United States citizen Hassan Abu-Jihaad, whose birth name is Paul Raphael Hall, appeals from a judgment of conviction entered in the United States District Court for the District of Connecticut (Mark R. Kravitz, Judge) on April 3, 2009, after a jury found him guilty of having communicated national defense information, specifically, the anticipated movements of a United States Navy battlegroup being deployed to the Persian Gulf, to unauthorized persons in violation of 18 U.S.C. § 793(d). Presently serving a ten-year prison term for that crime, Abu-Jihaad contends that (1) inculpatory evidence obtained pursuant to the Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. § 1801 et seq., should have been suppressed because (a) that statute is unconstitutional and (b) in any event, was not complied with in this case; (2) erroneous evidentiary rulings deprived him of a fair trial; (3) the trial evidence was insufficient to support conviction; and (4) the district court abused its discretion in entering protective orders pursuant to the Classified Information Procedures Act (“CIPA”), 18 U.S.C. app. 3, §§ 1-16.
We identify no merit in any of these arguments and, accordingly, we affirm the judgment of conviction.
I. Background
In 1997, defendant Paul Raphael Hall changed his name to “Hassan Abu-Jihaad,” the surname of which translates to “Father of Jihad.” 1 This curious choice *109 appears not to have raised any concern in the United States Navy when, in January 1998, Abu-Jihaad enlisted. 2 Indeed, over the course of Abu-Jihaad’s military service, from 1998-2002, the Navy would clear defendant to receive classified national defense information. The Navy’s trust was misplaced. As the jury found, sometime in early 2001, Abu-Jihaad leaked classified information about the movements of Navy ships destined for the Persian Gulf to unauthorized persons supportive of jihad. Because Abu-Jihaad challenges the sufficiency of the evidence supporting the jury verdict, we discuss that evidence in some detail.
A. Discovery of the Classified Information in a London Search
The first link in the chain of circumstantial evidence proving Abu-Jihaad’s guilt was discovered in London where, on December 2, 2003, British authorities conducted searches of various locations associated with Babar Ahmad, an information technologist at London’s Imperial College with ties to Azzam Publications.
1. Azzam Publications’ Support for Jihad
London-based Azzam Publications (“Azzam”) was an organization that in 2001 maintained a number of websites that glorified martyrdom in the name of
jihad
and the violent exploits of
mujahideen
around the world.
See United States v. Abu-Jihaad,
2. The December 2, 2008 Discovery of the Battlegroup Document
In the course of searching Babar Ahmad’s bedroom on December 2, British authorities discovered a computer disk containing materials related to Azzam. 5 Of particular significance to this case was a file denominated “letter.doc,” which contained a three-page unsigned document describing the anticipated spring 2001 deployment of ten U.S. Navy ships carrying approximately 15,000 sailors and marines from the Pacific coast of the United States to the Persian Gulf (“the Battlegroup Document”). Id. at 367. The significance of the Battlegroup Document is best illustrated by quoting it directly. 6 The first page states as follows:
In the coming days the United States will be deploying a large naval/marine force to the Middle East.
This will be a two group force: the Battle Group (BG) and the Amphibious Readiness Group (ARG) — these groups will be replacing the already deployed groups in the gulf.
The BG mission is to hold up the sanctions against Iraq, e.g. patrolling the No-Fly Zone, carry out Maritime Interception Operations (MIO) or launch strikes.
There is a possibility that the ships and submarines that are capable will carry out a strike against Afghanistan. Main targets: Usama and the Mujahideen, Taliban, etc.
A two star admiral, COMCRUDESRON 1 (his title), a high ranking officer of the BG said that “there will be certain ships of this BG sitting off the coast of Pakistan with ‘launch pads.’ ”
Most of the ships that are part of the BG will deploy on March 15 2001 leaving their home ports out of California and Washington State. They will meet up with the other ships that are part of the BG which are stationed in Hawaii. Their first port stop is Hawaii on March 20 2001, where some ships will load Tomahawk D missiles. The same missies used on Afganistán and Sudan. It has a warhead and 166 [mm?] fragment bomblets. Then the whole BG will head towards Austrailia. The main ship with high ranking officials will be at Sydney on April 6 2001, other ships — Melbourne, Perth, Bunbary etc. The BG will be going through the straits of Hormuz on the April 29 2001 at night, cutting off certain “infocoms” and “Emcoms” to divert their enemies on how *111 many ships are actually coming through. This will be a night time set-up.
Gov’t Ex. 1.
Immediately beneath this text is a diagram showing a two-column formation in which identified ships in the battlegroup, including the aircraft carrier U.S.S. Constellation 7 and the destroyer U.S.S. Benfold — on which Abu-Jihaad served as a signalman — were expected to enter the Strait of Hormuz. Following the diagram are brief descriptions of the capabilities of each ship. For example, with respect to the battlegroup ships, the document states:
1. USS Constellation (CV 64) Kitty Hawk Class carrier
Personnel: 5,500 to 6,000
Special team: onboard Explosive Ordnance Disposal team (EOD)
Mission: No-fly zone, patrol, etc.
2. USS Chosin (CG-65) Ticonderoga class
Personnel: 350 to 400
Specialisation: anti-air warfare
Plus carrier escort all these ships
3. Kinkaid (DD965) Sprvance class3
Personnel: 300-350
Specialisation: MIO etc
4. USS Benfold (DDG-65) Arleigh Burke class
Personnel: 300
Multi-capable ship
7. USS Rainer (AOE-7)
Personnel: 400 to 500
Ammo and fuel replenishing ship for the BG.
Id. With respect to the Amphibious Readiness Group, the document reveals that three ships were expected to deploy “out of homeport San Diego, March 14 2001” with a port visit in South-East Asia, specifically, in Thailand and Singapore, before heading to the Middle East. Id. Among the ships described is the following:
1. USS BOXER (LHD9) com ship, Wasp class
Personnel: 1,500 sailors, 2,500 marines; high ranging officials abroad; also special forces, Navy Seals and Marines Special Unit
Reconnaissance ships carries lots of helos [helicopters?] all kinds.
Id.
The document concludes by identifying the battlegroup’s vulnerabilities, highlighting its operation schedule in the Persian Gulf, and then exhorting the recipient to destroy the communication:
Weakness:
They have nothing to stop a small craft with RPG etc, except their Seals’ stinger missiles.
Deploy ops in Gulf 29 April — 04 October.
29th APRIL is more likely the day through the Straits. For the whole of March is tax free — a moral booster. Many sailors do not like the Gulf.
Please destroy message.
Id.
Based on forensic analysis of the totality of evidence obtained in the ensuing investigation, a federal agent testified at trial that the disk containing the Battlegroup Document appeared to have been created by British citizen Syed Talha Ahsan, an Azzam employee who handled product backlog.
See United States v. Abu-Ji
*112
haad,
In the course of their larger investigation, authorities would recover no other electronic data from any source revealing trace information pertaining to transmittal of the Battlegroup Document, research into United States naval forces generally or the Constellation battlegroup in particular, or any evidence relating to “Jon Greene.”
B. Abu-Jihaad’s Transmittal of the Battlegroup Document
To prove Abu-Jihaad’s transmittal of the Battlegroup Document (or the information contained therein) to persons at Azzam, the government relied on evidence showing: (1) defendant’s access to the information; (2) his communications with Azzam expressing support for jihad; and (3) his implicit admission in a 2006 recorded statement to having disclosed confidential national security information while in the Navy.
1. Defendant’s Access to the Transit Plan
The 2001 deployment of the Constellation battlegroup from San Diego to the Middle East was executed pursuant to a Navy transit plan that went through many drafts beginning on September 29, 2000, and continuing through finalization on February 24, 2001. Each of these iterations highlighted the date April 29, 2001, when, just before midnight, the battle-group would cross the “change of operation control” (“CHOP”) point, ie., enter into the geographic region controlled by the United States Fifth Fleet. Only the final transit plan referenced a stop in Hawaii by a single vessel, the U.S.S. Benfold, to load ammunition. No version of the transit plan specified the date on which the battlegroup would pass through the Strait of Hormuz. 9
Each iteration of the transit plan was classified “confidential,” which denotes “information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe.” Exec. Order No. 12,958, § 1.3(3), 60 Fed.Reg. 19,825 (Apr. 17, 1995);
see also United States v. Abu-Jihaad,
Because of these concerns, even among persons assigned to ships in a battlegroup, only those with a “secret” clearance would be given access to a transit plan. Of 300 sailors on board the U.S.S. Benfold, Abu-Jihaad was one of 40 afforded such access by virtue of his status as a signalman who worked alongside quartermasters in the preparation of the ship’s navigational charts. He did not, however, have access to the Navy’s secure intranet for classified information (“SIPRnet”), which contained information even more sensitive to the national defense than that contained in the transit plan. Significantly, the Battle-group Document revealed no information for which SIPRnet clearance would have been required, thus limiting the likely source of the information it contained to persons with access only to the transit plan.
2. Abvr-Jihaad’s Communications with Azzam
Even before United States officials received a copy of the seized Battlegroup Document from their British counterparts, federal agents, acting pursuant to court order, had searched various Azzam-affiliated electronic accounts and discovered therein eleven email exchanges in the time frame of August 21, 2000, to September 3, 2001, between Azzam and a United States sailor serving on the U.S.S. Benfold: the defendant Hassan Abu-Jihaad. 11 Abu-Jihaad used both his personal and military email addresses in these communications. In its review of 23,000 Azzam emails, the government discovered only two correspondents with military email addresses: (1) a Navy Commander who commented angrily on Azzam’s support for jihad and (2) Abu-Jihaad. Moreover, Abu-Jihaad’s military email address was one of the few addresses saved in an Azzam email account address book. In his early emails with Azzam, Abu-Jihaad discussed purchases of various materials, including the videos Martyrs of Bosnia, Russian Hell 2000, Part I, and Chechnya from the Ashes (which included the feature Russian Hell 2000, Part II). 12 In later emails, Abu-Jihaad revealed his identity and status as an active duty member of the Navy and his personal support for jihad, even when directed against the United States.
In a July 2001 email sent from Abu-Jihaad’s personal email account to qoqaz@ assam.com — the email address to which *114 Azzam’s websites directed readers to send their messages of support — defendant praised the “martyrdom operation against the uss cole” and the debilitating effect of that action on the United States (“Cole email”). Trial Tr. at 333-34; Gov’t Ex. 19. The text of the Cole email, which was retrieved only because it was embedded in Azzam’s reply, states as follows:
i am a muslim station onboard a u.s. warship currently operating depolyed to the arabian gulf, it shall be noted before usama’s latest video was viewed by massive people all over the world, that psychological anxiety had already set in on america’s forces everywhere, all this is due to the martyrdom operation against the uss cole, since then every warship station either on the western or eastern shores of america who come to operate in the 5th fleet op area has to be given a force protect brief, well during the brief, i attended there was one thing that stuck out like thorns on a rose bush, i do not know who was the originator of this either top brass or an american poitician. well here is his/her statement: “america has Never faced an enemy with no borders, no government, no diplomats, nor a standing army that pledges allegiance to no state.” Allahu Akbar! Allahu Akbar! 13 i give takbirs [praise to Allah] because i know deep down in my heart that the american enemies that this person has discribe is the Mujahideen Feesabilillah [holy warriors fighting in the cause of Allah], these brave men are the true champions and soldiers of Allah in this dunya [world], i understand fully that they are the men who have brong honor to this weak ummah [Islamic community] in the lands of jihad afghanistan, bosnia, Chechnya, etc. Alhamdulillah! [Praise to Allah!] With their only mission in life to make Allah’s name and laws supreme all over this world, i want to let it be known that i have been in the middle east for almost a total of 3 months, for these 3 months you can truly see the effects of this psychological warfare taking a toll on junior and high ranking officers, but after the latest video supporting Palestine, the top brass and american officials were running around like headless chickens very afraid, wondering if there is a possible threat, but this time the american population got wind of this and they came to know just how afraid the u.s. government is. thomas 1. friedman wrote an article in the new york times called: “what it takes to make the americans to turn tail, run.” this article was distributed on my ship and most of the sailors said it was so true about the american government, and they feel like they are working for a bunch of scary pussies.... a Brother *115 serving a Kuffar [infidel] nation. Astaghfir’Allah [Forgiveness from Allah] .... Hassan
United States v. Abu-Jihaad,
You said it all, and all I can add is that the Kufar know that they cannot defeat the Mujahideen (the warriors of Allah). I trust that you are doing your best to make sure that the other brothers & sisters in uniform are reminded that their sole purpose of existence in this duniya [world] is purely to worship our Lord and Master, Allah (SWT) [praise being given to Allah],
May Allah be with you & your brothers and sisters and keep you from all harm. Keep up with the Dawah [preaching Islam] and the psychlogical warefare.
Id. at 373 (bracketed material added by district court).
In the last of the eleven emails recovered by the government, Abu-Jihaad praised Azzam’s coverage of the Taliban in Afghanistan, but opined that the Taliban were too lenient in failing to execute foreign aid workers who converted Muslims to other faiths.
None of Abu-Jihaad’s recovered emails referenced the Battlegroup Document or the information contained therein.
3. Abur-Jihaad’s 2006 Recorded Statements
In 2006, by which time Abu-Jihaad had been out of the Navy for four years and was living in Phoenix, Arizona, Abu-Jihaad’s telephone conversations with his friend Derrick Shareef and a confidential informant were intercepted by a court-authorized wiretap. In excerpts of four calls from late 2006 that were played for the jury, Abu-Jihaad revealed his familiarity with Azzam’s websites, see Gov’t Ex. 141c, and his high degree of concern with “tapped” telephones, Gov’t Ex. 141e. Abu-Jihaad stated an intent to “secur[e] myself’ to avoid “handfing] myself to a Kafir [infidel].” Gov’t Ex. 141f. He cautioned those with whom he spoke not to refer to associates by their real names, see Gov’t Ex. 141g, and he frequently employed code, referring to jihad as “J” or “7,” 14 e.g., Gov’t Ex. 141c, logistics as “L,” e.g., Gov’t Ex. 141g, martyrdom operations as “M.O.,” e.g., Gov’t Ex. 141f, and military intelligence as “meals,” e.g., Gov’t Ex. 141k. 15 Thus, Abu-Jihaad’s references to a “cold meal” meant outdated intelligence, whereas a “fresh meal” or “hot meal” referred to current intelligence. Trial Tr. at 975-76.
In a November 11, 2006 conversation, Abu-Jihaad stated that he no longer had current logistics information: “Now ‘L’ for me is like a cold meal. ‘Cuz it ain’t fresh.... If it ain’t fresh, it’s un-fresh and it, it’s un-beneficial to you — just put it that way.” Gov’t Ex. 141g. He repeated this point in a subsequent conversation with Shareef and the confidential informant the same day:
ABU-JIHAAD: And I said, and I’ll say it again, with whatever I can give you, that’s beneficial, I’ll give it to you. But whatever’s cold turkey, if it’s cold turkey, I can’t give it to you.
*116 CW 16 : Ak ...
ABU-JIHAAD: ‘Cuz that means that, if it’s cold turkey — I’m talking about “L” you figure it out — ‘cuz then that means that, that’s just saying that, I haven’t been on that job, so I don’t— you know what I’m saying, I haven’t been there ... to see ... what the fresh meal is.
SHAREEF: Okay.
ABU-JIHAAD: You understand that?
SHAREEF: Yeah.
CW: Tell him, man I already got brothers ...
ABU-JIHAAD: If I can’t, if I can’t give you the fresh meal — I ain’t been there in “X” amount of years.
SHAREEF: Yeah, I — I understand what you’re saying.
ABU-JIHAAD: See what I’m saying? Now if ... the Hispanic, if the Mexican, he just, was there a minute ago— he can give you a fresh meal.
SHAREEF: Okay.
ABU-JIHAAD: So you put that together.
ABU-JIHAAD: If it’s — if it’s ... in those terms, he can give you a fresh meal ‘cuz, you know what I’m saying, he just finished his job, there, less than a month ago, or ...
SHAREEF: Okay.
ABU-JIHAAD: ... two. (LAUGHS). But I, I mean — in those terms and “L’s,” — I would be giving you a cold meal.
CW: I understand.
SHAREEF: Allrighty.
ABU-JIHAAD: You got me?
SHAREEF: Yeah, I got you.
ABU-JIHAAD: Because, um — and then I can elaborate on that more if you want me to ...
CW: No, no ...
ABU-JIHAAD: ... to your face — not on the phone. I’m just saying ... if we ... you got me?
SHAREEF: Yeah, man ... we good, we good.
ABU-JIHAAD: A fresh meal and a cold meal.
Gov’t Ex. 141h at 1-2. The informant testified that when Abu-Jihaad said he had not “been on that job,” the informant understood Abu-Jihaad to mean he was no longer in the Navy. By contrast, the informant understood the “Mexican” to be a reference to Miguel Colon, a man who had left the Marine Corps only recently in September 2006.
Still later on November 11, 2006, Abu-Jihaad spoke with Colon about Shareef s wish to procure military intelligence:
ABU-JIHAAD: [H]e wants a hot meal. You know what I’m saying?
COLON: Yeah.
ABU-JIHAAD: I don’t know how to get him no hot meal. I told him I, I ain’t been working uh, in, in, in the field of making meals and or, you know ...
COLON: Yeah.
ABU-JIHAAD: ... in a, in a long time. I’ve been out of that for, uh, over uh, quatro years you know.
Gov’t Ex. 141k at 7. At trial, the government argued that, by explaining his present inability to provide military intelligence by reference to the fact that he had not been “working ... in the field of making meals” for four years, Abu-Jihaad was effectively admitting that he had leaked military intelligence while in the Navy.
C. Conviction and Sentencing
Based on the evidence summarized, on March 5, 2008, the jury found Abu-Jihaad
*117
guilty of both providing material support to terrorists in violation of 18 U.S.C. § 2389A and communicating national defense information to unauthorized persons in violation of 18 U.S.C. § 793(d). On March 4, 2009, the district court granted Abu-Jihaad’s motion for a judgment of acquittal as to the first count and denied the motion as to the second count.
See United States v. Abu-Jihaad,
This appeal followed.
II. Discussion
A. The FISA Challenge
In securing Abu-Jihaad’s conviction, the prosecution relied on certain recorded evidence intercepted pursuant to court orders issued under the Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. § 1801 et seq. Abu-Jihaad submits that the district court erred in refusing to suppress this evidence because (1) on its face, FISA violates the Fourth Amendment; and (2) in any event, the statute’s requirements were not satisfied in this case. We identify no merit in either argument.
1. FISA Is Constitutional on Its Face
a. FISA’s General Operation
Enacted in 1978, FISA permits the Chief Justice of the United States to designate eleven federal judges as the Foreign Intelligence Surveillance Court (“FISA Court”), see id. § 1803(a)(1), with jurisdiction to entertain ex parte executive applications for electronic surveillance 18 “for the purpose of obtaining foreign intelligence information,” Id. § 1802(b). 19 To issue a FISA warrant, a judge must find, *118 inter alia, that there is probable cause to believe that the target of the surveillance is a “foreign power or an agent of a foreign power” and that the place or facilities to be surveilled are “being used, or ... about to be used, by a foreign power or an agent of a foreign power.” Id. § 1805(a)(2). 20
*119
Rulings by the FISA Court are subject to review by the Foreign Intelligence Surveillance Court of Review (“FISA Review Court”), which consists of three judges also designated by the Chief Justice.
See id.
§ 1803(b). The FISA Review Court has convened only twice since the statute’s enactment: (1) when it heard and rejected a constitutional challenge to FISA not dissimilar to that pursued by Abu-Jihaad in this case,
see In re Sealed Case,
b. The PATRIOT Act’s Amendment of FISA’s Purpose Certification Requirement
As originally enacted, FISA required a high-ranking member of the executive branch to certify that “the purpose” for which a warrant was being sought was to obtain “foreign intelligence information.” 50 U.S.C. § 1804(a)(7)(B) (Supp. V 1981).
22
Referencing this language in
United States v. Duggan,
In 2001, Congress amended FISA as part of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (“PATRIOT Act”), Pub.L. No. 107-56, 115 Stat. 271 (2001). Among other things, Congress indicated that it did not, in fact, require foreign intelligence gathering to be the
primary
purpose of the requested surveillance to obtain a FISA warrant. Rather, upon satisfaction of all other FISA requirements, Congress authorized FISA Court judges to issue warrants upon executive certification that acquisition of foreign intelligence information is “a
significant
purpose” of the requested surveillance.
See id.
§ 218,
Because neither Duggan nor Stewart considered FISA’s constitutionality in light of the statute’s amendment by the PATRIOT Act, Abu-Jihaad submits that *120 we must address the question of constitutionality yet again. Specifically, Abu-Jihaad submits that the primary purpose requirement is, in fact, essential to the constitutionality of FISA, lest the government misuse the statute to procure warrants for criminal investigations without demonstrating the probable cause essential to that latter purpose, ie., probable cause to believe “that an individual is committing, has committed, or is about to commit a particular offense” and that “particular communications concerning that offense will be obtained through” the surveillance. See 18 U.S.C. § 2518(3)(a)-(b) (stating probable cause required by Title III of the Omnibus Crime Control and Safe Streets Act of 1968, Pub.L. 90-351, 82 Stat. 197 (codified as amended at 18 U.S.C. §§ 2510-2522)).
In support of his challenge, Abu-Jihaad cites
Mayfield v. United States,
As we discuss more fully in this opinion, the Fourth Amendment warrant requirement demands a showing of probable cause reasonable to the purpose being pursued. Thus, identification of purpose is necessary to assess the reasonableness of the probable cause standards at issue. Where multiple purposes are significant to an investigation, however, the Fourth Amendment does not require the government to identify a primary purpose or limit its ability to secure a warrant to satisfaction of the standards for that purpose. Rather, the government may secure a warrant under the probable cause standards applicable to any purpose that it pursues in good faith. 23 Thus, we identify no constitutional defects in FISA’s certification requirement of “a significant” rather than a primary “purpose ... to obtain foreign intelligence information.” 50 U.S.C. § 1804(a)(6)(B).
*121 c. The “Primary Purpose” Requirement’s Origins as a Limit on the Executive’s Claimed Inherent Authority to Conduct Warrantless Surveillance for Foreign Intelligence Information
To explain the basis for our decision, we begin by noting that the “primary purpose” requirement urged by Abu-Jihaad was originally formulated to address a constitutional concern not present in this case: the scope of presidential authority to conduct
warrantless
foreign intelligence surveillance. In
United States v. United States District Court (Keith),
We have no occasion here to consider these warrantless surveillance decisions. We note simply that there is an important distinction between warrantless surveillances premised exclusively on executive authority, and surveillances pursuant to warrants issued by courts in compliance with standards enacted by Congress. The former require identification of an exception to the Fourth Amendment’s warrant requirement.
See United States v. Duggan,
d. The Fourth Amendment’s Warrant Requirement Is Flexible.
As this court has recognized, the Constitution’s warrant requirement is “flexible,” so that “different standards may
*122
be compatible with the Fourth Amendment in light of the different purposes and practical considerations” at issue.
United States v. Duggan,
The considerations that the Supreme Court identified in Keith as distinguishing domestic security surveillance from the surveillance of “ordinary crime” and, therefore, as supporting different warrant standards, pertain equally to foreign intelligence surveillance:
The gathering of security intelligence is often long range and involves the interrelation of various sources and types of information. The exact targets of such surveillance may be more difficult to identify than in surveillance operations against many types of crime specified in Title III. Often, too, the emphasis of domestic intelligence gathering is on the prevention of unlawful activity or the enhancement of the Government’s preparedness for some possible future crisis or emergency. Thus, the focus of domestic surveillance may be less precise than that directed against more conventional types of crime.
Id.
at 322,
The benchmark for judicial review of the constitutionality of warrant requirements established by Congress is reasonableness: “Different standards may be compatible with the Fourth Amendment if they are reasonable both in relation to the legitimate need of Government for intelligence information and the protected rights of our citizens.”
Id.
at 322-23,
This discussion in
Keith
informed our decision in
United States v. Duggan,
e. A “Significant” Rather than “Pri mary” Purpose to Obtain Foreign Intelligence Information Does Not Render FISA’s Warrant Standards Unreasonable
(1) Duggan Recognized “Primary” Purpose as a Matter of Statutory Construction not Constitutional Mandate
In concluding that the “significant purpose” certification requirement does not raise constitutional concerns, we note that when, in
Duggan,
we construed FISA’s original reference to electronic surveillance for “the purpose” of obtaining foreign intelligence information,” as a “requirement that foreign intelligence information be the
primary
objective of [any court-ordered] surveillance,”
id.
at 77 (emphasis added), we were identifying Congress’s intent in enacting FISA, not a constitutional mandate,
see generally W.R. Grace & Co-Conn. v. Zotos Int’l, Inc.,
(2) Considerations Prompting Congress’s Adoption of the “Significant” Purpose Amendment
In considering Congress’s decision to allow FISA standards to be triggered by a showing of a “significant” rather than “primary” purpose of obtaining foreign intelligence information, we may properly consider the “practical considerations” informing that choice.
See Keith,
FISA’s original purpose certification requirement was not uniformly construed by the courts. Although we thought it clear that the statute’s original reference to “the purpose” to obtain foreign intelligence information referenced the primary purpose,
United States v. Duggan,
In United States v. Duggan, we had “emphasize[d]” this same point, even though we construed “the purpose” requirement of FISA to mean “primary purpose”:
[Otherwise valid FISA surveillance is not tainted simply because the government can anticipate that the fruits of such surveillance may later be used, as allowed by § 1806(b), as evidence in a criminal trial. Congress recognized that in many cases the concerns of the government with respect to foreign intelligence will overlap those with respect to law enforcement.
In the years after our decision in
Duggan,
this important point became muddled, if not lost. In 1995, the Justice Department not only committed itself to satisfying the primary purpose test but, “[apparently to avoid running afoul” of that test, it adopted procedures limiting contacts between intelligence and law enforcement officials.
See In re Sealed Case,
As the FISA Review Court observed, these practices imposed a cost on national security. See id. at 744 & n. 29 (citing congressional hearings indicating that practices implemented to segregate intelligence from law enforcement officials to avoid running afoul of primary purpose test “may well have contributed, whether correctly understood or not, to the FBI missing opportunities to anticipate the September 11, 2001 attacks”). In the aftermath of September 11, 2001, the executive asked Congress to substitute “a purpose” for “the purpose” requirement of FISA so as to allow it to dismantle the wall between intelligence and law enforcement personnel erected to ensure that the primary purpose of any FISA surveillance or search was to obtain foreign intelligence information and not evidence of crime. Id. at 732.
*126 Congress did not accept the executive’s proposed language, but it did agree that certification of a primary purpose to obtain foreign intelligence information should not be required to secure a FISA warrant. Although no committee reports accompanied the PATRIOT Act, Senator Feinstein, one of the act’s strong supporters, provided a cogent floor statement as to the reasons for recasting FISA’s purpose certification requirement:
Under current law, authorities can proceed with surveillance under FISA only if the primary purpose of the investigation is to collect foreign intelligence.
But in today’s world things are not so simple. In many cases, surveillance will have two key goals — the gathering of foreign intelligence, and the gathering of evidence for a criminal prosecution. Determining which purpose is the “primary” purpose of the investigation can be difficult, and will only become more so as we coordinate our intelligence and law enforcement efforts in the war against terror.
Rather than forcing law enforcement to decide which purpose is primary — law enforcement or foreign intelligence gathering, this bill strikes a new balance. It will now require that a “significant” purpose of the investigation must be foreign intelligence gathering to proceed with surveillance under FISA.
The effect of this provision will be to make it easier for law enforcement to obtain a FISA search or surveillance warrant for those cases where the subject of the surveillance is both a potential source of valuable intelligence and the potential target of a criminal investigation. Many of the individuals involved in supporting the September 11 attacks may well fall into both of these categories.
147 Cong. Rec. S10591 (Oct 11, 2001) (quoted in
In re Sealed Case,
To address these practical consider
ations
— i.e., the difficulty in identifying the primary purpose when surveillance is pursued jointly by intelligence and law enforcement officials, and the importance of such joint efforts to protect national security — Congress in the PATRIOT Act amended FISA to provide that, upon satisfaction of all other statutory requirements, FISA warrants could be issued on certification “that a significant purpose of the surveillance is to obtain foreign intelligence information.”
See
Pub.L. No. 107-56, § 218,
*127 (8) A “Significant Purpose” To Obtain Foreign Intelligence Information Is Sufficient to Support the Application of FISA’s Standards to Surveillance Applications
Abu-Jihaad does not dispute the considerations prompting Congress’s adoption of the “significant purpose” amendment. Rather, he argues that if FISA’s probable cause standards are applied without a “primary” government purpose to obtain foreign intelligence information, the executive will be able to manipulate FISA to obtain surveillance warrants for criminal investigations without demonstrating the probable cause required by Title III for that purpose. Because we conclude that the required certification of “a significant purpose” to obtain foreign intelligence information adequately protects against this possibility, we reject Abu-Jihaad’s constitutional challenge to this language.
As Congress and the courts have recognized, government investigations relating to national security frequently pursue more than one purpose.
See United States v. Duggan,
For Fourth Amendment purposes, the critical question is not whether the executive can certify that obtaining foreign intelligence information is its “primary” purpose, but whether it can certify that it is a bona fide purpose of the surveillance. *128 Thus, where the executive in good faith pursues both intelligence and law enforcement purposes, it may apply for surveillance authority under either FISA or Title III, provided it satisfies the particular warrant standards of the statute invoked. A Fourth Amendment concern would arise only if the executive, without a bona fide purpose to obtain foreign intelligence information, tried to secure a warrant under the standards identified in FISA as reasonable for that purpose.
We need not here decide at what point a purpose advanced by the executive might be so trivial as to preclude it from being pursued in good faith. Congress adequately safeguarded against that possibility in FISA by demanding certification of “a significant purpose” to obtain foreign intelligence information, rather than simply “a purpose” as originally requested by the executive. Moreover, the FISA Review Court, whose rulings bind the FISA Court in issuing surveillance warrants under the statute, has construed the significant purpose standard to require “that the government have a measurable foreign intelligence purpose, other than just criminal prosecution of even foreign intelligence crimes.” Id. at 735. 28 Indeed, the FISA Review Court has ruled that the significant purpose requirement specifically “excludes from the purpose of gaining foreign intelligence information a sole objective of criminal prosecution,” even for foreign intelligence crimes. Id.; see also id. at 736 (rejecting government’s argument that “significant purpose” requirement allowed it to have primary objective of prosecuting foreign agent for non-foreign-intelligence crime, and noting that “the manifestation of such a purpose” would “disqualify an application”).
The FISA Review Court has also plainly ruled that the government’s certified purpose in seeking a FISA warrant is subject to judicial review. See id. at 735-36 (recognizing FISA Court’s authority to seek more information pertaining to government’s purpose). While “a significant purpose standard” eliminates “any justification for the FISA Court to balance the relative weight the government places on criminal prosecution,” if the court determines that the government’s sole objective is “merely to gain evidence of past criminal conduct — even foreign intelligence crimes — to punish the agent rather than halt ongoing espionage or terrorist activity, the application should be denied.” Id. at 735. Thus, the FISA Review Court has ruled that to satisfy the significant purpose test, it must appear that “the government entertains a realistic option of dealing” with the target of the FISA surveillance “other than through criminal prosecution.” Id.
We do not here decide which, if any, of these FISA Review Court conclusions are constitutionally compelled. We conclude simply that FISA’s “significant purpose” requirement, so construed, is sufficient to ensure that the executive may only use FISA to obtain a warrant when it is in good faith pursuing foreign intelligence gathering, the purpose for which that statute’s warrant standards apply. The fact that the government may also be pursuing other purposes, including gathering evidence for criminal prosecution, compels no different conclusion.
Accordingly, we reject Abu-Jihaad’s argument that FISA is unconstitutional because it does not require certification of a primary purpose to obtain foreign intelligence information. Rather, we hold that *129 certification of a significant purpose to obtain foreign intelligence information, together with satisfaction of all other FISA requirements, is reasonable and, therefore, sufficient to support the issuance of a warrant under the Fourth Amendment.
2. FISA Was Lawfully Applied to This Case
Abu-Jihaad submits that, even if FISA is not unconstitutional on its face, his conviction must be vacated because the statute’s conditions were not satisfied in securing some of the evidence supporting his conviction. Specifically, Abu-Jihaad contends that the government’s application for a surveillance order (a) failed to satisfy the “significant purpose” requirement of 50 U.S.C. § 1804(a)(6)(B); (b) failed to demonstrate probable cause to believe that he was an agent of a foreign power or that his telephones were being used or about to be used by a foreign power or agent of such a power,
see id.
§ 1804(a)(3)(A)-(B); (c) included “clearly erroneous” § 1804(a)(6) certifications; and (d) was based on false statements, requiring a hearing under
Franks v. Delaware,
a. The District Court Properly Denied Disclosure and a Hearing
In FISA, Congress expressly provided that where, as here, the Attorney General certifies that “disclosure [of FISA materials] or an adversary hearing would harm the national security of the United States,” a district court must “review in camera and ex parte the application, order, and such other materials relating to the surveillance as may be necessary to determine whether the surveillance of the aggrieved person was lawfully authorized and conducted.” 50 U.S.C. § 1806(f). While the district court retains authority to order disclosure of FISA materials “under appropriate security procedures and protective orders,” it may do so “only where such disclosure is necessary to make an accurate determination of the legality of the surveillance.”
Id.
Where the court “determines that the surveillance was lawfully authorized and conducted, it shall deny the motion of the aggrieved person except to the extent that due process requires discovery or disclosure.”
Id.
§ 1806(g). Mindful of these provisions, we have concluded that disclosure of FISA materials “is the exception and
ex parte, in camera
determination is the rule.”
United States v. Stewart,
Here the district court found that “review of the FISA materials in this case [was] relatively straightforward and not complex.”
United States v. Abu-Jihaad,
*130 b. The Government Satisfied FISA’s Warrant Requirements, and There is No Basis in the Record for a Franks Hearing
In considering Abu-Jihaad’s claims that the government failed to satisfy the significant purpose, probable cause, and certification requirements of FISA, and proffered false information warranting a Franks hearing, we have conducted a careful in camera review of the challenged FISA orders, the government’s applications for those orders, and the classified materials submitted in support of those applications. We have similarly reviewed the government’s classified Memorandum in Opposition to the Defendant’s Motion for Suppression of FISA Evidence and Motion for Disclosure of FISA Applications, Orders and Related Materials and an Adversary Hearing; the classified declaration of Joseph Billy, Jr., Assistant Director of the Counterterrorism Division of the FBI; and the FBI’s classified declaration regarding its compliance with minimization procedures applicable to the challenged orders. Like the district court, we conclude that there is no merit to any of Abu-Jihaad’s challenges to the government’s compliance with FISA requirements in this case, nor any basis for a Franks hearing.
FISA warrant applications are subject to “minimal scrutiny by the courts,” both upon initial presentation and subsequent challenge.
United States v. Duggan,
Although the established standard of judicial review applicable to FISA warrants is deferential, the government’s detailed and complete submissions in this case would easily allow it to clear a higher standard of review. While we are necessarily circumspect in our discussion of these materials, like the district court, we observe that they “described at length the facts supporting the Government’s assertion that there was probable cause to believe that the target of the FISA surveillance” — who was “described with particularity” — “was an agent of a foreign
*131
power,” as well as “the basis for believing that the facilities at which electronic surveillance would occur [were] being used, or about to be used, by the target.”
United States v. Abu-Jihaad,
This record convincingly satisfies FISA’s purpose and probable cause requirements, and further reveals no clear error in the certifications by high-ranking executive officials.
See id.
at 312. We therefore reject Abu-Jihaad’s conclusory claims to the contrary as without merit. Further, because nothing in the record before this court — which includes the full trial record — provides any basis to think that the FISA application contained any false statement, much less one made “knowingly and intentionally, or with reckless disregard for the truth,”
Franks v. Delaware,
In sum, because we identify no constitutional infirmity in Congress’s decision to allow FISA warrants to issue on certification of a “significant purpose” to obtain foreign intelligence information, and because we conclude that the record — without need for further disclosure or hearing — convincingly demonstrates that all FISA warrant requirements were satisfied in this case, we conclude that the district court correctly denied Abu-Jihaad’s motion to suppress FISA-derived evidence.
B. The Evidentiary Challenges
Abu-Jihaad asserts that evidentiary errors deprived him of his due process right to a fair trial. Specifically, he submits that (1) recordings of telephone conversations in which he participated in 2006 were not relevant to the charged 2001 communication of national defense information,
see
Fed.R.Evid. 401, and, in any event, more prejudicial than probative,
see
Fed.R.Evid. 403; and (2) videos obtained from and materials available on Azzam’s websites should also have been excluded under Rule 403. The district court ruled to the contrary in two detailed written decisions.
See United States v. Abu-Jihaad,
We review a district court’s evidentiary rulings deferentially, mindful of its superior position to assess relevancy and to weigh the probative value of evidence against its potential for unfair prejudice.
See United States v. Royer,
1. The 2006 Recordings
A review of the recorded conversations confirms the district court findings that therein Abu-Jihaad demonstrated his familiarity with Azzam as an organization sympathetic to
jihad
and admitted his own correspondence with Azzam through its websites, specifically in an email discussing the bombing of the
U.S.S. Cole. See United States v. Abu-Jihaad,
To be relevant, evidence need not be sufficient by itself to prove a fact in issue, much less to prove it beyond a reasonable doubt.
See Contemporary Mission, Inc. v. Famous Music Corp.,
Abu-Jihaad’s discussions of Azzam, its websites, and his email communications with that organization were relevant because they linked him to the recipient of the Battlegroup Document. This fact made it more probable that, among the discrete group of persons with knowledge of the classified information at issue, Abu-Jihaad was the source of the unauthorized disclosure to Azzam. Although Abu-Jihaad endeavored to reduce this likelihood by offering evidence that some transit plan information was more widely available than the Navy maintained,
see infra
at 136-37, such evidence would have affected only the weight, not the admissibility, of the recorded conversations.
See United States v. Schultz,
Similarly, the recordings demonstrating Abu-Jihaad’s keen concern with secrecy were relevant both generally in demonstrating consciousness of guilt and specifically in explaining why there was no evidence on Azzam websites about transmittal of the Battlegroup Document or the information contained therein. As for Abu-Jihaad’s recorded discussion of why he could not provide current military intelligence — “I ain’t been working ah in, in the field of making meals and or, you know ... [i]n a, in a long time. I’ve been out of that for, ah, over ah, quatro years you know,” Trial Tr. at 989-90; Gov’t Ex. 141k at 7 — the statement permitted an inference that, four years earlier, Abu-Jihaad had been engaged in “making meals,” i.e., providing military intelligence, an admission highly probative of his commission of the charged crime. That the statement might be construed more innocently was a matter properly addressed through cross-examination and argument to the jury, not a ground for excluding the evidence as irrelevant.
Rule 403 warrants no different conclusion. As we observed in
United States v. LaFlam,
The district court instructed the jury that (a) “Abu-Jihaad [was] not ... charged with anything based on the conversations ... from 2006,” (b) “the events that form[ed] the basis of the charges against ... Abu-Jihaad in this case occurred in 2001, not 2006,” and (c) the jury was “not to speculate about what was the nature of the investigation” involving Shareef and the confidential informant or “whether or if any charges resulted from that investigation.” Trial Tr. at 992. Abu-Jihaad does not challenge the adequacy of these instructions. Thus, his contention that the 2006 recordings permitted the jury to speculate about Shareef s plans reduces to a challenge to the presumption that jurors follow the instructions they are given.
See United States v. Downing,
2. Azzam Website Materials
We reach the same conclusion with respect to the admitted Azzam website materials, which consisted of (a) excerpts from three videos purchased by Abu-Jihaad from Azzam, and (b) other materials marketed and/or posted on Azzam’s websites. Abu-Jihaad concedes the relevancy of these materials to an understanding of Azzam’s operations and to his own mens rea. Nevertheless, he contends that the evidence should have been excluded under Rule 403. We are not persuaded.
a. Video Evidence
With respect to the videos, which we briefly describe
supra
at 113
&
n. 12, the district court determined that the pro-jihadist contents of the videos were relevant to understanding Abu-Jihaad’s motive and intent in communicating information that could have resulted in the destruction of the very ship on which he served.
See United States v. Abu-Jihaad,
*134
We identify no error, let alone arbitrary or irrational error, in the decision of admissibility under these circumstances.
See United States v. Salameh,
b. Website Materials
The district court also allowed the jury to view various materials, including Osama bin Laden’s 1996
fatwa
against the United States, that were marketed or posted on Azzam’s websites in or around 2001. The government could not prove that Abu-Jihaad saw a particular posting, only that he visited the site during times when the postings were available.
See United States v. Abu-Jihaad,
C. The Sufficiency Challenge
Abu-Jihaad argues that the district court erred in denying his motion for acquittal on the 18 U.S.C. § 793(d) count of conviction because the trial evidence was insufficient to prove guilt.
See
Fed.R.Crim.P. 29. The rule of constitutional sufficiency derives from the Due Process Clause and instructs that no conviction may be obtained “except upon proof beyond a reasonable doubt of every fact necessary to constitute the crime ... charged.”
In re Winship,
The thrust of Abu-Jihaad’s sufficiency challenge is that the government’s case rested entirely on circumstantial evidence. Direct evidence, however, is not constitutionally required to support a conviction. The law is well established that the government may secure conviction based solely on circumstantial evidence, provided it is sufficient to prove the elements of the charged crime beyond a reasonable doubt.
See United States v. Lorenzo,
Abu-Jihaad does not — and cannot— challenge the sufficiency of the evidence to establish the first, second, and fourth elements of the crime. The trial evidence convincingly showed that, as a member of the
U.S.S.
Benfold’s navigation division with a “secret” security clearance, Abu-Jihaad had access to the
Constellation
battlegroup’s transit plan and the classified information contained therein. Further, because the transit plan was classified as “confidential” and contained information about the anticipated movements of Navy ships into areas of heightened vulnerability to attack, there can be no question that this information related to the national defense.
See Gorin v. United States,
Thus, Abu-Jihaad’s sufficiency challenge is reasonably understood to focus on the third element of the crime. He submits that the trial evidence was insufficient to permit any rational jury to find beyond a reasonable doubt that
he
was the person who willfully made the charged disclosure of national defense information. Although the district court observed that this challenge was not “insubstantial” given that the supporting evidence for this element was largely circumstantial,
see United States v. Abu-Jihaad,
1. The Information in the Battlegroup Document Came from a Navy Insider
The contents of the Battlegroup Document, specifically, its identification of significant dates referenced in the classified transit plan — notably March 20, 2001, for an ammunition stop in Hawaii; April 6, 2001, for a port call in Sydney; and April 29, 2001, for passage through the Strait of Hormuz (in fact, the date for crossing the CHOP point) — strongly supported an inference that the source of the information contained therein had to have been a Navy insider. In urging otherwise, Abu-Jihaad relies on arguments that he unsuccessfully made to the jury: that the Battlegroup Document contained so much publicly available information and so many errors that it could just as easily, if not more likely, have been transmitted by someone outside the Navy. The jury’s rejection of this argument was hardly irrational.
To the extent the defense adduced evidence in the public domain about move *137 ments of the Constellation battlegroup, it failed to demonstrate that the majority of that information was available prior to the battlegroup’s March 15, 2001 deployment, as would have been necessary for publicly available information to have informed creation of the Battlegroup Document. The information that was shown to have been publicly available before deployment failed to provide sufficient facts from which to compile the Battlegroup Document. Specifically, a February 11, 2001 post to a Massachusetts Institute of Technology alumni website stated only that a carrier pilot would be deploying for six months aboard the U.S.S. Constellation, which was expected to make port calls in Sydney, Perth, Bahrain, and Dubai. We need not here assess the relative indiscretion of such a post. We note simply that it did not provide specific dates for the identified ports of call, as contained in the Battle-group Document. Nor did it mention Hawaii as a port of call, a fact included only in the final transit plan. Similarly, although a pre-deployment press release from the Canadian Navy indicated that the Constellation battlegroup would arrive in the Arabian Gulf in early May 2001, and a February 2001 article about the Tarawa Amphibious Readiness Group identified Phuket, Thailand, as a favorite port of call for the Navy and the Marines, neither document provided any specific information about the Constellation battlegroup’s expected ports of call, let alone the dates on which any ships would reach those ports.
Similarly unavailing is Abu-Jihaad’s reliance on errors in the Battlegroup Document to argue that the source of its information could not have been a Navy insider. To the extent the errors involve misspelling of Navy terms, the jury would have seen that Navy insider Abu-Jihaad routinely misspelled ordinary words in his emails with Azzam. Insofar as defendant points to the Battlegroup Document’s misidentification of April 29, 2001, as the date for transit through the Strait of Hormuz (when in fact it was the date for crossing the CHOP point) and March as a tax-free month (when in fact it was April), a reasonable jury could have concluded that the errors were either inadvertent, introduced after the information was originally conveyed, or reflective of a Navy insider conveying information outside his particular area of responsibility. Indeed, a jury might reasonably have rejected the coincidence of anyone other than an insider selecting the same date (April 29, 2001) for transiting the Strait of Hormuz as had been emphasized in each iteration of the transit plan for crossing the CHOP point, particularly as the latter event would take place only a short time before the ships entered the Strait of Hormuz, an easily identified natural geographic reference compared to the CHOP point, which was defined only by degrees of latitude and longitude. Moreover, a jury was entitled to consider that the Battlegroup Document concluded with the instruction: “Please destroy message.” Gov’t Ex. 1. A person transmitting publicly available information would have less reason to include such an instruction than a Navy insider transmitting classified information.
2. Abvr-Jihaad’s Access to the Disclosed Information and Ties to Azzam
That Abu-Jihaad was the insider who transmitted classified information about the Constellation battlegroup’s transit plan was established, in part, by evidence of his opportunity and motive to do so. Abu-Jihaad does not seriously dispute that, as a signalman with a secret-level security clearance, he had access to the transit plan and, thus, the opportunity to transmit it to an unauthorized person. See United States v. Abu-Jihaad, 600 F.Supp.2d at *138 377 (referencing evidence that Abu-Jihaad “regularly worked on the bridge where ... the ship’s paper charts and classified transit plans were stored”). Nor does he dispute that he frequently communicated with Azzam, the unauthorized recipient of the classified information in 2001, or that the contents of his communications revealed a motive to transmit classified information, ie., his support for jihad, even when directed against his own country.
Instead, Abu-Jihaad submits that any inference that he transmitted classified information to Azzam was undermined by his open display of jihadist sympathies in the Navy, as evidenced by his sharing Azzam videos with shipmates and his use of a Navy-monitored email account to communicate with Azzam. While Abu-Jihaad was free to make this argument to the jury, it was hardly compelled to accept it and to return a verdict of not guilty. The jury could have determined that if Abu-Jihaad used his military account to convey national defense information, he did so pri- or to the battlegroup’s March 15, 2001 deployment and, thus, at a time when his Navy email was not being monitored. Alternatively, the jury could have found that Abu-Jihaad likely used his personal email account to transmit classified information. That, after all, was the account he used to send his Cole email to Azzam praising the murderous bombing of a Navy ship as a “martyrdom operation.” See Gov’t Ex. 19.
In urging otherwise, Abu-Jihaad observes that in the Cole email, sent in July 2001, he introduced himself as a United States sailor, an unnecessary action if he had previously disclosed military intelligence to Azzam. The Cole email, however, was sent to an Azzam email account specifically designated for the general public to send emails of support. A rational jury might well have concluded that Abu-Jihaad sent the classified information to a different Azzam email address, with or without introducing himself.
In sum, even if the email evidence could have supported inferences more favorable to Abu-Jihaad, it was nevertheless sufficient to support a reasonable inference that Abu-Jihaad was the only person shown to have had both the opportunity and motive to transmit the classified transit plan information to Azzam.
See United States v. Burden,
3. Abu-Jihaad’s Admitted Disclosure of Navy Intelligence
In addition to evidence establishing Abu-Jihaad’s opportunity and motive to disclose classified information, the jury heard recorded statements in which Abu-Jihaad effectively admitted to having actually done so. In a series of conversations intercepted in 2006, which we detail in our discussion of the facts, see supra at 115— 16, Abu-Jihaad repeatedly discussed providing Shareef, a suspected terrorist sympathizer, with “meals.” A confidential informant who participated in some of the conversations testified at trial that “meals” was a code for military intelligence. Thus, while generally promising Shareef support, Abu-Jihaad explained that he had been out of the Navy too long to have any current intelligence to convey: “I haven’t been on that job, so I don’t — you know what I’m saying, I haven’t been there ... to see ... what the fresh meal is.” Gov’t Ex. 141h at 1. Abu-Jihaad nevertheless encouraged Shareef to speak with “the Mexican,” identified at trial as Miguel Colon, who had been discharged from the Navy only two months earlier: “[H]e can give you a fresh meal ‘cuz ... he just finished his job, there, less than a month ago.... ” Id. at 1-2. Then, in a conversa *139 tion that same day with Colon about Shareefs desire for intelligence, Abu-Jihaad made the statement that the government argued acknowledged his past transmittal of intelligence information: “I don’t know how to get him no hot meal.... I ain’t been working uh, in, in, in the field of making meals and or, you know ... in a long time. I’ve been out of that for uh, over uh, quatro years you know.” Gov’t Ex. 141k at 7.
Although Abu-Jihaad suggests that the statement only indicated that he was not in a position to secure current intelligence because he had been out of the Navy for four years, a reasonable jury could have construed the statement as an admission of past intelligence disclosures. Abu-Jihaad did not, after all, state simply that he had never worked “in the field of making meals,” ie., providing military intelligence. Rather, he stated that he “ain’t been working uh, in, in, in the field of making meals and or, you know ... in a long time.” Implicit in a statement that one has not done something “in a long time” is an admission to having done that thing at some time in the past, in Abu-Jihaad’s case, “working ... in the field of making meals,” i.e., providing military intelligence, some four years ago when he was in the Navy and held a security clearance to access certain classified information.
While Abu-Jihaad’s implicit admission is general, making no specific reference to the Battlegroup Document, on a sufficiency challenge, we review pieces of evidence not in isolation, but in conjunction.
See United States v. Rigas,
D. CIPA Protective Orders
In his final challenge, Abu-Jihaad contends that the district court erred not only in granting the government’s motions for protective orders pursuant to Section 4 of the Classified Information Procedures Act (“CIPA”), 18 U.S.C. app. 3, §§ 1-16, but also in considering
ex parte
whether the classified materials — submitted and reviewed
in camera
— were discoverable. The district court set forth its reasons for issuing the challenged orders in two opinions.
See United States v. Abu-Jihaad,
No. 07 Cr. 57,
We review for abuse of discretion a district court’s decision to issue a protective order pursuant to Section 4 of CIPA, including its determination whether evidence is helpful or material to the defense and whether unclassified summaries or admissions are properly substituted for classified information.
See United States v. Stewart,
CIPA, which establishes certain procedures for the handling of classified information in criminal cases, is designed “to protect[] and restrict[] the discovery of classified information in a way that does not impair the defendant’s right to a fair trial.”
United States v. Aref,
The court, upon a sufficient showing, may authorize the United States to delete specified items of classified information from documents to be made available to the defendant through discovery under the Federal Rules of Criminal Procedure, to substitute a summary of the information for such classified documents, or to substitute a statement admitting relevant facts that the classified information would tend to prove. The court may permit the United States to make a request for such authorization in the form of a written statement to be inspected by the court alone. If the court enters an order granting relief following such an ex parte showing, the entire text of the statement of the United States shall be sealed and preserved in the records of the court to be made available to the appellate court in the event of an appeal.
Id.
app. 3, § 4. As we have recently observed, “[t]his section clarifies district courts’ power under Federal Rule of Criminal Procedure 16(d)(1) to issue protective orders denying or restricting discovery for good cause, which includes information vital to the national security.”
United States v. Stewart,
To be clear, CIPA does not confer on the government a privilege to refrain from disclosing classified information; it merely presupposes one.
See id.
The privilege it presupposes has its origins in the common-law privilege against disclosure of state secrets,
see id.; United States v. Aref,
1. The Government Adequately Established that the State-
Secrets Privilege Applies
Having carefully reviewed the classified materials that are the subject of the challenged protective orders, we reach the same conclusion as the district court: that the government has demonstrated a reasonable danger that disclosure would jeopardize national security. Again, our discussion of the classified information is necessarily circumspect. Nevertheless, we conclude that the affidavits submitted by government officials satisfactorily identify specific facts that (a) render the materials here at issue classified and (b) support the conclusion that disclosure of those materials would pose a risk to national security. 34
2. Abu-Jihaad Was Not Denied Information Helpful or Material to His Defense
We further conclude that the challenged protective orders did not deny Abu-Jihaad evidence that was either helpful or materi
*142
al to his defense. Although this court had not yet issued its decision in
United States v. Aref
at the time the district court considered this question, that court did rely on a test, similar to that announced in
Aref
identified by one of our sister circuits.
See United States v. Abu-Jihaad,
While the district court concluded that four of the six categories of information at issue in the government’s second motion for a protective order were either undiscoverable or not “helpful or favorable to the defense,” it determined that the remaining two categories contained discoverable information.
United States v. Abu-Jihaad,
Upon our own in camera review of the underlying materials and the sealed records preserved for appeal, including a detailed comparison of original discoverable documents with the unclassified summaries approved by the district court, we conclude that the district court’s rulings with respect to the discoverable nature of the classified materials and the government’s compliance with any extant discovery obligations manifest no abuse of discretion. Indeed, we commend the district court’s careful discharge of its CIPA obligations, particularly its effective protection of Abu-Jihaad’s rights despite the defense’s limited ability to participate in the CIPA proceedings.
3. The District Court Properly Considered the Government’s Motions for Protective Orders Ex Parte
Insofar as Abu-Jihaad faults the district court for entertaining the government’s
*143
motions for protective orders
ex parte,
his argument is unconvincing. Abu-Jihaad does not dispute that Section 4 of CIPA and Rule 16(d)(1) of the Federal Rules of Criminal Procedure both authorize
ex parte
proceedings. Accordingly, his contention that such submissions are improper “[ajbsent a showing of exceptional circumstances,” Appellant’s Br. at 63, amounts to a challenge to the district court’s exercise of discretion to proceed
ex parte.
The argument fails in light of our decision in
United States v. Aref,
in which we recognized that where the government moves to withhold classified information from the defense, “an adversary hearing with defense knowledge would defeat the very purpose of the discovery rules.”
In sum, because we conclude that the government’s submissions fully support the district court’s entry of the challenged CIPA orders, that the district court acted well within its discretion in reviewing those submissions ex parte and in camera, and that the orders did not deny Abu-Jihaad any information helpful or material to his defense, we identify no basis in CIPA for vacating the conviction.
III. Conclusion
To summarize, we conclude that:
1. Evidence obtained pursuant to FISA warrants was properly admitted into evidence against defendant because FISA was not rendered unconstitutional by a PATRIOT Act amendment that allows surveillance warrants to issue upon certification by the executive of a “significant” rather than “primary” purpose to obtain foreign intelligence information. Such a certification, together with FISA’s other requirements, strikes a reasonable balance between the government’s interest in obtaining foreign intelligence information and the protection of individuals’ Fourth Amendment rights.
2. Inculpatory evidence obtained pursuant to FISA warrants was properly admitted into evidence against defendant because all FISA requirements were complied with in this case, and due process did not demand disclosure of FISA applications to defendant or an adversarial hearing.
3. The district court acted within its discretion in admitting into evidence (a) recorded telephone conversations from 2006 in which defendant participated, (b) excerpts of three videos purchased from Azzam by defendant, and (c) other materials marketed and/or posted on the Azzam websites in or around 2001.
4. The trial evidence was sufficient to support defendant’s conviction for disclosing national defense information to persons not entitled to receive it in violation of 18 U.S.C. § 793(d).
*144 5. The district court acted within its discretion in granting government motions for protective orders pursuant to Section 4 of CIPA.
Accordingly, the judgment of conviction ÍS AFFIRMED.
Notes
. Jihad has been defined as "a religious war of Muslims against unbelievers in Islam, inculcated as a duty by the Koran and traditions.” 8
Oxford English Dictionary
238 (2d ed. 1989). Although
jihad
is also understood to denote "the struggle against one’s evil inclinations or efforts toward the moral uplift of society,” 7 Encyclopedia of Religion 4917 (Lindsay Jones ed., 2d ed. 2005), it is in the former sense that the concept has been invoked to support terrorist acts against the United States,
see, e.g., United States v. Rahman,
. There can be no question that the United States was then aware that it was a target of
jihad
terrorism, as evidenced by the February 1993 bombing of the World Trade Center in New York City,
see United States v. Yousef,
. This is only one of a number of thoughtful published and unpublished opinions filed by the district court in this case. Others include
United States v. Abu-Jihaad,
. On October 12, 2000, Islamic terrorists in a small boat laden with explosives attacked the U.S.S. Cole, a Navy destroyer, off the coast of Yemen, killing seventeen members of the ship's crew. See The Nat’l Comm’n on Terrorist Attacks Upon the U.S., The 9/11 Commission Report 190-91 (2004).
. For example, one of the files on the seized disk, entitled "FOR THE GUY IN CHARGE TO READ (01_08_01).zip,” provided passwords for Azzam’s various email accounts and instructions for the management of Azzam’s video and book inventory.
United States v. Abu-Jihaad,
. At the beginning of the Battlegroup Document, a statement appears in brackets: "[Necessary changes made in grammar and spelling and for the sake of clarity.],” Gov’t Ex. 1, signaling that the document was edited by someone other than the original author, Accordingly, the excerpts reproduced here are verbatim, with no attempt to signal, much less correct, grammar, spelling, or punctuation errors, and with highlighting appearing as in the document.
. Hereafter, we will refer to all ships at issue as "the Constellation battle-group” or, simply, "the battlegroup.”
. In support of this conclusion, the agent testified, inter alia, that the metadata in certain computer files recovered from Ahsan's residence matched the metadata contained in the Battlegroup Document.
. The Battlegroup Document transmitted to Azzam thus correctly identified April 29, 2001, as an important date in the transit plan, but misascribed it to entry into the Strait of Hormuz, rather than crossing the CHOP point. The Constellation battlegroup in fact traveled through the Strait a few days later, on May 2-3, 2001.
. Thus, Admiral Hart testified that, despite the Battlegroup Document’s inaccuracies, its transmittal raised concerns because of its disclosure of “the time frame at which we would be operating in the Fifth Fleet area of responsibility,” and its effort to identify "vulnerabilities.” Trial Tr. at 633. He stated that if he had known about the unauthorized transmittal, he would have sought “to change the time and nature of our transit through the strait of Hormuz.” Id. at 523.
. It appeared that still more emails between Abu-Jihaad and Azzam had been deleted.
. Excerpts from these videos were shown to the jury. From
Martyrs of Bosnia,
the jury heard Sheikh Abdullah Azzam “criticize!] western Muslims for failing to shed any of their own blood in behalf of the cause” and an instruction from a
mujahideen
leader in Bosnia for “viewers who wanted to contact the mujahideen to do so through Azzam.”
United States v. Abu-Jihaad,
. The Arabic phrase "Allahu akbar,” known as the "takbir” in Arabic, is usually translated as "God is Great.” See, e.g., 12 Encyclopedia of Religion, supra, at 8057. Used in Islamic prayer and incorporated into the flags of countries such as Iran and Iraq, the phrase has been appropriated by some jihad terrorists. See, e.g., Notes Found After the Hijackings, N.Y. Times, Sept. 29, 2001, at B3 (reporting that document used by September 11, 2001 hijackers instructed, inter alia, “[w]hen the confrontation begins, ... [s]hout, 'Allahu Akbar,' because this strikes fear in the hearts of the nonbelievers”); Michael Wilson, Judgment Day in Two High-Profile Cases: Times Square’s Would-Be Bomber Is Defiant as He Gets a Life Term, N.Y. Times, Oct. 6, 2010, at A25 (reporting that defendant responded to pronouncement of life sentence with phrase "Allahu akbar”); Benjamin Weiser, In Terrorism Case, a Plea Bargain Secretly in the Making for 2 Years, N.Y. Times, Oct. 24, 2000, at B 1, B3 (reporting with respect to prosecution for the 1998 bombings of the United States embassies in Kenya and Tanzania that, "[i]n June 1999, one defendant leapt out of his chair in the courtroom and charged toward Judge Sand, while another defendant screamed 'Allahu akbar,' Arabic for "God is great”).
. It was suggested at trial that the number "7” referred to “seventh heaven,” the resting place of Islamic martyrs according to advocates of jihad. Trial Tr. at 962.
. The confidential informant testified that, in the recorded conversations, "meals” meant military intelligence, which Shareef and the informant were soliciting from Abu-Jihaad.
. "CW” refers to the confidential informant.
. The district court concluded that Abu-Jihaad’s provision of information about the
Constellation
battlegroup could not, as a matter of law, support a conviction for providing material support to terrorism in either of the forms — physical assets or personnel — urged by the government.
See United States v. Abu-Jihaad,
. Although FISA originally applied only to electronic surveillance, the law was amended in 1994 to extend to physical searches for foreign intelligence information. See Intelligence Authorization Act for Fiscal Year 1995, Pub.L. No. 103-359, 108 Stat. 3444 (1994); see also 50 U.S.C. §§ 1821-29.
. FISA defines "foreign intelligence information” as:
(1) information that relates to, and if concerning a United States person is necessary to, the ability of the United States to protect against—
(A) actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;
(B) sabotage, international terrorism, or the international proliferation of weapons of mass destruction by a foreign power or an agent of a foreign power; or
(C) clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of a foreign power; or
(2) information with respect to a foreign power or foreign territory that relates to, and if concerning a United States person is necessary to—
(A) the national defense or the security of the United States; or
(B) the conduct of the foreign affairs of the United States.
50 U.S.C. § 1801(e).
As amended in 2001, FISA requires an application for a surveillance warrant to include, inter alia, a certification from a high-ranking executive official:
*118 (A) that the certifying official deems the information sought to be foreign intelligence information;
(B) that a significant purpose of the surveillance is to obtain foreign intelligence information;
(C) that such information cannot reasonably be obtained by normal investigative techniques;
(D) that designates the type of foreign intelligence information being sought according to the categories described in section 1801(e) of this title; and
(E) including a statement of the basis for the certification that'—
(i) the information sought is the type of foreign intelligence information designated; and
(ii) such information cannot reasonably be obtained by normal investigative techniques [.]
Id. § 1804(a)(6). As discussed infra, subsection (B) — the "significant purpose" clause — is at the core of Abu-Jihaad’s constitutional challenge to FISA.
. FISA defines "foreign power” to mean
(1) a foreign government or any component thereof, whether or not recognized by the United States;
(2) a faction of a foreign nation or nations, not substantially composed of United States persons;
(3) an entity that is openly acknowledged by a foreign government or governments to be directed and controlled by such foreign government or governments;
(4) a group engaged in international terrorism or activities in preparation therefor;
(5) a foreign-based political organization, not substantially composed of United States persons;
(6) an entity that is directed and controlled by a foreign government or governments; or
(7) an entity not substantially composed of United States persons that is engaged in the international proliferation of weapons of mass destruction.
50U.S.C. § 1801(a).
FISA defines "agent of a foreign power” to mean
(1) any person other than a United States person, who'—
(A) acts in the United States as an officer or employee of a foreign power, or as a member of a foreign power as defined in subsection (a)(4) of this section;
(B) acts for or on behalf of a foreign power which engages in clandestine intelligence activities in the United States contrary to the interests of the United States, when the circumstances of such person’s presence in the United States indicate that such person may engage in such activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or knowingly conspires with any person to engage in such activities;
(C) engages in international terrorism or activities in preparation therefore;
(D) engages in the international proliferation of weapons of mass destruction, or activities in preparation therefor; or
(E) engages in the international proliferation of weapons of mass destruction, or activities in preparation therefor for or on behalf of a foreign power; or
(2) any person who—
(A) knowingly engages in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States;
(B) pursuant to the direction of an intelligence service or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation of the criminal statutes of the United States;
(C) knowingly engages in sabotage or international terrorism, or activities that are in preparation therefor, for or on behalf of a foreign power;
(D) knowingly enters the United States under a false or fraudulent identity for or on behalf of a foreign power or, while in the United States, knowingly assumes a false or fraudulent identity for or on behalf of a foreign power; or
(E) knowingly aids or abets any person in the conduct of activities described in sub- *119 paragraph (A), (B), or (C) or knowingly conspires with any person to engage in activities described in subparagraph (A), (B), or (C).
Id. § 1801(b).
. The PAA provisions at issue in In re FISA Section 105B Directives, which were codified at 50 U.S.C. §§ 1805a-1805c, were subject to a February 16, 2008 sunset and were repealed on July 10, 2008, as part of the FISA Amendments Act of 2008, Pub.L. No. 110-261, § 403, 122 Stat. 2436, 2473-74.
. A 2008 amendment to FISA renumbered certain FISA provisions. Among other changes, it redesignated former subsection (a)(7) as subsection (a)(6).
See
Pub.L. No. 110-261, § 104(1)(B),
. We need not here decide how the purpose for which a warrant is sought might inform the duty to minimize the interception of material not relevant to that purpose. The FISA record in this case, which both the district court and this court have carefully reviewed, raises no minimization concerns.
. To the extent Abu-Jihaad asserts that
Duggan
did not explicitly address the reasonableness of FISA’s notice and duration requirements, we here clarify that these standards raise no Fourth Amendment concerns. As the FISA Review Court observed, Congress determined that " ‘[t]he need to preserve secrecy for sensitive counterintelligence sources and methods justifies elimination of the notice requirement’ ” in FISA.
In re Sealed
Case,
Similarly, the fact that FISA authorizes surveillance for a longer period than Title III,
compare
50 U.S.C. § 1805(d)(1) (authorizing surveillance of U.S. person for up to 90 days)
with
18 U.S.C. § 2518(5) (authorizing surveillance for up to 30 days), is not unreasonable in light of “the nature of national security surveillance, which is ‘often long range and involves the interrelation of various sources and types of information,’ ”
In re Sealed Case,
. Insofar as a footnote in
United States v. Truong Dinh Hung,
. For example, the order vacated by the FISA Review Court in
In re Sealed. Case
prohibited law enforcement officials,
inter alia,
from making any recommendations to intelligence officials respecting "the initiation, operation, continuation, or expansion of FISA searches or surveillances.”
See
. Although some senators who voted for the PATRIOT Act thought it possible that courts
*127
might impose a constitutional requirement of "primary purpose,”
see In re Sealed Case,
. Because
In re Sealed Case,
. Thus, the government was permitted to show only one minute of a nine minute segment of the bloody bodies of
jihad
martyrs. It was required to redact scenes depicting a headless body and one with a badly severed neck.
See United States v. Abu-Jihaad,
. The district court charged the jury that the videos could be considered only in determining the knowledge and intent with which Abu-Jihaad undertook any actions proved against him. See Trial Tr. at 259-60, 401. Moreover, the court instructed the jury to consider the video evidence “dispassionately, and even if there’s material that you find personally distasteful, you can’t let your personal opinions, your fears, your biases, to enter into your consideration.’’ Id. at 401.
. Title 18 U.S.C. § 793(d) states:
Whoever, lawfully having possession of, access to, control over, or being entrusted with any document, writing, code book, signal book, sketch, photograph, photographic negative, blueprint, plan, map, model, instrument, appliance, or note relating to the national defense, or information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes to be communicated, delivered, or transmitted or attempts to communicate, deliver, transmit or cause to be communicated, delivered or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to the officer or employee of the United States entitled to receive it ... [s]hall be fined under this title or imprisoned not more than ten years, or both.
. Although Abu-Jihaad argues that information in the Battlegroup Document was publicly available, the evidence he offered in support of that claim showed only that some general information regarding the Constellation battlegroup's transit schedule had entered the public domain prior to the date of deployment. See infra at 136-37. The public information adduced by Abu-Jihaad at trial did not preclude any rational jury from concluding that the transit plan with which he was entrusted, and the Battlegroup Document derived therefrom, contained information relating to the national defense.
. Information that is helpful or material to the defense "need not rise to the level that would trigger the Government's obligation under
Brady v. Maryland,
. Since the district court's challenged decisions in this case, we have held that representations about the security risks posed by disclosure must be made by the "head of the department which has control over the matter, after actual personal consideration by that officer.”
United States
v.
Aref,
. In
United States v. Yunis,
. Insofar as the standard applied by the district court differed in any respect from that announced in
United States v. Aref,
