CINXE.COM
(PDF) The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee | John Eastman - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="JlQ27gDiht7BVK4NYCBA87EGkXuzN9ZHEhOV3UbUQapMMViBwwFHzWhsU6JPaVzQ1b647gg9D64YfS7JVjKmVw==" /> <meta name="citation_title" content="The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee" /> <meta name="citation_publication_date" content="2006" /> <meta name="citation_journal_title" content="SSRN Electronic Journal" /> <meta name="citation_author" content="John C. Eastman" /> <meta name="citation_issn" content="1556-5068" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee" /> <meta name="twitter:title" content="The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee" /> <meta name="twitter:description" content="Academia.edu is a platform for academics to share research papers." /> <meta name="twitter:image" content="https://0.academia-photos.com/272873631/128610049/118004213/s200_john.eastman.jpg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee" /> <meta property="og:title" content="The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee" /> <meta property="article:author" content="https://independent.academia.edu/JohnEastman9" /> <meta name="description" content="The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee" /> <title>(PDF) The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee | John Eastman - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = '9387f500ddcbb8d05c67bef28a2fe0334f1aafb8'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732981503000); window.Aedu.timeDifference = new Date().getTime() - 1732981503000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":null,"author":[{"@context":"https://schema.org","@type":"Person","name":"John Eastman"}],"contributor":[],"dateCreated":"2023-08-12","dateModified":"2024-11-26","datePublished":"2006-01-01","headline":"The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee","inLanguage":"en","keywords":["Law","Political Science","Economic Justice","Social Science Research Network","Separation of Powers","War powers","Constitution","Fourth Amendment","House of Representatives","Statute","NSA Surveillance","constitutionality","Commander in Chief"],"locationCreated":null,"publication":"SSRN Electronic Journal","publisher":{"@context":"https://schema.org","@type":"Organization","name":"Elsevier BV"},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":null}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "4c4da40610dfedeadcd4e2ae20b57be3297f6e9b7ea824c6ec8d9a1b720e7d31", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="QFZ01FBmaWE3Jm77HgLH6jDUwLydrySOhjzYnQQ1Y/4qMxq7k4Wocp4ek1QxS9vJVGzpKSal/WeMUmOJFNOEAw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="xXhR6FvzLF3Iw29GuhAK9NOJJi0/eWghC9Tj6NpTq8yvHT+HmBDtTmH7kumVWRbXtzEPuIRzscgBulj8yrVMMQ==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-86832e264efa375cdd3fa5979579c95643bf6a5c1b20c95ec7a98005fcb4b9a4.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 272873631; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F105529566%2FThe_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F105529566%2FThe_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":104959212,"identifier":"Attachment_104959212","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":105529566,"created_at":"2023-08-12T20:30:47.149-07:00","from_world_paper_id":238683523,"updated_at":"2024-11-26T05:16:22.491-08:00","_data":{"publisher":"Elsevier BV","grobid_abstract":"I appreciate your committee's interest in my views as a constitutional law scholar regarding the legality of the President's authority to conduct surveillance of communications between suspected al Qaeda operatives/supporters abroad and individuals, including citizens, residing in the United States. I specialize in the principles of the American founding and how those principles were given effect through the structural provisions of the Constitution. The current controversy over the President's surveillance program, like the controversies over the Boland Amendment in the 1980s, the War Powers Act in the 1970s, and countless other statutory efforts by Congress to limit the President's executive powers, force us to give serious consideration to the Founder's constitutional design. In particular, I think it is important to assess the strength of the competing arguments that have been brought to the Committee's attention by the Congressional Research Service (\"C RS\") 1 and the Department of Justice (\"DOJ\") 2 with respect to whether the President's actions \"violated\" the Foreign Intelligence Surveillance Act (\"FISA\") 3 and, if so, whether the FISA, so interpreted, would be an unconstitutional intrusion upon powers tha t the Constitution confers directly upon the President.","publication_date":"2006,,","publication_name":"SSRN Electronic Journal","grobid_abstract_attachment_id":"104959212"},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee","broadcastable":false,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [272873631]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "control"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":104959212,"attachmentType":"pdf"}"><img alt="First page of “The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/104959212/mini_magick20230813-1-ol13n2.png?1691897548" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="272873631" href="https://independent.academia.edu/JohnEastman9"><img alt="Profile image of John Eastman" class="ds-work-card--author-avatar" src="https://0.academia-photos.com/272873631/128610049/118004213/s65_john.eastman.jpg" />John Eastman</a></div><div class="ds-work-card--detail"><p class="ds-work-card--detail ds2-5-body-sm">2006, SSRN Electronic Journal</p><div class="ds-work-card--work-metadata"><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">visibility</span><p class="ds2-5-body-sm" id="work-metadata-view-count">…</p></div><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">description</span><p class="ds2-5-body-sm">7 pages</p></div><div class="ds-work-card--work-metadata__stat"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">link</span><p class="ds2-5-body-sm">1 file</p></div></div><script>(async () => { const workId = 105529566; const worksViewsPath = "/v0/works/views?subdomain_param=api&work_ids%5B%5D=105529566"; const getWorkViews = async (workId) => { const response = await fetch(worksViewsPath); if (!response.ok) { throw new Error('Failed to load work views'); } const data = await response.json(); return data.views[workId]; }; // Get the view count for the work - we send this immediately rather than waiting for // the DOM to load, so it can be available as soon as possible (but without holding up // the backend or other resource requests, because it's a bit expensive and not critical). const viewCount = await getWorkViews(workId); const updateViewCount = (viewCount) => { const viewCountNumber = Number(viewCount); if (!viewCountNumber) { throw new Error('Failed to parse view count'); } const commaizedViewCount = viewCountNumber.toLocaleString(); const viewCountBody = document.getElementById('work-metadata-view-count'); if (viewCountBody) { viewCountBody.textContent = `${commaizedViewCount} views`; } else { throw new Error('Failed to find work views element'); } }; // If the DOM is still loading, wait for it to be ready before updating the view count. if (document.readyState === "loading") { document.addEventListener('DOMContentLoaded', () => { updateViewCount(viewCount); }); // Otherwise, just update it immediately. } else { updateViewCount(viewCount); } })();</script></div><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":104959212,"attachmentType":"pdf","workUrl":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":104959212,"attachmentType":"pdf","workUrl":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="104959212" data-landing_url="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="85271818" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security">FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="117112944" href="https://lltlab.academia.edu/ScottGlick">Scott Glick</a></div><p class="ds-related-work--abstract ds2-5-body-sm">In 2006, Congress enacted two potentially significant restrictions on the government’s ability to collect foreign intelligence information pursuant to FISA. Against the backdrop of a Foreign Intelligence Surveillance Court of Review (Court of Review) decision that arguably reached an erroneous conclusion about the meaning and scope of FISA’s significant purpose requirement, Congress let stand two restrictions that the Court of Review had placed on the government’s use of FISA. First, the Court of Review held that if the government’s primary purpose was to prosecute, then the government could use FISA only if it intended to prosecute an alleged terrorist or spy for what the court called a “foreign intelligence crime.” The Court of Review also held that the government could not use FISA, even when it intended to prosecute for a foreign intelligence crime, if that crime occurred in the “past.” This Article examines the Court of Review’s decision and argues that the court reached an err...</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security","attachmentId":90020905,"attachmentType":"pdf","work_url":"https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="5186718" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE">FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">I/S: A Journal of Law and Policy for the Information Society, 2014</p><p class="ds-related-work--abstract ds2-5-body-sm">This paper introduces a symposium, published in Volume 10, Issue 2 of I/S: A Journal of Law and Policy for the Information Society, entitled, "NSA Surveillance: Security, Privacy, and Civil Liberty," which is available at http://moritzlaw.osu.edu/students/groups/is/volume-102/. The paper traces the history of electronic surveillance law by way of explaining how our laws have evolved to a stage where lawyers could plausibly defend the government’s entitlement to capture and store an immense volume of our telephone and online communications, as well as metadata about both. It goes on to introduce the other papers in the symposium and concludes by arguing the importance of executive branch acquiescence in such statutory limits as Congress may impose on national security surveillance as it affects Americans. Keywords: NSA, FBI, surveillance, warrantless surveillance, foreign intelligence, fourth amendment</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE","attachmentId":53999206,"attachmentType":"pdf","work_url":"https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="9780772" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance">The NSA and the Legal Regime for Foreign Intelligence Surveillance</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--abstract ds2-5-body-sm">This paper both introduces the first major academic symposium on the NSA surveillance programs disclosed by Edward Snowden and lays out the evolution of constitutional and statutory law that positioned the NSA to argue that its programs are lawful.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA and the Legal Regime for Foreign Intelligence Surveillance","attachmentId":35957382,"attachmentType":"pdf","work_url":"https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="54065705" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications">The Patriot Act's Impact on the Government's Ability to Conduct Electronic Surveillance of Ongoing Domestic Communications</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="179853204" href="https://independent.academia.edu/NathanHenderson16">Nathan Henderson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Duke Law Journal, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Patriot Act's Impact on the Government's Ability to Conduct Electronic Surveillance of Ongoing Domestic Communications","attachmentId":70609757,"attachmentType":"pdf","work_url":"https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="111447577" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/111447577/Are_We_Targeting_Our_Fellow_Countrymen_The_Consequences_of_the_USA_PATRIOT_Act">Are We Targeting Our Fellow Countrymen? The Consequences of the USA PATRIOT Act</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="11801847" href="https://washington.academia.edu/BRubio">Brett Rubio</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of educational controversy, 2008</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Are We Targeting Our Fellow Countrymen? The Consequences of the USA PATRIOT Act","attachmentId":108985261,"attachmentType":"pdf","work_url":"https://www.academia.edu/111447577/Are_We_Targeting_Our_Fellow_Countrymen_The_Consequences_of_the_USA_PATRIOT_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/111447577/Are_We_Targeting_Our_Fellow_Countrymen_The_Consequences_of_the_USA_PATRIOT_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="5672425" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight">The Constitution & National Security: Covert Action In The Age of Intelligence Oversight</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="7761400" href="https://american.academia.edu/DFagelson">David Fagelson</a></div><p class="ds-related-work--metadata ds2-5-body-xs"> Journal of Law And Politics, 1989</p><p class="ds-related-work--abstract ds2-5-body-sm">The various initiatives undertaken by the Reagan Administration in what has come to be known as the Iran-Contra affair have reignited an old struggle for control over foreign policy.' While the circumstances of this particular controversy are somewhat unusual, the strife between Congress and the Executive has endured, within certain boundaries, since the inception of the Republic. The contours of this debate are well known to anyone with a passing knowledge of the Constitution. Indeed, their familiarity risks obscuring the important principles which are at stake. Yet the sight of a rear admiral and a lieutenant colonel claiming exemption from the law and from political accountability in pursuit of national security goals" helped focus attention on the fundamental constitutional values implicit in the recent political furor. These values are nothing less than the political accountability of the military and the intelligence services, democratic control of foreign policy, and the rule of law. The assertion by President Reagan and his associates of remarkable executive prerogatives in the area of national security requires us to reconsider who, under the Constitution, is entitled to participate in the creation and implementation of foreign policy and how the distribution of this power between the branches of government preserves the delicate balance between secrecy and democracy.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitution \u0026 National Security: Covert Action In The Age of Intelligence Oversight","attachmentId":95327667,"attachmentType":"pdf","work_url":"https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5672425/The_Constitution_and_National_Security_Covert_Action_In_The_Age_of_Intelligence_Oversight"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="30310257" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act">Privacy and Civil Liberties Oversight Board Public Hearing on Section 702 of the FISA Amendments Act</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="57768957" href="https://independent.academia.edu/%D0%90%D1%81%D1%81%D0%BE%D1%86%D0%B8%D0%B0%D1%86%D0%B8%D1%8F%D0%9F%D0%BE%D0%B1%D0%B5%D0%B4%D0%B8%D1%82%D0%B5%D0%BB%D0%B5%D0%B9%D0%9E%D0%BB%D0%B8%D0%BC%D0%BF%D0%B8%D0%B0%D0%B4">Ассоциация Победителей Олимпиад</a></div><p class="ds-related-work--abstract ds2-5-body-sm">Submission of Amnesty International USA and the American Civil Liberties Union Amnesty International USA and the American Civil Liberties Union (ACLU) thank the Privacy and Civil Liberties Oversight Board (PCLOB) for the opportunity to submit this statement for the record regarding the application of international human rights law to US surveillance practices. In this submission, we briefly set out reasons the PCLOB should assess US surveillance practices in an international human rights law framework; summarize key characteristics of Section 702 of the FISA Amendments Act; describe international human rights law on the right to privacy; identify human rights concerns with the collection, storage and use of communications under Section 702; and explain that US human rights obligations are legally binding and applicable to US surveillance practices. We conclude by urging the PCLOB to recommend the repeal of Section 702 as well as other measures to substantially reform US surveillance practices.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Privacy and Civil Liberties Oversight Board Public Hearing on Section 702 of the FISA Amendments Act","attachmentId":50766967,"attachmentType":"pdf","work_url":"https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/30310257/Privacy_and_Civil_Liberties_Oversight_Board_Public_Hearing_on_Section_702_of_the_FISA_Amendments_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="33488958" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act">Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="28426640" href="https://fletc.academia.edu/PatWalsh">Pat Walsh</a></div><p class="ds-related-work--abstract ds2-5-body-sm">In the last several years, the United States has begun to scrutinize the expansive surveillance powers that were enacted after September 11, 2001. Intelligence surveillance programs previously considered lawful and reliable ways to gather information are being rescinded by Congress, declared unlawful by the courts and restricted by the executive branch. In an era of increasing scrutiny on the intelligence community, national security professionals must look beyond the statutory authorization for intelligence gathering, and evaluate each intelligence program to determine if it will endure past current efforts to restrict government surveillance powers. This article will develop a framework to analyze our current intelligence gathering programs and determine which programs are at risk of removal by future executive, legislative or judicial action. By examining the historical struggle between the intelligence community’s need for broad powers to protect the nation from foreign enemies and our nation’s strong commitment to protecting the civil liberties of citizens from government intrusion, a national security lawyer can determine how our nation has expanded, modified, restricted, and rescinded other intelligence gathering programs to meet the nation’s national security goals. Comparing the history and development with a modern look at how the public and the government have responded to current surveillance powers will illustrate the factors that create an increased risk for an intelligence program to be weakened or eliminated by judicial, legislative, or executive action. Using this framework, a cautious national security professional can carefully decide which of the currently available intelligence collection options are likely to both meet the current collection requirements and also endure the current increased scrutiny on surveillance. The Foreign Intelligence Surveillance Act (“FISA”) will change again, and national security professionals must be prepared for these changes.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act","attachmentId":53529412,"attachmentType":"pdf","work_url":"https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="93246888" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment">Encyclopedia of the Fourth Amendment</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="187461382" href="https://independent.academia.edu/JohnVile">John Vile</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2013</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Encyclopedia of the Fourth Amendment","attachmentId":96036851,"attachmentType":"pdf","work_url":"https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/93246888/Encyclopedia_of_the_Fourth_Amendment"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="99809899" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque">The NSA’s mass surveillance program: illegal and opaque</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="230812549" href="https://independent.academia.edu/ToniLocy">Toni Locy</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><p class="ds-related-work--abstract ds2-5-body-sm">On May 7th a panel of judges of the U.S. Court of Appeals for the Second Circuit ruled that the National Security Agency’s bulk collection of telephone metadata violated the law. Toni Locy writes that the decision is significant in that it would not have occurred but for Edward Snowden’s revelations over this mass surveillance, and that it refutes the government’s arguments that the mass collection of phone records is instrumental to its anti-terrorism efforts.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA’s mass surveillance program: illegal and opaque","attachmentId":100799515,"attachmentType":"pdf","work_url":"https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":104959212,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":104959212,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_104959212" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="44696448" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US">Striking a Balance Between National Security & the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="80673372" href="https://ubc.academia.edu/JackMagnus">Jack P . D . Magnus</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2020</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Striking a Balance Between National Security \u0026 the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US","attachmentId":65411464,"attachmentType":"pdf","work_url":"https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="29025183" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA">Getting from “May We?” to “Should We?” at the NSA</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Jotwell the Journal of Things We Like, 2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Getting from “May We?” to “Should We?” at the NSA","attachmentId":57814016,"attachmentType":"pdf","work_url":"https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="74895868" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/74895868/Executive_Power_the_War_on_Terrorism_and_the_Idea_of_Rights_Executive_Power_Terrorism_and_Rights">Executive Power, the War on Terrorism, and the Idea of Rights: Executive Power, Terrorism, and Rights</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="170703026" href="https://independent.academia.edu/ArnoldClay">Clay Arnold</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Politics &amp Policy</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Executive Power, the War on Terrorism, and the Idea of Rights: Executive Power, Terrorism, and Rights","attachmentId":82884541,"attachmentType":"pdf","work_url":"https://www.academia.edu/74895868/Executive_Power_the_War_on_Terrorism_and_the_Idea_of_Rights_Executive_Power_Terrorism_and_Rights","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/74895868/Executive_Power_the_War_on_Terrorism_and_the_Idea_of_Rights_Executive_Power_Terrorism_and_Rights"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="64149492" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/64149492/States_Rights_and_the_Scope_of_the_Treaty_Power_Could_the_Patriot_Act_be_Constitutional_as_a_Treaty">States’ Rights and the Scope of the Treaty Power: Could the Patriot Act be Constitutional as a Treaty?</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3203915" href="https://independent.academia.edu/SimchaHerzog">Simcha Herzog</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2005</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"States’ Rights and the Scope of the Treaty Power: Could the Patriot Act be Constitutional as a Treaty?","attachmentId":76315951,"attachmentType":"pdf","work_url":"https://www.academia.edu/64149492/States_Rights_and_the_Scope_of_the_Treaty_Power_Could_the_Patriot_Act_be_Constitutional_as_a_Treaty","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/64149492/States_Rights_and_the_Scope_of_the_Treaty_Power_Could_the_Patriot_Act_be_Constitutional_as_a_Treaty"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="71758483" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court">National Security and the Supreme Court</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="133736973" href="https://independent.academia.edu/AndrewGNordin">Andrew Nordin</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security and the Supreme Court","attachmentId":80969373,"attachmentType":"pdf","work_url":"https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/71758483/National_Security_and_the_Supreme_Court"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="76750118" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act">[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3808603" href="https://chicago.academia.edu/TomGinsburg">Tom Ginsburg</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act","attachmentId":84892923,"attachmentType":"pdf","work_url":"https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="101123266" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/101123266/Presidential_Authority_to_Gather_Foreign_Intelligence">Presidential Authority to Gather Foreign Intelligence</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="267411737" href="https://independent.academia.edu/FeinBruce">Bruce Fein</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Presidential Studies Quarterly, 2007</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Presidential Authority to Gather Foreign Intelligence","attachmentId":101750339,"attachmentType":"pdf","work_url":"https://www.academia.edu/101123266/Presidential_Authority_to_Gather_Foreign_Intelligence","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/101123266/Presidential_Authority_to_Gather_Foreign_Intelligence"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="105307664" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105307664/Providing_Material_Support_to_Violate_the_Constitution_The_USA_Patriot_Act_and_Its_Assault_on_the_4th_Amendment">Providing Material Support to Violate the Constitution: The USA Patriot Act and Its Assault on the 4th Amendment</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="663625" href="https://osu.academia.edu/ChristopherMetzler">Christopher Metzler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">NC Cent. LJ, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Providing Material Support to Violate the Constitution: The USA Patriot Act and Its Assault on the 4th Amendment","attachmentId":104796417,"attachmentType":"pdf","work_url":"https://www.academia.edu/105307664/Providing_Material_Support_to_Violate_the_Constitution_The_USA_Patriot_Act_and_Its_Assault_on_the_4th_Amendment","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/105307664/Providing_Material_Support_to_Violate_the_Constitution_The_USA_Patriot_Act_and_Its_Assault_on_the_4th_Amendment"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="27605436" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/27605436/Clapper_v_Amnesty_International_USA_Allowing_the_FISA_Amendments_Act_of_2008_to_Turn_Incidentally_into_Certainly">Clapper v. Amnesty International USA: Allowing the FISA Amendments Act of 2008 to Turn "Incidentally" into "Certainly</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2613707" href="https://umaryland.academia.edu/LizRinehart">Liz Rinehart</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Maryland Law Review, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Clapper v. Amnesty International USA: Allowing the FISA Amendments Act of 2008 to Turn \"Incidentally\" into \"Certainly","attachmentId":47869911,"attachmentType":"pdf","work_url":"https://www.academia.edu/27605436/Clapper_v_Amnesty_International_USA_Allowing_the_FISA_Amendments_Act_of_2008_to_Turn_Incidentally_into_Certainly","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/27605436/Clapper_v_Amnesty_International_USA_Allowing_the_FISA_Amendments_Act_of_2008_to_Turn_Incidentally_into_Certainly"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="25092332" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/25092332/The_Failure_of_the_USA_PATRIOT_Act">The Failure of the USA PATRIOT Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="28629127" href="https://berkeley.academia.edu/KamranAli">Kamran Ali</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Failure of the USA PATRIOT Act","attachmentId":45414465,"attachmentType":"pdf","work_url":"https://www.academia.edu/25092332/The_Failure_of_the_USA_PATRIOT_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/25092332/The_Failure_of_the_USA_PATRIOT_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="47475996" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/47475996/SECTION_213_and_215_OF_THE_U_S_PATRIOT_ACT_VIOLATION_OR_NOT_OF_ONE_S_FOURTH_AMENDMENT_RIGHTS">SECTION 213 & 215 OF THE U.S. PATRIOT ACT – VIOLATION OR NOT OF ONE’S FOURTH AMENDMENT RIGHTS</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="38384844" href="https://jwu.academia.edu/RachelMLaisne">Rachel M. Laisne</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SECTION 213 & 215 OF THE U.S. PATRIOT ACT – VIOLATION OR NOT OF ONE’S FOURTH AMENDMENT RIGHTS, 2016</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"SECTION 213 \u0026 215 OF THE U.S. PATRIOT ACT – VIOLATION OR NOT OF ONE’S FOURTH AMENDMENT RIGHTS","attachmentId":66549204,"attachmentType":"pdf","work_url":"https://www.academia.edu/47475996/SECTION_213_and_215_OF_THE_U_S_PATRIOT_ACT_VIOLATION_OR_NOT_OF_ONE_S_FOURTH_AMENDMENT_RIGHTS","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/47475996/SECTION_213_and_215_OF_THE_U_S_PATRIOT_ACT_VIOLATION_OR_NOT_OF_ONE_S_FOURTH_AMENDMENT_RIGHTS"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="45524790" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45524790/FISA_Surveillance_and_Aliens">FISA Surveillance and Aliens</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="79848336" href="https://independent.academia.edu/AmitChhabra9">Amit K Chhabra</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FISA Surveillance and Aliens","attachmentId":66010747,"attachmentType":"pdf","work_url":"https://www.academia.edu/45524790/FISA_Surveillance_and_Aliens","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/45524790/FISA_Surveillance_and_Aliens"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="105192933" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics">The Foreign Intelligence Surveillance Act of 1978: The Role of Symbolic Politics</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="224077630" href="https://independent.academia.edu/StolzB">Barbara Stolz</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Law &lt;html_ent glyph="@amp;" ascii="&amp;amp;"/&gt; Policy, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Foreign Intelligence Surveillance Act of 1978: The Role of Symbolic Politics","attachmentId":104713922,"attachmentType":"pdf","work_url":"https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="167151" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/167151/The_Controversy_over_the_USA_Patriot_Act">The Controversy over the USA Patriot Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="20482" href="https://paridescartes.academia.edu/JacobMaillet">Jacob Maillet</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Controversy over the USA Patriot Act","attachmentId":90600,"attachmentType":"doc","work_url":"https://www.academia.edu/167151/The_Controversy_over_the_USA_Patriot_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/167151/The_Controversy_over_the_USA_Patriot_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="65227641" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments">Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="44091790" href="https://usfca.academia.edu/DoloresDonovan">Dolores Donovan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2008</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments","attachmentId":76920840,"attachmentType":"pdf","work_url":"https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="33177142" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN">Husain, Waris SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST TERRORISM IN THE UNITED STATES AND PAKISTAN</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="16679989" href="https://howard.academia.edu/WarisHusain">Waris Husain</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Husain, Waris SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST TERRORISM IN THE UNITED STATES AND PAKISTAN","attachmentId":53261566,"attachmentType":"pdf","work_url":"https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="1071328" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties">Domestic intelligence and civil liberties</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="918442" href="https://coloradotech.academia.edu/JamesBurch">James Burch</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SAIS Review, 2004</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Domestic intelligence and civil liberties","attachmentId":6555735,"attachmentType":"pdf","work_url":"https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="71468907" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/71468907/Access_to_Justice_for_Communications_Surveillance_and_Interception_Scrutinising_Intelligence_Gathering_Reform_Legislation">Access to Justice for Communications Surveillance and Interception: Scrutinising Intelligence-Gathering Reform Legislation</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="17406781" href="https://hogeschool.academia.edu/QuirineEijkman">Quirine Eijkman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Utrecht Law Review</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Access to Justice for Communications Surveillance and Interception: Scrutinising Intelligence-Gathering Reform Legislation","attachmentId":80797608,"attachmentType":"pdf","work_url":"https://www.academia.edu/71468907/Access_to_Justice_for_Communications_Surveillance_and_Interception_Scrutinising_Intelligence_Gathering_Reform_Legislation","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/71468907/Access_to_Justice_for_Communications_Surveillance_and_Interception_Scrutinising_Intelligence_Gathering_Reform_Legislation"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="57918623" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_">National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions …</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="87727788" href="https://independent.academia.edu/UrsulaGorhamOscilowski">Ursula Gorham-Oscilowski</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Government Information Quarterly</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions …","attachmentId":72582021,"attachmentType":"pdf","work_url":"https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/57918623/National_Security_Letters_the_USA_PATRIOT_Act_and_the_Constitution_The_tensions_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="28479263" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/28479263/Congress_Civil_Liberties_and_the_War_on_Terrorism">Congress, Civil Liberties, and the War on Terrorism</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="53267969" href="https://independent.academia.edu/NealDevins">Neal Devins</a></div><p class="ds-related-work--metadata ds2-5-body-xs">William Mary Bill of Rights Journal, 2003</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Congress, Civil Liberties, and the War on Terrorism","attachmentId":48828042,"attachmentType":"pdf","work_url":"https://www.academia.edu/28479263/Congress_Civil_Liberties_and_the_War_on_Terrorism","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/28479263/Congress_Civil_Liberties_and_the_War_on_Terrorism"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="35424350" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe">Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="72670049" href="https://independent.academia.edu/YaqianHu">Yaqian Hu</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe","attachmentId":55285304,"attachmentType":"pdf","work_url":"https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="33488962" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33488962/LOSING_TOOLS_IN_THE_INTELLIGENCE_TOOLBOX_HOW_CHANGES_TO_FISA_WILL_IMPACT_NATIONAL_SECURITY_PROSECUTIONS">LOSING TOOLS IN THE INTELLIGENCE TOOLBOX: HOW CHANGES TO FISA WILL IMPACT NATIONAL SECURITY PROSECUTIONS</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="28426640" href="https://fletc.academia.edu/PatWalsh">Pat Walsh</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"LOSING TOOLS IN THE INTELLIGENCE TOOLBOX: HOW CHANGES TO FISA WILL IMPACT NATIONAL SECURITY PROSECUTIONS","attachmentId":53529413,"attachmentType":"pdf","work_url":"https://www.academia.edu/33488962/LOSING_TOOLS_IN_THE_INTELLIGENCE_TOOLBOX_HOW_CHANGES_TO_FISA_WILL_IMPACT_NATIONAL_SECURITY_PROSECUTIONS","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33488962/LOSING_TOOLS_IN_THE_INTELLIGENCE_TOOLBOX_HOW_CHANGES_TO_FISA_WILL_IMPACT_NATIONAL_SECURITY_PROSECUTIONS"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="45139500" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States">How Republicans and Democrats Strengthen Secret Surveillance in the United States</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="63975951" href="https://uj-pl.academia.edu/Pawe%C5%82Laidler">Paweł Laidler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">"Political Preferences", 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"How Republicans and Democrats Strengthen Secret Surveillance in the United States","attachmentId":65711107,"attachmentType":"pdf","work_url":"https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related topics</h2><div class="ds-research-interests--pills-container"><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="534" href="https://www.academia.edu/Documents/in/Law">Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="5793" href="https://www.academia.edu/Documents/in/Economic_Justice">Economic Justice</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="69856" href="https://www.academia.edu/Documents/in/Social_Science_Research_Network">Social Science Research Network</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="89758" href="https://www.academia.edu/Documents/in/Separation_of_Powers">Separation of Powers</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="100695" href="https://www.academia.edu/Documents/in/War_powers">War powers</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="141992" href="https://www.academia.edu/Documents/in/Constitution">Constitution</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="170911" href="https://www.academia.edu/Documents/in/Fourth_Amendment">Fourth Amendment</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="959417" href="https://www.academia.edu/Documents/in/House_of_Representatives">House of Representatives</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="999732" href="https://www.academia.edu/Documents/in/Statute">Statute</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="1123450" href="https://www.academia.edu/Documents/in/NSA_Surveillance">NSA Surveillance</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="2598708" href="https://www.academia.edu/Documents/in/constitutionality">constitutionality</a></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>