PDF Version


109th Congress                                                   Report
                        HOUSE OF REPRESENTATIVES
 2d Session                                                     109-384
_______________________________________________________________________

                                     

 
  REQUESTING THE PRESIDENT AND DIRECTING THE SECRETARY OF DEFENSE TO 
    TRANSMIT TO THE HOUSE OF REPRESENTATIVES ALL INFORMATION IN THE 
POSSESSION OF THE PRESIDENT OR THE SECRETARY OF DEFENSE RELATING TO THE 
COLLECTION OF INTELLIGENCE INFORMATION PERTAINING TO PERSONS INSIDE THE 
UNITED STATES WITHOUT OBTAINING COURT-ORDERED WARRANTS AUTHORIZING THE 
COLLECTION OF SUCH INFORMATION AND RELATING TO THE POLICY OF THE UNITED 
 STATES WITH RESPECT TO THE GATHERING OF COUNTERTERRORISM INTELLIGENCE 
                        WITHIN THE UNITED STATES

                               __________

                             ADVERSE REPORT

                                 OF THE

                      COMMITTEE ON ARMED SERVICES

                        HOUSE OF REPRESENTATIVES

                                   ON

                              H. RES. 645

                                     



                                     

   March 7, 2006.--Referred to the House Calendar and ordered to be 
                                printed.
                   HOUSE COMMITTEE ON ARMED SERVICES
                       One Hundred Ninth Congress

                  DUNCAN HUNTER, California, Chairman
CURT WELDON, Pennsylvania            IKE SKELTON, Missouri
JOEL HEFLEY, Colorado                JOHN SPRATT, South Carolina
JIM SAXTON, New Jersey               SOLOMON P. ORTIZ, Texas
JOHN M. McHUGH, New York             LANE EVANS, Illinois
TERRY EVERETT, Alabama               GENE TAYLOR, Mississippi
ROSCOE G. BARTLETT, Maryland         NEIL ABERCROMBIE, Hawaii
HOWARD P. ``BUCK'' McKEON,           MARTY MEEHAN, Massachusetts
    California                       SILVESTRE REYES, Texas
MAC THORNBERRY, Texas                VIC SNYDER, Arkansas
JOHN N. HOSTETTLER, Indiana          ADAM SMITH, Washington
WALTER B. JONES, North Carolina      LORETTA SANCHEZ, California
JIM RYUN, Kansas                     MIKE McINTYRE, North Carolina
JIM GIBBONS, Nevada                  ELLEN O. TAUSCHER, California
ROBIN HAYES, North Carolina          ROBERT A. BRADY, Pennsylvania
KEN CALVERT, California              ROBERT ANDREWS, New Jersey
ROB SIMMONS, Connecticut             SUSAN A. DAVIS, California
JO ANN DAVIS, Virginia               JAMES R. LANGEVIN, Rhode Island
W. TODD AKIN, Missouri               STEVE ISRAEL, New York
J. RANDY FORBES, Virginia            RICK LARSEN, Washington
JEFF MILLER, Florida                 JIM COOPER, Tennessee
JOE WILSON, South Carolina           JIM MARSHALL, Georgia
FRANK A. LoBIONDO, New Jersey        KENDRICK B. MEEK, Florida
JEB BRADLEY, New Hampshire           MADELEINE Z. BORDALLO, Guam
MICHAEL TURNER, Ohio                 TIM RYAN, Ohio
JOHN KLINE, Minnesota                MARK UDALL, Colorado
CANDICE S. MILLER, Michigan          G.K. BUTTERFIELD, North Carolina
MIKE ROGERS, Alabama                 CYNTHIA McKINNEY, Georgia
TRENT FRANKS, Arizona                DAN BOREN, Oklahoma
BILL SHUSTER, Pennsylvania
THELMA DRAKE, Virginia
JOE SCHWARZ, Michigan
CATHY McMORRIS, Washington
MICHAEL CONAWAY, Texas
GEOFF DAVIS, Kentucky
                   Robert L. Simmons, Staff Director


                            C O N T E N T S

                              ----------                              
                                                                   Page
Purpose and Summary..............................................     1
Background.......................................................     2
Executive Communications.........................................     5
Legislative History..............................................    56
Committee Position...............................................    57
Communication from Another Committee.............................    57
Committee Cost Estimate..........................................    57
Oversight Findings...............................................    57
Constitutional Authority Statement...............................    58
Record Vote......................................................    58


109th Congress                                                   Report
                        HOUSE OF REPRESENTATIVES
 2d Session                                                     109-384

======================================================================


  REQUESTING THE PRESIDENT AND DIRECTING THE SECRETARY OF DEFENSE TO 
    TRANSMIT TO THE HOUSE OF REPRESENTATIVES ALL INFORMATION IN THE 
POSSESSION OF THE PRESIDENT OR THE SECRETARY OF DEFENSE RELATING TO THE 
COLLECTION OF INTELLIGENCE INFORMATION PERTAINING TO PERSONS INSIDE THE 
UNITED STATES WITHOUT OBTAINING COURT-ORDERED WARRANTS AUTHORIZING THE 
COLLECTION OF SUCH INFORMATION AND RELATING TO THE POLICY OF THE UNITED 
 STATES WITH RESPECT TO THE GATHERING OF COUNTERTERRORISM INTELLIGENCE 
                        WITHIN THE UNITED STATES

                                _______
                                

   March 7, 2006.--Referred to the House Calendar and ordered to be 
                                printed

                                _______
                                

    Mr. Hunter, from the Committee on Armed Services, submitted the 
                               following

                             ADVERSE REPORT

                       [To accompany H. Res. 645]

  The Committee on Armed Services, to whom was referred the 
resolution (H. Res. 645) requesting the President and directing 
the Secretary of Defense to transmit to the House of 
Representatives all information in the possession of the 
President or the Secretary of Defense relating to the 
collection of intelligence information pertaining to persons 
inside the United States without obtaining court-ordered 
warrants authorizing the collection of such information and 
relating to the policy of the United States with respect to the 
gathering of counterterrorism intelligence within the United 
States, having considered the same, report unfavorably thereon 
without amendment and recommend that the resolution not be 
agreed to.

                          PURPOSE AND SUMMARY

    House Resolution 645, introduced on December 22, 2005, by 
Congressman Robert Wexler, requests the President and directs 
the Secretary of Defense to transmit to the House of 
Representatives not later than 14 days after the date of the 
adoption of the resolution all documents including telephone 
and electronic mail records, logs, calendars, minutes, memos, 
and records of internal discussions in their possession 
relating to two matters: (1) the legal authority upon which 
surveillance by the NSA or the DOD of persons inside the United 
States and the gathering of counterterrorism intelligence 
within the United States without obtaining court-ordered 
warrants is based; and (2) the scope of the activities 
undertaken by the DOD, the Counterintelligence Field Activity 
(CIFA), or any related agency with regards to Threat and Local 
Observation Notice (TALON) reports regarding the gathering of 
counterterrorism intelligence within the United States.
    Clause 7 of rule XIII of the Rules of the House of 
Representatives provides for a committee to report on a 
qualifying resolution of inquiry, such as H. Res. 645, within 
14 legislative days or a privileged motion to discharge the 
committee is in order. H. Res. 645 was referred to the Armed 
Services Committee on December 22, 2005.
    Under the rules and precedents of the House, a resolution 
of inquiry is one of the means by which the House may request 
information from the head of one of the executive departments. 
It is a simple resolution making a demand of the head of an 
executive department to furnish the House of Representatives 
with specific information in the possession of the executive 
branch. It is not used to request opinions or to require an 
investigation on a subject.

                               BACKGROUND

Background on request for legal authority regarding warrantless 
        intelligence by the NSA

    On December 16, 2005, the New York Times published an 
article which revealed that the President had authorized the 
NSA to collect electronic intelligence from communications 
involving at least one person within the United States without 
obtaining a warrant or court order.\1\ The next day the 
President confirmed the existence of a classified NSA terrorist 
surveillance program. The President stated that shortly after 
the September 11, 2001 attacks, he authorized the NSA 
``consistent with U.S. law and the Constitution to intercept 
the international communications of people with known links to 
al Qaeda and related terrorist organizations . . . to detect 
and prevent terrorist attacks against the United States. . . 
.'' \2\ The President emphasized that the surveillance program 
is ``crucial to our national security. . . .'' \3\ He also 
stated that the surveillance program is reviewed approximately 
every 45 days and that these reviews have included approval by 
the Attorney General and the Counsel to the President. Finally, 
the President noted that congressional leaders had been briefed 
on the surveillance activities more than a dozen times.
---------------------------------------------------------------------------
    \1\ James Risen and Eric Lichblau, ``Bush Lets U.S. Spy on Callers 
Without Courts,'' New York Times, December 16, 2005, p.A1.
    \2\ President's Radio Address, Dec. 17, 2005.
    \3\ Id.
---------------------------------------------------------------------------
    On December 19, 2005, Attorney General Alberto Gonzales and 
General Michael Hayden, Principal Deputy Director for National 
Intelligence (and former NSA Director) described unclassified 
aspects of the program at a press briefing. The Attorney 
General stated that the program involved ``intercepts of 
contents of communications where one . . . party to the 
communication is outside the United States'' and the government 
had ``a reasonable basis to conclude that one party to the 
communication is a member of al Qaeda, affiliated with al 
Qaeda, or a member of an organization affiliated with al Qaeda, 
or working in support of al Qaeda.'' \4\ General Hayden stated 
that the aim of the program is not ``to collect reams of 
intelligence, but to detect and warn and prevent [terrorist] 
attacks.'' \5\ On December 22, 2005, the Department of Justice 
Office of Legislative Affairs released a letter to the 
leadership of the congressional intelligence committees setting 
forth in greater detail the legal authority for the NSA 
activities. The letter asserted the NSA program is a lawful use 
of the President's powers as Commander in Chief and that 
Congress had supplemented the President's authority by passing 
the Authorization for Use of Military Force (AUMF), enacted on 
September 18, 2001 as a broad authorization for use of military 
force against al Qaeda.
---------------------------------------------------------------------------
    \4\ Press Release, White House, Press Briefing by Attorney General 
Alberto Gonzalez and General Michael Hayden, Principal Deputy Director 
for National Intelligence, Dec. 19, 2005.
    \5\ Id.
---------------------------------------------------------------------------
    The NSA program came under strict scrutiny after it was 
revealed.\6\ In addition, on December 30, 2005, the Justice 
Department announced it had opened a criminal investigation 
into the possible unauthorized disclosure of classified 
information regarding the NSA surveillance program.
---------------------------------------------------------------------------
    \6\ On January 5, 2006, the Congressional Research Service released 
a memorandum which questioned the President's legal authority to order 
warrantless electronic surveillance. On February 2, 2006, a group of 
fourteen law professors and former government sent a letter to 
congressional leaders concluding that the NSA program appeared on its 
face to violate existing law. In addition, at least two lawsuits have 
been filed challenging the NSA program.
---------------------------------------------------------------------------
    On January 19, 2006, Attorney General Gonzales transmitted 
a 42 page memorandum (``White Paper'') to the Chairman and 
Ranking Minority Member of the committee, detailing, in an 
unclassified form, the legal authorities supporting the NSA 
surveillance program.\7\ The White Paper again asserted that 
the NSA program is based on the President's inherent 
constitutional authority as Commander in Chief, supplemented by 
Congress in the AUMF, enacted on September 18, 2001. The White 
Paper contends that the NSA program is consistent with the 
Foreign Intelligence Surveillance Act (FISA) and is also 
consistent with privacy rights guaranteed by the Fourth 
Amendment. The DOJ White Paper also highlights the continuing 
threat posed by al Qaeda.\8\
---------------------------------------------------------------------------
    \7\ A copy of the White Paper is attached to this report as Exhibit 
1.
    \8\ The White Paper notes that al Qaeda's leadership has repeatedly 
threatened to attack the United States in the future. This threat was 
reinforced on January 19, 2006, when an audio message purportedly 
recorded by Osama bin Laden was broadcast by al Jazeera. According to 
media reports, CIA intelligence officers who analyzed the recording 
believed the voice on the audiotape is that of bin Laden. The al Qaeda 
leader allegedly said that the lack of al Qaeda attacks in the United 
States since September 11, 2001 is not related to any improved security 
measures adopted by the United States. According to a transcript of the 
audiotape, bin Laden warned of future attacks, stating ``the operations 
are under preparation and you will see them in your homes the minute 
they are through, with God's permission.''
---------------------------------------------------------------------------
    The most comprehensive description of the operational 
details of the NSA program was provided by General Hayden to 
the National Press Club on January 23, 2006. He stated that 
theprogram is narrowly targeted and focused. He indicated it does not 
intercept conversations where both parties to the conversation are 
located in the United States. One end of any call targeted under this 
program is always outside of the United States and with a party 
reasonably believed to be affiliated with al Qaeda. General Hayden 
argued that the speed of operations, the ruthlessness of the enemy, and 
the pace of modern communications have called on the NSA to do things 
in ways that have never been required before. He contended that 
although FISA includes an emergency provision allowing intercepts to 
begin without a warrant, FISA is still not adequate because even an 
emergency warrant requires pre-approval by the Attorney General.\9\ 
General Hayden stated that ``FISA's been a remarkably successful tool'' 
which the government uses aggressively, however, ``FISA does not give 
us the operational effect'' the NSA authorities provide.
---------------------------------------------------------------------------
    \9\ The emergency provision does not allow immediate surveillance. 
Pursuant to 50 U.S.C. Sec. 1805(f), an emergency order may not be 
obtained until the Attorney General reasonably determines that an 
emergency situation exists and the factual basis for issuance of an 
order under FISA exists. Thus, even though 72 hours of surveillance may 
be ordered without a court order, FISA still requires the Attorney 
General to determine in advance of the surveillance that all the 
requirements for a regular FISA application will be fully supported and 
will be approved by the court before an emergency authorization can be 
granted. This emergency review process by the Attorney General requires 
review by NSA lawyers, DOJ lawyers and finally by the Attorney General 
himself.
---------------------------------------------------------------------------
    In his State of the Union Address on January 31, 2006, 
President Bush declared, ``the enemy has not lost the desire or 
capability to attack us . . . the terrorist surveillance 
program has helped prevent terrorist attacks.''
    Attorney General Gonzales testified regarding this matter 
before the Senate Judiciary Committee on Monday, February 6, 
2006.
    Acting Assistant Attorney General for the Office of Legal 
Counsel Steven Bradbury and Assistant Attorney General for the 
Office of Legislative Affairs William Moschella briefed the 
committee on the NSA surveillance program and answered 
questions from the members of the committee on February 8, 
2006.
    The committee concluded that the DOD had substantially 
complied with the direction of H. Res. 645 to provide the House 
of Representatives with the legal authority for the NSA 
program. Therefore, the committee ordered the resolution to be 
reported adversely.

Background on request for information regarding the scope of activities 
        undertaken regarding the gathering of counterterrorism 
        intelligence within the United States

    On December 13, 2005, a report on the NBC Nightly News 
disclosed that the Department of Defense (DOD) improperly used 
a counterintelligence program designed to protect military 
facilities from terrorist attacks to collect information on 
domestic anti-war protestors. The report alleged that a DOD 
agency, the Counterintelligence Field Activity (CIFA), misused 
a reporting mechanism known as a Threat and Local Observation 
Notice (TALON) reporting system by including information 
regarding groups that did not pose a security threat to 
military facilities. On December 19, 2005, Dr. Stephen A. 
Cambone, the Under Secretary of Defense (Intelligence), wrote a 
letter to the Chairman and Ranking Member of the Committee, 
responding to the NBC report. Dr. Cambone indicated that he had 
initiated a review of the CIFA program and would review the 
TALON database to determine whether information had been 
improperly stored or used in the database. He further indicated 
that he would provide the results of that inquiry to the 
committee.
    On January 27, 2006, Robert Rogalski, Acting Deputy Under 
Secretary of Defense (Counterintelligence and Security), 
reported back to the Chairman and Ranking Minority Member of 
the Committee with additional information regarding these 
programs. Mr. Rogalski indicated that the review of the TALON 
system was ``nearly completed'' and that it had been determined 
that ``very small percentage'' of reports regarding 
demonstrations and ``anti-base'' activity not related to 
terrorist threats had been improperly included in the CIFA 
database. Mr. Rogalski acknowledged that while the purpose of 
the TALON program is ``to document suspicious incidents 
possibly linked to foreign terrorist threats to DoD 
resources,'' he added that ``some came to view the system as a 
means to report information about demonstrations and anti-base 
activity that would be of interest to field commanders from a 
force protection perspective.'' Mr. Rogalski indicated that 
CIFA has removed any TALON reports on demonstrations and anti-
base activity from the CIFA database and indicated there is an 
ongoing process to remove any other reports from the database 
that ``are no longer analytically significant.''
    Mr. Rogalski also indicated that the DOD will soon issue 
detailed guidance that will clarify the purpose of the CIFA 
database and the rules governing the collection and retention 
of the data in an effort to avoid any future improper use of 
intelligence information. He indicated the new guidance will 
include more detailed procedures to ensure compliance with the 
policy prohibiting the collection of intelligence by those 
programs that are not related to counterterrorism. He indicated 
the Dr. Cambone has directed all DOD counterintelligence and 
intelligence personnel to receive immediate refresher training 
concerning the laws and procedures governing the handling of 
information relating to U.S. persons.
    The Department of Defense provided a closed briefing to the 
committee on February 8, 2006 regarding this matter.
    The committee concluded that the DOD had substantially 
complied with the direction of H. Res. 645 to provide the scope 
of activities conducted undertaken with regard to TALON 
reports. Therefore the committee ordered the resolution to be 
reported adversely.

                        EXECUTIVE COMMUNICATIONS

                             Department of Justice,
                            Office of the Attorney General,
                                   Washington, DC, January 19, 2006
Hon. Duncan Hunter,
Chairman, Committee on Armed Services,
House of Representatives, Washington, D.C.
    Dear Mr. Chairman: As the President recently described, in 
response to the attacks of September 11th, he has authorized 
the National Security Agency (NSA) to intercept international 
communications into or out of the United States of persons 
linked to al Qaeda or an affiliated terrorist organization. The 
attached paper has been prepared by the Department of Justice 
to provide a detailed analysis of the legal basis for those NSA 
activities described by the President.
    As I have previously explained, these NSA activities are 
lawful in all respects. They represent a vital effort by the 
President to ensure that we have in place an early warning 
system to detect and prevent another catastrophic terrorist 
attack on America. In the ongoing armed conflict with al Qaeda 
and its allies, the President has the primary duty under the 
Constitution to protect the American people. The Constitution 
gives the President the full authority necessary to carry out 
that solemn duty, and he has made clear that he will use all 
authority available to him consistent with the law, to protect 
the Nation. The President's authority to approve these NSA 
activities is confirmed and supplemented by Congress in the 
Authorization for Use of Military Force (AUMF), enacted on 
September 18, 2001. As discussed in depth in the attached 
paper, the President's use of his constitutional authority, as 
supplemented by statue in the AUMF, is consistent with the 
foreign Intelligence Surveillance Act and is also fully 
protective of the civil liberties guaranteed by the Fourth 
Amendment.
    It is my hope that this paper will prove helpful to your 
understanding of the legal authorities underlying the NSA 
activities described by the President.
            Sincerely,
                                       Alberto R. Gonzales,
                                                  Attorney General.
    Enclosure.

 Legal Authorities Supporting the Activities of the National Security 
                   Agency Described by the President

    As the President has explained, since shortly after the 
attacks of September 11, 2001, he has authorized the National 
Security Agency (``NSA'') to intercept international 
communications into and out of the United States of persons 
linked to al Qaeda or related terrorist organizations. The 
purpose of these intercepts is to establish an early warning 
system to detect and prevent another catastrophic terrorist 
attack on the United States. This paper addresses, in an 
unclassified form, the legal basis for the NSA activities 
described by the President (``NSA activities'').


                                SUMMARY


    On September 11, 2001, the al Qaeda terrorist network 
launched the deadliest foreign attack on American soil in 
history. Al Qaeda's leadership repeatedly has pledged to attack 
the United States again at a time of its choosing, and these 
terrorist organizations continue to pose a grave threat to the 
United States. In response to the September 11th attacks and 
the continuing threat, the President, with broad congressional 
approval, has acted to protect the Nation from another 
terrorist attack. In the immediate aftermath of September 11th, 
the President promised that ``[w]e will direct every resource 
at our command--every means of diplomacy, every tool of 
intelligence, every tool of law enforcement, every financial 
influence, and every weapon of war--to the destruction of and 
to the defeat of the global terrorist network.'' President Bush 
Address to a Joint Session of Congress (Sept. 20, 2001). The 
NSA activities are an indispensable aspect of this defense of 
the Nation. By targeting the international communications into 
and out of the United States of persons reasonably believed to 
be linked to al Qaeda, these activities provide the United 
States with an early warning system to help avert the next 
attack. For the following reasons, the NSA activities are 
lawful and consistent with civil liberties.
    The NSA activities are supported by the President's well-
recognized inherent constitutional authority as Commander in 
Chief and sole organ for the Nation in foreign affairs to 
conduct warrantless surveillance of enemy forces for 
intelligence purposes to detect and disrupt armed attacks on 
the United States. The President has the chief responsibility 
under the Constitution to protect America from attack, and the 
Constitution gives the President the authority necessary to 
fulfill that solemn responsibility. The President has made 
clear that he will exercise all authority available to him, 
consistent with the Constitution, to protect the people of the 
United States.
    In the specific context of the current armed conflict with 
al Qaeda and related terrorist organizations, Congress by 
statute has confirmed and supplemented the President's 
recognized authority under Article II of the Constitution to 
conduct such warrantless surveillance to prevent further 
catastrophic attacks on the homeland. In its first legislative 
response to the terrorist attacks of September 11th, Congress 
authorized the President to ``use all necessary and appropriate 
force against those nations, organizations, or persons he 
determines planned, authorized, committed, or aided the 
terrorist attacks'' of September 11th in order to prevent ``any 
future acts of international terrorism against the United 
States.'' Authorization for Use of Military Force, Pub. L. No. 
107-40, Sec. 2(a), 115 Stat. 224, 224 (Sept. 18, 2001) 
(reported as a note to 50 U.S.C.A. Sec. 1541) (``AUMF''). 
History conclusively demonstrates that warrantless 
communications intelligence targeted at the enemy in time of 
armed conflict is a traditional and fundamental incident of the 
use of military force authorized by the AUMF. The Supreme 
Court's interpretation of the AUMF in Hamdi v. Rumsfeld, 542 
U.S. 507 (2004), confirms that Congress in the AUMF gave its 
express approval to the military conflict against al Qaeda and 
its allies and thereby to the President's use of all 
traditional and accepted incidents of force in this current 
military conflicts including warrantless electronic 
surveillance to intercept enemy communications both at home and 
abroad. This understanding of the AUMF demonstrates Congress's 
support for the President's authority to protect the Nation 
and, at the same time, adheres to Justice O'Connor's admonition 
that ``a state of war is not a blank check for the President,'' 
Hamdi, 542 U.S. at 536 (plurality opinion), particularly in 
view of the narrow scope of the NSA activities.
    The AUMF places the President at the zenith of his powers 
in authorizing the NSA activities. Under the tripartite 
framework set forth by Justice Jackson in Youngstown Sheet & 
Tube Co. v. Sawyer, 343 U.S. 579, 635-38 (1952) (Jackson, J., 
concurring), Presidential authority is analyzed to determine 
whether the President is acting in accordance with 
congressional authorization (category I), whether he acts in 
the absence of a grant or denial of authority by Congress 
(category II), or whether he uses his own authority under the 
Constitution to take actions incompatible with congressional 
measures (category III). Because of the broad authorization 
provided in the AUMF, the President's action here falls within 
category I of Justice Jackson's framework. Accordingly, the 
President's power in authorizing the NSA activities is at its 
height because he acted ``pursuant to an express or implied 
authorization of Congress,'' and his power ``includes all that 
he possesses in his own right plus all that Congress can 
delegate.'' Id. at 635.
    The NSA activities are consistent with the preexisting 
statutory framework generally applicable to the interception of 
communications in the United States--the Foreign Intelligence 
Surveillance Act (``FISA''), as amended, 50 U.S.C. 
Sec. Sec. 1801-1862 (2000 & Supp. II 2002), and relevant 
related provisions in chapter 119 of title 18.\1\ Although FISA 
generally requires judicial approval of electronic 
surveillance, FISA also contemplates that Congress may 
authorize such surveillance by a statute other than FISA. See 
50 U.S.C. Sec. 1809(a) (prohibiting any person from 
intentionally ``engag[ing] . . . in electronic surveillance 
under color of law except as authorized by statute''). The 
AUMF, as construed by the Supreme Court in Hamdi and as 
confirmed by the history and tradition of armed conflict, is 
just such a statute. Accordingly, electronic surveillance 
conducted by the President pursuant to the AUMF, including the 
NSA activities, is fully consistent with FISA and falls within 
category I of Justice Jackson's framework.
---------------------------------------------------------------------------
    \1\ Chapter 119 of title 18, which was enacted by Title III of the 
Omnibus Crime Control and Safe Streets Act of 1968, as amended, 18 
U.S.C. 2510-2521 (2000 & West Supp. 2005), is often referred to as 
``Title III.''
---------------------------------------------------------------------------
    Even if there were ambiguity about whether FISA, read 
together with the AUMF, permits the President to authorize the 
NSA activities, the canon of constitutional avoidance requires 
reading these statutes in harmony to overcome any restrictions 
in FISA and Title III, at least as they might otherwise apply 
to the congressionally authorized armed conflict with al Qaeda. 
Indeed, were FISA and Title III interpreted to impede the 
President's ability to use the traditional tool of electronic 
surveillance to detect and prevent future attacks by a declared 
enemy that has already struck at the homeland and is engaged in 
ongoing operations against the United States, the 
constitutionality of FISA, as applied to that situation, would 
be called into very serious doubt. In fact, if this difficult 
constitutional question had to be addressed, FISA would be 
unconstitutional as applied to this narrow context. 
Importantly, the FISA Court of Review itself recognized just 
three years ago that the President retains constitutional 
authority to conduct foreign surveillance apart from the FISA 
framework, and the President is certainly entitled, at a 
minimum, to rely on that judicial interpretation of the 
Constitution and FISA.
    Finally, the NSA activities fully comply with the 
requirements of the Fourth Amendment. The interception of 
communications described by the President falls within a well-
established exception to the warrant requirement and satisfies 
the Fourth Amendment's fundamental requirement of 
reasonableness. The NSA activities are thus constitutionally 
permissible and fully protective of civil liberties.


                               BACKGROUND


A. The attacks of September 11, 2001
    On September 11, 2001, the al Qaeda terrorist network 
launched a set of coordinated attacks along the East Coast of 
the United States. Four commercial jetliners, each carefully 
selected to be fully loaded with fuel for a transcontinental 
flight, were hijacked by al Qaeda operatives. Two of the 
jetliners were targeted at the Nation's financial center in New 
York and were deliberately flown into the Twin Towers of the 
World Trade Center. The third was targeted at the headquarters 
of the Nation's Armed Forces, the Pentagon. The fourth was 
apparently headed toward Washington, DC, when passengers 
struggled with the hijackers and the plane crashed in 
Shanksville, Pennsylvania. The intended target of this fourth 
jetliner was evidently the White House or the Capitol, strongly 
suggesting that its intended mission was to strike a 
decapitation blow on the Government of the United States--to 
kill the President, the Vice President, or Members of Congress. 
The attacks of September 11th resulted in approximately 3,000 
deaths--the highest single-day death toll from hostile foreign 
attacks in the Nation's history. These attacks shut down air 
travel in the United States, disrupted the Nation's financial 
markets and government operations, and caused billions of 
dollars in damage to the economy.
    On September 14, 2001, the President declared a national 
emergency ``by reason of the terrorist attacks at the World 
Trade Center, New York, New York, and the Pentagon, and the 
continuing and immediate threat of further attacks on the 
United States.'' Proclamation No. 7463, 66 Fed. Reg. 48,199 
(Sept. 14, 2001). The same day, Congress passed a joint 
resolution authorizing the President ``to use all necessary and 
appropriate force against those nations, organizations, or 
persons he determines planned, authorized, committed, or aided 
the terrorist attacks'' of September 11th, which the President 
signed on September 18th. AUMF Sec. 2(a). Congress also 
expressly acknowledged that the attacks rendered it ``necessary 
and appropriate'' for the United States to exercise its right 
``to protect United States citizens both at home and abroad,'' 
and in particular recognized that ``the President has authority 
under the Constitution to take action to deter and prevent acts 
of international terrorism against the United States.'' Id. 
pmbl. Congress emphasized that the attacks ``continue to pose 
an unusual and extraordinary threat to the national security 
and foreign policy of the United States.'' Id. The United 
States also launched a large-scale military response, both at 
home and abroad. In the United States, combat air patrols were 
immediately established over major metropolitan areas and were 
maintained 24 hours a day until April 2002. The United States 
also immediately began plans for a military response directed 
at al Qaeda's base of operations in Afghanistan. Acting under 
his constitutional authority as Commander in Chief, and with 
the support of Congress, the President dispatched forces to 
Afghanistan and, with the assistance of the Northern Alliance, 
toppled the Taliban regime.
    As the President made explicit in his Military Order of 
November 13, 2001, authorizing the use of military commissions 
to try terrorists, the attacks of September 11th ``created a 
state of armed conflict.'' Military Order Sec. l(a), 66 Fed. 
Reg. 57,833 (Nov. 13, 2001). Indeed, shortly after the attacks, 
NATO--for the first time in its 46-year history--invoked 
article 5 of the North Atlantic Treaty, which provides that an 
``armed attack against one or more of [the parties] shall be 
considered an attack against them all.'' North Atlantic Treaty, 
Apr. 4, 1949, art. 5, 63 Stat. 2241, 2244, 34 U.N.T.S. 243, 
246; see also Statement by NATO Secretary General Lord 
Robertson (Oct. 2, 2001), available at http://www.nato.int/
docu/speech/2001/s011002a.htm (``[I]t has now been determined 
that the attack against the United States on 11 September was 
directed from abroad and shall therefore be regarded as an 
action covered by Article 5 of the Washington Treaty. . . .''). 
The President also determined in his Military Order that al 
Qaeda and related terrorists organizations ``possess both the 
capability and the intention to undertake further terrorist 
attacks against the United States that, if not detected and 
prevented, will cause mass deaths, mass injuries, and massive 
destruction of property, and may place at risk the continuity 
of the operations of the United States Government,'' and 
concluded that ``an extraordinary emergency exists for national 
defense purposes.'' Military Order, Sec. l(c), (g), 66 Fed. 
Reg. at 57,833-34.
B. The NSA activities
    Against this unfolding background of events in the fall of 
2001, there was substantial concern that al Qaeda and its 
allies were preparing to carry out another attack within the 
United States. Al Qaeda had demonstrated its ability to 
introduce agents into the United States undetected and to 
perpetrate devastating attacks, and it was suspected that 
additional agents were likely already in position within the 
Nation's borders. As the President has explained, unlike a 
conventional enemy, al Qaeda has infiltrated ``our cities and 
communities and communicated from here in America to plot and 
plan with bin Laden's lieutenants in Afghanistan, Pakistan and 
elsewhere.'' Press Conference of President Bush (Dec. 19, 
2005), available at http://www.whitehouse.gov/news/releases/
2005/12/20051219-2.html (``President's Press Conference''). To 
this day, finding al Qaeda sleeper agents in the United States 
remains one of the paramount concerns in the War on Terror. As 
the President has explained, ``[t]he terrorists want to strike 
America again, and they hope to inflict even more damage than 
they did on September the 11th.'' Id.
    The President has acknowledged that, to counter this 
threat, he has authorized the NSA to intercept international 
communications into and out of the United States of persons 
linked to al Qaeda or related terrorist organizations. The same 
day, the Attorney General elaborated and explained that in 
order to intercept a communication, there must be ``a 
reasonable basis to conclude that one party to the 
communication is a member of al Qaeda, affiliated with al 
Qaeda, or a member of an organization affiliated with al 
Qaeda.'' Press Briefing by Attorney General Alberto Gonzales 
and General Michael Hayden, Principal Deputy Director for 
National Intelligence, available at http://www.whitehouse.gov/
news/releases/2005/12/20051219-1.html (Dec. 19, 2005) 
(statement of Attorney General Gonzales). The purpose of these 
intercepts is to establish an early warning system to detect 
and prevent another catastrophic terrorist attack on the United 
States. The President has stated that the NSA activities 
``ha[ve] been effective in disrupting the enemy, while 
safeguarding our civil liberties.'' President's Press 
Conference.
    The President has explained that the NSA activities are 
``critical'' to the national security of the United States. Id. 
Confronting al Qaeda ``is not simply a matter of [domestic] law 
enforcement''--we must defend the country against an enemy that 
declared war against the United States. Id. To ``effectively 
detect enemies hiding in our midst and prevent them from 
striking us again . . . we must be able to act fast and to 
detect conversations [made by individuals linked to al Qaeda] 
so we can prevent new attacks.'' Id. The President pointed out 
that ``a two-minute phone conversation between somebody linked 
to al Qaeda here and an operative overseas could lead directly 
to the loss of thousands of lives.'' Id. The NSA activities are 
intended to help ``connect the dots'' between potential 
terrorists. Id. In addition, the Nation is facing ``a different 
era, a different war . . . people are changing phone numbers . 
. . and they're moving quick[ly].'' Id. As the President 
explained, the NSA activities ``enable[] us to move faster and 
quicker. And that's important. We've got to be fast on our 
feet, quick to detect and prevent.'' Id. ``This is an enemy 
that is quick and it's lethal. And sometimes we have to move 
very, very quickly.'' Id. FISA, by contrast, is better suited 
``for long-term monitoring.'' Id.
    As the President has explained, the NSA activities are 
``carefully reviewed approximately every 45 days to ensure that 
[they are] being used properly.'' Id. These activities are 
reviewed for legality by the Department of Justice and are 
monitored by the General Counsel and Inspector General of the 
NSA to ensure that civil liberties are being protected. Id. 
Leaders in Congress from both parties have been briefed more 
than a dozen times on the NSA activities.
C. The continuing threat posed by al Qaeda
    Before the September 11th attacks, al Qaeda had promised to 
attack the United States. In 1998, Osama bin Laden declared a 
``religious'' war against the United States and urged that it 
was the moral obligation of all Muslims to kill U.S. civilians 
and military personnel. See Statement of Osama bin Laden, Ayman 
al-Zawahiri, et al., Fatwah Urging Jihad Against Americans, 
published in Al-Quds al-'Arabi (Feb. 23, 1998) (``To kill the 
Americans and their allies--civilians and military--is an 
individual duty for every Muslim who can do it in any country 
in which it is possible to do it, in order to liberate the al-
Aqsa Mosque and the holy mosque from their grip, and in order 
for their armies to move out of all the lands of Islam, 
defeated and unable to threaten any Muslim.''). Al Qaeda 
carried out those threats with a vengeance; they attacked the 
U.S.S. Cole in Yemen, the United States Embassy in Nairobi, and 
finally the United States itself in the September 11th attacks.
    It is clear that al Qaeda is not content with the damage it 
wrought on September 11th. As recently as December 7, 2005, 
Ayman al-Zawahiri professed that al Qaeda ``is spreading, 
growing, and becoming stronger,'' and that al Qaeda is ``waging 
a great historic battle in Iraq, Afghanistan, Palestine, and 
even in the Crusaders' own homes.'' Ayman al-Zawahiri, 
videotape released on Al-Jazeera television network (Dec. 7, 
2005). Indeed, since September 11th, al Qaeda leaders have 
repeatedly promised to deliver another, even more devastating 
attack on America. See, e.g., Osama bin Laden, videotape 
released on Al-Jazeera television network (Oct. 24, 2004) 
(warning United States citizens of further attacks and 
asserting that ``your security is in your own hands''); Osama 
bin Laden, videotape released on Al-Jazeera television network 
(Oct. 18, 2003) (``We, God willing, will continue to fight you 
and will continue martyrdom operations inside and outside the 
United States. . . .''); Ayman Al-Zawahiri, videotape released 
on the Al-Jazeera television network (Oct. 9, 2002) (``I 
promise you [addressing the `citizens of the United States'] 
that the Islamic youth are preparing for you what will fill 
your hearts with horror''). Given that al Qaeda's leaders have 
repeatedly made good on their threats and that al Qaeda has 
demonstrated its ability to insert foreign agents into the 
United States to execute attacks, it is clear that the threat 
continues. Indeed, since September 11th, al Qaeda has staged 
several large-scale attacks around the world, including in 
Indonesia, Madrid, and London, killing hundreds of innocent 
people.


                                ANALYSIS


I. The President has inherent constitutional authority to order 
        warrantless foreign intelligence surveillance
    As Congress expressly recognized in the AUMF, ``the 
President has authority under the Constitution to take action 
to deter and prevent acts of international terrorism against 
the United States,'' AUMF pmbl., especially in the context of 
the current conflict. Article II of the Constitution vests in 
the President all executive power of the United States, 
including the power to act as Commander in Chief of the Armed 
Forces, see U.S. Const. art. II, Sec. 2, and authority over the 
conduct of the Nation's foreign affairs. As the Supreme Court 
has explained, ``[t]he President is the sole organ of the 
nation in its external relations, and its sole representative 
with foreign nations.'' United States v. Curtiss-Wright Export 
Corp., 299 U.S. 304, 319 (1936) (internal quotation marks and 
citations omitted). In this way, the Constitution grants the 
President inherent power to protect the Nation from foreign 
attack, see, e.g., The Prize Cases, 67 U.S. (2 Black) 635, 668 
(1863), and to protect national security information, see, 
e.g., Department of the Navy v. Egan, 484 U.S. 518, 527 (1988).
    To carry out these responsibilities, the President must 
have authority to gather information necessary for the 
execution of his office. The Founders, after all, intended the 
federal Government to be clothed with all authority necessary 
to protect the Nation. See, e.g., The Federalist No. 23, at 147 
(Alexander Hamilton) (Jacob E. Cooke ed. 1961) (explaining that 
the federal Government will be ``cloathed with all the powers 
requisite to the complete execution of its trust''); id. No. 
41, at 269 (James Madison) (``Security against foreign danger 
is one of the primitive objects of civil society. . . . The 
powers requisite for attaining it must be effectually confided 
to the federal councils.''). Because of the structural 
advantages of the Executive Branch, the Founders also intended 
that the President would have the primary responsibility and 
necessary authority as Commander in Chief and Chief Executive 
to protect the Nation and to conduct the Nation's foreign 
affairs. See, e.g., The Federalist No. 70, at 471-72 (Alexander 
Hamilton); see also Johnson v. Eisentrager, 339 U.S. 763, 788 
(1950) (``this [constitutional] grant of war power includes all 
that is necessary and proper for carrying these powers into 
execution'') (citation omitted). Thus, it has been long 
recognized that the President has the authority to use 
secretive means to collect intelligence necessary for the 
conduct of foreign affairs and military campaigns. See, e.g., 
Chicago & S. Air Lines v. Waterman S.S. Corp., 333 U.S. 103, 
111 (1948) (``The President, both as Commander-in-Chief and as 
the Nation's organ for foreign affairs, has available 
intelligence services whose reports are not and ought not to be 
published to the world.''); Curtiss-Wright, 299 U.S. at 320 
(``He has his confidential sources of information. He has his 
agents in the form of diplomatic, consular and other 
officials.''); Totten v. United States, 92 U.S. 105, 106 (1876) 
(President ``was undoubtedly authorized during the war, as 
commander-in-chief . . . to employ secret agents to enter the 
rebel lines and obtain information respecting the strength, 
resources, and movements of the enemy'').
    In reliance on these principles, a consistent understanding 
has developed that the President has inherent constitutional 
authority to conduct warrantless searches and surveillance 
within the United States for foreign intelligence purposes. 
Wiretaps for such purposes thus have been authorized by 
Presidents at least since the administration of Franklin 
Roosevelt in 1940. See, e.g., United States v. United States 
District Court, 444 F.2d 651, 669-71 (6th Cir. 1971) 
(reproducing as an appendix memoranda from Presidents 
Roosevelt, Truman, and Johnson). In a Memorandum to Attorney 
General Jackson, President Roosevelt wrote on May 21, 1940:

          You are, therefore, authorized and directed in such 
        cases as you may approve, after investigation of the 
        need in each case, to authorize the necessary 
        investigation agents that they are at liberty to secure 
        information by listening devices directed to the 
        conversation or other communications of persons 
        suspected of subversive activities against the 
        Government of the United States, including suspected 
        spies. You are requested furthermore to limit these 
        investigations so conducted to a minimum and limit them 
        insofar as possible to aliens.

Id. at 670 (appendix A). President Truman approved a memorandum 
drafted by Attorney General Tom Clark in which the Attorney 
General advised that ``it is as necessary as it was in 1940 to 
take the investigative measures'' authorized by President 
Roosevelt to conduct electronic surveillance ``in cases vitally 
affecting the domestic security.'' Id. Indeed, while FISA was 
being debated during the Carter Administration, Attorney 
General Griffin Bell testified that ``the current bill 
recognizes no inherent power of the President to conduct 
electronic surveillance, and I want to interpolate here to say 
that this does not take away the power [of] the President under 
the Constitution.'' Foreign Intelligence Electronic 
Surveillance Act of 1978: Hearings on H.R. 5764, H.R. 9745, 
H.R. 7308, and H.R. 5632 Before the Subcomm. on Legislation of 
the House Comm. on Intelligence, 95th Cong., 2d Sess. 15 (1978) 
(emphasis added); see also Katz v. United States, 389 U.S. 347, 
363 (1967) (White, J., concurring) (``Wiretapping to protect 
the security of the Nation has been authorized by successive 
Presidents.''); cf. Amending the Foreign Intelligence 
Surveillance Act: Hearings Before the House Permanent Select 
Comm. on Intelligence, 103d Cong. 2d Sess. 61 (1994) (statement 
of Deputy Attorney General Jamie S. Gorelick) (``[T]he 
Department of Justice believes, and the case law supports, that 
the President has inherent authority to conduct warrantless 
physical searches for foreign intelligence purposes. . . .'').
    The courts uniformly have approved this longstanding 
Executive Branch practice. Indeed, every federal appellate 
court to rule on the question has concluded that, even in 
peacetime, the President has inherent constitutional authority, 
consistent with the Fourth Amendment, to conduct searches for 
foreign intelligence purposes without securing a judicial 
warrant. See In re Sealed Case, 310 F.3d 717, 742 (Foreign 
Intel. Surv. Ct. of Rev. 2002) (``[A]ll the other courts to 
have decided the issue [have] held that the President did have 
inherent authority to conduct warrantless searches to obtain 
foreign intelligence information. . . . We take for granted 
that the President does have that authority and, assuming that 
is so, FISA could not encroach on the President's 
constitutional power.'') (emphasis added); accord, e.g., United 
States v. Truong Dinh Hung, 629 F.2d 908 (4th Cir. 1980); 
United States v. Butenko, 494 F.2d 593 (3d Cir. 1974) (en 
banc); United States v. Brown, 484 F.2d 418 (5th Cir. 1973). 
But cf. Zweibon v. Mitchell, 516 F.2d 594 (D.C. Cir. 1975) (en 
banc) (dictum in plurality opinion suggesting that a warrant 
would be required even in a foreign intelligence 
investigation).
    In United States v. United States District Court, 407 U.S. 
297 (1972) (the ``Keith'' case), the Supreme Court concluded 
that the Fourth Amendment's warrant requirement applies to 
investigations of wholly domestic threats to security--such as 
domestic political violence and other crimes. But the Court in 
the Keith case made clear that it was not addressing the 
President's authority to conduct foreign intelligence 
surveillance without a warrant and that it was expressly 
reserving that question: ``[T]he instant case requires no 
judgment on the scope of the President's surveillance power 
with respect to the activities of foreign powers, within or 
without this country.'' Id. at 308; see also Id. at 321-22 & 
n.20 (``We have not addressed, and express no opinion as to, 
the issues which may be involved with respect to activities of 
foreign powers or their agents.''). That Keith does not apply 
in the context of protecting against a foreign attack has been 
confirmed by the lower courts. After Keith, each of the three 
courts of appeals that have squarely considered the question 
have concluded--expressly taking the Supreme Court's decision 
into account--that the President has inherent authority to 
conduct warrantless surveillance in the foreign intelligence 
context. See, e.g., Truong Dinh Hung, 629 F.2d at 913-14; 
Butenko, 494 F.2d at 603; Brown, 484 F.2d 425-26.
    From a constitutional standpoint, foreign intelligence 
surveillance such as the NSA activities differs fundamentally 
from the domestic security surveillance at issue in Keith. As 
the Fourth Circuit observed, the President has uniquely strong 
constitutional powers in matters pertaining to foreign affairs 
and national security. ``Perhaps most crucially, the executive 
branch not only has superior expertise in the area of foreign 
intelligence, it is also constitutionally designated as the 
pre-eminent authority in foreign affairs.'' Truong, 629 F.2d at 
914; see id. at 913 (noting that ``the needs of the executive 
are so compelling in the area of foreign intelligence, unlike 
the area of domestic security, that a uniform warrant 
requirement would . . . unduly frustrate the President in 
carrying out his foreign affairs responsibilities''); cf. Haig 
v. Agee, 453 U.S. 280, 292 (1981) (``Matters intimately related 
to foreign policy and national security are rarely proper 
subjects for judicial intervention.''). \2\
---------------------------------------------------------------------------
    \2\ Keith made clear that one of the significant concerns driving 
the Court's conclusion in the domestic security context was the 
inevitable connection between perceived threats to domestic security 
and political dissent. As the Court explained: ``Fourth Amendment 
protections become the more necessary when the targets of official 
surveillance may be those suspected of unorthodoxy in their political 
beliefs. The danger to political dissent is acute where the Government 
attempts to act under so vague a concept as the power to protect 
`domestic security.' '' Keith, 407 U.S. at 314; see also id. at 320 
(``Security surveillances are especially sensitive because of the 
inherent vagueness of the domestic security concept, the necessarily 
broad and continuing nature of intelligence gathering, and the 
temptation to utilize such surveillances to oversee political 
dissent.''). Surveillance of domestic groups raises a First Amendment 
concern that generally is not present when the subjects of the 
surveillance are foreign powers or their agents.
---------------------------------------------------------------------------
    The present circumstances that support recognition of the 
President's inherent constitutional authority to conduct the 
NSA activities are considerably stronger than were the 
circumstances at issue in the earlier courts of appeals cases 
that recognized this power. All of the cases described above 
addressed inherent executive authority under the foreign 
affairs power to conduct surveillance in a peacetime context. 
The courts in these cases therefore had no occasion even to 
consider the fundamental authority of the President, as 
Commander in Chief, to gather intelligence in the context of an 
ongoing armed conflict in which the United States already had 
suffered massive civilian casualties and in which the 
intelligence gathering efforts at issue were specifically 
designed to thwart further armed attacks. Indeed, intelligence 
gathering is particularly important in the current conflict, in 
which the enemy attacks largely through clandestine activities 
and which, as Congress recognized, ``pose[s] an unusual and 
extraordinary threat,'' AUMF pmbl.
    Among the President's most basic constitutional duties is 
the duty to protect the Nation from armed attack. The 
Constitution gives him all necessary authority to fulfill that 
responsibility. The courts thus have long acknowledged the 
President's inherent authority to take action to protect 
Americans abroad, see, e.g., Durand v. Hollins, 8 F. Cas. 111, 
112 (C.C.S.D.N.Y. 1860) (No. 4186), and to protect the Nation 
from attack, see, e.g., The Prize Cases, 67 U.S. at 668. See 
generally Ex parte Quirin, 317 U.S. 1, 28 (1942) (recognizing 
that the President has authority under the Constitution ``to 
direct the performance of those functions which may 
constitutionally be performed by the military arm of the nation 
in time of war,'' including ``important incident[s] to the 
conduct of war,'' such as ``the adoption of measures by the 
military command . . . to repel and defeat the enemy''). As the 
Supreme Court emphasized in the Prize Cases, if the Nation is 
invaded, the President is ``bound to resist force by force''; 
``[h]e must determine what degree of force the crisis demands'' 
and need not await congressional sanction to do so. The Prize 
Cases, 67 U.S. at 670; see also Campbell v. Clinton, 203 F.3d 
19, 27 (D.C. Cir. 2000) (Silberman, J., concurring) (``[T]he 
Prize Cases . . . stand for the proposition that the President 
has independent authority to repel aggressive acts by third 
parties even without specific congressional authorization, and 
courts may not review the level of force selected.''); id. at 
40 (Tatel, J., concurring) (``[T]he President, as commander in 
chief, possesses emergency authority to use military force to 
defend the nation from attack without obtaining prior 
congressional approval.''). Indeed, ``in virtue of his rank as 
head of the forces, [the President] has certain powers and 
duties with which Congress cannot interfere.'' Training of 
British Flying Students in the United States, 40 Op. Att'y Gen. 
58, 61 (1941) (Attorney General Robert H. Jackson) (internal 
quotation marks omitted). In exercising his constitutional 
powers, the President has wide discretion, consistent with the 
Constitution, over the methods of gathering intelligence about 
the Nation's enemies in a time of armed conflict.
II. The AUMF confirms and supplements the President's inherent power to 
        use warrantless surveillance against the enemy in the current 
        armed conflict
    In the Authorization for Use of Military Force enacted in 
the wake of September 11th, Congress confirms and supplements 
the President's constitutional authority to protect the Nation, 
including through electronic surveillance, in the context of 
the current post-September 11th armed conflict with al Qaeda 
and its allies. The broad language of the AUMF affords the 
President, at a minimum, discretion to employ the traditional 
incidents of the use of military force. The history of the 
President's use of warrantless surveillance during armed 
conflicts demonstrates that the NSA surveillance described by 
the President is a fundamental incident of the use of military 
force that is necessarily included in the AUMF.
            A. The text and purpose of the AUMF authorize the NSA 
                    activities
    On September 14, 2001, in its first legislative response to 
the attacks of September 11th, Congress gave its express 
approval to the President's military campaign against al Qaeda 
and, in the process, confirmed the well-accepted understanding 
of the President's Article II powers. See AUMF Sec. 2(a). \3\ 
In the preamble to the AUMF, Congress stated that ``the 
President has authority under the Constitution to take action 
to deter and prevent acts of international terrorism against 
the United States,'' AUMF pmbl., and thereby acknowledged the 
President's inherent constitutional authority to defend the 
United States. This clause ``constitutes an extraordinarily 
sweeping recognition of independent presidential constitutional 
power to employ the war power to combat terrorism.'' Michael 
Stokes Paulsen, Youngstown Goes to War, 19 Const. Comment. 215, 
252 (2002). This striking recognition of presidential authority 
cannot be discounted as the product of excitement in the 
immediate aftermath of September 11th, for the same terms were 
repeated by Congress more than a year later in the 
Authorization for Use of Military Force Against Iraq Resolution 
of 2002. Pub. L. No. 107-243, pmbl., 116 Stat. 1498, 1500 (Oct. 
16, 2002) (``[T]he President has authority under the 
Constitution to take action in order to deter and prevent acts 
of international terrorism against the United States . . . 
.''). In the context of the conflict with al Qaeda and related 
terrorist organizations, therefore, Congress has acknowledged a 
broad executive authority to ``deter and prevent'' further 
attacks against the United States.
---------------------------------------------------------------------------
    \3\ America's military response began before the attacks of 
September 11th had been completed. See The 9/11 Commission Report 20 
(2004). Combat air patrols were established and authorized ``to engage 
inbound aircraft if they could verify that the aircraft was hijacked.'' 
Id. at 42.
---------------------------------------------------------------------------
    The AUMF passed by Congress on September 14, 2001, does not 
lend itself to a narrow reading. Its expansive language 
authorizes the President ``to use all necessary and appropriate 
force against those nations, organizations, or persons he 
determines planned, authorized, committed, or aided the 
terrorist attacks that occurred on September 11, 2001.'' AUMF 
Sec. 2(a) (emphases added). In the field of foreign affairs, 
and particularly that of war powers and national security, 
congressional enactments are to be broadly construed where they 
indicate support for authority long asserted and exercised by 
the Executive Branch. See, e.g., Haig v. Agee, 453 U.S. 280, 
293-303 (1981); United States ex rel. Knauff v. Shaughnessy, 
338 U.S. 537, 543-45 (1950); cf. Loving v. United States, 517 
U.S. 748, 772 (1996) (noting that the usual ``limitations on 
delegation [of congressional powers] do not apply'' to 
authorizations linked to the Commander in Chief power); Dames & 
Moore v. Regan, 453 U.S. 654, 678-82 (1981) (even where there 
is no express statutory authorization for executive action, 
legislation in related field may be construed to indicate 
congressional acquiescence in that action). Although Congress's 
war powers under Article I, Section 8 of the Constitution 
empower Congress to legislate regarding the raising, 
regulation, and material support of the Armed Forces and 
related matters, rather than the prosecution of military 
campaigns, the AUMF indicates Congress's endorsement of the 
President's use of his constitutional war powers. This 
authorization transforms the struggle against al Qaeda and 
related terrorist organizations from what Justice Jackson 
called ``a zone of twilight,'' in which the President and the 
Congress may have concurrent powers whose ``distribution is 
uncertain,'' Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 
579, 637 (1952) (Jackson, J., concurring), into a situation in 
which the President's authority is at its maximum because ``it 
includes all that he possesses in his own right plus all that 
Congress can delegate,'' id. at 635. With regard to these 
fundamental tools of warfare--and, as demonstrated below, 
warrantless electronic surveillance against the declared enemy 
is one such tool--the AUMF places the President's authority at 
its zenith under Youngstown.
    It is also clear that the AUMF confirms and supports the 
President's use of those traditional incidents of military 
force against the enemy, wherever they may be--on United States 
soil or abroad. The nature of the September 11th attacks--
launched on United States soil by foreign agents secreted in 
the United States--necessitates such authority, and the text of 
the AUMF confirms it. The operative terms of the AUMF state 
that the President is authorized to use force ``in order to 
prevent any future acts of international terrorism against the 
United States,'' id., an objective which, given the recent 
attacks within the Nation's borders and the continuing use of 
air defense throughout the country at the time Congress acted, 
undoubtedly contemplated the possibility of military action 
within the United States. The preamble, moreover, recites that 
the United States should exercise its rights ``to protect 
United States citizens both at home and abroad.'' Id. pmbl. 
(emphasis added). To take action against those linked to the 
September 11th attacks involves taking action against 
individuals within the United States. The United States had 
been attacked on its own soil--not by aircraft launched from 
carriers several hundred miles away, but by enemy agents who 
had resided in the United States for months. A crucial 
responsibility of the President--charged by the AUMF and the 
Constitution--was and is to identify and attack those enemies, 
especially if they were in the United States, ready to strike 
against the Nation.
    The text of the AUMF demonstrates in an additional way that 
Congress authorized the President to conduct warrantless 
electronic surveillance against the enemy. The terms of the 
AUMF not only authorized the President to ``use all necessary 
and appropriate force'' against those responsible for the 
September 11th attacks; it also authorized the President to 
``determine[]'' the persons or groups responsible for those 
attacks and to take all actions necessary to prevent further 
attacks. AUMF Sec. 2(a) (``the President is authorized to use 
all necessary and appropriate force against those nations, 
organizations, or persons he determines planned, authorized, 
committed, or aided the terrorist attacks that occurred on 
September 11th, 2001, or harbored such organizations or 
persons'') (emphasis added). Of vital importance to the use of 
force against the enemy is locating the enemy and identifying 
its plans of attack. And of vital importance to identifying the 
enemy and detecting possible future plots was the authority to 
intercept communications to or from the United States of 
persons with links to al Qaeda or related terrorist 
organizations. Given that the agents who carried out the 
initial attacks resided in the United States and had 
successfully blended into American society and disguised their 
identities and intentions until they were ready to strike, the 
necessity of using the most effective intelligence gathering 
tools against such an enemy, including electronic surveillance, 
was patent. Indeed, Congress recognized that the enemy in this 
conflict poses an ``unusual and extraordinary threat.'' AUMF 
pmbl.
    The Supreme Court's interpretation of the scope of the AUMF 
in Hamdi v. Rumsfeld, 542 U.S. 507 (2004), strongly supports 
this reading of the AUMF. In Hamdi, five members of the Court 
found that the AUMF authorized the detention of an American 
within the United States, notwithstanding a statute that 
prohibits the detention of U.S. citizens ``except pursuant to 
an Act of Congress,'' 18 U.S.C. 4001(a). See Hamdi, 542 U.S. at 
519 (plurality opinion); id. at 587 (Thomas, J., dissenting). 
Drawing on historical materials and ``longstanding law-of-war 
principles,'' id. at 518-21, a plurality of the Court concluded 
that detention of combatants who fought against the United 
States as part of an organization ``known to have supported'' 
al Qaeda ``is so fundamental and accepted an incident to war as 
to be an exercise of the `necessary and appropriate force' 
Congress has authorized the President to use.'' Id. at 518; see 
also id. at 587 (Thomas, J., dissenting) (agreeing with the 
plurality that the joint resolution authorized the President to 
``detain those arrayed against our troops''); accord Quirin, 
317 U.S. at 26-29, 38 (recognizing the President's authority to 
capture and try agents of the enemy in the United States even 
if they had never ``entered the theatre or zone of active 
military operations''). Thus, even though the AUMF does not say 
anything expressly about detention, the Court nevertheless 
found that it satisfied section 4001(a)'s requirement that 
detention be congressionally authorized.
    The conclusion of five Justices in Hamdi that the AUMF 
incorporates fundamental ``incidents'' of the use of military 
force makes clear that the absence of any specific reference to 
signals intelligence activities in the resolution is 
immaterial. See Hamdi, 542 U.S. at 519 (``[I]t is of no moment 
that the AUMF does not use specific language of detention.'') 
(plurality opinion). Indeed, given the circumstances in which 
the AUMF was adopted, it is hardly surprising that Congress 
chose to speak about the President's authority in general 
terms. The purpose of the AUMF was for Congress to sanction and 
support the military response to the devastating terrorist 
attacks that had occurred just three days earlier. Congress 
evidently thought it neither necessary nor appropriate to 
attempt to catalog every specific aspect of the use of the 
forces it was authorizing and every potential preexisting 
statutory limitation on the Executive Branch. Rather than 
engage in that difficult and impractical exercise, Congress 
authorized the President, in general but intentionally broad 
terms, to use the traditional and fundamental incidents of war 
and to determine how best to identify and engage the enemy in 
the current armed conflict. Congress's judgment to proceed in 
this manner was unassailable, for, as the Supreme Court has 
recognized, even in normal times involving no major national 
security crisis, ``Congress cannot anticipate and legislate 
with regard to every possible action the President may find it 
necessary to take.'' Dames & Moore, 453 U.S. at 678. Indeed, 
Congress often has enacted authorizations to use military force 
using general authorizing language that does not purport to 
catalogue in detail the specific powers the President may 
employ. The need for Congress to speak broadly in recognizing 
and augmenting the President's core constitutional powers over 
foreign affairs and military campaigns is of course 
significantly heightened in times of national emergency. See 
Zemel v. Rusk, 381 U.S. 1, 17 (1965) (``[B]ecause of the 
changeable and explosive nature of contemporary international 
relations . . . Congress--in giving the Executive authority 
over matters of foreign affairs--must of necessity paint with a 
brush broader than that it customarily wields in domestic 
areas.'').
    Hamdi thus establishes the proposition that the AUMF 
``clearly and unmistakably'' authorizes the President to take 
actions against al Qaeda and related organizations that amount 
to ``fundamental incident[s] of waging war.'' Hamdi, 542 U.S. 
at 519 (plurality opinion); see also id. at 587 (Thomas, J., 
dissenting). In other words, ``[t]he clear inference is that 
the AUMF authorizes what the laws of war permit.'' Curtis A. 
Bradley & Jack L. Goldsmith, Congressional Authorization and 
the War on Terrorism, 118 Harv. L. Rev. 2048, 2092 (2005) 
(emphasis added). Congress is presumed to be aware of the 
Supreme Court's precedents. Indeed, Congress recently enacted 
legislation in response to the Court's decision in Rasul v. 
Bush, 542 U.S. 466 (2004)--which was issued the same day as the 
Hamdi decision--removing habeas corpus jurisdiction over claims 
filed on behalf of confined enemy combatants held at Guantanamo 
Bay. Congress, however, has not expressed any disapproval of 
the Supreme Court's commonsense and plain-meaning 
interpretation of the AUMF in Hamdi.\4\
---------------------------------------------------------------------------
    \4\ This understanding of the AUMF is consistent with Justice 
O'Connor's admonition that ``a state of war is not a blank check for 
the President,'' Hamdi, 542 U.S. at 536 (plurality opinion). In 
addition to constituting a fundamental and accepted incident of the use 
of military force, the NSA activities are consistent with the law of 
armed conflict principle that the use of force be necessary and 
proportional. See Dieter Fleck, The Handbook of Humanitarian Law in 
Armed Conflicts 115 (1995). The NSA activities are proportional because 
they are minimally invasive and narrow in scope, targeting only the 
international communications of persons reasonably believed to be 
linked to al Qaeda, and are designed to protect the Nation from a 
devastating attack.
---------------------------------------------------------------------------
            B. Warrantless electronic surveillance aimed at 
                    intercepting enemy communications has long been 
                    recognized as a fundamental incident of the use of 
                    military force
    The history of warfare--including the consistent practice 
of Presidents since the earliest days of the Republic--
demonstrates that warrantless intelligence surveillance against 
the enemy is a fundamental incident of the use of military 
force, and this history confirms the statutory authority 
provided by the AUMF. Electronic surveillance is a fundamental 
tool of war that must be included in any natural reading of the 
AUMF's authorization to use ``all necessary and appropriate 
force.''
    As one author has explained:

         It is essential in warfare for a belligerent to be as 
        fully informed as possible about the enemy--his 
        strength, his weaknesses, measures taken by him and 
        measures contemplated by him. This applies not only to 
        military matters, but . . . anything which bears on and 
        is material to his ability to wage the war in which he 
        is engaged. The laws of war recognize and sanction this 
        aspect of warfare.

Morris Greenspan, The Modern Law of Land Warfare 325 (1959) 
(emphases added); see also Memorandum for Members of the House 
Permanent Select Comm. on Intel., from Jeffrey H. Smith, Re: 
Legal Authorities Regarding Warrantless Surveillance of U.S. 
Persons 6 (Jan. 3, 2006) (``Certainly, the collection of 
intelligence is understood to be necessary to the execution of 
the war.''). Similarly, article 24 of the Hague Regulations of 
1907 expressly states that ``the employment of measures 
necessary for obtaining information about the enemy and the 
country [is] considered permissible.'' See also L. Oppenheim, 
International Law vol. II Sec. 159 (7th ed. 1952) (``War cannot 
be waged without all kinds of information, about the forces and 
the intentions of the enemy . . . . To obtain the necessary 
information, it has always been considered lawful to employ 
spies . . . .''); Joseph R. Baker & Henry G. Crocker, The Laws 
of Land Warfare 197 (1919) (``Every belligerent has a right . . 
. to discover the signals of the enemy and . . . to seek to 
procure information regarding the enemy through the aid of 
secret agents.''); cf. J.M. Spaight, War Rights on Land 205 
(1911) (``[E]very nation employs spies; were a nation so 
quixotic as to refrain from doing so, it might as well sheathe 
its sword for ever. . . . Spies . . . are indispensably 
necessary to a general; and, other things being equal, that 
commander will be victorious who has the best secret 
service.'') (internal quotation marks omitted).
    In accordance with these well-established principles, the 
Supreme Court has consistently recognized the President's 
authority to conduct intelligence activities. See, e.g., Totten 
v. United States, 92 U.S. 105, 106 (1876) (recognizing 
President's authority to hire spies); Tenet v. Doe, 544 U.S. 1 
(2005) (reaffirming Totten and counseling against judicial 
interference with such matters); see also Chicago & S. Air 
Lines v. Waterman S.S. Corp., 333 U.S. 103, 111 (1948) (``The 
President, both as Commander-in-Chief and as the Nation's organ 
for foreign affairs, has available intelligence services whose 
reports neither are not and ought not to be published to the 
world.''); United States v. Curtiss-Wright Export Corp., 299 
U.S. 304, 320 (1936) (The President ``has his confidential 
sources of information. He has his agents in the form of 
diplomatic, consular, and other officials.''). Chief Justice 
John Marshall even described the gathering of intelligence as a 
military duty. See Tatum v. Laird, 444 F.2d 947, 952-53 (D.C. 
Cir. 1971) (``As Chief Justice John Marshall said of 
Washington, `A general must be governed by his intelligence and 
must regulate his measures by his information. It is his duty 
to obtain correct information . . . .' '') (quoting Foreword, 
U.S. Army Basic Field Manual, Vol. X, circa 1938), rev'd on 
other grounds, 408 U.S. 1 (1972).
    The United States, furthermore, has a long history of 
wartime surveillance--a history that can be traced to George 
Washington, who ``was a master of military espionage'' and 
``made frequent and effective use of secret intelligence in the 
second half of the eighteenth century.'' Rhodri Jeffreys-Jones, 
Cloak and Dollar: A History of American Secret Intelligence 11 
(2002); see generally id. at 11-23 (recounting Washington's use 
of intelligence); see also Haig v. Agee, 471 U.S. 159, 172 n.16 
(1981) (quoting General Washington's letter to an agent 
embarking upon an intelligence mission in 1777: ``The necessity 
of procuring good intelligence, is apparent and need not be 
further urged.''). As President in 1790, Washington obtained 
from Congress a ``secret fund'' to deal with foreign dangers 
and to be spent at his discretion. Jeffreys-Jones, supra, at 
22. The fund, which remained in use until the creation of the 
Central Intelligence Agency in the mid-twentieth century and 
gained ``longstanding acceptance within our constitutional 
structure,'' Halperin v. CIA, 629 F.2d 144, 158-59 (D.C. Cir. 
1980), was used ``for all purposes to which a secret service 
fund should or could be applied for the public benefit,'' 
including ``for persons sent publicly and secretly to search 
for important information, political or commercial,'' id. at 
159 (quoting Statement of Senator John Forsyth, Cong. Debates 
295 (Feb. 25, 1831)). See also Totten, 92 U.S. at 107 (refusing 
to examine payments from this fund lest the publicity make a 
``secret service'' ``impossible'').
    The interception of communications, in particular, has long 
been accepted as a fundamental method for conducting wartime 
surveillance. See, e.g., Greenspan, supra, at 326 (accepted and 
customary means for gathering intelligence ``include air 
reconnaissance and photography; ground reconnaissance; 
observation of enemy positions; interception of enemy messages, 
wireless and other; examination of captured documents; . . . 
and interrogation of prisoners and civilian inhabitants'') 
(emphasis added). Indeed, since its independence, the United 
States has intercepted communications for wartime intelligence 
purposes and, if necessary, has done so within its own borders. 
During the Revolutionary War, for example, George Washington 
received and used to his advantage reports from American 
intelligence agents on British military strength, British 
strategic intentions, and British estimates of American 
strength. See Jeffreys-Jones, supra, at 13. One source of 
Washington's intelligence was intercepted British mail. See 
Central Intelligence Agency, Intelligence in the War of 
Independence 31, 32 (1997). In fact, Washington himself 
proposed that one of his Generals ``contrive a means of opening 
[British letters] without breaking the seals, take copies of 
the contents, and then let them go on.'' Id. at 32 (``From that 
point on, Washington was privy to British intelligence pouches 
between New York and Canada.''); see generally Final Report of 
the Select Committee to Study Governmental Operations with 
respect to Intelligence Activities (the ``Church Committee''), 
S. Rep. No. 94-755, at Book VI, 9-17 (Apr. 23, 1976) 
(describing Washington's intelligence activities).
    More specifically, warrantless electronic surveillance of 
wartime communications has been conducted in the United States 
since electronic communications have existed, i.e., since at 
least the Civil War, when ``[t]elegraph wiretapping was common, 
and an important intelligence source for both sides.'' G.J.A. 
O'Toole, The Encyclopedia of American Intelligence and 
Espionage 498 (1988). Confederate General J.E.B. Stuart even 
``had his own personal wiretapper travel along with him in the 
field'' to intercept military telegraphic communications. 
Samuel Dash, et al., The Eavesdroppers 23 (1971); see also 
O'Toole, supra, at 121, 385-88, 496-98 (discussing Civil War 
surveillance methods such as wiretaps, reconnaissance balloons, 
semaphore interception, and cryptanalysis). Similarly, there 
was extensive use of electronic surveillance during the 
Spanish-American War. See Bruce W. Bidwell, History of the 
Military Intelligence Division, Department of the Army General 
Staff: 1775-1941, at 62 (1986). When an American expeditionary 
force crossed into northern Mexico to confront the forces of 
Pancho Villa in 1916, the Army ``frequently intercepted 
messages of the regime in Mexico City or the forces contesting 
its rule.'' David Alvarez, Secret Messages 6-7 (2000). Shortly 
after Congress declared war on Germany in World War I, 
President Wilson (citing only his constitutional powers and the 
joint resolution declaring war) ordered the censorship of 
messages sent outside the United States via submarine cables, 
telegraph, and telephone lines. See Exec. Order No. 2604 (Apr. 
28, 1917). During that war, wireless telegraphy ``enabled each 
belligerent to tap the messages of the enemy.'' Bidwell, supra, 
at 165 (quoting statement of Col. W. Nicolai, former head of 
the Secret Service of the High Command of the German Army, in 
W. Nicolai, The German Secret Service 21 (1924)).
    As noted in Part I, on May 21, 1940, President Roosevelt 
authorized warrantless electronic surveillance of persons 
suspected of subversive activities, including spying, against 
the United States. In addition, on December 8, 1941, the day 
after the attack on Pearl Harbor, President Roosevelt gave the 
Director of the FBI ``temporary powers to direct all news 
censorship and to control all other telecommunications traffic 
in and out of the United States.'' Jack A. Gottschalk, 
``Consistent with Security''. . . . A History of American 
Military Press Censorship, 5 Comm. & L. 35, 39 (1983) (emphasis 
added). See Memorandum for the Secretaries of War, Navy, State, 
and Treasury, the Postmaster General, and the Federal 
Communications Commission from Franklin D. Roosevelt (Dec. 8, 
1941). President Roosevelt soon supplanted that temporary 
regime by establishing an office for conducting such electronic 
surveillance in accordance with the War Powers Act of 1941. See 
Pub. L. No. 77-354, Sec. 303, 55 Stat. 838, 840-41 (Dec. 18, 
1941); Gottschalk, 5 Comm. & L. at 40. The President's order 
gave the Government of the United States access to 
``communications by mail, cable, radio, or other means of 
transmission passing between the United States and any foreign 
country.'' Id. See also Exec. Order No. 8985, Sec. 1, 6 Fed. 
Reg. 6625, 6625 (Dec. 19, 1941). In addition, the United States 
systematically listened surreptitiously to electronic 
communications as part of the war effort. See Dash, 
Eavesdroppers, at 30. During World War II, signals intelligence 
assisted in, among other things, the destruction of the German 
U-boat fleet by the Allied naval forces, see id. at 27, and the 
war against Japan, see O'Toole, supra, at 32, 323-24. In 
general, signals intelligence ``helped to shorten the war by 
perhaps two years, reduce the loss of life, and make inevitable 
an eventual Allied victory.'' Carl Boyd, American Command of 
the Sea Through Carriers, Codes, and the Silent Service: World 
War II and Beyond, 27 (1995); see also Alvarez, supra, at 1 
(``There can be little doubt that signals intelligence 
contributed significantly to the military defeat of the 
Axis.''). Significantly, not only was wiretapping in World War 
II used ``extensively by military intelligence and secret 
service personnel in combat areas abroad,'' but also ``by the 
FBI and secret service in this country.'' Dash, supra, at 30.
    In light of the long history of prior wartime practice, the 
NSA activities fit squarely within the sweeping terms of the 
AUMF. The use of signals intelligence to identify and pinpoint 
the enemy is a traditional component of wartime military 
operations--or, to use the terminology of Hamdi, a 
``fundamental and accepted . . . incident to war,'' 542 U.S. at 
518 (plurality opinion)--employed to defeat the enemy and to 
prevent enemy attacks in the United States. Here, as in other 
conflicts, the enemy may use public communications networks, 
and some of the enemy may already be in the United States. 
Although those factors may be present in this conflict to a 
greater degree than in the past, neither is novel. Certainly, 
both factors were well known at the time Congress enacted the 
AUMF. Wartime interception of international communications made 
by the enemy thus should be understood, no less than the 
wartime detention at issue in Hamdi, as one of the basic 
methods of engaging and defeating the enemy that Congress 
authorized in approving ``all necessary and appropriate force'' 
that the President would need to defend the Nation. AUMF 
Sec. 2(a) (emphasis added).
    Accordingly, the President has the authority to conduct 
warrantless electronic surveillance against the declared enemy 
of the United States in a time of armed conflict. That 
authority derives from the Constitution, and is reinforced by 
the text and purpose of the AUMF, the nature of the threat 
posed by al Qaeda that Congress authorized the President to 
repel, and the long-established understanding that electronic 
surveillance is a fundamental incident of the use of military 
force. The President's power in authorizing the NSA activities 
is at its zenith because he has acted ``pursuant to an express 
or implied authorization of Congress.'' Youngstown, 343 U.S. at 
635 (Jackson, J., concurring).
III. The NSA activities are consistent with the foreign intelligence 
        surveillance act
    The President's exercise of his constitutional authority to 
conduct warrantless wartime electronic surveillance of the 
enemy, as confirmed and supplemented by statute in the AUMF, is 
fully consistent with the requirements of the Foreign 
Intelligence Surveillance Act (``FISA'').\5\ FISA is a 
critically important tool in the War on Terror. The United 
States makes full use of the authorities available under FISA 
to gather foreign intelligence information, including 
authorities to intercept communications, conduct physical 
searches, and install and use pen registers and trap and trace 
devices. While FISA establishes certain procedures that must be 
followed for these authorities to be used (procedures that 
usually involve applying for and obtaining an order from a 
special court), FISA also expressly contemplates that a later 
legislative enactment could authorize electronic surveillance 
outside the procedures set forth in FISA itself. The AUMF 
constitutes precisely such an enactment. To the extent there is 
any ambiguity on this point, the canon of constitutional 
avoidance requires that such ambiguity be resolved in favor of 
the President's authority to conduct the communications 
intelligence activities he has described. Finally, if FISA 
could not be read to allow the President to authorize the NSA 
activities during the current congressionally authorized armed 
conflict with al Qaeda, FISA would be unconstitutional as 
applied in this narrow context.
---------------------------------------------------------------------------
    \5\ To avoid revealing details about the operation of the program, 
it is assumed for purposes of this paper that the activities described 
by the President constitute ``electronic surveillance,'' as defined by 
FISA, 50 U.S.C. Sec. 1801(f).
---------------------------------------------------------------------------
            A. The requirements of FISA
    FISA was enacted in 1978 to regulate ``electronic 
surveillance,'' particularly when conducted to obtain ``foreign 
intelligence information,'' as those terms are defined in 
section 101 of FISA, 50 U.S.C. Sec. 1801. As a general matter, 
the statute requires that the Attorney General approve an 
application for an order from a special court composed of 
Article III judges and created by FISA--the Foreign 
Intelligence Surveillance Court (``FISC''). See 50 U.S.C. 
Sec. Sec. 1803-1804. The application must demonstrate, among 
other things, that there is probable cause to believe that the 
target is a foreign power or an agent of a foreign power. See 
id. Sec. 1805(a)(3)(A). It must also contain a certification 
from the Assistant to the President for National Security 
Affairs or an officer of the United States appointed by the 
President with the advice and consent of the Senate and having 
responsibilities in the area of national security or defense 
that the information sought is foreign intelligence information 
and cannot reasonably be obtained by normal investigative 
means. See id. Sec. 1804(a)(7). FISA further requires the 
Government to state the means that it proposes to use to obtain 
the information and the basis for its belief that the 
facilities at which the surveillance will be directed are being 
used or are about to be used by a foreign power or an agent of 
a foreign power. See id. Sec. 1804(a)(4), (a)(8).
    FISA was the first congressional measure that sought to 
impose restrictions on the Executive Branch's authority to 
engage in electronic surveillance for foreign intelligence 
purposes, an authority that, as noted above, had been 
repeatedly recognized by the federal courts. See Americo R. 
Cinquegrana, The Walls (and Wires) Have Ears: The Background 
and First Ten Years of the Foreign Intelligence Surveillance 
Act of 1978, 137 U. Penn. L. Rev. 793, 810 (1989) (stating that 
the ``status of the President's inherent authority'' to conduct 
surveillance ``formed the core of subsequent legislative 
deliberations'' leading to the enactment of FISA). To that end, 
FISA modified a provision in Title III that previously had 
disclaimed any intent to have laws governing wiretapping 
interfere with the President's constitutional authority to 
gather foreign intelligence. Prior to the passage of FISA, 
section 2511(3) of title 18 had stated that ``[n]othing 
contained in this chapter or in section 605 of the 
Communications Act of 1934 . . . shall limit the constitutional 
power of the President to take such measures as he deems 
necessary to protect the Nation against actual or potential 
attack or other hostile acts of a foreign power, to obtain 
foreign intelligence information deemed essential to the 
security of the United States, or to protect national security 
information against foreign intelligence activities.'' 18 
U.S.C. Sec. 2511(3) (1970). FISA replaced that provision with 
an important, though more limited, preservation of authority 
for the President. See Pub. L. No. 95-511, Sec. 201(b), (c), 92 
Stat. 1783, 1797 (1978), codified at 18 U.S.C. Sec. 2511(2)(f) 
(West Supp. 2005) (carving out from statutory regulation only 
the acquisition of intelligence information from 
``international or foreign communications'' and ``foreign 
intelligence activities . . . involving a foreign electronic 
communications system'' as long as they are accomplished 
``utilizing a means other than electronic surveillance as 
defined in section 101'' of FISA). Congress also defined 
``electronic surveillance,'' 50 U.S.C. Sec. 1801(f), carefully 
and somewhat narrowly.\6\
---------------------------------------------------------------------------
    \6\ FISA's legislative history reveals that these provisions were 
intended to exclude certain intelligence activities conducted by the 
National Security Agency from the coverage of FISA. According to the 
report of the Senate Judiciary Committee on FISA, ``this provision 
[referencing what became the first part of section 2511(2)(f)] is 
designed to make clear that the legislation does not deal with 
international signals intelligence activities as currently engaged in 
by the National Security Agency and electronic surveillance conducted 
outside the United States.'' S. Rep. No. 95-604, at 64 (1978), 
reprinted in 1978 U.S.C.C.A.N. 3904, 3965. The legislative history also 
makes clear that the definition of ``electronic surveillance'' was 
crafted for the same reason. See id. at 33-34, 1978 U.S.C.C.A.N. at 
3934-36. FISA thereby ``adopts the view expressed by the Attorney 
General during the hearings that enacting statutory controls to 
regulate the National Security Agency and the surveillance of Americans 
abroad raises problems best left to separate legislation.'' Id. at 64, 
1978 U.S.C.C.A.N. at 3965. Such legislation placing limitations on 
traditional NSA activities was drafted, but never passed. See National 
Intelligence Reorganization and Reform Act of 1978: Hearings Before the 
Senate Select Committee on Intelligence, 95th Cong., 2d Sess. 999-1007 
(1978) (text of unenacted legislation). And Congress understood that 
the NSA surveillance that it intended categorically to exclude from 
FISA could include the monitoring of international communications into 
or out of the United States of U.S. citizens. The report specifically 
referred to the Church Committee report for its description of the 
NSA's activities, S. Rep. No. 95-604, at 64 n.63, 1978 U.S.C.C.A.N. at 
3965-66 n.63, which stated that ``the NSA intercepts messages passing 
over international lines of communication, some of which have one 
terminal within the United States. Traveling over these lines of 
communication, especially those with one terminal in the United States, 
are messages of Americans. . . .'' S. Rep. 94-755, at Book II, 308 
(1976). Congress's understanding in the legislative history of FISA 
that such communications could be intercepted outside FISA procedures 
is notable.
---------------------------------------------------------------------------
    In addition, Congress addressed, to some degree, the manner 
in which FISA might apply after a formal declaration of war by 
expressly allowing warrantless surveillance for a period of 
fifteen days following such a declaration. Section 111 of FISA 
allows the President to ``authorize electronic surveillance 
without a court order under this subchapter to acquire foreign 
intelligence information for a period not to exceed fifteen 
calendar days following a declaration of war by the Congress.'' 
50 U.S.C. Sec. 1811.
    The legislative history of FISA shows that Congress 
understood it was legislating on fragile constitutional ground 
and was pressing or even exceeding constitutional limits in 
regulating the President's authority in the field of foreign 
intelligence. The final House Conference Report, for example, 
recognized that the statute's restrictions might well 
impermissibly infringe on the President's constitutional 
powers. That report includes the extraordinary acknowledgment 
that ``[t]he conferees agree that the establishment by this act 
of exclusive means by which the President may conduct 
electronic surveillance does not foreclose a different decision 
by the Supreme Court.'' H.R. Conf. Rep. No. 95-1720, at 35, 
reprinted in 1978 U.S.C.C.A.N. 4048, 4064. But, invoking 
Justice Jackson's concurrence in the Steel Seizure case, the 
Conference Report explained that Congress intended in FISA to 
exert whatever power Congress constitutionally had over the 
subject matter to restrict foreign intelligence surveillance 
and to leave the President solely with whatever inherent 
constitutional authority he might be able to invoke against 
Congress's express wishes. Id. The Report thus explains that 
``[t]he intent of the conferees is to apply the standard set 
forth in Justice Jackson's concurring opinion in the Steel 
Seizure Case: `When a President takes measures incompatible 
with the express or implied will of Congress, his power is at 
the lowest ebb, for then he can rely only upon his own 
constitutional power minus any constitutional power of Congress 
over the matter.' '' Id. (quoting Youngstown Sheet & Tube Co. 
v. Sawyer, 343 U.S. 579, 637 (1952) (Jackson, J., concurring)); 
see also S. Rep. No. 95-604, at 64, reprinted in 1978 
U.S.C.C.A.N. at 3966 (same); see generally Elizabeth B. Bazen 
et al., Congressional Research Service, Re: Presidential 
Authority to Conduct Warrantless Electronic Surveillance to 
Gather Foreign Intelligence Information 28-29 (Jan. 5, 2006). 
It is significant, however, that Congress did not decide 
conclusively to continue to push the boundaries of its 
constitutional authority in wartime. Instead, Congress reserved 
the question of the appropriate procedures to regulate 
electronic surveillance in time of war, and established a 
fifteen-day period during which the President would be 
permitted to engage in electronic surveillance without 
complying with FISA's express procedures and during which 
Congress would have the opportunity to revisit the issue. See 
50 U.S.C. Sec. 1811; H.R. Conf. Rep. No. 95-1720, at 34, 
reprinted in 1978 U.S.C.C.A.N. at 4063 (noting that the purpose 
of the fifteen-day period following a declaration of war in 
section 111 of FISA was to ``allow time for consideration of 
any amendment to this act that may be appropriate during a 
wartime emergency'').
            B. FISA contemplates and allows surveillance authorized 
                    ``by statute''
    Congress did not attempt through FISA to prohibit the 
Executive Branch from using electronic surveillance. Instead, 
Congress acted to bring the exercise of that power under more 
stringent congressional control. See, e.g., H. Conf. Rep. No. 
95-1720, at 32, reprinted in 1978 U.S.C.C.A.N. 4048, 4064. 
Congress therefore enacted a regime intended to supplant the 
President's reliance on his own constitutional authority. 
Consistent with this overriding purpose of bringing the use of 
electronic surveillance under congressional control and with 
the commonsense notion that the Congress that enacted FISA 
could not bind future Congresses, FISA expressly contemplates 
that the Executive Branch may conduct electronic surveillance 
outside FISA's express procedures if and when a subsequent 
statute authorizes such surveillance.
    Thus, section 109 of FISA prohibits any person from 
intentionally ``engag[ing] . . . in electronic surveillance 
under color of law except as authorized by statute.'' 50 U.S.C. 
Sec. 1809(a)(1) (emphasis added). Because FISA's prohibitory 
provision broadly exempts surveillance ``authorized by 
statute,'' the provision demonstrates that Congress did not 
attempt to regulate through FISA electronic surveillance 
authorized by Congress through a subsequent enactment. The use 
of the term ``statute'' here is significant because it strongly 
suggests that any subsequent authorizing statute, not merely 
one that amends FISA itself, could legitimately authorize 
surveillance outside FISA's standard procedural requirements. 
Compare 18 U.S.C. Sec. 2511(1) (``Except as otherwise 
specifically provided in this chapter any person who--(a) 
intentionally intercepts . . . any wire, oral, or electronic 
communication[] . . . shall be punished. . . .'') (emphasis 
added); id. Sec. 2511(2)(e) (providing a defense to liability 
to individuals ``conduct[ing] electronic surveillance, . . . as 
authorized by that Act [FISA]'') (emphasis added). In enacting 
FISA, therefore, Congress contemplated the possibility that the 
President might be permitted to conduct electronic surveillance 
pursuant to a later-enacted statute that did not incorporate 
all of the procedural requirements set forth in FISA or that 
did not expressly amend FISA itself.
    To be sure, the scope of this exception is rendered less 
clear by the conforming amendments that FISA made to chapter 
119 of title 18--the portion of the criminal code that provides 
the mechanism for obtaining wiretaps for law enforcement 
purposes. Before FISA was enacted, chapter 119 made it a 
criminal offense for any person to intercept a communication 
except as specifically provided in that chapter. See 18 U.S.C. 
Sec. 2511(1)(a), (4)(a). Section 201(b) of FISA amended that 
chapter to provide an exception from criminal liability for 
activities conducted pursuant to FISA. Specifically, FISA added 
18 U.S.C. Sec. 2511(2)(e), which provides that it is not 
unlawful for ``an officer, employee, or agent of the United 
States . . . to conduct electronic surveillance, as defined in 
section 101 of the Foreign Intelligence Surveillance Act of 
1978, as authorized by that Act.'' Id. Sec. 2511(2)(e). 
Similarly, section 201(b) of FISA amended chapter 119 to 
provide that ``procedures in this chapter [or chapter 121 
(addressing access to stored wire and electronic communications 
and customer records)] and the Foreign Intelligence 
Surveillance Act of 1978 shall be the exclusive means by which 
electronic surveillance, as defined in section 101 of such Act, 
and the interception of domestic wire, oral, and electronic 
communications may be conducted.'' Id. Sec. 2511(2)(f) (West 
Supp. 2005).\7\
---------------------------------------------------------------------------
    \7\ The bracketed portion was added in 1986 amendments to section 
2511(2)(f). See Pub. L. No. 99-508 Sec. 101(b)(3), 100 Stat. 1848, 
1850.
---------------------------------------------------------------------------
    The amendments that section 201(b) of FISA made to title 18 
are fully consistent, however, with the conclusion that FISA 
contemplates that a subsequent statute could authorize 
electronic surveillance outside FISA's express procedural 
requirements. Section 2511(2)(e) of title 18, which provides 
that it is ``not unlawful'' for an officer of the United States 
to conduct electronic surveillance ``as authorized by'' FISA, 
is best understood as a safe-harbor provision. Because of 
section 109, the protection offered by section 2511(2)(e) for 
surveillance ``authorized by'' FISA extends to surveillance 
that is authorized by any other statute and therefore excepted 
from the prohibition of section 109. In any event, the purpose 
of section 2511(2)(e) is merely to make explicit what would 
already have been implicit--that those authorized by statute to 
engage in particular surveillance do not act unlawfully when 
they conduct such surveillance. Thus, even if that provision 
had not been enacted, an officer conducting surveillance 
authorized by statute (whether FISA or some other law) could 
not reasonably have been thought to be violating Title III. 
Similarly, section 2511(2)(e) cannot be read to require a 
result that would be manifestly unreasonable--exposing a 
federal officer to criminal liability for engaging in 
surveillance authorized by statute, merely because the 
authorizing statute happens not to be FISA itself.
    Nor could 18 U.S.C. Sec. 2511(2)(f), which provides that 
the ``procedures in this chapter . . . and the Foreign 
Intelligence Surveillance Act of 1978 shall be the exclusive 
means by which electronic surveillance . . . may be 
conducted,'' have been intended to trump the commonsense 
approach of section 109 and preclude a subsequent Congress from 
authorizing the President to engage in electronic surveillance 
through a statute other than FISA, using procedures other than 
those outlined in FISA or chapter 119 of title 18. The 
legislative history of section 2511(2)(f) clearly indicates an 
intent to prevent the President from engaging in surveillance 
except as authorized by Congress, see H.R. Conf. Rep. No. 95-
1720, at 32, reprinted in 1978 U.S.C.C.A.N. 4048, 4064, which 
explains why section 2511(2)(f) set forth all then-existing 
statutory restrictions on electronic surveillance. Section 
2511(2)(f)'s reference to ``exclusive means'' reflected the 
state of statutory authority for electronic surveillance in 
1978 and cautioned the President not to engage in electronic 
surveillance outside congressionally sanctioned parameters. It 
is implausible to think that, in attempting to limit the 
President's authority, Congress also limited its own future 
authority by barring subsequent Congresses from authorizing the 
Executive to engage in surveillance in ways not specifically 
enumerated in FISA or chapter 119, or by requiring a subsequent 
Congress specifically to amend FISA and section 2511(2)(f). 
There would be a serious question as to whether the Ninety-
Fifth Congress could have so tied the hands of its successors. 
See, e.g., Fletcher v. Peck, 10 U.S. (6 Cranch) 87, 135 (1810) 
(noting that ``one legislature cannot abridge the powers of a 
succeeding legislature''); Reichelderfer v. Quinn, 287 U.S. 
315, 318 (1932) (``[T]he will of a particular Congress . . . 
does not impose itself upon those to follow in succeeding 
years''); Lockhart v. United States, 126 S. Ct. 699, 703 (2005) 
(Scalia, J., concurring) (collecting precedent); 1 W. 
Blackstone, Commentaries on the Laws of England 90 (1765) 
(``Acts of parliament derogatory from the power of subsequent 
parliaments bind not''). In the absence of a clear statement to 
the contrary, it cannot be presumed that Congress attempted to 
abnegate its own authority in such a way.
    Far from a clear statement of congressional intent to bind 
itself, there are indications that section 2511(2)(f) cannot be 
interpreted as requiring that all electronic surveillance and 
domestic interception be conducted under FISA's enumerated 
procedures or those of chapter 119 of title 18 until and unless 
those provisions are repealed or amended. Even when section 
2511(2)(f) was enacted (and no subsequent authorizing statute 
existed), it could not reasonably be read to preclude all 
electronic surveillance conducted outside the procedures of 
FISA or chapter 119 of title 18. In 1978, use of a pen register 
or trap and trace device constituted electronic surveillance as 
defined by FISA. See 50 U.S.C. Sec. Sec. 1801(f), (n). Title I 
of FISA provided procedures for obtaining court authorization 
for the use of pen registers to obtain foreign intelligence 
information. But the Supreme Court had, just prior to the 
enactment of FISA, held that chapter 119 of title 18 did not 
govern the use of pen registers. See United States v. New York 
Tel. Co., 434 U.S. 159, 165-68 (1977). Thus, if section 
2511(2)(f) were to be read to permit of no exceptions, the use 
of pen registers for purposes other than to collect foreign 
intelligence information would have been unlawful because such 
use would not have been authorized by the ``exclusive'' 
procedures of section 2511(2)(f), i.e., FISA and chapter 119. 
But no court has held that pen registers could not be 
authorized outside the foreign intelligence context. Indeed, 
FISA appears to have recognized this issue by providing a 
defense to liability for any official who engages in electronic 
surveillance under a search warrant or court order. See 50 
U.S.C. Sec. 1809(b). (The practice when FISA was enacted was 
for law enforcement officers to obtain search warrants under 
the Federal Rules of Criminal Procedure authorizing the 
installation and use of pen registers. See S. 1667, A Bill to 
Amend Title 18, United States Code, with Respect to the 
Interception of Certain Communications, Other Forms of 
Surveillance, and for Other Purposes: Hearing Before the 
Subcomm. On Patents, Copyrights and Trademarks of the Senate 
Comm. on the Judiciary, 99th Cong. 57 (1985) (prepared 
statement of James Knapp, Deputy Assistant Attorney General, 
Criminal Division)).\8\
---------------------------------------------------------------------------
    \8\ Alternatively, section 109(b) may be read to constitute a 
``procedure'' in FISA or to incorporate procedures from sources other 
than FISA (such as the Federal Rules of Criminal Procedure or state 
court procedures), and in that way to satisfy section 2511(2)(f). But 
if section 109(b)'s defense can be so read, section 109(a) should also 
be read to constitute a procedure or incorporate procedures not 
expressly enumerated in FISA.
---------------------------------------------------------------------------
    In addition, section 2511(2)(a)(ii) authorizes 
telecommunications providers to assist officers of the 
Government engaged in electronic surveillance when the Attorney 
General certifies that ``no warrant or court order is required 
by law [and] that all statutory requirements have been met.'' 
18 U.S.C. Sec. 2511(2)(a)(ii).\9\ If the Attorney General can 
certify, in good faith, that the requirements of a subsequent 
statute authorizing electronic surveillance are met, service 
providers are affirmatively and expressly authorized to assist 
the Government. Although FISA does allow the Government to 
proceed without a court order in several situations, see 50 
U.S.C. Sec. 1805(f) (emergencies); id. Sec. 1802 (certain 
communications between foreign governments), this provision 
specifically lists only Title III's emergency provision but 
speaks generally to Attorney General certification. That 
reference to Attorney General certification is consistent with 
the historical practice in which Presidents have delegated to 
the Attorney General authority to approve warrantless 
surveillance for foreign intelligence purposes. See, e.g., 
United States v. United States District Court, 444 F.2d 651, 
669-71 (6th Cir. 1971) (reproducing as an appendix memoranda 
from Presidents Roosevelt, Truman, and Johnson). Section 
2511(2)(a)(ii) thus suggests that telecommunications providers 
can be authorized to assist with warrantless electronic 
surveillance when such surveillance is authorized by law 
outside FISA.
---------------------------------------------------------------------------
    \9\ Section 2511(2)(a)(ii) states: ``Notwithstanding any other law, 
providers of wire or electronic communication service, . . . are 
authorized by law to provide information, facilities, or technical 
assistance to persons authorized by law to intercept . . . 
communications or to conduct electronic surveillance, as defined [by 
FISA], if such provider . . . has been provided with . . . a 
certification in writing by [specified persons proceeding under Title 
III's emergency provision] or the Attorney General of the United States 
that no warrant or court order is required by law, that all statutory 
requirements have been met, and that the specific assistance is 
required.''
---------------------------------------------------------------------------
    In sum, by expressly and broadly excepting from its 
prohibition electronic surveillance undertaken ``as authorized 
by statute,'' section 109 of FISA permits an exception to the 
``procedures'' of FISA referred to in 18 U.S.C. Sec. 2511(2)(f) 
where authorized by another statute, even if the other 
authorizing statute does not specifically amend section 
2511(2)(f).
            C. The AUMF is a ``statute'' authorizing surveillance 
                    outside the confines of FISA
    The AUMF qualifies as a ``statute'' authorizing electronic 
surveillance within the meaning of section 109 of FISA.
    First, because the term ``statute'' historically has been 
given broad meaning, the phrase ``authorized by statute'' in 
section 109 of FISA must be read to include joint resolutions 
such as the AUMF. See American Fed'n of Labor v. Watson, 327 
U.S. 582, 592-93 (1946) (finding the term ``statute'' as used 
in 28 U.S.C. Sec. 380 to mean ``a compendious summary of 
various enactments, by whatever method they may be adopted, to 
which a State gives her sanction''); Black's Law Dictionary 
1410 (6th ed. 1990) (defining ``statute'' broadly to include 
any ``formal written enactment of a legislative body,'' and 
stating that the term is used ``to designate the legislatively 
created laws in contradistinction to court decided or unwritten 
laws''). It is thus of no significance to this analysis that 
the AUMF was enacted as a joint resolution rather than a bill. 
See, e.g., Ann Arbor R.R. Co. v. United States, 281 U.S. 658, 
666 (1930) (joint resolutions are to be construed by applying 
``the rules applicable to legislation in general''); United 
States ex rel. Levey v. Stockslager, 129 U.S. 470, 475 (1889) 
(joint resolution had ``all the characteristics and effects'' 
of statute that it suspended); Padilla ex rel. Newman v. Bush, 
233 F. Supp. 2d 564, 598 (S.D.N.Y. 2002) (in analyzing the 
AUMF, finding that there is ``no relevant constitutional 
difference between a bill and a joint resolution''), rev'd sub 
nom. on other grounds, Rumsfeld v. Padilla, 352 F.3d 695 (2d 
Cir. 2003), rev'd, 542 U.S. 426 (2004); see also Letter for the 
Hon. John Conyers, Jr., U.S. House of Representatives, from 
Prof. Laurence H. Tribe at 3 (Jan. 6, 2006) (term ``statute'' 
in section 109 of FISA ``of course encompasses a joint 
resolution presented to and signed by the President'').
    Second, the longstanding history of communications 
intelligence as a fundamental incident of the use of force and 
the Supreme Court's decision in Hamdi v. Rumsfeld strongly 
suggest that the AUMF satisfies the requirement of section 109 
of FISA for statutory authorization of electronic surveillance. 
As explained above, it is not necessary to demarcate the outer 
limits of the AUMF to conclude that it encompasses electronic 
surveillance targeted at the enemy. Just as a majority of the 
Court concluded in Hamdi that the AUMF authorizes detention of 
U.S. citizens who are enemy combatants without expressly 
mentioning the President's long-recognized power to detain, so 
too does it authorize the use of electronic surveillance 
without specifically mentioning the President's equally long-
recognized power to engage in communications intelligence 
targeted at the enemy. And just as the AUMF satisfies the 
requirement in 18 U.S.C. Sec. 4001(a) that no U.S. citizen be 
detained ``except pursuant to an Act of Congress,'' so too does 
it satisfy section 109's requirement for statutory 
authorization of electronic surveillance.\10\ In authorizing 
the President's use of force in response to the September 11th 
attacks, Congress did not need to comb through the United 
States Code looking for those restrictions that it had placed 
on national security operations during times of peace and 
designate with specificity each traditional tool of military 
force that it sought to authorize the President to use. There 
is no historical precedent for such a requirement: 
authorizations to use military force traditionally have been 
couched in general language. Indeed, prior administrations have 
interpreted joint resolutions declaring war and authorizing the 
use of military force to authorize expansive collection of 
communications into and out of the United States.\11\
---------------------------------------------------------------------------
    \10\ It might be argued that Congress dealt more comprehensively 
with electronic surveillance in FISA than it did with detention in 18 
U.S.C. Sec. 4001(a). Thus, although Congress prohibited detention 
``except pursuant to an Act of Congress,'' it combined the analogous 
prohibition in FISA (section 109(a)) with section 2511(2)(f)'s 
exclusivity provision. See Letter to the Hon. Bill Frist, Majority 
Leader, U.S. Senate, from Professor Curtis A. Bradley et al. at 5 n.6 
(Jan. 9, 2006) (noting that section 4001(a) does not ``attempt[] to 
create an exclusive mechanism for detention''). On closer examination, 
however, it is evident that Congress has regulated detention far more 
meticulously than these arguments suggest. Detention is the topic of 
much of the Criminal Code, as well as a variety of other statutes, 
including those providing for civil commitment of the mentally ill and 
confinement of alien terrorists. The existence of these statutes and 
accompanying extensive procedural safeguards, combined with the 
substantial constitutional issues inherent in detention, see, e.g., 
Hamdi, 542 U.S. at 574-75 (Scalia, J., dissenting), refute any such 
argument.
    \11\ As noted above, in intercepting communications, President 
Wilson relied on his constitutional authority and the joint resolution 
declaring war and authorizing the use of military force, which, as 
relevant here, provided ``that the President [is] authorized and 
directed to employ the entire naval and military forces of the United 
States and the resources of the Government to carry on war against the 
Imperial German Government; and to bring the conflict to a successful 
termination all of the resources of the country are hereby pledged by 
the Congress of the United States.'' Joint Resolution of Apr. 6, 1917, 
ch. 1, 40 Stat. 1. The authorization did not explicitly mention 
interception of communications.
---------------------------------------------------------------------------
    Moreover, crucial to the Framers' decision to vest the 
President with primary constitutional authority to defend the 
Nation from foreign attack is the fact that the Executive can 
act quickly, decisively, and flexibly as needed. For Congress 
to have a role in that process, it must be able to act with 
similar speed, either to lend its support to, or to signal its 
disagreement with, proposed military action. Yet the need for 
prompt decisionmaking in the wake of a devastating attack on 
the United States is fundamentally inconsistent with the notion 
that to do so Congress must legislate at a level of detail more 
in keeping with a peacetime budget reconciliation bill. In 
emergency situations, Congress must be able to use broad 
language that effectively sanctions the President's use of the 
core incidents of military force. That is precisely what 
Congress did when it passed the AUMF on September 14, 2001--
just three days after the deadly attacks on America. The 
Capitol had been evacuated on September 11th, and Congress was 
meeting in scattered locations. As an account emerged of who 
might be responsible for these attacks, Congress acted quickly 
to authorize the President to use ``all necessary and 
appropriate force'' against the enemy that he determines was 
involved in the September 11th attacks. Under these 
circumstances, it would be unreasonable and wholly impractical 
to demand that Congress specifically amend FISA in order to 
assist the President in defending the Nation. Such specificity 
would also have been self-defeating because it would have 
apprised our adversaries of some of our most sensitive methods 
of intelligence gathering.\12\
---------------------------------------------------------------------------
    \12\ Some have suggested that the Administration declined to seek a 
specific amendment to FISA allowing the NSA activities ``because it was 
advised that Congress would reject such an amendment,'' Letter to the 
Hon. Bill Frist, Majority Leader, U.S. Senate, from Professor Curtis A. 
Bradley et al. 4 & n.4 (Jan. 9, 2005), and they have quoted in support 
of that assertion the Attorney General's statement that certain Members 
of Congress advised the Administration that legislative relief ``would 
be difficult, if not impossible.'' Id. at 4 n.4. As the Attorney 
General subsequently indicated, however, the difficulty with such 
specific legislation was that it could not be enacted ``without 
compromising the program.'' See Remarks by Homeland Security Secretary 
Chertoff and Attorney General Gonzales on the USA PATRIOT Act (Dec. 21, 
2005), available at http://www.dhs.gov/dhspublic/display?content=5285.
---------------------------------------------------------------------------
    Section 111 of FISA, 50 U.S.C. Sec. 1811, which authorizes 
the President, ``[n]otwithstanding any other law,'' to conduct 
``electronic surveillance without a court order under this 
subchapter to acquire foreign intelligence information for a 
period not to exceed fifteen calendar days following a 
declaration of war by Congress,'' does not require a different 
reading of the AUMF. See also id. Sec. 1844 (same provision for 
pen registers); id. Sec. 1829 (same provision for physical 
searches). Section 111 cannot reasonably be read as Congress's 
final word on electronic surveillance during wartime, thus 
permanently limiting the President in all circumstances to a 
mere fifteen days of warrantless military intelligence 
gathering targeted at the enemy following a declaration of war. 
Rather, section 111 represents Congress's recognition that it 
would likely have to return to the subject and provide 
additional authorization to conduct warrantless electronic 
surveillance outside FISA during time of war. The Conference 
Report explicitly stated the conferees' ``inten[t] that this 
[fifteen-day] period will allow time for consideration of any 
amendment to this act that may be appropriate during a wartime 
emergency.'' H.R. Conf. Rep. No. 95-1720, at 34, reprinted in 
1978 U.S.C.C.A.N. at 4063. Congress enacted section 111 so that 
the President could conduct warrantless surveillance while 
Congress considered supplemental wartime legislation.
    Nothing in the terms of section 111 disables Congress from 
authorizing such electronic surveillance as a traditional 
incident of war through a broad, conflict-specific 
authorization for the use of military force, such as the AUMF. 
Although the legislative history of section 111 indicates that 
in 1978 some Members of Congress believed that any such 
authorization would come in the form of a particularized 
amendment to FISA itself, section 111 does not require that 
result. Nor could the Ninety-Fifth Congress tie the hands of a 
subsequent Congress in this way, at least in the absence of far 
clearer statutory language expressly requiring that result. See 
supra, pp. 21-22; compare, e.g., War Powers Resolution, Sec. 8, 
50 U.S.C. Sec. 1547(a) (``Authority to introduce United States 
Armed Forces into hostilities . . . shall not be inferred . . . 
from any provision of law . . . unless such provision 
specifically authorizes [such] introduction . . . and states 
that it is intended to constitute specific statutory 
authorization within the meaning of this chapter.''); 10 U.S.C. 
Sec. 401 (stating that any other provision of law providing 
assistance to foreign countries to detect and clear landmines 
shall be subject to specific limitations and may be construed 
as superseding such limitations ``only if, and to the extent 
that, such provision specifically refers to this section and 
specifically identifies the provision of this section that is 
to be considered superseded or otherwise inapplicable''). An 
interpretation of section 111 that would disable Congress from 
authorizing broader electronic surveillance in that form can be 
reconciled neither with the purposes of section 111 nor with 
the well-established proposition that ``one legislature cannot 
abridge the powers of a succeeding legislature.'' Fletcher v. 
Peck, 10 U.S. (6 Cranch) at 135; see supra Part II.B. For these 
reasons, the better interpretation is that section 111 was not 
intended to, and did not, foreclose Congress from using the 
AUMF as the legal vehicle for supplementing the President's 
existing authority under FISA in the battle against al Qaeda.
    The contrary interpretation of section 111 also ignores the 
important differences between a formal declaration of war and a 
resolution such as the AUMF. As a historical matter, a formal 
declaration of war was no longer than a sentence, and thus 
Congress would not expect a declaration of war to outline the 
extent to which Congress authorized the President to engage in 
various incidents of waging war. Authorizations for the use of 
military force, by contrast, are typically more detailed and 
are made for the specific purpose of reciting the manner in 
which Congress has authorized the President to act. Thus, 
Congress could reasonably expect that an authorization for the 
use of military force would address the issue of wartime 
surveillance, while a declaration of war would not. Here, the 
AUMF declares that the Nation faces ``an unusual and 
extraordinary threat,'' acknowledges that ``the President has 
authority under the Constitution to take action to deter and 
prevent acts of international terrorism against the United 
States,'' and provides that the President is authorized ``to 
use all necessary and appropriate force'' against those ``he 
determines'' are linked to the September 11th attacks. AUMF 
pmbl., Sec. 2. This sweeping language goes far beyond the bare 
terms of a declaration of war. Compare, e.g., Act of Apr. 25, 
1898, ch. 189, 30 Stat. 364 (``First. That war be, and the same 
is hereby declared to exist . . . between the United States of 
America and the Kingdom of Spain.'').
    Although legislation that has included a declaration of war 
has often also included an authorization of the President to 
use force, these provisions are separate and need not be 
combined in a single statute. See, e.g., id. (``Second. That 
the President of the United States be, and he hereby is, 
directed and empowered to use the entire land and naval forces 
of the United States, and to call into the actual service of 
the United States the militia of the several states, to such 
extent as may be necessary to carry this Act into effect.'') 
(emphasis added). Moreover, declarations of war have legal 
significance independent of any additional authorization of 
force that might follow. See, e.g., Louis Henkin, Foreign 
Affairs and the U.S. Constitution 75 (2d ed. 1996) (explaining 
that a formal state of war has various legal effects, such as 
terminating diplomatic relations, and abrogating or suspending 
treaty obligations and international law rights and duties); 
see also id. at 370 n.65 (speculating that one reason to fight 
an undeclared war would be to ``avoid the traditional 
consequences of declared war on relations with third nations or 
even . . . belligerents'').
    In addition, section 111 does not cover the vast majority 
of modern military conflicts. The last declared war was World 
War II. Indeed, the most recent conflict prior to the passage 
of FISA, Vietnam, was fought without a formal declaration of 
war. In addition, the War Powers Resolution, enacted less than 
five years before FISA, clearly recognizes the distinctions 
between formal declarations of war and authorizations of force 
and demonstrates that, if Congress had wanted to include such 
authorizations in section 111, it knew how to do so. See, e.g., 
50 U.S.C. Sec. 1544(b) (attempting to impose certain 
consequences 60 days after reporting the initiation of 
hostilities to Congress ``unless the Congress . . . has 
declared war or has enacted a specific authorization for such 
use'' of military force) (emphasis added). It is possible that, 
in enacting section 111, Congress intended to make no provision 
for even the temporary use of electronic surveillance without a 
court order for what had become the legal regime for most 
military conflicts. A better reading, however, is that Congress 
assumed that such a default provision would be unnecessary 
because, if it had acted through an authorization for the use 
of military force, the more detailed provisions of that 
authorization would resolve the extent to which Congress would 
attempt to authorize, or withhold authorization for, the use of 
electronic surveillance.\13\
---------------------------------------------------------------------------
    \13\ Some have pointed to the specific amendments to FISA that 
Congress made shortly after September 11th in the USA PATRIOT Act, Pub. 
L. No. 107-56, Sec. Sec. 204, 218, 115 Stat. 272, 281, 291 (2001), to 
argue that Congress did not contemplate electronic surveillance outside 
the parameters of FISA. See Memorandum for Members of the House 
Permanent Select Comm. on Intel. from Jeffrey H. Smith, Re: Legal 
Authorities Regarding Warrantless Surveillance of U.S. Persons 6-7 
(Jan. 3, 2006). The USA PATRIOT Act amendments, however, do not justify 
giving the AUMF an unnaturally narrow reading. The USA PATRIOT Act 
amendments made important corrections in the general application of 
FISA; they were not intended to define the precise incidents of 
military force that would be available to the President in prosecuting 
the current armed conflict against al Qaeda and its allies. Many 
removed long-standing impediments to the effectiveness of FISA that had 
contributed to the maintenance of an unnecessary ``wall'' between 
foreign intelligence gathering and criminal law enforcement; others 
were technical clarifications. See In re Sealed Case, 310 F.3d 717, 
725-30 (Foreign Int. Surv. Ct. Rev. 2002). The ``wall'' had been 
identified as a significant problem hampering the Government's 
efficient use of foreign intelligence information well before the 
September 11th attacks and in contexts unrelated to terrorism. See, 
e.g., Final Report of the Attorney General's Review Team on the 
Handling of the Los Alamos National Laboratory Investigation 710, 729, 
732 (May 2000); General Accounting Office, FBI Intelligence 
Investigations: Coordination Within Justice on Counterintelligence 
Criminal Matters Is Limited (GAO-01-780) 3, 31 (July 2001). Finally, it 
is worth noting that Justice Souter made a similar argument in Hamdi 
that the USA PATRIOT Act all but compelled a narrow reading of the 
AUMF. See 542 U.S. at 551 (``It is very difficult to believe that the 
same Congress that carefully circumscribed Executive power over alien 
terrorists on home soil [in the USA PATRIOT Act] would not have meant 
to require the Government to justify clearly its detention of an 
American citizen held on home soil incommunicado.''). Only Justice 
Ginsburg joined this opinion, and the position was rejected by a 
majority of Justices.
    Nor do later amendments to FISA undermine the conclusion that the 
AUMF authorizes electronic surveillance outside the procedures of FISA. 
Three months after the enactment of the AUMF, Congress enacted certain 
``technical amendments'' to FISA which, inter alia, extended the time 
during which the Attorney General may issue an emergency authorization 
of electronic surveillance from 24 to 72 hours. See Intelligence 
Authorization Act for Fiscal Year 2002, Pub. L. No. 107-108, Sec. 314, 
115 Stat. 1394, 1402 (2001). These modifications to FISA do not in any 
way undermine Congress's previous authorization in the AUMF for the 
President to engage in electronic surveillance outside the parameters 
of FISA in the specific context of the armed conflict with al Qaeda.
---------------------------------------------------------------------------
    The broad text of the AUMF, the authoritative 
interpretation that the Supreme Court gave it in Hamdi, and the 
circumstances in which it was passed demonstrate that the AUMF 
is a statute authorizing electronic surveillance under section 
109 of FISA. When the President authorizes electronic 
surveillance against the enemy pursuant to the AUMF, he is 
therefore acting at the height of his authority under 
Youngstown, 343 U.S. at 637 (Jackson, J., concurring).
            D. The Canon of constitutional advoidance requires 
                    resolving in favor of the President's authority any 
                    ambiguity about whether FISA forbids the NSA 
                    activities
    As explained above, the AUMF fully authorizes the NSA 
activities. Because FISA contemplates the possibility that 
subsequent statutes could authorize electronic surveillance 
without requiring FISA's standard procedures, the NSA 
activities are also consistent with FISA and related provisions 
in title 18. Nevertheless, some might argue that sections 109 
and 111 of FISA, along with section 2511(2)(f)'s 
``exclusivity'' provision and section 2511(2)(e)'s liability 
exception for officers engaged in FISA-authorized surveillance, 
are best read to suggest that FISA requires that subsequent 
authorizing legislation specifically amend FISA in order to 
free the Executive from FISA's enumerated procedures. As 
detailed above, this is not the better reading of FISA. But 
even if these provisions were ambiguous, any doubt as to 
whether the AUMF and FISA should be understood to allow the 
President to make tactical military decisions to authorize 
surveillance outside the parameters of FISA must be resolved to 
avoid the serious constitutional questions that a contrary 
interpretation would raise.
    It is well established that the first task of any 
interpreter faced with a statute that may present an 
unconstitutional infringement on the powers of the President is 
to determine whether the statute may be construed to avoid the 
constitutional difficulty. ``[I]f an otherwise 
acceptableconstruction of a statute would raise serious constitutional 
problems, and where an alternative interpretation of the statute is 
`fairly possible,' we are obligated to construe the statute to avoid 
such problems.'' INS v. St. Cyr, 533 U.S. 289, 299-300 (2001) 
(citations omitted); Ashwander v. TVA, 297 U.S. 288, 345-48 (1936) 
(Brandeis, J., concurring). Moreover, the canon of constitutional 
avoidance has particular importance in the realm of national security, 
where the President's constitutional authority is at its highest. See 
Department of the Navy v. Egan, 484 U.S. 518, 527, 530 (1988); William 
N. Eskridge, Jr., Dynamic Statutory Interpretation 325 (1994) 
(describing ``[s]uper-strong rule against congressional interference 
with the President's authority over foreign affairs and national 
security''). Thus, courts and the Executive Branch typically construe a 
general statute, even one that is written in unqualified terms, to be 
implicitly limited so as not to infringe on the President's Commander 
in Chief powers.
    Reading FISA to prohibit the NSA activities would raise two 
serious constitutional questions, both of which must be avoided 
if possible: (1) whether the signals intelligence collection 
the President determined was necessary to undertake is such a 
core exercise of Commander in Chief control over the Armed 
Forces during armed conflict that Congress cannot interfere 
with it at all and (2) whether the particular restrictions 
imposed by FISA are such that their application would 
impermissibly impede the President's exercise of his 
constitutionally assigned duties as Commander in Chief. 
Constitutional avoidance principles require interpreting FISA, 
at least in the context of the military conflict authorized by 
the AUMF, to avoid these questions, if ``fairly possible.'' 
Even if Congress intended FISA to use the full extent of its 
constitutional authority to ``occupy the field'' of 
``electronic surveillance,'' as FISA used that term, during 
peacetime, the legislative history indicates that Congress had 
not reached a definitive conclusion about its regulation during 
wartime. See H.R. Conf. Rep. No. 95-1720, at 34, reprinted in 
1978 U.S.C.C.A.N. at 4063 (noting that the purpose of the 
fifteen-day period following a declaration of war in section 
111 of FISA was to ``allow time for consideration of any 
amendment to this act that may be appropriate during a wartime 
emergency''). Therefore, it is not clear that Congress, in 
fact, intended to test the limits of its constitutional 
authority in the context of wartime electronic surveillance.
    Whether Congress may interfere with the President's 
constitutional authority to collect foreign intelligence 
information through interception of communications reasonably 
believed to be linked to the enemy poses a difficult 
constitutional question. As explained in Part I, it had long 
been accepted at the time of FISA's enactment that the 
President has inherent constitutional authority to conduct 
warrantless electronic surveillance for foreign intelligence 
purposes. Congress recognized at the time that the enactment of 
a statute purporting to eliminate the President's ability, even 
during peacetime, to conduct warrantless electronic 
surveillance to collect foreign intelligence was near or 
perhaps beyond the limit of Congress's Article I powers. The 
NSA activities, however, involve signals intelligence performed 
in the midst of a congressionally authorized armed conflict 
undertaken to prevent further hostile attacks on the United 
States. The NSA activities lie at the very core of the 
Commander in Chief power, especially in light of the AUMF's 
explicit authorization for the President to take all necessary 
and appropriate military action to stop al Qaeda from striking 
again. The constitutional principles at stake here thus involve 
not merely the President's well-established inherent authority 
to conduct warrantless surveillance for foreign intelligence 
purposes during peacetime, but also the powers and duties 
expressly conferred on him as Commander in Chief by Article II.
    Even outside the context of wartime surveillance of the 
enemy, the source and scope of Congress's power to restrict the 
President's inherent authority to conduct foreign intelligence 
surveillance is unclear. As explained above, the President's 
role as sole organ for the Nation in foreign affairs has long 
been recognized as carrying with it preeminent authority in the 
field of national security and foreign intelligence. The source 
of this authority traces to the Vesting Clause of Article II, 
which states that ``[t]he executive Power shall be vested in a 
President of the United States of America.'' U.S. Const. art. 
II, Sec. 1. The Vesting Clause ``has long been held to confer 
on the President plenary authority to represent the United 
States and to pursue its interests outside the borders of the 
country, subject only to limits specifically set forth in the 
Constitution itself and to such statutory limitations as the 
Constitution permits Congress to impose by exercising one of 
its enumerated powers.'' The President's Compliance with the 
``Timely Notification'' Requirement of Section 501(b) of the 
National Security Act, 10 Op. O.L.C. 159, 160-61 (1986) 
(``Timely Notification Requirement Op.'').
    Moreover, it is clear that some presidential authorities in 
this context are beyond Congress's ability to regulate. For 
example, as the Supreme Court explained in Curtiss-Wright, the 
President ``makes treaties with the advice and consent of the 
Senate; but he alone negotiates. Into the field of negotiation 
the Senate cannot intrude; and Congress itself is powerless to 
invade it.'' 299 U.S. at 319. Similarly, President Washington 
established early in the history of the Republic the 
Executive's absolute authority to maintain the secrecy of 
negotiations with foreign powers, even against congressional 
efforts to secure information. See id. at 320-21. Recognizing 
presidential authority in this field, the Executive Branch has 
taken the position that ``congressional legislation authorizing 
extraterritorial diplomatic and intelligence activities is 
superfluous, and . . . statutes infringing the President's 
inherent Article II authority would be unconstitutional.'' 
Timely Notification Requirement Op., 10 Op. O.L.C. at 164.
    There are certainly constitutional limits on Congress's 
ability to interfere with the President's power to conduct 
foreign intelligence searches, consistent with the 
Constitution, within the United States. As explained above, 
intelligence gathering is at the heart of executive functions. 
Since the time of the Founding it has been recognized that 
matters requiring secrecy and intelligence in particular--are 
quintessentially executive functions. See, e.g., The Federalist 
No. 64, at 435 (John Jay) (Jacob E. Cooke ed. 1961) (``The 
convention have done well therefore in so disposing of the 
power of making treaties, that although the president must in 
forming them act by the advice and consent of the senate, yet 
he will be able to manage the business of intelligence in such 
manner as prudence may suggest.''); see also Timely 
Notification Requirement Op., 10 Op. O.L.C. at 165; cf. New 
York Times Co. v. United States, 403 U.S. 713, 729-30 (1971) 
(Stewart, J., concurring) (``[I]t is the constitutional duty of 
the Executive--as a matter of sovereign prerogative and not as 
a matter of law as the courts know law--through the 
promulgation and enforcement of executive regulations, to 
protect the confidentiality necessary to carry out its 
responsibilities in the field of international relations and 
national defense.'').
    Because Congress has rarely attempted to intrude in this 
area and because many of these questions are not susceptible to 
judicial review, there are few guideposts for determining 
exactly where the line defining the President's sphere of 
exclusive authority lies. Typically, if a statute is in danger 
of encroaching upon exclusive powers of the President, the 
courts apply the constitutional avoidance canon, if a 
construction avoiding the constitutional issue is ``fairly 
possible.'' See, e.g., Egan, 484 U.S. at 527, 530. The only 
court that squarely has addressed the relative powers of 
Congress and the President in this field suggested that the 
balance tips decidedly in the President's favor. The Foreign 
Intelligence Surveillance Court of Review recently noted that 
all courts to have addressed the issue of the President's 
inherent authority have ``held that the President did have 
inherent authority to conduct warrantless searches to obtain 
foreign intelligence information.'' In re Sealed Case, 310 F.3d 
717, 742 (Foreign Intel. Surv. Ct. of Rev. 2002). On the basis 
of that unbroken line of precedent, the court ``[took] for 
granted that the President does have that authority,'' and 
concluded that, ``assuming that is so, FISA could not encroach 
on the President's constitutional power.'' Id.\14\ Although the 
court did not provide extensive analysis, it is the only 
judicial statement on point, and it comes from the specialized 
appellate court created expressly to deal with foreign 
intelligence issues under FISA.
---------------------------------------------------------------------------
    \14\ In the past, other courts have declined to express a view on 
that issue one way or the other. See, e.g., Butenko, 494 F.2d at 601 
(``We do not intimate, at this time, any view whatsoever as the proper 
resolution of the possible clash of the constitutional powers of the 
President and Congress.'').
---------------------------------------------------------------------------
    But the NSA activities are not simply exercises of the 
President's general foreign affairs powers. Rather, they are 
primarily an exercise of the President's authority as Commander 
in Chief during an armed conflict that Congress expressly has 
authorized the President to pursue. The NSA activities, 
moreover, have been undertaken specifically to prevent a 
renewed attack at the hands of an enemy that has already 
inflicted the single deadliest foreign attack in the Nation's 
history. The core of the Commander in Chief power is the 
authority to direct the Armed Forces in conducting a military 
campaign. Thus, the Supreme Court has made clear that the 
``President alone'' is ``constitutionally invested with the 
entire charge of hostile operations.'' Hamilton v. Dillin, 88 
U.S. (21 Wall.) 73, 87 (1874); The Federalist No. 74, at 500 
(Alexander Hamilton). ``As commander-in-chief, [the President] 
is authorized to direct the movements of the naval and military 
forces placed by law at his command, and to employ them in the 
manner he may deem most effectual to harass and conquer and 
subdue the enemy.'' Fleming v. Page, 50 U.S. (9 How.) 603, 615 
(1850). As Chief Justice Chase explained in 1866, although 
Congress has authority to legislate to support the prosecution 
of a war, Congress may not ``interfere[ ] with the command of 
the forces and the conduct of campaigns. That power and duty 
belong to the President as commander-in-chief.'' Ex parte 
Milligan, 71 U.S. (4 Wall.) 2, 139 (1866) (Chase, C.J., 
concurring in judgment) (emphasis added).
    The Executive Branch uniformly has construed the Commander 
in Chief and foreign affairs powers to grant the President 
authority that is beyond the ability of Congress to regulate. 
In 1860, Attorney General Black concluded that an act of 
Congress, if intended to constrain the President's discretion 
in assigning duties to an officer in the army, would be 
unconstitutional:

          As commander-in-chief of the army it is your right to 
        decide according to your own judgment what officer 
        shall perform any particular duty, and as the supreme 
        executive magistrate you have the power of appointment. 
        Congress could not, if it would, take away from the 
        President, or in anywise diminish the authority 
        conferred upon him by the Constitution.

Memorial of Captain Meigs, 9 Op. Att'y Gen. 462, 468 (1860). 
Attorney General Black went on to explain that, in his view, 
the statute involved there could probably be read as simply 
providing ``a recommendation'' that the President could decline 
to follow at his discretion. Id. at 469-70.\15\
---------------------------------------------------------------------------
    \15\ Executive practice recognizes, consistent with the 
Constitution, some congressional control over the Executive's decisions 
concerning the Armed Forces. See, e.g., U.S. Const. art. I, Sec. 8, cl. 
12 (granting Congress power ``to raise and support Armies''). But such 
examples have not involved congressional attempts to regulate the 
actual conduct of a military campaign, and there is no comparable 
textual support for such interference. For example, just before World 
War II, Attorney General Robert Jackson concluded that the Neutrality 
Act prohibited President Roosevelt from selling certain armed naval 
vessels and sending them to Great Britain. See Acquisition of Naval and 
Air Bases in Exchange for Over-Age Destroyers, 39 Op. Att'y Gen. 484, 
496 (1940). Jackson's apparent conclusion that Congress could control 
the President's ability to transfer war material does not imply 
acceptance of direct congressional regulation of the Commander in 
Chief's control of the means and methods of engaging the enemy in 
conflict. Similarly, in Youngstown Sheet & Tube Co. v. Sawyer, the 
Truman Administration readily conceded that, if Congress had prohibited 
the seizure of steel mills by statute, Congress's action would have 
been controlling. See Brief for Petitioner at 150, Youngstown, 343 U.S. 
579 (1952) (Nos. 744 and 745). This concession implies nothing 
concerning congressional control over the methods of engaging the 
enemy.
    Likewise, the fact that the Executive Branch has, at times, sought 
congressional ratification after taking unilateral action in a wartime 
emergency does not reflect a concession that the Executive lacks 
authority in this area. A decision to seek congressional support can be 
prompted by many motivations, including a desire for political support. 
In modern times, several administrations have sought congressional 
authorization for the use of military force while preserving the 
ability to assert the unconstitutionality of the War Powers Resolution. 
See, e.g., Statement on Signing the Resolution Authorizing the Use of 
Military Force Against Iraq, 1 Pub. Papers of George Bush 40 (1991) 
(``[M]y request for congressional support did not . . . constitute any 
change in the long-standing positions of the executive branch on either 
the President's constitutional authority to use the Armed Forces to 
defend vital U.S. interests or the constitutionality of the War Powers 
Resolution.''). Moreover, many actions for which congressional support 
has been sought--such as President Lincoln's action in raising an Army 
in 1861--quite likely fall primarily under Congress's core Article I 
powers.
---------------------------------------------------------------------------
    Supreme Court precedent does not support claims of 
congressional authority over core military decisions during 
armed conflicts. In particular, the two decisions of the 
Supreme Court that address a conflict between asserted wartime 
powers of the Commander in Chief and congressional legislation 
and that resolve the conflict in favor of Congress--Little v. 
Barreme, 6 U.S. (2 Cranch) 170 (1804), and Youngstown Sheet & 
Tube Co. v. Sawyer, 343 U.S. 579 (1952), are both 
distinguishable from the situation presented by the NSA 
activities in the conflict with al Qaeda. Neither supports the 
constitutionality of the restrictions in FISA as applied here.
    Barreme involved a suit brought to recover a ship seized by 
an officer of the U.S. Navy on the high seas during the so-
called ``Quasi War'' with France in 1799. The seizure had been 
based upon the officer's orders implementing an act of Congress 
suspending commerce between the United States and France and 
authorizing the seizure of American ships bound to a French 
port. The ship in question was suspected of sailing from a 
French port. The Supreme Court held that the orders given by 
the President could not authorize a seizure beyond the terms of 
the statute and therefore that the seizure of the ship not in 
fact bound to a French port was unlawful. See 6 U.S. at 177-78. 
Although some commentators have broadly characterized Barreme 
as standing for the proposition that Congress may restrict by 
statute the means by which the President can direct the 
Nation's Armed Forces to carry on a war, the Court's holding 
was limited in at least two significant ways. First, the 
operative section of the statute in question applied only to 
American merchant ships. See id. at 170 (quoting Act of 
February 9, 1799). Thus, the Court simply had no occasion to 
rule on whether, even in the limited and peculiar circumstances 
of the Quasi War, Congress could have placed some restriction 
on the orders the Commander in Chief could issue concerning 
direct engagements with enemy forces. Second, it is significant 
that the statute in Barreme was cast expressly, not as a 
limitation on the conduct of warfare by the President, but 
rather as regulation of a subject within the core of Congress's 
enumerated powers under Article I--the regulation of foreign 
commerce. See U.S. Const., art. I, Sec. 8, cl. 3. The basis of 
Congress's authority to act was therefore clearer in Barreme 
than it is here.
    Youngstown involved an effort by the President--in the face 
of a threatened work stoppage--to seize and to run steel mills. 
Congress had expressly considered the possibility of giving the 
President power to effect such a seizure during national 
emergencies. It rejected that option, however, instead 
providing different mechanisms for resolving labor disputes and 
mechanisms for seizing industries to ensure production vital to 
national defense.
    For the Court, the connection between the seizure and the 
core Commander in Chief function of commanding the Armed Forces 
was too attenuated. The Court pointed out that the case did not 
involve authority over ``day-to-day fighting in a theater of 
war.'' Id. at 587. Instead, it involved a dramatic extension of 
the President's authority over military operations to exercise 
control over an industry that was vital for producing equipment 
needed overseas. Justice Jackson's concurring opinion also 
reveals a concern for what might be termed foreign-to-domestic 
presidential bootstrapping. The United States became involved 
in the Korean conflict through President Truman's unilateral 
decision to commit troops to the defense of South Korea. The 
President then claimed authority, based upon this foreign 
conflict, to extend presidential control into vast sectors of 
the domestic economy. Justice Jackson expressed ``alarm[]'' at 
a theory under which ``a President whose conduct of foreign 
affairs is so largely uncontrolled, and often even is unknown, 
can vastly enlarge his mastery over the internal affairs of the 
country by his own commitment of the Nation's armed forces to 
some foreign venture.'' Id. at 642.
    Moreover, President Truman's action extended the 
President's authority into a field that the Constitution 
predominantly assigns to Congress. See id. at 588 (discussing 
Congress's commerce power and noting that ``[t]he Constitution 
does not subject this lawmaking power of Congress to 
presidential or military supervision or control''); see also 
id. at 643 (Jackson, J., concurring) (explaining that Congress 
is given express authority to `` `raise and support Armies' '' 
and `` `to provide and maintain a Navy' '') (quoting U.S. 
Const. art. I, Sec. 8, cls. 12, 13). Thus, Youngstown involved 
an assertion of executive power that not only stretched far 
beyond the President's core Commander in Chief functions, but 
that did so by intruding into areas where Congress had been 
given an express, and apparently dominant, role by the 
Constitution.\16\
---------------------------------------------------------------------------
    \16\ Youngstown does demonstrate that the mere fact that Executive 
action might be placed in Justice Jackson's category III does not 
obviate the need for further analysis. Justice Jackson's framework 
therefore recognizes that Congress might impermissibly interfere with 
the President's authority as Commander in Chief or to conduct the 
Nation's foreign affairs.
---------------------------------------------------------------------------
    The present situation differs dramatically. The exercise of 
executive authority involved in the NSA activities is not 
several steps removed from the actual conduct of a military 
campaign. As explained above, it is an essential part of the 
military campaign. Unlike the activities at issue in 
Youngstown, the NSA activities are directed at the enemy, and 
not at domestic activity that might incidentally aid the war 
effort. And assertion of executive authority here does not 
involve extending presidential power into areas reserved for 
Congress. Moreover, the theme that appeared most strongly in 
Justice Jackson's concurrence in Youngstown--the fear of 
presidential bootstrapping--does not apply in this context. 
Whereas President Truman had used his inherent constitutional 
authority to commit U.S. troops, here Congress expressly 
provided the President sweeping authority to use ``all 
necessary and appropriate force'' to protect the Nation from 
further attack. AUMF Sec. 2(a). There is thus no bootstrapping 
concern.
    Finally, Youngstown cannot be read to suggest that the 
President's authority for engaging the enemy is less extensive 
inside the United States than abroad. To the contrary, the 
extent of the President's Commander in Chief authority 
necessarily depends on where the enemy is found and where the 
battle is waged. In World War II, for example, the Supreme 
Court recognized that the President's authority as Commander in 
Chief, as supplemented by Congress, included the power to 
capture and try agents of the enemy in the United States, even 
if they never had ``entered the theatre or zone of active 
military operations.'' Quirin, 317 U.S. at 38.\17\ In the 
present conflict, unlike in the Korean War, the battlefield was 
brought to the United States in the most literal way, and the 
United States continues to face a threat of further attacks on 
its soil. In short, therefore, Youngstown does not support the 
view that Congress may constitutionally prohibit the President 
from authorizing the NSA activities.
---------------------------------------------------------------------------
    \17\ It had been recognized long before Youngstown that, in a 
large-scale conflict, the area of operations could readily extend to 
the continental United States, even when there are no major engagements 
of armed forces here. Thus, in the context of the trial of a German 
officer for spying in World War I, it was recognized that ``[w]ith the 
progress made in obtaining ways and means for devastation and 
destruction, the territory of the United States was certainly within 
the field of active operations'' during the war, particularly in the 
port of New York, and that a spy in the United States might easily have 
aided the ``hostile operation'' of U-boats off the coast. United States 
ex reI. Wessels v. McDonald, 265 F. 754, 764 (E.D.N.Y. 1920).
---------------------------------------------------------------------------
    The second serious constitutional question is whether the 
particular restrictions imposed by FISA would impermissibly 
hamper the President's exercise of his constitutionally 
assigned duties as Commander in Chief. The President has 
determined that the speed and agility required to carry out the 
NSA activities successfully could not have been achieved under 
FISA.\18\ Because the President also has determined that the 
NSA activities are necessary to the defense of the United 
States from a subsequent terrorist attack in the armed conflict 
with al Qaeda, FISA would impermissibly interfere with the 
President's most solemn constitutional obligation--to defend 
the United States against foreign attack.
---------------------------------------------------------------------------
    \18\ In order to avoid further compromising vital national security 
activities, a full explanation of the basis for the President's 
determination cannot be given in an unclassified document.
---------------------------------------------------------------------------
    Indeed, if an interpretation of FISA that allows the 
President to conduct the NSA activities were not ``fairly 
possible,'' FISA would be unconstitutional as applied in the 
context of this congressionally authorized armed conflict. In 
that event, FISA would purport to prohibit the President from 
undertaking actions necessary to fulfill his constitutional 
obligation to protect the Nation from foreign attack in the 
context of a congressionally authorized armed conflict with an 
enemy that has already staged the most deadly foreign attack in 
our Nation's history. A statute may not ``impede the 
President's ability to perform his constitutional duty,'' 
Morrison v. Olson, 487 U.S. 654, 691 (1988) (emphasis added); 
see also id. at 696-97, particularly not the President's most 
solemn constitutional obligation--the defense of the Nation. 
See also In re Sealed Case, 310 F.3d at 742 (explaining that 
``FISA could not encroach on the President's constitutional 
power'').
    Application of the avoidance canon would be especially 
appropriate here for several reasons beyond the acute 
constitutional crises that would otherwise result. First, as 
noted, Congress did not intend FISA to be the final word on 
electronic surveillance conducted during armed conflicts. 
Instead, Congress expected that it would revisit the subject in 
subsequent legislation. Whatever intent can be gleaned from 
FISA's text and legislative history to set forth a 
comprehensive scheme for regulating electronic surveillance 
during peacetime, that same intent simply does not extend to 
armed conflicts and declared wars.\19\ Second, FISA was enacted 
during the Cold War, not during active hostilities with an 
adversary whose mode of operation is to blend in with the 
civilian population until it is ready to strike. These changed 
circumstances have seriously altered the constitutional 
calculus, one that FISA's enactors had already recognized might 
suggest that the statute was unconstitutional. Third, certain 
technological changes have rendered FISA still more 
problematic. As discussed above, when FISA was enacted in 1978, 
Congress expressly declined to regulate through FISA certain 
signals intelligence activities conducted by the NSA. See 
supra, at pp. 18-19 & n.6.\20\ These same factors weigh heavily 
in favor of concluding that FISA would be unconstitutional as 
applied to the current conflict if the canon of constitutional 
avoidance could not be used to head off a collision between the 
Branches.
---------------------------------------------------------------------------
    \19\ FISA exempts the President from its procedures for fifteen 
days following a congressional declaration of war. See 50 U.S.C. 
Sec. 1811. If an adversary succeeded in a decapitation strike, 
preventing Congress from declaring war or passing subsequent 
authorizing legislation, it seems clear that FISA could not 
constitutionally continue to apply in such circumstances.
    \20\ Since FISA's enactment in 1978, the means of transmitting 
communications has undergone extensive transformation. In particular, 
many communications that would have been carried by wire are now 
transmitted through the air, and many communications that would have 
been carried by radio signals (including by satellite transmissions) 
are now transmitted by fiber optic cables. It is such technological 
advancements that have broadened FISA's reach, not any particularized 
congressional judgment that the NSA's traditional activities in 
intercepting such international communications should be subject to 
FISA's procedures. A full explanation of these technological changes 
would require a discussion of classified information.
---------------------------------------------------------------------------
    As explained above, FISA is best interpreted to allow a 
statute such as the AUMF to authorize electronic surveillance 
outside FISA's enumerated procedures. The strongest 
counterarguments to this conclusion are that various provisions 
in FISA and title 18, including section 111 of FISA and section 
2511(2)(f) of title 18, together require that subsequent 
legislation must reference or amend FISA in order to authorize 
electronic surveillance outside FISA's procedures and that 
interpreting the AUMF as a statute authorizing electronic 
surveillance outside FISA procedures amounts to a disfavored 
repeal by implication. At the very least, however, interpreting 
FISA to allow a subsequent statute such as the AUMF to 
authorize electronic surveillance without following FISA's 
express procedures is ``fairly possible,'' and that is all that 
is required for purposes of invoking constitutional avoidance. 
In the competition of competing canons, particularly in the 
context of an ongoing armed conflict, the constitutional 
avoidance canon carries much greater interpretative force.\21\
---------------------------------------------------------------------------
    \21\ If the text of FISA were clear that nothing other than an 
amendment to FISA could authorize additional electronic surveillance, 
the AUMF would impliedly repeal as much of FISA as would prevent the 
President from using ``all necessary and appropriate force'' in order 
to prevent al Qaeda and its allies from launching another terrorist 
attack against the United States. To be sure, repeals by implication 
are disfavored and are generally not found whenever two statutes are 
``capable of co-existence.'' Ruckelshaus v. Monsanto Co., 467 U.S. 986, 
1018 (1984). Under this standard, an implied repeal may be found where 
one statute would ``unduly interfere with'' the operation of another. 
Radzanower v. Touche Ross & Co., 426 U.S. 148, 156 (1976). The 
President's determination that electronic surveillance of al Qaeda 
outside the confines of FISA was ``necessary and appropriate'' would 
create a clear conflict between the AUMF and FISA. FISA's restrictions 
on the use of electronic surveillance would preclude the President from 
doing what the AUMF specifically authorized him to do: use all 
``necessary and appropriate force'' to prevent al Qaeda from carrying 
out future attacks against the United States. The ordinary restrictions 
in FISA cannot continue to apply if the AUMF is to have its full 
effect; those constraints would ``unduly interfere'' with the operation 
of the AUMF.
    Contrary to the recent suggestion made by several law professors 
and former government officials, the ordinary presumption against 
implied repeals is overcome here. Cf. Letter to the Hon. Bill Frist, 
Majority Leader, U.S. Senate, from Professor Curtis A. Bradley et al. 
at 4 (Jan. 9, 2006). First, like other canons of statutory 
construction, the canon against implied repeals is simply a presumption 
that may be rebutted by other factors, including conflicting canons. 
Connecticut National Bank v. Germain, 503 U.S. 249, 253 (1992); see 
also Chickasaw Nation v. United States, 534 U.S. 84, 94 (2001); Circuit 
City Stores, Inc. v. Adams, 532 U.S. 105, 115 (2001). Indeed, the 
Supreme Court has declined to apply the ordinary presumption against 
implied repeals where other canons apply and suggest the opposite 
result. See Montana v. Blackfeet Tribe of Indians, 471 U.S. 759, 765-66 
(1985). Moreover, Blackfeet suggests that where the presumption against 
implied repeals would conflict with other, more compelling interpretive 
imperatives, it simply does not apply at all. See 471 U.S. at 766. 
Here, in light of the constitutional avoidance canon, which imposes the 
overriding imperative to use the tools of statutory interpretation to 
avoid constitutional conflicts, the implied repeal canon either would 
not apply at all or would apply with significantly reduced force. 
Second, the AUMF was enacted during an acute national emergency, where 
the type of deliberation and detail normally required for application 
of the canon against implied repeals was neither practical nor 
warranted. As discussed above, in these circumstances, Congress cannot 
be expected to work through every potential implication of the U.S. 
Code and to define with particularity each of the traditional incidents 
of the use of force available to the President.
---------------------------------------------------------------------------
IV. The NSA activities are consistent with the Fourth Amendment
    The Fourth Amendment prohibits ``unreasonable searches and 
seizures'' and directs that ``no Warrants shall issue, but upon 
probable cause, supported by Oath or affirmation, and 
particularly describing the place to be searched, and the 
persons or things to be seized.'' U.S. Const. amend. IV. The 
touchstone for review of government action under the Fourth 
Amendment is whether the search is ``reasonable.'' See, e.g., 
Vernonia Sch. Dist. v. Acton, 515 U.S. 646, 653 (1995).
    As noted above, see Part I, all of the federal courts of 
appeals to have addressed the issue have affirmed the 
President's inherent constitutional authority to collect 
foreign intelligence without a warrant. See In re Sealed Case, 
310 F.3d at 742. Properly understood, foreign intelligence 
collection in general, and the NSA activities in particular, 
fit within the ``special needs'' exception to the warrant 
requirement of the Fourth Amendment. Accordingly, the mere fact 
that no warrant is secured prior to the surveillance at issue 
in the NSA activities does not suffice to render the activities 
unreasonable. Instead, reasonableness in this context must be 
assessed under a general balancing approach, ``by assessing, on 
the one hand, the degree to which it intrudes upon an 
individual's privacy and, on the other, the degree to which it 
is needed for the promotion of legitimate governmental 
interests.'' United States v. Knights, 534 U.S. 112, 118-19 
(2001) (quoting Wyoming v. Houghton, 526 U.S. 295, 300 (1999)). 
The NSA activities are reasonable because the Government's 
interest, defending the Nation from another foreign attack in 
time of armed conflict, outweighs the individual privacy 
interests at stake, and because they seek to intercept only 
international communications where one party is linked to al 
Qaeda or an affiliated terrorist organization.
            A. The warrant requirement of the Fourth Amendment does not 
                    apply to the NSA activities
    In ``the criminal context,'' the Fourth Amendment 
reasonableness requirement ``usually requires a showing of 
probable cause'' and a warrant. Board of Educ. v. Earls, 536 
U.S. 822, 828 (2002). The requirement of a warrant supported by 
probable cause, however, is not universal. Rather, the Fourth 
Amendment's ``central requirement is one of reasonableness,'' 
and the rules the Court has developed to implement that 
requirement ``[s]ometimes . . . require warrants.'' Illinois v. 
McArthur, 531 U.S. 326, 330 (2001); see also, e.g., Earls, 536 
U.S. at 828 (noting that the probable cause standard ``is 
peculiarly related to criminal investigations and may be 
unsuited to determining the reasonableness of administrative 
searches where the Government seeks to prevent the development 
of hazardous conditions'') (internal quotation marks omitted).
    In particular, the Supreme Court repeatedly has made clear 
that in situations involving ``special needs'' that go beyond a 
routine interest in law enforcement, the warrant requirement is 
inapplicable. See Vernonia, 515 U.S. at 653 (there are 
circumstances ``when special needs, beyond the normal need for 
law enforcement, make the warrant and probable-cause 
requirement impracticable'') (quoting Griffin v. Wisconsin, 483 
U.S. 868, 873 (1987)); see also McArthur, 531 U.S. at 330 
(``When faced with special law enforcement needs, diminished 
expectations of privacy, minimal intrusions, or the like, the 
Court has found that certain general, or individual, 
circumstances may render a warrantless search or seizure 
reasonable.''). It is difficult to encapsulate in a nutshell 
all of the different circumstances the Court has found to 
qualify as ``special needs'' justifying warrantless searches. 
But one application in which the Court has found the warrant 
requirement inapplicable is in circumstances in which the 
Government faces an increased need to be able to react swiftly 
and flexibly, or when there are at stake interests in public 
safety beyond the interests in ordinary law enforcement. One 
important factor in establishing ``special needs'' is whether 
the Government is responding to an emergency that goes beyond 
the need for general crime control. See In re Sealed Case, 310 
F.3d at 745-46.
    Thus, the Court has permitted warrantless searches of 
property of students in public schools, see New Jersey v. 
T.L.O., 469 U.S. 325, 340 (1985) (noting that warrant 
requirement would ``unduly interfere with the maintenance of 
the swift and informal disciplinary procedures needed in the 
schools''), to screen athletes and students involved in 
extracurricular activities at public schools for drug use, see 
Vernonia, 515 U.S. at 654-55; Earls, 536 U.S. at 829-38, to 
conduct drug testing of railroad personnel involved in train 
accidents, see Skinner v. Railway Labor Executives' Ass'n, 489 
U.S. 602, 634 (1989), and to search probationers' homes, see 
Griffin, 483 U.S. 868. Many special needs doctrine and related 
cases have upheld suspicionless searches or seizures. See, 
e.g., Illinois v. Lidster, 540 U.S. 419, 427 (2004) (implicitly 
relying on special needs doctrine to uphold use of automobile 
checkpoint to obtain information about recent hit-and-run 
accident); Earls, 536 U.S. at 829-38 (suspicionless drug 
testing of public school students involved in extracurricular 
activities); Michigan Dep't of State Police v. Sitz, 496 U.S. 
444, 449-55 (1990) (road block to check all motorists for signs 
of drunken driving); United States v. Martinez-Fuerte, 428 U.S. 
543 (1976) (road block near the border to check vehicles for 
illegal immigrants); cf. In re Sealed Case, 310 F.3d at 745-46 
(noting that suspicionless searches and seizures in one sense 
are a greater encroachment on privacy than electronic 
surveillance under FISA because they are not based on any 
particular suspicion, but ``[o]n the other hand, wiretapping is 
a good deal more intrusive than an automobile stop accompanied 
by questioning''). To fall within the ``special needs'' 
exception to the warrant requirement, the purpose of the search 
must be distinguishable from ordinary general crime control. 
See, e.g., Ferguson v. Charleston, 532 U.S. 67 (2001); City of 
Indianapolis v. Edmond, 531 U.S. 32, 41 (2000).
    Foreign intelligence collection, especially in the midst of 
an armed conflict in which the adversary has already launched 
catastrophic attacks within the United States, fits squarely 
within the area of ``special needs, beyond the normal need for 
law enforcement'' where the Fourth Amendment's touchstone of 
reasonableness can be satisfied without resort to a warrant. 
Vernonia, 515 U.S. at 653. The Executive Branch has long 
maintained that collecting foreign intelligence is far removed 
from the ordinary criminal law enforcement action to which the 
warrant requirement is particularly suited. See, e.g., Amending 
the Foreign Intelligence Surveillance Act: Hearings Before the 
House Permanent Select Comm. on Intelligence, 103d Cong. 2d 
Sess. 62, 63 (1994) (statement of Deputy Attorney General Jamie 
S. Gorelick) (``[I]t is important to understand that the rules 
and methodology for criminal searches are inconsistent with the 
collection of foreign intelligence and would unduly frustrate 
the President in carrying out his foreign intelligence 
responsibilities. . . . [W]e believe that the warrant clause of 
the Fourth Amendment is inapplicable to such [foreign 
intelligence] searches.''); see also In re Sealed Case, 310 
F.3d 745. The object of foreign intelligence collection is 
securing information necessary to protect the national security 
from the hostile designs of foreign powers like al Qaeda and 
affiliated terrorist organizations, including the possibility 
of another foreign attack on the United States. In foreign 
intelligence investigations, moreover, the targets of 
surveillance often are agents of foreign powers, including 
international terrorist groups, who may be specially trained in 
concealing their activities and whose activities may be 
particularly difficult to detect. The Executive requires a 
greater degree of flexibility in this field to respond with 
speed and absolute secrecy to the ever-changing array of 
foreign threats faced by the Nation.\22\
---------------------------------------------------------------------------
    \22\ Even in the domestic context, the Supreme Court has recognized 
that there may be significant distinctions between wiretapping for 
ordinary law enforcement purposes and domestic national security 
surveillance. See United States v. United States District Court, 407 
U.S. 297, 322 (1972) (``Keith'') (explaining that ``the focus of 
domestic [security] surveillance may be less precise than that directed 
against more conventional types of crime'' because often ``the emphasis 
of domestic intelligence gathering is on the prevention of unlawful 
activity or the enhancement of the Government's preparedness for some 
possible future crisis or emergency''); see also United States v. 
Duggan, 743 F.2d 59, 72 (2d Cir. 1984) (reading Keith to recognize that 
``the governmental interests presented in national security 
investigations differ substantially from those presented in traditional 
criminal investigations''). Although the Court in Keith held that the 
Fourth Amendment's warrant requirement does apply to investigations of 
purely domestic threats to national security--such as domestic 
terrorism, it suggested that Congress consider establishing a lower 
standard for such warrants than that set forth in Title III. See id. at 
322-23 (advising that ``different standards'' from those applied to 
traditional law enforcement ``may be compatible with the Fourth 
Amendment if they are reasonable both in relation to the legitimate 
need of the Government for intelligence information and the protected 
rights of our citizens''). Keith's emphasis on the need for flexibility 
applies with even greater force to surveillance directed at foreign 
threats to national security. See S. Rep. No. 95-701, at 16 (``Far more 
than in domestic security matters, foreign counterintelligence 
investigations are `long range' and involve `` `the interrelation of 
various sources and types of information.' '') (quoting Keith, 407 U.S. 
at 322). And flexibility is particularly essential here, where the 
purpose of the NSA activities is to prevent another armed attack 
against the United States.
---------------------------------------------------------------------------
    In particular, the NSA activities are undertaken to prevent 
further devastating attacks on our Nation, and they serve the 
highest government purpose through means other than traditional 
law enforcement.\23\ The NSA activities are designed to enable 
the Government to act quickly and flexibly (and with secrecy) 
to find agents of al Qaeda and its affiliates--an international 
terrorist group which has already demonstrated a capability to 
infiltrate American communities without being detected--in time 
to disrupt future terrorist attacks against the United States. 
As explained by the Foreign Intelligence Surveillance Court of 
Review, the nature of the ``emergency'' posed by al Qaeda 
``takes the matter out of the realm of ordinary crime 
control.'' In re Sealed Case, 310 F.3d at 746. Thus, under the 
``special needs'' doctrine, no warrant is required by the 
Fourth Amendment for the NSA activities.
---------------------------------------------------------------------------
    \23\ This is not to say that traditional law enforcement has no 
role in protecting the Nation from attack. The NSA activities, however, 
are not directed at bringing criminals to justice but at detecting and 
preventing plots by a declared enemy of the United States to attack it 
again.
---------------------------------------------------------------------------
            B. The NSA activities are reasonable
    As the Supreme Court has emphasized repeatedly, ``[t]he 
touchstone of the Fourth Amendment is reasonableness, and the 
reasonableness of a search is determined by assessing, on the 
one hand, the degree to which it intrudes upon an individual's 
privacy and, on the other, the degree to which it is needed for 
the promotion of legitimate governmental interests.'' Knights, 
534 U.S. at 118-19 (quotation marks omitted); see also Earls, 
536 U.S. at 829. The Supreme Court has found a search 
reasonable when, under the totality of the circumstances, the 
importance of the governmental interests outweighs the nature 
and quality of the intrusion on the individual's Fourth 
Amendment interests. See Knights, 534 U.S. at 118-22. Under the 
standard balancing of interests analysis used for gauging 
reasonableness, the NSA activities are consistent with the 
Fourth Amendment.
    With respect to the individual privacy interests at stake, 
there can be no doubt that, as a general matter, interception 
of telephone communications implicates a significant privacy 
interest of the individual whose conversation is intercepted. 
The Supreme Court has made clear at least since Katz v. United 
States, 389 U.S. 347 (1967), that individuals have a 
substantial and constitutionally protected reasonable 
expectation of privacy that their telephone conversations will 
not be subject to governmental eavesdropping. Although the 
individual privacy interests at stake may be substantial, it is 
well recognized that a variety of governmental interests--
including routine law enforcement and foreign-intelligence 
gathering--can overcome those interests.
    On the other side of the scale here, the Government's 
interest in engaging in the NSA activities is the most 
compelling interest possible--securing the Nation from foreign 
attack in the midst of an armed conflict. One attack already 
has taken thousands of lives and placed the Nation in state of 
armed conflict. Defending the Nation from attack is perhaps the 
most important function of the federal Government--and one of 
the few express obligations of the federal Government enshrined 
in the Constitution. See U.S. Const. art. IV, Sec. 4 (``The 
United States shall guarantee to every State in this Union a 
Republican Form of Government, and shall protect each of them 
against Invasion. . . .'') (emphasis added); The Prize Cases, 
67 U.S. (2 Black) 635, 668 (1863) (``If war be made by invasion 
of a foreign nation, the President is not only authorized but 
bound to resist force by force.''). As the Supreme Court has 
declared, ``[i]t is `obvious and unarguable' that no 
governmental interest is more compelling than the security of 
the Nation.'' Haig v. Agee, 453 U.S. 280, 307 (1981).
    The Government's overwhelming interest in detecting and 
thwarting further al Qaeda attacks is easily sufficient to make 
reasonable the intrusion into privacy involved in intercepting 
one-end foreign communications where there is ``a reasonable 
basis to conclude that one party to the communication is a 
member of al Qaeda, affiliated with al Qaeda, or a member of an 
organization affiliated with al Qaeda.'' Press Briefing by 
Attorney General Alberto Gonzales and General Michael Hayden, 
Principal Deputy Director for National Intelligence, available 
at http://www.whitehouse.gov/news/releases/2005/12/20051219-
1.html (Dec. 19, 2005) (statement of Attorney General 
Gonzales); cf. Edmond, 531 U.S. at 44 (noting that ``the Fourth 
Amendment would almost certainly permit an appropriately 
tailored roadblock set up to thwart an imminent terrorist 
attack'' because ``[t]he exigencies created by th[at] 
scenario[] are far removed'' from ordinary law enforcement). 
The United States has already suffered one attack that killed 
thousands, disrupted the Nation's financial center for days, 
and successfully struck at the command and control center for 
the Nation's military. And the President has stated that the 
NSA activities are ``critical'' to our national security. Press 
Conference of President Bush (Dec. 19, 2005). To this day, 
finding al Qaeda sleeper agents in the United States remains 
one of the preeminent concerns of the war on terrorism. As the 
President has explained, ``[t]he terrorists want to strike 
America again, and they hope to inflict even more damage than 
they did on September 11th.'' Id.
    Of course, because the magnitude of the Government's 
interest here depends in part upon the threat posed by al 
Qaeda, it might be possible for the weight that interest 
carries in the balance to change over time. It is thus 
significant for the reasonableness of the NSA activities that 
the President has established a system under which he 
authorizes the surveillance only for a limited period, 
typically for 45 days. This process of reauthorization ensures 
a periodic review to evaluate whether the threat from al Qaeda 
remains sufficiently strong that the Government's interest in 
protecting the Nation and its citizens from foreign attack 
continues to outweigh the individual privacy interests at 
stake.
    Finally, as part of the balancing of interests to evaluate 
Fourth Amendment reasonableness, it is significant that the NSA 
activities are limited to intercepting international 
communications where there is a reasonable basis to conclude 
that one party to the communication is a member or agent of al 
Qaeda or an affiliated terrorist organization. This factor is 
relevant because the Supreme Court has indicated that in 
evaluating reasonableness, one should consider the ``efficacy 
of [the] means for addressing the problem.'' Vernonia, 515 U.S. 
at 663; see also Earls, 536 U.S. at 834 (``Finally, this Court 
must consider the nature and immediacy of the government's 
concerns and the efficacy of the Policy in meeting them.''). 
That consideration does not mean that reasonableness requires 
the ``least intrusive'' or most ``narrowly tailored'' means for 
obtaining information. To the contrary, the Supreme Court has 
repeatedly rejected such suggestions. See, e.g., Earls, 536 
U.S. at 837 (``[T]his Court has repeatedly stated that 
reasonableness under the Fourth Amendment does not require 
employing the least intrusive means, because the logic of such 
elaborate less-restrictive-alternative arguments could raise 
insuperable barriers to the exercise of virtually all search-
and-seizure powers.'') (internal quotation marks omitted); 
Vernonia, 515 U.S. at 663 (``We have repeatedly refused to 
declare that only the `least intrusive' search practicable can 
be reasonable under the Fourth Amendment.''). Nevertheless, the 
Court has indicated that some consideration of the efficacy of 
the search being implemented--that is, some measure of fit 
between the search and the desired objective--is relevant to 
the reasonableness analysis. The NSA activities are targeted to 
intercept international communications of persons reasonably 
believed to be members or agents of al Qaeda or an affiliated 
terrorist organization, a limitation which further strongly 
supports the reasonableness of the searches.
    In sum, the NSA activities are consistent with the Fourth 
Amendment because the warrant requirement does not apply in 
these circumstances, which involve both ``special needs'' 
beyond the need for ordinary law enforcement and the inherent 
authority of the President to conduct warrantless electronic 
surveillance to obtain foreign intelligence to protect our 
Nation from foreign armed attack. The touchstone of the Fourth 
Amendment is reasonableness, and the NSA activities are 
certainly reasonable, particularly taking into account the 
nature of the threat the Nation faces.


                               CONCLUSION


    For the foregoing reasons, the President--in light of the 
broad authority to use military force in response to the 
attacks of September 11th and to prevent further catastrophic 
attack expressly conferred on the President by the Constitution 
and confirmed and supplemented by Congress in the AUMF--has 
legal authority to authorize the NSA to conduct the signals 
intelligence activities he has described. Those activities are 
authorized by the Constitution and by statute, and they violate 
neither FISA nor the Fourth Amendment.
                                ------                                

               Department of Defense, Office of the
                 Under Secretary of Defense (Intelligence),
                                 Washington, DC, December 19, 2005.
Hon. Duncan Hunter,
Chairman, Committee on Armed Services,
House of Representatives, Washington, DC.
    Dear Mr. Chairman: An NBC Nightly News segment aired on 
December 13th alleging that Department of Defense (DoD) 
entities are collecting information on American peace activists 
and monitoring protests against the Iraq war. The segment 
highlighted entries in the Department's Threat and Local 
Observation Notice (TALON) reporting system. I want to provide 
you some context not otherwise reported in the segment.
    The Department is authorized to conduct an integrated and 
cooperative counterintelligence (CI) and military law 
enforcement effort that protects its installations, property 
and people from threats of all kinds--both overseas and in the 
United States. In support of this effort, designated DoD 
organizations report unfiltered information provided by 
concerned citizens, DoD personnel charged with responsibilities 
for the security of DoD installations (e.g., gate guards) or 
other DoD personnel reporting suspicious activities. That 
information is merged with information from local, state and 
federal law enforcement and other intelligence, security and CI 
organizations and is used by analysts to assess potential 
threats to DoD interests.
    TALON is the place where DoD initially stores ``dots'' of 
information which if validated, might later be connected to 
avert an attack before it occurs. Under existing procedures, a 
``dot'' of information that is not validated as threatening 
must be removed from the TALON system in less than 90 days. If 
the ``dot'' is validated, the information is transferred to law 
enforcement.
    I have directed that the appropriate CI and military law 
enforcement organizations within the Department take several 
actions. A thorough review of the TALON reporting system is 
underway to ensure full compliance with DoD directives and U.S. 
laws. We will review those policies and procedures for proper 
application with respect to receipt and retention of 
information about U.S. persons. Finally, we will review the 
TALON database to determine whether information has been 
improperly used or stored in the database.
    I have directed that all Department CI and intelligence 
personnel receive immediate refresher training concerning the 
laws, policies and procedures that govern the responsibilities 
for handling information, especially information related to 
U.S. persons.
    My office is currently engaged in both formal and informal 
dialogue with members of your staff on this subject. We stand 
ready to answer questions you may have.
    I have sent a similar letter to the Committee's Ranking 
Member, the Honorable Ike Skelton.
            Sincerely,
                                        Stephen A. Cambone,
                                        Under Secretary of Defense.
                                ------                                

               Department of Defense, Office of the
                 Under Secretary of Defense (Intelligence),
                                  Washington, DC, January 27, 2006.
Hon. Duncan Hunter,
Chairman, Committee on Armed Services,
House of Representatives, Washington, DC.
    Dear Mr. Chairman: In the Under Secretary of Defense for 
Intelligence letter of December 19, 2005, Dr. Stephen Cambone 
provided you some context not otherwise reported in an NBC News 
segment on the Department of Defense (DoD) TALON system. Dr. 
Cambone also advised that we would thoroughly review the TALON 
system. That review is nearly completed. I would like to update 
you on our results:
           DoD field commanders highly value the TALON 
        reporting program as a source of timely information 
        about possible foreign terrorist threats to their 
        personnel and facilities.
    The TALON reporting system is much like a capability to 
document information from a ``neighborhood watch'' program in 
which concerned citizens or DoD personnel report suspicious 
activities they believe may be linked to possible foreign 
terrorist activities to DoD counterintelligence, law 
enforcement or intelligence organizations. The focus of the 
effort was on possible foreign terrorist threats to the DoD and 
not on U.S. persons in the United States. The information that 
was reported to DoD security, law enforcement, 
counterintelligence or intelligence personnel was then briefed 
to local military command officials and laws enforcement as 
appropriate prior to being sent to the TALON reporting database 
at the Counterintelligence Field Activity (CIFA) for analysis. 
CIFA's role in the process is to maintain the database and 
conduct analysis.
           TALON reporting has led to a number of 
        investigations. Those include terrorism investigations, 
        most often conducted under the purview of the Joint 
        Terrorism Task Forces headed by FBI, and the reporting 
        has identified other criminal activities. The reporting 
        has also disclosed some patterns that have allowed the 
        Department to focus or change security procedures in 
        order to deter potential terrorist activities.
           Although the TALON reporting system was 
        intended to document suspicious incidents possibly 
        linked to foreign terrorist threats to DoD resources, 
        some came to view the system as a means to report 
        information about demonstrations and anti-base activity 
        that would be of interest to the field commanders from 
        a force protection prospective. A very small percentage 
        of these reports were submitted to the TALON/
        CORNERSTONE database.
           CIFA has removed the TALON reports on 
        demonstrations and anti-base activity from the 
        database. The process to remove other reports that are 
        no longer analytically significant is ongoing. All 
        TALON reports are now reviewed at CIFA upon receipt to 
        ensure compliance with the TALON reporting criteria.
           The DoD organizations involved in the TALON 
        reporting system were following multiple rule sets 
        regarding the collection and retention of this 
        information. The Department will soon issue detailed 
        guidance that clarifies the purpose of the database, 
        the rules governing the collection and retention of the 
        data and more detailed procedures to be followed. The 
        database will then be reviewed again to ensure 
        compliance.
    Dr. Cambone also directed that all Department 
counterintelligence and intelligence personnel receive 
immediate refresher training concerning the laws, policies and 
procedures that govern the responsibilities for handling 
information, especially information related to U.S. persons. 
The refresher training is underway and should be completed by 
January 31, 2006.
    This review clearly indicates that TALON is an important 
and valuable tool, and that we have room for improvement. We 
will continue our analysis of findings from this review to 
determine precisely what we need to do to improve and will 
provide you with additional information.
    There is nothing more important to the U.S. military than 
the trust and good will of the American people. The DoD values 
that trust and good will and consequently views with the 
greatest concern any potential violation of the strict DoD 
policy governing the protection of civil liberties. Our new 
guidance will reflect that concern and protect that trust.
    My office continues to be engaged in formal and informal 
dialogue with members of your staff on this subject. These 
discussions have been positive and productive. I look forward 
to an opportunity to brief your committee on these complex and 
overlapping issues. I have sent a similar letter to the 
Committee's Ranking Member, the Honorable Ike Skelton.
            Sincerely,
                               Robert W. Rogaliski,
                          Deputy Under Secretary of Defense
                                (Counterintelligence and Security).
                                ------                                


                          LEGISLATIVE HISTORY

    As noted above, H. Res. 645 was introduced on December 22, 
2005, and referred to the Committee on Armed Services.
    On March 1, 2006, the Committee on Armed Services held a 
mark-up session to consider H. Res. 645. After general 
discussion of the resolution, Ranking Member Skelton offered an 
amendment requesting the President and requiring the Secretary 
of Defense to provide to the House of Representatives 
classified information on the results of the NSA surveillance 
program. The amendment failed on a record vote of 21 ayes to 32 
noes. The committee reported adversely the resolution by voice 
vote, a quorum being present.

                           COMMITTEE POSITION

    On March 1, 2006, the Committee on Armed Services met in 
open session and reported adversely the resolution H. Res. 645 
to the House by voice vote, a quorum being present.

                  COMMUNICATION FROM ANOTHER COMMITTEE

                          House of Representatives,
                Permanent Select Committee on Intelligence,
                                   Washington, DC, February 8, 2006
Hon. Duncan Hunter,
Chairman, Committee on Armed Services,
House of Representatives, Washington, DC
    Dear Mr. Chairman: As you move forward to markup House 
Resolution 645, the resolution of inquiry offered by Mr. Wexler 
on the Terrorist Surveillance Program (TSP), I want to offer 
some concerns/considerations.
    The specific techniques and measures employed in this 
program are rightfully and highly classified. In fact, only a 
handful of Members of Congress are fully read into the details 
of these precious sources and methods. I am vitally concerned 
that, were the Administration to be forced to comply with the 
resolution's requests for specific information (logs, memos, 
telephone and electronic mail records, etc.) related to the TSP 
program, there could be a serious compromise of vital national 
security information and the terrorists targeted by this 
program would be given the warning necessary to thwart our 
intelligence efforts against them.
    There has been a great deal of hue and cry on many fronts 
about the process for overseeing this program, hence this 
resolution of inquiry. I can assure you, however, that House 
Leadership and those of us on the Intelligence Committee who 
are properly charged under House rules with exclusively 
overseeing these focused and limited Intelligence Community 
efforts have been fully and currently informed of all aspects 
of the program. We have been and are given ample opportunity to 
question the process, the operational aspects, and the legality 
of the program. I see no need for directing the President or 
the Secretary of Defense to produce information that is already 
properly provided to the Congress.
            Sincerely,
                                           Peter Hoekstra, Chairman
                                ------                                


                        COMMITTEE COST ESTIMATE

    Pursuant to clause 3(d) of rule XIII of the Rules of the 
House of Representatives, the committee estimates the costs of 
implementing the resolution would be minimal. The Congressional 
Budget Office did not provide a cost estimate for the 
resolution.

                           OVERSIGHT FINDINGS

    With respect to clause 3(c)(1) of rule XIII of the Rules of 
the House of Representatives, the committee reports that the 
findings and recommendations of the committee, based on 
oversight activities pursuant to clause 2(b)(1) of rule X, are 
incorporated in the descriptive portions of this report.
    With respect to clause 3(c)(2) of rule XIII of the Rules of 
the House of Representatives and section 308(a)(1) of the 
Congressional Budget Act of 1974, this legislation does not 
include any new spending or credit authority, nor does it 
provide for any increase or decrease in tax revenues or 
expenditures.
    With respect to clause 3(c)(4) of rule XIII of the Rules of 
the House of Representatives, performance goals and objectives 
can not be explained, because the resolution does not require 
any new funding.

                   CONSTITUTIONAL AUTHORITY STATEMENT

    Pursuant to clause 3(d)(1) of rule XIII of the Rules of the 
House of Representatives, the committee finds that the rule 
does not apply because H. Res. 645 is not a bill or joint 
resolution that may be enacted into law.

                              RECORD VOTE

    In accordance with clause 3(b) of rule XIII of the Rules of 
the House of Representatives, record and voice votes were taken 
with respect to the committee's consideration of H. Res. 645.


.