Kane, J.
Jamshid Muhtorov, together with his co-defendant Bakhtiyor Jumaev, is charged with providing material support to a designated terrorist organization, and attempt and conspiracy to do the same. His arrest on a one-way flight to Turkey was originally believed to be solely the result of warrantless surveillance and physical searches authorized under Title I and III of the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. § 1801-1811, 1821-1829. Mr. Muhtorov moved to suppress that FISA-acquired evidence earlier in these proceedings, which motion I denied based on a determination, after an extensive in camera review of the classified materials submitted to the FISA Court, that there was probable cause to believe the target was an agent as described and therefore lawfully subject to those searches.
The matter is before me on a renewed Motion to Suppress, precipitated by the government's supplemental disclosure, nearly two years after Mr. Muhtorov's arrest,
Judicial review of § 702 authorizations is narrow, and until the Snowden leaks in 2013, the American public was led to believe that the government did not query or use FAA-acquired surveillance against non-targeted U.S. persons. See Clapper v. Amnesty Int'l, USA, ___ U.S. ___, 133 S.Ct. 1138, 185 L.Ed.2d 264 (2013). The belated notice in this case was part of the Snowden fallout and the revelation, post-Clapper, that the Executive Branch does, in fact, use FAA-acquired information to investigate U.S. persons for suspected criminal activity, and that it intends to use it against Mr. Muhtorov here.
In his renewed Motion, Mr. Muhtorov moves to suppress all of the FAA-acquired evidence in this case and the "fruits thereof" on grounds that § 702's authorization and implementation procedures permit the government to collect and retain the communications of U.S. persons without a warrant and without probable cause in violation of the Fourth Amendment. Alternatively, as an "aggrieved person" entitled to challenge the lawfulness of the acquisitions directly under § 702, he argues the statute was unlawfully applied to him and seeks discovery into the means and methods of the government's FAA surveillance in this case to substantiate that claim. With the entry of the ACLU as co-counsel for the defense, briefing has emphasized the former, with Mr. Muhtorov serving as the Clapper-qualified
My concern as a trial court judge is with the individual criminal defendants before me and their rights to due process and a fair trial. The constitutional question at issue is one the Executive and courts have wrestled with since the Supreme Court's acknowledgment in the 1972 Keith
Jamshid Muhtorov was born in Jizzak, Uzbekistan, when that country was still under communist rule. He is the oldest of five children. After graduating from a
During the course of his work with Human Rights Watch, foreign embassies and NGOs, Muhtorov came under the increasing scrutiny of Islam Karimov, the last president of Soviet Uzbekistan who became and remains the first president of independent Uzbekistan. This scrutiny intensified in May 2005, and in 2006, according to Human Rights Watch, Mr. Muhtorov was himself threatened and beaten. With the help of other activists, Mr. Muhtorov fled to Kyrgystan, and then, with his wife and children to the United States.
Mr. Muhtorov and his family were admitted to the United States as political refugees in February 2007. They settled in Colorado. Mr. Muhtorov has no criminal record and, until his arrest in January of 2012, had never been arrested. He is a legal permanent resident of the United States.
The operative Second Superseding Indictment (Doc. 59) charges Mr. Muhtorov with two counts of providing and attempting to provide material support and resources to the Islamic Jihad Union (IJU), and Muhtorov and Jumaev with one count of conspiring to commit that offense, in violation of 18 U.S.C. § 2339B. If convicted, each faces a maximum term of imprisonment of 15 years.
The allegations in the indictment were initially attributed to information gleaned in investigations of Mr. Muhtorov's computer, email accounts, private residence, and personal effects. See Criminal Compl. (Doc. 1)(and attached Affid. of FBI Special Agent Hale). When the government formally notified Mr. Muhtorov that it intended to use FISA-acquired information against him in the proceedings (Doc. 12), Mr. Muhtorov exercised his right as an "aggrieved person" under the statute and moved to suppress. (Docs. 14, 125). I denied that Motion in a written Order issued September 24, 2012 (Doc. 196), applying the standards set forth at 50 U.S.C. § 1806(e) & (f) and finding the surveillance and physical searches at issue were lawfully authorized and conducted. I specifically concluded that the attested facts submitted to the FISA Court supported a finding of probable cause to believe the target was an "agent[] of a foreign power," and concluded that the FISA application and related materials should not, in the interest of national security, be disclosed. Id. p. 3. I denied Mr. Jumaev's related Motion on the same basis.
On October 25, 2013, the government filed a Second Notice of Intent to Use FISA-acquired Information (Doc. 457), formally notifying Mr. Muhtorov of its intent to use information obtained or derived from the acquisition of foreign intelligence information under the Foreign Intelligence Surveillance Act of 1978, "as amended," and citing 50 U.S.C. § 1881a. Given its timing in the Snowden-Clapper aftermath, the Notice was clearly intended to notify Mr. Muhtorov that he was a member of the previously undisclosed class of U.S. persons whose international communications had been monitored and acquired incidently to surveillance conducted under § 702 of the FAA. Viewing the affidavit informing the publicly available Complaint in this case in that light, it is clear that FAA surveillance overseas resulted in the acquisition of communications later traced to Muhtorov. See Affid. of FBI Agent Hale (attached as Ex. A to Complaint (Doc. 1)). What was acquired and over what period of time is classified information that has not yet been shared with the defense.
Presidents since FDR have claimed an inherent constitutional authority to conduct electronic surveillance in national security matters without prior judicial approval. The authority is grounded in Article II of the Constitution, which charges the Executive to "preserve, protect and defend the Constitution of the United States." This authority was accorded great deference for many years, until that began to change in the early 1970s.
In 1972, the Supreme Court took up the question in United States v. United States District Court (Keith), 407 U.S. 297, 92 S.Ct. 2125, 32 L.Ed.2d 752 (1972), a case involving the bombing of a CIA building and the warrantless surveillance that led to the indictment of the U.S. persons involved. Justice Powell, writing for the majority, rejected the government's assertion of a blanket national security exception to the Fourth Amendment's warrant requirement as codified in Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the "Wiretap Act"), concluding the government's concerns did not justify a departure from the customary Fourth Amendment requirement of judicial pre-approval under the circumstances presented.
The Watergate scandal in 1974 thrust the Executive's use of electronic surveillance into the public eye. Revelations during several Senate Committee hearings revealed a host of warrantless privacy infringements of U.S. citizens in the name of national security, including wiretapping of congressional staffers, anti-war protesters, and civil rights activists including Dr. Martin Luther King. After fourteen Senate Reports and significant debate, Congress enacted the Foreign Intelligence Surveillance Act "to regulate the use of electronic surveillance within the United States for foreign intelligence purposes." See S. Rep. 95-604, p. 7 (1977). President Carter signed it shortly thereafter. 92 Stat. 1783, 50 U.S.C. § 1801 et seq.
In constructing a framework for foreign intelligence surveillance that balanced the Executive's foreign intelligence and security prerogatives with Americans' privacy interests, Congress defined "electronic surveillance" narrowly to include only foreign intelligence collection activities that impacted U.S. persons or took place on U.S. soil,
Almost as soon as it was enacted, pressure began to build to clarify and expand the Executive's foreign surveillance authority under the FISA statute. Increasing terrorist activity raised the stakes
Then in 2001, foreign terrorists carried out the coordinated 9/11 attacks on New York City and the Pentagon, killing nearly 3,000 people on American soil. Within weeks, both President George W. Bush and Congress had acted to expand Executive surveillance authority and facilitate more effective coordination between the intelligence community and federal law enforcement agencies. In October 2001, Congress passed the USA PATRIOT ACT,
President Bush's confirmation in December 2005 that the NSA had been conducting warrantless electronic surveillance of U.S. persons without even FISA Court approval prompted Congress, once again, to conduct a "vigorous inquiry" into the Executive's secret surveillance activities. See S. Rep. No. 110-209, 1st Sess. 1 (2007). With all parties in agreement that FISA required updating, Congress set to work. See Modernization of the Foreign Intelligence Surveillance Act: Hearing before
As a result of these efforts, Congress enacted the Protect America Act ("PAA") in August 2007, a temporary measure that brought the Executive's TSP authority into the FISA fold. Codified at 50 U.S.C. § 1805a, b & c, the PAA permitted the Director of National Intelligence and the Attorney General to authorize the acquisition of foreign intelligence information "concerning persons reasonably believed to be located outside the United State" without reference to their status as foreign agents, limited solely by the establishment of targeting and minimization procedures to "preserve the privacy interests of persons in the United States." S. Rep. No. 209, 110th Cong. 1st Sess. at 5-6. The PAA was revised and incorporated into FISA by the FISA Amendments Act of 2008, becoming § 702 of a new FISA Title VII.
Section 702, like the PAA before it, authorizes the Attorney General and the Director of National Intelligence to authorize jointly, "for a period of up to 1 year," the "targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information." 50 U.S.C. § 1881a(a). Like the PAA, § 702 permits the government to intercept all communications to and from the target, including those of U.S. persons, without demonstrating probable cause that either is a foreign power or the agent of a foreign power, and without identifying the facilities or places where the electronic surveillance will occur. FAA procedure simply requires the Attorney General, in consultation with the Director of National Intelligence, to select a target and adopt guidelines the Attorney General certifies will "ensure" compliance with appropriate targeting and minimization procedures, as well as the limitations on § 702 surveillance authority set forth in § 1881a(b). See § 1881a(f)&(g). If the FISC finds the AG's certifications, targeting, and minimization procedures are "consistent with [the FAA's requirements] and with the fourth amendment to the Constitution of the United States," it "shall" enter an order approving the certification and use of the
Section 702's limitations are significant, but largely conclusory and "riddled with loopholes." An acquisition under § 702(a) may not "intentionally" target a person "known" at the time of acquisition to be located in the United States (§ 1881a(b)(1)), or "intentionally target" a person "reasonably believed to be located outside the United States" if the "purpose" of such acquisition is to target a "particular, known person reasonably believed to be in the United States." § 1881a(b)(2). Also, acquisitions must be "conducted in a manner consistent with the fourth amendment to the Constitution." § 1881a(b)(5). But the government is the sole arbiter of its "knowledge," "intent," "purposes," and "conduct."
Our concern in this case, of course, is the confluence of FISA and law enforcement, i.e., what happens when FISA surveillance results in the acquisition of evidence of a crime. It is clear that FISA surveillance is more than simply foreign intelligence gathering, and that its purpose since its inception has been the discovery and investigation of foreign intelligence crimes. See In re Sealed Case, 310 F.3d 717, 725 (Foreign Int. Surv. Ct. Rev. 2002). U.S. persons may be authorized targets, and surveillance may be part of an investigative process designed to protect against the commission of serious crimes such as espionage, sabotage, assassination, kidnaping, and terrorist acts committed by or on behalf of foreign powers. Id. (quoting S. Rep. No. 95-701, at 10-11 (1978)). The question has always been where these two functions merge, i.e., where FISA-acquired electronic surveillance information, which is acquired without a warrant under the Wiretap Act, is used against an U.S. person who would otherwise enjoy the protections of that Act.
Before the enactment of the FAA, case law developed permitting the use of FISAacquired evidence against U.S. persons in criminal prosecutions as long as there was probable cause to believe those persons were "foreign powers" or "agents of a foreign power" (50 U.S.C. § 1805(a)(2)) and the surveillance was properly conducted "to acquire foreign intelligence information."
Under the FAA, § 702 does away with the § 105's probable cause requirement, permitting the government to target persons based solely on their physical presence outside the United States, and to intercept communications to and from those persons, as long as the surveillance was conducted "to acquire foreign intelligence information." § 1881a(a). Mr. Muhtorov contends this change distinguishes the case law allowing the use of FISA-acquired evidence in criminal prosecutions, and renders the use of FAA-acquisitions against U.S. persons in criminal prosecutions unconstitutional.
Mr. Muhtorov contends the fruits of the government's § 702 surveillance must be suppressed because the statute that authorized the surveillance is unconstitutional. He argues the FAA violates the Fourth Amendment by authorizing surveillance that contravenes the warrant clause and, independently, surveillance that is unreasonable. He also argues the FAA violates Article III by requiring judges to issue advisory opinions in the absence of a case or controversy, citing my opinion in United States v. Smith
I pause briefly to address Mr. Muhtorov's assertion that the FAA is unconstitutional because it violates Article III's "case or controversy" requirement. His argument is novel and elegant, but I will not be the first to adopt it. Plainly stated, Muhtorov argues the FAA assigns to the FISA Court a role "fundamentally incompatible with the case-or-controversy requirement" because it compels FISC to "evaluate in a vacuum whether proposed targeting and minimization procedures
Mr. Muhtorov's strongest argument is that courts that have rejected Article III challenges to the traditional FISA process have done so because the FISC's job is a particularized one — i.e. that under 50 U.S.C. § 1805(a) and (b), FISC considers concrete facts about a specific person to be monitored and the facilities to be targeted. Citing U.S. v. Megahey, 553 F.Supp. 1180, 1186 (E.D.N.Y. 1982), aff'd 729 F.2d 1444 (2d Cir. 1983), and aff'd on other grounds sub nom. United States v. Duggan, 743 F.2d 59 (2d Cir. 1984). In Megahey, defendants argued that FISC was not constitutionally authorized under Article III because FISA required it to issue orders on an ex parte basis without any adversarial proceedings. The district court rejected the argument, stating
Applications for electronic surveillance submitted to FISC pursuant to FISA involve concrete questions respecting the application of the Act and are in a form such that a judge is capable of acting on them, much as he might otherwise act on an ex parte application for a warrant. In the case of each application, the FISC judge is statutorily obliged to ensure that each statutory prerequisite is met by the application before he may enter a surveillance order. The FISC judge who is faced with a surveillance application is not faced with an abstract issue of law or called upon to issue an advisory opinion, but is, instead, called upon to ensure that the individuals who are targeted do not have their privacy
553 F.Supp. 1180 at 1197.
That the FAA altered this analysis is undeniable. The "concrete questions" and "individual targets" contemplated by traditional FISA authorization requests have been excused in authorization requests under the FAA. Moreover, the "incidental interceptees" with whom we are concerned are nameless, faceless, and transient in the context of § 702 surveillance, and their privacy interests are evaluated solely in the context of the certified targeting and minimization procedures FISC is asked to approve.
The government dismisses this distinction, arguing FAA authorization approval is more similar to traditional FISA approval than different, and constitutionally not unlike other statutory schemes in which courts assess the reasonableness of standards and procedures for conducting searches or surveillance consistently with Article III. Govt's Unclassified Resp. to Mot. Suppress (Doc. 559) at 79-80 (citing United States v. Tortorello, 480 F.2d 764, 772-73 (2d Cir. 1973)(analyzing adequacy of New York statutory procedures for reauthorizing surveillance after original authorization accidently uncovered evidence of crime) and Camara v. Municipal Court, 387 U.S. 523, 537-38, 87 S.Ct. 1727, 18 L.Ed.2d 930 (1967)(approving warrantless inspection provision of municipal housing code — standard may be based on passage of time or nature of the building, and not necessarily specific knowledge of particular dwelling)). Accordingly to the government, FISC's job of analyzing the reasonableness of electronic surveillance by weighing national security interests against the privacy interests of potential subjects is a "traditional judicial function," citing Halperin v. Kissinger, 606 F.2d 1192, 1201 n.59 (D.C. Cir. 1979), and is not rendered otherwise by the fact that the potential subjects are not identified with particularity.
I do not dismiss the distinction so easily. FISC's job under the FAA is substantively different than it is under traditional FISA and under any of the other examples of "traditional judicial function" the government cites. Under the FAA, incidental interceptees are part of the surveillance contemplated, but no particularized information about them or their communications practices is presented to FISC for consideration. Each of the scenarios cited by the government is different: There would have been no "case or controversy" in Tortorello without Arthur Tortorello, and no "case or controversy" in Camara without Roland Camara.
FISC's role in approving the surveillance of individual foreign powers or agents under traditional FISA is qualitatively different from its role in approving the surveillance and incidental acquisition of strangers' communications under the FAA. Whether that role offends Article III sufficiently to invalidate § 702 as a tool for gathering foreign intelligence information is one I leave to a higher court.
While FISA authorizes the government to conduct relatively narrow surveillance of individuals reasonably believed to be "foreign agents" or "foreign powers," the FAA permits the government to monitor any person, and that person's contacts, without reference to his foreign status or agency. By permitting the government to acquire "essentially any communication that originates or terminates outside the United States," Mr. Muhtorov contends the FAA violates both the Fourth Amendment's warrant clause and its ban on unreasonable searches and seizures. Mot. Suppress (Doc. 520) at 21.
The Fourth Amendment states:
The modern Supreme Court has done away with an interpretation of the Fourth Amendment that requires a warrant, a probable cause determination, "`[]or, indeed, any measure of individualized suspicion," in every circumstance, before a search may be lawful. Mohamud, 2014 WL 2866749 at *12 (quoting Nat'l Treasury Emp. Union v. Von Raab, 489 U.S. 656, 665, 109 S.Ct. 1384, 103 L.Ed.2d 685 (1989)(holding suspicionless drug-testing of certain United States Custom Service employees not unreasonable under the Fourth Amendment)). The warrant requirement does not apply to activities of the United States directed against aliens in a foreign territory, United States v. Verdugo-Urquidez, 494 U.S. 259, 267, 110 S.Ct. 1056, 108 L.Ed.2d 222 (1990)(search of the Mexican residences of a Mexican citizen), and does not apply to even U.S. persons if the government establishes a defensible "special need" to dispense with it. See e.g. Griffin v. Wisconsin, 483 U.S. 868, 873, 107 S.Ct. 3164, 97 L.Ed.2d 709 (1987)(exception to Fourth Amendment's warrant requirement "when special needs, beyond the normal need for law enforcement, makes the warrant and probable-cause requirement impracticable.")).
Courts have combined these concepts to carve out a "foreign intelligence exception" to the warrant requirement,
On its face, § 702 surveillance targets individuals outside the United States "to acquire foreign intelligence information." The reasonabless of that targeting, without a warrant, is not the essence of our inquiry. See In re Directives [redacted text] Pursuant to Section 105B of the Foreign Intelligence Surveillance Act, 551 F.3d 1004, 1012 (For. Intel. Surv. Ct. Rev. 2008)(Even if a foreign intelligence exception applies in a given case, "governmental action intruding on the individual privacy interest [of U.S. persons] must comport with the Fourth Amendment's reasonableness requirement."). Our concern is with the axiomatic corollary of that targeting, i.e., that U.S. persons' communications with the target are perforce acquired as part of that targeted surveillance, and may be used against them in criminal investigations on American soil without any reasonable suspicion or probable cause determination having been made as to them.
The touchstone of constitutionality under the Fourth Amendment is reasonableness. It is a fluctuating rather than fixed standard. It depends not only on an analysis of the discrete facts incident to a finding of probable cause (and, for that matter, the search and/or seizure itself), but also the intent and purpose of the established laws of the United States. Because the test is one of reasonableness, the panoply of relevant factors must be considered. In the instant case, the charges against Mr. Muhtorov are premised in the constitutional requirement that the Executive has broad powers to protect the United States against foreign threats. What may be unreasonable in a purely domestic matter may, on balance, be considered reasonable in the context of the security of the nation in dealing with foreign powers and organizations that pose a threat. "It must be remembered that what the Constitution forbids is not all searches and seizures, but unreasonable searches and seizures." Elkins v. United States, 364 U.S. 206, 222, 80 S.Ct. 1437, 4 L.Ed.2d 1669 (1960).
To analyze whether a government search is reasonable under the Fourth Amendment, the court examines the totality of the circumstances. Samson v. California, 547 U.S. 843, 848, 126 S.Ct. 2193, 165 L.Ed.2d 250 (2006). The court weighs "the promotion of legitimate governmental interests against the degree to which [the search] intrudes upon an individual's privacy." Maryland v. King, ___ U.S. ___, 133 S.Ct. 1958, 1970, 186 L.Ed.2d 1 (2013)(internal citations and quotations omitted). Under this standard, the modern Supreme Court has approved statutory schemes requiring arrestees to submit to buccal swab DNA testing solely as a police booking procedure, see id., and parolees to agree in writing to be subject to suspicionless searches at any time, day or night. Samson, 547 U.S. at 846, 126 S.Ct. 2193 (Thomas, J.)
Mr. Muhtorov argues that in the context of electronic surveillance, reasonableness requires that eavesdropping be "precise and discriminate" and "carefully circumscribed so as to prevent unauthorized invasions of privacy." Mot. (Doc. 520) at 34 (citing Berger v. State of New York, 388 U.S. 41, 87 S.Ct. 1873, 18 L.Ed.2d 1040 (1967) and United States v. Bobo, 477 F.2d 974, 980 (4th Cir. 1973)). He urges me to look to traditional FISA and Title III as measures of the reasonableness for electronic surveillance, arguing FAA's approval
As an initial matter, I consider Mr. Muhtorov's privacy interests. Under § 702, the intrusion on an individual's privacy is as an incidental third party who is a participant in intercepted communications with a target overseas. The government contends defendants have little or "severely diminished" expectations of privacy in their communications with non-U.S. persons overseas, see Unclassified Br. (Doc. 559) at 59-61, & n. 37, based simply on the fact that those persons could be targets for surveillance both by the U.S. government and by other foreign governments or private interest. While I could never adopt the government's cynical view of the First and Fourth Amendment, it is true that expectations of privacy are diminished the more information one puts out into the ether, especially the ether of the global telecommunications network.
Fourth Amendment jurisprudence has long recognized a third-party doctrine, i.e., a diminishment or loss of a person's privacy interests where he reveals information to a third party, even in confidence. See United States v. Miller, 425 U.S. 435, 444, 96 S.Ct. 1619, 48 L.Ed.2d 71 (1976)(bank records); Smith v. Maryland, 442 U.S. 735, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979)(use of a pen register by telephone company does not constitute a search within meaning of Fourth Amendment because person has no legitimate expectation of privacy in numbers dialed on his phone). The concept has been held to apply to electronic communications, where "a person's reasonable expectation of privacy may be diminished in transmissions over the Internet or e-mail that have already arrived at the recipient." United States v. Heckenkamp, 482 F.3d 1142, 1146 (9th Cir. 2007). While Mr. Muhtorov and others have a reasonable expectation of privacy in the content of their communications generally, those interests are at least somewhat diminished when transmitted to a third party over the internet.
The intrusion into U.S. persons' legitimate privacy interests under § 702 is less than the generalized "vacuum-cleaner-style mass collection of virtually every person's international communications" of which Mr. Muhtorov, in his role as Clapper-qualified antagoniste, complains. Collection must be demonstrably intertwined with the government's efforts to "acquire foreign intelligence information,"
More importantly, as was posited at the beginning of this opinion, Mr. Muhtorov's concern is less with the incidental acquisition of his communications by national intelligence agencies during the course of otherwise lawful foreign intelligence gathering, but in the retention and use of those communications by federal law enforcement in criminal proceedings against him in a court of law. FISA clearly contemplates that intelligence gathering and law enforcement "tend to merge" in the area of terrorism detection and prevention. See In re Sealed Case, 310 F.3d at 725 (citing S. Rep. 95-701 (1978)). The government's interest in using intelligence information to detect and prevent criminal acts of terrorism, and ultimately to punish their perpetrators, is a legitimate governmental interest against which individual FAA privacy intrusions must be weighed.
Relevant to balancing of FAA interceptees' privacy interests against the government's interest in detecting and preventing acts of terrorism, is the fact that the government's use of FAA-acquired communications is carefully controlled under FISA. See id., 310 F.3d at 740-41. Minimization procedures must be adopted by the Attorney General for every application under the FAA, see § 1881a(e), and must be designed to "minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons." 50 U.S.C. § 1801(h)(1). Procedures must provide for the weeding out of information that is not foreign intelligence information, and the protection of it from dissemination in any manner that identifies a United States person without his consent. § 1801(h)(2). Additional minimization procedures must be established for the retention and dissemination to law enforcement of information that is evidence of a crime, § 1801(h)(3), and provide for how communications to which a United States person is a party may be disclosed, disseminated, or used, and provide time limits for retention. § 1801(h)(4).
Mr. Muhtorov argues that § 702's minimization procedures are inadequate (and the approval scheme therefore constitutionally unreasonable) because they allow the government to maintain a database of incidently collected information and query it for law enforcement purposes later. These "backdoor searches," Muhtorov concludes, require a warrant and render the FAA approval scheme unconstitutional. I disagree. Accessing stored records in a database legitimately acquired is not a search in the context of the Fourth Amendment because there is no reasonable expectation of privacy in that information. Evidence obtained legally by one police agency may be shared with similar agencies without the need for obtaining a warrant, even if sought to be used for an entirely different purpose. This principle applies to fingerprint databases and has also been applied in the foreign intelligence context in Jabara v. Webster, 691 F.2d 272, 277-79 (6th Cir. 1982).
Applying these standards to the suspicionless incidental acquisition of U.S. persons' communications contemplated under the FAA, I cannot conclude that the FAA's approval procedures are per se constitutionally infirm. These acquisitions must be tailored to the very serious purpose of foreign intelligence gathering, as defined in the Act, and may not be used to target
That I do not find the FAA unconstitutional on its face does not per force mean that it was constitutionally applied to Mr. Muhtorov. As I have already observed, § 702's authorization procedures are "riddled" with loopholes and there is no judicial oversight of their execution over time. Any acquisition, retention, dissemination, or use of his electronic communications that abused one of these loopholes or exceeded FISC's authorizations in this case would be unlawful. Accordingly, I proceed to consider the constitutionality of the specific § 702 acquisitions of Mr. Muhtorov's electronic communications in this case.
Other than the specific timeline of the § 702 acquisitions involving Mr. Muhtorov, the relevant facts in this case are straightforward and minimally classified. Nearly all are recited in the Affidavit of Special Agent Hale of the Federal Bureau of Investigation, a public document filed with the court in support of the criminal complaint (Doc.1, filed 01/19/12). The problem with Agent Hale's factual recitation is that it elides any express distinction between the facts gathered as a result of Title I (electronic) and Title III (physical) searches on the one hand, and Title VII (FAA-acquired) information on the other.
The Islamic Jihad Union (IJU) is an extremist organization that splintered from the Islamic Movement of Uzbekistan (IMU) in the early 2000s. The IJU adheres to an anti-Western ideology, opposes secular rule in Uzbekistan, and seeks to replace the current regime with a government based on Islamic law. The IJU first conducted attacks in April, 2004, targeting a popular bazaar and police at several roadway checkpoints. These attacks killed approximately 47 people, including 33 terrorists, some of whom were suicide bombers. The IJU claimed responsibility for these attacks on multiple militant Islamic websites and denounced the leadership of Uzbekistan. In July, 2004, the IJU conducted simultaneous suicide bombings of the United States and Israeli Embassies in Uzbekistan as well as the Uzbekistani Prosecutor General's Office in Tashkent, Uzbekistan. Claiming responsibility for these attacks, the IJU stated that its martyrdom operations would continue. The IJU also claimed the attacks were committed in support of its Palestinian, Iraqi and Afghan brothers in a global insurgency.
In September, 2007, German authorities arrested three IJU operatives, thus disrupting a plot against unidentified U.S. or Western facilities in Germany. The IJU operatives had available 700 kilograms of hydrogen peroxide and an explosives precursor sufficient in raw material to make the equivalent of about 1200 pounds of TNT. The IJU claimed responsibility for the foiled plot. The IJU has also claimed responsibility for attacks targeting coalition forces in Afghanistan in 2008 including a March suicide attack against a U.S. military post that was allegedly carried out by a German-born Turk.
In April, 2009, Turkish authorities seized weapons and detained extremists with ties to the IJU. The IJU also claimed responsibility for a May 2009 attack in Uzbekistan and numerous attacks in Afghanistan against coalition forces. At all
As has already been disclosed, the FISA application at issue in this case was based in part on FAA surveillance and collection. Mr. Muhtorov contends the "incidental" acquisition of his communications and their subsequent retention, querying, and use in criminal proceedings brought against him, was unreasonable under the Fourth Amendment. I have already reviewed the FISA Court's Title I and Title III approvals and concluded the searches and surveillance conducted under those approvals was lawfully authorized and conducted. I have since performed an exhaustive in camera and ex parte review of all relevant additional classified materials provided to me by the government, including supplemental classified materials prepared at my request. I conclude on the record before me that a proper and supported application was filed, and that the targeting and minimization procedures forwarded were tailored to the government's legitimate foreign intelligence purposes and took into account the privacy interests of individuals whose communications would be incidently acquired. Mr. Muhtorov's Motion to Suppress Evidence Obtained or Derived under § 702 (Doc. 520) is DENIED. Because I find all legal criteria were met by the government to establish that the searches and surveillance at issue were lawfully authorized and conducted, there is no need to consider the "good faith" alternative basis for denying the Motion to Suppress.
As stated at the June 17, 2015 status conference, I will address Mr. Muhtorov's request for specific, additional discovery and declassification in a separate order, after conducting one or more prefatory CIPA § 4 hearings on the subject. Accordingly, this matter will be set for a discovery conference, to be attended by the government and the defense, at which time the government should be prepared to address the CIPA § 4 hearing and process for moving toward the declassification of any Brady and related information material to the defense in this case. The conference will be conducted before a court reporter and under conditions that will allow it to be conducted as a closed hearing, should the need arise.
See United States v. Mohamud, Crim., Case No. 10-cr-475-KI, slip op. at p. 12, 2014 WL 2866749 (D. Or. June 24, 2014)(quoting S. Rep. No. 95-701, at 71 (1978)).
FISA for the 21st Century: Hg. before the S. Comm. on the Judiciary, 109th Cong., 2d Sess. (2006)(statement of NSA Director General Michael V. Hayden). The necessary fix, Congress was told, was a "technology-neutral" framework for surveillance of foreign targets — focused not on "how a communication travels or where it is intercepted," but on "who is the subject of the surveillance, which really is the critical issue for civil liberties purposes." FISA Modernization Hg. at 46 (statement of Asst. Atty Gen. Kenneth L. Wainstein). With these changes, it was implied, the original balance between strictly "foreign" foreign intelligence gathering and foreign intelligence gathering that impacted Americans struck by FISA in 1978 could be reconstituted, and secret programs like TSP could be brought to light and integrated into the FISA framework.