In re: Under Seal

Filing 38

AMICUS CURIAE/INTERVENOR BRIEF by Empeopled, LLC in electronic and paper format. Type of Brief: Amicus Curiae. Method of Filing Paper Copies: mail. Date Paper Copies Mailed, Dispatched, or Delivered to Court: 10/25/2013. [999226270] [13-4625, 13-4626] Mahesha Subbaraman

Download PDF
Nos. 13-4625, 13-4626 In the United States Court of Appeals for the Fourth Circuit In re: GRAND JURY PROCEEDINGS ___________________________________________ UNITED STATES OF AMERICA, Plaintiff – Appellee, v. UNDER SEAL, Party-in-Interest – Appellants. On Appeal from the United States District Court for the Eastern District of Virginia BRIEF OF AMICUS CURIAE EMPEOPLED, LLC in Support of the Appellants and Reversal of the Judgment Below Richard M. Martinez Mahesha P. Subbaraman ROBINS, KAPLAN, MILLER & CIRESI, L.L.P. 2800 LaSalle Plaza 800 LaSalle Avenue Minneapolis, MN 55402-2015 (612) 349-8500 Counsel for Amicus Curiae Empeopled, LLC Table of Contents Table of Authorities ............................................................................................... ii Amicus Identity, Interest, & Authority to File.................................................... 1 Summary of the Argument .................................................................................... 6 Argument ................................................................................................................. 7 1. Political Privacy Is Vital to Democratic Self-Governance and Thus Protected by the Constitution ......................................... 7 2. Governmental Intrusions Upon Political Privacy Must Survive the Test of Strict Scrutiny.................................................. 11 3. By Protecting Political Privacy, Online Service Providers Advance Liberty and Self-Governance Worldwide .................... 15 4. The Government’s Demand for Lavabit’s Keys Has Chilled the Privacy Efforts of Online Service Providers ............ 21 5. The Government’s Demand for Lavabit’s Keys Thus Deserves—and Cannot Survive—Strict Scrutiny ........................ 24 Conclusion.............................................................................................................. 33 Certificate of Compliance .................................................................................... 34 Certificate of Service ............................................................................................. 35 i Table of Authorities Page Cases ACLU v. Reno, 929 F. Supp. 824 (E.D. Pa. 1996) aff’d, 521 U.S 844 (1997) ........................ 3 Bland v. Roberts, No. 12-1671, 2013 U.S. App. LEXIS 19268 (4th Cir. Sept. 18, 2013) ...................................................................16, 17, 18 Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998) .................................................................... 15 Boyd v. United States, 116 U.S. 616 (1886) ..................................................................................4, 33 Bridges v. City of Bossier, 92 F.3d 329 (5th Cir. 1996) .......................................................................... 25 Bursey v. United States, 466 F. 2d 1059, 1088 (9th Cir. 1972).....................................................31, 32 Casey v. City of Newport, 308 F.3d 106 (1st Cir. 2002) ........................................................................ 31 Citizens United v. Fed. Election Comm’n, 130 S. Ct. 876 (2010) ........................................................................12, 15, 26 Doe v. 2TheMart.com, Inc., 140 F. Supp. 2d 1088 (W.D. Wash. 2001) ................................................. 20 Gibson v. Fla. Legislative Investigation Comm., 372 U.S. 539, 572 (1963) ........................................................................29, 30 ii Table of Authorities (cont’d) Page Cases (cont’d) Jordan v. Hutcheson, 323 F.2d 597 (4th Cir. 1963) .......................................................................... 7 Kamen v. Kemper Fin. Servs., Inc., 500 U.S. 90 (1991) ........................................................................................ 25 Lankford v. Gelston, 364 F.2d 197 (4th Cir. 1966) ......................................................14, 27, 28, 29 Lawrence v. Texas, 539 U.S. 558 (2003) ...................................................................................... 33 McIntyre v. Ohio Elections Comm’n, 514 U.S. 334 (1995) ..................................................................7, 9, 10, 12, 13 NAACP v. Alabama, 357 U.S. 449 (1958) ........................................................................8, 9, 12, 13 Olmstead v. United States, 277 U.S. 438, 485 (1928) ........................................................................26, 27 Poe v. Ullman, 367 U.S. 497 (1961) ...................................................................................... 11 Roman Catholic Archdiocese of N.Y. v. Sebelius, 907 F. Supp. 2d 310 (E.D.N.Y. 2012) ......................................................... 14 Smith v. Ark. State Highway Emps., 441 U.S. 463 (1979) ........................................................................................ 7 iii Table of Authorities (cont’d) Page Cases (cont’d) Socialist Workers Party v. Hechler, 890 F.2d 1303 (4th Cir. 1989)..........................................................10, 11, 13 Sweezy v. New Hampshire, 354 U.S. 234, 267 (1957) ....................................................................7, 11, 30 United States v. Carolene Prods. Co., 304 U.S. 144 (1938) ................................................................................11, 12 United States v. Kyllo, 37 F.3d 526 (9th Cir. 1994) .......................................................................... 26 United States v. Stevens, 130 S. Ct. 1577 (2010) .................................................................................. 14 United States v. Van Winrow, 951 F.2d 1069 (9th Cir. 1991) ...................................................................... 25 Wis. Action Coalition v. City of Kenosha, 767 F.2d 1248 (7th Cir. 1985) ...................................................................... 31 Zeran v. Am. Online, Inc., 129 F. 3d 327 (4th Cir. 1997) ....................................................................... 15 Other Authorities About empeopled, EMPEOPLED, http://beta.empeopled.com/about ................. 1 iv Table of Authorities (cont’d) Page Other Authorities (cont’d) Amy Davidson, Introducing Strongbox, THE NEW YORKER, May 15, 2013, http://www.newyorker.com/online/blogs/closeread/ 2013/05/introducing-strongbox-anonymous-documentsharing-tool.html .......................................................................................... 20 Anjali Mullany, Privacy for the People: Wall Street Protesters Use Social Media App Vibe to Communicate Anonymously, N.Y. DAILY NEWS, Sept. 28, 2011, http://www.nydailynews.com/ news/wall-street-protesters-app-communicateanonymously-article-1.958432.................................................................... 20 Bill Chappell, Citing Privacy Worries, Tech & Legal Site Groklaw Shuts Down, NAT’L PUB. RADIO (NPR) TWO-WAY BLOG (Aug. 20, 2013, 1:16 PM) http://www.npr.org/blogs/thetwoway/2013/08/20/213828634/citing-privacy-worries-techand-legal-site-groklaw-shuts-down. ...................................................23, 24 Ian Paul, U.S. VPN Provider Shuts Consumer Service In Response to Lavabit Case, PC WORLD, Oct. 22, 2013, http://www.pcworld. com/article/2056554/u-s-vpn-provider-shuts-consumerservice-in-response-to-lavabit-case.html .................................................. 23 INT’L TELECOMM. UNION, THE WORLD IN 2013: ICT FACTS & FIGURES (2013), http://www.itu.int/en/ITU-D/Statistics/Documents /facts/ICTFactsFigures2013.pdf ............................................................... 15 Jennifer O’Mahony, Turkey Protests: How Activists Stay One Step Ahead with Social Media, TELEGRAPH (U.K.), June 4, 2013, http://www.telegraph. co.uk/technology/internetsecurity/10098353/Turkey-protests-how-activi sts-stay-onestep-ahead-with-social-media.html........................................................... 20 v Table of Authorities (cont’d) Page Other Authorities (cont’d) Jennifer Preston, Seeking to Disrupt Protesters, Syria Cracks Down on Social Media, N.Y. TIMES, May 22, 2011, http://www.nytimes. com/2011/ 05/23/world/middleeast/23facebook.html ...................... 18 Jennifer Preston, YouTube Offers a Way to Blur Faces, Protecting Identities in Videos, N.Y. TIMES MEDIA DECODER BLOG (July 18, 2012, 7:07 PM) http://mediadecoder.blogs.nytimes.com/ 2012/07/18/youtube-offers-a-way-to-blur-faces-protectingidentities-in-videos/. ................................................................................... 19 Jon Callas, To Our Customers, SILENT CIRCLE BLOG (Aug. 9, 2013), http://silentcircle.wordpress.com/2013/08/09/to-ourcustomers/ .................................................................................................... 22 Josh Chin, China Tightens Grip on Social Media, WALL ST. J., Sept. 9, 2013, http://online.wsj.com/news/articles/SB10001424127 8873245490045 79065113098846226 ........................................................... 18 Kerry McQueeney, Iran’s Government Accused of Controlling Internet Access As It Prepares to Switch Citizens’ Networks to ‘Improve Security’, U.K. DAILY MAIL ONLINE, Sept. 24, 2012, http://www.dailymail.co.uk/news/ article-2207902/Iraninternet-censorship-Government-accused-restricting-citizensonline-access.html. ....................................................................................... 16 Pamela Jones, Forced Exposure, GROKLAW (Aug. 20, 2013, 2:40 AM), http://groklaw.net/article.php?story=20130818120421175 ................. 24 vi Table of Authorities (cont’d) Page Other Authorities (cont’d) Press Release, Empeopled, empeopled Launches Social Platform to Bring Better Conversation and Content Curation to the Internet (Oct. 17, 2013), http://prweb.com/releases/2013/ 10/prweb11244684.htm ........................................................................1, 2, 3 Ronald D. Rotunda, Original Intent, the View of the Framers, and the Role of the Ratifiers, 41 VAND. L. REV. 507, 509-10 (1988). .......................... 7 Ryan Gallagher, The Threat of Silence, SLATE, Feb. 4, 2013, http://www.slate.com/articles/technology/future_tense/ 2013/02/silent_circle_s_latest_app_democratizes_encryption _governments_won_t_be.html................................................................... 22 Tanja Aitamurto & Hanna Sistek, How Social Media is Keeping the Egyptian Revolution Alive, PUB. BROAD. SERV. (PBS) MEDIASHIFT BLOG, (Sept. 13, 2011) http://www.pbs.org/mediashift/ 2011/09/how-social-media-is-keeping-the-egyptianrevolution-alive256/ .................................................................................... 16 TECHWEEK, http://techweek.com (last visited Oct. 19, 2013)........................... 2 2013 Nominees, CHICAGO INNOVATION AWARDS, http://chicago innovationawards.com/nominations/nominate-now/ .......................... 2 vii Amicus Identity, Interest, and Authority to File 1. Identity of Empeopled Empeopled, LLC (“Amicus”) is an early-stage startup company dedicated to advancing democratic self-governance through social media. Empeopled provides a virtual conversation platform that enables people across the world to discover each other, organize democratically, and then dynamically decide their own future.1 This platform is now open to the public and may be accessed online at beta.empeopled.com. Empeopled was founded in 2012 by Aris Michalopoulos and William Howe. A graduate of the University of Chicago, Aris left a successful career in finance to help found Empeopled. The company’s vision is reflected its motto, “Better Conversation for a Better World,”2 which ultimately speaks to what the Internet both can and does make possible. Empeopled launched its online platform in April 2013.3 Since then, more than 1,000 users have joined Empeopled, creating and contributing to See Press Release, Empeopled, empeopled Launches Social Platform to Bring Better Conversation and Content Curation to the Internet (Oct. 17, 2013), http://prweb.com/releases/2013/10/prweb11244684.htm. 2 About empeopled, EMPEOPLED, http://beta.empeopled.com/about. 3 See Press Release, supra note 1. 1 1 dozens of topical communities like “Tech World” and “The Human Rights Society.”4 These users participate in these topical communities via written posts and comments.5 Users then award points to each other’s written contributions to the extent they enrich the community as a whole. Finally, users employ crowd-voting to decide community rules and elect leaders to enforce these rules.6 “This means that the community can administer and govern itself to ensure high-quality, orderly conversation.”7 Empeopled thus constitutes “a long-term experiment to see what can be achieved when social media merges with self-governance.”8 As such, it was a nominee for a 2013 Chicago Innovation Award and recently was an exhibitor at the 2013 Techweek Chicago Launch Exposition.9 2. Interest of Empeopled Empeopled is interested in this case because of what it means for the future of free expression on the Internet and the kind of democratic See id. See id. 6 See id. 7 See id. 8 Id. (quoting Empeopled co-founder Aris Michalopoulos). 9 See 2013 Nominees, CHICAGO INNOVATION AWARDS, http://chicago innovationawards.com/nominations/nominate-now/ (last visited Oct. 19, 2013); TECHWEEK, http://techweek.com (last visited Oct. 19, 2013). 4 5 2 initiative and civic participation that Empeopled hopes to foster among its users. As Empeopled co-founder Aris Michalopoulos explains: “I imagine Empeopled one day becoming a platform for charitable causes, grass-roots lobbyist groups and maybe even virtual political parties.”10 Empeopled’s chances of achieving this goal, however, depend on its ability to innovate and provide its users with new ways to empower both themselves and each other. In this regard, Empeopled believes that just as private membership lists and a secret ballot are vital to civic participation in a democratic society, so too are the privacy-protecting measures that are employed by online service providers worldwide in order to encourage free speech and association among their users on the Internet. That is why the outcome of this appeal matters to Empeopled. At stake in this appeal are the future of the Internet, and the freedom of online service providers like Empeopled to meet both the privacy and free speech needs of their users worldwide. In this regard, “[a]s the most participatory form of mass speech yet developed, the Internet deserves the highest protection from governmental intrusion.” ACLU v. Reno, 929 F. Supp. 824, 10 Press Release, supra note 1 (quoting Aris Michalopoulos). 3 883 (E.D. Pa. 1996) (Dalzell, J., concurring), aff’d, 521 U.S 844 (1997). And yet, because of the Government’s actions in this case, over 400,000 users of Lavabit’s e-mail service have lost an important, secure, and fundamentally private means of speaking to each other and the rest of the world. That loss means a great deal for people worldwide who seek to share their political beliefs and form grassroots organizations but cannot do so— or fear doing so—absent the political privacy that online service providers afford. In turn, online service providers like Empeopled have a significant interest in protecting the political privacy of their users given the kinds of conversations and collaboration that such privacy enables. For this reason, the cost of a ruling against Lavabit in this case would be immeasurable, sending a clear—and chilling—message to online service providers about how much they should value the political privacy of their users. Empeopled thus respectfully submits this amicus brief to assist this Court in its duty “to be watchful for the constitutional rights of the citizen, and against any stealthy encroachments thereon.” Boyd v. United States, 116 U.S. 616, 635 (1886). In doing so, Empeopled hopes this Court will give serious consideration to what this case means for online service providers and the millions of people they empower across the globe. 4 3. Authority of Empeopled to File Empeopled files this amicus brief under Fed. R. App. P. 29(a), having received the consent of all the parties in this case. Moreover, per Fed. R. App. P. 29(c)(5), Empeopled states that no party, nor counsel for any party, in this case: (1) wrote this brief in part or in whole; or (2) contributed money meant to fund the preparation or submission of this brief. Only Empeopled, including its members and counsel, has contributed money meant to fund the preparation and submission of this brief. . 5 Summary of the Argument The Government’s seizure of Appellant’s private encryption keys is a matter of exceptional importance to online service providers. The chilling effect of this seizure has forced such providers to reexamine their ability and willingness to protect the political privacy of their users—users who depend on this privacy to speak freely, advocate their political beliefs, and organize democratically, all through the Internet. Accordingly, this Court should apply strict scrutiny in considering whether the Government’s demand for Appellant’s private encryption keys was proper in this case. Such exacting judicial review is warranted given the fundamental political rights this case implicates, and the chilling effect of the Government’s demand. Because of this demand, the privacy of over 400,000 users of Appellant’s e-mail service was threatened in an effort by the Government to obtain evidence on just one of these users. This should lead the Court to find as a matter of strict scrutiny that: (1) the Government’s investigative interest was not a compelling basis to seize Appellant’s keys; and (2) this seizure was not, in any event, narrowly tailored to meet this investigative interest. The judgments of the court below allowing this seizure should thus be reversed in their entirety. 6 Argument 1. Political Privacy Is Vital to Democratic Self-Governance and Thus Protected by the Constitution. “The First Amendment protects the right of an individual to speak freely, to advocate ideas, to associate with others, and to petition his government for redress of grievances.” Smith v. Ark. State Highway Emps., 441 U.S. 463, 464 (1979). But it is “the right of a citizen to political privacy, as protected by the Fourteenth Amendment” that unlocks the door to these First Amendment rights, helping to ensure that everyone gets to participate in deciding our nation’s future—minorities and dissidents included. Sweezy v. New Hampshire, 354 U.S. 234, 267 (1957) (Frankfurter, J., concurring); see also Jordan v. Hutcheson, 323 F.2d 597, 600 & n.4 (4th Cir. 1963) (quoting this language from Justice Frankfurter’s Sweezy concurrence). The Framers understood this as they drafted the Constitution in secret over the summer of 1787,11 and then privately collaborated with each other to publish anonymous editorials arguing over whether the States should adopt the Constitution. See McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, See Ronald D. Rotunda, Original Intent, the View of the Framers, and the Role of the Ratifiers, 41 VAND. L. REV. 507, 509-10 (1988). 11 7 360–67 (1995) (Thomas, J., concurring). And in the 226 years since then, federal courts have defended political privacy from government intrusion, especially in matters of association, speech, and the right to vote. Free Association. Consider the Supreme Court’s essential defense of political privacy during the midst of the Civil Rights Movement in NAACP v. Alabama, 357 U.S. 449 (1958). At issue in NAACP was a “judgment of contempt” against the NAACP for refusing “to comply fully with a court order requiring in part the production of membership lists.” Id. at 451. Alabama argued it needed the lists to prove that the NAACP’s activities in Alabama violated Alabama’s business registration laws. See id. at 464. Alabama further argued that any chilling effect that might result from its obtaining the lists should be disregarded since it “follow[ed] not from state action but from private community pressures.” Id. at 463. A unanimous Supreme Court, however, rejected this view, finding instead that “[i]n the domain of … indispensable liberties, whether of speech, press, or association … abridgment of such rights, even though unintended, may inevitably follow from varied forms of governmental action.” Id. at 461. The Court consequently refused to let Alabama seize the NAACP’s membership lists given “the vital relationship between freedom 8 to associate and privacy in one’s associations” and “the deterrent effect on the free enjoyment of the right to associate which disclosure of [the NAACP] membership lists is likely to have.” Id. at 462, 466. Free Expression. Another key defense of political privacy is present in McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995). After Margaret McIntyre distributed political leaflets opposing a school levy near a public meeting—leaflets that were not “false, misleading, or libelous”—she was convicted of violating Ohio election law. See id. at 337-38. Her crime? Deciding to publish many of the leaflets without putting her name on them. See id. at 338. Subsequently, on appeal, Ohio argued that the election law at issue was “a reasonable regulation of the electoral process” that was needed to “prevent[] fraudulent and libelous statements” and “provid[e] the electorate with relevant information.” Id. at 341, 348. The Supreme Court took a different view: “Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent.” Id. at 357. The Court thereby affirmed how political privacy and self-governance work hand in hand: “Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights … to protect unpopular 9 individuals from retaliation….” Id. In turn, the Court observed that while such anonymity may be abused, still, “our society accords greater weight to the value of free speech than to the dangers of its misuse.” Id. Right to Vote. The Supreme Court has described the “secret ballot” as “the hard-won right to vote one’s conscience without fear of retaliation.” McIntyre, 514 U.S. at 344. Accordingly, this Court’s decision in Socialist Workers Party v. Hechler, 890 F.2d 1303 (4th Cir. 1989) defended both this right and the essential way in which this right connects political privacy with self-governance. At issue in Hechler was a constitutional challenge to various West Virginia election laws, including a law that required persons signing minor-party-candidate nomination petitions to also declare their “desire to vote” for the candidate named in the petition. See id. at 1304. West Virginia argued this law “protect[ed] the voter ... from inadvertently signing his primary nomination vote away.” Id. at 1310. This Court noted, however, the real effect of this law: to “discourage people from joining unpopular or controversial parties or causes.” Id. at 1309. For this reason, this Court emphasized that “the important thing is what the voter thinks”—and, from this perspective, the need of every voter to keep his or her vote private was clear. Id. at 1310. The law at issue thus 10 could not pass muster, as it “discourage[d] citizens from participation in the electoral process simply because they do not wish people to know how they will vote.” Id. at 1309 (quotation and citation omitted). Private membership lists. Anonymous political speech. Secret ballots. These are “not a series of isolated points pricked out” by the Constitution. Poe v. Ullman, 367 U.S. 497, 543 (1961) (Harlan, J., dissenting). Rather, they are part of “the full scope of … liberty guaranteed by the Due Process Clause.” Id. And for good reason, as “[h]istory has amply proved the virtue of political activity by minority, dissident groups, who innumerable times have been in the vanguard of democratic thought.” Sweezy, 354 U.S. at 251. Thus, when government conduct serves to curtail the privacy that makes such “political activity” possible, this conduct demands the toughest form of judicial review available under the Constitution: strict scrutiny. 2. Governmental Intrusions Upon Political Privacy Must Survive the Test of Strict Scrutiny . Seventy-five years ago, the Supreme Court acknowledged the general need for “more exacting judicial scrutiny” when laws impose “restrictions upon the right to vote … [or] restraints upon the dissemination of information … [or] interferences with political organization.” United States 11 v. Carolene Prods. Co., 304 U.S. 144, 152 n.4 (1938). Since then, when state action has intruded in a significant manner on political speech, association, or the right to vote, the legal test for whether such an action can survive constitutional review has almost always been “strict scrutiny.” See, e.g., Citizens United v. Fed. Election Comm’n, 130 S. Ct. 876, 898 (2010) (“Laws that burden political speech are ‘subject to strict scrutiny’….”). Under the test of “strict scrutiny,” the Government must prove to the Court that its intrusion “furthers a compelling interest and is narrowly tailored to achieve that interest.” Id. Hence, the Supreme Court has applied strict scrutiny not only where state action has directly restricted a core right like free speech (e.g., a total ban on leafleting), but also where state action has invaded a realm of political privacy that is vital to the exercise of a core right (e.g., a ban on publishing anonymous leaflets). For example, in NAACP v. Alabama, the Court relied on the following premise in proceeding to find that Alabama could not demand disclosure of the NAACP’s private membership lists: “[S]tate action which may have the effect of curtailing the freedom to associate is subject to the closest scrutiny.” 357 U.S. at 461. Likewise, in McIntyre v. Ohio, the Court held that while Margaret McIntyre may not have put her name on some of her 12 political leaflets, “[w]hen a law burdens core political speech, we apply ‘exacting scrutiny.’” 514 U.S. at 348. Finally, in Hechler v. Socialist Workers Party, this Court applied a standard tantamount to strict scrutiny in finding that West Virginia’s stated “interest in making voters disclose their voting preferences is neither legitimate nor strong.” 890 F.3d at 1310. It did not matter in these cases what form the government intrusion upon political privacy took—be it statute (McIntyre, Hechler) or court order (NAACP). Nor did it matter in NAACP that the intrusion was justified on non-political grounds (i.e., to enforce a state business registration law). In each case, strict scrutiny was applied, in large part because of the chilling effect of such intrusions on the future exercise of either political speech, free association, or the right to vote. See NAACP, 357 U.S. at 463 (noting the “deterrent effect” of the disclosures at issue); McIntyre, 514 U.S. at 357 (emphasizing that the First Amendment exists “to protect unpopular individuals from retaliation”); Hechler, 890 F.3d at 1310 (rejecting “desire to vote” disclosure rule for its “chilling effect on the voter”). Besides concern for a “chilling effect,” two other important reasons counsel application of “strict scrutiny” where government intrusions upon political privacy are at issue. First, intrusions upon a law-abiding citizen’s 13 privacy generally carry a significant risk of irreparable harm. As this Court noted in regard to a warrantless police raid of multiple private homes during an manhunt that lasted 19 days: “The parties seeking redress have committed no acts warranting violation of the privacy of their homes…. .... There can be little doubt that actions for money damages would not suffice to repair the injury suffered by the victims of the police searches. …. [T]he wrongs inflicted are not readily measurable in terms of dollars and cents.” Lankford v. Gelston, 364 F.2d 197, 201-02 (4th Cir. 1966). Second, government intrusions upon political privacy affect liberties that are meant to “protect[] against the Government”—not “leave us at the mercy of noblesse oblige.” United States v. Stevens, 130 S. Ct. 1577, 1591 (2010). The First Amendment thus “does not require citizens to accept assurances from the government that, if the government later determines it has made a misstep, it will take ameliorative action. …. To the contrary, the Bill of Rights itself, and the First Amendment in particular, reflect a degree of skepticism towards governmental self-restraint and self-correction.” Roman Catholic Archdiocese of N.Y. v. Sebelius, 907 F. Supp. 2d 310, 331 (E.D.N.Y. 2012). And such skepticism is critical when state action intrudes upon the 14 political privacy—and resulting capacity for self-governance—that online service providers afford to their users across the world. 3. By Protecting Political Privacy, Online Service Providers Advance Liberty and Self-Governance Worldwide. In 1997, “approximately 40 million people worldwide” were using the Internet. Zeran v. Am. Online, Inc., 129 F. 3d 327, 328 (4th Cir. 1997). Now, in 2013, an estimated 2.7 billion people—or almost 40% of the world’s population—use the Internet.12 Much of this explosive growth is due to the “new forms, and new forums, for the expression of ideas” that the Internet makes available. Citizens United, 130 S. Ct. at 917. Indeed, “users of Internet information are also its producers. … [E]very person who taps into the Internet is his [or her] own journalist.” Blumenthal v. Drudge, 992 F. Supp. 44, 48 n.7 (D.D.C. 1998) (citation and quotation omitted). This makes the Internet a vital means for enabling political speech, association, and discourse—in short, democratic self-governance. Recent events in Iran help make this clear: “For dissidents opposing the Islamic Republic’s leadership, the [I]nternet has become one of the most powerful INT’L TELECOMM. UNION, THE WORLD IN 2013: ICT FACTS & FIGURES 1 (2013), http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFa ctsFigures2013.pdf. 12 15 communication tools at their disposal. Demonstrations have been orchestrated using blogs and social networks to gather support and increase numbers.”13 Moreover, “[a]s Iran played down events to outsiders, dissidents used Twitter, Facebook and YouTube to tell the world what was really happening,” including the killing of Iranian student Neda Soltan, “whose murder at the hands of a government militiaman was captured on a camera phone and uploaded to YouTube in [June] 2009.”14 Recent events in both Syria and Egypt bear out a similar pattern of events.15 This Court recently encountered this political reality on a smaller scale in Bland v. Roberts with respect to campaign speech on Facebook, “an online social network where members develop personalized web profiles Kerry McQueeney, Iran’s Government Accused of Controlling Internet Access As It Prepares to Switch Citizens’ Networks to ‘Improve Security’, U.K. DAILY MAIL ONLINE, Sept. 24, 2012, http://www.dailymail.co.uk/news/ article-2207902/Iran-internet-censorship-Government-accused-restrictingcitizens-online-access.html. 14 Id. 15 See infra note 18 and accompanying text (describing the political use of social media in Syria); see also Tanja Aitamurto & Hanna Sistek, How Social Media is Keeping the Egyptian Revolution Alive, PUB. BROAD. SERV. (PBS) MEDIASHIFT BLOG, (Sept. 13, 2011) http://www.pbs.org/mediashift/2011/ 09/how-social-media-is-keeping-the-egyptian-revolution-alive256/ (“As the military has closed Tahrir Square … smaller protests are happening elsewhere in Cairo. Facebook pages … with more than 1.6 million followers, are used for spreading the message about protests…..”). 13 16 to interact and share information with other members.” No. 12-1671, 2013 U.S. App. LEXIS 19268, at *42 (4th Cir. Sept. 18, 2013). Bland concerned claims by six sheriff’s office employees that they were fired in violation of the First Amendment for supporting the sitting sheriff’s electoral opponent. Id. at *2. These retaliation claims, in turn, rested on a variety of online speech by these employees that the sheriff allegedly monitored, including the “liking” of a Facebook page—something the district court held was “insufficient speech to merit constitutional protection.” Id. at *41. This Court disagreed: “In sum, liking a political candidate’s campaign [Facebook] page communicates the user’s approval of the candidate and supports the campaign by associating the user with it. In this way, it is the Internet equivalent of displaying a political sign in one's front yard ….” Id. at *46. The Court thereby recognized the substantive nature of the kind of political speech that takes place on the Internet—particularly as facilitated by online service providers like Facebook. Id. at *45 (“In the context of a political campaign’s Facebook page, the meaning that the user approves of the candidacy whose page is being liked is unmistakable.”). The Court further acknowledged the capacity of such speech to support a retaliation claim: in short, such speech generated “a genuine factual issue 17 concerning whether [the employee’s] Facebook support” for the sheriff’s opponent was what cost the employee his job. Id. at *50-51. The facts of Bland thus reveal not only the vital political speech that takes place on the Internet, but also the frequent need for political privacy when engaging in such speech. And in this regard, the sheriff’s alleged conduct in Bland is but the tip of the iceberg in terms of the risks that many users face in speaking online. For example, the New York Times reports that in Syria—a nation with 580,000 Facebook users—government agents have ordered dissidents to “turn over their Facebook passwords” and have even beaten dissidents for “regime criticisms on their Facebook pages.”16 In turn, the Wall Street Journal reports that Chinese leaders have recently declared that “social-media users who post comments considered to be slanderous could face prison if the posts attract wide attention.”17 Jennifer Preston, Seeking to Disrupt Protesters, Syria Cracks Down on Social Media, N.Y. TIMES, May 22, 2011, http://www.nytimes.com/2011/ 05/23/world/middleeast/23facebook.html (further explaining how one Syrian dissident was only able to avoid detention “because he had created multiple Facebook accounts with fake identities”). 17 Josh Chin, China Tightens Grip on Social Media, WALL ST. J., Sept. 9, 2013, http://online.wsj.com/news/articles/SB100014241278873245490045 79065113098846226 (“In recent months, the [Chinese] government has … detain[ed] dozens for spreading rumors and warn[ed] influential microbloggers with large numbers of followers to watch what they say.”). 16 18 Given these risks, online service providers are stepping up to find new and better ways to protect their users’ political privacy. For instance, as the New York Times reported in 2012: “To help protect dissidents using video to tell their stories in countries with repressive government regimes, YouTube [has] made available a new tool … [that] allow[s] people to obscure faces within videos uploaded onto its platform.”18 The ultimate result of these efforts has been the civic empowerment of millions of people worldwide. The Telegraph thus offers the following account of a Turkish citizen under the pseudonym Damla: [A]n activist in Ankara, [Damla] is constantly refreshing private Facebook groups for updates, posting pictures onto Twitter, and using a popular app for group private messaging to talk to her friends. She will receive links to maps only visible to fellow activists that show the location of makeshift clinics in houses and even in restaurants’ basements, and can watch live streams of protests on the Ustream service if she is at home. She told the Telegraph: “It has had a massive impact, and if it wasn’t for social media we wouldn’t have the right information on anything. It’s been our Jennifer Preston, YouTube Offers a Way to Blur Faces, Protecting Identities in Videos, N.Y. TIMES MEDIA DECODER BLOG (July 18, 2012, 7:07 PM) http://mediadecoder.blogs.nytimes.com/2012/07/18/youtube-offers-away-to-blur-faces-protecting-identities-in-videos/. 18 19 saviour.” Damla said the use of private group messaging meant activists could “react quickly to check whether we’re all safe”….19 This reality also obtains here at home. Indeed, Wall Street protestors are relying on the political privacy afforded by online service providers to organize their protests.20 A major American magazine is now offering “an online place where people can send documents and messages to the magazine, and we … can offer them a reasonable amount of anonymity.”21 And Americans in general are relying on the anonymity afforded to them by their online service providers to speak in a variety of ways.22 The Jennifer O’Mahony, Turkey Protests: How Activists Stay One Step Ahead with Social Media, TELEGRAPH (U.K.), June 4, 2013, http://www.telegraph. co.uk/technology/internet-security/10098353/Turkey-protests-how-activi sts-stay-one-step-ahead-with-social-media.html. 20 See Anjali Mullany, Privacy for the People: Wall Street Protesters Use Social Media App Vibe to Communicate Anonymously, N.Y. DAILY NEWS, Sept. 28, 2011, http://www.nydailynews.com/news/wall-street-protesters-appcommunicate-anonymously-article-1.958432. 21 Amy Davidson, Introducing Strongbox, THE NEW YORKER, May 15, 2013, http://www.newyorker.com/online/blogs/closeread/2013/05/intr oducing-strongbox-anonymous-document-sharing-tool.html. 22 Based on this reality, one federal court has concluded: “The free exchange of ideas on the Internet is driven in large part by the ability of Internet users to communicate anonymously. If Internet users could be stripped of that anonymity by a civil subpoena enforced under the liberal rules of civil discovery, this would have a significant chilling effect on Internet communications and thus on basic First Amendment rights.” Doe v. 2TheMart.com, Inc., 140 F. Supp. 2d 1088, 1093 (W.D. Wash. 2001). 19 20 privacy efforts of online service providers are thus enabling more people than ever before to exercise basic political rights without fear. And that progress is precisely what has been endangered by the Government’s demand for Lavabit’s private encryption keys in this case. 4. The Government’s Demand for Lavabit’s Keys Has Chilled the Privacy Efforts of Online Service Providers. On the surface, the facts of the present case appear straightforward: “Lavabit is an e-mail service provider, and this case arises out of a criminal investigation into one of its customers. In the course of that investigation, Lavabit was ordered to disclose the company’s private encryption keys, which it refused to do.” Appellant’s Br. 1. Lavabit’s refusal then subjected Lavabit to a contempt order that finally led Lavabit to “provide[] its private keys to the government—but also shut down its service entirely.” Id. at 10. Over 400,000 Lavabit users thus lost access to a service that gave them “an unparalleled degree of security and privacy,” and Lavabit’s founder, Ladar Levison, lost “nearly ten years of hard work.” Id. at 2, 10. But the effects of the Government’s demand for Lavabit’s encryption keys were not limited to Lavabit, Mr. Levison, and Lavabit’s over 400,000 users. Id. at 4. Silent Circle, for example, was also affected. The operator of 21 a secure, encrypted e-mail service called “Silent Mail,” Silent Circle decided to end this service shortly after Lavabit shut itself down. Silent Circle made this decision for the following reason: “We see the writing the wall, and we have decided that it is best for us to shut down Silent Mail now. We have not received subpoenas, warrants, security letters, or anything else by any government, and this is why we are acting now.”23 That Silent Circle deemed it necessary to take this action is telling given the important role that Silent Circle has played in to helping to advance the protection of political privacy and free speech worldwide. As Slate reports, Silent Circle is responsible for developing privacy tools that enable “human rights reporters in Afghanistan, Jordan, and South Sudan … to send photos, voice recordings, videos, and PDFs securely. … [A Silent Circle tool] was [recently] used in South Sudan to transmit a video of brutality that took place at a vehicle checkpoint.”24 In this regard, Silent Jon Callas, To Our Customers, SILENT CIRCLE BLOG (Aug. 9, 2013), http://silentcircle.wordpress.com/2013/08/09/to-our-customers/. Also, as Amicus’s filing of this brief indicates, this case has left many online service providers in doubt about what future government restrictions they may eventually face in protecting the privacy of their users. 24 Ryan Gallagher, The Threat of Silence, SLATE, Feb. 4, 2013, http:// www.slate.com/articles/technology/future_tense/2013/02/silent_circle_s _latest_app_democratizes_encryption_governments_won_t_be.html. 23 22 Circle’s credo is simply stated by its CEO and ex-Navy SEAL, Mike Janke: “We feel that every citizen has a right to communicate.”25 And on this score, the Government’s demand for all of Lavabit’s private keys did not just affect online service providers like Silent Circle: it also affected citizens as well, and in much the same way that Silent Circle was affected. As National Public Radio reports: “The website Groklaw, which for 10 years demystified complex issues involving technology and the law, is shutting down. Editor Pamela Jones writes that she can’t run the site without email, and that since emails’ privacy can’t be guaranteed, she can no longer do the site’s work.”26 What drove Jones to these conclusions? Jones herself explains in her final web posting on Groklaw: The owner of Lavabit tells us that he’s stopped using email and if we knew what he knew, we’d Id.; see also Ian Paul, U.S. VPN Provider Shuts Consumer Service In Response to Lavabit Case, PC WORLD, Oct. 22, 2013, http://www.pcworld. com/article/2056554/u-s-vpn-provider-shuts-consumer-service-in-respon se-to-lavabit-case.html (reporting that the Lavabit case has also led online service provider CryptoSeal to shut down insofar as CryptoSeal afforded its U.S. users with “secure tunnels to the Internet that allow[ed] [these] users to … maintain at least a modicum of privacy online”). 26 Bill Chappell, Citing Privacy Worries, Tech & Legal Site Groklaw Shuts Down, NAT’L PUB. RADIO (NPR) TWO-WAY BLOG (Aug. 20, 2013, 1:16 PM) http://www.npr.org/blogs/thetwo-way/2013/08/20/213828634/citingprivacy-worries-tech-and-legal-site-groklaw-shuts-down. 25 23 stop too. There is no way to do Groklaw without email. Therein lies the conundrum. * * * [T]he conclusion I’ve reached is that there is no way to continue doing Groklaw … which is incredibly sad. But it’s good to be realistic. And the simple truth is, no matter how good the motives might be for collecting and screening everything we say to one another, and no matter how “clean” we all are ourselves from the standpoint of the screeners, I don’t know how to function in such an atmosphere. I don't know how to do Groklaw like this.27 Pamela Jones’s departure from the online legal world is no small loss: “Last year, the American Bar Association named Groklaw one of the top 100 legal blogs. Its articles and interviews were selected by the Library of Congress to be preserved in its Web Archiving project.”28 It also serves to establish—just as Silent Circle’s shutdown decision does—the need for “strict scrutiny” of the Government’s conduct in this case. 5. The Government’s Demand for Lavabit’s Keys Thus Deserves—and Cannot Survive—Strict Scrutiny. At the outset, Amicus acknowledges that the following argument for “strict scrutiny” review of the Government’s conduct in this case is not one Pamela Jones, Forced Exposure, GROKLAW (Aug. 20, 2013, 2:40 AM), http://groklaw.net/article.php?story=20130818120421175. 28 Chappell, supra note 25. 27 24 that Appellant raises in its opening brief. Instead, Appellant’s brief focuses on dismantling the various bases on which the Government has thus far justified its demand for Lavabit’s private encryption keys.29 This Court should still consider Amicus’s argument for two reasons. First, neither the political privacy nor the First Amendment dimensions of this case can be disputed given the effects of the Government’s conduct so far on Lavabit’s over 400,000 users and the broader online community. See supra Part IV. Thus, as the Supreme Court has held, “[w]hen an issue or claim is properly before the court, the court is not limited to the particular legal theories advanced by the parties, but rather retains the independent power to identify and apply the proper law.” Kamen v. Kemper Fin. Servs., Inc., 500 U.S. 90, 99 (1991). Second, it is always within the Court’s power to reach a purely legal argument raised by an amicus in its brief. See, e.g., Bridges v. City of Bossier, 92 F.3d 329, 335 n.8 (5th Cir. 1996).30 Appellant may still adopt Amicus’s argument in its reply brief, which would give this Court further reason to reach Amicus’s argument. See, e.g., United States v. Van Winrow, 951 F.2d 1069, 1073 (9th Cir. 1991) (”[A]micus … raises several additional challenges…. Because [Appellant] states in his brief that he wishes to adopt these arguments as his own, and because they present pure issues of law, we will consider them here.”). 30 In the event this Court should find that either the factual record or the parties’ briefing in this case is not sufficient to address the political 29 25 With this in mind, “strict scrutiny” analysis in this case requires one to first consider whether the Government’s demand for Lavabit’s keys was supported by a “compelling interest.” Citizens United, 130 S. Ct. at 898. In this regard, it appears the principal reason why the Government wanted Lavabit’s private keys was because it wanted to gather evidence relevant to a criminal investigation. See Appellant’s Br. 5. But this interest was limited in scope given that the government’s investigation was confined to just one Lavabit user. See id. Indeed, Lavabit was not “a target or a subject of the government’s investigation …. [and] neither Lavabit nor its owner … [was] charged with or suspected of any crime.” Appellant’s Br. 1 n.1. The government’s interest in gathering evidence needed to conduct a full criminal investigation is an important one. It is not, however, an allpurpose justification for every method the government may want to use to get the evidence it needs. As Justice Brandeis has explained: “To declare that in the administration of the criminal law the end justifies the means— privacy and First Amendment arguments that Amicus raises, then Amicus respectfully suggests the Court should remand to the district court for an evidentiary hearing on this argument and/or seek supplemental briefing from the parties on this argument. Cf. United States v. Kyllo, 37 F.3d 526, 530-31 (9th Cir. 1994) (remanding to the district court for an evidentiary hearing on the intrusiveness of a thermal imaging device in order to obtain facts needed to decide the Fourth Amendment status of the device). 26 to declare that the Government may commit crimes in order to secure the conviction of a private criminal—would bring terrible retribution. Against that pernicious doctrine this Court should resolutely set its face.” Olmstead v. United States, 277 U.S. 438, 485 (1928) (Brandeis, J., dissenting). In Lankford v. Gelston, this Court was confronted with the stark need to apply this principle in the face of the Baltimore Police Department’s severe efforts “to capture Samuel and Earl Veney, two brothers who [had] shot and killed one policeman and seriously wounded another.” 364 F. 2d 197, 198 (4th Cir. 1966). In particular, “[d]uring a nineteen-day period in December, 1964, and January, 1965, the police conducted searches of more than 300 houses, most of them private dwellings. The searches were based in almost every instance on unverified anonymous tips. In none did the police have a search warrant.” Id. This Court subsequently concluded that “[t]his case reveal[ed] a series of the most flagrant invasions of privacy ever to come under the scrutiny of a federal court.” Id. at 201. In reaching this conclusion, this Court acknowledged the difficult circumstances at hand: “[W]here one policeman is killed and another wounded, the police, and the public, too, are understandably outraged and impatient with any obstacle in the search for the murderer.” Id. at 204. At 27 the same time, this Court recognized that its respect for the “exceedingly difficult task of the policeman” could not be allowed to deter the Court “from protecting rights secured to all by the Constitution.” Id. It was thus the Court’s responsibility to vindicate those homeowners whose privacy was invaded by the Baltimore police —homeowners who “committed no acts warranting violation of the privacy of their homes.” Id. at 201. The facts of the present case bear a similarity to the facts of Lankford, despite the shift from a real-world location to a virtual one. Indeed, this case concerns the Government’s seizure of “master keys” from Lavabit that would enable the Government to invade and monitor the private e-mail accounts of Lavabit’s over 400,000 customers, and continue to do so in the future had Lavabit not shut down its service. Appellant’s Br. at 4. The Government did not try to get a warrant for each of these accounts—nor does it appear to have established by probable cause that a search reaching all these users’ private communications was justified. See id. Instead, much like the Baltimore Police Department in Lankford, the Government decided to pursue a criminal investigation by means of a “wholesale raid[]”—and it thus demanded Lavabit’s private keys to make this raid possible. 364 F.2d at 204. The Government then went one step 28 further, forbidding “Lavabit from telling anyone that it had compromised [Lavabit’s] security … not its customers, not its business partners, and not the relevant cryptographic authorities.” Appellant’s Br. 7. By contrast, the police raids at issue in Lankford at least occurred with the knowledge of the people whose homes were searched (see 364 F.2d at 199-200), thus enabling these people to seek later redress in this Court. Here, absent Lavabit’s decision to shut down its e-mail service after turning over its keys to the Government, the Government stood poised to execute a virtual raid affecting 400,000 private e-mail accounts, without any of the owners ever knowing this had happened or getting the chance to object in court—users who, as far as the record indicates, have “committed no acts warranting violation of the privacy of their [e-mail].” Id. at 201. Accordingly, the Government’s interest in conducting this raid in the hopes of seizing communications made by a single criminal suspect is not sufficiently compelling to pass strict scrutiny. Nor can it be, when one considers the long-term effect of such government conduct on both the political privacy and First Amendment rights of every American. As Justice Douglas notes: “If the files of the N.A.A.C.P. can be ransacked because some Communists may have joined it, then all walls of privacy are broken 29 down. By that reasoning the records of the confessional can be ransacked because a ... criminal was implicated.” Gibson v. Fla. Legislative Investigation Comm., 372 U.S. 539, 572 (1963) (Douglas, J., concurring). Yet, even if this Court were to assume as a matter of argument that the Government’s investigative interest in this case was compelling enough to support a demand for Lavabit’s keys, this demand still cannot pass “strict scrutiny” given its lack of “narrow tailoring.” In this regard, the Supreme Court cautions: “It is particularly important that the exercise of the power of compulsory process be carefully circumscribed when the investigative process tends to impinge upon such highly sensitive areas as freedom of speech or press, freedom of political association, and freedom of communication of ideas….” Sweezy, 354 U.S. at 245. But the Government’s demand for Lavabit’s keys in this case was anything but “carefully circumscribed.” Id. To the contrary, this demand ultimately entailed the Government getting the power to “monitor the … content of all communications between Lavabit and all of its customers, or even masquerade as [Lavabit] if it chose to do so.” Appellant’s Br. 7 (emphasis in original). Put another way, with Lavabit’s keys in hand, the 30 Government became able to monitor every Lavabit user’s e-mail without ever again seeking a court order directed at a specific user. This demand thus lacks the kind of narrow tailoring that strict scrutiny calls for. See Casey v. City of Newport, 308 F.3d 106, 114 (1st Cir. 2002) (“[T]he narrow-tailoring test requires … consider[ation] [of] whether the regulation … sweeps more broadly than necessary to promote the government’s interest.”) This is especially clear when one considers the “compromise” that Lavabit proposed and the Government rejected in this case—a compromise that would have enabled the Government to obtain the information it wanted while also protecting the privacy of every other Lavabit user. See Appellant’s Br. 8-9; see also Wis. Action Coalition v. City of Kenosha, 767 F.2d 1248, 1255 (7th Cir. 1985) (“Obviously, if there exists a less restrictive method of furthering the legitimate governmental interest, the regulation in question is not as precise as it could be.”). Of course, the Government may argue that without Lavabit’s keys, it potentially stood to lose “some evidence substantially connected to the compelling objects of [its] investigation.” Bursey v. United States, 466 F. 2d 1059, 1088 (9th Cir. 1972), modified, 863 F.2d 667 (9th Cir. 1988). But this cannot overcome the reality that with these keys, the Government almost 31 certainly gained “a quantity of information that was none of … [its] business.” Id. Nor can this overcome the chilling effect that this intrusion has exerted on online service providers and users alike. See supra Part IV. This case thus underscores why “[w]hen First Amendment interests are at stake, the Government must use a scalpel, not an ax.” Id. 32 Conclusion History teaches us that “unconstitutional practices get their first footing ... by silent approaches and slight deviations from legal modes of procedure.” Boyd, 116 U.S. at 635. But so long “[a]s the Constitution endures, persons in every generation can invoke its principles in their own search for greater freedom.” Lawrence v. Texas, 539 U.S. 558, 579 (2003). Appellant stands before this Court seeking such freedom. Amicus now joins that cause. This Court should reverse the judgments below, and thus vindicate the efforts of online service providers to protect the political privacy and the First Amendment rights of their users. Respectfully submitted, s/ Mahesha P. Subbaraman Dated: October 24, 2013 Richard M. Martinez Mahesha P. Subbaraman ROBINS, KAPLAN, MILLER & CIRESI, L.L.P. 2800 LaSalle Plaza 800 LaSalle Avenue Minneapolis, MN 55402-2015 (612) 349-8500 Counsel for Amicus Curiae Empeopled, LLC 33 Certificate of Compliance Pursuant to Fed. R. App. P. 32(a)(7)(C), the undersigned certifies that this amicus curiae brief complies with all of the applicable type-volume limitations of Fed. R. App. P. 32(a)(7)(B) and the applicable typeface and type-style requirements of Fed. R. App. P. 32(a)(5) and (6). This brief was prepared using a proportionally spaced font (Book Antiqua). Exclusive of portions exempted by Fed. R. App. P. 32(a)(7)(B)(III), this brief contains 6,793 words, according to the word-count function of the word processor (Microsoft Word 2010) that was used to prepare this brief. Dated: October 24, 2013 s/ Mahesha P. Subbaraman Richard M. Martinez Mahesha P. Subbaraman ROBINS, KAPLAN, MILLER & CIRESI, L.L.P. 2800 LaSalle Plaza 800 LaSalle Avenue Minneapolis, MN 55402-2015 (612) 349-8500 Counsel for Amicus Curiae Empeopled, LLC 34 Certificate of Service I hereby certify that on October 24, 2013, I electronically filed the foregoing document with the United States Court of Appeals for the Fourth Circuit by using the CM/ECF system. I certify that the following parties or their counsel of record are registered as ECF Filers and that they will be served by the CM/ECF system: Jesse Ryan Binnall Marcia C. Hofmann Laurin Howard Mills Ian James Samuel David Alan Warrington James L. Trump Michael Phillip Ben'Ary Dated: October 24, 2013 s/ Mahesha P. Subbaraman Richard M. Martinez Mahesha Subbaraman ROBINS, KAPLAN, MILLER & CIRESI, L.L.P. 2800 LaSalle Plaza 800 LaSalle Avenue Minneapolis, MN 55402-2015 (612) 349-8500 Counsel for Amicus Curiae Empeopled, LLC 35

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?