KLAYMAN v. OBAMA et al

Filing 117

Memorandum in opposition to re 108 MOTION for Partial Summary Judgment (Government Defendants' Opposition to Plaintiffs' Motion for Partial Summary Judgment) filed by KEITH B. ALEXANDER, ERIC H. HOLDER, JR, NATIONAL SECURITY AGENCY, BARACK HUSSEIN OBAMA, II, U.S. DEPARTMENT OF JUSTICE. (Attachments: # 1 Exhibit (Shea Declaration), # 2 Exhibit (March 20, 2014, FISC Order), # 3 Exhibit (Response to Plaintiffs' Statement of Material Facts), # 4 Text of Proposed Order)(Gilligan, James)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA _______________________________________ ) LARRY KLAYMAN, et al., ) ) Plaintiffs, ) ) v. ) Civil Action No. ) 1:13-cv-0851-RJL BARACK OBAMA, President of the ) United States, et al., ) ) Defendants. ) _______________________________________) THE GOVERNMENT DEFENDANTS’ OPPOSITION TO PLAINTIFFS’ MOTION FOR PARTIAL SUMMARY JUDGMENT Dated: May 9, 2014 STUART F. DELERY Assistant Attorney General JOSEPH H. HUNT Director, Federal Programs Branch ANTHONY J. COPPOLINO Deputy Branch Director JAMES J. GILLIGAN Special Litigation Counsel MARCIA BERMAN Senior Trial Counsel BRYAN DEARINGER Trial Attorney RODNEY PATTON Trial Attorney JULIA BERMAN Trial Attorney U.S Department of Justice Civil Division, Federal Programs Branch 20 Massachusetts Ave., N.W., Room 6102 Washington, D.C. 20001 Phone: (202) 514-3358 Fax: (202) 616-8470 Counsel for the Government Defendants TABLE OF CONTENTS INTRODUCTION .......................................................................................................................... 1 BACKGROUND ............................................................................................................................ 5 Statement of Facts ............................................................................................................... 5 Proceedings to Date ............................................................................................................ 7 ARGUMENT ................................................................................................................................ 10 I. PLAINTIFFS’ REQUEST TO CONSOLIDATE THE DETERMINATION OF THEIR FOURTH AMENDMENT CLAIM WITH THE COURT’S DECISION ON THEIR MOTION FOR A PRELIMINARY INJUNCTION SHOULD BE DENIED AS PREJUDICIAL TO DEFENDANTS AND CONTRARY TO THE INTERESTS OF JUDICIAL ECONOMY THAT RULE 65(a)(2) IS MEANT TO PROMOTE. ..................................................................................... 10 II. IF PLAINTIFFS’ MOTION FOR SUMMARY JUDGMENT IS CONSIDERED AT THIS TIME, IT SHOULD BE DENIED. ............................ 14 A. Plaintiffs Have Not Established Their Standing To Sue. .......................... 14 1. The requirements of Article III standing ............................................ 14 2. Plaintiffs have not presented evidence of specific facts from which it can be concluded that records of their calls have been collected or reviewed. ........................................................................ 15 3. The Court’s earlier ruling on standing should not be followed here. ........................................................................................................... 18 B. THE SECTION 215 TELEPHONY METADATA PROGRAM DOES NOT VIOLATE PLAINTIFFS’ FOURTH AMENDMENT RIGHTS. ................................................................................................... 23 1. Plaintiffs have no protected privacy interest in telephony metadata. ................................................................................................... 24 2. Smith is not distinguishable from this case. ...................................... 27 3. The telephony metadata program is reasonable. ................................ 33 CONCLUSION ............................................................................................................................. 36 TABLE OF AUTHORTIES CASES ACLU v. Clapper, 959 F. Supp. 2d 724 (S.D.N.Y. 2013)................................................................................ passim Agostini v. Felton, 521 U.S. 203 (1997) .................................................................................................................. 32 Air Line Pilots Ass'n Int'l v. Alaska Airlines, Inc., 898 F.2d 1393 (9th Cir. 1990) .................................................................................................. 11 Anderson v. Davila, 125 F.3d 148 (3d Cir. 1997)...................................................................................................... 11 AttorneyFirst, LLC v. Ascension Entertainment, Inc., 144 Fed. Appx. 283 (4th Cir. June 8, 2005) ............................................................................. 11 Bd. of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls, 536 U.S. 822 (2002) .................................................................................................................. 34 Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388 (1971) .................................................................................................................... 8 Bond v. United States, 529 U.S. 334 (2000) .................................................................................................................. 27 CFTC v. Bd. of Trade of Chicago, 657 F.2d 124 (7th Cir. 1981) .................................................................................................... 11 Clapper v. Amnesty Int'l USA, 133 S. Ct. 1138 (2013) ....................................................................................................... passim DaimlerChrysler Corp. v. Cuno, 547 U.S. 332 (2006) ............................................................................................................ 14, 16 Devlin v. Scardelletti, 536 U.S. 1 (2002) ...................................................................................................................... 15 Haig v. Agee, 453 U.S. 280 (1981) .................................................................................................................. 35 Horton v. California, 496 U.S. 128 (1990) .................................................................................................................. 22 ii In re Directives, 551 F.3d 1004 (FISC-R 2008) .................................................................................................. 35 In re Grand Jury Proceedings, 827 F.2d 301 (8th Cir. 1987) .................................................................................................... 30 In re Sealed Case, 310 F.3d 717 (FISC-R 2002) .................................................................................................... 34 Johnson v. Quander, 440 F.3d 489 (D.C. Cir. 2006) .................................................................................................. 21 Katz v. United States, 389 U.S. 347 (1967) .................................................................................................................. 25 Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013) ....................................................................................... passim Laird v. Tatum, 408 U.S. 1 (1972) ...................................................................................................................... 18 Lujan v. Defenders of Wildlife, 504 U.S. 555 (1992) ....................................................................................................... 14 15, 22 Mann v. Castiel, 681 F.3d 368 (D.C. Cir. 2012) .................................................................................................. 12 Maryland v. King, 133 S. Ct. 1958 (2013) .............................................................................................................. 34 Morris v. Dist. of Columbia, 2014 WL 1648293 (D.D.C. Apr. 25, 2014) .............................................................................. 11 Mova Pharm. Corp. v. Shalala, 955 F. Supp. 128 (D.D.C. 1997) ............................................................................................... 11 Murphy Bros., Inc. v. Michetti Pipe Stringing, Inc., 526 U.S. 344 (1999) .................................................................................................................. 12 NTEU v. Von Raab, 489 U.S. 656 (1989) ............................................................................................................ 34, 35 Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008), ................................................................................................... 26 iii Raines v. Byrd, 521 U.S. 811 (1997) .................................................................................................................. 14 Rakas v. Illinois, 439 U.S. 128 (1978) .................................................................................................................. 30 Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030 (D.C. Cir. 1978) ................................................................................................ 26 SEC v. Jerry T. O'Brien, Inc., 467 U.S. 735 (1984) .................................................................................................................. 27 Smith v. Maryland, 442 U.S. 735 (1979) ........................................................................................................... passim Steagald v. United States, 451 U.S. 204 (1981) .................................................................................................................. 30 Steel Co. v. Citizens for a Better Env't, 523 U.S. 83 (1998) .................................................................................................................... 15 Tea Party Leadership Fund v. Fed. Election Comm'n, No. 12-1707, 2012 WL 5382844 (D.D.C. Nov. 2, 2012) ......................................................... 10 Teva Pharm. USA, Inc. v. FDA, 398 F. Supp. 2d 176 (D.D.C. 2005) .......................................................................................... 10 Texas v. Brown, 460 U.S. 730 (1983) .................................................................................................................. 23 U.S. Telecom Ass'n v. FCC, 227 F.3d 450 (D.C. Cir 2000) ................................................................................................... 26 United Presbyterian Church in the USA v. Reagan, 738 F.2d 1375 (D.C. Cir. 1984) ................................................................................................ 18 United States ex rel. Shea v. Verizon Bus. Network Servs., Inc., 904 F. Supp. 2d 28 (D.D.C. 2012) ............................................................................................ 16 United States v. Banks, 3 F.3d 399 (11th Cir. 1993) ...................................................................................................... 23 United States v. Baxter, 492 F.2d 150 (9th Cir. 1973) .................................................................................................... 26 iv United States v. Clutter, 674 F.3d 980 (8th Cir. 2012) .................................................................................................... 23 United States v. Dionisio, 410 U.S. 1 (1973) ...................................................................................................................... 30 United States v. Doe, 537 F. Supp. 838 (E.D.N.Y. 1982) ........................................................................................... 26 United States v. Fithian, 452 F.2d 505 (9th Cir. 1971) .................................................................................................... 26 United States v. Forrester, 512 F.3d 500 (9th Cir. 2008) .................................................................................................... 26 United States v. Jacobsen, 466 U.S. 109 (1984) ............................................................................................................ 22, 33 United States v. Jones, 132 S. Ct. 945 (2012) ......................................................................................................... passim United States v. Licata, 761 F.2d 537 (9th Cir. 1985) .................................................................................................... 23 United States v. Miller, 425 U.S. 435 (1976) ........................................................................................................... passim United States v. Moalin, 2013 WL 6079518 (S.D. Cal. Nov. 18, 2013) .......................................................................... 24 United States v. Place, 462 U.S. 696 (1983) ............................................................................................................ 22, 33 United States v. Reed, 575 F.3d 900 (9th Cir. 2009) .................................................................................................... 26 United States v. Rigmaiden, 2013 WL 1932800 (D. Ariz. May 8, 2013) .............................................................................. 30 United States v. U.S. Dist. Court, 407 U.S. 297 (1972) .................................................................................................................. 34 United States v. VanLeeuwen, 397 U.S. 249 (1970) .................................................................................................................. 22 v University of Texas v. Camenisch, 451 U.S. 390 (1981) .................................................................................................................. 11 Valley Forge Christian Coll. v. Americans United for Separation of Church & State, 454 U.S. 464 (1982) .................................................................................................................. 14 Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646 (1995) .................................................................................................................. 34 W. Va. Cmty. Health Ctrs. v. Heckler, 734 F.2d 1570 (D.C. Cir. 1984) ................................................................................................ 10 Whitmore v. Arkansas, 495 U.S. 149 (1990) .................................................................................................................. 16 STATUTES 50 U.S.C. § 1861 ............................................................................................................................. 1 FEDERAL RULES OF CIVIL PROCEDURE Fed. R. Civ. P. 56(a) ..................................................................................................................... 14 Fed. R. Civ. P. 25(d) ....................................................................................................................... 1 Fed. R. Civ. P. 65(a)(2) ....................................................................................................... 2, 10, 13 Fed. R. Civ. P. 26 ............................................................................................................................ 8 vi IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ____________________________________ ) LARRY KLAYMAN, et al., ) ) Plaintiffs, ) Civil Action No. ) 1:13-cv-00851-RJL v. ) ) BARACK OBAMA, President of the ) United States, et al., ) ) Defendants. ) ____________________________________) THE GOVERNMENT DEFENDANTS’ 1 OPPOSITION TO PLAINTIFFS’ MOTION FOR PARTIAL SUMMARY JUDGMENT INTRODUCTION This Court is already thoroughly familiar with this case and its current procedural posture, and appreciates both the importance of the constitutional questions presented and the national security interests at stake. See Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013). Plaintiffs challenge the constitutionality of the Government’s acquisition and analysis of bulk telephony metadata pursuant to Section 215 of the USA-PATRIOT Act, an intelligence program carried out under authority of the Foreign Intelligence Surveillance Court (“FISC”) for the purpose of discovering communications with and among unknown terrorist operatives, and preventing terrorist attacks. In granting Plaintiffs’ motion for a preliminary injunction, the Court concluded that Plaintiffs have a substantial likelihood of prevailing on their claim that the program violates the Fourth Amendment. Yet at the same time, the Court stayed its injunction 1 The Government Defendants are defendants Barack Obama, President of the United States, Eric Holder, Attorney General of the United States, and Admiral Michael S. Rogers, Director of the National Security Agency (NSA), insofar as they are sued in their official capacities, together with defendants NSA, and the United States Department of Justice (DOJ). Pursuant to Federal Rule of Civil Procedure 25(d), Admiral Rogers is automatically substituted as an official-capacity defendant to this action, but not in his individual capacity, in place of former NSA Director General Keith Alexander. pending the D.C. Circuit’s ruling on the Government’s appeal, remarking on the “novelty” of the constitutional questions involved and the national security interests at stake. It is difficult to conceive of a case in which making a rush to judgment would be more ill-advised. Yet that is precisely what Plaintiffs now ask of this Court, by moving to advance the Court’s ruling on the merits of their Fourth Amendment claim, and consolidate it with the Court’s decision on their motion for preliminary injunctive relief. That request should be denied. In order to promote the interests of judicial economy, Federal Rule of Civil Procedure 65(a)(2) permits a court in appropriate cases to advance the determination of a case on the merits and consolidate it with the hearing on a plaintiff’s motion for a preliminary injunction. The Supreme Court has instructed, however, that it is generally inappropriate for a court at the preliminary injunction stage to render a final judgment on the merits, unless the parties are given adequate notice and each party has the opportunity to fully present its case. Consolidation in this case, however—where the Government had less than two weeks to prepare its opposition to Plaintiffs’ motion, where Plaintiffs provided no notice of their intention to seek summary judgment while the Fourth Amendment issue remains on appeal, and where the scope of the issues to be decided in this Court will not be known with certainty until the D.C. Circuit rules on the Government’s appeal—would deprive the Government Defendants of an opportunity to fully present their case in support of the legality of the telephony metadata program. It also cannot be overlooked that Plaintiffs have asserted Bivens claims against three current and former Government officials seeking damages from them in their personal capacities for alleged violations of Plaintiffs’ constitutional rights. Because Plaintiffs have yet to serve these defendants in their personal capacities, summary judgment cannot be entered against them. Nevertheless, even if judgment were entered only against the Government Defendants, the 2 individual-capacity defendants would be prejudiced if the Court arrived at a judgment on the merits of Plaintiffs’ Fourth Amendment claim before the individual defendants can be heard. Moreover, it would not promote, but disserve the interests of judicial economy to reach the merits of Plaintiffs’ claim while the Fourth Amendment issue remains on appeal, as explained in the Government Defendants’ motion for a stay. Indeed, entering judgment on that claim now, only to be followed (as Plaintiffs propose) by discovery on Plaintiffs’ remaining First and Fifth Amendment claims, and a trial on damages, presumably against the still unserved individual defendants, would be a blueprint for procedural chaos, not efficiency. Even if the Court were to entertain Plaintiffs’ motion for summary judgment at this time, it still should be denied. For the reasons discussed herein, the Court lacks jurisdiction to consider Plaintiffs’ Fourth Amendment claim, and the claim fails to state grounds on which relief can be granted. First, Plaintiffs have not carried their burden of proving specific facts demonstrating their standing. The fact that they are subscribers of telecommunications services provided by Verizon Wireless is not sufficient. Although the Government has acknowledged that the Section 215 telephony metadata program is broad in scope and involves the aggregation of metadata collected from multiple telecommunications companies, the program has never collected information on all (or virtually all) telephone calls made and/or received in the United States, as the Court previously surmised. The Government has only confirmed the participation, for the duration of one, now-expired FISC order, of Verizon Business Network Services, Inc., a separate business entity from Verizon Wireless. Otherwise, the identities of any carriers participating in the program at any time remains properly classified. Beyond the issue of collection, Plaintiffs have not proven that they have suffered any injury from the querying of metadata collected under the telephony metadata program. They 3 express concerns that metadata collected under the program could be “used against” them in some undefined manner, but they have presented no evidence that NSA personnel have reviewed, much less misused, metadata pertaining to their calls. Indeed, because of the strict legal constraints on the NSA’s access to and use of the metadata, only a tiny fraction of the metadata is ever seen by any person. Thus it is sheer speculation to suggest that records of calls to or from Plaintiffs have been or ever will be retrieved or reviewed, much less that the Government could use such information against them. Second, Plaintiffs’ claim fails on the merits. Plaintiffs’ Fourth Amendment claim is foreclosed by Smith v. Maryland, 442 U.S. 735 (1979), which held that there is no reasonable expectation of privacy for purposes of the Fourth Amendment in the numbers dialed to connect a telephone call. Thus, the Government does not conduct a Fourth Amendment “search” when it collects telephony metadata, nor does it “seize” Plaintiffs’ property when telecommunications companies provide their own business records to the Government under orders of the FISC. The reasoning of Smith—that telephone subscribers voluntarily convey dialing information to the telephone company and therefore assume the risk that the telephone company will reveal that information to the Government—is fully applicable here, as all courts to consider the question, save this one, have concluded. As the FISC recently held, neither the greater volume of metadata at issue here nor changes in technology since 1979 provide a basis on which to disregard the controlling authority of Smith. Even if Plaintiffs had a reasonable expectation of privacy in business records held by a third party, Plaintiffs have not alleged an invasion of that privacy interest, and in any event the telephony metadata program is reasonable, and therefore lawful, under Fourth Amendment “special needs” analysis. That analysis requires a balancing between the minimal privacy 4 interests involved in the collection of non-content telephony metadata, and the Government’s important interest in identifying and tracking terrorist operatives. That balance tilts in favor of the constitutionality of the telephony metadata program. For these reasons, discussed more fully below, Plaintiffs’ request for entry of summary judgment on their Fourth Amendment claim should be denied, and a decision on the merits of Plaintiffs’ Fourth Amendment claim should await both the Court of Appeals’ ruling on the Government’s appeal from this Court’s preliminary injunction, and an opportunity for all parties to prepare and present their cases on the extraordinary issues of constitutional law, and national security, presented by this case. BACKGROUND Statement of Facts The Government Defendants incorporate herein by reference the Statement of Facts contained in the Government Defendants’ Opposition to Plaintiffs’ Motions for Preliminary Injunctions (“Gov’t Defs.’ PI Opp.”) (ECF No. 25) so far as it pertains to the NSA’s acquisition of bulk telephony metadata under Section 215. See id. at 5-7, 8-13. The Government Defendants supplement that discussion, however, as follows. The substantial protections and prohibitions built into the Section 215 telephony metadata program “to safeguard U.S. person information,” In re Application of the FBI for an Order Requiring the Production of Tangible Things from [Redacted], Dkt. No. BR 13-109, Am. Mem. Op. at 9 (F.I.S.C. Aug. 29, 2013) (publicly released, unclassified version) (“Aug. 29, 2013 FISC Op.”) (Gov’t Defs.’ PI Opp., Exh. A); Gov’t Defs.’ PI Opp. at 10–13, have been further enhanced by two recent modifications to the program announced by the President in January 2014 and adopted in subsequent FISC orders. Prior to these modifications, FISC orders 5 authorizing the program provided that one of 22 designated NSA officials had to make a determination of reasonable, articulable suspicion that a proposed selector was associated with an identified foreign terrorist organization before it could be used to conduct queries of the database. The FISC orders also permitted query results to include identifiers and associated metadata up to three steps (or hops) away from the suspected-terrorist selector. See Gov’t Defs.’ PI Opp. at 11–12; id. Exh. E (In re Application of the FBI for an Order Requiring the Production of Tangible Things [etc.], Dkt. No. BR 13-80, Primary Order (F.I.S.C. Apr. 25, 2013)) (“Primary Order”) at 7; id. Exh. C (Declaration of Teresa H. Shea) (“Shea Decl.”) ¶ 22. In January the President announced that he was directing the Government to take immediate steps to implement two changes to the program. Remarks by the President on Review of Signals Intelligence, http://www.whitehouse.gov/the-press-office/2014/01/17/ remarkspresident-review-signals-intelligence. The first requires advance findings by the FISC of reasonable, articulable suspicion that selectors used to query the metadata are associated with foreign terrorist organizations (except in emergency situations, in which case the Government must seek retrospective FISC approval of the selector). The second limits query results to metadata within two “hops” (rather than three) of suspected terrorist selectors. In February, the FISC granted the Government’s motion to implement these two changes. See Decl. of Teresa H. Shea, Signals Intelligence Director, NSA (“Klayman Shea Decl.”) (Exhibit A, hereto) ¶¶ 3–5 & Exh. A (In re Application of the FBI for an Order Requiring the Prod. of Tangible Things [etc.], Dkt. No. BR 14-01, Order Granting the Gov’t’s Mot. To Amend the Court’s Primary Order dated January 3, 2014 (F.I.S.C. Feb. 15, 2014)) at 3–9. 2 2 On March 27, 2014, the President further announced, after considering options presented to him by the Intelligence Community and the Attorney General, that he will seek legislation to replace the Section 215 bulk telephony-metadata program. Statement by the 6 Although the Government has acknowledged that the Section 215 program is broad in scope and involves the collection and aggregation of a large volume of data from multiple telecommunications service providers, see Gov’t Defs.’ PI Opp. at 11–12, the program has never captured information on all (or virtually all) calls made and/or received in the United States. Public speculation to that effect is untrue. Klayman Shea Decl. ¶ 8. The FISC has also explained that the Government does not acquire call detail records relating to all telephone calls to, from, or within the United States. Aug. 29, 2013 FISC Op. at 4 n.5 (“production of all call detail records of all persons in the United States has never occurred under this program”). Proceedings to Date Plaintiffs brought this action on June 6, 2013, immediately following the unauthorized public disclosure of then classified information regarding the NSA’s Section 215 telephony metadata program by The Guardian. Compl. (ECF No. 1); see Class Action Am. Compl. (ECF No. 4), and claim that the program violates their rights under the First, Fourth, and Fifth Amendments. Third Am. Compl. (ECF No. 77), ¶¶38–58. Plaintiffs name as defendants the NSA and DOJ, id. ¶¶ 15, 17, together with Government officials sued in their official and/or President on the Section 215 Bulk Metadata Program, http://www.whitehouse.gov/the-pressoffice/2014/03/27/statement-president-section-215-bulk-metadata-program. The President stated that his goal was to “establish a mechanism to preserve the capabilities we need without the government holding this bulk metadata” to “give the public greater confidence that their privacy is appropriately protected,” while maintaining the intelligence tools needed “to keep us safe.” Instead of the Government obtaining business records of telephony metadata in bulk, the President proposed that telephony metadata should remain in the hands of telecommunications companies. The President stated that “[l]egislation will be needed to permit the government to obtain this information with the speed and in the manner that will be required to make this approach workable.” Under such legislation, the Government would be authorized to obtain telephony metadata from the companies pursuant to individualized orders from the FISC. The President explained that, in the meantime, the Government would seek from the FISC a 90-day reauthorization of the existing Section 215 program, with the two modifications already approved by the FISC in February, and the court has since entered an order reauthorizing the program as modified. See generally id; Klayman Shea Decl. ¶¶6–7. 7 individual capacities (defendants Obama, Holder, Alexander, and the Hon. Roger Vinson, United States District Judge, formerly of the FISC), id. ¶¶ 13–14, 16, 18. Plaintiffs seek various forms of injunctive and other equitable relief, in addition to $3 billion in damages against the individually named defendants under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 403 U.S. 388 (1971). Id. ¶¶ 43, 49–50, 58–60. To the best of the Government Defendants’ knowledge, and so far as the record reflects, the individual defendants have not yet been served with process in their personal capacities. See Mem. of Individual Fed. Defs. in Opp’n to Pls.’ “Mot. for Entry of Default” (ECF No. 88) (Mem. of Individual Defs. in Opp’n to Mot. for Default”) at 3, 7, 10. Plaintiffs moved for preliminary injunctive relief in this case (and in Klayman v. Obama, No. 13-cv-881 (RJL)) on October 29, 2013. See Pls.’ Mot. for Prelim. Inj. (ECF No. 13). The following day, the Government Defendants sought an extension of the deadline to submit their opposition to Plaintiffs’ motion until December 2, 2013, to coincide with the deadline to file their then-anticipated motion to dismiss Plaintiffs’ Class Action Amended Complaint. Gov’t Defs.’ Mot. To Extend the Time To Respond to Pls.’ Mots. for Prelim. Injs. (ECF No. 16). At the status conference held on October 31, 2013, the Court denied the Government’s request and directed the Government Defendants to file their opposition on November 11, 2013. Minute Entry dated October 31, 2013. The Court heard argument on November 18, 2013, see Minute Entry dated November 18, 2013, following which the parties, on November 26, 2013, submitted supplemental briefs on the issues of standing and the Court’s jurisdiction to consider Plaintiffs’ (now withdrawn) statutory claims. See ECF Nos. 43, 44. On December 16, 2013, the Court granted Plaintiffs’ motion for a preliminary injunction prohibiting NSA’s collection or retention of metadata associated with their communications as 8 part of the Section 215 bulk telephony metadata program. Mem. Op. and Order (ECF Nos. 48, 49); Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013). The Court determined that plaintiffs Larry Klayman and Charles Strange have standing to challenge the legality of the program, and concluded that they had shown a likelihood of success on the merits of their Fourth Amendment claim. Klayman, 957 F. Supp. 2d at 25-42. The Court did not reach the merits of Plaintiffs’ other constitutional claims. See id. at 9 n.7. Citing “the significant national security interests at stake,” and what it described as “the novelty of the constitutional issues,” the Court sua sponte stayed its injunction pending appeal. Id. at 43-44. On January 3, 2014, the Government filed a notice of appeal from the Court’s preliminary injunction. ECF No. 64. The deadline for dispositive motions (extended once on the Government’s motion) expired on April 11, 2014. See Klayman v. Obama, No. 14-5005 (D.C. Cir.), Per Curiam Order (Mar. 5, 2014) (Dkt. No. 1482432). Thereupon the Government filed a motion seeking entry of a briefing schedule. Id. (Dkt. No. 1488123). Since the Court issued its preliminary injunction ruling, Plaintiffs have repeatedly expressed a desire to conduct discovery in support of their claims while the Court’s ruling remains on appeal, and thereafter to proceed to trial, before seeking a decision of the case on the merits. See Pls.’ Mot. for Status Conference (ECF No. 63); Pls.’ Opp. to Mot. for Stay of Proceedings Against the Gov’t Defs. Pending Appeal of Prelim. Inj. [etc.] (ECF No. 70) at 3, 4, 6; Pls.’ Opp. to Gov’t Defs.’ Partial Mot. To Dismiss (ECF No. 74) at 3, 11; Pls.’ Am. Mot To Compel Defs.’ Compliance with FRCP Rule 26 (ECF No. 104). At no point (until now) have Plaintiffs indicated an intention to seek summary judgment on their Fourth Amendment claim while the Court’s preliminary injunction ruling remains on appeal. Nonetheless, on April 15, 2014, Plaintiffs filed their motion for partial summary judgment on their Fourth Amendment 9 claim (ECF No. 108), seeking entry of a permanent injunction under Federal Rule of Civil Procedure 65(a)(2), to be followed by “discovery and trial on the damage claims,” including Plaintiffs’ “other constitutional claims under the First and Fifth Amendments.” Mem. in Supp. of Pls.’ Mot. for Partial Summ. Judg. (ECF No. 108) (“Pls.’ SJ Mem.”) at 1, 12. ARGUMENT Plaintiffs’ request to advance the Court’s ruling on the merits of their Fourth Amendment claim and to consolidate it with the Court’s ruling on their motion for a preliminary injunction should be denied as premature, prejudicial to the Government Defendants, prejudicial to the individual defendants, and contrary to the orderly and efficient administration of justice. Alternatively, Plaintiffs’ motion should be denied (1) for lack of subject matter jurisdiction, as Plaintiffs have not established their standing to sue, or (2) on its merits, for even if Plaintiffs had established their standing, they have not demonstrated a violation of their Fourth Amendment rights entitling them to judgment as a matter of law. I. PLAINTIFFS’ REQUEST TO CONSOLIDATE THE DETERMINATION OF THEIR FOURTH AMENDMENT CLAIM WITH THE COURT’S DECISION ON THEIR MOTION FOR A PRELIMINARY INJUNCTION SHOULD BE DENIED AS PREJUDICIAL TO DEFENDANTS AND CONTRARY TO THE INTERESTS OF JUDICIAL ECONOMY THAT RULE 65(A)(2) IS MEANT TO PROMOTE. Rule 65(a)(2) provides, in pertinent part, that “[b]efore or after beginning the hearing on a motion for a preliminary injunction, the court may advance the trial on the merits and consolidate it with the hearing.” “This procedural device is designed to conserve judicial resources and avoid duplicative proceedings.” Tea Party Leadership Fund v. FEC, 2012 WL 5382844, *1 (D.D.C. Nov. 2, 2012) (citation omitted); Teva Pharm. USA, Inc. v. FDA, 398 F. Supp. 2d 176, 181 n.1 (D.D.C. 2005) (same), vacated on other grounds, 441 F.3d 1 (D.C. Cir. 2006). 10 The Supreme Court has instructed, however, that because “a preliminary injunction is customarily granted on the basis of procedures that are less formal and evidence that is less complete than in a trial on the merits,” and “[a] party thus is not required to prove [its] case in full at a preliminary-injunction hearing,” “it is generally inappropriate for a federal court at the preliminary-injunction stage to give a final judgment on the merits.” Univ. of Texas v. Camenisch, 451 U.S. 390, 395 (1981); see W. Va. Ass’n of Cmty Health Ctrs. v. Heckler, 734 F.2d 1570, 1578 (D.C. Cir. 1984). See also AttorneyFirst, LLC v. Ascension Entm’t, Inc., 144 Fed. Appx. 283, 287-88 (4th Cir. June 8, 2005). Thus, before a ruling on the merits of a party’s claim may be consolidated with the hearing on a plaintiff’s application for a preliminary injunction, “the parties should normally receive clear and unambiguous notice [of the court’s intent] either before the hearing commences or at a time which will still afford the parties a full opportunity to present their respective cases.” Camenisch, 451 U.S. at 395; AttorneyFirst, 144 Fed. Appx. at 287; Anderson v. Davila, 125 F.3d 148, 157-58 (3d Cir. 1997); Morris v. Dist. of Columbia, 2014 WL 1648293, *2 n.1 (D.D.C. Apr. 25, 2014). A final judgment entered at the preliminary injunction stage must be vacated if a party was deprived of that chance. Mova Pharm. Corp. v. Shalala, 955 F. Supp. 128, 129 n.1 (D.D.C. 1997). See CFTC v. Bd. of Trade of Chi., 657 F.2d 124, 127 (7th Cir. 1981) (citing cases); see also Anderson, 125 F.2d at 158-59; Air Line Pilots Ass’n Int’l v. Alaska Airlines, Inc., 898 F.2d 1393, 1397 (9th Cir. 1990). Plaintiffs’ request for consolidation should be denied because consolidation in the current posture of this case would deprive the Government Defendants of the opportunity to fully present their case on a question of substantial constitutional importance with potential ramifications for national security. Under the schedule ordered by the Court, the Government had less than two weeks to prepare its opposition to Plaintiffs’ preliminary injunction motion, see supra at 8, and 11 was given no notice at the time that the record on which Plaintiffs’ motion was to be decided would also become the basis for rendering a final judgment. Moreover, since the Court ruled on Plaintiffs’ motion in December 2013, Plaintiffs have given no indication that they would be seeking summary judgment while the Court’s preliminary injunction remains on appeal. See supra, at 9. Thus, the Government Defendants have been given no reason to expect that at this time they would have to present their full case on the merits (or defend the constitutionality of the Section 215 program on the basis of an abbreviated record), and do so without critical guidance from the Court of Appeals regarding the issues, if any, that remain to be addressed. The Government Defendants are not the only parties that could be prejudiced by a final judgment rendered on Plaintiffs’ Fourth Amendment claim at this time. Plaintiffs have brought identical Bivens claims against three current and former Government officials, and a sitting federal judge, seeking $3 billion in damages against them for allegedly violating Plaintiffs’ constitutional rights. See supra at 7; Third Am. Compl. ¶¶ 38–58. Although this case is nearly a year old, these individually named defendants still have not been properly served with process in their individual capacities, see Mem. of Individual Defs. in Opp’n to Mot. for Default at 5-9, and are under no present obligation to participate or even appear in these proceedings, Murphy Bros., Inc. v. Michetti Pipe Stringing, Inc., 526 U.S. 344, 353 (1999) (“service of process [is] the official trigger for responsive action by an individual or entity named defendant”); Mann v. Castiel, 681 F.3d 368, 372 (D.C. Cir. 2012) (“Service of process … is fundamental to any procedural imposition on a named defendant.”) (citation and quotation marks omitted), much less to present their case on the merits. 3 Entering final judgment on Plaintiffs’ Fourth Amendment 3 Indeed, the Court should dismiss the individual-capacity claims under Federal Rule of Civil Procedure 4(m) due to Plaintiffs’ failure to prosecute those claims. See Mem. of Individual Defs. in Opp’n to Mot. for Default at 10-11. 12 claim would prejudice these defendants (even if the judgment were limited to the Government Defendants) because the Court would have arrived at a final determination of the very claim that is raised against them without providing them an opportunity to be heard. Not only would consolidation prejudice all the defendants in this case, it would also disserve the interests of judicial economy that Rule 65(a)(2) is intended to promote. The Court itself has remarked on what it viewed as the “novel[ ]” constitutional issues presented here. Klayman, 957 F. Supp. 2d at 43. Rendering judgment on Plaintiffs’ Fourth Amendment claims without awaiting the Court of Appeals’ guidance on those issues would require expenditures of time, effort and resources by the Court and the parties that could be avoided depending on the Court of Appeals’ ruling. See Gov’t Defs.’ Stay Mot. at 6. Moreover, Plaintiffs themselves envision that, following the Court’s ruling on their Fourth Amendment claim, the case would still proceed to discovery on their First and Fifth Amendment claims—thus dissipating any efficiencies that might be gained from an accelerated decision on the Fourth Amendment claim. Pls’ Mot. at 1, 12. They also anticipate a trial on damages, id., presumably against the as yet unserved individual-capacity defendants, who would still be entitled to present their case on the underlying Fourth Amendment claim. Executing Plaintiffs’ plan for “consolidation” would hopelessly splinter, not streamline, these proceedings. For these reasons, Plaintiffs’ request for entry of summary judgment on their Fourth Amendment claim, whether under Rule 65(a)(2) or otherwise, should be denied as premature until the D.C. Circuit has ruled on the Government Defendants’ appeal from this Court’s preliminary injunction, and all parties have been given a full opportunity thereafter to prepare and present their cases. 13 II. IF PLAINTIFFS’ MOTION FOR SUMMARY JUDGMENT IS CONSIDERED AT THIS TIME, IT SHOULD BE DENIED. Even if Plaintiffs’ motion for summary judgment were procedurally proper, it should be denied nevertheless because Plaintiffs have not established their standing to challenge the legality of the Section 215 telephony metadata program, nor demonstrated a violation of their Fourth Amendment rights entitling them to judgment as a matter of law. Fed. R. Civ. P. 56(a). A. Plaintiffs Have Not Established Their Standing To Sue. 1. The requirements of Article III standing “The judicial power of the United States … is not an unconditioned authority to determine the [validity] of legislative or executive acts,” but is limited by Article III of the Constitution “to the resolution of ‘cases’ and ‘controversies.’” Valley Forge Christian Coll. v. Americans United for Separation of Church & State, 454 U.S. 464, 471 (1982). “No principle is more fundamental to the judiciary’s proper role in our system of government.” DaimlerChrysler Corp. v. Cuno, 547 U.S. 332, 341 (2006). A demonstration by Plaintiffs of their standing to sue “is an essential and unchanging part of the case-or-controversy requirement.” Lujan v. Defenders of Wildlife, 504 U.S. 555, 560 (1992). While the Supreme Court “ha[s] always insisted on strict compliance with this jurisdictional standing requirement,” Raines v. Byrd, 521 U.S. 811, 819 (1997), the “standing inquiry has been especially rigorous when reaching the merits of the dispute would force [a court] to decide whether an action taken by one of the other two branches of the Federal Government was unconstitutional.” Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1147 (2013) (internal quotation marks and citations omitted). As the Supreme Court observed in Amnesty International, it has “often found a lack of standing in cases in which the Judiciary has been requested to review actions of the political branches in the fields of intelligence gathering and foreign affairs.” Id. 14 To establish Article III standing, Plaintiffs must seek relief from an injury that is “concrete, particularized, and actual or imminent; fairly traceable to the challenged action; and redressable by a favorable ruling.” Id. Because standing is “an indispensable part of [a] plaintiff’s case,” Defenders of Wildlife, 504 U.S. at 561, Plaintiffs, as the parties invoking federal jurisdiction, bear the burden of establishing these three elements. Devlin v. Scardelletti, 536 U.S. 1, 6–7 (2002). To shoulder that burden at the summary judgment stage, Plaintiffs “can no longer rest on … mere allegations, but must set forth by affidavit or other evidence specific facts” demonstrating that metadata pertaining to their communications have been acquired under the Section 215 program. See Amnesty Int’l, 133 S. Ct. at 1149 (quoting Defenders of Wildlife, 504 U.S. at 561). If Plaintiffs cannot carry their threshold jurisdictional burden of establishing their standing, “the [C]ourt cannot proceed” and must dismiss the case. Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 104 (1998). 2. Plaintiffs have not presented evidence of specific facts from which it can be concluded that records of their calls have been collected or reviewed. Plaintiffs’ motion for summary judgment should be denied because they have presented no evidence of specific facts demonstrating that they have been injured because of the telephony metadata program. Plaintiffs Klayman and Charles Strange attest (in affidavits submitted in support of their preliminary injunction motion) that they have for many years been subscribers of cellular telephone service provided by Verizon Wireless. Aff. of Larry Klayman (“Klayman Aff.”) (ECF No. 13-2) ¶ 3; Aff. of Charles Strange (“Strange Aff.”) (ECF No. 13-3) ¶¶ 2-3. They state that the alleged collection of information about (and contained in) their communications “impact[s]” their ability to communicate by telephone due to their “concern” 15 that these communications will be “overheard” or “obtained” by the NSA and “used against” them in some manner. Klayman Aff. ¶ 10; Strange Aff. ¶ 11. It cannot be assumed, solely on the basis that Plaintiffs are Verizon Wireless subscribers, that metadata about their calls have been produced to the NSA as part of the Section 215 program. Except for a single, now-expired Secondary Order issued in April 2013 to Verizon Business Network Services, Inc.—a separate business entity from Verizon Wireless, see, e.g., United States ex rel. Shea v. Verizon Bus. Network Servs., Inc., 904 F. Supp. 2d 28, 30 (D.D.C. 2012)—the Government has not declassified or otherwise acknowledged the identities of the carriers participating in the program, either now, or at any time in the past. Klayman Shea Decl. ¶ 8. The consequences of that gap in the record must befall Plaintiffs, as it is their “burden to prove their standing by pointing to specific facts, not the Government’s burden to disprove standing by revealing details” of its intelligence programs. Amnesty Int’l, 133 S. Ct. at 1149 n.4. Even presuming that records of Plaintiffs’ calls have been collected under this program, Plaintiffs’ allegations of injury are speculative and conjectural, not actual or imminent, as Article III requires. Amnesty Int’l, 133 S. Ct. at 1147; see also DaimlerChrysler, 547 U.S. at 345; Whitmore v. Arkansas, 495 U.S. 149, 158 (1990). They express concern that information about their telephone calls allegedly collected by the NSA may be “used against” them in some unspecified manner, Klayman Aff. ¶ 10; Strange Aff. ¶ 11, but these unsubstantiated fears cannot support their standing in face of the established facts. Under current FISC orders, NSA personnel may only review records responsive to queries initiated using selectors that the FISC has approved based on reasonable, articulable suspicion that they are associated with specific foreign terrorist organizations. See supra at 6; Primary Order at 6–7; Klayman Shea Decl. ¶¶ 3-5. As a result, only a “tiny fraction” of the records is ever seen by any person. Shea Decl. 16 ¶ 23. Plaintiffs have presented no evidence that the NSA has accessed or reviewed records of Plaintiffs’ calls as a result of queries made under the “reasonable, articulable suspicion” standard (or otherwise). Thus, it is sheer speculation to suggest that records of calls to or from Plaintiffs either have been or ever will be retrieved or reviewed through queries of the database, much less “used against” them by the Government in some unexplained fashion. The Supreme Court’s decision in Amnesty International addressed a similar standing question and establishes that Plaintiffs’ speculation concerning the scope and operation of the Section 215 program is insufficient to demonstrate their standing. In Amnesty International, various humans rights, labor, and media organizations challenged the constitutionality of the FISA Amendments Act of 2008, which expanded the Government’s authority to intercept the communications of non-U.S. persons located abroad. 133 S. Ct. at 1144. The organizations alleged that they interacted and engaged in sensitive communications with persons who were likely to be considered by the Government as potential terrorists, or persons of interest in terrorism investigations. See id. at 1145–46. They further alleged that they would suffer harms as a result of the Government surveillance program, including a compromised ability to “locate witnesses, cultivate sources, obtain information, and communicate confidential information,” and a need to undertake various costly measures to avoid possible surveillance. Id. The Supreme Court, however, held that none of these alleged harms was sufficient to confer standing, because it was “speculative whether the Government will imminently target communications to which respondents are parties.” Id. at 1148. Rather, the Court held that the plaintiffs’ claimed injury rested on a “speculative chain of possibilities,” including “that the Government [would] target the communications of non-U.S. persons with whom they communicate,” that it would succeed in intercepting them, and that the plaintiffs would be parties 17 to the particular communications the Government intercepts. Id. at 1148–50. So, too, here. The idea that the course of unspecified Government counter-terrorism investigations would lead to particular telephone numbers; that the FISC would approve use of these numbers to conduct queries of the database, based on reasonable, articulable suspicion that they are associated with foreign terrorist organizations; and that these queries would return records of Plaintiffs’ calls that NSA analysts would in turn review (or misuse), is just as speculative as the allegations of harm that were rejected as insufficient in Amnesty International. 4 3. The Court’s earlier ruling on standing should not be followed here. Defendants recognize that in granting Plaintiffs’ motion for a preliminary injunction this Court concluded that plaintiffs Klayman and Charles Strange have standing to challenge the alleged collection and “analysis” of metadata about their telephone calls under the Section 215 program. Klayman, 957 F. Supp. 2d at 26–29. For the reasons that follow, Defendants respectfully submit that this conclusion is not supportable and should not be followed here. Turning first to the question of collection, as noted above Plaintiffs have presented no evidence of specific facts demonstrating that records pertaining to their calls have been or will be collected under the Section 215 telephony metadata program, other than the fact that they are 4 Plaintiffs’ related assertions that the Section 215 program has “directly and significantly impacted” their “ability to communicate via telephone,” and to engage in public advocacy, Klayman Aff. ¶¶ 9-10; Strange Aff. ¶¶ 11, 19-20, are simply reflections of their unsubstantiated fears that the NSA will misuse metadata about their calls, fears that are insufficient to establish a cognizable injury for purposes of standing. Amnesty Int’l USA, 133 S. Ct. at 1152 (holding that the costs allegedly incurred in efforts to avoid possible surveillance was the “product of” the plaintiffs’ “fear of surveillance” and that “such fear is insufficient to create standing”); Laird v. Tatum, 408 U.S. 1, 10, 14 (1972) (holding that “[a]llegations of a subjective ‘chill’” arising from plaintiffs’ knowledge of the existence of “a governmental investigative and data-gathering activity,” without “any specific action of the [Government] against them,” were “not an adequate substitute for a claim of specific present objective harm or a threat of specific future harm”); United Presbyterian Church in the USA v. Reagan, 738 F.2d 1375, 1378 (D.C. Cir. 1984) (chilling effect produced by fear of surveillance is an insufficient basis for standing under Laird). 18 Verizon Wireless subscribers. The Court inferred, however, from the Government’s explanation of the contact-chaining process, crossing multiple communications networks and time periods, that the NSA “must have collected metadata from Verizon Wireless . . . as well as AT&T and Sprint,” if the program were to serve its intended function. Klayman, 957 F. Supp. 2d at 26-27 (emphasis in original). The Court should no longer rely on that reasoning, for two reasons. First, the record now contains specific evidence refuting the inference the Court made when ruling on Plaintiffs’ preliminary injunction motion. As explained in the Klayman Shea Declaration, although the Government has acknowledged that the Section 215 program is broad in scope and involves the aggregation of an historical repository of data collected from more than one provider, the program has never captured information on all (or virtually all) telephone calls made and/or received in the United States. Klayman Shea Decl. ¶ 8. As the FISC itself observed in a decision last year, “[t]he production of all call detail records of all persons in the United States has never occurred under [the Section 215 telephony metadata] program.” Aug. 29, 2013 FISC Op. at 4 n.5. It does not follow, therefore, that the NSA “must” collect metadata from all of the three “largest carriers” in order to perform its function, as the Court surmised, Klayman, 957 F. Supp. 2d at 27, and collection of metadata about Plaintiffs’ calls cannot be presumed on the basis of such an assumption. Second, the Court should not continue to rely on its prior standing analysis because, Defendants respectfully submit, it is inconsistent with the Supreme Court’s decision in Amnesty International. There the Court insisted that plaintiffs seeking judicial review of actions taken by the Government in the field of intelligence-gathering “set forth . . . specific facts demonstrating” that communications to which they were parties would be targeted for interception, and because the plaintiffs failed to do so, the Court dismissed their claims for lack of standing. 133 S. Ct. at 19 1149. Notably, the majority declined to follow the approach advocated by the dissenting Justices, who, relying on “commonsense inferences,” found a “very high likelihood” that the Government would intercept at least some of the plaintiffs’ communications under the challenged statute. Id. at 1157 (Breyer, J., dissenting). The dissent based its conclusion on a combination of various facts, including that the plaintiffs regularly engaged in the type of electronic communications—with and about suspected foreign terrorists, their families and associates, and their activities—that the Government was authorized and highly motivated, for counter-terrorism purposes, to intercept, and that the record showed the Government had in fact intercepted on thousands of occasions in the past. Id. at 1156–59. 5 Akin to the dissent’s approach in Amnesty International, this Court previously attempted to draw an inference, based on unclassified information about the general operation of the Section 215 program, that the NSA must have collected metadata about the Plaintiffs’ calls (or, at the very least, metadata from Plaintiffs’ provider), without the benefit of facts specific to Plaintiffs demonstrating that to be the case. The decision in Amnesty International teaches, however, that relying solely on inferences drawn from limited information about the scope and operation of the Government’s intelligence-gathering activities, is not a sufficiently “rigorous” basis on which to make a determination of standing, at least in cases such as this where litigants seek to call the constitutionality of those activities into question. See 133 S. Ct. at 1147. Rather, to establish Plaintiffs’ standing to challenge the acquisition of telephony metadata under the Section 215 program, the record must contain evidence of specific facts demonstrating that 5 The dissent also observed that the “Government [did] not deny that it ha[d] both the motive and the capacity to listen to communications of the kind described by [the] plaintiffs.” 133 S. Ct. at 1159–60. 20 information about their communications has been or imminently will be collected under the program. See id. at 1149. As discussed above, Plaintiffs have presented no such evidence. Defendants respectfully submit that the Court’s standing analysis regarding the query process is also inconsistent with the available facts, and precedent, and should not be followed here. In ruling on Plaintiffs’ request for preliminary relief, the Court concluded that Plaintiffs also have standing to challenge alleged analysis of metadata pertaining to their calls, on the basis that when the NSA queries the database, “its system must necessarily analyze metadata for every phone number in the database by comparing the foreign target number against all of the stored call records to determine which U.S. phones, if any, have interacted with the target number.” 957 F. Supp. 2d at 28. The Court concluded that this use of the NSA’s Section 215 database “‘implicates the Fourth Amendment each time a government official monitors it,’” in the same manner as Government monitoring of the hypothetical home video camera discussed in Johnson v. Quander, 440 F.3d 489 (D.C. Cir. 2006). Id. at 28-29 (quoting Johnson, 440 F.3d at 499). The analogy, however, is not apt. The Court of Appeals explained in Johnson that an in-home video camera raises Fourth Amendment concerns each time it is monitored by a government official because, each time it is so monitored, the camera reveals new and otherwise private information about the homeowner to that official. 440 F.3d at 498–99. The same cannot be said regarding queries of the bulk telephony metadata obtained by the NSA under Section 215. As discussed above, when the NSA runs queries of the database, the analysts see no metadata associated with anyone’s calls, and thus, the analysts learn no information about the communications of any individuals, unless their telephone numbers (or other identifiers) fall within two (previously three) “hops” of a suspected terrorist selector. See Shea Decl. ¶¶ 22-24; Klayman Shea Decl. ¶¶ 4-5. NSA’s queries are more 21 akin to the sniff of a narcotics-detection dog, which “discloses only the presence or absence of narcotics” in a person’s luggage, and “does not expose noncontraband items that otherwise would remain hidden from public view, as does . . . an officer’s rummaging through the [luggage’s] contents.” See United States v. Place, 462 U.S. 696, 707 (1983) (holding that a canine sniff of luggage is not a search). See also United States v. Jacobsen, 466 U.S. 109, 123 (1984) (“A chemical test that merely discloses whether or not a particular substance is cocaine does not compromise any legitimate interest in privacy.”). 6 Therefore, absent some indication that NSA analysts conducting queries of the database, using selectors authorized by the FISC under the “reasonable, articulable suspicion” standard, have retrieved and reviewed records containing metadata associated with Plaintiffs’ calls—of which there is no evidence in the record—Plaintiffs cannot demonstrate that the query process itself constitutes an “invasion of a legally protected interest,” Defenders of Wildlife, 504 U.S. at 560 (emphasis added), even assuming, contra Smith v. Maryland, 442 U.S. 735 (1979), that Plaintiffs have a protected privacy interest in telephony metadata. See Horton v. California, 496 U.S. 128, 142 n.11 (1990) (government’s acquisition of an item without examining its contents “does not compromise the interest in preserving the privacy of its contents”); United States v. VanLeeuwen, 397 U.S. 249, 6 The Court’s analogy of a library patron searching for every book that cites Battle Cry of Freedom, Klayman, 957 F. Supp. 2d at 28 n.38, is also distinguishable from the NSA’s query process in the same critical respect. As described in the Court’s hypothetical, to find every book in the library citing Battle Cry of Freedom, the patron herself reviews the contents of each book in the library’s collection. In contrast, NSA analysts who query the database see no information contained in any of the call detail records stored in the database, except for the tiny fraction containing metadata within two hops of the suspected terrorist selector—as if the patron saw only those few books in the library that actually contain references to Battle Cry of Freedom. 22 253 (1970) (defendant’s interest in the privacy of his detained first-class mail “was not disturbed or invaded” until the Government opened the packages). 7 Plaintiffs have presented no evidence of specific facts demonstrating with the rigor required in this context, Amnesty International, 133 S. Ct. at 1147, 1149, that they have standing to contest the NSA’s collection or querying of bulk telephony metadata under Section 215. Plaintiffs’ motion for summary judgment must therefore be denied. B. THE SECTION 215 TELEPHONY METADATA PROGRAM DOES NOT VIOLATE PLAINTIFFS’ FOURTH AMENDMENT RIGHTS. Even if Plaintiffs had established their standing, the legal foundation of their Fourth Amendment claim—that they have a reasonable expectation of privacy in the numbers dialed to connect a telephone call (and other metadata) that is protected by the Fourth Amendment—is foreclosed by the controlling and squarely applicable authority of Smith v. Maryland, 442 U.S. 735 (1979). That authority, and the third-party doctrine on which it is based, remain the law today. The factual differences between Smith and the telephony metadata program are immaterial to the reasoning of Smith, as the FISC recently explained in an opinion rejecting the Court’s reasons in its preliminary injunction ruling, 957 F. Supp. 2d at 32-37, for declining to follow Smith. In re Application of the FBI for an Order Requiring the Prod. of Tangible Things, 7 The Court described the above-quoted language from Horton and VanLeeuwen as dicta, see Klayman, 957 F. Supp. 2d at 29 n.40, but they are in fact statements of the law. See, e.g.,United States v. Clutter, 674 F.3d 980, 984 (8th Cir. 2012) (seizure of computers, subsequently found to contain child pornography, did not implicate Fourth Amendment privacy interests at time seizure occurred); United States v. Banks, 3 F.3d 399, 401-02 (11th Cir. 1993) (“no Fourth Amendment privacy interest in first-class mail is invaded by detaining such mail . . . until a search warrant can be obtained,” because “the privacy interest in the packages” was not disturbed); United States v. Licata, 761 F.2d 537, 541 (9th Cir. 1985) (seizure of a closed container “affects only the owner’s possessory interests and not the privacy interests vested in the contents”). See also Texas v. Brown, 460 U.S. 730, 748-49 (1983) (Stevens, J., concurring in the judgment) (noting that seizure of a locked suitcase does not alone “compromise the secrecy of its contents” or “implicate any privacy interests”). 23 Dkt. No. BR14-01, Op. and Order, 21-22 (FISC Mar. 20, 2014) (“Mar. 20, 2014 FISC Order)” (Exhibit B, hereto); see also ACLU v. Clapper, 959 F. Supp. 2d 724, 752 (S.D.N.Y. 2013); United States v. Moalin, 2013 WL 6079518, at *5–8 (S.D. Cal. Nov. 18, 2013). Even if there were a reasonable expectation of privacy in telephony metadata, contrary to Smith, Plaintiffs have not alleged an invasion of that interest, and the Section 215 telephony metadata program would still pass constitutional muster as it is reasonable under the standard applicable to searches that serve special needs of the Government. For these reasons, Plaintiffs’ motion for entry of summary judgment on their Fourth Amendment claim must be denied. 1. Plaintiffs have no protected privacy interest in telephony metadata. The Fourth Amendment provides that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” The Government’s acquisition of bulk telephony metadata pursuant to orders of the FISC does not constitute a “seizure” of Plaintiffs’ records, because the orders are directed to telecommunications service providers, not to subscribers, and direct the production of what are indisputably the providers’ own business records. See Shea Decl. ¶ 18; Smith, 442 U.S. at 741 (because the government ascertained the telephone numbers dialed from a telephone by installing equipment on telephone company property, the petitioner could not claim that his property was invaded); United States v. Miller, 425 U.S. 435, 440-41 (1976) (rejecting a bank depositor’s Fourth Amendment challenge to a subpoena of bank records because, inasmuch as the bank was a party to the transactions, the records belonged to the bank); ACLU, 959 F. Supp. 2d at 751 (call detail records obtained under the Section 215 telephony metadata program are created and maintained by the telecommunications providers, not the plaintiff subscribers, and are not, therefore, the plaintiff’s call records). 24 The Fourth Amendment’s proscription against unreasonable “searches” was understood “for most of our history … to embody a particular concern for government trespass upon the areas (‘persons, houses, papers, and effects’) it enumerates.” United States v. Jones, 132 S. Ct. 945, 949-50 (2012). Since the decision in Katz v. United States, 389 U.S. 347 (1967), however, it has been understood that a Fourth Amendment “search” also takes place when governmental investigative activities “violate a person’s ‘reasonable expectation of privacy.’” Jones, 132 S. Ct. at 949-50 (quoting Katz, 389 U.S. at 360). In Katz, the Court held that the Government’s interception of the contents of a telephone conversation occurring in a public telephone booth constituted a search under the Fourth Amendment. The Supreme Court squarely held in Smith, however, that individuals have no reasonable expectation of privacy in the mere telephone numbers they dial because they knowingly give that information to telephone companies when they dial the numbers; the government’s acquisition of such numbers did not therefore constitute a search under the Fourth Amendment. Smith, 442 U.S. at 741-46. In Smith, the police requested (without a warrant or court order) that the telephone company install a pen register device at its central offices to record the numbers dialed from a robbery suspect’s (Smith’s) home phone. Smith, 442 U.S. at 737. After Smith was arrested, he sought to suppress evidence derived from the pen register as a violation of his Fourth Amendment rights. Contrasting the collection of the numbers dialed with the acquisition of the contents of communications at issue in Katz, id. at 741, the Court held that even if Smith harbored a subjective expectation that the phone numbers he dialed would remain private, that expectation was not reasonable. The Court explained that it “consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Id. at 743-44 (citing, inter alia, Miller, 425 U.S. at 441-43 (no reasonable expectation of privacy 25 in financial records a depositor voluntarily provided to his bank)). Telephone users “typically know that they must convey numerical information to the phone company; that the phone company has facilities for recording this information; and that the phone company does in fact record this information for a variety of legitimate business purposes.” Id. at 743. By using his phone, Smith “voluntarily conveyed numerical information to the telephone company and ‘exposed’ that information to its equipment in the ordinary course of business,” and therefore “assumed the risk that the company would reveal to police the numbers he dialed.” Id. at 744; see also id. at 745; Miller, 425 U.S. at 443 (“depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government.”). 8 Smith controls the instant case because the pen-register metadata at issue in Smith are “indistinguishable” from the non-content telephony metadata at issue in the Section 215 program, 9 and its rationale is fully applicable. Mar. 20, 2014 FISC Order at 11. 8 The third-party doctrine has consistently been applied to call detail records like the business records at issue here. See, e.g., Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030, 1043-46 (D.C. Cir. 1978); United States v. Baxter, 492 F.2d 150, 167 (9th Cir. 1973); United States v. Fithian, 452 F.2d 505, 506 (9th Cir. 1971); United States v. Doe, 537 F. Supp. 838, 839-40 (E.D.N.Y. 1982). See also U.S. Telecom Ass’n v. FCC, 227 F.3d 450, 454 (D.C. Cir 2000) (“telephone numbers are not protected by the Fourth Amendment”) (citing Smith). Courts have also applied Smith in the Internet age to find no reasonable expectation of privacy in email “to/from” and Internet protocol (“IP”) addressing information, United States v. Forrester, 512 F.3d 500, 510-11 (9th Cir. 2008), and in text message addressing information. Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892, 905 (9th Cir. 2008), rev’d on other grounds, 130 S. Ct. 2619 (2010). 9 Just as Plaintiffs voluntarily turn over the phone numbers they dial to their phone companies, they voluntarily turn over the dates, times, and durations of their calls; the telephone numbers from which incoming calls originate are also not protected by the Fourth Amendment. See United States v. Reed, 575 F.3d 900, 914 (9th Cir. 2009); United States Telecom Ass’n, 227 F.3d at 454, 459. Other communications routing information collected under the program, such as trunk identifiers, is information collected or generated by the phone companies themselves. See Primary Order at 3 n.1. 26 2. Smith is not distinguishable from this case. The Government Defendants recognize that this Court concluded otherwise when it ruled on Plaintiffs’ motion for a preliminary injunction, but respectfully submit for the reasons explained herein that Smith cannot be distinguished on the grounds the Court cited. First, the Section 215 telephony metadata program cannot be distinguished from Smith based on the Government’s more extensive collection and longer retention of metadata pertaining to each individual’s calls. See Klayman, 957 F. Supp. 2d at 32. As the FISC observed, Smith reaffirmed that the third-party disclosure doctrine applies regardless of the disclosing person’s assumptions or expectations as to what will be done with the information afterward, “‘even if the information is revealed on the assumption that it will be used only for a limited purpose.’” Mar. 20, 2014 FISC Order at 14-15, quoting Smith, 442 U.S. at 744; see also Miller, 425 U.S. at 443; SEC v. Jerry T. O’Brien, Inc., 467 U.S. 735, 743 (1984) (“It is established that, when a person communicates information to a third party even on the understanding that the communication is confidential, he cannot object if the third party conveys that information or records thereof to law enforcement authorities.”). Significantly Miller, on whose central holding Smith relied, upheld in the face of a Fourth Amendment challenge the compelled production of almost four months of a person’s bank records—copies of checks, deposit slips, financial statements, monthly statements—records that are more substantive and personal in nature than phone numbers, and more likely to reveal details about an individual’s life than years’ worth of telephony metadata. Mar. 20, 2014 FISC Order at 21-22. 10 10 As the FISC also pointed out, “a telephone user who is making a call fully divulges to the phone company the numbers he dials,” unlike the bus passenger in Bond v. United States, 529 U.S. 334, 338 (2000), cited in Klayman, 957 F. Supp. 2d at 33 n.47, who sought to preserve the privacy of the contents of his carry-on bag by using an opaque bag and placing that bag directly above his seat. Mar. 20, 2014 FISC Order at 16 n.8. 27 Thus, under the third-party doctrine that the Supreme Court has consistently applied in Smith and other cases, see Mar. 20, 2014 FISC Order at 15-16, “[i]f a person who voluntarily discloses information can have no reasonable expectation concerning limits on how the recipient will use or handle the information, it necessarily follows that he or she also can harbor no such expectation with respect to how the Government will use or handle the information after it has been divulged by the recipient … regardless of how it might be later used by the recipient or the Government.” Id. at 17. The fact that the Government here acquires metadata pertaining to a greater number of each individual’s calls, and retains the data for a much longer period, does not meaningfully differentiate the Section 215 program from Smith. Indeed, while the volume of data collected and retained about each individual’s phone calls is greater here than in Smith, the privacy concerns were actually greater in Smith than here. In Smith, the police targeted the phone calls of a single, known individual (Smith), in fact examined the data gathered to ascertain whether he had contacted another known individual (his victim), and used that information to arrest and prosecute him. 442 U.S. at 737. The Court nonetheless ruled that Smith had no reasonable expectation of privacy in telephone numbers he dialed. Id. at 741–42. Here, by contrast, Plaintiffs can point to no equivalent intrusion on their privacy. The FISC orders here direct specific telecommunications companies to provide the Government with the companies’ own business records, in which Plaintiffs have no reasonable expectation of privacy. Nor have Plaintiffs shown that any metadata of their phone calls have ever been examined by NSA analysts. As discussed above, the NSA can only query the database of call detail records with a now judicially-approved suspected-terrorist selector and can only review metadata within two steps of that suspected-terrorist selector. Even if any allegedly collected records of Plaintiffs’ calls have been among the tiny fraction of the records ever 28 reviewed by NSA analysts, the call detail records collected by the NSA reveal only such information as phone numbers, dates and times, and routing information, but not the names, addresses, or other identifying information of parties to the calls. See Mar. 20, 2014 FISC Order at 22 (“it must be emphasized that the non-content telephony metadata at issue here is particularly limited in nature and subject to strict protections that do not apply to run-of-the-mill productions of similar information in criminal investigations.”). Plaintiffs can complain of no putative invasion of privacy of the kind experienced by the petitioner in Smith. Second, and for the same reasons, perceived distinctions between the relationship of the government with the telephone company in Smith, and the relationship of the Government here with the telecommunications companies that participate in the program, Klayman, 957 F. Supp. 2d at 32-33, are simply irrelevant to whether a search occurred. Mar. 20, 2014 FISC Order at 17–18. Nor is there support in the record for the conclusion that the telecommunications companies that receive Section 215 orders are collecting telephony metadata for law enforcement purposes, “operat[ing] what is effectively a joint intelligence-gathering operation with the Government.” Klayman, 957 F. Supp. 2d at 33. Rather, “pursuant to the FISC’s orders, telecommunications service providers turn over to the NSA business records that the companies already generate and maintain for their own pre-existing business purposes (such as billing and fraud prevention).” Shea Decl. ¶ 18. See also Mar. 20, 2014 FISC Order at 18 n.9 (pointing out that this Court acknowledged that “the information produced to NSA consists of ‘telephony metadata records . . . which the companies create as part of their business of providing telecommunications services to customers.’”) (quoting 957 F. Supp. 2d at 15). Third, the Court also emphasized that the telephony metadata program allegedly involves the collection of data “on hundreds of millions of people.” See Klayman, 957 F. Supp. 2d at 33 29 & n.48, 34, 36. That observation “is misplaced under settled Supreme Court precedent.” Mar. 20, 2014 FISC Order at 19–20. Fourth Amendment rights “are personal in nature, and cannot bestow vicarious protection on those who do not have a reasonable expectation of privacy in the place to be searched.” Steagald v. United States, 451 U.S. 204, 219 (1981); accord Rakas v. Illinois, 439 U.S. 128, 133–34 (1978). No Fourth Amendment interest of Plaintiffs is implicated, therefore, by the fact that the metadata of many other individuals’ calls are collected as well as (allegedly) their own. See United States v. Dionisio, 410 U.S. 1, 13 (1973) (where single grand jury subpoena did not constitute an unreasonable seizure, it was not “rendered unreasonable by the fact that many others were subjected to the same compulsion”); In re Grand Jury Proceedings, 827 F.2d 301, 305 (8th Cir. 1987) (“[T]he fourth amendment does not necessarily prohibit the grand jury from engaging in a ‘dragnet’ operation.”); ACLU, 959 F. Supp. 2d at 752 (“The collection of breathtaking amounts of information unprotected by the Fourth Amendment does not transform that sweep into a Fourth Amendment search.”); United States v. Rigmaiden, 2013 WL 1932800, at *13 (D. Ariz. May 8, 2013) (Government did not violate defendant’s Fourth Amendment rights by collecting a high volume (1.8 million) of IP addresses); Aug. 29, 2013 FISC Op. at 8–9. Finally, the Court also suggested that individuals’ decisions to voluntarily convey and expose their telephone numbers to their phone companies are a necessity of modern life that did not exist in 1979 when Smith was decided. See Klayman, 957 F. Supp. 2d at 36. The year 1979 was, of course, not that long ago, and the use of banks, credit cards, telephones, and the like, to conduct the affairs of life was clearly prevalent at that time, as both Smith and Miller demonstrate, and as the dissent in Smith expressly argued. See 442 U.S. at 749–50 (Marshall, J., dissenting). See also ACLU, 959 F. Supp. 2d at 749 n.16 (citing cases prior to 1979 holding no 30 Fourth Amendment privacy interest in various information provided to third parties). It is true that cell phones did not exist in 1979, and that cell phones are used for purposes other than making telephone calls (such as accessing the Internet, taking pictures, and text messaging). See Klayman, 957 F. Supp. 2d at 34-36. “But none of these additional functions generates any information that is being collected by NSA as part of the telephony metadata program, which . . . involves only non-content records concerning the placing and routing of telephone calls. Accordingly, such changes are irrelevant . . . .” Mar. 20, 2014 FISC Order at 19. See also ACLU, 959 F. Supp. 2d at 752 (“Telephones have far more versatility now than when Smith was decided, but this case only concerns their use as telephones.”); Klayman, 957 F. Supp. 2d at 35 (acknowledging that the types of information acquired under the telephony metadata program are “limited” to “phone numbers dialed, date, time, and the like.”). Nor does Jones provide any basis for departing from the controlling authority of Smith. See Klayman, 957 F. Supp. 2d at 36. As the FISC explained, the majority opinion in Jones, in holding that an individual has a protected Fourth Amendment interest against the police attaching a GPS tracker to his car, relied on the “physical intrusion” the tracker effected and “declined to address the question whether use of the GPS device, without the physical intrusion, impinged upon a reasonable expectation of privacy . . . .” Mar. 20, 2014 FISC Order at 24-25. This Court placed reliance on Justice Sotomayor’s concurring opinion in Jones for the proposition that “the metadata from each person’s phone ‘reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.’” Klayman, 957 F. Supp. 2d at 36 (citing Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring)). 11 But Smith itself recognized 11 The Jones majority opinion is, of course, controlling, and did not, as explained above, undermine the vitality of Smith in any way. “And the Supreme Court has instructed lower courts not to predict whether it would overrule a precedent even if its reasoning has been supplanted by 31 that a list of telephone numbers dialed “could reveal the identities of the persons and the places called, and thus reveal the most intimate details of a person’s life,” Smith, 442 U.S. at 748 (Stewart, J., dissenting), and yet the Court ruled that there is no reasonable expectation of privacy in telephone numbers dialed. Moreover, this potential is in fact less of a concern here, where the NSA does not know to whom the phone numbers collected under the telephony metadata program belong; where analysts can only find out that information for phone numbers or other metadata that result from authorized queries made with selectors approved by the FISC under the reasonable, articulable suspicion standard; and where Plaintiffs offer no proof that any metadata of their calls have been reviewed. In contrast, the police in Smith knew Smith’s identity when the pen register identified the phone numbers he dialed. Similarly, in Jones, law enforcement officers attached a GPS device to a single, known person’s vehicle, recorded the vehicle’s locations over a period of time, and used that information to prosecute him. 12 * * * Thus, Smith compels the conclusion that the alleged acquisition of metadata records about Plaintiffs’ telephone calls does not constitute a search for purposes of the Fourth Amendment, thereby ending the Fourth Amendment inquiry. But even if the Court concluded, contrary to Smith, that Plaintiffs have a reasonable expectation of privacy in metadata allegedly collected about their phone calls, they point to no invasion of that interest that would rise to the level of a Fourth Amendment search. later cases” (which has not occurred here). ACLU, 959 F. Supp. 2d at 752 (citing Agostini v. Felton, 521 U.S. 203, 237 (1997)). 12 Although Justice Sotomayor also stated in her concurring opinion that it may be necessary to reconsider the third-party doctrine, which she posited is ill-suited to the digital age, she expressly concluded that “[r]esolution of these difficult questions in this case is unnecessary, however, because the Government’s physical intrusion on Jones’ Jeep supplies a narrower basis for decision.” Jones, 132 S. Ct. at 957. See also Mar. 20, 2014 FISC Order at 28. 32 Call detail records are not “searched” in a constitutional sense, see Klayman, 957 F. Supp. 2d at 29–30, every time an electronic query of the database is performed. When such queries are conducted, the only information made available for review by human beings are the records within two hops of the suspected terrorist selectors used to initiate the queries. NSA analysts receive no information about the calls of any other individuals. See Shea Decl. ¶¶ 20– 26. Thus, as discussed above, the query process is analogous, in Fourth Amendment terms, to a canine sniff to ascertain “the presence or absence of narcotics” in a person’s luggage, which the Supreme Court has held does not constitute a search because it “does not expose noncontraband items that otherwise would remain hidden from public view.” Place, 462 U.S. at 707. See also Jacobsen, 466 U.S. at 123 (chemical test that only reveals to law enforcement officials whether a particular substance is cocaine does not compromise any legitimate interest in privacy). Because Plaintiffs have not presented evidence that information associated with any of their phone calls has been reviewed by analysts in response to queries of the bulk telephony metadata collected by the NSA, they cannot maintain that NSA queries of the database intrude upon any putative expectation of privacy they claim to have in that information. For this reason as well, Plaintiffs have not been subjected to a search for purposes of the Fourth Amendment, once again bringing the Fourth Amendment inquiry to a close. 3. The telephony metadata program is reasonable. Even if the operation of the Section 215 telephony metadata program results in a “search” as to Plaintiffs, the Fourth Amendment bars only “unreasonable” searches and seizures. The Section 215 telephony metadata program is reasonable under the standard applied to assess suspicionless searches that serve special government needs. As the Supreme Court has explained, “where a Fourth Amendment intrusion serves special governmental needs, beyond the 33 normal need for law enforcement, it is necessary to balance the individual’s privacy expectations against the Government’s interests to determine whether it is impractical to require a warrant or some level of individualized suspicion in the particular context.” NTEU v. Von Raab, 489 U.S. 656, 665–66 (1989). More specifically, the scope of the privacy interest and the character of the intrusion are balanced against the nature of the government interests to be furthered, the immediacy of the government’s concerns regarding those interests, and the efficacy of the program in addressing those concerns. See Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 658, 660, 662-63 (1995). The telephony metadata program clearly serves special governmental needs above and beyond normal law enforcement. The undisputed purpose of the telephony metadata program is identifying unknown terrorist operatives and preventing terrorist attacks—forward-looking goals that fundamentally differ from most ordinary criminal law enforcement, which typically focuses on solving crimes that have already occurred, not preventing unlawful activity and protecting public safety and national security. See, e.g., United States v. U.S. Dist. Court (Keith), 407 U.S. 297, 322-23 (1972); In re Sealed Case, 310 F.3d 717, 746 (FISC-R 2002). If, contrary to Smith, Plaintiffs could be said to have any Fourth Amendment privacy interest that is implicated by the mere acquisition of non-content telephony metadata, that interest would be minimal. Moreover, the intrusion on that interest would be mitigated still further by the statutorily mandated restrictions on review and dissemination of the metadata that are written into the FISC’s orders. Primary Order at 4-14. See also Maryland v. King, 133 S. Ct. 1958, 1979 (2013); Bd. of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls, 536 U.S. 822, 833 (2002); Vernonia, 515 U.S. at 658. As noted above, the Government Defendants respectfully disagree with the Court’s conclusion that Plaintiffs have “a very significant 34 expectation of privacy” in telephony metadata, Klayman, 957 F. Supp. 2d at 39, or, absent evidence that data pertaining to their calls have ever been reviewed by NSA analysts, that the program has infringed on any such expectation. On the other side of the balance, the acquisition and review of telephony metadata promote overriding public interests. The interest in identifying and tracking terrorist operatives for the purpose of preventing terrorist attacks is a national security concern of overwhelming importance. See Haig v. Agee, 453 U.S. 280, 307 (1981) (“[N]o governmental interest is more compelling than the security of the Nation.”) (internal quotation marks omitted); In re Directives, 551 F.3d 1004, 1012 (FISC-R 2008) (Government interest in national security “is of the highest order of magnitude.”); ACLU, 959 F. Supp. 2d at 754. That interest cannot be as effectively achieved by conditioning access to telephony metadata on individualized suspicion, because such a requirement would not permit the type of historical analysis, contact-chaining, and timely identification of terrorist contacts that the program makes possible. See Shea Decl. ¶¶ 44–63; Aug. 29, 2013 FISC Op. at 20-22; ACLU, 959 F. Supp. 2d at 747–48. Imposing an individualized suspicion requirement on this program, is not only “impracticable” but may also be entirely infeasible. Von Raab, 489 U.S. at 665–66. The Government also respectfully disagrees with the Court’s conclusions regarding the efficacy of the program. Klayman, 957 F. Supp. 2d at 40-41. As an initial matter, the ability to quickly analyze past connections and chains of communication to determine terrorist connections can be critical in the midst of an active terrorism investigation. See id. at 39-40 (“A closer examination of the record . . . reveals that the Government’s interest is a bit more nuanced—it is not merely to investigate potential terrorists, but rather, to do so faster than other investigative methods might allow.”). Moreover, as the United States District Court for the Southern District 35 of New York found, “[t]he effectiveness of bulk telephony metadata collection cannot be seriously disputed. Offering examples is a dangerous stratagem for the Government because it discloses means and methods of intelligence gathering. Such disclosures can only educate America’s enemies. Nevertheless, the Government has acknowledged several successes in Congressional testimony and in declarations that are part of the record in this case.” ACLU, 959 F. Sup. 2d at 755. CONCLUSION For the reasons stated above, Plaintiffs’ motion for summary judgment should be denied. Dated: May 9, 2014 Respectfully Submitted, STUART F. DELERY Assistant Attorney General JOSEPH H. HUNT Director, Federal Programs Branch ANTHONY J. COPPOLINO Deputy Branch Director /s/ James J. Gilligan JAMES J. GILLIGAN Special Litigation Counsel james.gilligan@usdoj.gov MARCIA BERMAN Senior Trial Counsel BRYAN DEARINGER RODNEY PATTON JULIA BERMAN Trial Attorneys U.S Department of Justice Civil Division, Federal Programs Branch 20 Massachusetts Ave., N.W., Room 6102 Washington, D.C. 20001 Phone: (202) 514-3358 Fax: (202) 616-8470 Counsel for the Government Defendants 36

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?