Académique Documents
Professionnel Documents
Culture Documents
Document #1507448
Filed: 08/13/2014
Page 1 of 86
LARRY E. KLAYMAN
Attorney at Law
D.C. Bar No. 334581
2020 Pennsylvania Ave. NW, Suite 345
Washington, DC 20006
Phone: (310) 595-0800
Email: leklayman@gmail.com
Document #1507448
Filed: 08/13/2014
Page 2 of 86
CERTIFICATE AS TO PARTIES,
RULINGS, AND RELATED CASES
A.
Parties
ii
Document #1507448
Filed: 08/13/2014
Page 3 of 86
Related Cases
Two related cases to Klayman I and Klayman II, both of which are
pending in the District Court challenging unlawful government
surveillance, include Klayman v. Obama, Civ. No. 14-0092 (Klayman
III) and Paul v. Obama, Civ. No. 14-262 (D.D.C. Feb. 18, 2014). Other
related cases include the United States Supreme Courts (Supreme
Court) recent decision in Riley v. California, 134 S.Ct. 2473 (2014), and
ACLU v. Clapper, 959 F. Supp. 2d 724 (2014), a case filed in the
iii
Document #1507448
Filed: 08/13/2014
Page 4 of 86
Southern District of New York and later appealed in the United States
Court of Appeals for the Second Circuit (Second Circuit) (No. 14-42 in
this Court), against the Government Defendants for their unlawful use
of government surveillance.
/s/ Larry E. Klayman
LARRY E. KLAYMAN, ESQ.
iv
Document #1507448
Filed: 08/13/2014
Page 5 of 86
TABLE OF CONTENTS
PAGE
TABLE OF AUTHORITIES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
JURISDICTIONAL STATEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
ISSUES PRESENTED FOR REVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . 8
STATEMENT OF THE CASE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
SUMMARY OF THE ARGUMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
STANDARD OF REVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
ARGUMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
I.
2.
B.
C.
II.
III.
Document #1507448
Filed: 08/13/2014
Page 6 of 86
2.
B.
C.
D.
CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
vi
Document #1507448
Filed: 08/13/2014
Page 7 of 86
TABLE OF AUTHORITIES
Cases
* ACLU v. Ashcroft,
322 F.3d 240 (3d Cir. 2003) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Amidax Trading Grp. v. S.W.I.F.T. SCRL,
671 F.3d 140 (2d Cir. 2011) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Am. Freedom Def. Initiative v. Wash. Metro. Area Transit Auth.,
898 F.Supp.2d 73 (D.D.C. 2012) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Bd. of Educ. v. Earls,
536 U.S. 822 (2002) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47,51
Brown v. Chote,
411 U.S. 452 (1973) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Camara v. Mun. Court,
387 U.S. 523 (1967) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Cassidy v. Chertoff,
471 F.3d 67 (2d Cir. 2006) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Cf. Kyllo v. United States,
533 U.S. 27 (2001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Chandler v. Miller,
520 U.S. 305 (1997) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45, 46, 51
Chimel v. California,
695 U.S. 752 (1969) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
City of Mesquite v. Aladdins Castle, Inc.,
455 U.S. 283 (1982) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
*Authorities upon which we chiefly rely are marked with asterisks.
vii
Document #1507448
Filed: 08/13/2014
Page 8 of 86
viii
Document #1507448
Filed: 08/13/2014
Page 9 of 86
Melendres v. Arpaio,
695 F.3d 990 (9th Cir. 2012) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Memphis Planned Parenthood, Inc. v. Sundquist,
175 F.3d 456 (6th Cir. 1999) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Monsanto Co. v. Geertson Seed Farms,
561 U.S. 139 (2010) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
NAACP v. Alabama ex rel. Patterson,
357 U.S. 449 (1958) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
NAACP. v. Button,
371 U.S. 415 (1963) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Natl Assn of Letter Carriers, AFLCIO v. U.S. Postal Serv.,
604 F. Supp. 2d 665 (S.D.N.Y. 2009) . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Nat'l Fed'n of Fed. Emps.IAM v. Vilsack,
681 F.3d 483 (D.C. Cir. 2012) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45, 52
Nat'l Treasury Emps. Union v. Von Raab,
489 U.S. 656 (1989) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46, 47, 51
*Riley v. California,
134 S.Ct. 2473 (2014) . . . . . . 1, 2, 3, 17, 18, 19, 34, 35, 36, 37, 38, 49, 50
Samson v. California,
547 U.S. 843 (2006) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Smith v. Maryland,
442 U.S. 735 (1979) . . . . . . . . . . 2, 3, 18, 34, 36, 37, 38, 39, 40, 41, 42, 45
Sherley v. Sebelius,
644 F.3d 388 (D.C. Cir. 2011) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Shelton v. Tucker,
364 U.S. 479 (1960) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70, 71
ix
Document #1507448
Filed: 08/13/2014
Page 10 of 86
Document #1507448
Filed: 08/13/2014
Page 11 of 86
GLOSSARY
FISA refers to the Foreign Intelligence Surveillance Act of 1978
FISC refers to the United States Foreign Intelligence Surveillance
Court
Section 215 refers to Section 215 of the Patriot Act, Public Law 107
56Oct. 26, 2001
xi
Document #1507448
Filed: 08/13/2014
Page 12 of 86
Document #1507448
Filed: 08/13/2014
Page 13 of 86
preliminary injunction that simply requires the NSA to obey the law.
Plaintiffs ultimately want to preserve the status quo, which will not
harm anyone.
In Riley v. California, 134 S.Ct. 2473 (2014), a recent landmark
Supreme Court decision that invalidates the Supreme Courts previous
ruling in Smith v. Maryland, 442 U.S. 735 (1979) in the context of this
case, Chief Justice John Roberts spoke, and acknowledged the
importance and advancement of todays phone technologies and
metadata. 134 S.Ct. at 2489. This is not a pen register, this is metadata;
it is every aspect of our lives. This Court must follow Riley as it is the
new law of the land.
Chief Justice John Roberts held that police generally must obtain
a warrant before searching a cell phone seized incident to an arrest due
to the amount of personal and sensitive information that can now be
found on any persons cellphone. See id. at 2489-93. The Supreme Court
found that [M]odern cell phones are not another technological
convenience. With all they contain and all they may reveal, they hold
for many Americans the privacies of life[.] Id. at 2496.
Document #1507448
Filed: 08/13/2014
Page 14 of 86
The Supreme Court in Smith could not have predicted the extent
that cellular technology would advance, nor could it have predicted the
extent that data would be searched, the Supreme Court found that
todays technology was nearly inconceivable just a few decades ago.
Riley, 134 S.Ct. at 2484. The Supreme Courts ruling in Riley clearly
lays the foundation for what is to come in the present casethat is, that
past Supreme Court rulings, around the time of Smith, analyzing
unlawful police and government searches, do not apply to the
unconceivable circumstances of today.
The District Court has been thoroughly familiar with this case
and its current procedural posture, and has appreciated both the
importance of the constitutional questions presented and the national
security interests at stake. See Klayman v. Obama, 957 F. Supp. 2d 1
(D.D.C. 2013).1 As the District Court previously ruled, the
constitutional issues raised in this case are at the pinnacle of public
national interest. The District Court found that the Government
The Government Defendants inadvertently failed to include the
the District Courts memorandum opinion, dated December 16, 2014, in
the original appendix. Plaintiffs will be moving on August 14, 2014 to
supplement the appendix, presumably with the Government
Defendants consent.
1
Document #1507448
Filed: 08/13/2014
Page 15 of 86
Document #1507448
Filed: 08/13/2014
Page 16 of 86
Document #1507448
Filed: 08/13/2014
Page 17 of 86
Document #1507448
Filed: 08/13/2014
Page 18 of 86
Document #1507448
Filed: 08/13/2014
Page 19 of 86
Document #1507448
Filed: 08/13/2014
Page 20 of 86
Document #1507448
Filed: 08/13/2014
Page 21 of 86
10
Document #1507448
Filed: 08/13/2014
Page 22 of 86
11
Document #1507448
Filed: 08/13/2014
Page 23 of 86
12
Document #1507448
Filed: 08/13/2014
Page 24 of 86
surveillance] under [50 U.S.C. ] 1861[, conducted for more than seven
years, that] collect[s], compiles, retains, and analyzes certain telephony
records, which it characterizes as business records created by certain
telecommunications companies. SA 15-16. The illegal government
surveillance is meant to detect: (1) domestic U.S. phone numbers
calling outside of the United States to foreign phone numbers
associated with terrorist groups; (2) foreign phone numbers associated
with terrorist groups calling into the U.S. to U.S. phone numbers; and
(3) possible terrorist related communications between numbers inside
the U.S. SA 20-21.
The records collected under the illegal government surveillance
consist of metadata, which includes information about what phone
numbers were used to make and receive calls, when the calls took place,
and how long the calls lasted. App. 203. Through targeted searches of
metadata records, the NSA tries to discern connections between
terrorist organizations and previously unknown terrorist operatives
located in the United States. SA 16. The telephone metadata records,
which [telecommunications] companies create and maintain as part of
their business of providing telecommunications services to customers[,]
13
Document #1507448
Filed: 08/13/2014
Page 25 of 86
have been continually produced since May 2006 under the FBIs
production orders from the FISC. See SA 16. The NSA then consolidates
the metadata records provided by different telecommunications
companies into one database and under the FISCs orders, the NSA may
retain the records for up to five entire years. SA 16. When an NSA
intelligence analyst runs a query, the quantity of phone numbers
captured is very large, potentially and sometimes up to 1,000,000
numbers total. SA 18-19.
Since the illegal government surveillance began in May 2006, the
FISC has regularly issued orders directing telecommunication service
providers to produce records in connection with the illegal government
surveillance. SA 21. Fifteen different FISC judges have issued thirtyfive orders authorizing the illegal government surveillance and under
those orders, the Government defendants must continuously seek
renewal of the authority to collect telephony records, which occurs every
ninety days. SA 21. The Government Defendants admit that they have
failed to comply with the minimization procedures set forth in the
orders. SA 21. Judge Reggie Walton of the FISC concluded he had no
confidence that the Government was doing its utmost to comply with
14
Document #1507448
Filed: 08/13/2014
Page 26 of 86
the courts orders. SA 21-22. Judge John Bates, Presiding Judge of the
FISC, found that the Government had misrepresented the scope of its
targeting of certain internet communications pursuant to 50 U.S.C.
1881a. SA 22. The Governments revelations regarding NSAs
acquisition of Internet transactions mark the third instance in less than
three years in which he Government disclosed a substantial
misrepresentation regarding the scope of a major illegal government
surveillance collection. SA 23.
After the public revelations of the Government Defendants secret
schemes in the media, Plaintiffs filed their first complaint, Klayman I,
on June 6, 2013. See SA 8. Klayman I Plaintiffs Larry Klayman,
Charles Strange, and Mary Ann Strange, all subscribers of Verizon
Wireless, brought suit against the NSA, the DOJ, multiple executive
officials, whom include President Barack H. Obama, Attorney General
Eric H. Holder, Jr., General Keith B. Alexander, Director of the NSA,
and U.S. District Judge Roger Vinson, and Verizon Communications as
well as its chief executive officer. See App. 33-59; SA 8. On June 9, 2013,
Plaintiffs filed an amended complaint in Klayman I. See App. 36-59. As
relief, Plaintiffs sought a preliminary injunction that, during the
15
Document #1507448
Filed: 08/13/2014
Page 27 of 86
16
Document #1507448
Filed: 08/13/2014
Page 28 of 86
17
Document #1507448
Filed: 08/13/2014
Page 29 of 86
that the Supreme Courts decision would have an impact on the ability
of law enforcement to combat crime, that cell phones are essentially
minicomputers that also happen to have the capacity to be used as a
telephone, and that [p]rivacy comes at a cost. Riley, 134 S.Ct. at
2493. The Supreme Court also found that modern cell phones . . . are
now such a pervasive and insistent part of daily life that the proverbial
visitor from Mars might conclude they were an important feature of
human anatomy. Id. at 2484. The Supreme Court held that a search of
digital information on a cell phone does not further [ ] government
interests . . . and implicates substantially greater individual privacy
interests than a brief physical search. Id. at 2478. Due to the highly
sensitive data located in our cell phones, the Supreme Court further
ruled that a warrant is generally required before [ ] a search, even
when a cell phone is seized incident to arrest. Id. at 2493. Because
[d]igital data stored on a cell phone cannot itself be used as a weapon
and can endanger no one, the Government Defendants do not have a
compelling reason to search citizens telephony and internet metadata
at their discretion. See id. at 2485.
18
Document #1507448
Filed: 08/13/2014
Page 30 of 86
19
Document #1507448
Filed: 08/13/2014
Page 31 of 86
20
Document #1507448
Filed: 08/13/2014
Page 32 of 86
ARGUMENT
I.
21
Document #1507448
Filed: 08/13/2014
Page 33 of 86
Document #1507448
Filed: 08/13/2014
Page 34 of 86
23
Document #1507448
Filed: 08/13/2014
Page 35 of 86
24
Document #1507448
Filed: 08/13/2014
Page 36 of 86
despite being duly served in Klayman I and Klayman II. If this Court
were to accept the Government Defendants arguments alleging
Plaintiffs supposed lack of standing, which the District Court has
previously denied,5 then any person who seek[s] to challenge the
surveillance [illegal government surveillance] will be caught in a nearly
impossible conundrum . . . . See Leighton Woodhouse, Is The
Government Lying About How Much Of Your Metadata Its Using?,
Huffington Post (Aug. 15, 2013), available at
http://www.huffingtonpost.com/2013/08/15/governmentmetadata_n_3762050.html.
Plaintiffs would need to show that their metadata was swept up
in an NSA query, a task that requires access to state secrets. Unless the
government were to take the unlikely step of granting the opposing
counsel the necessary security clearances to acquire this evidence, the
standard for achieving standing would be virtually impossible to meet.6
See SA 36.
6 Even this scenario, however, puts control of the process largely
in the [G]overnment's hands, as federal prosecutors [or the Government
Defendants] are able to decide whether to press charges and whether to
use the NSA-derived evidence, weighing the benefits of doing so against
the risk of inviting a challenge to the [illegal government] surveillance [
]. Woodhouse, Huffington Post, supra. If federal prosecutors [or the
5
25
Document #1507448
Filed: 08/13/2014
Page 37 of 86
Id. The Government Defendants ultimately hold the cards and they
refuse to reveal their hand in fear that Plaintiffs and the District
Courts conclusions are accurate.
Even if, for instance, there was no concrete proof that Plaintiffs
exact metadata had been searched at a given time, Plaintiffs have no
need to speculate, and have not speculated, that their metadata has
been collected because Plaintiffs have other sufficient evidence, as
determined by the District Court, for them to be certain their data has
been collected for the last seven years based off of the Government
Defendants querying procedures. As stated by the District Court,
additional support includes the revelation that the Government
Defendants have declassified and authenticated a FISC Order signed by
Judge Vinson confirming that the NSA has indeed collected telephony
metadata from Verizon. Even more compelling, the District Court found
that the Government Defendants themselves described the advantages
Document #1507448
Filed: 08/13/2014
Page 38 of 86
27
Document #1507448
Filed: 08/13/2014
Page 39 of 86
NSA may not have collected records from Verizon Wireless (or perhaps
any other non-VBNS entity, such as AT&T and Sprint) [and] [that] the
Government [Defendants] [made] this argument at the same time [they
are] describing in [their] pleadings an [illegal government surveillance
of] bulk metadata . . . that can function only because it creates an
historical repository that permits retrospective analysis of terroristrelated communications across multiple telecommunications networks,
and that can be immediately accessed as new terrorist-associated
telephone identifiers come to light. SA 27. Accordingly, the District
Court ruled the NSA must have collected metadata from Verizon
Wireless.
Plaintiffs themselves have already shown that they have standing
to challenge the illegal government surveillance because Plaintiffs are
subscribers of Verizon Wireless cellular telephone services, and their
metadata must have been collected as a part of the Government
Defendants illegal and unconstitutional surveillance.
In addition to the District Court, other courts have found standing
in favor of plaintiffs who challenged the Governments illegal
government surveillance. For instance, the issue of standing involving
28
Document #1507448
Filed: 08/13/2014
Page 40 of 86
29
2.
Document #1507448
Filed: 08/13/2014
Page 41 of 86
30
Document #1507448
Filed: 08/13/2014
Page 42 of 86
31
Document #1507448
Filed: 08/13/2014
Page 43 of 86
has collected . . . simply wrong, [it is] radically so. In reaching this
determination, the ACLU argued that that [i]f the collection of
information could not give rise to a case or controversy, the Constitution
would permit the government to copy every email, record every phone
call, and make a permanent record of every persons physical
movementsall without ever having to justify its actions to any court
[and] [t]he Constitution would be engaged, if at all, only when the
government decided to review the data it had collected. In other
circumstances, responsiveness was not relevant in determining whether
case or controversy exists. For example, as the ACLU provided, [a]
person whose luggage is inspected has been searched even if the
inspection turns up no contraband. A person whose home is subjected to
thermal-imaging has been searched even if the scan does not show that
the person is growing marijuana. Cf. Kyllo v. United States, 533 U.S.
27 (2001). Whether a search has occurredand, certainly, whether an
Article III injury has been inflicteddoes not turn on whether the
search produces information that the government regards as useful or
incriminating. ACLU Appellate Brief at p.4 n.2.
32
Document #1507448
Filed: 08/13/2014
Page 44 of 86
33
Document #1507448
Filed: 08/13/2014
Page 45 of 86
Document #1507448
Filed: 08/13/2014
Page 46 of 86
35
Document #1507448
Filed: 08/13/2014
Page 47 of 86
such a pervasive and insistent part of daily life that the proverbial
visitor from Mars might conclude they were an important feature of
human anatomy. Id. at 2484.
The Supreme Courts modern up-to-date view of todays cellular
phones has surely impacted the extent that the Government
Defendants can lawfully intrude upon citizens rights. In fact, Riley in
the context of this case, eliminates Smith. This is not a pen register,
this is metadata; it is every aspect of our lives.
In further discussing the relevance of cellular data when it is
unlawfully searched by the Government, the Supreme Court held that
a search of digital information on a cell phone does not further [ ]
government interests . . . and implicates substantially greater
individual privacy interests than a brief physical search. Id. at 2478.
Due to the highly sensitive data located in our cell phones, the Supreme
Court made it clear that a warrant is generally required before a
search, even when a cell phone is seized incident to arrest.7 Id. at 2495.
Because [d]igital data stored on a cell phone cannot itself be used as a
36
Document #1507448
Filed: 08/13/2014
Page 48 of 86
37
Document #1507448
Filed: 08/13/2014
Page 49 of 86
when Chimel9 and Robinson10 were decided [in 1969 and 1973,
respectively]). Justice Samuel Alito, who concurred in part and
dissented in part, agree[d] that we should not mechanically apply the
rule used in the predigital era to the search of a cell phone. Riley, 134
S.Ct. at 2496. The Supreme Courts ruling in Riley clearly lays the
foundation for what is to come in the present casethat is, that past
Supreme Court rulings, around the time of Smith, analyzing unlawful
police and government searches, do not apply to the unconceivable
circumstances of today.
Although [t]he analysis of this threshold issue of the expectation
of privacy must start with the Supreme Court's [ ] opinion in Smith . . .
, the District Court properly determined that Smith is not necessarily
applicable as the Supreme Court justices in 1979 could not have
Document #1507448
Filed: 08/13/2014
Page 50 of 86
39
Document #1507448
Filed: 08/13/2014
Page 51 of 86
40
Document #1507448
Filed: 08/13/2014
Page 52 of 86
41
Document #1507448
Filed: 08/13/2014
Page 53 of 86
telecom companies.15 In Smith, the Supreme Court considered a onetime, targeted request for data regarding an individual suspect in a
criminal investigation, whereas the Court here must consider the NSAs
daily, all-encompassing, indiscriminate dump of phone metadata that
the NSA now receives as part of its [illegal government surveillance of]
[b]ulk [t]elephony [m]etadata [ ]. SA 48.
The District Court further explained why Smith does not apply in
the present case by pointing out that not only is the Government's
ability to collect, store, and analyze phone data greater now than it was
in 1979, but the nature and quantity of the information contained in
people's telephony metadata is much greater, as well. SA 50. Cell
phones did not exist in 1979; today, they are used for many purposes
other than calling, and thus people now have an entirely different
42
Document #1507448
Filed: 08/13/2014
Page 54 of 86
relationship with phones than they did in 1979.16 See Klayman, 957 F.
Supp. 2d at 36. Metadata today, the District Court stated, reflects a
wealth of detail about . . . familial, political, professional, religious, and
sexual associations, and reveal[s] an entire mosaica vibrant and
constantly updating picture of the persons life. Id. The District Court
correctly pointed out that cell phones today are used as far more than
just calling devices; they are also used, for example, as maps and music
players, or as a lighter[] that people hold up at rock concerts. Id. at
34.
In sum, [the District Court ruled that] the Smith pen register and
the ongoing NSA [illegal government surveillance of] [b]ulk [t]elephony
[m]etadata [ ] have so many significant distinctions between them that
[the District Court] cannot possibly navigate these uncharted Fourth
Amendment waters using as my North Star a case that predates the
rise of cell phones. SA 55. Trends have resulted in a greater expectation
According to the 1979 U.S. Census, in that year, 71,958,000
homes had telephones available, while 6,614,000 did not. U.S. Dep't Of
Commerce & U.S. Dep't Of Hous. & Urban Dev., Annual Housing
Survey: 1979, at 4 (1981). In December 2012, there were a whopping
326,475,248 mobile subscriber connections in the United States, of
which approximately 304 million were for phones. CTIAThe Wireless
Ass'n (CTIA), Wireless Industry Survey ResultsDecember 1985 to
December 2012, at 2, 6 (2013) (CTIA Survey Results ).
16
43
Document #1507448
Filed: 08/13/2014
Page 55 of 86
44
Document #1507448
Filed: 08/13/2014
Page 56 of 86
45
Document #1507448
Filed: 08/13/2014
Page 57 of 86
46
Document #1507448
Filed: 08/13/2014
Page 58 of 86
must consider include: (1) the nature of the privacy interest allegedly
compromised by the search, (2) the character of the intrusion
imposed by the government, and (3) the nature and immediacy of the
government's concerns and the efficacy of the [search] in meeting them.
Bd. of Educ. v. Earls, 536 U.S. 822, 83034 (2002). Whether the illegal
government surveillance violates the Fourth Amendment will therefore
turn on the nature and immediacy of the government's concerns and
the efficacy of the [search] in meeting them. Earls, 536 U.S. at 834.
The District Court explained that special needs cases form
something of a patchwork quilt.18 SA 58. To [the District Courts]
knowledge, however, no court has ever recognized a special need
sufficient to justify continuous, daily searches of virtually every
American citizen without any particularized suspicion.
47
Document #1507448
Filed: 08/13/2014
Page 59 of 86
48
Document #1507448
Filed: 08/13/2014
Page 60 of 86
49
Document #1507448
Filed: 08/13/2014
Page 61 of 86
50
Document #1507448
Filed: 08/13/2014
Page 62 of 86
51
Document #1507448
Filed: 08/13/2014
Page 63 of 86
52
Document #1507448
Filed: 08/13/2014
Page 64 of 86
53
Document #1507448
Filed: 08/13/2014
Page 65 of 86
54
Document #1507448
Filed: 08/13/2014
Page 66 of 86
Document #1507448
Filed: 08/13/2014
Page 67 of 86
56
Document #1507448
Filed: 08/13/2014
Page 68 of 86
evidence, and then they seek to dismiss Plaintiffs claims for lack of
standing so that they can avoid discovery, which would ultimately
confirm further the Government Defendants unlawful secret schemes
to the public. Under this subterfuge plan, the Government Defendants
intend for no party to successfully challenge the Governments
violations of the U.S. Constitution.
As Plaintiffs have previously pointed out, the Government
Defendants acknowledge, as they must, that they have failed to comply
with the minimization procedures set forth in certain orders. SA 21. For
instance, in 2009, the Government Defendants reported to the FISC
that the NSA had improperly used an alert list of identifiers to search
the bulk telephony metadata, which was composed of identifiers that
had not been approved under the RAS standard. SA 21. Judge Reggie
Walton of the FISC, who reviewed the Government Defendants reports
on their noncompliance, concluded that the NSA had engaged in
systematic noncompliance with FISC-ordered minimization
procedures over the proceeding years, since the inception of the Bulk
Telephony Metadata illegal government surveillance, and had also
repeatedly made misrepresentations and inaccurate statements about
57
Document #1507448
Filed: 08/13/2014
Page 69 of 86
58
Document #1507448
Filed: 08/13/2014
Page 70 of 86
59
Document #1507448
Filed: 08/13/2014
Page 71 of 86
60
Document #1507448
Filed: 08/13/2014
Page 72 of 86
Document #1507448
Filed: 08/13/2014
Page 73 of 86
62
Document #1507448
Filed: 08/13/2014
Page 74 of 86
63
Document #1507448
Filed: 08/13/2014
Page 75 of 86
64
Document #1507448
Filed: 08/13/2014
Page 76 of 86
Document #1507448
Filed: 08/13/2014
Page 77 of 86
66
Document #1507448
Filed: 08/13/2014
Page 78 of 86
revelations shows that the Government Defendants are still using both
telephony and internet metadata of Plaintiffs and hundred of millions of
American citizens.
For the aforementioned reasons, the District erred in denying
preliminary injunctive relief to Plaintiffs in Klayman II.
III.
Document #1507448
Filed: 08/13/2014
Page 79 of 86
68
Document #1507448
Filed: 08/13/2014
Page 80 of 86
69
Document #1507448
Filed: 08/13/2014
Page 81 of 86
70
Document #1507448
Filed: 08/13/2014
Page 82 of 86
71
Document #1507448
Filed: 08/13/2014
Page 83 of 86
72
Document #1507448
Filed: 08/13/2014
Page 84 of 86
Respectfully submitted,
/s/ Larry Klayman
LARRY KLAYMAN, ESQ.
Attorney at Law
D.C. Bar No. 334581
2020 Pennsylvania Ave. NW, Suite 345
Washington, DC 20006
Tel: (310) 595-0800
Email: leklayman@gmail.com
73
Document #1507448
Filed: 08/13/2014
Page 85 of 86
74
Document #1507448
Filed: 08/13/2014
Page 86 of 86
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that on this 13th day of August, 2014, I filed
a true and correct copy of foregoing brief with the Clerk of the United
States Court of Appeals for the District of Columbia Circuit. All
participants in the case are registered CM/ECF users and will be served
by the appellate CM/ECF system. I further certify that I will cause
eight (8) paper copies of this brief to be filed with the Court.
Respectfully submitted,
/s/ Larry Klayman
LARRY KLAYMAN, ESQ.
Attorney at Law
D.C. Bar No. 334581
2020 Pennsylvania Ave. NW, Suite 345
Washington, DC 20006
Tel: (310) 595-0800
Email: leklayman@gmail.com
75