KLAYMAN v. OBAMA et al
Filing
15
MOTION For Leave of Court To Take FRCP Rule 30(B)(6) Deposition re 13 MOTION for Preliminary Injunction by LARRY E. KLAYMAN, CHARLES STRANGE, MARY ANN STRANGE (Attachments: # 1 Exhibit 1 -- Government's Opposition to ACLU's Motion for Preliminary Injunction, # 2 Text of Proposed Order)(Klayman, Larry)
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 1 of 50
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
AMERICAN CIVIL LIBERTIES UNION; AMERICAN
CIVIL LIBERTIES UNION FOUNDATION; NEW YORK
CIVIL LIBERTIES UNION; and NEW YORK CIVIL
LIBERTIES UNION FOUNDATION,
13 Civ. 3994 (WHP)
Plaintiffs,
ECF Case
v.
JAMES R. CLAPPER, in his official capacity as Director
of National Intelligence; KEITH B. ALEXANDER, in his
official capacity as Director of the National Security
Agency and Chief of the Central Security Service;
CHARLES T. HAGEL, in his official capacity as Secretary
of Defense; ERIC H. HOLDER, in his official capacity as
Attorney General of the United States; and ROBERT S.
MUELLER III, in his official capacity as Director of the
Federal Bureau of Investigation,
Defendants.
DEFENDANTS’ MEMORANDUM OF LAW IN OPPOSITION
TO PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION
STUART F. DELERY
Assistant Attorney General
JOSEPH H. HUNT
Director
ANTHONY J. COPPOLINO
Deputy Director
JAMES J. GILLIGAN
Special Litigation Counsel
MARCIA BERMAN
Senior Trial Counsel
BRYAN DEARINGER
Trial Attorney
U.S. Department of Justice
Washington, D.C.
PREET BHARARA
United States Attorney for
the Southern District of New York
DAVID S. JONES
TARA M. La MORTE
JOHN D. CLOPPER
CHRISTOPHER HARWOOD
Assistant United States Attorneys
86 Chambers Street, 3rd Floor
New York, NY 10007
Tel. No. (212) 637-2739 (Jones)
Fax No. (212) 637-2730
david.jones6@usdoj.gov
tara.lamorte2@usdoj.gov
john.clopper@usdoj.gov
christopher.harwood@usdoj.gov
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 2 of 50
TABLE OF CONTENTS
PAGE
PRELIMINARY STATEMENT .....................................................................................................1
BACKGROUND .............................................................................................................................4
ARGUMENT .................................................................................................................................11
POINT I.
PLAINTIFFS’ ASSERTED INJURIES ARE TOO SPECULATIVE
TO ESTABLISH THEIR STANDING, OR SHOW IRREPARABLE
HARM....................................................................................................................12
A.
B.
POINT II.
Plaintiffs Lack Standing and Therefore Cannot Show a
Substantial Likelihood of Success on the Merits .......................................12
Plaintiffs’ Speculation Also Does Not Establish Irreparable Harm...........14
PLAINTIFFS CANNOT DEMONSTRATE THEY ARE LIKELY TO
SUCCEED IN THIS ACTION BECAUSE THE NSA’S BULK
COLLECTION OF TELEPHONY METADATA IS AUTHORIZED
UNDER SECTION 215 .........................................................................................15
A.
B.
POINT III.
Judicial Review of Plaintiffs’ Claim That the NSA’s Bulk
Collection of Telephony Metadata Exceeds Its Statutory
Authority Is Implicitly Precluded ..............................................................15
Plaintiffs’ Claim That the NSA’s Bulk Collection of Telephony
Metadata Exceeds Its Statutory Authority Under Section 215
Is Also Unlikely to Succeed on the Merits ................................................16
PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE
LIKELY TO SUCCEED ON THEIR FOURTH AMENDMENT CLAIM ..........24
A.
B.
POINT IV.
Collection and Query of Telephony Metadata Does Not
Constitute a Search ....................................................................................25
The NSA’s Bulk Collection of Telephony Metadata is
Reasonable .................................................................................................31
PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE
LIKELY TO SUCCEED ON THEIR FIRST AMENDMENT CLAIM ...............33
i
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 3 of 50
A.
B.
Because the Telephony Metadata Program Imposes No Direct
or Significant Burden on Plaintiffs’ Associational Rights, the
“Exacting Scrutiny” Test Does Not Apply ................................................33
C.
POINT V.
Plaintiffs’ First Amendment Claim Fails Because Good-Faith
Investigatory Conduct Not Intended to Deter or Punish Protected
Speech or Association Does Not Violate the First Amendment ................33
Even if “Exacting Scrutiny” Applied, the Telephony Metadata
Program Serves the Government’s Compelling Interest in
Protecting National Security in a Manner That Is Not Practically
Achievable by Other Means.......................................................................38
THE BALANCE OF THE EQUITIES AND THE PUBLIC INTEREST
REQUIRE THAT AN INJUNCTION BE DENIED .............................................39
CONCLUSION ..............................................................................................................................40
ii
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 4 of 50
TABLE OF AUTHORITIES
CASES
PAGE(S)
Amnesty Int’l USA v. Clapper,
133 S. Ct. 1138 (2013) .................................................................................................13, 14
In re Application of the United States,
405 F. Supp. 2d 435 (S.D.N.Y. 2005)................................................................................23
In re Application of the United States,
411 F. Supp. 2d 678 (W.D. La. 2006)................................................................................23
In re Application of the United States,
433 F. Supp. 2d 804 (S.D. Tex. 2006) ...............................................................................23
In re Application of the United States,
460 F. Supp. 2d 448 (S.D.N.Y. 2006)................................................................................23
In re Application of the United States,
622 F. Supp. 2d 411 (S.D. Tex. 2007) ...............................................................................23
In re Application of the United States,
632 F. Supp. 2d 202 (E.D.N.Y. 2008) ...............................................................................23
In re Application of the United States,
830 F. Supp. 2d 114 (E.D. Va. 2011) ................................................................................20
Bates v. City of Little Rock,
361 U.S. 516 (1960) ...........................................................................................................35
Bd. of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls,
536 U.S. 822 (2002) ...........................................................................................................32
Berger v. State of New York,
388 U.S. 41 (1967) .......................................................................................................31, 32
Bond v. United States,
529 U.S. 334 (2000) ...........................................................................................................29
Bowman Dairy Co. v. United States,
341 U.S. 214 (1951) ...........................................................................................................20
Brown v. Socialist Workers 74 Campaign Comm.,
459 U.S. 87 (1982) .............................................................................................................35
iii
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 5 of 50
Cacchillo v. Insmed, Inc.,
638 F.3d 401 (2d Cir. 2011).........................................................................................11, 12
Cheney v. United States Dist. Court,
542 U.S. 367 (2004) ...........................................................................................................20
Clark v. Library of Congress,
750 F.2d 89 (D.C. Cir. 1984) .............................................................................................36
Consumer Prod. Safety Comm. v. GTE Sylvania, Inc.,
447 U.S. 102 (1980) ...........................................................................................................23
Curley v. Vill. of Suffern,
268 F.3d 65 (2d Cir. 2001).................................................................................................34
eBay, Inc. v. MercExchange, LLC,
547 U.S. 388 (2006) ...........................................................................................................15
Elrod v. Burns,
427 U.S. 347 (1976) ...........................................................................................................36
FEC v. Larouche Campaign,
817 F.2d 233 (2d Cir. 1987)...............................................................................................37
Faiveley Transp. Malmo AB v. Wabtec Corp.,
559 F.3d 110 (2d Cir. 2009).........................................................................................12, 14
Ferguson v. City of Charleston,
532 U.S. 67 (2001) .............................................................................................................29
Fighting Finest, Inc. v. Bratton,
95 F.3d 224 (2d Cir. 1996)...........................................................................................34, 35
Florida v. Jardines,
133 S. Ct. 1409 (2013) .......................................................................................................29
Foreign Intelligence Surveillance Court
Opinion of August 29, 2013....................................................................................... passim
In re Grand Jury Proceedings,
776 F.2d 1099 (2d Cir. 1985).............................................................................................36
In re Grand Jury Subpoena Duces Tecum Dated November 15, 1993,
846 F. Supp. 11 (S.D.N.Y. 1994).......................................................................................20
iv
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 6 of 50
Hirschfeld v. Stone,
193 F.R.D. 175 (S.D.N.Y. 2000) .......................................................................................14
Holder v. Humanitarian Law Project,
130 S. Ct. 2705 (2010) .......................................................................................................39
In re Horowitz,
482 F.2d 72 (2d Cir. 1973).................................................................................................20
Katz v. United States,
389 U.S. 347 (1967) ..........................................................................................................26
Kyllo v. United States,
533 U.S. 27 (2001) .............................................................................................................29
Ligon v. City of New York,
925 F. Supp. 2d 478 (S.D.N.Y. 2013)................................................................................15
Local 1814, Int’l Longshoreman’s Ass’n v. Waterfront Comm’n of N.Y. Harbor,
667 F.2d 267 (2d Cir. 1981)...............................................................................................36
Lyng v. UAW,
485 U.S. 360 (1988) ..........................................................................................................35
Maryland v. King,
133 S. Ct. 1958 (2013) .......................................................................................................32
Mazurek v. Armstrong,
520 U.S. 968 (1997) ...........................................................................................................11
Munaf v. Geren,
553 U.S. 674 (2008) .....................................................................................................11, 12
NAACP v. Alabama ex rel. Patterson,
357 U.S. 449 (1958) .....................................................................................................35, 36
NLRB v. Am. Med. Response, Inc.,
438 F.3d 188 (2d Cir. 2006)...............................................................................................17
Ohio v. LeMasters,
2013 WL 3463219 (Ohio App. 12 Dist. July 8, 2013) ......................................................28
Rakas v. Illinois,
439 U.S. 128 (1978) ...........................................................................................................30
v
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 7 of 50
Reporters Comm. for Freedom of the Press v. AT&T,
593 F.2d 1030 (D.C. Cir. 1978) .........................................................................................27
SEC v. Jerry T. O’Brien, Inc.,
467 U.S. 735 (1984) ...........................................................................................................27
Salinger v. Colting,
607 F.3d 68 (2d Cir. 2010)...........................................................................................11, 15
Slevin v. City of New York,
477 F. Supp. 1051 (S.D.N.Y. 1979)...................................................................................14
Smith v. Maryland,
442 U.S. 735 (1979) ................................................................................................... passim
Southeastern Cmty. Coll. v. Davis,
442 U.S. 397 (1979) ...........................................................................................................23
In re Stoltz,
315 F.3d 80 (2d Cir. 2002).................................................................................................23
Sussman v. Crawford,
488 F.3d 136 (2d Cir. 2007)...............................................................................................11
Tabbaa v. Chertoff
509 F.3d 89 (2d Cir. 2007).....................................................................................36, 37, 38
Turner Broad. Sys., Inc. v. FCC,
512 U.S. 622 (1994) ...........................................................................................................36
United States v. Abu-Jihaad,
630 F.3d 102 (2d Cir. 2010)...............................................................................................17
United States v. Baxter,
492 F.2d 150 (9th Cir. 1973) .............................................................................................27
United States v. Bianco,
534 F.2d 501 (2d Cir. 1976)...............................................................................................37
United States v. Bobo,
477 F.2d 974 (4th Cir. 1973) .............................................................................................31
United States v. Booker,
2013 WL 2903562 (N.D. Ga. June 13, 2013) ....................................................................23
vi
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 8 of 50
United States v. Cafero,
473 F.2d 489 (3d Cir. 1973)...............................................................................................31
United States v. Covello,
410 F.2d 536 (2d Cir. 1969)...............................................................................................27
United States v. Doe,
537 F. Supp. 838 (E.D.N.Y. 1982) ..............................................................................27, 30
United States v. Fithian,
452 F.2d 505 (9th Cir. 1971) .............................................................................................27
United States v. Gallo,
123 F.2d 229 (2d Cir. 1941)...............................................................................................27
United States v. Graham,
846 F. Supp. 2d 384 (D. Md. 2012) .............................................................................28, 29
United States v. Haqq,
278 F.3d 44 (2d Cir. 2002).................................................................................................30
United States v. Jones,
132 S. Ct. 945 (2012) ...................................................................................................28, 29
United States v. Miller,
425 U.S. 435 (1976) .....................................................................................................27, 30
United States v. R. Enters., Inc.,
498 U.S. 292 (1991) ...........................................................................................................17
United States v. Tortorello,
480 F.2d 764 (2d Cir. 1973)...............................................................................................31
United States v. U.S. Dist. Court (Keith),
407 U.S. 297 (1972) ...........................................................................................................31
Winter v. NRDC,
555 U.S. 7 (2008) ....................................................................................................... passim
STATUTES AND REGULATIONS
50 U.S.C. § 1801 ............................................................................................................................31
50 U.S.C. § 1842 ............................................................................................................................23
vii
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 9 of 50
50 U.S.C. § 1861 .................................................................................................................... passim
50 U.S.C. § 1861(a)(1)(A), (b)(2)(A) ............................................................................................16
50 U.S.C. § 1861(a)(1)...................................................................................................................37
50 U.S.C. § 1861(b)(2)(A), (c)(1) ..................................................................................................17
50 U.S.C. § 1862(b)(2)(B) .............................................................................................................22
18 U.S.C. § 2712 ............................................................................................................................15
39 C.F.R. § 233.3 ...........................................................................................................................37
Pub. L. 107-56, 115 Stat. 272 (Section 215) ....................................................................................5
Pub. L. 107-56, § 215, 115 Stat. 288 .............................................................................................22
5 U.S.C. § 706(2) ...........................................................................................................................15
Pub. L. 109-177, 120 Stat. 195 (50 U.S.C. § 1805 note), as amended by section 2(a) of
the PATRIOT Sunsets Extension Act of 2011, Pub. L. 112-4, 125 Stat. 216 ...................23
MISCELLANEOUS
Attorney General’s Guidelines for Domestic FBI Operations,
U.S. Dep’t of Justice at 13 (Sept. 29, 2008) .....................................................................37
James Risen & Laura Poitras, NSA Gathers Data on Social Connections of
U.S. Citizens, N.Y. Times, Sept. 28, 2013 ...........................................................................9
viii
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 10 of 50
PRELIMINARY STATEMENT
Plaintiffs challenge a program by which the National Security Agency (NSA) obtains,
pursuant to orders of the Foreign Intelligence Surveillance Court (FISC), bulk telephony
metadata – business records created by telecommunications service providers that include such
information as the telephone numbers placing and receiving calls, and the time and duration of
those calls. Targeted electronic searches of these data, based on telephone numbers or other
identifiers associated with foreign terrorist organizations, can reveal communications between
known or suspected terrorists and previously unknown terrorist operatives, located in this
country, who may be planning attacks on U.S. soil. Information gleaned from analysis of bulk
telephony metadata obtained under this program has made important contributions to the FBI’s
counter-terrorism mission. The bulk collection of telephony metadata for these limited purposes
has been authorized and periodically reauthorized over the past seven years under thirty-four
separate orders issued by fourteen separate judges of the FISC. The program operates under
FISC orders, together with stringent supervision and oversight by all three branches of
Government, to prevent access to, use, or dissemination of the data for any purpose other than
foreign intelligence. In a detailed opinion issued on August 29, 2013 (Exhibit A, hereto), the
FISC concluded that the telephony metadata program is authorized by statute, and lawful under
the Constitution.
Plaintiffs’ motion for a preliminary injunction is based entirely on conjecture as to how
the Government might misuse telephony metadata collected under the program, and
consequences that might ensue. While Plaintiffs purport to base their case on public statements
by the Government about how this program operates, they ignore crucial limitations, described in
the very same documents, on the Government’s collection and use of the metadata, and contend,
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 11 of 50
with no basis in fact, that the Government is using these metadata to track the associations of
U.S. citizens, compile profiles on them, and draw comprehensive social maps of their lives.
Plaintiffs’ portrayal of the program is unsupported by any evidence. Under the
challenged program, the NSA collects only numeric telephony metadata – i.e., call detail records
– including such session-identifying information as the telephone numbers that placed and
received a call, and the date, time, and duration of the call. The Government does not collect the
substantive content of any telephone call under this program, it does not listen to or record the
contents of any call, nor does it collect cell-site location information. In addition, under this
program the Government does not collect the name, address, or financial information of any
subscriber, customer, or any party to a call. The metadata collected under this program do not
reveal that a whistleblower called the ACLU, or that an individual called an abortion clinic, a
criminal-defense lawyer, or a suicide hotline, as Plaintiffs speculate.
Equally important, the FISC orders authorizing the program prevent the NSA from
accessing the metadata collected under the program to ascertain any such information or to draw
“comprehensive social maps” of anyone’s lives. The NSA may only query the collected
metadata for counter-terrorism purposes, and even then, only if there is a reasonable, articulable
suspicion that the selection term (e.g., the telephone number) to be queried is associated with a
specified foreign terrorist organization approved for targeting by the FISC. This requirement
bars the type of indiscriminate querying of the metadata, using identifiers not connected with
terrorist activity, about which Plaintiffs speculate. As a result, only a tiny fraction of the
collected metadata are ever reviewed, much less disseminated, by NSA analysts. These
constraints on the NSA’s access to and use of the metadata are critical to the program’s
continued authorization by the FISC, and the FISC has not hesitated to take action to enforce
them.
2
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 12 of 50
The errors in Plaintiffs’ characterization of the program undercut their motion for a
preliminary injunction, first belying their assertions of irreparable injury. Both the claim that the
Government has intruded on Plaintiffs’ sensitive associations and communications, and that
whistleblowers, clients, and others may be chilled from contacting Plaintiffs as a result, are based
entirely on speculation for which no proof is offered. Injury so speculative as Plaintiffs assert is
insufficient to establish the irreparable harm required for a preliminary injunction, or, for that
matter, the injury-in-fact required to demonstrate their standing to sue.
Plaintiffs’ misconceptions about the telephony metadata program also negate any
likelihood of success on the merits of their claims. The Supreme Court squarely held in Smith v.
Maryland, 442 U.S. 735 (1979), that there is no reasonable expectation of privacy in non-content
information such as the numbers dialed on a telephone, and that is all that is at issue here. Thus,
there has been no search for purposes of the Fourth Amendment. Plaintiffs’ First Amendment
claim also rests entirely on their hypothetical premise that the program tracks all of their
sensitive contacts with members, clients, whistleblowers, and others with whom they collaborate
in their work to government scrutiny. But no parallel can be drawn between the collection of
dialed telephone numbers and other telephony metadata, and circumstances in which individuals
or organizations were compelled to disclose personally identifying information, or membership
lists, based on their protected associational activities.
Plaintiffs’ statutory claim that the telephony metadata program exceeds the Government’s
authority under the Foreign Intelligence Surveillance Act (FISA) is also unlikely to succeed on
the merits. As an initial matter, judicial review of this claim is implicitly precluded by statute, as
set forth in Defendants’ motion to dismiss. Plaintiffs’ statutory argument also fails to grapple
with the fact that fourteen separate judges of the FISC have concluded on thirty-four occasions
that the Government demonstrated, as the statute requires, reasonable grounds to believe that the
3
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 13 of 50
telephony metadata as a whole are indeed relevant to authorized investigations to protect against
international terrorism. The FISC fully appreciated that most of the metadata records collected
are unrelated to terrorist activity, but it also recognized that the bulk collection of telephony
metadata is important to the Government’s counter-terrorism efforts because it creates a
comprehensive, historical repository that permits NSA to undertake a retrospective analysis of
terrorist-related communications and potentially to identify unknown terrorist operatives that
might otherwise go undetected. Contrary to Plaintiffs’ contentions, this type of analysis cannot
be as effectively performed using traditional, targeted intelligence-gathering capabilities.
In sum, the Section 215 telephony metadata program is an important tool in the
Government’s counter-terrorism arsenal, and it is lawful. Conjecture about how the program
might be abused, without regard to the safeguards against such abuse, and without evidence that
Plaintiffs have suffered irreparable injury, does not justify the extraordinary remedy of
preliminary injunctive relief. Plaintiffs’ motion for a preliminary injunction should be denied.
BACKGROUND 1
One of the greatest challenges the United States faces in combating international
terrorism and preventing potentially catastrophic terrorist attacks on our country is identifying
terrorist operatives and networks, particularly those operating within the United States. The
exploitation of terrorist communications is a critical tool in this effort, and analysis of bulk
telephony metadata provides the Government with a timely and effective means of discovering
communications with and among unknown terrorist operatives. Declaration of Teresa H. Shea,
Signals Intelligence Director, NSA (“Shea Decl.”) ¶¶ 6-8; Declaration of R.J. Holley, Acting
1
We respectfully refer the Court to Defendants’ Motion to Dismiss (ECF No. 33) for a
discussion of the relevant statutory background and Plaintiffs’ allegations, focusing here instead
on details of the telephony metadata program that are not included in the Complaint, and so
could not be addressed in Defendants’ motion.
4
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 14 of 50
Assistant Director, Counterterrorism Division, FBI (“Holley Decl.”) ¶¶ 4-5, 8 (both filed
herewith).
Indeed, the telephony metadata program is aimed at filling a significant intelligence gap
identified by the September 11, 2001 attacks. Prior to that tragic event, the NSA intercepted and
transcribed seven calls made by hijacker Khalid al-Mihdhar, who was living in San Diego,
California, to a telephone identifier associated with an al Qaeda safe house in Yemen. The NSA
intercepted these calls using overseas signal intelligence capabilities, but those capabilities did
not capture the calling party’s telephone number identifier. Because they lacked the U.S.
telephone identifier, NSA analysts mistakenly concluded that al-Mihdhar was overseas.
Telephony metadata, however, if available at the time, would have included the missing
information and might have permitted NSA analysts to place al-Mihdhar within the United States
prior to the attacks and advise the FBI of that information. Shea Decl. ¶ 11.
Plaintiffs attempt to depict the telephony metadata program as one in which Americans’
communications are “track[ed]” by intelligence officials and used to compile “rich profiles” and
“comprehensive social maps” of their lives, but that description bears no resemblance to this
stringently controlled program. Under the program, the Government obtains orders from the
FISC, pursuant to FISA’s “business records” provision, 50 U.S.C. § 1861, enacted by section
215 of the USA-PATRIOT Act, Pub. L. 107-56, 115 Stat. 272 (Section 215), that direct certain
telecommunications service providers to produce telephony metadata, also referred to as call
detail records, to the NSA. The NSA then stores, queries, and analyzes the metadata for counterterrorism purposes. Under the terms of the FISC’s orders, the Government’s authority to
continue the program expires after 90 days and must be renewed. The FISC first authorized the
program in May 2006, and since then it has renewed the program thirty-three times under orders
issued by fourteen different FISC judges. Shea Decl. ¶¶ 13-14, 16-17, 20; Holley Decl. ¶¶ 3, 6.
5
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 15 of 50
Under the FISC’s orders, the NSA is authorized to collect, as to each call, the telephone
numbers that placed and received the call, other session-identifying information (e.g.,
International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment
Identity (IMEI) number, etc.), trunk identifier, telephone calling card number, and the date, time,
and duration of a call. The data are numerical only. The FISC’s orders authorizing this program
do not allow the NSA to collect the substantive content of any telephone call, nor the name,
address, or financial information of a subscriber, customer, or any party to a call. The
Government cannot, under this program, listen to or record the contents of anyone’s
communications. Shea Decl. ¶¶ 13, 15, 18; Holley Decl. ¶¶ 5, 7, 11.
The Government obtains these FISC orders by submitting detailed applications from the
FBI explaining that the records are sought for investigations to protect against international
terrorism that concern specified foreign terrorist organizations identified in the application.
Holley Decl. ¶ 10. As required by Section 215, the application contains a statement of facts
showing that there are reasonable grounds to believe that the metadata as a whole are relevant to
the investigations of these organizations. The application is supported by a declaration from a
senior official of NSA’s Signals Intelligence Directorate. Id.
The FISC’s orders strictly limit access to, analysis of, and dissemination of information
derived from the metadata to valid counter-terrorism purposes. Primary Order at 4-17 (Shea
Decl. Exh A); Holley Decl. ¶ 8. The NSA may access the metadata for purposes of obtaining
foreign intelligence information only through “contact-chaining” queries (term searches) of the
metadata using identifiers (typically telephone numbers) approved as “seeds” by one of twentytwo designated officials in NSA’s Signals Intelligence Directorate. Such approval may only be
given upon a determination by one of these officials that, based on the factual and practical
considerations of everyday life on which reasonable and prudent persons act, there are facts
6
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 16 of 50
giving rise to a reasonable, articulable suspicion that the selection term to be queried is
associated with one or more of the specified foreign terrorist organizations. Where the selection
term is reasonably believed to be used by a U.S. person, NSA’s Office of General Counsel must
also determine that the term is not regarded as associated with a foreign terrorist group solely on
the basis of activities protected by the First Amendment. These determinations are effective for
a finite period of time. Shea Decl. ¶¶ 19-23, 31. This “reasonable, articulable suspicion”
requirement bars the indiscriminate querying of the telephony metadata based on identifiers not
connected with terrorist activity. Indeed, because of this requirement, the vast majority of the
data obtained under this program are never seen by any person; only the tiny fraction of the
records responsive to queries authorized under the “reasonable, articulable suspicion” standard
are reviewed or disseminated by NSA analysts. Id. ¶¶ 20, 23. 2
Also under the FISC’s orders, once the NSA has obtained approval to conduct a query,
the results are limited to records of communications within three “hops” from the seed. That is,
the query results may only include identifiers and associated metadata having a direct contact
with the seed (the first “hop”), identifiers and associated metadata having a direct contact with
first “hop” identifiers (the second “hop”), and identifiers and associated metadata having a direct
contact with second “hop” identifiers (the third “hop”). Id. ¶¶ 22, 31. Query results do not
2
The attached NSA declaration addresses in detail other “minimization procedures”
contained in the FISC orders, for minimizing the retention of metadata and the dissemination of
U.S.-person information derived from the metadata, including a rigorous series of procedural,
technological, and legal controls, intensive internal and external oversight, and reporting
requirements to Congress and the FISC. Shea Decl. ¶¶ 29-35; see Primary Order at 4-17.
7
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 17 of 50
include the names or addresses of individuals associated with the responsive telephone numbers,
because that information is not included in the database in the first place. Id. ¶ 21. 3
The ability under this program to accumulate metadata in bulk, and to quickly conduct
contact-chaining analyses beyond the first hop, is crucial to the utility of the database. These
capabilities allow use of the database to conduct a level of historical analysis, and the discovery
of contact links, that cannot practically be accomplished through targeted intelligence-gathering
authorities, such as acquiring metadata of only direct communications with known terrorist
operatives, or prospectively acquiring the metadata of communications occurring after a penregister/trap-and-trace (PR/TT) device is installed. For example, the metadata may reveal that a
seed telephone number has been in contact with a previously unknown U.S. telephone number.
Examining the chain of communications out to the second and in some cases a third hop may
reveal a contact with other telephone numbers already known to be associated with a foreign
terrorist organization, thus establishing that the previously unknown telephone number is itself
likely associated with terrorism. This type of contact-chaining under the program is possible
because the bulk collection of telephony metadata creates an historical repository that permits
retrospective analysis of terrorist-related communications across multiple telecommunications
networks, and that can be immediately accessed as new terrorist-associated telephone identifiers
come to light. Id. ¶¶ 46-49, 57-63; Holley Decl. ¶¶ 27-29.
Not only is NSA’s access to the telephony metadata obtained under this program limited
as described above, its dissemination of query results is also tailored to provide only the most
3
Based on an entirely hypothetical assumption that each individual communicates with
forty other persons, Plaintiffs estimate that a query of a single individual’s telephone number
would capture metadata records concerning the calls of more than two million people. Pls.’ PI
Br. at 7. There is, however, no “typical” number of records responsive to a given query – the
number varies widely – and Plaintiffs’ hypothetical estimate is erroneous, in any case, as a
matter of simple math. The correct number of records, using Plaintiffs’ hypothetical example of
forty contacts per person, would be 65,640, not over two million. Shea Decl. ¶ 25 & n.1.
8
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 18 of 50
useful foreign intelligence information to the FBI and other agencies. The NSA does not use
queries of these data to provide the FBI with profiles on suspected terrorists or comprehensive
records of their associations. Nor does it provide the FBI with a list of all identifiers directly or
indirectly connected (at one, two, and three hops) with a suspected terrorist identifier. Such a
“data dump” of contact information would be of little investigative value to the FBI, particularly
in the midst of investigations where time may be of the essence. Rather, the NSA applies the
tools of signals intelligence tradecraft to focus only on those identifiers which, based on the
NSA’s analytic judgment and experience, and other intelligence available to it, may be of use to
the FBI in detecting persons in the United States who may be associated with the specified
foreign terrorist organizations, and acting in furtherance of their goals. Shea Decl. ¶¶ 26, 28.
Prior to dissemination of any U.S.-person information outside NSA, a senior NSA official must
determine that the information is in fact related to counter-terrorism information, and is
necessary to understand that information or assess its importance. Primary Order at 13; Shea
Decl. ¶ 32. And the NSA may not provide the FBI with any information derived from the
metadata unless it is responsive to query terms approved under the “reasonable, articulable
suspicion” standard. Shea Decl. ¶ 23. 4
The Government has recently made public FISC orders and opinions concerning various
failures to fully implement and comply with these minimization procedures, owing to human
error and technological issues, that were discovered in 2009. The Government reported these
problems to the FISC (and Congress) and remedied them, and the FISC (after temporarily
4
Plaintiffs may cite a recent article in the New York Times claiming that the NSA has
been utilizing collections of data to “create sophisticated graphs of some Americans’ social
connections.” James Risen & Laura Poitras, NSA Gathers Data on Social Connections of U.S.
Citizens, N.Y. Times, Sept. 28, 2013. Even assuming the truth of this article for the sake of
argument, which the Government neither confirms nor denies, the article makes clear that
metadata collected under authority of Section 215 are not used in this alleged activity. Id.
9
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 19 of 50
suspending the Government’s authority to query the database without the court’s approval)
reauthorized the program in its current form. Importantly, even the most serious of these
incidents did not involve the compilation of detailed profiles of Americans’ lives, as
Plaintiffs insinuate has been occurring. 5 Shea Decl. ¶¶ 36-43.
The telephony metadata program has contributed to the fight against terrorism in
important ways. Metadata analysis provides information that assists the FBI in detecting,
preventing, and protecting against terrorist threats to the national security of the United States by
providing the predication to open investigations, advance pending investigations, and revitalize
stalled investigations. It can also rule out avenues of investigation, allowing the FBI to redirect
scare resources. Metadata analysis can also provide early warning signals that alert the FBI to
individuals who are inside the United States and are linked to persons who pose a threat to the
national security. Similarly, metadata analysis can be of importance in situations where timely
information about communications by and among suspected terrorists may be necessary to
prevent the occurrence (or recurrence) of terrorist attacks. Holley Decl. ¶¶ 8-9, 18-23, 28.
The accompanying FBI declaration discusses unclassified examples in which telephony
metadata analysis, together with other intelligence methods, played a role in the FBI’s counterterrorism successes. Id. ¶¶ 24-26. One such example is the contribution of telephony metadata
analysis to the FBI’s disruption, in fall 2009, of the plan by al-Qa’ida associated terrorist
5
The most serious compliance problem involved an “alert list” process by which
telephone identifiers that had been associated with foreign terrorist organizations, but which in
many cases had not been approved under the “reasonable, articulable suspicion” standard, were
used, not as terms to query the metadata archive, but to alert analysts if identifiers associated
with foreign terrorist groups were in contact with someone in the United States. Analysts could
not query the database using these “alert list” identifiers to learn what numbers they had been in
contact with unless and until they were approved under the “reasonable, articulable suspicion”
standard. Shea Decl. ¶ 37. (Other compliance incidents have occurred since 2009, due to human
error and technology issues, although not on the same scale as the incidents discovered in 2009.
All have likewise been reported to the FISC and appropriately remedied.)
10
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 20 of 50
Najibullah Zazi and his associates to bomb the New York City subway. After signals
intelligence, together with FBI investigative efforts, revealed that Zazi was in contact with al
Qa’ida-associated terrorists, NSA received Zazi's telephone number from the FBI and ran it
against the telephony metadata, identifying and passing additional leads back to the FBI for
investigation. One of these leads revealed a previously unknown number for co-conspirator Adis
Medunjanin, and corroborated his connection to Zazi as well as to other U.S.-based extremists.
Ultimately, Zazi and his co-conspirators were arrested; Zazi pled guilty to conspiring to bomb
the New York City subway system, and Medunjanin was sentenced to life in prison. Id. ¶ 26.
ARGUMENT
“A preliminary injunction is an extraordinary and drastic remedy; it is never awarded as
of right.” Munaf v. Geren, 553 U.S. 674, 689-90 (2008) (quotation marks and citations omitted).
The movant bears the burden of demonstrating “by a clear showing” that the remedy is necessary
and that the prerequisites for issuance of the relief are satisfied. Mazurek v. Armstrong, 520 U.S.
968, 972 (1997). “[P]laintiff[s] seeking a preliminary injunction must establish that [they are]
likely to succeed on the merits, that [they are] likely to suffer irreparable harm in the absence of
preliminary relief, that the balance of equities tips in [their] favor, and that an injunction is in the
public interest.” Winter v. NRDC, 555 U.S. 7, 20 (2008); see Salinger v. Colting, 607 F.3d 68,
79-80 (2d Cir. 2010). Where, as here, the moving parties seek a mandatory injunction that alters
the status quo, and that will affect government action taken in the public interest pursuant to a
statutory scheme, the movants must make an even more compelling demonstration of entitlement
to preliminary relief than is normally required. Cacchillo v. Insmed, Inc., 638 F.3d 401, 406 (2d
Cir. 2011); see also Sussman v. Crawford, 488 F.3d 136, 140 (2d Cir. 2007).
Further, a preliminary injunction cannot issue on the mere basis of speculation or
possibility. Winter, 555 U.S. at 21-22. Rather than allowing relief based on a “‘possibility’ of
11
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 21 of 50
irreparable harm,” id. at 21, the Supreme Court has emphasized that a preliminary injunction
should issue only upon a showing that irreparable harm is “likely in the absence of an
injunction.” Id. at 22; see also Faiveley Transp. Malmo AB v. Wabtec Corp., 559 F.3d 110, 118
(2d Cir. 2009). Moreover, a court deciding a preliminary injunction motion “must balance the
competing claims of injury and must consider the effect on each party of the granting or
withholding of the requested relief,” Winter, 555 U.S. at 24, and “should pay particular regard
for the public consequences in employing the extraordinary remedy of injunction.” Id.
POINT I:
PLAINTIFFS’ ASSERTED INJURIES ARE TOO SPECULATIVE TO
ESTABLISH THEIR STANDING, OR SHOW IRREPARABLE HARM
Plaintiffs have not shown that the injuries they claim to fear as a consequence of the
telephony metadata program are real and immediate, as opposed to entirely speculative. This
failure has two consequences: (1) Plaintiffs cannot meet the requirement of demonstrating a
clear or substantial likelihood of success on their claims because they have not established their
standing to pursue those claims; and (2) for essentially the same reasons, they cannot
demonstrate that irreparable harm is likely absent an injunction.
A.
Plaintiffs Lack Standing and Therefore Cannot Show a Substantial
Likelihood of Success on the Merits
Plaintiffs’ request for a preliminary injunction must be denied because they have failed to
establish their Article III standing. Munaf, 553 U.S. at 680. When a preliminary injunction is
sought, a plaintiff may no longer rest on mere allegations in the complaint to establish standing,
but must set forth by affidavit or other evidence “specific facts” establishing each element of
standing, including that they have suffered, or imminently will suffer, an injury in fact. See
Cacchillo, 638 F.3d at 404.
Plaintiffs have failed to set forth any evidence that the injury they assert is sufficiently
real and immediate to satisfy Article III’s standards. Plaintiffs’ assertions of the consequences
12
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 22 of 50
they will suffer as a result of the telephony metadata program depend on speculation about how
the Government might use metadata related to their calls, and that third-parties—such as current
or prospective clients, or whistleblowers desiring their advice—might be “chilled” from
contacting Plaintiffs because of the Government’s use of the metadata, as they characterize it.
Plaintiffs allege that the Government uses metadata obtained under the challenged
program to keep track of when and with whom Americans communicate, and to obtain “a rich
profile of every citizen as well as a comprehensive record of citizens’ associations with one
another.” Pls.’ PI Br. at 1. Plaintiffs cite no evidence for these assertions, however, and the
restrictions imposed on the program by the FISC’s orders demonstrate the contrary. The NSA
collects only telephone numbers and other metadata, without any information about to whom the
phone numbers belong, and thus the metadata do not reveal whether a particular phone number
called is, for example, an abortion clinic, ex-girlfriend, criminal-defense lawyer, or suicide
hotline. Not only is there no subscriber-identifying information in the database, the FISC’s
orders only allow the database to be searched and records reviewed for counter-terrorism
purposes, not to track or profile the activities and associations of average Americans. As a
result, very few of the records are ever seen by any person, and it is speculation to suggest that
metadata records of calls to or from Plaintiffs either have been or ever will be retrieved or
reviewed through queries of the database. Shea Decl. ¶¶ 5, 15, 17, 19-23. Such speculation
cannot substitute for the required demonstration that the “threatened injur[ies] [are] certainly
impending.” Amnesty Int’l USA v. Clapper, 133 S. Ct. 1138, 1147 (2013).
Nor have Plaintiffs advanced any evidence supporting their conjecture that third parties,
fearing the Government can or will use call detail records to identify individuals with whom
Plaintiffs speak, will refrain from calling them. The evidence they have submitted to support
that proposition is uniformly speculative. See, e.g., German Decl. ¶ 30 (speculating that “some
13
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 23 of 50
individuals may decide not to seek advice from me or the ACLU” based on their knowledge of
the telephony metadata program); Shapiro Decl. ¶ 8 (opining that “there is a genuine risk that
people who would otherwise speak on the telephone with the ACLU will refrain from doing so if
they believe that the government will be able to learn that they have been communicating with
us”). Standing, however, cannot be based on a “speculative chain of possibilities,” Amnesty
Int’l, 133 S. Ct. at 1150, including conjecture about third parties’ reactions to hypothetical future
events, id. at 1152 n.7. Plaintiffs accordingly have failed to establish standing.
B.
Plaintiffs’ Speculation Also Does Not Establish Irreparable Harm
For the same reasons that Plaintiffs have failed to demonstrate sufficient injury to support
standing, they have failed to meet their burden to show that they will be irreparably harmed
absent preliminary injunctive relief. See Faiveley Transp., 559 F.3d at 118. As discussed above,
Plaintiffs’ claim that the telephony metadata program is being used to build a “rich profile of
every citizen” lacks evidentiary support. 6 Moreover, Plaintiffs have not established that the call
detail records provided to NSA by telecommunications service providers will be queried for
information about calls to or from persons with whom they communicate and that those persons
will, in turn, be dissuaded from contacting Plaintiffs by phone. Put simply, Plaintiffs have no
6
Plaintiffs rely on two cases involving disclosure of private data in support of their
assertions of irreparable harm, Pls.’ PI Br. at 37-38, but neither supports such a finding here.
Both cases, Hirschfeld v. Stone, 193 F.R.D. 175, 185-86 (S.D.N.Y. 2000), and Slevin v. City of
New York, 477 F. Supp. 1051 (S.D.N.Y. 1979), involved the disclosure of the content of private
information, which is not at issue here. In Hirschfeld, the Court preliminarily enjoined a state
agency from disclosing the content of sensitive psychiatric records of criminal defendants
undergoing examinations to determine their fitness for trial. 193 F.R.D. at 192-93. Similarly, in
Slevin, the statute at issue required certain city officials to publicly disclose personal financial
data. 477 F. Supp. 2d at 1053-54. Unlike those cases, the instant matter does not involve the
disclosure, or even the collection, of the content of any telephone conversation. Moreover, only
a very small subset of the metadata the NSA obtains under the telephony metadata program is
reviewed by NSA analysts, and then only in strictly controlled circumstances for a very limited
counter-terrorism purpose. Thus, neither case supports Plaintiffs’ claim of irreparable harm.
14
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 24 of 50
competent evidentiary support for their claim that they will suffer the harms they assert absent a
preliminary injunction. 7
POINT II:
PLAINTIFFS CANNOT DEMONSTRATE THEY ARE LIKELY TO
SUCCEED IN THIS ACTION BECAUSE THE NSA’S BULK
COLLECTION OF TELEPHONY METADATA IS AUTHORIZED
UNDER SECTION 215
Plaintiffs’ request for a preliminary injunction must also be denied because they have no
likelihood of prevailing on the merits of their claims. Indeed, Defendants have shown in their
motion to dismiss that Plaintiffs’ claims must be dismissed as a matter of law. Plaintiffs advance
no arguments in support of their statutory or constitutional claims that demonstrates otherwise.
A.
Judicial Review of Plaintiffs’ Claim That the NSA’s Bulk Collection of
Telephony Metadata Exceeds Its Statutory Authority Is Implicitly Precluded
Plaintiffs first maintain that the NSA’s bulk collection of telephony metadata exceeds the
Government’s statutory authority, within the meaning of the Administrative Procedure Act
(APA), 5 U.S.C. § 706(2). This claim fails at the threshold because, as Defendants have already
shown, judicial review of this claim is implicitly precluded by 18 U.S.C. § 2712 (authorizing
suits for money damages against the United States for violations of three specific provisions of
FISA, not including Section 215), and by Section 215 itself (providing for review of production
orders only at the behest of recipients). As such, Plaintiffs’ statutory claim lies beyond the scope
7
Plaintiffs incorrectly argue that irreparable injury may be “presumed” in cases alleging
constitutional deprivations. Pls.’ PI Br. at 36 (citing cases). But the cases cited that rely on a
“presumption” of irreparable harm pre-date the Second Circuit’s decision in Salinger, where the
court held that, in light of eBay, Inc. v. MercExchange, LLC, 547 U.S. 388 (2006) and Winter,
“courts must not simply presume irreparable harm.” Salinger, 607 F.3d at 82. Although a First
or Fourth Amendment violation may, if proven, amount to irreparable injury, Plaintiffs still must
demonstrate that such a violation has occurred, or imminently will occur, id., a task which they
have failed to accomplish for the reasons stated above. Cf. Ligon v. City of New York, 925 F.
Supp. 2d 478, 539 (S.D.N.Y. 2013) (constitutional violation found to be irreparable harm in light
of evidentiary showing).
15
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 25 of 50
of the APA’s waiver of sovereign immunity, and is jurisdictionally barred. Defs.’ MTD at 1419.
B.
Plaintiffs’ Claim That the NSA’s Bulk Collection of
Telephony Metadata Exceeds Its Statutory Authority Under
Section 215 Is Also Unlikely to Succeed on the Merits
Even if judicial review of Plaintiffs’ statutory claim were not precluded, the claim lacks
merit. Section 215 authorizes the FISC to issue an order for the “production of any tangible
things” upon application by the FBI “showing that there are reasonable grounds to believe that
the tangible things sought are relevant to an authorized [counter-terrorism] investigation” 50
U.S.C. § 1861(a)(1)(A), (b)(2)(A). Plaintiffs maintain that the NSA’s bulk collection of
telephony metadata disregards this requirement. But since May 2006, fourteen separate judges
of the FISC have concluded on thirty-four occasions that the FBI satisfied this requirement,
finding “reasonable grounds to believe” that the telephony metadata sought by the Government
“are relevant to authorized investigations … being conducted by the FBI … to protect against
international terrorism.” Holley Decl. ¶¶ 6, 11; see Primary Order at 1; Aug. 29 FISC Op. at 11.
Only recently the FISC concluded that
[b]ecause known and unknown international terrorist operatives are using
telephone communications, and because it is necessary to obtain the bulk
collection of a telephone company’s metadata to determine those connections
between known and unknown international terrorist operatives as part of
authorized investigations, the production of the information sought meets the
standard for relevance under Section 215.
Aug. 29 FISC Op. at 18.
Considering that the Government has consistently demonstrated the relevance of the
requested records to the FISC’s satisfaction, as Section 215 requires, it is difficult to understand
how the Government can be said to have acted in excess of statutory authority. At bottom,
Plaintiffs are asking this Court to conclude that the FISC exceeded its authority when it
authorized the NSA’s bulk collection of telephony metadata, and that this Court (without the
16
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 26 of 50
benefit of the classified applications and information available to the FISC, see Holley Decl.
¶¶ 10-11) should substitute its judgment for the decisions that the FISC reached thirty-four times.
In support of their position, Plaintiffs observe that in criminal proceedings “district courts
review the lawfulness of FISC orders” authorizing electronic surveillance, and that “courts often
examine the legality of search or arrest warrants” issued by coordinate courts. Pls.’ PI Br. at 8
n.8. But Plaintiffs invoke these precedents without acknowledging the standard of review
applied in such situations. For example, judicial review of FISA warrants is “deferential,”
involving only “minimal scrutiny by the courts.” United States v. Abu-Jihaad, 630 F.3d 102, 130
(2d Cir. 2010). More to the point here, when courts are called on to enforce grand jury or
administrative subpoenas – instruments that informed Congress’s understanding of Section 215,
see Defs.’ MTD at 23 – the Government’s determination that records are “relevant” to its
investigation is subject only to the most deferential review. 8
An equally deferential standard of review is called for in this context, where ensuring the
Government’s access to the information needed to carry out its national security mission is
imperative, and where deferential review is commanded by the terms of Section 215 itself.
Section 215 conditions the Government’s access to business records, not on a showing of
relevance, but on a showing of “reasonable grounds to believe that the [records] are relevant” to
authorized counter-terrorism investigations. 50 U.S.C. § 1861(b)(2)(A) (emphasis added), (c)(1).
Under this standard, in order to find that the FISC’s production orders exceeded its authority, this
8
See United States v. R. Enters., Inc., 498 U.S. 292, 301 (1991) (grand jury subpoena
challenged on relevancy grounds must be upheld unless “there is no reasonable possibility that
the category of materials the Government seeks will produce information relevant to the general
subject of the grand jury’s investigation”); NLRB v. Am. Med. Response, Inc., 438 F.3d 188, 193
(2d Cir. 2006) (in a proceeding to enforce an administrative subpoena, “the agency’s appraisal of
relevancy” to its investigation “must be accepted so long as it is not obviously wrong,” and the
“district court’s finding of relevancy” will be affirmed unless it is “clearly erroneous”).
17
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 27 of 50
Court would have to conclude that the fourteen FISC judges who repeatedly issued those orders
lacked any reasonable basis for doing so. That proposition is self-defeating. The fact that
fourteen judges of the FISC have granted the FBI’s applications for bulk production of telephony
metadata should itself demonstrate that the grounds advanced by the Government for believing
these records to be relevant to authorized counter-terrorism investigations are, at the very least,
reasonable. Plaintiffs offer no convincing arguments, in light of these repeated rulings, that they
are likely to succeed in establishing otherwise.
Under the common legal usage that informs the meaning of relevance under Section 215,
documents are considered relevant if they bear on, or reasonably could lead to information
bearing on, the matter at hand. Defs.’ MTD at 21-23. As Congress and the FISC have
recognized, the concept of relevance under Section 215 must also extend “wide latitude” to the
Government to seek and obtain the information needed to detect terrorist operatives and bring
their plans to a halt before they strike. Aug. 29 FISC Op. at 18-19, 23; see Defs.’ MTD at 25-26.
Thus, bulk telephony metadata are pertinent (at the least) to FBI counter-terrorism investigations
because, as experience has shown, they permit the use of analytical tools to detect contacts
between foreign terrorists and their associates located in the United States who may be planning
attacks. Holley Decl. ¶¶ 8-9, 18-26; Shea Decl. ¶¶ 44, 46-48. Targeted tools of investigation
that do not involve bulk collection of the data cannot always achieve this objective as effectively,
if at all, because the Government cannot know, in advance of linking a phone number (or other
identifier) to a terrorist organization, where in the data the terrorists’ communications can be
found. Holley Decl. ¶¶ 9, 27-29; Shea Decl. ¶¶ 57-63. Absent bulk collection, it may not be
feasible to identify chains of communications among terrorist operatives that extend across
different time periods, or different providers’ networks. Holley Decl. ¶ 9, 27-29; Shea Decl. ¶
60.
18
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 28 of 50
In short, there are ample grounds for concluding that bulk telephony metadata are
“relevant” to authorized investigations of international terrorism within the meaning of Section
215. That conclusion is reinforced, as the FISC recently recognized, by Congress’s re-enactment
of Section 215 without change in 2010 and 2011, after receiving notice that the FISC and the
Executive Branch had interpreted Section 215 to authorize the bulk collection of telephony
metadata. Aug. 29 FISC Op. at 23-28; see also Defs.’ MTD at 26-28.
Plaintiffs argue that the “core problem” with this understanding of relevance is that most
of the call detail records collected by the Government cannot be “tie[d]” to a specific counterterrorism investigation. Pls.’ PI Br. at 10. That observation hardly comes as a revelation. The
Government has always acknowledged, and the FISC has understood, that the vast majority of
the call detail records the Government expects to collect do not document communications
between terrorist operatives. See Aug. 29 FISC Op. at 20-23. At the same time, the FISC has
recognized that bulk collection of the data is necessary to the program – and therefore that the
records are relevant as a whole – because the Government cannot know in advance of making
authorized queries which communications occurring at what times, on which providers’
networks, will reflect connections between terrorist groups and operatives located in the United
States. See id. at 22. Thus, the collateral acquisition of records that do not pertain to such
communications is not a “problem” with the Government’s (and the FISC’s) understanding of
relevance, but an outgrowth of the necessarily wide latitude that Congress extended to the
Government to obtain foreign intelligence information under Section 215. As the FISC has
recognized, Congress anticipated that prospect and provided for the imposition of minimization
procedures to safeguard against the improper use or dissemination of U.S.-person information
produced under Section 215 orders. Id. at 11, 22-23; Defs.’ MTD at 26 n.14; Shea Decl. ¶¶ 2935.
19
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 29 of 50
Plaintiffs cite a patchwork of cases for the proposition that “courts routinely quash
subpoenas for records that do not have a direct relationship to the underlying investigation they
are meant to serve.” Pls.’ PI Br. at 11. The cited cases, however, do not substantiate the blanket
rule that Plaintiffs posit. 9 To the contrary, under the accepted legal understanding of relevance
in grand jury, civil, and administrative proceedings, courts have authorized the production of
voluminous repositories of records, even where the odds of any particular record being directly
relevant to the subject matter of the inquiry are small, so long as production of the records as a
whole was reasonably likely to lead to the discovery of discrete amounts of information with a
direct bearing on the subject matter of the investigation. Defs.’ MTD at 22 & n.9; see also In re
Application of the United States, 830 F. Supp. 2d 114, 130 (E.D. Va. 2011). While Plaintiffs
maintain that there is “no support” in precedent in these traditional contexts for the production of
data on the scale of bulk telephony metadata, Pls.’ PI Br. at 8-9, in the counter-terrorism context
at issue in this case, the FISC has upheld this collection under the law thirty-four times.
9
For example, in Bowman Dairy Co. v. United States, 341 U.S. 214 (1951), the Court
quashed (in part) a trial subpoena issued under Federal Rule of Criminal Procedure 17(c) because
it attempted to convert Rule 17(c) into a tool for general discovery far outstripping its intended
purposes. Id. at 220-21. Cheney v. United States Dist. Court, 542 U.S. 367, 387-88 (2004),
involved burdensome and intrusive discovery requests served on the Vice President and other
senior Government officials that threatened to interfere with the process by which the President
obtained advice from those closest to him. In re Horowitz, 482 F.2d 72, 79-80 (2d Cir. 1973),
enforced production of all documents within a specified data range without regard to subject
matter unless it could be shown that particular documents had no conceivable relevance to the
grand jury’s inquiry. In re Grand Jury Subpoena Duces Tecum Dated November 15, 1993, 846
F. Supp. 11 (S.D.N.Y. 1994), on which Plaintiffs lay particular emphasis, Pls.’ PI Br. at 11-12,
underscores the force of Defendants’ position. There the Court quashed a grand jury subpoena
for computer hard drives and floppy disks that contained both relevant and irrelevant
information, because key-word searches of the information stored on the devices could identify
relevant documents without requiring the production of irrelevant information. 846 F. Supp. at
12-13. Here, by contrast, it is not possible to isolate pertinent records in advance of production,
because it cannot be known in advance which records reflect connections between known or
suspected terrorists and others who may be working with them in the United States.
20
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 30 of 50
Also misdirected is Plaintiffs’ remark that Section 215 should not be construed as a
“license” for the Government to collect “virtually any record” on the theory that it may become
relevant later. That is neither the premise nor the consequence of Defendants’ position. The
NSA collects bulk telephony metadata, not because they may become relevant, but because
reason and experience teach that they are relevant, and fruitful, to the FBI’s core mission of
protecting national security. The NSA’s analysis of bulk telephony metadata produces tips and
leads that have given rise (or new impetus) to FBI counter-terrorism investigations. Holley Decl.
¶¶ 18, 20-26; Shea Decl. ¶¶ 44-56. To accept that fact is not to license the bulk collection of any
records the Government chooses. The relevance of bulk telephony metadata is a function of
distinctive characteristics not common to most other types of records, specifically their highly
standardized and inter-connected nature, which makes them easily susceptible of analysis in
large datasets to bring previously unknown connections between and among individuals to light.
Shea Decl. ¶ 46; Felton Decl. ¶¶ 20-22. Both of these characteristics distinguish telephony
metadata from such documents as medical records, or library-borrower records, which due to
their non-standardized format and content are not readily susceptible of automated review and
analysis and would not, in any event, enable the Government to identify otherwise unknown
communications and relationships among individuals and organizations who may be planning
terrorist attacks against this Nation.
In the final analysis, the “core problem” with Plaintiffs’ position is that, apart from
registering their own disagreement with the FISC’s repeated determinations that bulk telephony
metadata are relevant to FBI counter-terrorism investigations, they cite nothing in the text or
legislative history of the statute demonstrating that the FISC, in reaching those conclusions,
exceeded the authority that Congress intended it to wield. Congress assigned the FISC the
responsibility of making relevance determinations under Section 215, and Plaintiffs have not
21
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 31 of 50
explained how the FISC has exercised that authority in a way, not simply that they object to, but
that Congress did not intend. 10
To the contrary, it is Plaintiffs’ concept of relevance that cannot be squared with the
intent of Congress. Plaintiffs suggest that Section 215 should be understood only to permit the
collection of records that are themselves associated with terrorist organizations or activity. See
Pls.’ PI Br. at 10. Yet as Plaintiffs acknowledge, when Congress passed the USA PATRIOT Act
in 2001, it expanded the Government’s authority to obtain business records under FISA by
eliminating the requirement in prior law of “specific and articulable facts giving reason to
believe that the person to whom the records pertain is a foreign power or an agent of a foreign
power.” 50 U.S.C. § 1862(b)(2)(B) (2000 ed.); Pub. L. 107-56, § 215, 115 Stat. 288; Pls.’ PI Br.
at 3-4; see Aug. 29 FISC Op. at 13. In 2006, when Congress codified Section 215’s relevance
requirement, it rejected a proposal to restrict the statute’s scope to records pertaining to
individuals suspected of terrorist activity. See Defs.’ MTD at 24 n.13. To read such a
requirement into Section 215 now would be to flout, not execute, the will of Congress. 11
10
Plaintiffs argue that that the NSA’s bulk collection of telephony metadata, followed by
queries of the data under the “reasonable, articulable suspicion” standard, effectively shifts the
task of making relevance determinations from the FISC to the Government, contrary to
Congress’s intent. Pls.’ PI Br. at 15-16. This complaint adds nothing to Plaintiffs’ case, as it
reflects nothing more than their dissatisfaction with the determinations the FISC has consistently
made, over the past seven years, that the telephony metadata as a whole are relevant to the
Government’s counter-terrorism investigations. As the FISC itself has observed, bulk collection
of telephony metadata “fits comfortably within [the] statutory framework” of Section 215, which
is “designed to permit the government wide latitude to seek the information it needs to meet its
national security responsibilities … in combination with specific procedures for the protection of
U.S. person information.” Aug. 29 FISC Op. at 23.
11
Plaintiffs cite recent statements by several Members of Congress indicating their
disagreement with the Government’s (and the FISC’s) interpretation of Section 215 as
authorizing the bulk collection of telephony metadata. Pls.’ PI Br. at 9 n.9; see also Brief
Amicus Curiae of Congressman F. James Sensenbrenner, Jr., in Support of Plaintiffs (Dkt. No.
56) at 1-2. Isolated statements by individual Members of Congress, even the sponsors of a
measure, made after the enactment of a statute under consideration are entitled to little weight in
22
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 32 of 50
Plaintiffs raise two additional grounds on which they maintain that bulk collection of
telephony metadata exceeds the Government’s authority under Section 215, but both are plainly
insubstantial and cannot support an award of preliminary relief. Plaintiffs first contend that the
FISC may not prospectively direct the production of business records that do not yet exist, Pls.’
PI Br. at 14, but Defendants have already explained that nothing in the text or legislative history
of Section 215 suggests that the FISC may not require the production of records created during
the lifespans of its orders. See Defs.’ MTD at 30. 12 This approach does not provide the
Government with indefinite access to bulk telephony metadata, as Plaintiffs suggest; the
Government must obtain a new order for production of these metadata every 90 days. 13
Plaintiffs also invoke the canon of construction that a “specific statute … controls over a
general provision” in the event of a conflict between the two, In re Stoltz, 315 F.3d 80, 93 (2d
Cir. 2002), and argue that the Government is relying on Section 215 to engage in conduct that is
“disallow[ed]” by 50 U.S.C. § 1842, FISA’s pen-register and trap-and-trace (PR/TT) provision.
discerning the intent of the Congress that adopted the measure as law. Consumer Prod. Safety
Comm. v. GTE Sylvania, Inc., 447 U.S. 102, 117-18 (1980); Southeastern Cmty. Coll. v. Davis,
442 U.S. 397, 411 n.11 (1979).
12
This Court and others have held, analogously, that the Government may obtain
prospective disclosure of non-content cell-phone service records under the Stored
Communications Act, because nothing in the text or legislative history of that statute contains an
“explicit limit on the disclosure of prospective data.” In re Application of the United States,
460 F. Supp. 2d 448, 459 (S.D.N.Y. 2006). See also United States v. Booker, 2013 WL
2903562, *6-7 (N.D. Ga. June 13, 2013); In re Application of the United States, 632 F. Supp. 2d
202, 207 & n.8 (E.D.N.Y. 2008); In re Application of the United States, 622 F. Supp. 2d 411,
418-19 (S.D. Tex. 2007); In re Application of the United States, 433 F. Supp. 2d 804, 806 (S.D.
Tex. 2006); In re Application of the United States, 411 F. Supp. 2d 678, 680 (W.D. La. 2006); In
re Application of the United States, 405 F. Supp. 2d 435, 446-47 (S.D.N.Y. 2005).
13
Furthermore, Section 215 expires on June 1, 2015, pursuant to section 102(b)(1) of the
USA PATRIOT Improvement and Reauthorization Act of 2005, Pub. L. 109-177, 120 Stat. 195
(50 U.S.C. § 1805 note), as amended by section 2(a) of the PATRIOT Sunsets Extension Act of
2011, Pub. L. 112-4, 125 Stat. 216. Congress will have to decide before then whether to re-enact
Section 215 without change, or amend it, in light of what is now publicly known about the
Government’s exercise of authority under the statute.
23
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 33 of 50
Pls.’ PI Br. at 14. Plaintiffs fail to explain how the Government’s conduct in these circumstances
would be “disallow[ed]” by section 1842, or to explain, for that matter, how section 1842 could
be construed in the first place as a “more specific” statute dealing with the same subject matter as
Section 215. Both are equally specific provisions that set forth the respective terms and
conditions the Government must comply with to make use of two separate and distinct means of
gathering foreign intelligence – the collection of business records, and the installation of PR/TT
devices on the facilities of electronic and telephonic communications service providers. It is true
that PR/TT devices can also be used to collect telephony metadata, but Plaintiffs cite nothing in
the text or legislative history of section 1842 indicating that Congress intended PR/TT devices to
be the exclusive means of collecting such information. See cases cited in footnote 15, infra.
In sum, Plaintiffs have not shown a substantial likelihood of prevailing on their claim that
bulk collection of telephony metadata exceeds the Government’s authority under Section 215.
POINT III:
PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY
TO SUCCEED ON THEIR FOURTH AMENDMENT CLAIM
Critical to Plaintiffs’ argument that the collection of telephony metadata under Section
215 violates their Fourth Amendment rights is the premise that the NSA also collects and
analyzes subscriber-identifying information – that is, to whom the phone numbers making and
receiving a call belong – in addition to purely numerical information (the phone numbers dialed,
the time and duration of calls made). As explained above, however, under the FISC orders at
issue, the NSA collects no information identifying the persons to whom phone numbers belong.
Moreover, under the FISC’s orders, no metadata can be examined except the tiny fraction of the
records that are responsive to authorized queries made under the “reasonable, articulable
suspicion” standard. Such queries, even when made, are conducted solely to detect
communications with unknown terrorist operatives and to provide the FBI and other agencies
24
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 34 of 50
with discrete information useful to their counter-terrorism mission, not to create profiles of
ordinary Americans’ lives.
Once its premise falls away, Plaintiffs’ Fourth Amendment argument fails. There is no
reasonable expectation of privacy in telephony metadata – all that is at issue here – as the
Supreme Court squarely held in Smith v. Maryland, 442 U.S. 735 (1979). Thus, the telephony
metadata program involves no Fourth Amendment search. Even if there were a search, it would
be reasonable. Any intrusion on privacy is minimal, again because only telephony metadata are
collected, and is outweighed in any event by the paramount Government interest in thwarting
terrorist attacks.
A.
Collection and Query of Telephony Metadata Does Not Constitute a Search
As set forth in Defendants’ motion to dismiss, Plaintiffs’ Fourth Amendment claim is
controlled by Smith, which held that the Government’s recording of the numbers dialed from an
individual’s home telephone, through the off-site installation of a pen register, did not constitute
a search under the Fourth Amendment. See also Aug. 29 FISC Op. at 6 (“The production of
telephone service provider metadata is squarely controlled by Smith . . . . [Smith] and its progeny
have governed Fourth Amendment jurisprudence with regard to telephony and communications
metadata for more than 30 years.”). Smith held that individuals have no reasonable expectation
of privacy in the telephone numbers they dial, because they convey the numbers to the phone
company in the act of dialing, and “a person has no legitimate expectation of privacy in
information he voluntarily turns over to third parties.” 442 U.S. at 743-44. Smith directly
applies here to the collection of telephone numbers and other telephony metadata that subscribers
voluntarily turn over to providers. Plaintiffs’ attempts to distinguish Smith are unavailing.
Plaintiffs seek to avoid Smith’s holding by first alleging a subjective expectation of
privacy in their telephony metadata, claiming to regard the mere fact of many of their calls as
25
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 35 of 50
sensitive or confidential. Pls.’ PI Br. at 17-18. But under the FISC’s orders the NSA may collect
only phone numbers, and other numeric data, that do not identify who places or receives calls.
Shea Decl. ¶¶ 15, 21; Holley Decl. ¶¶ 7, 11. Without that information, a phone number by itself
does not reveal whether the number dialed is an abortion clinic, a criminal-defense lawyer, or a
suicide hotline, or that the person placing the call is a whistleblower. The call detail records
instead merely show that one ten-digit number called another. See Felton Decl. ¶ 20. 14
Plaintiffs further claim, again contrary to Smith, that an expectation of privacy in dialed
telephone numbers is objectively reasonable. The Smith Court held that “even if petitioner did
harbor some subjective expectation that the phone numbers he dialed would remain private, this
expectation is not ‘one that society is prepared to recognize as “reasonable.”’” 442 U.S. at 743
(quoting Katz v. United States, 389 U.S. 347, 361 (1967)). The rationale for the holding was that
the Supreme Court “consistently has held that a person has no legitimate expectation of privacy
in information he voluntarily turns over to third parties,” such as, in Smith, the numbers a
subscriber conveys to the phone company. Id. at 743-44. In the more than thirty years since
Smith was decided, the strength of the third-party doctrine has not waned. See Defs.’ MTD at
33. And the third-party doctrine has consistently been applied, both pre- and post-Smith, to
telephone call detail records like the business records at issue here, which are also third-party
14
The dissenters in Smith made the very argument now taken up by Plaintiffs – that the
numbers dialed from a phone are “not without ‘content’” and that a list of telephone numbers
dialed “could reveal the identities of the persons and the places called, and thus reveal the most
intimate details of a person’s life.” Smith, 442 U.S. at 748 (Stewart, J., dissenting). The Court
nonetheless ruled that there is no reasonable expectation of privacy in telephone numbers dialed.
Id. at 741-42. Thus, while Plaintiffs attempt to make much of technological advances since
Smith was decided that enable the analysis of large quantities of data, it is irrelevant under Smith
that telephone numbers “could” be used to reveal intimate information.
Plaintiffs’ further argument that they take measures to protect the “substance” (i.e.,
content) of their communications from surveillance by the Government or other third parties,
Pls.’ PI Br. at 18, was also made and rejected in Smith. 442 U.S. at 743.
26
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 36 of 50
records. 15 Nor is there any reason to think that a subjective expectation of privacy in telephony
metadata is any more reasonable now than it was in 1979. Just as they did in 1979, subscribers
now “typically know that they must convey numerical information to the phone company; that
the phone company has facilities for recording this information; and that the phone company
does in fact record this information for a variety of legitimate business purposes.” Id. at 743. 16
Plaintiffs seek to distinguish Smith’s holding by arguing that their “expectation that their
telephony metadata will not be subject to long-term recording and aggregation by the
government is objectively reasonable.” Pls.’ PI Br. at 18. But that assertion, like their claimed
subjective expectation of privacy, relies on the erroneous and unsupported assumption that,
under the FISC’s orders, the metadata produced by telecommunications service providers to the
NSA contain or reveal subscriber-identifying information. In support of their argument,
Plaintiffs claim that “[t]he kind of surveillance at issue here permits the government to assemble
a richly detailed profile of every person living in the United States and to draw a comprehensive
map of their associations with one another.” Id. That is not true. As explained above, when it
15
See, e.g., Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030, 104346 (D.C. Cir. 1978); United States v. Baxter, 492 F.2d 150, 167 (9th Cir. 1973); United States v.
Fithian, 452 F.2d 505, 506 (9th Cir. 1971); United States v. Doe, 537 F. Supp. 838, 839-40
(E.D.N.Y. 1982). Cf. United States v. Covello, 410 F.2d 536, 540-42 (2d Cir. 1969); United
States v. Gallo, 123 F.2d 229, 231 (2d Cir. 1941).
16
Plaintiffs’ citation to their Verizon contracts, in which Verizon agrees to protect the
confidentiality of certain customer information, including local and toll billing information, is
not helpful to them. Pls.’ PI Br. at 18 n.15. Plaintiffs concede that their agreement is qualified
by the words “in accordance with applicable laws, rules and regulations,” id., and this case
involves a court order to produce records. See also Verizon Privacy Policy at 3, available at
http://www22.verizon.com/about/privacy/policy/ (“We may disclose information that
individually identifies our customers or identifies customer devices in certain circumstances,
such as: to comply with valid legal process including subpoenas, court orders or search
warrants”). Nor is a provider’s agreement to keep the information confidential legally relevant.
See SEC v. Jerry T. O’Brien, Inc., 467 U.S. 735, 743 (1984); United States v. Miller, 425 U.S.
435, 443 (1976) (“the Fourth Amendment does not prohibit the obtaining of information revealed
to a third party . . . even if the information is revealed on the assumption that it will be used only
for a limited purpose and the confidence placed in the third party will not be betrayed.”).
27
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 37 of 50
collects telephony metadata under Section 215, the NSA receives no identifying information
about subscribers, or the persons with whom they speak. Furthermore, under the FISC’s orders,
NSA analysts cannot access the data they receive except pursuant to queries based on telephone
identifiers that are reasonably suspected of being associated with foreign terrorist organizations.
Even when the database is queried with an authorized identifier, the NSA applies signals
intelligence analysis to identify and alert the FBI to those communications that may be indicative
of contacts between known or suspected terrorists and others who may be working with them in
this country. This simply does not constitute an attempt to assemble a “richly detailed profile”
on anyone. Moreover, when NSA alerts the FBI to particular communications, any subscriberidentifying information must be obtained from other sources, if necessary pursuant to other legal
authorities.
For this reason as well, Plaintiffs’ reliance on the two concurrences in United States v.
Jones, 132 S. Ct. 945 (2012), which opined on expectations of privacy concerning long-term
GPS monitoring, Pls.’ PI Br. at 20, is misplaced. As an initial matter, this Court is obviously
bound only by the majority opinion in Jones, not by the concurring opinions (one by Justice
Alito and one by Justice Sotomayor). 17 In any event, the concerns expressed in the Jones
concurrences do not apply to the NSA’s telephony metadata program. As quoted by Plaintiffs,
Justice Sotomayor expressed concern that the GPS monitoring at issue in Jones “‘generates a
precise, comprehensive record of a person’s public movements that reflects a wealth of detail
17
See United States v. Graham, 846 F. Supp. 2d 384, 394 (D. Md. 2012) (noting that
court must “proceed with caution in extrapolating too far from the Supreme Court’s varied
opinions in Jones. Until the Supreme Court . . . definitively conclude[s] that an aggregation of
surveillance records infringes a Fourth Amendment legitimate expectation of privacy, this Court
must apply the facts of this case to the law as currently interpreted.”); Ohio v. LeMasters, 2013
WL 3463219, at *3 (Ohio App. 12 Dist. July 8, 2013) (court is “bound only by the majority
opinion of the court [in Jones], rather than [by] questions raised and suggestions made within the
dicta of concurring opinions.”).
28
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 38 of 50
about her familial, political, professional, religious, and sexual associations.’” Pls.’ PI Br. at 20
(quoting Jones, 132 S. Ct. at 955-56) (Sotomayor, J., concurring)). That was so because the GPS
device used in Jones was attached by law enforcement officers to a single, known person’s
vehicle and recorded the vehicle’s locations over a period of time. Law enforcement learned
from the GPS data where that particular person had been over 28 days and used that information
to prosecute him. In contrast here, as discussed above, the telephony metadata program provides
the NSA with information about calls between unidentified phone numbers, when the calls
occurred, and how long the calls lasted. Thus, unlike in Jones, the NSA does not know the
identity of anyone making or receiving the calls, and under the terms of the FISC’s orders,
cannot use the metadata to draw comprehensive maps of individuals’ associations. 18
Even if it were otherwise, Plaintiffs have offered no evidence that the NSA or the FBI has
ever viewed any metadata of their communications, let alone analyzed those data to map their
associations. Plaintiffs not only have no support for their claim that the NSA programmatically
collects subscriber-identifying information and analyzes it to create “richly detailed profile[s]” of
persons living in the United States, they also have not shown that the NSA has done so with
metadata of their calls. Even if the practices they hypothesize were taking place and violated
18
Plaintiffs’ suggestion that the Jones concurrences somehow overruled the third-party
doctrine that supplied the controlling rationale in Smith, Pls.’ PI Br. at 23 n.18, is also meritless.
See Graham, 846 F. Supp. 2d at 403 (“unless and until the Supreme Court affirmatively revisits
the third-party doctrine, the law is that ‘a person has no legitimate expectation of privacy in
information he voluntarily turns over to third parties,’” quoting Smith, 442 U.S. at 743-44). The
additional cases Plaintiffs cite as undermining the third-party doctrine do nothing of the sort;
they do not even involve situations in which the items or information obtained by the
government had been voluntarily turned over to a third party. Florida v. Jardines, 133 S. Ct.
1409, 1413 (2013) (drug-sniffing dog on defendant’s porch detected odors indicating the
presence of marijuana inside the home); Kyllo v. United States, 533 U.S. 27, 29-30 (2001)
(police aimed thermal-imaging device at defendant’s home to detect heat emanating from
inside); Ferguson v. City of Charleston, 532 U.S. 67, 84-85 (2001) (state hospital drug-screened
patients’ urine samples for law-enforcement purposes); Bond v. United States, 529 U.S. 334, 335
(2000) (police squeezed bus passenger’s bag placed in overhead storage space).
29
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 39 of 50
individuals’ legitimate expectations of privacy, the lack of any evidence that Plaintiffs have been
the subject of such practices is fatal to their Fourth Amendment claim. Rakas v. Illinois, 439
U.S. 128, 133-38 (1978) (Fourth Amendment rights are personal rights which may be enforced
only at the instance of one whose own protection has been infringed by the alleged search);
United States v. Haqq, 278 F.3d 44, 47 (2d Cir. 2002) (an individual’s Fourth Amendment rights
are violated only when the challenged conduct invaded his legitimate expectation of privacy
rather than that of a third party).
Plaintiffs’ emphasis on the breadth of the telephony metadata program – i.e., the fact that
under the program, telecommunications service providers provide the NSA with the call detail
records of millions of Americans – does not alter that conclusion. The personal nature of Fourth
Amendment rights precludes the argument that Plaintiffs’ rights are violated by virtue of any
collection or analysis of metadata pertaining to the calls of other persons. See Defs.’ MTD at 35.
See also Aug. 29 FISC Op. at 8 (“[W]here one individual does not have a Fourth Amendment
interest, grouping together a large number of similarly-situated individuals cannot result in a
Fourth Amendment interest springing into existence ex nihilo.”). Nor is the fact that the
collection is authorized for a period of 90 days material to this question. In Miller, 425 U.S. at
437-38, for example, the Court upheld a subpoena for all records of all bank accounts belonging
to Miller, for a period of almost four months. See also Doe, 537 F. Supp. at 839 (ordering phone
company to produce telephone records of a subscriber for six months).
Given the conclusive, controlling effect of Smith on this case, there is no likelihood that
Plaintiffs will succeed on the threshold question presented by their Fourth Amendment claim –
whether a search occurred. See Aug. 29 FISC Op. at 9 (“there is no legal basis” for finding that
the bulk telephony metadata collection violates the Fourth Amendment).
30
Case 1:13-cv-03994-WHP Document 61
B.
Filed 10/01/13 Page 40 of 50
The NSA’s Bulk Collection of Telephony Metadata is Reasonable
As also established in Defendants’ motion to dismiss, even if the collection and retention
of Plaintiffs’ telephony metadata constituted a search under the Fourth Amendment, it is
reasonable when the minimal intrusion on privacy that may result from the collection of purely
numerical information is weighed against the substantial governmental interest in preventing
terrorist attacks. Defs.’ MTD at 35-37. See also Shea Decl. ¶¶ 6-8, 10; Holley Decl. ¶¶ 4-5, 2026. 19
Plaintiffs’ primary attack on the reasonableness of the program is to assert it is a “general
warrant for the digital age.” Pls.’ PI Br. at 23. But the cases Plaintiffs rely on for this
comparison are inapposite. Id. at 23-28 (relying on Berger v. State of New York, 388 U.S. 41
(1967); United States v. U.S. Dist. Court (Keith), 407 U.S. 297 (1972); United States v.
Tortorello, 480 F.2d 764 (2d Cir. 1973); United States v. Bobo, 477 F.2d 974 (4th Cir. 1973);
United States v. Cafero, 473 F.2d 489 (3d Cir. 1973)). Those cases involved the authorization of
electronic eavesdropping on the contents of private conversations, a far greater intrusion on
privacy interests than the collection of numerical telephony metadata devoid of any subscriberidentifying information or substantive content. See, e.g., Smith, 442 U.S. at 741; Keith, 407 U.S.
at 320 (“Official surveillance . . . risks infringement of constitutionally protected privacy of
speech.”); Berger, 388 U.S. at 63 (“[I]t is not asking too much that officers be required to
comply with the basic command of the Fourth Amendment before the innermost secrets of one’s
home or office are invaded.”). Nor does the program at issue here even involve electronic
surveillance, as that term is defined by FISA (see 50 U.S.C. § 1801); the orders require the
19
Plaintiffs state in their brief that they are not addressing the “special needs” doctrine.
Pls.’ PI Br. at 24. But the balancing of the intrusion on privacy interests against the promotion of
legitimate governmental interests employed by plaintiffs to assess reasonableness of the
telephony metadata program tracks the balancing test used in the special needs context.
Compare id., with Defs.’ MTD at 35.
31
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 41 of 50
production of providers’ business records. Thus, Plaintiffs’ invocation of a heightened standard
of reasonableness in the context of electronic surveillance is inapplicable here.
Also contrary to Plaintiffs’ arguments, the orders issued by the FISC approving the
telephony metadata collection cannot be condemned as “roving commissions,” Pls.’ PI Br. at 2324, inasmuch as they (1) specifically describe the records to be provided (call detail records, or
telephony metadata, as defined by the orders), (2) are addressed to particular telecommunications
service providers, (3) are issued for a finite period of time (90 days), and (4) heavily restrict the
use, retention, and dissemination of the records collected. See Primary and Secondary Orders,
Shea Decl. Exhs. A & B; Shea Decl. ¶¶ 14-15; Holley Decl. ¶¶ 6-7, 12-13; Berger, 388 U.S. at
56-60. See also Maryland v. King, 133 S. Ct. 1958, 1980 (2013) (taking into account restrictions
on a program in assessing its reasonableness). Lastly, while Plaintiffs contend that the telephony
metadata program is unbounded in that “[t]he government simply obtains all of Plaintiffs’ phone
records, no matter their relevance to an ongoing investigation,” Pls.’ PI Br. at 27, as explained
above, bulk telephony metadata are relevant to authorized investigations against international
terrorism, as the FISC has repeatedly found.
In addition, the telephony metadata program is at the least a “reasonably effective means”
of promoting the Government’s counter-terrorism goals. Bd. of Educ. of Indep. Sch. Dist. No. 92
of Pottawatomie Cnty. v. Earls, 536 U.S. 822, 837 (2002). The program enhances the
Government’s ability to identify and track terrorist operatives who might otherwise elude
detection, and has contributed to counter-terrorism investigations. Without the bulk collection of
telephony metadata, the Government’s ability to detect communications between known or
suspected terrorists and others who may be engaged in terrorist activity could be impaired. Thus,
the program is more effective than if the Government “simply collect[ed] those records relating
32
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 42 of 50
to [particular suspected terrorists].” Pls.’ PI Br. at 28. See Shea Decl. ¶¶ 57-63; Holley Decl. ¶¶
9, 27-29.
For the foregoing reasons, Plaintiffs’ Fourth Amendment claim has no likelihood of
success on the merits.
POINT IV:
A.
PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY
TO SUCCEED ON THEIR FIRST AMENDMENT CLAIM
Plaintiffs’ First Amendment Claim Fails Because Good-Faith Investigatory
Conduct Not Intended to Deter or Punish Protected Speech or Association
Does Not Violate the First Amendment
Plaintiffs likewise have failed to plausibly allege, and now to show, that the
Government’s collection of non-content telephony metadata violates the First Amendment. As
Defendants have already explained, good-faith governmental investigations conducted in
observance of the Fourth Amendment, without the purpose of deterring or penalizing protected
speech or association, do not violate the First Amendment. See Defs.’ MTD at 37-38. Because
Plaintiffs do not contend, much less offer any proof, that the telephony metadata program is
directed at them based on their expressive or associational activities, their First Amendment
claim fails as a matter of law, and cannot serve as a predicate for issuing a preliminary
injunction. Id. at 38-40.
B.
Because the Telephony Metadata Program Imposes No Direct or
Significant Burden on Plaintiffs’ Associational Rights, the “Exacting
Scrutiny” Test Does Not Apply
Plaintiffs’ contention that the telephony metadata program should be subjected to
“exacting scrutiny” because it imposes a “significant burden” on Plaintiffs’ associational rights,
Pls.’ PI Br. at 29-36, also fails as a matter of law and fact. First, as discussed above, the
underlying premise of Plaintiffs’ argument – that the program exposes all of Plaintiffs’ sensitive
contacts with members, donors, clients, whistleblowers, and others with whom they collaborate
in their work to government scrutiny – is without foundation. Plaintiffs do not allege, and do not
33
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 43 of 50
offer any evidence, that the metadata of any of their communications – which do not include the
names or addresses of anyone with whom Plaintiffs speak by phone – have ever been accessed or
reviewed by NSA analysts for any purpose, whether as the results of queries based on the
“reasonable, articulable suspicion” standard, or otherwise.
Furthermore, Plaintiffs have set forth no evidence of an actual “chilling effect”
attributable to the telephony metadata program that interferes with their rights of association.
Plaintiffs do not contend that they themselves are actually or even subjectively chilled by the
telephony metadata program. Rather, they express their belief that others who regard their
associations with Plaintiffs as confidential may be “chilled” from contacting them. See Compl.
¶¶ 3, 35; Pls.’ PI Br. at 33-34; German Decl. ¶¶ 29-30; Dunn Decl. ¶ 9; Shapiro Decl. ¶ 8.
Plaintiffs provide no concrete example, however, to substantiate their assertion that prospective
clients, or others with whom they work, have become unwilling or even reluctant to contact them
because of the telephony metadata program. Instead, they offer only general predictions of such
a possibility. See German Decl. ¶ 29 (speculating that knowledge of the Program “will cause
some individuals to remain silent rather than contact me or the ACLU”), and id. ¶ 30 (“some
individuals may decide not to seek advice from me or the ACLU”); Shapiro Decl. ¶ 8
(speculating similarly as to this “genuine risk”).
These allegations fail to demonstrate an actual chill on associational activity as required
to support a First Amendment claim. See Curley v. Vill. of Suffern, 268 F.3d 65, 73 (2d Cir.
2001) (“Where a party can show no change in his behavior, he has quite plainly shown no
chilling of his First Amendment right to free speech.”); Fighting Finest, Inc. v. Bratton, 95 F.3d
224, 228 (2d Cir. 1996) (rejecting freedom of association claim where plaintiff “ha[d] not alleged
that the actions of [the government] caused its members to suspend or even curtail their
associational activities”). As Defendants have explained, see Defs.’ MTD at 39, even if
34
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 44 of 50
government conduct makes it incidentally “more difficult for individuals to exercise their
freedom of association,” that “does not, without more, result in a violation of the First
Amendment.” Fighting Finest, 95 F.3d at 228. Rather, “[t]o be cognizable, the interference with
associational rights must be ‘direct and substantial’ or ‘significant.” Id. (quoting Lyng v. UAW,
485 U.S. 360, 366, 367 & n.5 (1988)). Plaintiffs have not made that showing here.
Nor can Plaintiffs draw any meaningful parallel between this case and compelled
disclosure cases where courts have applied “exacting” First Amendment scrutiny to government
conduct. In NAACP v. Alabama ex rel. Patterson, 357 U.S. 449 (1958), on which Plaintiffs
principally rely, Pls.’ PI Br. at 31-32, the Alabama courts had ordered the NAACP to produce
local membership lists in connection with litigation to oust it from the State as an unregistered
corporation. See 357 U.S. at 451-53. The Supreme Court held that Alabama could not compel
the NAACP to disclose its membership lists because it “made an uncontroverted showing that on
past occasions revelation of the identity of its rank-and-file members has exposed these members
to economic reprisal, loss of employment, threat of physical coercion, and other manifestations
of public hostility.” Id. at 462. “Under these circumstances,” the Court found it “apparent that
compelled disclosure of [NAACP]’s Alabama membership” entailed a “substantial restraint” on
the organization’s freedom of association. Id.; see also Brown v. Socialist Workers ‘74
Campaign Comm., 459 U.S. 87, 98-99 (1982) (similarly holding unconstitutional the targeted,
compelled disclosure of contributions to and expenditures by Socialist Workers Party, based on
“substantial evidence” of harassment, threats, assaults, and reprisals against its members); Bates
v. City of Little Rock, 361 U.S. 516, 523-24 (1960) (similar).
In contrast, the FISC’s orders authorizing the telephony metadata program do not compel
Plaintiffs to disclose, or direct anyone else, including telecommunications service providers, to
disclose names or addresses of Plaintiffs, their members, their clients, or anyone else with whom
35
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 45 of 50
they associate (or expose them to the public hostility suffered by the parties in such cases as
NAACP). The NSA obtains only numeric telephony metadata, to which analysts and
investigators are permitted no access unless they are responsive to queries based on identifiers
associated with foreign terrorist organizations. Plaintiffs have neither alleged nor shown that any
metadata of their calls have been retrieved or examined by NSA analysts as a result of such
queries, or otherwise.
Moreover, even if this were a compelled-disclosure case, Plaintiffs could not establish the
“substantial evidence” of a direct and targeted encroachment on First Amendment rights required
to trigger “exacting scrutiny,” as was the situation in many of the cases Plaintiffs cite. 20 As the
Supreme Court has explained, “exacting scrutiny” applies “to regulations that suppress,
disadvantage, or impose differential burdens upon speech because of its content.” Turner Broad.
Sys., Inc. v. FCC, 512 U.S. 622, 642 (1994) (emphasis added); see also Clark, 750 F.2d at 94
(holding that exacting scrutiny is appropriate in police surveillance context, where “government
20
For example, the court in Clark v. Library of Congress applied “exacting scrutiny” to a
“targeted investigation of an individual based solely on the exercise of his associational rights,”
which resulted in “an extraordinary” full field investigation by the FBI. 750 F.2d 89, 95 (D.C.
Cir. 1984). The court noted that Clark “based his claim on a significantly intrusive investigation
for which he alone was singled out by the Library on the basis of his peaceful association with a
lawful political association.” Id. at 94. Similarly, the Second Circuit applied exacting scrutiny
in Tabbaa v. Chertoff based on a finding that the plaintiffs established the requisite “direct and
substantial” interference with their associational rights when they were forcibly “detained and
searched for between four and six hours,” their cars were searched, and they were “questioned,
patted-down, fingerprinted, and photographed . . . solely by virtue” of having attended an Islamic
conference. 509 F.3d 89, 92-95, 102 (2d Cir. 2007). See also Elrod v. Burns, 427 U.S. 347, 350
(1976) (applying “exacting scrutiny” test to First Amendment claim by public employees upon
their termination “solely for the reason that they were not affiliated with or sponsored by the
Democratic Party”); In re Grand Jury Proceedings, 776 F.2d 1099, 1102-03 (2d Cir. 1985)
(rejecting, under “exacting scrutiny” test, free association challenge to targeted grand jury
subpoena compelling individual’s detailed testimony on the membership, structure, and funding
of the Hell’s Angels Motorcycle Club); Local 1814, Int’l Longshoreman’s Ass’n v. Waterfront
Comm’n of N.Y. Harbor, 667 F.2d 267, 269 (2d Cir. 1981) (applying “exacting scrutiny” test to
government-compelled disclosure of longshoremen’s political contributions).
36
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 46 of 50
action is motivated solely by an individual’s lawful beliefs or associations”) (emphasis added);
FEC v. Larouche Campaign, 817 F.2d 233, 234 (2d Cir. 1987) (noting similarly where very
purpose of investigation was the targeted association’s political speech and activity).
Again, Plaintiffs do not allege or submit evidence that the telephony metadata program is
content-based, much less directed at curtailing or punishing free expression or association. See
Pls.’ PI Br. at 30-36. Plaintiffs present no evidence indicating that the program is specifically
directed at individuals or organizations because of their expressive or associational activities. To
the contrary, as the record reflects, the program involves broad-based collection of telephony
metadata for purposes – detecting terrorist communications, and preventing terrorist attacks –
having nothing to do with activities protected by the First Amendment. Indeed, numerous
safeguards built into the program prevent the Government from acquiring or using the data for
purposes forbidden by the First Amendment. 21 Plaintiffs’ failure to establish “direct and
substantial” interference with their associational rights brings the First Amendment inquiry –
under exacting scrutiny, or any other standard – to an end. Tabbaa, 509 F.3d at 101. 22
21
See Primary Order at 8-9 (requiring NSA OGC to review all findings of reasonable,
articulable suspicion for phone numbers reasonably believed to be used by United States persons
to ensure the findings are not based on activities protected by the First Amendment); 50 U.S.C. §
1861(a)(1) (prohibiting any investigation of a United States person “conducted solely upon the
basis of activities protected by the first amendment to the Constitution”); Attorney General’s
Guidelines for Domestic FBI Operations, U.S. Dep’t of Justice at 13 (Sept. 29, 2008) (same);
Shea Decl. ¶¶ 21, 32.
22
Plaintiffs’ attempt to compare the Program to the “FBI’s use of mail covers,” which
they term the “postal equivalent of ‘metadata,’” Pls.’ PI Br. at 31, is also unavailing. A mail
cover is a process by which a record is made of any data appearing on the outside cover of mail
to or from targeted individuals or organizations, including the name and address of the sender.
See 39 C.F.R. § 233.3; United States v. Bianco, 534 F.2d 501, 507 (2d Cir. 1976). As the FISC’s
orders make clear, the program at issue here does not involve the targeted collection, recording,
or analysis of any such identifying information. See Primary Order at 3 n.1; Shea Decl. ¶¶ 7, 15,
18; Holley Decl. ¶¶ 7, 11.
37
Case 1:13-cv-03994-WHP Document 61
C.
Filed 10/01/13 Page 47 of 50
Even if “Exacting Scrutiny” Applied, the Telephony Metadata Program
Serves the Government’s Compelling Interest in Protecting National
Security in a Manner That Is Not Practically Achievable by Other Means.
Even if Plaintiffs could make a case for applying exacting scrutiny, the telephony
metadata program would pass muster. First, the program “serve[s] compelling state interests,
unrelated to the suppression of ideas . . . .” Tabbaa, 509 F.3d at 102. It is undisputed that the
telephony metadata program is directed at furthering the Government’s compelling interest in
identifying and tracking terrorist operatives and ultimately thwarting terrorist attacks. See id. at
103 (“[T]he government’s interest in protecting the nation from terrorism constitutes a
compelling state interest unrelated to the suppression of ideas . . . .”); Shea Decl. ¶¶ 6-8, 10;
Holley Decl. ¶¶ 4-5.
Second, the Government has explained that the program’s objectives could not be
achieved through the alternative means that Plaintiffs suggest – collecting metadata associated
only with the calls of persons already known to be, or suspected of being, terrorist operatives.
Tabbaa, 509 F.3d at 102; Pls.’ PI Br. at 34. Relying solely on such targeted collection of
telephony metadata, whether by subpoenas, national security letters, or PR/TT devices, would
hinder the Government’s ability to identify networks of previously unknown foreign terrorist
operatives in the United States as rapidly, reliably, and completely as analysis of bulk telephony
metadata. See Holley Decl. ¶¶ 9, 27-29; Shea Decl. ¶¶ 57-63. Likewise, without its aggregation
of bulk metadata, the NSA’s ability to detect previously unknown chains of communications
among terrorist operatives, crossing different time periods and provider networks, would be
impaired. Information that has proven valuable in the past and could be important in the future
to the initiation and advancement of FBI counter-terrorism investigations, and to the prevention
of terrorist attacks, could also be lost. See Holley Decl. ¶¶ 9, 19-26; Shea Decl. ¶¶ 46, 57-63.
38
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 48 of 50
For all of these reasons, Plaintiffs’ First Amendment claim, like their statutory and Fourth
Amendment claims, fails to supply a predicate for awarding preliminary injunctive relief.
POINT V:
THE BALANCE OF THE EQUITIES AND THE PUBLIC INTEREST
REQUIRE THAT AN INJUNCTION BE DENIED
Finally, Plaintiffs have not demonstrated that the public interest or a balancing of the
equities supports their requested injunction; to the contrary, such a balancing strongly militates
against entering any injunction. For even if Plaintiffs could show irreparable harm, which they
cannot, that harm would be outweighed by the public consequences of a preliminary injunction.
The Supreme Court has required the courts to balance the irreparable harm to plaintiffs if
injunctive relief is denied against the harm to the public interest if it is granted. Winter, 555 U.S.
at 25. Indeed, the Court has instructed the lower courts to be particularly mindful of an
injunction’s “consequent adverse impact on the public interest in national defense.” Id. This is
yet further reason why Plaintiffs’ request for preliminary relief should be denied. 23
Plaintiffs seek a three-fold injunction (1) barring the Government from collecting
Plaintiffs’ call records under the Section 215 telephony metadata program; (2) requiring the
Government to quarantine all of Plaintiffs’ call records already collected under the program; and
(3) prohibiting the Government from querying metadata obtained through the program using any
phone number or other identifier associated with Plaintiffs. Pls.’ PI Br. at 2. All three aspects of
the injunctive relief Plaintiffs seek would, ironically, require the NSA to know which phone
23
Injunctive relief is particularly inappropriate where, as here, the case involves
professional judgments about national security matters. Great deference is given to the
professional judgment of intelligence officials regarding such matters, and courts are properly
reluctant to interfere with that judgment. Holder v. Humanitarian Law Project, 130 S. Ct. 2705,
2724 (2010) (“Everyone agrees that the Government’s interest in combating terrorism is an
urgent objective of the highest order.”); id. at 2727 (according deference to Executive affidavits
on issues of national security, and stating “evaluation of the facts by the Executive, like
Congress’s assessment, is entitled to deference [because t]his litigation implicates sensitive and
weighty interests of national security”); Winter, 555 U.S. at 24 (similar).
39
Case 1:13-cv-03994-WHP Document 61
Filed 10/01/13 Page 49 of 50
numbers belong to or are associated with Plaintiffs. Shea Decl. ¶ 64. As noted throughout this
brief, the NSA does not have that information under the telephony metadata program.
Even if Plaintiffs were to provide this information to the NSA, it would be burdensome to
implement the requested injunction. Technical experts would have to develop the technical
capability to remove those numbers from the database upon receipt of each batch of metadata, or
to block the numbers from view when queries are run. To identify, design, build, and test such
an implementation solution would potentially require the hiring of additional personnel and
could take approximately six months. Once implemented, any potential solution could
undermine the results of authorized queries by eliminating potential call chains. Moreover, if the
injunction were to be lifted, the NSA would have to devise a way to reverse the implementation
solution, which would require additional resources. Id. ¶ 65.
The impact of the requested injunction would of course be magnified if the issuance of
the injunction were to precipitate additional successful requests for similar injunctions by large
numbers of individuals and organizations. In that event, it is possible at some point that the
cumulative interference with the NSA’s ability to continue collecting and analyzing telephony
metadata in the manner prescribed by the FISC’s orders could have an adverse impact on the
Government’s ability to carry out its counter-terrorism mission. Shea Decl. ¶ 63.
CONCLUSION
For the reasons stated above and in Defendants’ memorandum in support of their motion
to dismiss, Plaintiffs’ motion for a preliminary injunction should be denied.
40
Case 1:13-cv-03994-WHP Document 61
Dated:
New York, New York
October 1, 2013
STUART F. DELERY
Assistant Attorney General
PREET BHARARA
United States Attorney for the
Southern District of New York
Attorney for Defendants
JOSEPH H. HUNT
Director
By:
ANTHONY J. COPPOLINO
Deputy Director
By:
Filed 10/01/13 Page 50 of 50
/s/ James Gilligan
JAMES J. GILLIGAN
Special Litigation Counsel
MARCIA BERMAN
Senior Trial Counsel
BRYAN DEARINGER
Trial Attorney
Civil Division
Federal Programs Branch
U.S. Department of Justice
20 Massachusetts Avenue, N.W.
Washington, DC 20001
Tel.: (202) 514-3358
41
/s/ David S. Jones
DAVID S. JONES
TARA M. La MORTE
JOHN D. CLOPPER
CHRISTOPHER HARWOOD
Assistant United States Attorneys
86 Chambers Street, 3rd Floor
New York, New York 10007
Tel.
(212) 6372739/2746/2716/2728
Fax
(212) 637-2730
david.jones6@usdoj.gov
tara.lamorte2@usdoj.gov
john.clopper@usdoj.gov
christopher.harwood@usdoj.gov
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?