United States v. Muhtorov (Amicus Brief)
United States v. Muhtorov (Amicus Brief)
United States v. Muhtorov (Amicus Brief)
18-1366
Plaintiff-Appellee,
v.
JAMSHID MUHTOROV
Defendant-Appellant.
________________________________________________________________
On Appeal from the United States District Court for the District of Colorado
The Honorable John L. Kane
District Court Criminal Action No. 1:12-CR-00033-JLK-1
________________________________________________________________
________________________________________________________________
Procedure, amicus curiae states that it does not have a parent corporation and that
ii
TABLE OF CONTENTS
ARGUMENT .............................................................................................................4
CONCLUSION ........................................................................................................24
iii
TABLE OF AUTHORITIES
Cases
[REDACTED],
2011 WL 10945618 (FISA Ct. Oct. 3, 2011) (unpublished) .................................7
[REDACTED],
No. [REDACTED] (FISA Ct. Apr. 26, 2017) (unpublished),
http://bit.ly/d56exnj ..............................................................................................12
Mincey v. Arizona,
437 U.S. 385 (1978) .............................................................................................10
Riley v. California,
573 U.S. 373 (2014) .............................................................................................10
Thompson v. Louisiana,
469 U.S. 17 (1984) ...............................................................................................10
iv
United States v. Al-Jayab,
No. 16-CR-00181 (N.D. Ill. June 28, 2018),
https://bit.ly/35f9pKT ......................................................................... 9, 12, 16, 23
Statutes
50 U.S.C. § 1801(a)&(b)............................................................................................4
Omnibus Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351,
§§ 801–802, 82 Stat. 197 .....................................................................................15
Protect America Act of 2007, Pub. L. No. 110-55, 121 Stat. 552 .............................7
vi
Other Authorities
Bob Sorokanich, Report: The NSA Is Recording Nearly Every Call Made in
Afghanistan, Gizmodo (May 23, 2014, 10:06 AM) ...............................................7
Elizabeth Goitein & Faiza Patel, What Went Wrong with the FISA Court,
Brennan Ctr. for Justice (2015) ..............................................................................5
Linda Blake & Jim Lande, Trends in the U.S. International Telecommunications
Industry, Indus. Analysis Div., Fed. Commc’ns. Comm’n (1998) ........................5
Ryan Devereaux et al., Data Pirates of the Caribbean: The NSA Is Recording
Every Cell Phone Call in the Bahamas, Intercept (May 19, 2014, 12:37 PM) .....6
vii
Stacey Ashton & Linda Blake, 2014 International Telecommunications Traffic
and Revenue Data, Telecommc’ns and Analysis Div., Fed. Commc’ns.
Comm’n (2016) ......................................................................................................6
viii
STATEMENT OF INTEREST1
Amicus curiae the Brennan Center for Justice at NYU School of Law2 is a
democracy and justice. The Center’s Liberty and National Security (LNS) Program
advance effective national security policies that respect the rule of law and
constitutional values. One of the LNS Program’s main areas of research and
advocacy is foreign intelligence surveillance and the effect of changes in the law
1
Pursuant to Federal Rule of Appellate Procedure Rule 29(a)(2), amicus
represents that all parties have consented to the filing of this brief. Pursuant to
Federal Rule of Appellate Procedure Rule 29(a)(4)(E), amicus curiae certifies that
no person or entity, other than amicus, its members, or its counsel, made a monetary
contribution to the preparation or submission of this brief or authored this brief in
whole or in part.
2
Amicus curiae does not purport to represent the position of the NYU School
of Law.
1
SUMMARY OF ARGUMENT
Intelligence Surveillance Act (FISA) raises novel Fourth Amendment issues that
could have a dramatic effect on the scope of Americans’ privacy. Outside of the
has begun to take hold. Unless corrected, this misreading threatens to create a
is “incidental.” The FISC, and a handful of courts following its lead, have accepted
this argument.
3
The arguments in this brief are taken in significant part from a law review article
published by counsel for amicus curiae: Elizabeth Goitein, Another Bite Out of Katz:
Foreign Intelligence Surveillance and the Incidental Overhear Doctrine, 55 Am.
Crim. L. Rev. 105 (2017).
2
In fact, however, the Supreme Court has made clear that the government
may not infringe on Americans’ privacy rights unless it has a warrant or the
surveillance. The Supreme Court, in those cases, held that warrants need not name
lower courts further held that the accidental interception of a small number of
conversations that fall outside the scope of the warrant does not render the
warrant was obtained. If they are wrongly treated as an exception to the warrant
international communications.
3
ARGUMENT
novelty of the legal framework this Court is asked to review and the broad
the collection of Americans’ communications with foreign targets for the purpose
of obtaining foreign intelligence. The primary legal constraint was the Foreign
Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified in scattered
sections of 8, 18, 47, 50 of the United States Code). Under this law, if the
from inside the United States, it had to show probable cause to the FISC that the
1805(a)(2)(A). While FISA defines these terms broadly, see id. § 1801(a)&(b),
they still encompass only a small fraction of foreigners overseas (and an even
4
The substantive and procedural limits set forth in FISA did not apply when
See id. § 1801(f). Overseas surveillance that does not target Americans is generally
not subject to judicial review and is governed almost entirely by Executive Order
12333, which prohibits intentional targeting of U.S. persons but otherwise imposes
few restrictions on collection. See Exec. Order No. 12,333, 3 C.F.R. § 200 (1981),
waning years of the 20th century, the limits of technology served as a practical
barrier to mass surveillance. See Elizabeth Goitein & Faiza Patel, What Went
Wrong with the FISA Court, Brennan Ctr. for Justice, 19–21 (2015). International
communication was difficult and expensive, see, e.g., Jean-Yves Huwart & Loïc
Verdier, Economic Globalisation: Origins and Consequences, Org. for Econ. Co-
operation and Dev., 35–36 (2013) (noting that “[i]n 1930, a three-minute telephone
call between New York and London cost USD 250”) and, therefore, relatively rare.
See Linda Blake & Jim Lande, Trends in the U.S. International
5
analytical capabilities rendered mass or indiscriminate surveillance unworkable,
telephone calls by Americans in 2014—an average of nearly four and a half hours
per person, not including minutes spent on Internet-based video and voice
communications systems like Skype. See Stacey Ashton & Linda Blake, 2014
Analysis Div., Fed. Commc’ns. Comm’n, 1 (2016). The number of emails sent
daily is projected to exceed 300 billion in 2020. See Email Statistics Report, 2019-
2023, Radicati Grp., 3 tbl. 2 (2019). Moreover, the limits on the government’s
become negligible. Under one program code-named “MYSTIC,” for instance, the
NSA reportedly collects all of the phone calls that transit into and out of certain
countries and stores them for a 30-day period to permit querying. See Ryan
Devereaux et al., Data Pirates of the Caribbean: The NSA Is Recording Every Cell
Phone Call in the Bahamas, Intercept (May 19, 2014, 12:37 PM); see also Bob
6
Sorokanich, Report: The NSA Is Recording Nearly Every Call Made in
weakened the legal protections afforded by FISA. Under Section 702 of FISA,
created by the FISA Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat.
replaced the similar Protect America Act of 2007, Pub. L. No. 110-55, 121 Stat.
The government may target any foreigner overseas and obtain all of that person’s
unknown, but a 2011 FISC opinion noted that the government was obtaining 250
3, 2011) (unpublished), and as Appellant points out in his opening brief, that
7
number is likely several times higher today. See Appellant’s Opening Br. at 21.
relatively unregulated.
courts are just beginning to grapple with: what protections does the Fourth
Only a handful of federal courts (and only one Circuit Court) have addressed
this question. To date, most have adopted the government’s so-called “incidental
of longstanding Fourth Amendment doctrine into the law, with the result that a
The gist of the argument is that the Fourth Amendment does not protect
Under the FISA Amendments Act and Mot. for Disc. 36–38, May 9, 2014, United
States v. Muhtorov, 187 F. Supp. 3d 1240 (D. Colo. 2018) (No. 12-CR-00033-JLK)
F.3d 1004, 1015 (FISA Ct. Rev. 2008). In recent decisions, other courts followed
the FISC’s lead. See United States v. Mohamud, No. 3:10–CR–00475–KI–1, 2014
WL 2866749 (D. Or. June 24, 2014) (unpublished) (“[Because the] § 702
with the extraterritorial target would be lawful.”); see also United States v.
Mohamud, 843 F.3d 420, 439-41 (9th Cir. 2016); United States v. Al-Jayab, No.
Understanding where these courts went wrong requires going back to certain
9
search or seizure of those communications implicates the Fourth Amendment and
must be “reasonable.” Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J.,
one of “a few specifically established and well delineated exceptions.” Katz, 389
U.S. at 357; see also Riley v. California, 573 U.S. 373, 382 (2014) (“In the absence
the exceptions to the warrant requirement the Fourth Amendment requires the
U.S. 385, 390 (1978) (affirming as a “cardinal principle” that warrantless searches
are per se unreasonable). These exceptions are “jealously and carefully drawn,”
Jones v. United States, 357 U.S. 493, 499 (1958), with the Court having recognized
4
Some commentators consider certain exceptions to be variations of others, so the
exact count and description of the exceptions varies depending on the source. There
is general agreement, however, that there are exceptions to the warrant requirement
for exigent circumstances (e.g., “hot pursuit”); “Terry stops”; searches pursuant to
arrest and inventory searches; “plain view”; consent; “special needs” (including
administrative searches); motor vehicle searches; and border searches. See generally
Warrantless Searches and Seizures, 45 Geo. L.J. Ann. Rev. Crim. Proc. 49 (2016).
10
The district court below failed at this basic step in the analysis. The court
Muhtorov, 187 F. Supp. 3d 1240, 1253 (D. Colo. 2015) (“I find the special
warrantless search was reasonable, the court’s analysis contravened the bedrock
exception.
If one returns to that principle, the first question to ask is whether the
Notably, not one of the recent Section 702 decisions held that an American’s
from Americans).
Memorandum at 59-60. The courts, however, have not accepted this extreme
Internet is “at least somewhat diminished.” Muhtorov, 187 F. Supp. 3d at 1255; see
United States, the Supreme Court held that a warrant is required to obtain an
individual’s cell site location information (CSLI) from a wireless carrier. See
12
Carpenter v. United States, 138 S. Ct. 2206 (2018). The Court noted that such
information can provide “an intimate window into a person’s life, revealing not
only his particular movements, but his familial, political, professional, religious,
and sexual associations.” Carpenter, 138 S. Ct. at 2217 (internal quotation marks
and citation omitted). Under these circumstances, “the fact that the information is
held by a third party does not by itself overcome the user’s claim to Fourth
Amendment protection.” Id. at 2231. The Court contrasted CSLI with the
telephone numbers and bank records that were the subject of the cases establishing
the third-party doctrine, noting that the latter were “not confidential
The logic of the Court’s opinion would be easily transferrable to e-mails. Indeed,
even before Carpenter, courts already had begun to recognize that a warrant is
required to obtain the content of e-mails, despite the fact that they are shared
United States v. Warshak, 631 F.3d 266, 282–88 (6th Cir. 2010); In re
Applications for Search Warrants for Info. Associated with Target Email Address,
Sep. 21, 2012) (unpublished); United States v. Ali, 870 F. Supp. 2d 10, 39 n.39
(D.D.C. 2012).
13
privacy in sent communications was not the basis for the district court’s holding
that no warrant is required for Section 702 surveillance. The court made this
finding—as did the other courts that have addressed this question—in the context
would justify dispensing with a warrant only if they established an exception to the
warrant requirement. This follows from the basic rule, articulated above, that
exception applies.
5
Moreover, even if courts were to maintain the fiction that any reasonable
expectation of privacy in communications terminates once they have been received,
“upstream collection” under FISA Section 702 enables collection of Americans’
communications while still winging their way overseas—i.e., before receipt. See
Report on the Surveillance Program Operated Pursuant to Section 702 of the
Foreign Intelligence Surveillance Act, Privacy & Civil Liberties Oversight Bd., 7
(2014).
14
United States v. Kahn and United States v. Donovan are the foundational
cases in which the Supreme Court articulated the “incidental overhear” principle
(although neither case used this term). These cases came about in the context of
domestic criminal prosecutions that took place shortly after Congress enacted Title
III of the Omnibus Crime Control and Safe Streets Act of 1968 (Title III) to codify
the Supreme Court’s seminal ruling in Katz, 389 U.S. at 347. See Omnibus Crime
Control and Safe Streets Act of 1968, Pub. L. No. 90-351, §§ 801–802, 82 Stat.
Kaplan et al., The History and Law of Wiretapping, Am. Bar Ass’n, 4 (Apr. 20,
constitutionally sound wiretapping law and thereafter passed the Omnibus Crime
Control Act of 1968.”). In simplified terms, Title III required the government to
U.S.C. § 2516.
In both Kahn and Donovan, the government obtained Title III orders to
conduct wiretaps. See United States v. Donovan, 429 U.S. 413, 418–20 (1977);
United States v. Kahn, 415 U.S. 143, 144–45 (1974). The defendants argued that
the orders were invalid because they did not name every person whose
communications would be collected. See Donovan, 429 U.S. at 421; Kahn, 415
U.S. at 150. As discussed further below, the Court held that the warrant was
15
sufficiently “particularized” for Fourth Amendment purposes as long as it
identified the phone line to be tapped and the conversations to be acquired, and the
requirement should immediately be suspect because the decisions did not use the
word “exception,” let alone discuss the fact that one was being created. It is
difficult to imagine that the Supreme Court would have added to the handful of
even saying so. And indeed, there was no need to find an exception, because the
Nonetheless, courts in recent Section 702 cases, following the FISC’s lead,
with the targeted persons is also lawful.” Hasbajrami, 2016 WL 1029500 at *9; see
*9); Al-Jayab, No. 16-CR-00181 at 44 (same). It follows from this principle that
16
there is an exception to the warrant requirement for those in contact with people—
without a warrant.6
United States v. Kahn, the government secured a Title III order to wiretap two
phones belonging to Irving Kahn. The judge found probable cause to believe that
Kahn and “others as yet unknown” were conducting an illegal gambling business,
revealed that she was involved in the business as well—information that the
government had not previously known. See Kahn, 415 U.S. at 145-47, 152.
Both Kahn and his wife were charged, and they moved to suppress the
phone conversations. See id. at 148. Title III requires the government to specify
“the identity of the person, if known, committing the offense and whose
added). On its face, as the Court held, this provision does not require the
6
Whether courts have properly interpreted Supreme Court precedent to hold that
foreigners overseas have no claim to Fourth Amendment protection is debatable, but
beyond the scope of this brief. See Goitein & Patel, supra, at 12 n.52 (summarizing
the bases for the multiple opinions in United States v. Verdugo-Urquidez, 494 U.S.
259 (1990)).
17
not yet know the identity of all the probable perpetrators, it is entitled to include
“others as yet unknown” in its application. Kahn, 415 U.S. at 151–53. The lower
court, however, “seemed to believe that taking the statute at face value would
result in a wiretap order amounting to a ‘virtual general warrant,’ since the law
The Court rejected that reasoning. It cited precedent holding that “[t]he
and the persons or things to be seized, not the persons from whom the things will
be seized.” Id. at 155 n.15 (internal quotation marks and citations omitted). In the
case of a wiretap, the particularity requirement is met by identifying the phone line
suspected gambling operation). See id. at 154–55, 154 n.13, 157. With these
requirements met, the Court observed, the Kahns’ fear that law enforcement
officers could acquire the communications of “anyone who talked on the named
[N]either the statute nor the wiretap order in this case would allow the
federal agents such total unfettered discretion. By its own terms, the
wiretap order in this case conferred authority to intercept only
communications “concerning the above-described [gambling]
offenses.” Moreover, in accord with the statute the order required the
agents to execute the warrant in such a manner as to minimize the
interception of any innocent conversations . . . . Thus, the failure of
18
the order to specify that Mrs. Kahn’s conversations might be the
subject of interception hardly left the executing agents free to seize at
will every communication that came over the wire . . . .
The central holding of Kahn, in short, was twofold: (1) Title III does not
require that a wiretap order name every person whose conversations will be the
seized.
requirements. It held that, while the statute does not require the government to
identify as-yet unknown targets, it does require the government to identify every
known target—i.e., every person for whom there is probable cause to suspect
criminal activity at the time the application is made. See Donovan, 429 U.S. at
19
Id. at 427 n.15 (citation omitted).
In neither of these cases did the Court hold or suggest that no warrant was
for the person with whom the defendants were communicating. To the contrary,
the Court observed that the warrant the government had obtained expressly
line on which they occurred and the matters being discussed. The Court then
information (although in one of the cases, the Court held that the failure to state the
The principle that those in contact with a surveillance target are not entitled to any
legal process beyond what the target must receive cannot logically be derived from
Kahn or Donovan.
Courts interpreting Section 702 have also relied on lower court decisions
that interpreted and applied Kahn and Donovan. See Hasbajrami, 2016 WL
Foreign Intelligence Surveillance Act, 551 F.3d at 1015. For the most part,
20
however, these cases do not offer any greater support for the “warrant exception”
approach. For instance, in United States v. Schwartz, the defendant complained that
the government obtained conversations not covered by the warrant. See United
States v. Schwartz, 535 F.2d 160, 164 (2d Cir. 1976). The Second Circuit saw “no
error in [the district judge’s] conclusion that the extent of non-pertinent matters
matter from intercepted conversations.” Id. In other words, a warrant must specify
of “innocent conversations” does not invalidate the surveillance. This is a far cry
from holding that the government may freely acquire, without a warrant, the
conversations took place over the phone lines designated in the warrant and the
Figueroa, 757 F.2d 466, 470–71 (2d Cir. 1985); United States v. Martin, 599 F.2d
880, 883–86 (9th Cir. 1979). Accordingly, they were encompassed by the warrants
the government had obtained, and there was no need for the courts to address
7
One of the cases cited by the Hasbajrami court involved warrantless surveillance
and does contain some language (albeit in dicta) that would support the interpretation
of the courts interpreting Section 702. In United States v. Bin Laden, the district
21
instead addressed whether probable cause must be established for every participant
in the covered conversations, and whether post-Kahn case law had diluted the
unconstitutionality.8
court cited United States v. Verdugo-Urquidez for the proposition that foreigners
overseas have no Fourth Amendment rights. United States v. Bin Laden, 126 F.
Supp. 2d 264, 270, 281 (S.D.N.Y. 2000) (citing Verdugo-Urquidez, 494 U.S. at 265,
271). It then cited Kahn and its progeny for the proposition that “in the Title III
context, incidental interception of a person’s conversations during an otherwise
lawful surveillance is not violative of the Fourth Amendment.” Bin Laden, 126 F.
Supp. 2d at 280 (citations omitted). It observed that, if the warrantless surveillance
of the defendant had indeed been incidental, “the combination of Verdugo-Urquidez
and the incidental interception cases outlined above would permit the surveillance.”
Id. at 281. In reaching this conclusion, however, the district court engaged in the
same fundamental misreading of the incidental overhear cases as the courts
reviewing Section 702. The fact that a warrant remains valid despite the inability to
exclude every “innocent conversation” has no bearing on whether a warrant is
necessary to obtain an American’s conversations with a foreign target.
8
In Martin, the court held that the government need not show probable cause as to
every person named as a “probable converser” in the warrant, reasoning that because
“[t]here is no constitutional requirement that the persons whose conversations may
be intercepted be named in the application,” it followed that “the Fourth Amendment
does not require that the reasons for naming all probable conversers be shown in the
application.” Martin, 599 F.2d at 889. In Figueroa, the court addressed whether
post-Kahn case law had diluted minimization requirements to the point that Title III
was unconstitutional on its face; it held that Title III remained constitutional. See
Figueroa, 757 F.2d at 471–73. It also reached essentially the same conclusion as the
court in Martin: “[T]he government need not establish probable cause as to all
participants in a conversation. If probable cause has been shown as to one such
participant, the statements of the other participants may be intercepted if pertinent
to the investigation.” Id. at 475 (citation omitted) (emphasis added).
22
In short, the constitutional crux of Kahn, Donovan, and their progeny is that
fall outside the warrant’s scope, the accidental interception of a small number of
such conversations does not violate the Fourth Amendment. It is not possible to
warrant requirement.
At some level, the courts reviewing Section 702 must have been
contact with a lawfully surveilled target is itself lawful. After holding that a
targets because the targets have no Fourth Amendment rights, they all went on to
23
There is no legal justification or precedent, however, for picking and
choosing among the protections that flow from the acknowledgment of a Fourth
applies. None of the “incidental overhear” cases suggested that they were carving
out an exception to the warrant requirement; rather, they delineated the extent to
CONCLUSION
privacy interests in their communications with foreign targets. Yet they have found
that the lack of Fourth Amendment protections for the targets strips Americans of
their warrant protections, as well. They have reached this conclusion by misreading
warrant requirement, when in fact, the communications at issue in those cases were
found to fall within the warrants the government had obtained. Read properly, the
24
“incidental overhear” cases have no application to the warrantless collection of
This Court’s analysis should proceed from the premise that Americans have
that interest is not extinguished or lessened simply because the foreigners’ own
privacy interest is not constitutionally cognizable. For this reason among others,9
9
A proper understanding of the “incidental overhear” cases does not end the
inquiry into whether a warrant is required to collect communications between
foreign targets and Americans under Section 702 of FISA. There is also the question
of whether a “foreign intelligence exception” applies. A full discussion of this
argument is beyond the scope of this brief; however, it is addressed briefly here
because the argument for a foreign intelligence exception that would be broad
enough to legitimize warrantless surveillance under Section 702 suffers from a
similar flaw to that in the “incidental overhear” argument.
Although the Supreme Court has never directly recognized a foreign intelligence
exception to the warrant requirement, several lower courts did so in cases that arose
before FISA went into effect. See, e.g., United States v. Truong Dinh Hung, 629 F.2d
908, 912–916 (4th Cir. 1980); United States v. Buck, 548 F.2d 871, 875–76 (9th Cir.
1977); United States v. Butenko, 494 F.2d 593, 605 (3d Cir. 1974); United States v.
Brown, 484 F.2d 418, 425–27 (5th Cir. 1973). As Appellant notes in his opening
brief, however, the courts in these cases emphasized the need for strict limitations
on the foreign intelligence exception, including a requirement that the surveillance
be directed at foreign powers or their agents. See Appellant’s Opening Br. at 35. No
such requirement exists when the government conducts surveillance under Section
702.
In its briefs below, the government argued that the limits described in the “foreign
intelligence exception” cases are inapposite because the “targets” in those cases were
inside the U.S., while the “targets” of Section 702 surveillance are foreigners
overseas. See Muhtorov Government’s Unclassified Memorandum at 50. Once
again, however, there is no basis in Fourth Amendment doctrine for the notion that
when an American’s privacy is breached, the reach of the warrant requirement—or
the breadth of any exception to it—turns on the nationality of the “target.” See Orin
Kerr, The Surprisingly Weak Reasoning of Mohamud, Lawfare, Dec. 23, 2016 (“In
25
amicus curiae urge this Court to reverse the decision below.
26
CERTIFICATE OF COMPLIANCE
29(a)(5) and Fed. R. App. P. 32(a)(7)(B) because this brief contains 6,087 words,
excluding the parts of the brief exempted by Fed. R. App. P. 32(f) and Local Rule
32.
32(a)(5) and the type style requirements of Fed. R. App. P. 32(a)(6) because this
brief has been prepared in a proportionally spaced typeface using Microsoft Word
1
CERTIFICATE OF DIGITAL SUBMISSION
3. The digital submissions have been scanned for viruses with the most recent
2
CERTIFICATE OF SERVICE
Amicus Curiae to be electronically filed via the PACER NextGen system, which will
James C. Murphy
James.Murphy3@usdoj.gov
Joseph Palmer
Joseph.Palmer@usdoj.gov
John C. Arceci
John_Arceci@fd.org
Ashley Gorski
AGorski@aclu.org
Patrick Toomey
PToomey@aclu.org