JOHN GLEESON, District Judge.
Defendant Agron Hasbajrami was arrested on September 6, 2011 and charged with three counts of attempting to provide material support to terrorists. He sought to suppress evidence obtained or derived from surveillance conducted pursuant to Section 702 of the FISA Amendments Act ("FAA"), codified at 50 U.S.C. § 1881a (alternatively, "702 surveillance" or "702 collection"). See Def.'s Mot. to Supp., ECF No. 92 ("Def. Br."). This memorandum explains my February 20, 2015 ruling denying the motion to suppress.
Few things are more unsettling than the idea that a government is spying on its own citizens.
In the 1960s and 1970s, the public was outraged over the revelation that the government conducted domestic surveillance — in the name of national security — of Dr. Martin Luther King, Jr., Vietnam War Protesters, and domestic groups the government labeled "subversive." See David S. Kris & J. Douglas Wilson, 1 National Security Investigations and Prosecutions § 3.1 (2d ed. 2012) (hereafter "Kris & Wilson"). In 1967, the Supreme Court held that electronic surveillance is subject to the Fourth Amendment's prohibition on unreasonable searches. Katz v. United States, 389 U.S. 347 (1967) (the government's electronic surveillance of a phone conversation in a telephone booth constitutes a search under the Fourth Amendment); Berger v. New York, 388 U.S. 41 (1967) (the Fourth Amendment protects conversations, and the use of electronic devices to capture a conversation is a search). In 1976, a select committee of the United States Senate, chaired by Senator Frank Church of Idaho, issued an exhaustive report (the "Church Report") documenting the intelligence community's systematic violations of the law in gathering information about United States citizens. Kris & Wilson § 2.2 (citing Final Rep. of the S. Select Comm. to Study Governmental Operations with respect to Intelligence Activities (Book II), S. Rep. No. 94-755, (1976)). Congress responded to the Church Report in 1978 by enacting the Foreign Intelligence Surveillance Act ("FISA"), 50 U.S.C. § 1801 et seq., which governs foreign intelligence surveillance and searches. See S. Rep. No. 95-604, at 7-8 (1977).
History repeats itself. The post-9/11 era has once again highlighted the tension between privacy and national security interests. The public continues to scrutinize the government's intelligence gathering techniques.
An investigation by the Federal Bureau of Investigation's Joint Terrorism Task Force ("JTTF") revealed that from April 2, 2011 to August 28, 2011, Hasbajrami exchanged numerous emails with an individual he believed was associated with a terrorist organization. Gov't Unclassified Br. at 5 ("Gov't Br."). Hasbajrami sent money to the individual to support Islamic fundamentalist terrorism operations. Id. He also arranged to travel to the Federally Administered Tribal Areas ("FATA") of Pakistan to join a jihadist fighting group. Id.
On September 6, 2011, JTTF agents arrested Hasbajrami at John F. Kennedy International Airport as he was about to board a flight to Turkey en route to Pakistan. Id. A subsequent search of Hasbajrami's luggage "revealed a tent, boots, and cold-weather gear." Def. Br. at 4 (citing PSR at ¶¶ 2-3). Hasbajrami gave detailed statements regarding his offense. Id.
Title I and Title III of FISA, as amended, 50 U.S.C. §§ 1801-1812 and 1821-1829, allow electronic surveillance and physical searches after obtaining a FISA warrant from the Foreign Intelligence Surveillance Court ("FISC").
On September 13, 2011, after Hasbajrami was arraigned, the government notified him that he had been subject to FISA surveillance and that it intended at trial to use information obtained or derived from that surveillance ("Title I collection") and certain physical searches ("Title III collection"). Notice, ECF No. 9. On April 12, 2012, after the government disclosed inculpatory evidence — including email communications obtained pursuant to FISA — Hasbajrami pled guilty to a single count of providing material support to terrorists. ECF No. 32. On January 8, 2013, I sentenced him principally to a 180-month term of imprisonment. ECF No. 44.
In July 2013, Hasbajrami filed a motion pursuant to 28 U.S.C. § 2255, seeking relief from his conviction and sentence on the ground that the statute under which he was convicted is unconstitutionally vague. Letter, ECF No. 61-1. Before that claim could be fully briefed and argued, the government revealed new information that eventually became the basis of the instant motion. Specifically, on February 24, 2014, the government notified Hasbajrami "that certain evidence or information, obtained or derived from Title I or III FISA collection, that the government intended to offer into evidence or otherwise use or disclose in proceedings in this case was derived from acquisition of foreign intelligence information conducted pursuant to the FAA." Supplemental Notice, ECF No. 65.
The FAA permits, subject to certain statutory requirements, the interception of electronic communications of non-U.S. persons reasonably believed to be located outside the United States in order to acquire foreign intelligence information. 50 U.S.C. § 1881a. It differs significantly from traditional FISA surveillance. To get a court order, FISA requires the government to demonstrate probable cause to believe that the "target of the electronic surveillance is a foreign power or an agent of a foreign power" and that "each of the facilities or places at which the electronic surveillance is directed is being used, or is about to be used, by a foreign power or an agent of a foreign power." 50 U.S.C. § 1805(2). By contrast, FAA surveillance does not require the government to specify the persons or places that it plans to target for surveillance. 50 U.S.C. § 1881a. Instead, the FISC may authorize surveillance under the FAA for up to one year after approving targeting and minimization procedures and receiving a government certification regarding the proposed surveillance. See 50 U.S.C. § 1881a(a), (c), and (i)(3)(A). Because the FAA does not require an individual court authorization (that is, a warrant) for each data collection, FAA-derived intelligence has been described as "warrantless wiretap" information. See, e.g., Charlie Savage, Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence, N.Y. Times, Oct. 27, 2013, at A21.
On October 2, 2014, I allowed Hasbajrami to withdraw his guilty plea so he could challenge the constitutionality of the FAA-derived evidence and seek its suppression.
Hasbajrami contends that the FAA surveillance violated the Fourth Amendment because it was not "confined to the collection of foreign communications by foreign actors" outside the United States. Def. Br. at 15-16. Because the government knew that the communications of U.S. persons — like Hasbajrami — inevitably would be collected, the argument goes, it was required to get a warrant. See id. Hasbajrami thus sought to suppress the FISA evidence on which the government's case was based because it was the fruit of the warrantless FAA surveillance.
For its part, the government argues that the FAA collection was constitutional because: (1) the warrant requirement is inapplicable to foreign intelligence collection targeted at foreign persons abroad, and the incidental collection of U.S. persons' communications did not trigger the warrant requirement; (2) the foreign intelligence exception to the warrant requirement applies; and (3) the FAA surveillance was reasonable under the Fourth Amendment. Accordingly, the government's argument continues, the FISC properly used the FAA-derived information in finding probable cause to support the FISA warrants, and the FISA collection was thus constitutionally sound.
As mentioned above, the government's surveillance activities came under scrutiny in the 1970s when it was discovered that the National Security Agency ("NSA") had been spying on United States citizens within the United States. ACLU v. Clapper, 785 F.3d 787, 792-93 (2d Cir. 2015). In 1972, the Supreme Court held that warrantless domestic surveillance violated the Fourth Amendment. United States v. U.S. Dist. Court for the E. Dist. of Mich. ("Keith"), 407 U.S. 297, 320-21 (1972). Three years later, Congress established the Select Committee to Study Governmental Operations with respect to Intelligence Activities (the "Church Committee") to investigate whether the government's "intelligence activities were governed and controlled consistently with the fundamental principles of American constitutional government[.]" Church Report at v. The Church Committee found that the intelligence community had "violated specific statutory prohibitions and infringed the constitutional rights of American citizens [and had] intentionally disregarded [these prohibitions] in the belief that because the programs served the `national security' the law did not apply."
FISA seeks to "provide effective, reasonable safeguards to ensure accountability and prevent improper surveillance." S. Rep. No. 95-604, at 7 (1977). The statute created the FISC and empowered it to grant or deny applications for surveillance orders in foreign-intelligence investigations. See 50 U.S.C. § 1803(a). "As originally enacted, FISA required a high-ranking member of the executive branch to certify that the purpose [of the FISA application] was to obtain foreign intelligence information." United States v. Abu-Jihaad, 630 F.3d 102, 119 (2d Cir. 2010) (internal quotation marks omitted). But in 2001, the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act ("USA PATRIOT Act") amended the statute to require a high-ranking official to certify that "a significant purpose" of the FISA application was to obtain foreign intelligence information. Pub. L. No. 107-56, 115 Stat. 272, 291 (2001) (codified as amended at 50 U.S.C. § 1804(a)(6)(B)). Thus, the amendments signaled that Congress no longer required foreign intelligence gathering to be the primary purpose of the FISA surveillance. See Abu-Jihaad, 630 F.3d at 119.
To obtain a FISA order, the government must make detailed factual showings about the target of the surveillance, the information sought, and the facilities at which the surveillance is directed. 50 U.S.C. § 1804(a). The FISC may issue an order authorizing electronic surveillance only if it finds probable cause to believe that the target of the surveillance is a foreign power or an agent of a foreign power and that the facilities or places at which the surveillance is directed are being used, or are about to be used, by a foreign power or an agent of a foreign power. Id. § 1805(a)(2)(A)-(B). A FISA order targeting a U.S. person may be approved for up to 90 days, and an order targeting a non-U.S. person may be approved for up to 120 days. Id. § 1805(d)(1).
FISA requires the government to implement minimization procedures reasonably designed to minimize the acquisition and retention, and prohibit the dissemination of, communications by United States citizens.
Under FISA, the definition of "electronic surveillance" was limited to four types of domestically-focused foreign intelligence collection activities.
The PAA, however, expired in February 2008 due to a sunset provision. In response, in July 2008, Congress enacted the FAA. The provision of the FAA at issue here, Section 702, "supplements pre-existing FISA authority by creating a new framework under which the Government may seek the FISC's authorization of certain foreign intelligence surveillance targeting . . . non-U.S. persons located abroad."
Surveillance conducted pursuant to Section 702 does not require an individualized court order for each non-U.S. person to be targeted. Rather, the FISC approves annual certifications by the Attorney General and the DNI, thereby authorizing the acquisition of foreign intelligence information by targeting non-U.S. persons reasonably believed to be located outside the United States.
The targeting procedures must be "reasonably designed" to ensure that the surveillance is limited to persons reasonably believed to be located outside the United States, and to "prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States." Id. § 1881a(g)(2)(A)(i). Minimization procedures must also be "reasonably designed . . . to minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information." 50 U.S.C. §§ 1801(h)(1), 1821(4)(A). Thus, the targeting and minimization procedures aim to safeguard U.S. citizens against the acquisition of their communications under Section 702.
There are two types of Section 702 collection: PRISM and Upstream. See PCLOB Report at 7, 33. In PRISM collection, the government identifies the user accounts it wants to monitor and sends a "selector" — a specific communications facility, such as a target's email address or telephone number — to the relevant communications service provider. Id. at 32-33. A government directive then compels the communications service provider to give it communications sent to or from that selector (i.e., the government "tasks" the selector).
Upstream collection, on the other hand, involves the acquisition of communications through the compelled assistance of the providers that control the telecommunications backbone within the United States over which communications travel. Id. at 35. Like PRISM, upstream collection intercepts "to/from" communications. Id. at 37. But upstream collection is less tailored than PRISM collection; it allows the government to additionally intercept "about" communications, that is, communications that refer to, or are "about," a particular selector. Id. For example, an email in the body of which a targeted email address appears is an "about" communication, even though the targeted person is not necessarily a participant in the intercepted communication.
The government conducted the disputed surveillance in this case under the PRISM program. Gov't Cl. Br. at 54. None of the Section 702 communications used in the Title I and Title II FISA applications targeting the agent of a foreign power were "about" communications. Id. Thus, the constitutionality of upstream collection is not at issue here.
As a preliminary matter, Hasbajrami asserts a facial challenge and an "as applied" challenge to the constitutionality of Section 702 collection. Def. Br. at 13-31. A facial challenge would require Hasbajrami to establish that there is no set of circumstances under which Section 702 is valid. United States v. Salerno, 481 U.S. 739, 745 (1987). Given that the government "implemented [the statute] in a defined context" in this case, I need not "speculate about the validity of the law as it might be applied in different ways or on different facts." In re Directives, 551 F.3d 1004, 1010 (FISA Ct. Rev. 2008); see also Ayotte v. Planned Parenthood of N. New England, 546 U.S. 320, 328-30 (2006) (discussing the Court's preference for as-applied challenges in an attempt to "limit the solution to the problem"); United States v. Mohamud, 2014 WL 2866749, at *13-14 (D. Oreg. June 24, 2014) (declining to consider a facial challenge under the Fourth Amendment to Section 702 collection). I therefore limit Hasbajrami's challenge to an as-applied challenge.
The Fourth Amendment protects an individual's "persons, houses, papers, and effects, against unreasonable searches and seizures." For a search or seizure to be consistent with the Fourth Amendment, it must be carried out with a valid warrant, based on probable cause, and be issued by a neutral and detached judicial officer (or fall under one of the exceptions to the warrant requirement). The central inquiry in my Fourth Amendment analysis is "the reasonableness in all the circumstances of the particular governmental invasion of a citizen's personal security." Terry v. Ohio, 392 U.S. 1, 19 (1968). Because Section 702 does not require a warrant before the government can seize the communications of non-U.S. persons abroad, the dispute before me centers on whether the search of communications between a U.S. person and individuals who are legitimate targets of Section 702 surveillance is constitutional. For the reasons that follow, I conclude that it is.
The Fourth Amendment's protections do not "apply to activities of the United States directed against aliens in foreign territory." United States v. Verdugo-Urquidez, 494 U.S. 259, 267 (1990) (non-U.S. persons outside the United States who lack a "substantial connection" with the country do not benefit from the Fourth Amendment's protections). Accordingly, under Verdugo-Urquidez, the Fourth Amendment does not constrain the government from collecting the communications of non-U.S. individuals targeted by Section 702 surveillance. The collection at issue was directed at non-U.S. persons the government reasonably (and correctly) believed were located in foreign countries. Although Hasbajrami was a legal resident of the United States who was in the country when he communicated with one or more non-U.S. persons abroad, it was those non-U.S. persons who were the targets of Section 702 surveillance.
Defendant and amici challenge the fact that the FAA allows the government to collect these communications without establishing probable cause or finding individualized suspicion. Def. Br. at 6, 10-11; Amici Br. at 14. However, because the warrant requirement is inapplicable here, so too is the need to establish probable cause or individualized suspicion.
The real question is whether the incidental interception of U.S. persons' communications during the otherwise lawful collection of non-U.S. persons' communications is constitutional. While Section 702 does not allow intentional targeting of U.S. persons or non-U.S. persons located in the United States, 50 U.S.C. § 1881a(b)(1)-(4), it is inevitable that the government will incidentally intercept communications of persons who are not the intended targets — including, as here, U.S. persons in the United States — during the ordinary course of lawful surveillance.
Minimization and targeting procedures help protect the privacy interests of U.S. persons whose communications are incidentally intercepted. Minimization procedures mask the identities of U.S. persons whose communications the government incidentally collects. See In re Directives, 551 F.3d at 1015 (effective minimization procedures "serve . . . as a means of reducing the impact of incidental intrusions into the privacy of non-targeted United States persons"). The minimization procedures in this case required the NSA to conduct post-targeting analyses to effectuate a stop of the acquisition of communications without delay if it learned at any point that the target had either entered the United States or was in fact a U.S. person. Gov't Cl. Br. at 108.
Hasbajrami contends that the collection of U.S. persons' communications during 702 surveillance targeting non-U.S. persons abroad cannot be properly considered "incidental" because the government knows that the foreign targets will inevitably communicate with U.S. persons, Def. Br. at 11-12, and the minimization procedures permit the government to retain the communications under certain circumstances. Gov't Br. at 31 ("Such circumstances may include where the U.S. person has consented to the dissemination, the specific information about the U.S. person is already publicly available, the U.S. person's identity is necessary to understand foreign intelligence information, or the communication contains evidence of a crime and is being disseminated to law enforcement authorities." (citing PCLOB Rep. at 64-65)). However, the government notes that the same is true of Title I FISA surveillance and Title III electronic surveillance, "in which, inevitably, the government collects communications of third parties and the minimization procedures permit retention of those communications in certain circumstances." Gov't Cl. Br. at 80. As with the FISA and Title III collection, acquisitions from Section 702 surveillance are not made unlawful by "incidental collections occurring as a result of constitutionally permissible acquisitions." In re Directives, 551 F.3d at 1015 (warrantless surveillance of individuals reasonably believed to be outside the United States under the PAA was reasonable). The collection of U.S. persons' communications — incidentally obtained through lawful targeting — does not require a separate warrant.
Courts have long dealt with the issue of incidental interception of non-targeted persons' communications.
"The ultimate touchstone of the Fourth Amendment is reasonableness[,]" and the requirement that the PRISM collection at issue here be reasonable applies even when the warrant requirement does not. Brigham City, Utah v. Stuart, 547 U.S. 398, 403 (2006). Thus, I must determine whether Section 702 meets the general reasonableness standard. Id. The statute aims to collect foreign intelligence information to protect national security. As discussed above, I must balance that interest with U.S. persons' privacy interests in their international communications. See Samson v. California, 547 U.S. 843, 848 (2006) (applying the totality of the circumstances test to the Fourth Amendment reasonableness inquiry). I have balanced these interests and find the intelligence gathering here is reasonable under the Fourth Amendment.
The 702 surveillance at issue here furthered an indisputably compelling government interest. See Holder v. Humanitarian Law Project, 561 U.S. 1, 28 (2010) ("Everyone agrees that the Government's interest in combating terrorism is an urgent objective of the highest order."); Haig v. Agee, 453 U.S. 280, 307 (1981) ("It is obvious and unarguable that no governmental interest is more compelling than the security of the Nation." (internal quotation marks omitted)); see also In re Directives, 551 F.3d at 1012 (the government's national security interest in acquiring foreign intelligence information pursuant to the PAA "is of the highest order of magnitude"). The fruits of the surveillance led to the prosecution and conviction of a U.S. person who was attempting to lend support to a terrorist organization whose purpose is to inflict serious harm upon the United States.
In evaluating the reasonableness of the incidental acquisition of non-targets' communications, I consider the degree to which U.S. citizens have a reasonable expectation of privacy in their email communications with non-U.S. persons abroad.
A person's expectation of privacy in email communications diminishes after sending the email because he or she assumes the risk that the recipient will share the communication with others. See United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir. 2004) ("[An individual] may not . . . enjoy [] an expectation of privacy in transmissions over the Internet or e-mail that have already arrived at the recipient."); Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001) (email sender loses his or her legitimate expectation of privacy in an email that has already reached the recipient). Email communications are easily forwarded to or read by other parties. But this diminished expectation of privacy in email communications does not mean the government can search every email with impunity just because the email sender communicated with a foreign person abroad.
Analogizing to traditional post-mail, the government contends that an email sender "loses any cognizable Fourth Amendment rights" in the communication once it reaches the recipient. Gov't Br. at 62; see also United States v. Gordon, 168 F.3d 1222, 1228 (10th Cir. 1999) ("[O]nce a letter is sent to someone, the sender's expectation of privacy ordinarily terminates upon delivery." (internal quotation marks omitted)). But the loss of the privacy interest in that setting typically flows from the recipient's provision of the communication to the government.
As part of my inquiry into the reasonableness of searches conducted pursuant to Section 702, I also consider the safeguards the government has employed to help protect Hasbajrami's privacy interest and to ensure that 702 surveillance is appropriately targeted at non-U.S. persons located outside the United States. Section 702 itself requires these safeguards. The government's Section 702 applications in this case included the required certifications by Executive Branch officials — the DNI and the Attorney General — that detailed the targeting and minimization procedures used to protect the privacy of U.S. and non-U.S. persons located in the United States. Gov't Cl. Br. at 49-52; 50 U.S.C. §§ 1881a(a), (g), and (i). Upon review, the FISC approved the certifications, finding that they contained the elements required by Section 702, and that the targeting and minimization procedures were consistent with the Fourth Amendment. 50 U.S.C. §§ 1881a(i)(3)(A). The Attorney General and the DNI must also periodically review the government's compliance with the minimization and targeting procedures and submit assessments to the FISC and congressional oversight committees. See 50 U.S.C. 1881a(1).
The oversight provisions of the FAA require the government to regularly report instances of non-compliance to the FISC, which can withhold approval of proposed minimization procedures or require the government to amend them to ensure that they are reasonably designed to limit the acquisition, retention, and dissemination of information concerning U.S. persons. See PCLOB Report at 76 (citing FISC Rule of Proc. 13(b)). The oversight provided by the FISC, the executive branch, and Congress work to safeguard Fourth Amendment protections, lending further support to the reasonableness of Section 702 surveillance. Cf. Mohamud, 2014 WL 2866749, at *24 (finding that Section 702's requirements for minimization procedures contribute to the statute's reasonableness); In re Directives, 551 F.3d at 1013 (relying on a "matrix of safeguards" — including targeting and minimization procedures and a procedure to ensure that a significant purpose of the surveillance is to obtain foreign intelligence information — in determining that the PAA was reasonable under the Fourth Amendment).
The most significant of these safeguards are the government's targeting and minimization procedures. See, e.g., In re Directives, 551 F.3d at 1015 (minimization procedures "serve as an additional backstop against identification errors as well as a means of reducing the impact of incidental intrusions into the privacy of non-targeted United States persons"). The government did not target "entire geographical areas," as the defendant contends, see Def. Br. at 23, but instead used FISC-approved targeting procedures to target specific non-U.S. persons [REDACTED\] [REDACTED\] Gov't Cl. Br. at 107-111. "Strong" selectors, such as email addresses, weed out innocent or inadvertent communications "[b]ecause of the small set of people with knowledge of the email address or phone number of a subject of foreign intelligence interest." Peter Margulies, Dynamic Surveillance: Evolving Procedures in Metadata and Foreign Content Collection after Snowden, 66 Hastings L. J. 1, 47 (Dec. 2014) (citing PCLOB Report at 32-33). Such was the case here: the government collected emails to or from unique email addresses because it reasonably believed the owners of those email addresses were non-U.S. persons outside the United States, and that the collection would lead to the acquisition of foreign intelligence information. This cannot be characterized as an unreasonably broad form of interception. To the contrary, these FISC-approved targeting procedures were employed — and worked — exactly as they were intended to.
The government's use of the minimization procedures described above also helped limit the acquisition, retention, and dissemination of information concerning U.S. persons under Section 702, further supporting the reasonableness of the acquisition here.
Moreover, before approving the surveillance, the FISC found that the targeting and minimization procedures in the government's Section 702 applications were consistent with and reasonable under the Fourth Amendment. Specifically, when balancing the government's national security interests against Fourth Amendment interests, the FISC concluded that the surveillance was reasonable in light of the government's important national security interests and the safeguards contained within the targeting and minimization procedures. All of these procedures help limit the scope of Section 702 surveillance, and thus support the reasonableness of that surveillance under the Fourth Amendment.
In evaluating the totality of the circumstances and weighing the government's interest in national security with Hasbajrami's diminished privacy interest, the government's interest outweighs the intrusion. The stringent safeguards embodied in the FAA, i.e., its targeting and minimization procedures, ensured that only the communications of non-U.S. persons abroad were collected. And the targeting that took place in this case was as particular as it gets — the FISC approved the targeting of specific non-U.S. persons outside the United States for specific counterterrorism purposes. The incidental interception of Hasbajramil's emails as a consequence of that lawful surveillance does not alter the reasonableness of the interception.
"FISA warrant applications are subject to minimal scrutiny by the courts, both upon initial presentation and subsequent challenge." Abu-Jihaad, 630 F.3d at 130 (internal quotation marks omitted). In the FISC's initial review, the FISA Judge must "(1) [] find probable cause to believe that the target of the requested surveillance is an agent of a foreign power; (2) [] find that the application is complete and in proper form; and (3) when the target is a United States person, [] find that the certifications are not `clearly erroneous.'" United States v. Duggan, 743 F.2d 59, 77 (2d Cir. 1984).
As in Abu-Jihaad, I find that "the government's detailed and complete submissions in this case would easily allow it to clear a higher standard of review" than the deferential one that I must apply. 630 F.3d at 130. I have conducted a careful ex parte examination and agree that the certifications here were made in accordance with FISA's requirements and the targeting of an agent of a foreign power was not "clearly erroneous." See id. The certifications explained that a significant purpose of the FISA surveillance was to obtain foreign intelligence information
I have also examined the application materials and find that they meet the showing of probable cause required by FISA. See 50 U.S.C. § 1805(a)(2). The government's submissions here were "quite detailed and complete; they described at length the facts supporting the Government's assertion that there was probable cause to believe that the target of the FISA surveillance was an agent of a foreign power and . . . that a significant purpose of the surveillance was to gather foreign intelligence information." Abu-Jihaad, 531 F. Supp. 2d at 313.
Specifically, the government obtained — pursuant to Section 702 surveillance — many email communications between Hasbajrami and non-U.S. persons reasonably believed to be located outside the United States who were [REDACTED\] Gov't Cl. Br. at 3. The government described these emails in its Title I and Title III FISA applications targeting an agent of a foreign power, and they supported the FISC's finding of probable cause that the target was an agent of a foreign power. See 18 U.S.C. § 1805(a)(2)(A). In addition, I find that the "[t]he target is described with particularity, as is the basis for believing that the facilities at which electronic surveillance would occur was being used, or about to be used, by the target and that the premises or property to be searched contained foreign intelligence information that was owned, used, possessed by, or in transit to or from the target." Abu-Jihaad, 531 F. Supp. 2d at 313. The exhaustive submissions I have received in connection with the application provided ample support for my finding that the government met its probable cause requirement.
Lastly, the FISA collection of Hasbajrami's communications adhered to the approved minimization procedures. The test of compliance in the context of FISA surveillance is "whether [the government attempted] a good faith effort to minimize" the interception of innocent conversations. United States v. Mubayyid, 521 F.Supp.2d 125, 135 (D. Mass. 2007) (quoting United States v. Armocida, 515 F.2d 29, 44 (3d Cir. 1975)). The government made that effort here. In addition to numerous other steps, only authorized personnel were able to review the information acquired, and the identities of U.S. persons were minimized before the communications were disseminated by the FBI to other agencies. Gov't. Cl. Br. at 202-04.
Based on this information, the government lawfully conducted the FISA surveillance at issue. The government properly made the required certifications and followed the minimization procedures, and the applications established probable cause. As such, the FISA evidence need not be suppressed.
Hasbajrami moved for discovery of the classified materials relating to the Section 702 and FISA authorizations and collection. Def. Br. at 66-99. A court may disclose to a defendant "under appropriate security procedures and protective orders, portions of the application, order, or other materials relating to the surveillance only where such disclosure is necessary to make an accurate determination of the legality of the surveillance." 50 U.S.C. § 1806(f). But where a court "determines that the surveillance was lawfully authorized and conducted, it shall deny the motion of the aggrieved person except to the extent that due process requires discovery or disclosure." Id. § 1806(f). With these statutory guidelines in mind, the Second Circuit concluded that disclosure of FISA materials "is the exception and ex parte, in camera determination is the rule." United States v. Stewart, 590 F.3d 102, 129 (2d Cir. 2010). The same ex parte, in camera procedure applies to discovery motions related to Section 702. See 50 U.S.C. § 1881e(a).
After careful review of the FISA and Section 702 materials here it is clear to me that disclosure was unnecessary here. "It is of course true that the legality of the surveillance and search would be better tested through the adversarial process," Mubayyid, 521 F. Supp. 2d at 130, but the statute asks me to determine what is necessary to accurately determine whether the government complied with the law. 50 U.S.C. § 1806(f). My review of the materials was "relatively straightforward and not complex[,]" and I was able to evaluate the legality of the challenged surveillance without concluding that due process first warranted disclosure. Abu-Jihaad, 630 F.3d at 129 (quoting United States v. Abu-Jihaad, 531 F.Supp.2d 299, 310-11 (D. Conn. 2008)). Specifically, the foreign intelligence information obtained pursuant to the FISA and FAA surveillance and searches was lawfully acquired because the collection of foreign intelligence pursuant to Section 702's PRISM program complies with the Fourth Amendment, and because the government complied with the relevant statutory directives. Given this determination, disclosure of the materials to the defendant is unnecessary.
The incidental collection of Hasbajrami's communications with non-U.S. persons abroad — lawfully targeted under Section 702 — did not require a warrant and was reasonable in light of the Fourth Amendment's protections. For that reason, Hasbajrami's motion to suppress the evidence obtained from the Section 702 surveillance, along with its fruits, was denied. Further, I find that the government lawfully acquired the traditional FISA information, because it was obtained based upon probable cause and in compliance with the statute's requirements. Finally, because the government legally obtained the surveillance at issue, I deny Hasbajrami's motion for discovery of classified materials.
Order, ECF No. 85, at 6.
The NSA's determination of the target's location and non-U.S. person status is based on the totality of the circumstances. Privacy and Civil Liberties Oversight Bd., Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act at 43 (July 2, 2014), available at https://www.pclob.gov/library/702-Report.pdf ("PCLOB Report"). If conflicting information draws the target's location or status into question, the NSA must resolve the question before the person can be targeted. Id. at 44. In making the determination that the surveillance will lead to the acquisition of foreign intelligence information, the NSA must identify the specific foreign power or foreign territory from which the intelligence is being sought. Id. at 45.
PCLOB Report at 7.