * * * ’
*779 The President’s order does not direct that a congressional policy be executed in a manner prescribed by Congress - it direсts that a presidential policy be executed in a manner prescribed by the President.... The Constitution did not subject this law-making power of Congress to presidential or military supervision or control. Youngstown,343 U.S. at 587-588 ,72 S.Ct. 863 .
These secret authorization orders must, like the executive order in that case, fall. They violate the Separation of Powers ordained by the very Constitution of which this President is a creature.
VIII. The Authorization for Use of Military Force
After the terrorist attack on this Country of September 11, 2001, the Congress jointly enacted the Authorization for Use of Military Force (hereinafter “AUMF”) which states:
That the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons. 46
The Government argues here that it was given authority by that resolution to conduct the TSP in violation of both FISA and the Constitution.
First, this court must note that the AUMF says nothing whatsoever of intelligence or surveillance. The government argues that such authority must be implied. Next it must be noted that FISA and Title III, are together by their terms denominated by Congress as the exclusive means by which electronic surveillance may be conducted. Both statutes have made abundantly clear that prior warrants must be obtained from the FISA court for such surveillance, with limited exceptions, none of which are here even raised as applicable. Indeed, the government here claims that the AUMF has by implication granted its TSP authority for more than five years, although FISA’s longest exception, for the Declaration of War by Congress, is only fifteen days from date of such a Declaration. 47
FISA’s history and content, detailed above, are highly specific in their requirements, and the AUMF, if construed to apply at all to intelligence is utterly general. In
Morales v. TWA, Inc.,
The case of
Hamdi v. Rumsfeld,
[Djetention of individuals ... for the duration of the particular conflict in which they are captured is so fundamental and accepted an incident to war as to be an exercise of the “necessary and appropriate force” Congress has author *780 ized the President to use. Hamdi,542 U.S. at 518 ,124 S.Ct. 2633 .
She wrote that the entire object of capture is to prevent the captured combatant from returning to his same enemy force, and that a prisoner would most certainly return to those forces if set free. Congress had, therefore, clearly authorized detention by the Force Resolution.
Id.
at 518-519,
However, she continued, indefinite detention for purposes of interrogation was certainly not authorized and it raised the question of what process is constitutionally due to a citizen who disputes the enemy combatant status assigned him.
Hamdi,
Justice O’Connor concluded that such a citizen must be given Fifth Amendment rights to contest his classification, including notice and the opportunity to be heard by a neutral decisionmaker.
Hamdi,
She stated that:
It is during our most challenging and uncertain moments that our Nation’s commitment to due process is most severely tested; and it is in those times that we must preserve our commitment at home to the principles for which we fight abroad.
* * * ❖
Any process in which the Executive’s factual assertions go wholly unchallenged or are simply presumed correct without any opportunity for the alleged combatant to demonstrate otherwise falls constitutionally short. Hamdi,542 U.S. at 532, 537 ,124 S.Ct. 2633 .
Under Hamdi, accordingly, the Constitution of the United States must be followed.
The AUMF resolution, if indeed it is construed as replacing FISA, gives no support to Defendants here. Even if that Resolution superceded all other statutory law, Defendants have violated the Constitutional rights of their citizens including the First Amendment, Fourth Amendment, and the Separation of Powers doctrine.
IX. Inherent Power
Article II of the United States Constitution provides that any citizen of appropriate birth, age and residency may be elected to the Office of President of the United States and be vested with the executive power of this nation. 48
The duties and powers of the Chief Executive are carefully listed, including the duty to be Commander in Chief of the Army and Navy of the United States, 49 and the Presidential Oath of Office is set forth in the Constitution and requires him to swear or affirm that he “will, to the best of my ability, preserve, protect and defend the Constitution of the United States.” 50
The Government appears to argue here that, pursuant to the penumbra of Constitutional language in Article II, and particularly because the President is designated Commander in Chief of the Army and Navy, he has been granted the inherent power to violate not only the laws of the Congress but the First and Fourth Amendments of the Constitution, itself.
*781 We must first note that the Office of the Chief Executive has itself been created, with its powers, by the Constitution. There are no hereditary Kings in America and no powers not created by the Constitution. So all “inherent powers” must derive from that Constitution.
We have seen in
Hamdi
that the Fifth Amendment of the United States Constitution is fully applicable to the Executive branch’s actions and therefore it can only follow that the First and Fourth Amendments must be applicable as well.
51
In the
Yov/ngstoim
case the same “inherent powers” argument was raised and the Court noted that the President had been created Commander in Chief of only the military, and not of all the people, even in time of war.
52
Indeed, since
Ex Parte Milligan,
we have been taught that the “Constitution of the United States is a law for rulers and people, equally in war and in peace.... ”
Ex Parte Milligan,
Finally, although the Defendants have suggested the unconstitutionality of FISA, it appears to this court that that question is here irrelevant. Not only FISA, but the Constitution itsеlf has been violated by the Executive’s TSP. As the court states in Falvey, even where statutes are not explicit, the requirements of the Fourth Amendment must still be met. 54 And of course, the Ziveibon opinion of Judge Skelly Wright plainly states that although many cases hold that the President’s power to obtain foreign intelligence information is vast, none suggest that he is immune from Constitutional requirements. 55
The argument that inherent powers justify the program here in litigation must fail.
X. Practical Justiñcations for Exemption
First, it must be remembered that both Title III and FISA permit delayed applications for warrants, after surveillance has begun. Also, the case law has long permitted law enforcement action to proceed in cases in which the lives of officers or others are threatened in cases of “hot pursuit”, border searches, school locker searches, or where emergency situations exist. See generally
Warden v. Hayden,
Indeed, in
Zweibon,
Judge Wright enumerates a number of Defendants’ practical arguments here (including judicial competence, danger of security leaks, less likelihood of criminal prosecution, delay, and the burden placed upon both the courts and the Executive branch by compliance) and finds, after long and careful analysis, that none constitutes adequate justification for exemption from the requirements of either FISA or the Fourth Amendment.
Zweibon,
As long ago as the Youngstown case, the Truman administration argued that the cumbersome procedures required to obtain warrants made the process unworkable. 56 The Youngstown court made short shift of that argument and, it appears, the present Defendants’ need for speed and agility is equally weightless. The Supreme Court in the Keith 57 , as well as the Hamdi 58 cases, has attempted to offer helpful solutions to the delay problem, all to no avail.
XL Conclusion
For all of the reasons outlined above, this court is constrained to grant to Plaintiffs the Partial Summary Judgment requested, and holds that the TSP violates the APA; the Separation of Powers doctrine; the First and Fourth Amendments of the United States Constitution; and the statutory law.
Defendants’ Motion to Dismiss the final claim of data-mining is granted, because litigation of that claim would require violation of Defendants’ state secrets privilege.
The Permanent Injunction of the TSP requested by Plaintiffs is granted inasmuch as each of the factors required to be met to sustain such an injunction have undisputedly been met.
59
The irreparable injury necessary to warrant injunctive relief is clear, as the First and Fourth Amendment rights of Plaintiffs are violated by the TSP. See
Dombrowski v. Pfister,
As Justice Warren wrote in
U.S. v. Robel,
Implicit in the term ‘national defense’ is the notion of defending those values and ideas which set this Nation apart.... It would indeed be ironic if, in the name of national defense, we would sanction the subversion of ... those liberties ... which makes the defense of the Nation worthwhile. Id. at 264,88 S.Ct. 419 .
IT IS SO ORDERED.
Notes
. Available at http:llwww.wh.ite-house.gov/lnewslreleasesl2005l12/20051219-2.html
. Pub.L. 95-511, Title I, 92 Stat 1976 (Oct. 25, 1978), codified as amendеd at 50 U.S.C. §§ 1801 et seq.
. Operation MINARET was part of the NSA’s regular intelligence activity in which foreign electronic signals were monitored. Operation SHAMROCK involved the processing of all telegraphic traffic leaving or entering the United States.
Hepting v. AT & T Corp.,
. In
Terkel v. AT & T Corp.,
. Further, the court was not persuaded by the plaintiff's argument that the privilege was negated because the Government had admitted that the rendition program existed because it found the Government’s admissions to be without details.
. In
Halkin,
the plaintiffs were requesting that the Government answer interrogatories and sought to depose the secretary of defense.
Halkin,
. See generally, in a Declaration, attorney Nancy Hollander stated that she frequently engages in international communications with individuals who have alleged connections with terrorist organizations. (Exh. J, Hollander). Attorney William Swor also provided a similar declaration. (Exh. L, Swor Decl.). Journalist Tara McKelvey declared that she has international communications with sources who are suspected of helping the insurgents in Iraq. (Exh. K, McKelvey Decl.).
. Plaintiffs' Statement of Undisputed Facts (hereinafter "SUF”) SUF 15 (Exh. J, Hollander Decl. ¶¶ 12, 16, 25; Exh. L, Swor Decl. ¶¶ 9, 11-12, 14-16);Plaintiffs;' Reply Memorandum in Support of Plaintiffs' Motion for Partial Summary Judgment (hereinafter "PL's Reply”) (Exh. P, Dratel Decl. ¶¶ 9 — 11; Exh. Q, Abdrabboh Decl. ¶¶ 7-8; Exh. R. Ayad. Decl. ¶¶ 4, 6-8); (Exh. M Niehoff Decl. ¶¶ 12).
.On December 17, 2005, in a radio address, President Bush stated:
In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with U.S. law and the Constitution, to intercept the international communications of people with known links to al Qaeda and related terrorist organizations. http://www.whUe-house.gov/news/releases/2005/12/20051217.html
. Defendants’ Brief in Support of Summary Judgment pg. 33.
. Defendants also contend that Plaintiffs’ claims are barred because they properly invoked statutory privileges under the National Security Agency Act of 1959, 50 U.S.C. § 402 and the Intelligence Reform and Terrorism Prevention Act of 2004, 50 U.S.C. § 403-(i)(l). Again, these privileges are not availing to Defendants with respect to Plaintiffs’ claims challenging the TSP, for the same reasons that the state secrets privilege does not bar these claims.
. SUF 15B (Exh. I, Diamond Decl. ¶ 9; Exh. K, McKelvey Decl. ¶ 8-10).
. SUF 15B (Exh. J, Hollander Decl. ¶¶ 12-14, 17-24; Exh. L, Swor Decl. ¶¶ 5-7, 10); Pl.’s Reply (Exh. M, Dratel Decl. ¶¶ 5-6; Exh. Q, Abdrabboh Decl. ¶¶ 3-4; Exh. R, Ayad Decl. ¶¶ 5, 7-9).
. SUF 15 (Exh. J, Hollander Decl. ¶¶ 12, 16, 25; Exh. L, Swor Decl. ¶¶ 9, 11-12, 14-16); Pl.’s Reply (Exh. P, Dratel Decl. ¶¶ 5-6; Exh. Q, Abdrabboh Decl. ¶¶ 3-4; Exh. R, Ayad Decl. ¶¶ 6-7).
. SUF 15 (Exh. J, Hollander Decl. ¶¶ 12, 16, 25; Exh. L, Swor Decl. ¶¶ 9, 11-12, 14-16);Pl.’s Reply (Exh. P, Dratel Decl. 1HI9-11; Exh. Q, Abdrabboh Decl. ¶¶ 7-8; Exh. R. Ayad. Decl. ¶¶ 4, 6-8).
. SUF 15 (Exh. J, Hollander Decl. ¶¶ 20, 23-25; Exh. L, Swor Decl. ¶¶ 13-14); Pl.’s Reply (Exh. P, Dratel Decl. ¶¶9-11; Exh. Q, Ab-drabboh Decl. ¶¶ 7-8; Exh. R, Ayad Decl. ¶¶ 6-8).
. Pl.’s Reply (Exh. M Niehoff Decl. ¶¶ 12)
. Pl.’s Reply (Exh. M Niehoff Decl. ¶¶ 19-20)
. Pl.’s Reply (Exh. M Niehoff Decl. ¶¶ 15-20)
. In December 2005, the President publicly acknowledged that the TSP intercepts the contents of certain communications as to which there are reasonable grounds to believe that (1) the communication originated or terminated outside the United States, and (2) a party to such communication is a member of al Qaeda, a member of a group affiliated with al Qaeda, or an agent of al Qaeda or its affiliates. Available at http://www.whiteh.ouse. govl/news/releases/2005/12/20051219-2.html.
. Available at http://www.white-house.gov//news/releases/2005/l2/20051219-2.html
. Id.
.Available at http://www.white-house.gov/lnewslreleases/2005l12/20051219-2.html
. Pub.L. 90-351, 82 Stat. 211, codified as amended at 18 U.S.C. §§ 2510 et seq.
. 18 U.S.C. § 2510(11) ("aggrieved person” means a person who was a party to any intercepted wire, oral, or electronic communication or a person against whom the interception was directed.)
. 18 U.S.C. §25182518
. 18 U.S.C. §2518(1).
. 18 U.S.C. §2518(7).
. The “Church Committee” was the United States Committee to Study Governmental Operations with Respect to Intelligence Activities.
. S. Rep. NO. 94-755, at 332 (1976)
. Pub.L. 95-511, Title I, 92 Stat 1976 (Oct. 25, 1978), codified as amended at 50 U.S.C. §§ 1801 etseq.
. 18 U.S.C. §251 l(2)(f).
. 50 U.S.C. § 1801 (h)(4)(i)("United States person”) means a citizen of the United States, an alien lawfully admitted for permanent residence, an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence, or a corporation which is incorporated in the United States which is not a foreign power.
. 50 U.S.C. § 1811
. 50 U.S.C. § 1802
. 50 U.S.C. § 1805(f).
. 50 U.S.C. § 1805(e)(1).
. 50 U.S.C. § 1806(c).
. 50 U.S.C. § 1804(a)(7)(E)(ii), § 1805(a)(5)
. 50 U.S.C. § 1805(b).
. 50 U.S.C § 1803.
. 50 U.S.C § 1805.
. U.S. Const, art. I, § 1
. U.S. Const, art. II, § 1
. U.S. Const, art. II, § 3
. Authorization for Use of Military Force, Pub.L. No. 107-40, § 2(a), 115 Stat. 224 (Sept. 18, 2001) (reported as a note to 50 U.S.C.A. § 1541)
. 50 U.S.C. § 1811
. U.S. Const, art. II, § 5
. U.S. Const, art. II, § 2[1]
. U.S. Const, art. II, § 1 [8]
. See generally
Hamdi,
. See generally
Youngstown,
. See generally
Home Building & Loan Ass’n v. Blaisdell,
. See generally
Falvey,
. See generally
Zweibon,
. See generally
Youngstown,
. See generally
U.S.
v.
U.S. District Court, 407
U.S. 297,
. See generally
Hamdi,
. It is well-settled that a plaintiff seeking a permanent injunction must demonstrate: (1) that it has suffered an irreparable injury; (2) that remedies available at law, such as monetary damages, are inadequate to compensate for that injury; (3) that, considering the bal-anee of hardships between the plaintiff and defendant, a remedy in equity is warranted; and (4) that the public interest would not be disserved by a permanent injunction.
eBay Inc. v. MercExchange, L.L.C.,
- U.S. -,
