{"id":12445,"date":"2014-07-08T00:00:57","date_gmt":"2014-07-08T05:00:57","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=12445"},"modified":"2014-07-07T08:42:18","modified_gmt":"2014-07-07T13:42:18","slug":"new-law-review-article-the-legality-of-the-national-security-agencys-bulk-data-surveillance-programs","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=12445","title":{"rendered":"New Law Review Article: The Legality of the National Security Agency\u2019s Bulk Data Surveillance Programs"},"content":{"rendered":"<p><a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2369192\">The Legality of the National Security Agency\u2019s Bulk Data Surveillance Programs<\/a>, John Yoo, 37 Harv. J.L. &#038; Pub. Pol&#8217;y 901 (2014). Abstract:<br \/>\n<!--more--><\/p>\n<blockquote><p>Controversy has arisen again over the federal government\u2019s electronic surveillance efforts to gather intelligence on foreign terrorist groups. Recent disclosures, both authorized and illicit, have described two secret National Security Agency (NSA) programs. The first collects telephone \u201cmetadata\u201d such as calling records \u2014 but not the content of phone calls \u2014 both inside and outside the United States. A second NSA program intercepts the e-mails of non U.S. persons outside the United States. Despite the claims of critics, these programs do not violate the Foreign Intelligence Surveillance Act (FISA), as recently amended by Congress, or the Fourth Amendment to the Constitution. Concerns about the proper balance between these surveillance programs and individual privacy may be appropriate, but they properly fall within the province of Congress and the President to set future national security policy.<\/p>\n<p>Part I of this paper describes the surveillance efforts against al Qaeda within a broader historical and legal context. Part II argues that the programs, as described publicly by authoritative sources, appear to meet statutory requirements. Part III addresses whether the NSA programs are constitutional along two dimensions. It argues that even if some aspect of the NSA programs does not fall within Congress\u2019s authorization for foreign intelligence and counter-terrorism surveillance, it would most likely rest within the President\u2019s Commander-in-Chief authority over the management of war. Second, even if the federal government has the internal authority to conduct surveillance, the Bill of Rights, through the Fourth Amendment, may still prohibit its application to citizens or non-citizens present in the territorial United States. Part III argues, however, that the NSA programs do not violate the Fourth Amendment, as currently interpreted by the federal courts.<\/p><\/blockquote>\n<p>[Law review articles are reviewed by Prof. Andrew G. Ferguson, UDC School of Law.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Legality of the National Security Agency\u2019s Bulk Data Surveillance Programs, John Yoo, 37 Harv. J.L. &#038; Pub. Pol&#8217;y 901 (2014). Abstract:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-12445","post","type-post","status-publish","format-standard","hentry","category-fisa"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/12445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12445"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/12445\/revisions"}],"predecessor-version":[{"id":12446,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/12445\/revisions\/12446"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12445"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}