{"id":19506,"date":"2015-11-09T16:09:37","date_gmt":"2015-11-09T21:09:37","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=19506"},"modified":"2015-11-10T06:35:26","modified_gmt":"2015-11-10T11:35:26","slug":"d-d-c-nsas-bulk-telephony-metadata-program-enjoined","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=19506","title":{"rendered":"D.D.C.: NSA\u2019s Bulk Telephony Metadata Program enjoined"},"content":{"rendered":"<p>The NSA\u2019s Bulk Telephony Metadata Program is enjoined. Plaintiffs have shown likelihood of showing standing with a new party who is a Verizon customer (\u201cGiven the strong presumption that the NSA collected, and warehoused, the Little plaintiff\u2019s data within the last five years, these plaintiffs unquestionably have standing to enjoin any future queries of that metadata.\u201d This claim is not \u201cattenuated\u201d under Clapper. Plaintiffs have also shown a substantial likelihood of prevailing on the merits of the Fourth Amendment claim because of the nature of the privacy interest in smartphones and the character and degree of the government\u2019s intrusion, still shrouded in secrecy. Finally, they will suffer irreparable harm without injunctive relief. <a href=\"https:\/\/ecf.dcd.uscourts.gov\/cgi-bin\/show_public_doc?2013cv0851-158\">Klayman v. Obama<\/a>, 2015 U.S. Dist. LEXIS 151826 (D.D.C. Nov. 9, 2015), prior opinion 957 F.Supp.2d 1 (D.D.C. 2013), vacated and remanded 800 F.3d 559 (D.C.Cir. 2015).<\/p>\n<p>See Wired: <a href=\"http:\/\/www.wired.com\/2015\/11\/judge-blocks-nsa-spying-and-sets-an-important-precedent\/?mbid=social_fb\">Judge Blocks NSA Spying and Sets an Important Precedent<\/a> by Kim Zetter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA\u2019s Bulk Telephony Metadata Program is enjoined. Plaintiffs have shown likelihood of showing standing with a new party who is a Verizon customer (\u201cGiven the strong presumption that the NSA collected, and warehoused, the Little plaintiff\u2019s data within the &hellip; <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=19506\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-19506","post","type-post","status-publish","format-standard","hentry","category-national-security"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/19506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=19506"}],"version-history":[{"count":4,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/19506\/revisions"}],"predecessor-version":[{"id":19513,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/19506\/revisions\/19513"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=19506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=19506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=19506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}