UNITED STATES OF AMERICA v. AGRON HASBAJRAMI
Docket No. 15-2684-L; 17-2669-CON
UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT
Decided: December 18, 2019
August Term, 2018; Argued: August 27, 2018
LYNCH, CARNEY, and DRONEY, Circuit Judges.
UNITED STATES OF AMERICA, Appellee, - v. - AGRON HASBAJRAMI, Defendant-Appellant.
Before: LYNCH, CARNEY, and DRONEY, Circuit Judges.
Agron Hasbajrami was arrested at John F. Kennedy International Airport in September 2011 and charged with attempting to provide material support to a terrorist organization. After he pleaded guilty, the government disclosed, for the first time, that certain evidence involved in Hasbajrami‘s arrest and prosecution had been derived from information obtained by the government without a warrant pursuant to its warrantless surveillance program under
He now appeals, arguing inter alia that the warrantless surveillance and the collection of his communications violated the Fourth Amendment. We conclude that the collection of the communications of United States persons incidental to the lawful surveillance of non-United States persons located abroad does not violate the Fourth Amendment and that, to the extent that the government‘s inadvertent targeting of a United States person led to collection of Hasbajrami‘s communications, he was not harmed by that collection. [REDACTED] Because there is insufficient information in either the classified or the public record in this case to permit us to determine whether any such querying was reasonable, and therefore permissible under the Fourth Amendment, we REMAND the case to the district court for further proceedings consistent with this opinion.
MICHAEL K. BACHRACH, Law Office of Michael K. Bachrach, New York, NY, Joshua L. Dratel, Joshua L. Dratel, P.C., New York, NY, and Steve Zissou, Steve Zissou & Associates, Bayside, NY,
PATRICK TOOMEY and Ashley Gorski, American Civil Liberties Foundation, New York, NY, Mark Rumold and Andrew Crocker, Electronic Frontier Foundation, San Francisco, CA, Amici Curiae American Civil Liberties Union and Electronic Frontier Foundation.
GERARD E. LYNCH, Circuit Judge:
This case concerns the Fourth Amendment implications of the government‘s increasing technological capacity for electronic surveillance in foreign intelligence and terrorism investigations, and the balance our constitutional system requires between national security and individual privacy.
On September 6, 2011, Defendant-Appellant Agron Hasbajrami (“Hasbajrami“) was arrested as he attempted to board a flight to Turkey at John F. Kennedy International Airport in Queens, New York. His luggage contained a tent, boots, and cold-weather gear. The government, which had collected Hasbajrami‘s electronic communications, charged him with attempting to provide material support to a terrorist organization, alleging that he intended to travel to the Federally Administered Tribal Area of Pakistan, where he expected to join a terrorist organization, receive training, and ultimately fight “against U.S. forces and others in Afghanistan and Pakistan.” App‘x at 44. During the course of the prosecution, the government disclosed that it had collected some of its evidence under the
Hasbajrami was already serving his sentence when the government provided him with a supplemental letter disclosing, for the first time, that some of the evidence it had previously disclosed from FISA surveillance was itself the fruit of earlier information obtained without a warrant pursuant to
It is that Section 702-derived evidence — primarily electronic communications between Hasbajrami and individuals without ties to the United States and located abroad — that is at issue in this appeal. Following the disclosure of Section 702 surveillance, the district court (John Gleeson, then-J.) permitted Hasbajrami to withdraw his plea; Hasbajrami subsequently moved to suppress all evidence seized by the government under its Section 702 programs, as well as any fruits of that surveillance, including the evidence obtained pursuant to FISA warrants and inculpatory statements Hasbajrami made upon arrest. The district court denied the motion to suppress, and Hasbajrami again pleaded guilty, reserving his right to appeal the district court‘s denial of his suppression motion.
In light of that disclosure, and the evidence in the public and classified record, we reach three principal conclusions:
First, the “incidental collection” of communications (that is, the collection of the communications of individuals in the United States acquired in the course of the surveillance of individuals without ties to the United States and located abroad) is permissible under the Fourth Amendment. We therefore conclude, in agreement with the district court, that, at least insofar as the record available to the district court is concerned, the vast majority of the evidence detailed in the record was lawfully collected.
Second, the “inadvertent collection” of communications of those located within the United States (that is, the acquisition of communications accidentally collected because an intelligence agency mistakenly believes that an individual is a non-United States person located abroad and therefore targets that individual‘s e-mail address under its Section 702 authority) raises novel constitutional questions. We do not reach those questions today because we are satisfied that, to the extent such accidental collection occurred in this case, any information thus acquired did not taint the investigation or prosecution of Hasbajrami.
Third, querying databases of stored information derived from Section 702-acquired surveillance also raises novel and difficult questions. Querying, depending on the particulars of a given case (such as what databases are queried, for what purpose, and under what circumstances), could violate the Fourth Amendment, and thus require the suppression of evidence; therefore, a district court must ensure that any such querying was reasonable. But no information about any queries conducted as to Hasbajrami was provided to the district court, and the information provided to us on this subject is too sparse to reach a conclusion as to the reasonableness of any such queries conducted as to Hasbajrami.
Given these conclusions, further proceedings are necessary to determine (a) what (if any) evidence relevant to Hasbajrami was obtained by the government by querying databases, (b) whether any such querying violated the Fourth Amendment and, if
BACKGROUND
This appeal concerns the legal status of evidence of Hasbajrami‘s electronic communications with individuals located abroad, which was collected by the government without a warrant pursuant to the government‘s authority under Section 702. The background to this appeal may be easily summarized: Hasbajrami sought to suppress evidence the government acquired under Section 702, arguing that the government had violated his Fourth Amendment rights when it seized his communications without a warrant, and that those communications, and any information that the government later collected as the fruit of that initial warrantless surveillance, should therefore be suppressed. The district court declined to suppress the evidence, and Hasbajrami pleaded guilty while reserving his right to appeal the district court‘s decision.
But our disposition of the case turns in part on the particulars of how Section 702-acquired surveillance was used in Hasbajrami‘s prosecution; a fuller accounting of the facts of Hasbajrami‘s case and the nature of Section 702 surveillance is therefore necessary. First, we begin by describing Hasbajrami‘s arrest and the initial proceedings in which he pleaded guilty, the subsequent disclosure of Section 702 surveillance, Hasbajrami‘s withdrawal of his guilty plea, and his subsequent motion to suppress. Second, we describe in broad terms the operation of Section 702 surveillance. Third, we turn to the district court‘s discussion of the use of Section 702 evidence (that it was aware of) in this case, and its denial of the suppression motion. Finally, we describe the proceedings at the district court following its denial of the suppression motion, and the proceedings on appeal.
I. Allegations and Initial Proceedings
The conduct underlying Hasbajrami‘s prosecution occurred primarily between April and August, 2011. During that time, Hasbajrami communicated by e-mail with “Individual #1,” a non-American located abroad, who Hasbajrami believed was associated with a terrorist organization. In those e-mails, Hasbajrami discussed his interest in the group‘s terrorist operations, and Individual #1 instructed Hasbajrami how he could smuggle himself into Pakistan to join the organization. Individual #1 also detailed means by which Hasbajrami could send money to him and how Hasbajrami could contact him once he reached Pakistan. In discussing his plans to join Individual #1 in Pakistan, Hasbajrami also described his arrangements for traveling to Turkey, and his concern that his projected route from there to Pakistan might have been compromised.
Following an investigation by the agents of the Federal Bureau of Investigation‘s Joint Terrorism Task Force, Hasbajrami was arrested as he was about to board a flight to Istanbul, Turkey. His luggage contained a tent, boots, and cold-weather gear. Upon arrest, Hasbajrami made certain inculpatory statements.
A. Initial Proceedings
Hasbajrami was indicted on September 8, 2011, and charged with one count of providing material support to terrorist organizations. At the same time, and as required by statute, the government gave notice that it “intend[ed] to offer into evidence, or otherwise use or disclose in any proceedings ... information obtained or derived from electronic surveillance and
In discovery, Hasbajrami was provided with evidence of his communications obtained pursuant to traditional FISA warrants,2 and he
eventually pleaded guilty on April 12, 2012, to one count of providing material support to terrorists. He was sentenced to 180 months’ imprisonment.
B. Disclosure of Section 702 Surveillance, Withdrawal of Plea, and Motion to Suppress
After Hasbajrami‘s initial plea and sentencing, and while Hasbajrami was serving his sentence, the government disclosed that it had collected Hasbajrami‘s communications under Section 702 of the FAA.3 In a letter sent to Hasbajrami in February 2014, the government stated that “based on a recent determination,” it had concluded that the information obtained from FISA surveillance that the government had already disclosed “was itself also derived from other collection pursuant to Title VII of FISA [i.e., Section 702] as to which you were aggrieved.” App‘x at 31. The government stated that “certain evidence and information ... that the government intended to offer into evidence or otherwise use or disclose
in proceedings in this case was derived from acquisition of foreign intelligence information conducted pursuant to the FAA.” Id.
In response to that disclosure, Hasbajrami sought leave to withdraw his plea. The district court granted that motion, finding that Hasbajrami had “specifically asked [his counsel] about whether warrantless wiretaps had played a role in his case. After [counsel] informed him that such wiretaps were not part of the evidence, he was more willing to plead guilty. Thus, Hasbajrami seems to have been misled about a fact he considered important in deciding how to plead.” App‘x at 39. Furthermore, the government‘s misleading notice, according to the district court, prevented Hasbajrami from knowing that he could challenge the evidence against him on the grounds that Section 702 was unconstitutional. The court concluded that, prior to the letter disclosing Section 702 surveillance, Hasbajrami “was not sufficiently informed about the facts” to have “made an intelligent decision about whether to plead guilty[.] When the government provided FISA notice without FAA notice, Hasbajrami was misled about an important aspect of his case.” App‘x at 38. Accordingly, the court allowed him to withdraw the plea and reopened the case.
Hasbajrami then moved to suppress “the fruits of all warrantless FAA surveillance,” the motion that is at issue in this appeal. See Omnibus Motions at 8-9, United States v. Hasbajrami, 1:11-cr-623 (E.D.N.Y. filed Nov. 26, 2014), ECF No. 92
- all evidence and information derived as a result of Title VII warrantless FAA surveillance;
- all evidence and information “obtained or derived from Title I and Title III FISA collection ... [that was] itself also derived from other collection pursuant to Title VII” of the FAA;
- Hasbajrami‘s custodial statements; and
- Any other evidence and information that the Government could not have obtained in this case through an independent source.
Id.
To properly understand the scope of Hasbajrami‘s motion, however, it is necessary to describe the statutory framework underpinning Section 702 surveillance and the way in which the program operates in practice.
II. Section 702 Surveillance4
In order to ensure national security, the United States maintains several programs aimed at the surveillance of those who pose threats to its safety. These programs each draw on a wide variety of authority, including executive orders, statutory provisions, and agency procedures and guidance. See generally Diana Lee, Paulina Perlin & Joe Schottenfeld, Gathering Intelligence: Drifting Meaning and
the Modern Surveillance Apparatus, 10 J. of Nat‘l Sec. L. & Pol‘y 77 (2019) (describing several separate authorities for surveillance, including FISA and Section 702, each with separate operating standards). Hasbajrami‘s appeal specifically implicates the government‘s statutory authority under FISA, first enacted in 1978, and more specifically the amendments to FISA, including Section 702, enacted in 2008.5
electronic surveillance, physical searches, “pen/trap” surveillance, and tangible things production orders, and the use of information so obtained. See id. § 4:5.
In order to initiate traditional FISA surveillance, the government must submit an application to a court demonstrating that there is “probable cause to believe that ‘the target of the electronic surveillance is a foreign power or agent of a foreign power,’ and that each of the specific ‘facilities or places at which the electronic surveillance is directed is being used, or is about to be used, by a foreign power or an agent of a foreign power.‘” See Clapper, 568 U.S. at 403 (quoting
Traditional FISA had some limitations, however. Because each application required a court order, which in turn required probable cause, the government believed “that, after September 11, 2001, [FISA‘s] requirements unduly restrict[ed the] speed and agility” with which the government could detect and respond to terrorist threats. See id. § 16:2 (internal quotation marks omitted). Additionally, the advent of e-mail “clearly expanded traditional FISA‘s reach.” Id. § 16:6. Communications, such as phone calls, between two individuals without ties to the United States and located abroad were outside the purview of FISA, and any collection of such communications that occurred would not be constrained by its procedures. Id. But as such communication increasingly came to be conducted by e-mail, many of those e-mails would ultimately be stored on servers within the United States, and thus “the government could not conduct warrantless surveillance in the U.S. of stored e-mail messages exchanged between two parties located abroad” without following the procedures laid out in FISA. Id.
First enacted in 2008, Section 702 was intended to address some of FISA‘s perceived limitations.6 Section 702 allows the
Director of National Intelligence (“DNI“) to “authorize jointly ... the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.”
Following public revelations of the program, Congress passed the Protect America Act (“PAA“), Pub. L. No. 110-55, 121 Stat. 552 (2007), which for a limited period of time allowed the government to use surveillance procedures similar to those contained in the FAA. See In re Directives, 551 F.3d 1004, 1006-07 (FISA Ct. Rev. 2008). The PAA expired on February 16, 2008. See id. at 1006 n.1.
Section 702 differs from traditional FISA procedures in several key respects. First, Section 702 does not require a probable cause determination before undertaking surveillance. Clapper, 568 U.S. at 404. Second, Section 702 “does not require the Government to specify [in a FISA application] the nature and location of each of the particular facilities or places at which the electronic surveillance will occur.” Id. Instead, as detailed below, the FISC approves Section 702 procedures in advance, targeting non-United States persons located abroad as a category, and the government does not have to return to the FISC to seek approval before it undertakes surveillance of any specific individual or his or her accounts under those Section 702 procedures. See Kris & Wilson § 17:17.
In short, under the FAA and Section 702 the government may compel service providers located in the United States to provide e-mails or other electronic communications to, from, or about individuals the government believes are (a) not United States persons and (b) located abroad.8 Both under the
statutory scheme and in practice, Section 702 surveillance unfolds in several different steps, each with different implications for this Court‘s review. The first step is what the statute and intelligence community refers to as “targeting,” followed by collection, “minimization,” retention and storage, and, finally, dissemination and querying.9 We will discuss each step in turn.
A. “Targeting”
Targeting generally refers to the decision to surveil an individual or his or her channels of electronic communications, such as an e-mail address. The government may not “intentionally target” for Section 702 surveillance anyone located in the United States or a “United States person” outside the United States.
The precise mechanisms each agency must follow to target communications are not specified by the statute. Instead,
The targeting procedures are supposed to ensure that any authorized acquisition is “limited to targeting persons reasonably believed to be located outside the United States” and to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.”
Once the required procedures have been formulated, the DNI and AG must seek approval of their proposed targeting procedures from the FISC.
Once its procedures are approved by the FISC, an agency can begin surveilling individuals it seeks to target. The NSA “initiates all
B. Collection
Once an account or facility such as an e-mail address has been targeted, the intelligence agencies may then begin to collect information related to that particular address. Such information includes e-mails to and from a given account, or information “about” a given account.
1. PRISM and Upstream Collection
The NSA operates two separate types of collection programs which collect different types of information. These two programs have come to be labelled PRISM collection and upstream collection.
Under PRISM, the FBI (on behalf of the NSA) sends “selectors” (for instance, an e-mail address) to internet service providers (“ISPs“), based in the United States. The ISPs are then required to provide communications sent to or from that selector to the NSA. See PCLOB Report at 33-34. PRISM, therefore, collects only the e-mails a given user sends from his or her account, and the e-mails he or she receives from others through that account. Id. at 34. Collection and review of such material happens roughly in real time, or close to real time. In other words, the collected e-mails are not simply swept into a database for use at some unspecified future time when the database is queried, but are monitored and analyzed at or near the time of their collection. In that regard, the interception and review of electronic communications under PRISM resembles a traditional domestic law enforcement wiretap.
Upstream collection is broader. Instead of compelling information from an ISP, the NSA instead compels information from “the providers that control the telecommunications backbone over which communications transit.” PCLOB Report at 35. Upstream fills a gap in PRISM surveillance. Id. If, for instance, an individual that the NSA sought to target maintained his or her e-mail account with a foreign internet service provider, that e-mail address would be out of reach of the PRISM program. In that situation, the NSA could use upstream collection to collect traffic to that account as it traversed the backbone. Id. Upstream collection is broader than PRISM, in that it captures not only conversations to and from a given e-mail address, but also communications “about” that address (i.e., a conversation between two parties not themselves targeted that
One key difference between PRISM and upstream collection is that PRISM collects individual communications, while upstream collects whole “multi-communication transactions,” or “MCTs.” Id. at 39. “An Internet transaction refers to any set of data that travels across the Internet together such that it may be understood by a device on the Internet.” Id. Thus, a transaction might contain a single discrete communication (e.g., a single e-mail), or it could contain “multiple discrete communications,” and “[i]f a single discrete communication within an MCT is to, from, or about a
2. Incidental and Inadvertent Collection
As detailed above, the statute primarily authorizes agencies like the NSA to collect the e-mails of “non-United States persons” located abroad. But even if the government scrupulously follows the procedures intended to restrict collection of communications to and from persons with ties to the United States, the agencies might still end up collecting information about United States persons or those located in the United States, or communications sent to or from a United States person or an individual located in the United States.
Collection may sweep up those individuals’ e-mails in two ways, conventionally referred to as “incidental collection” and “inadvertent collection.” First, collection might be “incidental.” PCLOB Report at 114. Incidental collection occurs when a non-targeted individual (a United States person or someone in the United States) communicates with a targeted non-United States person located abroad. Such collection would occur under PRISM, for instance, if the NSA has targeted the e-mail address of a non-United States person in another country, and a United States person e-mails that targeted individual. An ISP would be required to provide the NSA with any such e-mails as part of its compliance with a
Second, collection might be “inadvertent.” Id. at 116. Inadvertent collection occurs when the NSA reasonably believes that it is targeting a non-United States person located abroad, or does not have enough information to determine whether an individual e-mail address or other communications facility is being used by a United States person or accessed from within the United States, and therefore presumes that the account is controlled by a foreigner outside the United States. The collection is characterized as “inadvertent” when the agency learns that the person controlling the account is a United States person after it has already acquired some of the person‘s communications. In essence, inadvertent collection occurs when the NSA targets United States persons or individuals located within the United States in error: the agency thought it was targeting a foreign individual abroad, but the targeted person was in fact a United States person or an individual located in the United States.
C. “Minimization”
In general terms, minimization describes the manner in which the government processes communications after they have been collected and seeks to provide safeguards against the misuse of
As with their targeting procedures, the NSA, FBI, and CIA must seek yearly approval of their minimization procedures from the FISC.
Minimization procedures seek to “balance the government‘s need to acquire, retain, and disseminate foreign intelligence information, against the countervailing privacy interests of U.S. persons.” Kris & Wilson § 9:1; PCLOB Report at 50 (“Minimization procedures are best understood as a set of controls on data to balance privacy and national security interests.“). The meaning of the term as used in the FISA context is subtly different from what it means in the more familiar context of court-authorized domestic electronic surveillance by law enforcement agencies under traditional domestic wiretaps. In the latter context, minimization procedures generally involve stopping the monitoring of communications that can be determined in real time to be non-evidentiary. In the context of
After an NSA analyst reviews an individual e-mail communication, he or she will decide if the information warrants retention in the NSA‘s databases and/or dissemination to other agencies. The analyst will determine if “it is a domestic or foreign communication to, from, or about a target and is reasonably believed to contain foreign intelligence information or evidence of a crime.” Id. § 3(b)(4). Communications fitting this description will thus be retained and processed; information not involving foreign intelligence information or evidence of a crime will be destroyed unless it meets one of several exceptions, such as when “the communication contains information pertaining to a threat of serious harm to life or property.” Id. § 5(4).
When an e-mail or other communication is processed and retained, the information will be scanned and stored. Information that “do[es] not meet the retention standards . . . and . . . [is] known to contain communications of or concerning United States persons” will be “destroyed upon recognition.” Id. § 3(c)(1). If a target moves to the United States, or if the NSA uncovers information that the target is a United States person, “acquisition from that person will be terminated without delay.” Id. § 3(d)(1).
“[D]omestic communications” — all communications that do not have “at least one communicant outside the United States,” id. § 2(e), “will be promptly destroyed,” except under certain conditions. Id. § 5. Such conditions include if a communication is “reasonably believed to contain significant foreign intelligence information,” which may be provided to the FBI (which in turn may disseminate information “in accordance with its minimization procedures“). Id. § 5(1). Information that is “reasonably believed to contain evidence of a crime that has been, is being, or is about to be committed” may be “disseminated (including United States person identities) to appropriate Federal law enforcement agencies.” Id. § 5(2).
D. Retention and Dissemination
As addressed above, the minimization procedures also govern the ultimate retention of surveillance materials and the “reporting of acquired information outside of [the] intelligence agency” that collects the information. PCLOB Report at 64. The minimization procedures treat retention and dissemination in similar ways: the NSA, for instance, may retain communications “in generally the same situations where the NSA is permitted to disseminate . . . these communications” to other agencies. Id. at 62.
The retention and dissemination of information gathered under the FAA is also governed by the same restrictions that apply to traditional FISA. Id. at 64. Additional protections generally apply if the NSA, for instance, seeks to disseminate
E. Storage and Querying
Once communications are collected and retained or disseminated, each agency may establish databases to store those communications in its possession, and may query those stored communications to identify information of interest in connection with a particular investigation or agency function.
The NSA, CIA, and FBI each maintain separate databases containing
“Data is frequently reviewed through queries, which identify communications that have particular characteristics specified in the query, such as containing a particular name or having been sent to or from a particular e-mail address.” Id. at 127. Colloquially, the parties (and those engaged in policy debates about the program) have referred to this querying capability as “backdoor searches.”
Originally, the minimization procedures precluded analysts from searching terms associated with United States persons. See Classified Supplemental App‘x at 121-22 [REDACTED] In April 2011, the government sought approval for new minimization procedures that allowed the querying of terms related to United States persons. See Bates Decision, 2011 WL 10945618 at *7-8. The FISC ultimately approved the new procedures in October 2011 (i.e., after Hasbajrami‘s arrest) because they were “designed to yield foreign intelligence information.” Id. at *7. Querying, the court stated, “should not be problematic in a collection that is focused on non-United States persons located outside the United States and that, in the aggregate, is less likely to result in the acquisition of nonpublic information regarding non-consenting United States persons.” Id.
Recently, and after the time period at issue in this case, Congress enacted the
III. The District Court‘s Denial of Hasbajrami‘s Suppression Motion
As noted above, Hasbajrami moved to suppress “the fruits of all warrantless FAA surveillance.” See Suppression Motion at 8. He also moved for discovery of the FISA and
After the district court reviewed the relevant materials ex parte and in camera, it denied the suppression motion. See United States v. Hasbajrami, No. 1:11-cr-623, 2016 WL 1029500 (E.D.N.Y. Feb. 18, 2016) (“Suppression Decision“).13 It treated the suppression motion as an as-applied challenge to the
The district court then turned to PRISM collection. Summarizing precedent, the court noted that the
The court did not address whether any inadvertent collection related to Hasbajrami. It also did not address the specifics of any querying as applied to Hasbajrami in particular, and there does not appear to have been any fact-finding regarding the querying of previously-collected communications with identifiers related to Hasbajrami. Instead, the parties had raised querying within the context of whether the minimization procedures were reasonable, and the government argued that it was permitted to query whatever data it had lawfully collected even if it used identifiers it knew were associated with United States persons. See Gov‘t Mem. of Law at 71, United States v. Hasbajrami, 1:11-cr-623 (E.D.N.Y. filed Dec. 23, 2014), ECF No. 97. To the extent that the district court considered querying, then, it appeared to adopt the government‘s position, stating in a footnote:
That the government is able to query information obtained under the PRISM program, i.e. lawfully-obtained communications that were to or from legitimate targets, does not render the minimization procedures inadequate, as amici contend . . . . Here, once the government learned that the target was potentially
an agent of a foreign power, the government sought orders from the FISC for electronic surveillance and physical searches pursuant to Title I and Title III of
Suppression Decision, 2016 WL 1029500 at *12 n.20.
As for Hasbajrami‘s request to provide discovery to properly-cleared defense counsel, the district court concluded that disclosure was unnecessary. Id. at *14. Instead, its review was “relatively straightforward and not complex” and the district court was “able to evaluate the legality of the challenged surveillance without concluding that due process first warranted disclosure.” Id. at *14 (citing United States v. Abu-Jihaad, 630 F.3d 102, 129 (2d Cir. 2010)).
IV. Further Proceedings at the District Court
The district court denied the motion to suppress in a text order dated February 20, 2015. The order stated that “[a]n opinion [would] follow,” but that the motion would be denied as to “the fruits of the FAA surveillance, including the defendant‘s post-arrest statements.” App‘x at 16. The court noted that it would hold a conference and “inquire of the government whether it intends to offer once again the charge bargain that was previously accepted by the defendant, and whether it has considered the prospect of allowing the defendant to enter such a plea pursuant to
[A]gree[d] not to file an appeal or otherwise challenge . . . the conviction or sentence in the event that the Court imposes a term of imprisonment of 180 months or below, with the sole and limited exception that, pursuant to
Federal Rule of Criminal Procedure 11(a)(2) , the defendant may appeal the District Court‘s February 20, 2015 denial of his motion to suppress evidence that was obtained or derived from surveillance conducted pursuant to theFISA Amendments Act of 2008, 50 U.S.C. §§ 1881a et seq.
App‘x at 48. Hasbajrami also consented to his removal, after serving his sentence, from the United States. The district court sentenced Hasbajrami to a term of 180 months’ imprisonment on Count One and 12 months’ imprisonment on Count Two, each to run consecutively.
On March 8, 2016 — more than one year after it denied the motion — the district court issued a redacted opinion on the public docket explaining its reasons for denying suppression. Hasbajrami requested that the full decision be released to his cleared defense counsel, so that he might better prepare his appeal. The court (Dora L. Irizarry, C.J.)14 held that FISA required redaction and that “Defendant‘s counsel are not entitled to view the Unredacted Opinion because releasing it would reveal classified foreign intelligence information and circumvent FISA . . . .” United States v. Hasbajrami, 1:11-cr-623, 2017 WL 3610595 at *3 (E.D.N.Y. April 6, 2017).
V. Proceedings on Appeal
Hasbajrami timely filed two notices of appeal. The first addressed the district court‘s denial of Hasbajrami‘s motion to suppress; the second addressed the district court‘s decision to deny Hasbajrami‘s counsel access to the unredacted and unmodified version of the suppression ruling. Both appeals were consolidated and argument was heard by this Court on August 27, 2018.
At oral argument, the government was unable to represent whether or not identifiers related to Hasbajrami had been used in querying previously-acquired
Both parties filed supplemental briefing, including an additional classified brief from the government (which was posted, heavily redacted, on the public docket for this appeal).
DISCUSSION
Hasbajrami primarily raises an as-applied challenge to the constitutionality of warrantless collection and review of his communications under
entails many separate decisions to monitor large numbers of individuals, resulting in the annual collection of hundreds of millions of communications of different types, obtained through a variety of methods, pursuant to multiple foreign intelligence imperatives, and involving four intelligence agencies that each have their own rules governing how they may handle and use the communications that are acquired.
PCLOB Report at 86. In other words, review is difficult because we must consider those individual “separate decisions” within the context of the program as a whole.16
In this case, it is undisputed that the government possessed ample evidence obtained from surveillance authorized by a
We must also address inadvertent collection, storage and querying, as each of these issues is raised by the record.
The record is sufficient to permit us to answer the principal question before us: we conclude that the district court correctly held that the incidental collection in this case, and the government‘s use of the information thus collected, was lawful. The record also permits us to conclude that, even assuming that inadvertent collection of the communications of United States persons may in some circumstances violate the Constitution, the effect of any such collection in this case was harmless beyond a reasonable doubt. The absence of evidence in the record regarding [REDACTED], however, prevents us from determining the reasonableness of any such querying [REDACTED] prior to the FISC‘s probable-cause finding, and from fully understanding how if at all the results of such querying affected the subsequent conduct of the investigation. As a result, we must remand for further proceedings and fact-finding by the district court.
I. “Incidental” Collection
The primary type of
We disagree. In addressing the issues before us, we adopt an approach similar to that employed by the United States Court of Appeals for the Ninth Circuit in United States v. Mohamud, 843 F.3d 420 (9th Cir. 2016). We must first decide whether a warrant is required for the government‘s incidental collection of the communications of United States persons. We conclude that a warrant is not required for such collection. But “[e]ven if a warrant is not required, a search is not beyond
A. No Warrant was Required
We conclude that a warrant is not required based on two well-established principles of
First, the
