{"id":1505,"date":"2013-03-01T16:02:48","date_gmt":"2013-03-01T16:02:48","guid":{"rendered":"http:\/\/ncjolt.org\/?p=1505"},"modified":"2020-06-04T20:54:02","modified_gmt":"2020-06-04T20:54:02","slug":"fisa-challenge-struck-down-by-the-supreme-court","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fisa-challenge-struck-down-by-the-supreme-court\/","title":{"rendered":"FISA Challenge Struck Down by the Supreme Court"},"content":{"rendered":"<p>Friday, March 1, 2013, by Amanda Jones<br \/>\nIn 1978 Congress passed the Foreign Intelligence Surveillance Act (\u201c<a href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/subjects\/f\/foreign_intelligence_surveillance_act_fisa\/index.html\">FISA<\/a>\u201d), a law governing \u201cthe surveillance of people in the United States for the purpose of collecting intelligence related to foreign powers.\u201d\u00a0 The Act was amended several times in the following years, the most recent amendment occurring in 2008.\u00a0 With each amendment, the government, specifically the National Security Agency, was given more power to conduct surveillance of American\u2019s communications with citizens of foreign countries. \u00a0The 2008 amendments permit the National Security Agency to conduct surveillance without first seeking a specific <a href=\"http:\/\/www.policymic.com\/articles\/28193\/supreme-court-fisa-decision-how-the-nsa-and-the-courts-are-trashing-the-first-amendmenthttp:\/www.policymic.com\/articles\/28193\/supreme-court-fisa-decision-how-the-nsa-and-the-courts-are-trashing-the-first-amendment\">warrant<\/a>.<br \/>\nThe government is able to eavesdrop on a wide range of communications, especially communications involving foreigners, but the public cannot be exactly sure what type of communications the government is listening too because all the information is kept secret from the public.<br \/>\nSubsequent to the amendments in 2008 a group of Americans filed suit claiming that FISA violated their constitutional rights.\u00a0\u00a0\u00a0 \u201c[A]ll the plaintiffs argued that they were likely interacting with persons and groups outside the country who were being <a href=\"http:\/\/arstechnica.com\/tech-policy\/2013\/02\/supreme-court-kills-activists-challenge-to-fisa-spying-law\/\">wiretapped<\/a>\u2014foreign sources for reporters, activists, and defendants in court cases.\u201d \u00a0\u00a0Plaintiffs argued that this wiretapping is a violation of their due process right.\u00a0 After losing in New York district court on standing grounds, the plaintiffs appealed to the New York federal appeals court and won.\u00a0 The appeals court found that this group of individuals was being injured by FISA and should be permitted to sue. \u00a0\u00a0The decision then was appealed by the government to the United States Supreme Court.<br \/>\nOn February 26<sup>th<\/sup> the Supreme Court, in a 5-4 decision held that the plaintiffs did not have standing to bring the suit.\u00a0 They <a href=\"http:\/\/www.supremecourt.gov\/opinions\/12pdf\/11-1025_ihdj.pdf\">majority opinion<\/a>, written by Justice Alito, held that because plaintiffs cannot show with certainty that their communications have been monitored by the National Security Agency, they do not have the right to sue at all.<\/p>\n<blockquote><p>Plaintiffs cannot show with certainty that their communications have been monitored.<\/p><\/blockquote>\n<p>It is not a surprise that the plaintiffs cannot show that they are being wiretapped, because of the governmental information surrounding FISA wiretaps is kept secret.\u00a0 The plaintiffs must assume that they are being wiretapped because of their communications and then they must go out of their way to protect their privacy when talking to the foreigners who are likely of interest to the US government.\u00a0 In fact, one lawyer representing a Saudi national on terrorism charges often had to travel abroad to ensure that his telephone conversations with his client and others related to the case were not intercepted by the government.<br \/>\nBut, the Supreme Court says all of this is speculative because the plaintiffs and even the lawyer in the example above must all make the assumption that their communications are being intercepted, but not one of them can prove that interception actually occurred.<br \/>\nThe dissent takes a more reasonable approach to the standing issue.\u00a0 Justice Breyer <a href=\"http:\/\/www.supremecourt.gov\/opinions\/12pdf\/11-1025_ihdj.pdf\">wrote<\/a>, \u201cThe plaintiffs\u2019 standing depends upon the likelihood that the Government, acting under the authority of 50 U.S.C. \u00a7 1881a will have them by intercepting at least some of their private, foreign, telephone, or e-mail conversations.\u00a0 In my view, this harm is not \u2018speculative.\u2019\u00a0 Indeed, it is as likely to take place as are most future events that commonsense inference and ordinary knowledge of human nature tell us will happen.\u201d\u00a0 \u00a0This logical approach should have been used when deciding this case, but instead the majority decided to avoid the merits of the case, kicking the suit out on standing grounds.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Friday, March 1, 2013, by Amanda Jones In 1978 Congress passed the Foreign Intelligence Surveillance Act (\u201cFISA\u201d), a law governing \u201cthe surveillance of people in the United States for the purpose of collecting intelligence related to foreign powers.\u201d\u00a0 The Act was amended several times in the following years, the most recent amendment occurring in 2008.\u00a0 <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fisa-challenge-struck-down-by-the-supreme-court\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1505"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=1505"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1505\/revisions"}],"predecessor-version":[{"id":7619,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1505\/revisions\/7619"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=1505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=1505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=1505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}