Published by The Lawfare Institute
in Cooperation With
Published by The Lawfare Institute
A few days after oral argument before a three-judge panel of the D.C. Circuit last week, Larry Klayman and company filed a supplemental brief, citing a desire to more fully address questions as to how their Fourth Amendment rights were being violated in light of the government's contention that it had not accessed their calls for reasons beyond metadata collection. In their new filing and in the accompanying affidavits, the appellees/cross-appellants argue that they have made a prima facie showing that the government has targeted their communications for surveillance and manipulation. Specifically, Klayman, Charles Strange and a computer expert named David Siler accuse the government of a comprehensive spying and intimidation scheme, one that includes sending hoax messages to and from their phones and email accounts and installing viruses and malware on Strange's computer. As in oral argument, for evidence that the government’s assertions of good faith cannot be trusted, the appellees marshal 2013 media reports of numerous instances where individual NSA employees violated minimization procedures. The (corrected) brief itself is 21 pages long, with 167 pages of exhibits appended. The numbering of the exhibits is confusing, so we provide a roadmap below. Exhibit 1 comprises affidavits by Larry Klayman and Charles Strange attesting to, among other things, evidence that the government has been intercepting and manipulating their email and phone communications. Exhibit 1: an email that Strange describes as a hoax designed to appear as though it were from his son, an NSA crytologist technician who was killed in Afghanistan in August 6, 2011 Exhibit 2: a screenshot of Strange's phone displaying text messages sent from “indiscriminate numbers.” Exhibit 3: a snapshot of a copyright violation message and accompanying photo captured of Strange's wife; affidavit of David Siler, a network administrator who describes his work removing from Strange's computer viruses and spyware that Siler contends the government used for spying. Exhibit 2: a redacted 2009 Inspector General memorandum on improper NSA practices released by NSA on October 21, 2014. Exhibit 3: a November 6, 2014 FISA Court opinion granting in part and denying in part the government's petition for approval of certain metadata collection Exhibit 4: the accompanying order for production of tangible things. Exhibit 5: a September 2013 Fox News article on individual NSA employees' misuse of agency tools to spy on love interests. Exhibit 6: four August 2013 media articles on Snowden's disclosure of an internal agency audit revealing 2,776 privacy violations committed by NSA employees over the course of a year. Oral argument took place last Tuesday before Judge Janice Rogers Brown and Senior Judges Stephen Williams and David Sentelle (audio here). The court has yet to grant the appellees leave to file the brief.
Deputy Homeland Security Advisor Joshua Geltzer joins Benjamin Wittes to discuss the debate surrounding reauthorizing FISA Section 702.
The Supreme Court unanimously held that the Foreign Intelligence Surveillance Act does not displace the state secrets privilege.
The Wikimedia Foundation, which runs Wikipedia, claimed that the NSA’s “Upstream” surveillance program captures its international communications and is a violation of its First Amendment free-speech righ...