CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT

Similar documents
United States District Court

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF IDAHO

Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)

[ORAL ARGUMENT NOT YET SCHEDULED] IN THE UNITED STATES COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT

Statement of Kevin S. Bankston Senior Staff Attorney Electronic Frontier Foundation

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I.

Case 1:15-cv TSE Document Filed 03/26/18 Page 1 of 41 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

Case 4:08-cv JSW Document Filed 11/02/18 Page 1 of 29

The Fourth Amendment in the Information Age

Overview of Constitutional Challenges to NSA Collection Activities

Case M:06-cv VRW Document 560 Filed 02/11/2009 Page 1 of 18

Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

u.s. Department of Justice

Reauthorization of the FISA Amendments Act

Case 1:13-cv RBW Document 32 Filed 10/17/14 Page 1 of 6 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case3:07-cv VRW Document103 Filed08/20/09 Page1 of 43

Case 3:07-cv VRW Document 54 Filed 11/14/2008 Page 1 of 19

Case 3:10-cv BR Document 123 Filed 11/15/13 Page 1 of 12 Page ID#: 2969

Case 1:15-cv TSE Document 103 Filed 07/17/17 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

Standing After Spokeo What does it mean for an injury to be concrete?

January 14, Dear Chairman Graham and Ranking Member Feinstein:

Case M:06-cv VRW Document 151 Filed 02/01/2007 Page 1 of 8

IN THE UNITED STATES COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT

Case M:06-cv VRW Document 640 Filed 06/03/2009 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

Reauthorization of the FISA Amendments Act

Case4:08-cv JSW Document253 Filed06/27/14 Page1 of 31

Case 3:07-cv VRW Document 49 Filed 09/30/2008 Page 1 of 33

Case3:06-cv VRW Document25 Filed02/01/10 Page1 of 21

COMMON GROUND BETWEEN COMPANY AND CIVIL SOCIETY SURVEILLANCE REFORM PRINCIPLES

Case 3:07-cv VRW Document 93 Filed 05/29/2009 Page 1 of 28

CaseM:06-cv VRW Document716 Filed03/19/10 Page1 of 8

NAMSDL Case Law Update

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION

Case4:14-cv YGR Document75 Filed07/17/15 Page1 of 13

Privacy and Information Security Law

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

1 See, e.g., Zurcher v. Stanford Daily, 436 U.S. 547, 559 (1978) ( The Fourth Amendment has

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

Case3:07-cv VRW Document44 Filed12/08/09 Page1 of 20

Case3:13-cv JSW Document86-2 Filed03/10/14 Page1 of 56. Exhibit A. Exhibit A

Case 3:07-cv VRW Document 93 Filed 05/29/2009 Page 1 of 28

Case 3:07-cv VRW Document 31-2 Filed 04/22/2008 Page 1 of 15

The Foreign Intelligence Surveillance Act: A Sketch of Selected Issues

P.L , the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

United States Court of Appeals

NSI Law and Policy Paper. Reauthorization of the FISA Amendments Act

Case No IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT. WIKIMEDIA FOUNDATION, et al.,

Case 2:17-cv JCM-GWF Document 17 Filed 07/19/18 Page 1 of 6

REFERRAL TO MERITS PANEL REQUESTED

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION

Case 3:15-cv PGS-LHG Document 66 Filed 11/22/17 Page 1 of 8 PageID: 1416 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW JERSEY

Case 4:17-cv JSW Document 39 Filed 03/21/18 Page 1 of 7 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA

P.L , the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act

Case 1:17-cv TSC Document 29 Filed 12/23/17 Page 1 of 12 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE I. INTRODUCTION

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION. v. CIVIL ACTION NO. 3:16-CV M

Corporate Litigation: Standing to Bring Consumer Data Breach Claims

Case 2:16-cv R-AJW Document 45 Filed 10/12/16 Page 1 of 6 Page ID #:2567 UNITED STATES DISTRICT COURT. Deadline.com

Notes on how to read the chart:

United States Court of Appeals For the Eighth Circuit

MEMORANDUM OPINION AND ORDER * * *

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report

Case3:07-cv VRW Document115 Filed03/31/10 Page1 of 45 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA 8

Case 3:06-cv VRW Document 346 Filed 02/20/2007 Page 1 of 9

The National Security Agency s Warrantless Wiretaps

Case 1:18-cv MSK-NYW Document 36 Filed 09/27/18 USDC Colorado Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

CRS Report for Congress

CA Nos , UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

United States District Court

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Case M:06-cv VRW Document 424 Filed 02/04/2008 Page 1 of 5

JOINT STATEMENT FOR THE RECORD OF JAMES R. CLAPPER DIRECTOR OF NATIONAL INTELLIGENCE

A EUROPEAN APPROACH TO THE UNITED STATES CONSTITUTIONAL PRIVACY

Re: The European Commission s Annual Review of the E.U. U.S. Privacy Shield

Case 3:07-cv VRW Document 51 Filed 10/23/2008 Page 1 of 29

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

CRS Report for Congress

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA MEMORANDUM OPINION

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA

Case M:06-cv VRW Document 345 Filed 08/08/2007 Page 1 of 5

On the Bulk Collection of Tangible Things

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

J S - 6 UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. CASE NO. CV JST (FMOx) GLOBAL DÉCOR, INC. and THOMAS H. WOLF.

THE RUTHERFORD INSTITUTE

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

Case M:06-cv VRW Document 145 Filed 02/01/2007 Page 1 of 9

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA

Case 1:14-cv KMW Document 24 Entered on FLSD Docket 04/10/2015 Page 1 of 9

Electronic Privacy Information Center September 24, 2001

Harshad Patel v. Allstate New Jersey Insurance

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

Case 2:04-cv VMC-SPC Document 47 Filed 04/26/2005 Page 1 of 6 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FORT MYERS DIVISION

Case 2:04-cv VMC-SPC Document 51 Filed 05/09/2005 Page 1 of 6 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FORT MYERS DIVISION

CASE NO UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT. DANIEL B. STORM, et al., Appellants, PAYTIME, INC., et al., Appellees.

District Attorney's Office v. Osborne, 129 S.Ct (2009). Dorothea Thompson' I. Summary

Transcription:

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT Jewel v. Nat l Sec. Agency, 2015 WL 545925 (N.D. Cal. 2015) Valentín I. Arenas * FACTS Plaintiffs, California AT&T customers who send Internet communications, 1 alleged that the National Security Agency s (NSA) possible interception of their Internet communications without a warrant violates their Fourth Amendment rights. 2 Defendants, the NSA and other government officials, contended that Plaintiffs lacked standing and raised the state secrets privilege protection. 3 Plaintiffs first filed the case before the U.S. District Court for the Northern District of California, which granted Defendants motion to dismiss. 4 On appeal, the Ninth Circuit Court of Appeals reversed lower court s judgment. 5 On remand, the District Court rejected Defendants state secrets privilege defense as per 50 U.S.C. 1806(f) of the Foreign Intelligence Surveillance Act (FISA) 6 and required that parties submit briefings before ruling on the federal claims. 7 Jurisdiction was proper because the Court had subject matter jurisdiction over the federal claims and personal jurisdiction over Defendants, who had sufficient contacts with the district and events that took place therein, and because Plaintiffs alleged enough stake in the outcome. 8 The Court denied Plaintiffs motion for partial summary judgment and granted Defendant s cross-motion for partial summary * J.D. Candidate, anticipated May 2017, University of Florida Levin College of Law; B.A., Psychology and Political Science, University of Miami, 2013. I would like to thank my family for their love and support. I would also like to thank the University of Florida Levin College of Law, Journal of Technology Law & Policy for selecting my work for publication. 1. Jewel v. Nat l Sec. Agency, No. 08-CV-04373-JSW, 2015 WL 545925, at *1 (N.D. Cal. Feb. 10, 2015). 2. Id. at 2. 3. Id. 4. Jewel v. Nat l Sec. Agency, No. 06-CV-1791-VRW, 2010 WL 235075, at *9 (N.D. Cal. Jan. 21, 2010). 5. Jewel v. Nat l Sec. Agency, 673 F.3d 902, 913 (9th Cir. 2011). 6. Jewel v. Nat l Sec. Agency, 965 F. Supp. 2d at 1090, 1112 (N.D. Cal. 2013). 7. Id. 8. Jewel, 673 F. 3d at 909. 113

114 JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 21 judgment. 9 HELD, Plaintiffs lacked standing to sue under the Fourth Amendment and, even if Plaintiffs established standing, the state secrets privilege will require that their claim be dismissed. 10 HISTORY The Fourth Amendment of the U.S. Constitution provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 11 In recent years, the Fourth Amendment s applicability in electronic surveillance has received much attention from the judiciary. The Fourth Amendment s goal is to protect individuals right to privacy by prohibiting the government from searching through communications without a warrant, probable cause, and particularity. 12 This is especially true in the case of electronic surveillance, where the threat of invasion of privacy is greater and more inconspicuous. The Federal Code contains numerous sections regarding electronic surveillance and information collection. Relevant to the instant case is FISA. Congress passed FISA in 1988 to prevent the abuse of domestic surveillance and to authorize the use of warrantless foreign surveillance on the grounds that the surveillance is not on United States citizens and is in the interest of national security. 13 Otherwise, FISA requires that the government obtain a warrant to engage in domestic surveillance. 14 Congress intended for FISA to supplant federal common law rules. 15 As a result, 50 U.S.C. 1806(f), 16 the exclusive procedure for reviewing classified information in FISA challenges, 17 preempts the state secrets privilege by allowing the judiciary to review the information ex parte and 9. Jewel, 2015 WL 545925, at *5. 10. Id. at *7. 11. U.S. CONST. amend. IV. 12. Jewel, 2015 WL 545925, at *2. 13. Electronic Surveillance, CORNELL UNIV. LAW SCHOOL WEX LEGAL ENCYCLOPEDIA, https://www.law.cornell.edu/wex/electronic_surveillance (last visited July 28, 2015). 14. Id. 15. Jewel v. Nat l Sec. Agency, 965 F. Supp. 2d at 1090, 1105 (N.D. Cal. 2013). 16. 50 U.S.C. 1806(f) (2015). 17. Jewel, 965 F. Supp. 2d at 1105.

2016] CASE COMMENT 115 in camera. 18 This, in turn, permits the judiciary to determine whether the surveillance was lawfully authorized and executed. 19 Similarly, section 702 of FISA outlines the process by which the government is to collect communications. Pursuant to Section 702, government surveillance aims to [i]dentify non-u.s. persons located outside of the United States who are reasonably believed to possess or receive, or likely to communicate, foreign intelligence information relevant to national security. 20 Once the government identifies the target s means of communications, known as selectors, the government may then compel service providers to disclose all information necessary, to acquire the communications related to the selector, known as tasking. 21 A section 702 directive that has been subject to recent litigation is the Upstream collection program. The program compels service providers to release the tasked selectors communications that transit the domestic Internet backbone and to filter the results. 22 Once the communications pass both screens, they enter governmental databases for further surveillance. 23 Generally, to have standing on a Fourth Amendment claim, Plaintiffs must establish a reasonable expectation of privacy and show that a violation of that constitutionally protected right is certainly impending. 24 In Clapper, the Court found that plaintiffs reliance on a speculative chain of possibilities was insufficient to establish standing. 25 The Court reasoned that one cannot establish that an injury is certainly impending if it is based on a potential future surveillance. 26 In other words, allegations and speculations are not enough to challenge NSA surveillance under FISA. 27 Furthermore, Klayman sheds light on the role service providers may play in establishing standing. In Klayman, the District Court granted standing to Verizon customers after finding that the NSA had been 18. Id. at 1106; see also 50 U.S.C. 1806(f) (2015). 19. Id. at 1105. 20. Jewel v. Nat l Sec. Agency, No. 08-CV-04373-JSW, 2015 WL 545925 at *1 (N.D. Cal. Feb. 10, 2015). 21. Id. 22. Id. at *2. 23. Id. (citing to Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, July 2, 2014, at 35). 24. Lujan v. Defenders of Wildlife, 504 U.S. 555, 561 (1992); see also Whitmore v. Arkansas, 495 U.S. 149, 158 (1990). 25. Clapper v. Amnesty Int l USA, 133 S. Ct. 1138, 1150 (2013). 26. Id. at 1150. 27. See Whitmore, 495 U.S. at 158.

116 JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 21 collecting Verizon metadata. 28 It reasoned that the fact that plaintiffs are Verizon customers sufficiently shows that an injury is certainly impending. 29 On appeal, the Court reversed after finding that plaintiffs subscribed to Verizon Wireless instead of Verizon Business Network Services, Inc., whose data the government acknowledged collecting. 30 Thus, once it is known that a service provider collaborates with the government in the mass collection of Internet communications, individuals only have to show that they are its customers and that they send Internet communications to establish that the collection program has potentially stored their communications. 31 Celotex set the standard of proof required at the summary judgment stage. 32 In Celotex, the Court held that the burden of proof at the summary judgment stage and at trial is the same. 33 Therefore, individuals moving for summary judgment must show sufficient evidence in establishing an essential element of their claim to allow a rational trier of fact to find in their favor. Once the moving party meets its burden of proof, the judiciary must address whether Fourth Amendment violations can be litigated without risking disclosure of classified information critical to national security. The judiciary s main concerns when it comes to litigating the constitutionality of electronic surveillance are national security and a fair and full adjudication of the parties arguments. 34 These concerns, coupled with protection under the state secrets privilege, may at times require the Court to dismiss a case. 35 History has shown that the judiciary has protected the government s use of the state secrets privilege in the name of national security at the expense of full disclosure to the public. INSTANT CASE The instant case follows this pattern of judiciary support for the government s use of the state secrets privilege in the name of national security. The Court based its decision on the risks that litigating this claim poses on national security and on the impossibility of a fair and full 28. Klayman v. Clapper, 957 F. Supp. 2d 1, 26-28 (D.D.C. 2013), vacated, Obama v. Klayman, 800 F. 3d 559 (D.C. Cir. 2015). 29. Id. at 26. 30. Obama v. Klayman, 800 F.3d 559, 565-66 (D.C. Cir. 2015) (Williams, J., concurring). 31. Jewel, 2015 WL 545925, at *4. 32. Celotex Corp. v. Catrett, 477 U.S. 317, 322 (1986). 33. Id. 34. Jewel, 2015 WL 545925, at *5. 35. Mohamed v. Jeppesen DataPlan, Inc., 614 F.3d 1070, 1083 (9th Cir. 2010); see also Hepting v. AT&T Corp., 439 F. Supp. 2d 974, 991-92 (N.D. Cal. 2006) (holding that AT&T aids the government in the collection of Internet communications).

2016] CASE COMMENT 117 adjudication due to the necessity of classified information. 36 The instant case was before the Court on Plaintiffs motion for partial summary judgment and Defendants cross-motion for partial summary judgment following the Court s order for briefings on the subject. 37 Plaintiffs alleged that Defendants received copies of their Internet communications from their service provider, AT&T, filtered them to remove domestic communications, and then searched the remaining communications for potentially terrorist-related foreign intelligence information. 38 At issue is a FISA section 702 directive called the Upstream collection program. Plaintiffs contended that the possible interception of their Internet communications by the NSA without a warrant or individualized suspicion violates their Fourth Amendment protection. 39 In response, Defendants contended that Plaintiffs lacked standing and that, even if Plaintiffs established standing, the state secrets privilege requires dismissal of Plaintiffs claim. 40 The Court found that Plaintiffs sufficiently established that, as AT&T customers and Internet users, their communications were likely to be captured under the wide net casted by the Upstream collection program. 41 However, the Court was persuaded by Defendants arguments. The Court held that Plaintiffs witness testimony was substantially inaccurate because it was speculative and based on insufficient facts. 42 Moreover, the Court reviewed the classified portions of the Defendants brief and found that they must remain classified in the interest of national security. 43 The Court reasoned that because a fair and full adjudication of the Defendant s arguments was not possible without the privileged information, the Court was forced to deny Plaintiffs motion for partial summary judgment and grant Defendants cross-motion for partial summary judgment. 44 The Court did not rule on the substantive issue: the constitutionality of the NSA s Upstream collection program. 45 Plaintiffs have since appealed the Court s decision. 46 36. Jewel, 2015 WL 545925, at *5. 37. Id. at *1. 38. Id. 39. Id. at *2. 40. Id. 41. Id. at *4. 42. Id. 43. Id. at *5. 44. Id. 45. Id. 46. Jewel v. Nat l Sec. Agency, 810 F.3d 622 (9th Cir. 2015).

118 JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 21 ANALYSIS The instant case was decided incorrectly because the Court did not rule on the constitutionality of the NSA s Upstream collection program. The Court properly found that Plaintiffs had sufficiently proven to have stake in the outcome of the case because AT&T, Plaintiffs service provider, aided the government in the collection of Internet communications. 47 However, the Court disregarded FISA s procedure for reviewing classified information, 50 U.S.C. 1806(f). 48 Consequently, the Court improperly held that individuals lacked standing to challenge the constitutionality of the NSA surveillance program under FISA, contradicting its previous ruling. 49 At first glance, one might argue that the Court decided the instant case correctly because, as Defendants contended, Plaintiffs failed to prove that the surveillance occurred as Plaintiffs alleged. 50 It is true that Plaintiffs relied on the declarations of a former AT&T technician who did not have actual knowledge of the program s operation and, as a result, Plaintiffs did not meet the burden of proof necessary to survive a motion for summary judgment. However, the Court ignored the case law it cited. Plaintiffs did not intend to show the Court how the NSA surveillance program operates and this should not have prevented Plaintiffs from establishing standing. Together, Clapper and Klayman, cases on which the court relied, support Plaintiffs contention that as customers of a service provider that aids in the collection of Internet communications, Plaintiffs have standing to challenge the statute s constitutionality. 51 Moreover, the Court may have taken their analysis one step too far when it required that Plaintiffs also establish exactly how the program works. The process outlined by NSA Director of Signals Intelligence Directorate, Teresa H. Shea, comments on the NSA s vast and allinclusive surveillance. 52 Similarly, Section 702 of FISA is sufficient to establish how the program operates, as it outlines the NSA s surveillance procedures. 53 Standing alone should have been sufficient for the Court to rule on the program s constitutionality. Furthermore, FISA s legislative history and a plain reading of the 47. See Hepting v. AT & T Corp., 439 F. Supp. at 991-92 (N.D. Cal 2006). 48. 50 U.S.C. 1806(f) (2015). 49. Jewel, 965 F. Supp. 2d at 1105-06. 50. Jewel, 2015 WL 545925 at *5. 51. Klayman, 957 F. Supp. at 26-28; see also Clapper, 133 S. Ct. 1150. 52. Id. at 28. 53. Jewel v. Nat l Sec. Agency, No. 08-CV-04373-JSW, 2015 WL 545925 at *1 (N.D. Cal. Feb. 10, 2015).

2016] CASE COMMENT 119 provisions in question demonstrate that it was written to supplant federal common law rules. 54 Specifically, FISA was written to preempt the state secrets privilege. 55 Thus, the Court incorrectly permitted the government s use of the state secrets privilege. FISA provides a method of review that permits the Court to competently weigh both parties arguments without disclosing classified information. 56 Adoption of this method would have permitted the Court to rule on the constitutionality of the surveillance program without risking damage to national security. Case law and Congress intended for this to be the case. An unforeseen ramification is that while allowing the government to raise the state secrets privilege did not affect the Court s disposition, it will likely serve as precedent on future challenges. This decision has the potential to function as an extra layer of protection for the government from constitutional challenges, permitting it to keep stretching the scope of its powers in electronic surveillance. This case is a result of the nation s war on terror. History shows that, in a time of war, the judiciary constantly justifies the government s actions in the name of national security, even if they stretch beyond the scope of the government s powers. 57 The problem may lie in how the judiciary views possible threats to national security. The judiciary may have to choose between upholding the laws and values of the Constitution and interpreting them to benefit the government at the expense of the people. Another approach altogether may be useful to the judiciary and preserve individuals constitutionally protected rights. Thus, Plaintiffs appeal will likely be a step in the right direction. CONCLUSION The Fourth Amendment of the U.S. Constitution protects individuals from unreasonable searches and seizures, 58 but what that means remains unclear. However, this ambiguity does not permit the government to act beyond the scope of its powers and arbitrarily intrude on individuals constitutionally protected right to privacy. Following the 2001 terrorist attacks on the World Trade Center, the government s focus on preventing future attacks opened a floodgate of litigation about the collaboration between the NSA and service providers. 54. 50 U.S.C. 1806(f) (2015). 55. Jewel, 965 F. Supp. 2d at 1105-06. 56. 50 U.S.C. 1806(f) (2015). 57. See Korematsu v. United States, 323 U.S. 214 (1944) 58. U.S. CONST. amend. IV.

120 JOURNAL OF TECHNOLOGY LAW & POLICY [Vol. 21 In the instant case, the Court contradicted itself to protect the government under the guise of national security s best interest. After previously ruling that FISA preempts the state secrets privilege and outlines procedures by which the Court can review classified information without disclosing it to determine if the surveillance is lawful, 59 the Court decided to disregard the statutory procedure available. 60 The judiciary was created to provide consistency and uniformity in the law. In this case, it has done the opposite. While national security is certainly a priority, it is not enough to deprive individuals of their constitutionally protected right to privacy and relief, especially when the statute in question provided a way to maintain secrecy while allowing a fair and full adjudication of the claim. Simply put, the Court protected its own with this ruling, which will likely affect future parties intending to pursue similar claims. 59. Jewel v. Nat l Sec. Agency, 965 F. Supp. 2d at 1105-06 (N.D. Cal. 2013). 60. 50 U.S.C. 1806(f) (2015).