Judge Napolitano: The Only Privacy the Feds Protect Is Their Own

Last week, The New York Times revealed that in late 2017 and early 2018, prosecutors in the Department of Justice persuaded a federal grand jury to subpoena the telephone, email and texting records of about 20 people, including two members of Congress and their families, staffs and investigators, and one of the minor children of a staff member. Also subpoenaed were the records of Donald F. McGahn II, then the White House chief counsel, and his wife.

In all, the government sought data on 73 phone numbers and 36 email addresses. The subpoenas identified the targets only by telephone number and computer identification number.

The subpoenas were served on Apple, the custodian of these records. Also served upon Apple was a gag order signed by a federal judge instructing Apple not to tell anyone it had received the subpoenas. The government sought and obtained three annual extensions of the gag order. Such an order should have been challenged, as it is unconstitutional on its face.

The records sought and obtained were "metadata." Metadata is not content; yet it is everything but. Thus, the records that Apple surrendered showed who spoke to whom and when, who emailed whom and when, and who texted whom and when, but it did not show what was actually communicated.

Can the DOJ engage in a fishing expedition looking for leaks? Can it obtain personal records of members of Congress? Can it silence those who know about this? In a word: No, no and no.

Here is the backstory.

Governments have been seeking records in criminal cases since the beginning of the American republic. Until 1986, if the government served a subpoena for your records on your telephone provider, financial institution, physician or lawyer, the custodian would normally tell you of the subpoena, thereby giving you an opportunity to challenge it. Some sophisticated custodians – like Apple, though not in this case – have filed the challenge in behalf of their clients.

In the litigation over such a challenge, the owner of the records would become aware of the government’s wish to seize them and would find out why it sought them. There is no threat to the records themselves, as they are in the hands of the custodian, not the target. This was a fair system that worked well for 200 years.

All this changed in 1986 with the congressional enactment of the highly misnamed Electronic Communications Privacy Act. This law permits the feds to obtain metadata – but not content – and to obtain a court order prohibiting the custodian from telling its client.

Stated differently, under the common law, and long-standing, 200-year-old federal practice, the target could challenge the subpoena. But since 1986, that has not been the case. This so-called Privacy Act, in reality, is a pathway to invade privacy. The only privacy this statute protects is the government’s.

Notwithstanding the 1986 law, federal grand juries can only issue subpoenas when they are investigating crimes. And subpoenas can only be issued when federal prosecutors persuade the grand jury both that a crime has been committed and that the subpoenaed materials more likely than not – this is "probable cause" – contain evidence of the crime being investigated.

We know these subpoenas were served at the height of the Robert Mueller investigation of then-President Donald Trump. And we know that much was leaked during that investigation that was politically harmful to the president. We also know that no charges were ever filed against Trump, and he survived the Mueller investigation legally unscathed.

What crime could the feds have been looking for, and what did they tell a federal judge in order to get the gag order, and why didn’t they just ask the judge for an order to seize the content of these communications?

There is no judge present during grand jury proceedings, nor are the target or his lawyers there. Prosecutors can say almost whatever they want to persuade the grand jury to issue a subpoena, but what they say is recorded. Might a review of what they said show that there was no evidence of a crime?

Leaks are not criminal unless the leaker has a legal duty to keep silent. Federal law only imposes that duty on grand jurors and on others if the materials that could be leaked are classified. Short of that, there was no crime for a grand jury to investigate, and no federal judge would have issued a search warrant.

Moreover, the Speech and Debate Clause of the Constitution insulates members of Congress from any governmental acts against them – including surveillance – due to their use of words in furtherance of their congressional work. This is bolstered by the separation of powers – baked into the Constitution – which makes the legislative branch and the executive branch equals.

The First and Fourth Amendments are intentional obstacles to the government. The Supreme Court has ruled that the First lets you say whatever you wish about the government, come what may.

The Fourth provides that all persons shall be secure in their persons, houses, papers and effects. If the government pierced this protection without a demonstrable showing to a grand jury of crime, plus probable cause on each person whose records it sought, then it engaged in the very fishing expeditions that the amendment was written to prevent, and the government itself committed the crime of computer hacking.

It is unlikely that this mass surveillance found evidence of a crime in 2018, as no one has been indicted. My guess? Trump was furious over the leaks and ordered federal prosecutors to shake the trees and see who falls out. This is the tip of an unconstitutional, privacy-invading iceberg.

The feds who did this violated their oaths to uphold the Constitution. But lack of fidelity in government to the Constitution is nothing new.

Andrew P. Napolitano, a former judge of the Superior Court of New Jersey, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the US Constitution. The most recent isSuicide Pact: The Radical Expansion of Presidential Powers and the Lethal Threat to American Liberty. To find out more about Judge Napolitano and to read features by other Creators Syndicate writers and cartoonists, visit www.creators.com.


5 thoughts on “Judge Napolitano: The Only Privacy the Feds Protect Is Their Own”

  1. The only privacy the Feds protect is their own. That’s why Edward Snowden is living in exile in Russia and Chelsea Manning was in jail. The Feds want Julian Assange extradited to the US for telling the truth about its war crimes.

    1. Yeah. US presidents fake speak about other countries and how those countries oppress those that dissent. The sock puppet media just nods and affirms. Assange, Snowden, Manning and MANY others are ignored. Such hypocrisy.

  2. The feds who did this violated their oaths to uphold the Constitution. But lack of fidelity in government to the Constitution is nothing new.

    I think this statement by author Napolitano needs a detailed explanation. I’ve heard a lot of howling about this event, but this is the first time anybody has suggested a law was broken.

    The dimwits in the US House and Senate thought this was a grand idea back in 1986. Spying on the peasants was just fine. Don’t think they considered it could be used against them. In my personal opinion it serves them right.

    1. I remember a comic strip a long time ago. It was called “The Wizard of Id”. One Sunday there was a section where the Knight (” Rodney”), who comes to the king who was watching from his castle window a demonstration by the public that was getting violent. The demonstration was objecting to the rulers of the kingdom. Knight Rodney says: “Sire, the peasants are revolting! “. The king replies, They certainly are”.

  3. Absolutely spot on target article when you know this.

    January 10, 2014 *500* Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent *It’s Never to Protect Us From Bad Guys*

    No matter which government conducts mass surveillance, they also do it to crush dissent, and then give a false rationale for why they’re doing it.



Comments are closed.