Laura K. Donohue[*]

[Full text of this Article in PDF is available at this link]

I.   Introduction

In 1978, Congress passed the Foreign Intelligence Surveillance Act (FISA) to govern domestic electronic intercepts undertaken for foreign intelligence purposes.[1] The statute represented the culmination of years of hearings directed to understanding the scope of surveillance programs conducted with little to no oversight that had resulted in the collection of significant amounts of information on U.S. citizens.[2] It also reflected the U.S. Supreme Court’s determination that the Fourth Amendment prohibited the government from undertaking surveillance for domestic security purposes absent independent judicial oversight.[3]

The statute created two specialized Article III courts: the Foreign Intelligence Surveillance Court (FISC) and the (appellate) Foreign Intelligence Court of Review (FISCR).[4] The FISC’s role was to review applications for electronic surveillance to determine whether probable cause existed that the target to be placed under surveillance was a foreign power or an agent of a foreign power, and whether the individual was likely to use the facility to be placed under surveillance, prior to issuing orders.[5]

During the first two years that FISA operated, the Department of Justice (DOJ) conducted warrantless physical searches outside of the statutory framing. But in 1980, it adopted a new approach, in which it applied to the FISC for orders to approve nonconsensual physical searches of personal (not real) property.[6] In each case, the Justice Department asserted that the search in question would have required a warrant in a law enforcement context.[7] The court issued the orders without any accompanying opinions.  In October of that year, however, the Presiding Judge of the FISC submitted a memorandum that the Court’s Legal Adviser had prepared, concluding that the FISC had no authority to issue orders approving a physical search or the opening of mail.[8]

In 1981, the Justice Department, now under the Reagan Administration, submitted an application to the FISC to issue an order approving physical search of nonresidential premises under the direction and control of a foreign power as well as personal property of agents of a foreign power located on the premises.[9] The government simultaneously submitted a memorandum of law explaining that the court lacked jurisdiction over the request.[10] Assuming that the court denied the application, if Congress wanted to bring such searches within FISA, it would have to amend the statute. Otherwise, the Executive Branch could proceed on the basis of its own, independent authority. The court, as expected, declined to issue an order approving the application on the grounds that it lacked any statutory, implied, or inherent authority or jurisdiction to issue orders approving for physical search or mail opening.[11] The full court concurred in the judgment.[12] It did not address the merits of the government’s claim that it had the independent authority to undertake such actions. Although the Senate in 1981 considered amending the statute to take account of physical search, it did not do so.[13]

Thirteen years later, the Federal Bureau of Investigation (FBI) arrested Aldrich Hazen Ames, a Central Intelligence Agency counterintelligence officer suspected of being a KGB agent.[14] The Attorney General, citing national security, approved a warrantless search of his home outside of either FISA or ordinary criminal provisions. Ames pled guilty before the case went to trial, but the Clinton Administration was sufficiently concerned about the legality of the search as to seek to amend the statute.

The 1995 Intelligence Authorization Act, accordingly, altered FISA to allow for warrantless, covert physical searches when targeting “premises, information, material, or property used exclusively by, or under the open and exclusive control of, a foreign power or powers.”[15] For property not under exclusive control of foreign powers, the statute requires an application to the FISC. The requirements parallel those for electronic surveillance, including the probable cause requirements.[16] In February 1995, President Bill Clinton issued an Executive Order extending certification authority in support of physical search applications submitted to the FISC to the Secretary of State, Secretary of Defense, and the Director of Central Intelligence, as well as their deputies and the Director of the FBI.[17]

Congress subsequently added two more types of foreign intelligence collection to what has come to be known as “Traditional FISA.” In 1998, Congress provided for the first by authorizing the acquisition of pen register and trap and trace (PRTT) data for foreign intelligence or international terrorism investigations.[18] In 2001, Congress extended PRTT beyond telephone numbers to empower the government to obtain any “dialing, routing, addressing, or signaling information” identifying the source or end point of a communication—including those that travel via email or through the internet.[19] Further changes in 2006 allowed the government to obtain subscriber records relating to past calls, as well as real-time information.[20]

The second additional type of collection stemmed from the 1995 Oklahoma City bombing. During the investigation, it was unclear whether the FBI had the authority to obtain business records related to a Ryder truck and a storage locker in Arizona that Timothy McVeigh, the Oklahoma City bomber, had rented. So in 1998, Congress expanded FISA to allow the government to obtain records from “a common carrier, public accommodation facility, physical storage facility, or vehicle rental facility.”[21] The Director of the FBI, or a designated high-ranking official, had to state that the records are sought for an “investigation to gather foreign intelligence information for . . . international terrorism.”[22] The application also had to include “specific and articulable facts” as to why the person to whom the records pertain are a foreign power or an agent thereof[23] (these last two requirements no longer apply).

Under Traditional FISA, from 1978 to 2001, the FISC essentially functioned as a warrant-granting body, issuing more than 14,000 orders and just one public opinion.[24] Applications were sealed and procedures conducted in camera and ex parte.[25] No additional opinions—and no orders—ever saw light of day. The Oklahoma City-derived provision, for its part, saw little use: between 1998 and 2001, the FBI only obtained one FISA order for business records. But following the attacks of 9/11, that all changed.

The 2001 USA PATRIOT Act altered FISA in several ways: in addition to amending PRTT, it introduced temporary provisions to allow for roving wiretaps; changed the duration of certain orders; increased the number of judges; and amended the definition of “electronic surveillance.”[26] By far, the most significant alterations though were the expansion of the business records provision in Section 215 to incorporate requests for any tangible goods, as well as the insertion of the word “significant” into the purpose for which FISA’s electronic intercepts could be sought.[27] The latter, together with a provision that authorized coordination between intelligence and law enforcement—and a prominent case that came before the FISCR in 2002—brought down the wall that had previously existed within the Department of Justice between foreign intelligence collection and criminal investigations.[28] In 2004, Congress further amended the statute to incorporate temporary “lone wolf” powers, permitting the surveillance of non-U.S. persons engaged in international terrorism, without requiring evidence linking those persons to an identifiable foreign power or terrorist organization.[29]

Despite Congress’s explicit direction in 1978 that FISA be the sole means for conducting domestic surveillance for foreign intelligence purposes, following 9/11, the Bush Administration instituted a program entirely outside the FISA framework. STELLARWIND intercepted the contents of certain domestic and international telephone calls and Internet communications, as well as telephony and Internet metadata. Starting in 2004 with Jack Goldsmith’s arrival at the Office of Legal Counsel, the Justice Department began to try to shoehorn some of the existing intelligence collection into the FISA framing. The statute, though, had been designed to ensure that surveillance could only be undertaken with particular targets in mind. Even with the USA PATRIOT Act changes, it took creative legal interpretations to find a way to bring parts of the program within FISA.[30]

The ill-fitting nature of bulk collection programs in the existing statutory framing prompted further statutory revision and ushered in what is colloquially referred to as “modernized FISA.” The 2008 FISA Amendments Act (FAA) added a new provision (Section 704), which provided for the acquisition of the communications of U.S. persons located outside the United States—a category that previously fell within the guidelines set by Executive Order 12333. Simultaneously, two other provisions liberalized the FISA rules for targeting individuals outside the United States, with Section 702 providing for the domestic collection for non-U.S. persons, and Section 703 for U.S. persons, reasonably believed to be outside the United States.[31] The statute empowered the Attorney General and the Director of National Intelligence to jointly authorize (without court approval), for up to one year, the targets of such intercepts.[32]

These changes significantly altered the courts’ role. Instead of just issuing orders targeted at particular individuals inside the U.S., the FISC and FISCR now monitor programmatic collection of international electronic communications.[33] The courts tackle questions related to jurisdiction, separation of powers, and the rule of law. They wrestle with how to understand new technologies in light of old statutory language, and they engage in complex analysis to apply the fourteen statutes that now constitute FISA.[34] The courts routinely confront difficult First, Fourth, and Fifth Amendment questions that impact the lives of every person in the United States, as well as certain individuals overseas.[35] And they have to police an Executive that makes technical errors, fails to comply with court orders, omits critical information, and makes misrepresentations to the court.[36] Instead of just issuing orders approving applications, the FISC routinely issues opinions, which the Executive Branch, amici, non-specialized Article III judges (and their clerks and parties before them), cite to as precedent.[37] This is not the role that Congress envisioned for the FISC/FISCR in 1978.

An important and robust body of law is now emerging from a court that, for decades, has been largely shielded from public inspection. As shown in Figures 1 and 2, nearly ninety declassified FISC/FISCR opinions and 290 orders are now in the public domain, as are hundreds of FISC/FISCR filings.[38]

Previously Classified FISC/FISCR Opinions

by month of declassification and release

Month Pre-2013 2013 2014 2015 2016 2017 2018 2019 2020
6
January 1 6
February 1
March 2 1 2
April 7 3 2 1
May 1
June 1 1 12
July 1
August 3 3 1 7
September 3 4 1 1 6
October 1 3
November 2 1 1
December 2 1
Total 6 9 17 6 4 18 14 3 11

Figure 1

Previously Classified FISC/FISCR Orders

by month of declassification and release

Month Pre-2013 2013 2014 2015 2016 2017 2018 2019 2020
1
January 24 2 12 4
February 1 1 1 6
March 1 4 1 4 5
April 51 16 5 1 4
May 2 2 2
June 3 2 18 1
July 1 3 2 2
August 2 7 1 1 28
September 8 11 2 14 5
October 3 1 1 1 3 1
November 2 1 1
December 8 1 3 1
Total 1 16 113 13 19 46 43 7 30

Figure 2

The timing and pattern of the declassification of the courts’ opinions and orders illustrate the suddenness with which the courts have found themselves in the public eye.

It would be hard to overstate the importance of the documents leaked by Edward Snowden in June 2013 in driving this phenomenon. They took the study of foreign intelligence from a niche, classified legal specialization to a matter of public discourse. By the end of the year, nine new opinions and sixteen orders had been formally declassified and released by the government, in sharp contrast to just six opinions and one order that had been released over the previous 35 years of the statute’s existence. Similarly, from zero public filings prior to June 2013, within five months of the Snowden leaks, the FISC’s public docket had exploded.[39] These filings put the courts in the position of having to determine a range of difficult questions, including under what conditions its opinions would be made public. Like some of the other roles assumed by the court, this was not a function envisioned by Congress in 1978.

As the FISC/FISCR have been forced to wrestle with difficult constitutional and statutory questions, non-specialized Article III courts increasingly have had to take account of their jurisprudence. In part this also has to do with changed conditions regarding standing. In Clapper v. Amnesty International, the Solicitor General represented to the Supreme Court that the Justice Department would inform criminal defendants if FISA-derived information was used against them.[40] It was not until a New York Times article revealed in 2013 that the government was not in the practice of doing so, however, that the policy changed.[41] The definition of “derived from” remains classified. Nevertheless, an increasing number of defendants are being informed that evidence against them derives from FISA. Simultaneously, dozens of Freedom of Information Act (FOIA) suits over the past decade have sought access to FISC opinions and orders.[42] A number have been successful in contributing to the material in the public domain.[43]

There are now more than 180 FISA-related cases in regular Article III courts—approximately twice the total number of FISC/FISCR cases that have been made publicly available by the courts, Office of the Director National Intelligence (ODNI), or FOIA litigation.[44] The specialized Article III courts (FISC/FISCR) and the non-specialized, geographic Article III courts (i.e., District Courts and Courts of Appeal) are increasingly in dialogue as the caselaw evolves, making it all the more important to address the scope of FISC/FISCR jurisprudence.

This Article suggests that the bulk of the issues that come before the courts derive from four key areas. Each can be explained by tensions inherent in the FISC/FISCR current role and the structure developed by Congress in 1978. Understanding these areas can help to clarify questions before the courts by placing them in their broader context and provide a framework for how to think about any future legislative changes. The goal is to ensure a deeper theoretical grasp of the role of the courts in foreign intelligence law.

The first area of tension arises from the courts’ statutory jurisdiction, Article III status, and the specialized nature of the cases that they consider. Somewhat surprisingly, there is almost no attention paid in the Federal Courts scholarship to the role of specialized Article III entities in contrast to non-specialized, geographic courts—much less their distinction from the myriad other types of federal courts in existence.[45] Yet the associated questions are foundational and particularly important for the FISC/FISCR. Separation of powers, issues related to the standing of third parties and the public, the scope of the courts’ subject-matter jurisdiction, and the relationship between specialized and non-specialized courts have all played a central role in the courts’ jurisprudence. The cases also reveal efforts by the Executive to classify judicial opinions that reveal Executive Branch malfeasance—raising further concern about efforts by Article II to undermine the constitutional powers and responsibilities of an Article III entity.

The second cluster finds root in the tension between new technologies and old statutory language—i.e., text drafted with very different technologies in mind. Here, the FISC has repeatedly had to return to questions about what, precisely, constitutes “electronic surveillance,” how to understand “electronic communications,” and what is included in the definition of a “facility.” So, too, has it wrestled with the line between intercepts and searches in the mobile digital world. Distinguishing between “content” versus “non-content” in relation to PRTT, and how to handle technologies like the use of post-cut-through-dialed-digits provide just a few examples. Further issues arise in relation to business records, bulk collection, and Section 702 acquisition.

The third cluster centers on constitutional rights, wherein the tension between secrecy (as statutorily required or as demanded by the Executive Branch), surveillance, and individual rights comes to the fore. The courts have had to wrestle here with matters related to the First Amendment right of access that derives from the right to petition the government, as well as, to a lesser extent, associational rights. Equally important have been Fourth Amendment concerns—particularly in relation to third party data and the reasonableness requirement. The Fifth Amendment has appeared around the edges in the context of due process protections.

The fourth and final cluster centers on process and compliance, where tension marks the frontier between public and private accountability. Innumerable instances of noncompliance, coupled with blatant misrepresentations to the court, have put the FISC in the position of having to conduct ongoing oversight of the intelligence community. Irregularities in regard to special as well as standard minimization procedures (SMPs), targeting, and querying procedures have repeatedly presented. The court has had to address inaccurate, materially omitted, erroneous, and false statements. Some opinions further call attention to the problem of overcollection and what could be termed the “data dilemma”: i.e., what to do with information obtained outside statutory or judicial restrictions.

Having examined each of these areas, the Article concludes by underscoring some of the trends that we are now seeing, as well as areas where we might expect to see more concentration in the future, based on the structural pressures.


[*] Professor of Law, Anne Fleming Research Professor, and Director, Center on National Security and the Law, Georgetown Law. All FISC/FISCR opinions and orders cited in the Article have been declassified and released. They are available at the Foreign Intelligence Law Collection, which was built by the author, Jeremy McCabe, and Leah Prescott, and is hosted by Georgetown Law Library at https://repository.library.georgetown.edu/handle/10822/1052698 [https://perma.cc/68BH-AWZS]. I am grateful to Jeremy McCabe, at the Georgetown Law Library, for his help in cite checking the Article and to Judge James E. Boasberg for his comments on an earlier draft.

[1] Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended at 50 U.S.C.A. §§ 1801–85c (West)).

[2] See e.g., Intelligence Activities: S. Res. 21: Hearing Before the S. Select Comm. to Study Governmental Operations with Respect to Intelligence Activities of the United States, 94th Cong., vol. 5, at  1 (1975); 124 Cong. Rec. 34,845 (1978) (statement of Sen. Kennedy); S. Rep. No. 94-755 (1976) (the Church Committee reports, divided into six books); The Unexpurgated Pike Report: Report of the House Select Committee on Intelligence, 1976 (Gregory Andrade Diamond ed., 1992), https://archive.org/details/PikeCommitteeReportFull/page/n103/mode/2up [https://perma.cc/3ZCJ-UWJ3]; Laura K. Donohue, Bulk Metadata Collection: Statutory and Constitutional Considerations, 37 Harv. J.L. & Pub. Pol’y 757, 767–83 (discussing the history leading to heightened protections afforded to domestic collection of U.S. citizens’ information) (2014).

[3] See United States v. U.S. Dist. Ct., 407 U.S. 297, 317–22 (1972) (finding government’s security concerns did not justify departure from requirement of judicial approval prior to a search or surveillance).

[4] 50 U.S.C.A. § 1803(a)–(b); see also In re Ops. & Ords. of this Ct. Addressing Bulk Collection of Data Under the Foreign Intel. Surveillance Act, No. Misc. 13-08, GID.C.00127, at 6 (FISA Ct. Jan. 25, 2017) (Collyer, J.); In re Sealed Case, 310 F.3d 717, 731, GID.CA.00001, at 731 (FISA Ct. Rev. 2002) (per curiam); United States v. Cavanaugh, 807 F.2d 787, 792 (9th Cir. 1987); In re Kevork, 634 F. Supp. 1002, 1014 (C.D. Cal. 1985), aff’d, 788 F.2d 566 (9th Cir. 1986).

[5] 50 U.S.C.A. § 1805(a); 124 Cong. Rec. 35,389 (statement of Sen. Mathias).

[6] S. Rep. No. 97-280 (1981), at 3.

[7] Id.

[8] Letter from Hon. George L. Hart, Jr., presiding judge, U.S. Foreign Intelligence Surveillance Court, Oct. 31, 1980, cited in S. Rep. No. 97-280 (1981), at 3, n. 3.

[9] S. Rep. No. 97-280 (1981), at 4.

[10] Id.

[11] In re Application of the United States for an Ord. Authorizing the Physical Search of Nonresidential Premises and Pers. Prop., at 16-19 GID.C.00001 (FISA Ct. June 11, 1981) (Hart, J.), reprinted in S. Rep. No. 97-280 (1981).

[12] Id.

[13] S. Rep. No. 97-280 (1981), at 8. It continued to keep the matter under advisement. See S. Rep. No. 98-660 (1984), at 24.

[14] See Complaint, United States v. Ames, No. 94-cr-00166 (E.D. Va. Feb. 21, 1994), https://cryptome.org/jya/ames.htm [https://perma.cc/KP6U-VR69].

[15] Intelligence Authorization Act for Fiscal Year 1995, Pub L. No. 103-359, sec. 807(a)(3), § 302(a)(1)(A)(i), 108 Stat. 3423, 3444 (1994) (codified at 50 U.S.C.A. § 1822(a)(1)(A)(i)). There must be no substantial likelihood that the facilities targeted are the property of a U.S. person. Id. § 1822(a)(1)(A)(ii).

[16]Id. § 1823.

[17] Exec. Order No. 12,949, 60 Fed. Reg. 8169 (Feb. 9, 1995).

[18] Intelligence Authorization Act for Fiscal Year 1999, Pub. L. No. 105-272, §§ 601–02, 112 Stat. 2396, 2404–12 (1998) (codified as amended at 50 U.S.C.A. §§ 1841–46, 1861–64). Previously, although the Government could request (and the court could issue) orders authorizing pen register and trap and trace devices (PRTT), it could only do so by going through the application procedures that enabled the government to obtain electronic content. See Donohue, supra note 2, at 793.

[19] USA PATRIOT ACT of 2001, Pub. L. No. 107-56, § 216, 115 Stat. 272, 290 (codified as amended at 18 U.S.C.A. § 3127).

[20] USA PATRIOT Improvement and Reauthorization Act of 2005, Pub. L. No. 109-177, § 128(a), 120 Stat. 192, 228 (2006) (codified at 50 U.S.C.A. § 1842(d)).

[21] Intelligence Authorization Act for Fiscal Year 1999 sec. 602, § 502, 112 Stat. at 2411.

[22] Id.

[23] Id. Just two months before the Oklahoma City attack, President William J. Clinton issued Executive Order 12,949, which expanded the use of FISA for physical searches. See Exec. Order No. 12,949, 60 Fed. Reg. 8169 (Feb. 9, 1995).

[24] FISA Annual Reports to Congress, 1979–2002, Foreign Intelligence Surveillance Act, Fed’n Am. Scientists,  https://fas.org/irp/agency/doj/fisa/ [https://perma.cc/Z4QH-73A3] (last updated July 28, 2020); In re Application of the United States for an Order Authorizing the Physical Search of Nonresidential Premises and Pers. Prop., GID.C.00001 (FISA Ct. June 11, 1981) (Hart, J.), reprinted in S. Rep. No. 97-280, at 16-19 (1981).

[25] In re Motion for Release of Ct. Recs., 526 F. Supp. 2d 484, 488 n.12, GID.C.00021, at 6 n.12 (FISA Ct. 2007) (Bates, J.). The law provides special protections for U.S. persons, who can only be considered an “agent of a foreign power” when the government has evidence of some level of criminality on a par with criminal law. 50 U.S.C.A. § 1801(b)(2); see also Donohue, supra note 2, at 789–90. Even then, further minimization procedures apply. 50 U.S.C.A. § 1801(h)(2). Where special non-judicial procedures targeting non-US persons are used, the Attorney General can only authorize collection where there is “no substantial likelihood” that citizens’ communications will be obtained or that the search will involve the “premises, information, material, or property of a” U.S. person. 50 U.S.C.A. § 1822(a)(1)(A)(ii). In the event that a citizen’s communications or property are involved, the government must obtain a court order within 72 hours before the information or property in question can be “disclosed, disseminated, or used for any purpose.” 50 U.S.C.A. § 1801(h)(4) (electronic surveillance); id. § 1821(4)(D) (physical search).

[26] USA PATRIOT ACT of 2001, Pub. L. No. 107-56, §§ 206–08, 214, 504, 1003, 115 Stat. 272, 282-83, 286-87, 291, 364–65, 392 (§§ 206 (roving wiretaps), 207 (duration of orders for non-US persons), 208 (expanding FISC to 11 judges), 214 (amending PRTT), 504 (authorizing coordination), 1003 (amending the definition)).

[27] Id. §§ 215, 218, 115 Stat. at 287–88, 291.

[28] In re Sealed Case, 310 F.3d 717, GID.CA.00001 (FISA Ct. Rev. 2002) (per curiam).

[29] Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 6001, 118 Stat. 3638, 3742.

[30] See generally Laura K. Donohue, The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age (2016).

[31] FISA Amendments Act of 2008, Pub. L. No. 110-261, §§ 702–04, 122 Stat. 2436, 2438–57 (codified as amended at 50 U.S.C.A. §§ 1881a–c (West)).

[32] Certain restrictions apply. See id.

[33] The courts also became enmeshed in considering bulk collection of domestic and international communications, until subsequent statutory changes prohibited such collection for telephony metadata. See Donohue, Bulk Metadata Collection, supra note 2.

[34] See, e.g., Supplemental Opinion, In re Prod. of Tangible Things, No. BR 08-13, GID.C.00033 (FISA Ct. Dec. 12, 2008) (Walton, J.).

[35] See, e.g., In re Proc. Required by Section 702(i) of the FISA Amends. Act of 2008, No. Misc 08-01, GID.C.00028, 2008 WL 9487946 (FISA Ct. Aug. 27, 2008) (McLaughlin, J.) (First and Fourth Amendments); Opinion on Motion for Disclosure of Prior Decisions, [REDACTED], No. [REDACTED], GID.C.00112 (FISA Ct. 2014) (Collyer, J.) (Fifth Amendment); Memorandum, In re Application of the Federal Bureau of Investigation for an Order Requiring Production of Tangible Things from [REDACTED], No. BR 13-158, GID.C.00086 (FISA Ct. Oct. 11, 2013) (McLaughlin, J.) (First and Fourth Amendments); In re Sealed Case, 310 F.3d 717, GID.CA.00001 (Fourth Amendment).

[36] See, e.g., Supplemental Opinion and Order, In re Application of the FBI for an Ord. Requiring the Prod. of Tangible Things [REDACTED], No. BR 09-15, GID.C.00048, at 3–4 (FISA Ct. Nov. 5, 2009) (Walton, J.) (NSA sent query results to email list of 189 analysts, “only 53 of whom had received the required training”); [REDACTED], No. [REDACTED], GID.C.00073, at 15–18, 78–80, 2011 WL 10945618, at *5–6, *28 (FISA Ct. Oct. 3, 2011) (Bates, J.) (NSA misled Court, violating FISA and the Fourth Amendment); Memorandum Opinion, [REDACTED], No. [REDACTED], GID.C.00092, at 3, 18, 100–05 (FISA Ct.) (Bates, J.) (“NSA exceeded the scope of authorized acquisition continuously during the more than [REDACTED] years of acquisition”; FBI, CIA, and NCTC “accessed unminimized U.S. person information”; NSA disseminated “reports containing U.S. person information”; government requested permission to violate law); Memorandum Opinion, [REDACTED], No. [REDACTED], GID.C.00078, at 26–27 (FISA Ct. Sept. 25, 2012) (NSA misrepresented upstream collection, acquiring U.S. person domestic communications).

[37] For FISC/FISCR reference to prior opinions as precedent, see, e.g., In re Directives to Yahoo! Inc. Pursuant to Sec. 105B of Foreign Intel. Surveillance Act, 551 F.3d 1004, 1010, GID.CA.00002, at 13, 15 (FISA Ct. Rev. 2008) (Selya, J.); Memorandum, In re Application of the FBI, No. BR 13-158, GID.C.00086, at 4–5 (analyzing Judge Eagan’s constitutional analysis in the context of the Supreme Court’s recent decision in United States v. Jones); see also Memorandum Opinion, [REDACTED], No. [REDACTED], GID.C.00092, at 6, 74–75; Memorandum Opinion, In re Application of the FBI for an Ord. Requiring the Prod. of Tangible Things from [REDACTED], No. BR 14-96, GID.C.00103, at 2–3 (FISA Ct. June 19, 2014) (Zagel, J.); Amended Memorandum Opinion, In re Application of the FBI for an Ord. Requiring Prod. of Tangible Things from [REDACTED], No. BR 13-109, GID.C.00083, at 19–20 (FISA Ct. Aug. 29, 2013) (Eagan, J.). For similar references by the U.S. Department of Justice, see, e.g., Defendants’ Memorandum of Law in Opposition to Plaintiffs’ Motion for a Preliminary Injunction at 16, Am. C.L. Union v. Clapper, 959 F. Supp. 2d 724 (S.D.N.Y. 2013), aff’d in part, vacated in part, remanded, 785 F.3d 787 (2d Cir. 2015), 2013 WL 5744828 (“[S]ince May 2006, fourteen separate judges of the FISC have concluded on thirty-four occasions that the FBI satisfied this requirement, finding ‘reasonable grounds to believe’ that the telephony metadata . . . ‘are relevant to authorized investigations.’”) (citation and quotation omitted); United States’ Legal Brief to the En Banc Court in Response to the Court’s Order of March 22, 2017 at 1, In re Ops. & Ords. of this Ct. Addressing Bulk Collection of Data Under the Foreign Intel. Surveillance Act, No. Misc. 13-08 (FISA Ct. Apr. 17, 2017), https://repository.library.georgetown.edu/bitstream/handle/10822/1056062/Misc%252013-08%2520United%2520States%2527%2520Legal%2520Brief%2520to%2520the%2520En%2520Banc%2520Court.pdf [https://perma.cc/WKA5-CT8P ] (“It is well-settled that there is no First Amendment public right of access to the proceedings, records, and rulings of this Court,” citing to four FISC opinions and orders in support.)

[38] More than two decades after its 1981 opinion, the Court issued two opinions. In re Sealed Case, 310 F.3d 717, GID.CA.00001; In re All Matters Submitted to Foreign Intel. Surveillance Ct., 218 F. Supp. 2d 611, GID.C.00002 (FISA Ct. 2002), rev’d by In re Sealed Case, 310 F.3d 717, GID.CA.00001. It published two more opinions between 2007 and 2008. In re Directives to Yahoo!, Inc Pursuant to Sec. 105B of Foreign Intel. Surveillance Act, 551 F.3d 1004, GID.CA.00002 (FISA Ct. Rev. 2008) (Selya, J.); In re Motion for Release of Ct. Recs., 526 F. Supp. 2d 484, GID.C.00021 (FISA Ct. 2007) (Bates, J.).

[39] Four days after the first articles appeared in The Guardian and Washington Post, for instance, on June 10, 2013 the ACLU and Yale Media Freedom Information Access Clinic (MFIAC) filed a motion to obtain all FISC opinions evaluating the meaning, scope, and constitutionality of bulk collection. Four days later, Yahoo! moved under FISC Rule 62(a) to request the Court to order publication of an opinion from 2008, which had been appealed to FISCR and referenced in In re Directives, 551 F.3d 1004, GID.CA.00002. On June 19, Microsoft requested permission to disclose the aggregate information related to FISC orders with which it had been served. Google, Facebook, and LinkedIn soon filed parallel requests. On June 28, sixteen members of the U.S. House of Representatives filed an amicus brief in support of the ACLU/MFIAC motion—a move followed on July 8 by the First Amendment Coalition, the Center for Democracy and Technology, the Electronic Frontier Foundation, and on July 15 by a formidable media conglomerate: the Reporters’ Committee, ABC News, the Associated Press, Bloomberg News, Dow Jones, the Los Angeles Times, National Public Radio, Reuters, the New Yorker, Newsweek, the Washington Post, and others. By mid-November 2013, further motions for judicial records had been filed by the Center for National Security Studies and ProPublica. For further discussion, see discussion in Part II.E, Standing, infra.

[40] See Clapper v. Amnesty Int’l, 568 U.S. 398, 421–22 (2013).

[41] See Nina Totenberg, Government Takes a U-Turn on Warrantless Wiretaps, NPR (Oct. 23, 2013), https://www.npr.org/2013/10/23/240163063/government-changes-policy-on-warrantless-wiretap-defendants [https://perma.cc/ZBA2-THYX]; Eric Schmidt et al., Administration Says Mining Data Is Crucial to Fight Terrorism, N.Y. Times (June 7, 2013), https://www.nytimes.com/2013/06/08/us/mining-of-data-is-called-crucial-to-fight-terror.html?module=inline [https://perma.cc/TH3B-G3CY]; Adam Liptak, A Secret Surveillance Program Proves Challengeable in Theory Only, N.Y. Times (July 15, 2013), https://www.nytimes.com/2013/07/16/us/double-secret-surveillance.html [https://perma.cc/PLH6-JADQ]; Charlie Savage, Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence, N.Y. Times (Oct. 26, 2013), https://www.nytimes.com/2013/10/27/us/federal-prosecutors-in-a-policy-shift-cite-warrantless-wiretaps-as-evidence.html [https://perma.cc/B9MB-HPQJ].

[42] See, e.g., ACLU v. ODNI, Not Reported in F.Supp.2d, 2011 WL 5563520 (Nov. 15, 2011); New York Times Co. v. U.S. Dep’t of Justice, 872 F.Supp.2d 309 (S.D.N.Y. 2012); Elec. Frontier Found. v. Dep’t of Justice, 892 F.Supp.2d 95 (D.D.C. 2012); Elec. Frontier Found. v. Dep’t of Justice, U.S. Ct. of Appeals for D.C., 739 F.3d 1, Jan. 3, 2014; cert. denied Elec. Frontier Found. v. Dep’t of Justice, 135 S.Ct. 356 (2014); Elec. Privacy Info. Ctr. v. DOJ, No. 13cv1961, 2016 WL 447426 (D.D.C. Feb. 4, 2016).

[43] See, e.g., ACLU v. ODNI, Not Reported in F.Supp.2d, 2011 WL 5563520 (Nov. 15, 2011); Elec. Frontier Found. v. DOJ, No.: 4:11-cv-05221-YGR, 2014 WL 3945646 (N.D. Cal. Aug. 11, 2014).

[44] Despite the increasing importance of the courts’ jurisprudence, FISC/FISCR opinions and orders have not hitherto been easily accessible. Less than two dozen declassified and redacted opinions are available on the court’s web site. Some opinions are only available through the Office of the Director of National Intelligence (ODNI). Others are only available from individuals who have submitted Freedom of Information Act requests or engaged in litigation with the Department of Justice to obtain the materials—and decided to place them online. Neither Westlaw nor Lexis, moreover, carry most of the opinions, despite FISA issues regularly now appearing in ordinary Article III courts. No site has all of the declassified and redacted court filings available. Accordingly, Jeremy McCabe, Leah Prescott, and I have created a text-searchable database at Georgetown Law Library with all of the formally released (and often redacted) FISC/FISCR opinions and orders, along with all of the publicly available guidelines. Foreign Intelligence Law Collection, Digital Geo., https://repository.library.georgetown.edu/handle/10822/1052698 [https://perma.cc/NQ4B-CQYN] (last updated Mar. 17, 2021).

[45] For scholarship on the distinction between Article III specialized and geographic courts, as well as the full panoply of federal courts, see Laura K. Donahue & Jeremy M. McCabe, Federal Courts: Art. III(1), Art. I(8), Art. IV(3)(2), Art. II(2)/I(8)(3), and Art. II(1), 71 Cath. U. L. Rev. ___ (forthcoming 2021).

Professor of Law, Anne Fleming Research Professor, and Director, Center on National Security and the Law, Georgetown Law.