KLAYMAN v. OBAMA et al

Filing 25

Memorandum in opposition to re 13 MOTION for Preliminary Injunction filed by KEITH B. ALEXANDER, ERIC H. HOLDER, JR, NATIONAL SECURITY AGENCY, BARACK HUSSEIN OBAMA, II, U.S. DEPARTMENT OF JUSTICE. (Attachments: # 1 Declaration (Declaration of James J. Gilligan), # 2 Exhibit (Exhibit A), # 3 Exhibit (Exhibit B), # 4 Exhibit (Exhibit C), # 5 Exhibit (Exhibit D), # 6 Exhibit (Exhibit E), # 7 Exhibit (Exhibit F), # 8 Exhibit (Exhibit G), # 9 Exhibit (Exhibit H), # 10 Exhibit (Exhibit I), # 11 Exhibit (Exhibit J), # 12 Exhibit (Exhibit K), # 13 Exhibit (Exhibit L), # 14 Exhibit (Exhibit M), # 15 Exhibit (Exhibit N), # 16 Exhibit (Exhibit O), # 17 Exhibit (Exhibit P), # 18 Exhibit (Exhibit Q), # 19 Exhibit (Exhibit R), # 20 Exhibit (Exhibit S), # 21 Exhibit (Exhibit T), # 22 Text of Proposed Order)(Gilligan, James)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA _______________________________________ ) ) LARRY KLAYMAN, et al., ) ) Civil Action No. Plaintiffs, ) 1:13-cv-00851-RJL v. ) ) ) BARACK OBAMA, President of the ) United States, et al., ) Defendants. ) _______________________________________) ) LARRY KLAYMAN, et al., ) ) ) Civil Action No. Plaintiffs, ) 1:13-cv-00881-RJL ) v. ) ) BARACK OBAMA, President of the ) United States, et al., ) ) Defendants. _______________________________________) GOVERNMENT DEFENDANTS’ OPPOSITION TO PLAINTIFFS’ MOTIONS FOR PRELIMINARY INJUNCTIONS TABLE OF CONTENTS PAGE INTRODUCTION ...........................................................................................................................1 STATEMENT OF FACTS ..............................................................................................................5 I. STATUTORY BACKGROUND.........................................................................................5 II. THE COLLECTION OF INFORMATION AUTHORIZED BY FISA..............................8 A. Collection of Bulk Telephony Metadata Under Section 215 ................................8 B. Targeted Collection of Communications Content Pursuant to Section 702 .......13 C. Bulk Collection of Internet Metadata .................................................................15 III. PLAINTIFFS’ ASSERTIONS IN THEIR PRELIMINARY INJUNCTION MOTIONS.................................................................................................16 ARGUMENT .................................................................................................................................17 I. PLAINTIFFS HAVE NOT DEMONSTRATED INJURY SUFFICIENT TO ESTABLISH THEIR STANDING, NOR SHOWN ANY IRREPARABLE HARM .......19 A. B. II. Plaintiffs Lack Standing and Therefore Cannot Show a Substantial Likelihood of Success on the Merits ..................................................................19 Plaintiffs’ Speculative Injuries Also Do Not Establish Irreparable Harm .................................................................................................24 PLAINTIFFS’ CLAIM THAT THE ALLEGED NSA ACTIVITIES EXCEED STATUTORY AUTHORITY IS PRECLUDED BY STATUTE .....................................25 III. PLAINTIFFS’ CLAIM THAT THE ALLEGED NSA INTELLIGENCEGATHERING PROGRAMS EXCEEDS THE GOVERNMENT’S STATUTORY AUTHORITY IS ALSO UNLIKELY TO SUCCEED ON THE MERITS ......................31 A. The Telephony Metadata Program Is Authorized Under Section 215 .................32 1. Bulk telephony metadata are “relevant” within the meaning of Section 215 ............................................................................................32 2. Congress has legislatively ratified the construction of Section 215 as allowing for the bulk collection of telephony metadata records ....................................................................................................................37 i 3. Plaintiffs present no persuasive reasons for concluding that bulk telephony metadata are not “relevant” to authorized counter-terrorism investigations within the meaning of Section 215 .....................................38 4. Nothing in Section 215 prohibits the FISC from prospectively directing the production of business records as they are created .............................42 B. Plaintiffs Have No Likelihood of Success on Their Statutory Challenge to the Government’s Targeted Collection Directed Against Non-U.S. Persons Located Outside the United States ........................................................44 C. Plaintiffs Have No Likelihood of Success on Their Statutory Challenge to the Government’s Prior Collection of Bulk Internet Metadata.......................44 IV. PLAINTIFFS CANNOT SUCCEED ON THE MERITS OF THEIR FOURTH AMENDMENT CLAIM BECAUSE THE CHALLENGED SURVEILLANCE DOES NOT VIOLATE PLAINTIFFS’ FOURTH AMENDMENT RIGHTS..................45 A. B. The Government’s Acquisition of Telephony Metadata Is Reasonable .............50 C. V. Plaintiffs Have No Fourth Amendment Privacy Interest in Telecommunications Metadata ...........................................................................45 The NSA’s PRISM Collection Does Not Violate Plaintiffs’ Fourth Amendment Rights ..................................................................................53 PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY TO SUCCEED ON THEIR FIRST AMENDMENT CLAIM .................................................55 A. Good-Faith Investigatory Conduct Not Intended to Deter or Punish Protected Speech or Association Does Not Violate the First Amendment .........55 B. The Programs Plaintiffs Challenge Impose No Direct or Significant Burden on Plaintiffs’ Speech or Associational Rights ........................................57 VI. PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY TO SUCCEED ON THEIR FIFTH AMENDMENT CLAIM .................................................60 A. Plaintiffs’ Substantive Due Process Claim Should Be Dismissed as Duplicative of Their Fourth Amendment Claim ............................................60 B. Plaintiffs’ Procedural Due Process Claim Is Also Meritless ..............................61 VII. THE BALANCE OF EQUITIES AND THE PUBLIC INTEREST REQUIRE THAT AN INJUNCTION BE DENIED .........................................................63 CONCLUSION ..............................................................................................................................65 ii TABLE OF AUTHORITIES CASES ACLU Found. v. Barr, 952 F.2d 457 (D.C. Cir. 1991) .................................................................................................. 56 Afshar v. Dep't of State, 702 F.2d 1125 (D.C. Cir. 1983) ................................................................................................ 17 Albright v. Oliver, 510 U.S. 266 (1994) .................................................................................................................. 61 Ark. Dairy Co-op Assn., Inc. v. USDA, 573 F.3d 815 (D.C. Cir. 2009) .................................................................................................. 30 Bates v. City of Little Rock, 361 U.S. 516 (1960) .................................................................................................................. 59 Bayer HealthCare, LLC v. FDA, --- F. Supp. 2d ---, 2013 WL 1777481 (D.D.C. 2013) .............................................................. 18 Bd. of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls, 536 U.S. 822 (2002) ............................................................................................................ 51, 52 Block v. Cmty. Nutrition Inst., 467 U.S. 340 (1984) ............................................................................................................ 28, 30 Block v. North Dakota ex rel. Bd. of Univ. and Sch. Lands, 461 U.S. 273 (1983) .................................................................................................................. 28 Bradshaw v. Veneman, 338 F. Supp. 2d 139 (D.D.C. 2004) .......................................................................................... 65 Brown v. District of Columbia, 888 F. Supp. 2d 28 (D.D.C. 2012) ............................................................................................ 25 Brown v. McHugh, --- F. Supp. 2d ---, 2013 WL 5310185 (D.D.C. Sept. 23, 2013) ............................................... 62 Brown v. Socialist Workers '74 Campaign Comm., 459 U.S. 87 (1982) .................................................................................................................... 59 Calero-Toledo v. Pearson Yacht Leasing Co., 416 U.S. 663 (1974) .................................................................................................................. 63 iii Carrillo Huettel, LLP v. SEC, 2011 WL 601369 (S.D. Cal. Feb. 11, 2011) ............................................................................. 33 Chaplaincy of Full Gospel Churches v. England, 454 F.3d 290 (D.C. Cir. 2006) .................................................................................................. 24 CIA v. Sims, 471 U.S. 159 (1985) .................................................................................................................. 35 CityFed Fin. Corp. v. Office of Thrift Supervision, 58 F.3d 738 (D.C. Cir. 1995) .................................................................................................... 18 Clapper v. Amnesty Int'l USA, 133 S. Ct. 1138 (2013) ....................................................................................................... passim Clark v. Library of Congress, 750 F.2d at 94 ........................................................................................................................... 60 Conservation Force v. Salazar, 715 F. Supp. 2d 99 (D.D.C. 2010) ...................................................................................... 22, 24 Dominquez v. Dist. of Columbia, 536 F. Supp. 2d 18 (D.D.C. 2008) ............................................................................................ 19 Doe v. Rumsfeld, 297 F. Supp. 2d 119 (D.D.C. 2003) .......................................................................................... 20 Dorfmann v. Boozer, 414 F.2d 1168 (D.C. Cir. 1969) ................................................................................................ 65 EEOC v. Shell Oil Co., 466 U.S. 54 (1984) .............................................................................................................. 33, 38 Elkins v. Dist. of Columbia, 690 F.3d 554 (D.C. Cir. 2012) .................................................................................................. 61 Elrod v. Burns, 427 U.S. 347 (1976) .................................................................................................................. 60 Forest Grove Sch. Dist. v. T.A., 557 U.S. 230 (2009) .................................................................................................................. 38 FTC v. Invention Submission Corp., 965 F.2d 1086 (D.C. Cir. 1992) .......................................................................................... 33, 39 iv Fund for Animals v. Frizzel, 530 F.2d 982 (D.C. Cir. 1975) .................................................................................................. 25 Gen. Elec. Co. v. Jackson, 610 F.3d 110 (D.C. Cir. 2010) ............................................................................................ 61, 62 Gilbert v. Homar, 520 U.S. 924 (1997) .................................................................................................................. 62 Global Relief Found., Inc. v. O'Neill, 207 F. Supp. 2d 779 (N.D. Ill. 2002) ........................................................................................ 63 Gonzalez v. Freeman, 334 F.2d 570 (D.C. Cir. 1964) .................................................................................................. 62 Gordon v. Holder, 632 F.3d 722 (D.C. Cir. 2011) .................................................................................................. 25 Gordon v. Warren Consol. Bd. of Educ., 706 F.2d 778 (6th Cir. 1983)) ................................................................................................... 53 Goshawk Dedicated Ltd. v. Am. Viatical Servs., LLC, 2007 WL 3492762 (N.D. Ga. Nov. 5, 2007) ........................................................................... 33 Graham v. Connor, 490 U.S. 386 (1989) .................................................................................................................. 61 Guest v. Leis, 255 F.3d 325 (6th Cir. 2001) .................................................................................................... 49 Haig v. Agee, 453 U.S. 280 (1981) ...................................................................................................... 38, 52, 62 Harris v. Holder, 885 F. Supp. 2d 390 (D.D.C. 2012) .......................................................................................... 58 Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010) ........................................................................................................ 63, 64 Horton v. California, 496 U.S. 128 (1990) .................................................................................................................. 49 In re Adelphia Commc'ns Corp., 338 B.R. 546 (Bankr. S.D.N.Y. 2005) ...................................................................................... 33 In re Akers, 487 B.R. 326 (D.D.C. 2012) ..................................................................................................... 16 v In re Application of the U.S. for an Order Pursuant to 18 U.S.C. § 2703(d), 830 F. Supp. 2d 114 (E.D. Va. 2011) ................................................................................. 30, 49 In re Application of the United States, 405 F. Supp. 2d 435 (S.D.N.Y. 2005)....................................................................................... 43 In re Application of the United States, 411 F. Supp. 2d 678 (W.D. La. 2006)....................................................................................... 43 In re Application of the United States, 433 F. Supp. 2d 804 (S.D. Tex. 2006) ...................................................................................... 43 In re Application of the United States, 460 F. Supp. 2d 448 (S.D.N.Y. 2006)....................................................................................... 43 In re Application of the United States, 622 F. Supp. 2d 411 (S.D. Tex. 2007) ...................................................................................... 43 In re Application of the United States, 632 F. Supp. 2d 202 (E.D.N.Y. 2008) ...................................................................................... 42 In re Directives, 551 F.3d 1004 (FISC-R 2008) .................................................................................................. 52 In re Grand Jury Proceedings, 827 F.2d 301 (8th Cir. 1987) .............................................................................................. 33, 49 In re Motion for Release of Court Records, 526 F. Supp. 2d 484 (F.I.S.C. 2007) ........................................................................................... 5 In re Navy Chaplaincy, 697 F.3d 1171 (D.C. Cir. 2012) ................................................................................................ 18 In re Sealed Case, 310 F.3d 717 (F.I.S.C.-R. 2002) ............................................................................. 51, 54, 55, 63 In re Subpoena Duces Tecum, 228 F.3d 341 (4th Cir. 2000) .................................................................................................... 33 Jack's Canoes & Kayaks, LLC v. NPS, 933 F. Supp. 2d 58 (D.D.C. 2013) ...................................................................................... 18, 19 Katz v. United States, 389 U.S. 347 (1967) .................................................................................................................. 45 vi Jewel v. NSA, 2013 WL 3829405 (N.D. Cal. July 23, 2013) ..................................................................... 27, 31 Krieger v. DOJ, 529 F. Supp. 2d 29 (D.D.C. 2008) ............................................................................................ 58 Laird v. Tatum, 408 U.S. 1 (1972) ................................................................................................................ 24, 56 Lorillard v. Pons, 434 U.S. 575 (1978) .................................................................................................................. 38 Lujan v. Defenders of Wildlife, 504 U.S. 555 (1992) ............................................................................................................ 19, 20 Lyles v. Micenko, 469 F. Supp. 2d 68 (D.D.C. 2006) ............................................................................................ 61 Maryland v. King, 133 S. Ct. 1958 (2013) .............................................................................................................. 51 Match-E-Be-Nash-She-Wish Band of Pottawatomi Indians v. Patchak, 132 S. Ct. 2199 (2012). ................................................................................................. 27, 28, 31 Mathews v. Eldridge, 424 U.S. 319 (1976) .................................................................................................................. 62 Mazurek v. Armstrong, 520 U.S. 968 (1997) .................................................................................................................. 18 Medtronic v. Sofamor Danek, Inc. v. Michaelson, 229 F.R.D. 550 (W.D. Tenn. 2003) .......................................................................................... 33 Minnesota v. Carter, 525 U.S. 83 (1998) .................................................................................................................... 49 Miniter v. Moon, 684 F. Supp. 2d 13 (D.D.C. 2010) ............................................................................................ 16 Monsanto Co. v. Geertson Seed Farms, 130 S. Ct. 2743 (2010) .............................................................................................................. 20 Munaf v. Geren, 553 U.S. 674 (2008) .................................................................................................................. 17 NAACP v. Alabama ex rel. Patterson, 357 U.S. 449 (1958) ............................................................................................................ 58, 59 vii Nat'l Treasury Emps. Union v. Von Raab, 489 U.S. 656 (1989) ............................................................................................................ 50, 52 NRDC v. Pena, 147 F.3d 1012 (D.C. Cir. 1998) ................................................................................................ 25 NLRB v Amax Coal Co., 453 U.S. 322 (1981) .................................................................................................................. 34 Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340 (1978) .................................................................................................................. 32 Paleteria La Michoacana, Inc. v. Productos Lacteos Tocumbo S.A. de C.V., 901 F. Supp. 2d 54 (D.D.C. 2012) ............................................................................................ 18 Okla. Press Publ'g Co. v. Walling, 327 U.S. 186 (1946) .................................................................................................................. 34 Rakas v. Illinois, 439 U.S. 128 (1978) .................................................................................................................. 49 Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030 (D.C. Cir. 1978) .......................................................................................... 46, 56 Scott v. United States, 436 U.S. 128 (1978) .................................................................................................................. 54 SEC v. Jerry T. O'Brien, Inc., 467 U.S. 735 (1984) .................................................................................................................. 47 Sherley v. Sebelius, 644 F.3d 388 (D.C. Cir. 2011) .................................................................................................. 18 Sierra Club v. Johnson, 374 F. Supp. 2d 30 (D.D.C. 2005) ............................................................................................ 18 Simms v. Dist. of Columbia, 872 F. Supp. 2d 90 (D.D.C. 2012) ............................................................................................ 61 Smith v. Maryland, 442 U.S. 735 (1979) ........................................................................................................ 4, 46, 47 Stand Up for California! v. U.S. Dep't of Interior, 919 F. Supp. 2d 51 (D.D.C. 2013) ...................................................................................... 24, 25 Steagald v. United States, 451 U.S. 204 (1981) .................................................................................................................. 49 viii Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622 (1994) .................................................................................................................. 60 United Presbyterian Church in the USA v. Reagan, 738 F.2d 1375 (D.C. Cir. 1984) ................................................................................................ 24 United States v. Abu-Jihaad, 630 F.3d 102 (2d Cir. 2010)...................................................................................................... 40 United States v. Baxter, 492 F.2d 150 (9th Cir. 1973) .................................................................................................... 46 United States v. Bin Laden, 126 F. Supp. 2d 264 (S.D.N.Y. 2000)....................................................................................... 54 United States v. Booker, 2013 WL 2903562 (N.D. Ga. June 13, 2013) ........................................................................... 43 United States v. Campa, 529 F.3d 980 (11th Cir. 2008) .................................................................................................. 40 United States v. Covello, 410 F.2d 536 (2d Cir. 1969)...................................................................................................... 46 United States v. Doe, 537 F. Supp. 838 (E.D.N.Y. 1982) ........................................................................................... 46 United States ex rel. Shea v. Verizon Bus. Network Servs., Inc., 904 F. Supp. 2d 28 (D.D.C. 2012) ............................................................................................ 21 United States v. Figueroa, 757 F.2d 466 (2d Cir. 1985)...................................................................................................... 54 United States v. Fithian, 452 F.2d 505 (9th Cir. 1971) .................................................................................................... 46 United States v. Forrester, 512 F.3d 500 (9th Cir. 2008) .................................................................................................... 49 United States v. Gallo, 123 F.2d 229 (2d Cir. 1941)...................................................................................................... 46 United States v. Hill, 459 F.3d 966 (9th Cir. 2006) .................................................................................................... 33 ix United States v. Jones, 132 S. Ct. 945 (2012) .......................................................................................................... 45, 48 United States v. Kahn, 415 U.S. 143 (1974) .................................................................................................................. 54 United States v. Miller, 425 U.S. 435 (1976) .................................................................................................................. 47 United States v. Qing Li, 2008 WL 789899 (S.D. Cal. Mar. 20, 2008) ............................................................................ 49 United States v. R. Enters., Inc., 498 U.S. 292 (1991) ............................................................................................................ 33, 39 United States v. Rigmaiden, 2013 WL 1932800 (D. Ariz. May 8, 2013) .............................................................................. 49 United States v. U.S. Dist. Court (Keith), 407 U.S. 297 (1972) ............................................................................................................ 35, 51 United States v. Upham, 168 F.3d 532 (1st Cir. 1999) ..................................................................................................... 33 United States v. Van Leeuwen, 397 U.S. 249 (1970) .................................................................................................................. 49 United States v. Verdugo-Urquidez, 494 U.S. 259 (1990) .................................................................................................................. 53 U.S. Telecom Ass'n v. FCC, 227 F.3d 450 (D.C. Cir. 2000) .................................................................................................. 48 Valley Forge Christian Coll. v. Americans United for Separation of Church & State, Inc., 454 U.S. 464 (1982) .................................................................................................................. 19 Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646 (1995) ............................................................................................................ 50, 52 Winter v. NRDC, 555 U.S. 7 (2008) ............................................................................................................... passim Zurcher v. Stanford Daily, 436 U.S. 547 (1978) .................................................................................................................. 56 x STATUTES 5 U.S.C. § 701(a)(1) ................................................................................................................ 27, 28 5 U.S.C. § 706 ............................................................................................................................... 26 5 U.S.C. § 702 ........................................................................................................................ passim 18 U.S.C. § 2701 ........................................................................................................................... 27 18 U.S.C. § 2702 ........................................................................................................................... 26 18 U.S.C. § 2703 ........................................................................................................................... 43 18 U.S.C. § 2707 ........................................................................................................................... 26 18 U.S.C. § 2712 ......................................................................................................... 26, 27, 30, 31 18 U.S.C. § 3127 ............................................................................................................................. 8 50 U.S.C. § 1801(h) ...................................................................................................................... 54 50 U.S.C. § 1803 ..................................................................................................................... 5, 6, 7 50 U.S.C. § 1805 ........................................................................................................................... 43 50 U.S.C. § 1806 ........................................................................................................................... 30 50 U.S.C. § 1825 ........................................................................................................................... 30 50 U.S.C. § 1841 ............................................................................................................................. 8 50 U.S.C. § 1842 ................................................................................................................. 8, 44, 45 50 U.S.C. § 1845 ........................................................................................................................... 30 50 U.S.C. § 1861 .................................................................................................................... passim 50 U.S.C. § 1862 ..................................................................................................................... 13, 40 50 U.S.C. § 1871 ........................................................................................................................... 13 50 U.S.C. § 1881a .................................................................................................................. passim RULES Fed. R. Civ. P. 26(b)(1)................................................................................................................. 36 xi Fed. R. Crim. P. 41(e)(2)(B) ......................................................................................................... 33 REGULATIONS 47 C.F.R. § 42.6 ............................................................................................................................ 42 xii INTRODUCTION One of the greatest challenges the United States faces in combating international terrorism and preventing potentially catastrophic terrorist attacks on our country is identifying terrorist operatives and networks, particularly those operating within the United States. The Government’s exploitation of terrorist communications is a critical tool in this effort. Plaintiffs in these cases ask this Court to preliminarily enjoin important means by which the National Security Agency (NSA) has gathered information about communications among known and unknown terrorist actors in order to thwart future terrorist attacks. That request should be denied. In Plaintiffs’ telling, these activities constitute a single “mass surveillance program,” called PRISM, in which the Government collects both “metadata” about and the contents of Americans’ telecommunications, and exploits this information “to build comprehensive profiles of ordinary Americans” revealing intimate details about their lives and personal associations. Plaintiffs challenge these alleged intelligence-gathering activities—as they describe them—as exceeding the Government’s authority under the Foreign Intelligence Surveillance Act (FISA), and as contrary to constitutional rights. But the defining characteristic of Plaintiffs’ challenge is a complete lack of supporting evidence. Relying entirely on unsubstantiated allegations in their complaints, unverified media reports, and speculation, they allege that Government conduct for which they offer no proof has inflicted injury upon them for which they present no evidence. In the wake of unauthorized disclosures about intelligence-gathering activities conducted by the NSA, the Government has acknowledged the existence and certain details of NSA counter-terrorism programs that appear to be implicated by Plaintiffs’ allegations—although they bear no resemblance to the program of “mass surveillance” that Plaintiffs allege. First, under a provision of FISA known as Section 215, the NSA obtains, pursuant to orders of the Foreign Intelligence Surveillance Court (FISC), bulk telephony metadata—business records created by telecommunications service providers that include such information as the telephone numbers placing and receiving calls, and the time and duration of those calls. The Government does not collect, listen to, or record the content of any call under this program, nor does it collect the name, address, or financial information of any subscriber, customer, or party to a call. The program operates under FISC-imposed restrictions, together with stringent supervision and oversight by all three branches of Government, to prevent access to, use, or dissemination of the data for any purpose other than foreign intelligence. Specifically, the NSA may only query the collected metadata for counter-terrorism purposes, and even then, only if there is a reasonable, articulable suspicion that the selection term (e.g., the telephone number) to be queried is associated with a specified foreign terrorist organization approved for targeting by the FISC. This requirement bars the type of indiscriminate querying of the metadata, using identifiers not connected with terrorist activity, to create “comprehensive profiles” of ordinary Americans’ lives as Plaintiffs speculate. As a result, only a tiny fraction of the collected metadata is ever reviewed, much less disseminated, by NSA analysts. The NSA uses targeted electronic searches of these data, based on telephone numbers or other identifiers associated with foreign terrorist organizations, to reveal communications between known or suspected terrorists and previously unknown terrorist operatives, located in this country, who may be planning attacks on U.S. soil. Information gleaned from analysis of bulk telephony metadata obtained under this program has made important contributions to the FBI’s counter-terrorism mission. The bulk collection of telephony metadata for these purposes has been authorized and periodically reauthorized over the past seven years under thirty-five separate orders issued by fifteen separate judges of the FISC. In two recent opinions (Exhibits A 2 and B, hereto),1 the FISC concluded that the telephony metadata program is authorized by statute, and lawful under the Constitution. Second, the Government has also publicly revealed certain information about its use of authority conferred by section 702 of the FISA, to collect, for foreign intelligence purposes, certain communications of non-U.S. persons located outside the United States, pursuant to approval of the FISC. This includes the collection now publicly referred to as “PRISM.” Before authorizing collection under Section 702, the FISC must find that the Government has procedures in place (i) to ensure that only non-U.S persons abroad will be targeted, and (ii) to prevent the unwarranted retention or dissemination of information about U.S. persons (or their communications) that may be incidentally collected. NSA’s retention and dissemination of communications thus acquired is governed by minimization procedures that the FISC has approved as consistent with FISA’s requirements and the Fourth Amendment. Finally, the Government has also declassified and officially acknowledged the existence of a FISC-authorized program involving collection and analysis, for foreign intelligence purposes, of non-content bulk Internet metadata (such as the “to” and “from” lines of an e-mail, and the date and time an e-mail was sent) carried out under the “pen register, trap and trace” provision of FISA. This program—which was discontinued in 2011—was conducted under FISC orders requiring the Government to comply with minimization procedures that prohibited access to the data except for purposes of queries using selection terms reasonably suspected of being associated with foreign terrorist organizations (as in the case of bulk telephony metadata). 1 In re Application of the FBI for an Order Requiring the Production of Tangible Things from [Redacted], BR 13-109, Amended Memorandum Opinion August 29, 2013 (Aug. 29 FISC Op.) (Exh. A, hereto); In re Application of the FBI for an Order Requiring the Production of Tangible Things from [Redacted], BR 13-158, Memorandum, October 11, 2013 (Oct. 11 FISC Op.) (Exh. B, hereto). 3 Plaintiffs’ motions for preliminary relief are based entirely on misconceptions and conjecture about the scope of these activities, and potential misuse of the information acquired. As a threshold matter, Plaintiffs offer no proof that any metadata about their communications, or the contents of their communications, have ever been collected by the NSA, much less exploited to expose intimate details about their personal lives and associations. That being the case, they can neither establish their standing to maintain these actions in the first place, nor make the showing of irreparable harm required to obtain preliminary injunctive relief. Plaintiffs also fail to show any likelihood of success on the merits of their claims. Their contention that the Government’s alleged conduct exceeds its statutory authority under FISA is precluded, inter alia, by FISA’s detailed scheme for judicial review of specified intelligence activities. In any event, as the FISC has repeatedly (and twice recently) found, the Government’s bulk collection of telephony metadata is lawful under FISA because there are reasonable grounds for believing that such data as a whole are relevant to authorized FBI counter-terrorism investigations. The FISC has similarly authorized the NSA’s PRISM collection of non-U.S. person communications, and prior collection of bulk Internet metadata, as consistent with FISA. Plaintiffs’ Fourth Amendment challenge to the NSA’s collection of communications metadata is foreclosed by the Supreme Court’s decision in Smith v. Maryland, 442 U.S. 735 (1979), which held that there is no reasonable expectation of privacy in such non-content information. And as the FISC has held, the Government’s procedures for collecting communications of non-U.S. persons located abroad under Section 702 also comport with Fourth Amendment requirements. Plaintiffs’ First Amendment claim rests entirely on their hypothetical premise—inconsistent with FISC-imposed safeguards—that the Government uses the communications information it acquires to track their activities and interpersonal relationships. But no parallel can be drawn between the alleged intelligence-gathering activities Plaintiffs seek 4 to put at issue here and cases in which individuals or organizations were compelled to disclose personally identifying information, or membership lists, based on their protected associational activities. Plaintiffs cite no authority for their meritless due-process claim. In sum, the NSA’s collection of communications metadata, and of communications acquired by targeting foreign persons located abroad, are important tools in the Government’s counter-terrorism arsenal, and are lawful. Unsubstantiated conjecture about how these programs might be abused, without regard to the safeguards against such abuse, and without evidence that Plaintiffs have suffered irreparable injury, does not justify the extraordinary remedy of preliminary injunctive relief. Plaintiffs’ motions for preliminary injunctions should be denied. STATEMENT OF FACTS I. STATUTORY BACKGROUND Congress enacted FISA to authorize and regulate certain governmental surveillance of communications and other activities for purposes of gathering foreign intelligence. In enacting FISA, Congress also created the FISC, an Article III court of 11 appointed U.S. district judges with authority to consider applications for and grant orders authorizing electronic surveillance and other forms of intelligence-gathering by the Government. 50 U.S.C. § 1803(a); see In re Motion for Release of Court Records, 526 F. Supp. 2d 484, 486 (F.I.S.C. 2007). Plaintiffs’ various allegations implicate different provisions of FISA. First, FISA’s “business records” provision, 50 U.S.C. § 1861, enacted by section 215 of the USA PATRIOT Act, Pub. L. No. 107-56, 115 Stat. 272 (2001) (Section 215), authorizes the FISC to issue an order for the “production of any tangible things (including books, records, papers, documents, and other items) for an investigation [1] to obtain foreign intelligence information not concerning a United States person or [2] to protect against international terrorism” (provided, in the case of a counter-terrorism investigation of a “United States person,” that “such investigation . . . is not 5 conducted solely upon the basis of activities protected by the first amendment to the Constitution”). 50 U.S.C. § 1861(a)(1). The records must be of a type obtainable by either a grand jury subpoena, or an order issued by a U.S. court directing the production of records or tangible things. Id. § 1861(c)(2)(D). The Government’s application for an order under Section 215 must include, among other things, a statement of facts showing that there are “reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation . . . to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism.” Id. § 1861(b)(2)(A). The investigation must be authorized and conducted under guidelines approved by the Attorney General under Executive Order 12333 (or a successor thereto). Id. § 1861(a)(2)(A), (b)(2)(A). Information acquired from the records or other tangible items received in response to a Section 215 order “concerning any United States person may be used and disclosed by [the Government] without the consent of [that] person only in accordance with . . . minimization procedures,” adopted by the Attorney General and enumerated in the Government’s application, that “minimize the retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the [Government’s] need . . . to obtain, produce, and disseminate foreign intelligence information.” Id. § 1861(b)(2)(B), (g)(2), (h). The FISC must find that these requirements have been met before it issues the requested order, which in turn must direct that the minimization procedures described in the application be followed. Id. § 1861(c)(1). Section 215 includes a scheme providing for judicial review of a business records order once it is granted, but only in limited circumstances. Specifically, it allows “[a] person receiving a production order [to] challenge the legality of that order” by filing a petition with the “review pool” of FISC judges designated under 50 U.S.C. § 1803(e)(1) to review production orders under 6 Section 215. Id. § 1861(f)(1), (2)(A)(i). A “pool” judge considering a petition to modify or set aside a production order may grant the petition if the judge finds that the order does not meet the requirements of Section 215 or “is otherwise unlawful.” Id. § 1861(f)(2)(B). Thus, a production order can be set aside if it exceeds the authority conferred by Section 215 or is unconstitutional. 1 D. Kris & J. Wilson, National Security Investigations & Prosecutions § 19:10 at 714 (2d ed. 2012) (Kris & Wilson). Either the Government or a recipient of a production order may appeal the decision of the pool judge to the FISC Court of Review, with review available thereafter on writ of certiorari in the Supreme Court. 50 U.S.C. § 1861(f)(3); see id. § 1803(b). Section 215’s carefully circumscribed provisions for judicial review were added when Congress reauthorized the USA PATRIOT Act in 2006, and these provisions authorized contested litigation before the FISC for the first time. 1 Kris & Wilson § 5:5, 19:7 (2d ed. 2012). The FISA does not provide for review of Section 215 orders at the behest of third parties. Plaintiffs’ claims also appear to put at issue section 702 of the FISA, enacted by the FISA Amendments Act of 2008, Pub. L. 110-261, § 101(a)(2), 122 Stat. 2436, codified at 50 U.S.C. § 1881a (Section 702). Section 702 provides that the Attorney General and the Director of National Intelligence (DNI) may authorize jointly, for up to one year, the “targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information.” Id. § 1881a(a). The statute expressly stipulates that the Government “may not intentionally target any person known at the time of acquisition to be located in the United States,” “may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States,” and “may not intentionally target a United States person reasonably believed to be located outside the United States.” Id. § 1881a(b). Like Section 215, 7 Section 702 provides a right of judicial review of a Section 702 directive to a recipient of a directive. Id. § 1881a(h)(4), (6). Before the Attorney General and the DNI may authorize the targeting of foreign persons abroad under the statute, they must first obtain (absent exigent circumstances) a FISC order approving the authorization. See id. § 1881a(a) & (i)(3). Section 702 requires the FISC to find that the Government’s targeting procedures are reasonably designed to ensure that only non-U.S. persons who are outside the United States will be targeted in any Section 702 acquisition. See id. § 1881a(e). To the extent that a Section 702 acquisition results in the incidental collection of information concerning U.S. persons (such as those, e.g., communicating with the target of the surveillance), Section 702 addresses that circumstance in the same fashion as the original FISA: it requires the application of FISC-approved minimization procedures designed to prevent the unwarranted retention or dissemination of such information. See id. Finally, FISA’s so-called “pen/trap” provision may also be implicated by Plaintiffs’ claims regarding bulk collection of Internet metadata. Similar in structure to Section 215, the pen/trap statute authorizes the FISC, upon application by the Government, to issue an order “approving the installation and use of a pen register or trap and trace device,” see 50 U.S.C. § 1841(2); 18 U.S.C. § 3127(3), (4), to obtain information relevant to authorized FBI counterterrorism investigations. 50 U.S.C. § 1842(a)(1), (c)(2). I. THE COLLECTION OF INFORMATION AUTHORIZED BY FISA A. Collection of Bulk Telephony Metadata Under Section 215 Plaintiffs first challenge the NSA’s collection and analysis of bulk telephony metadata to discover communications with and among unknown terrorist operatives. Under this program, the FBI obtains orders from the FISC pursuant to Section 215 directing certain telecommunications service providers to produce to the NSA on a daily basis electronic copies of “call detail records, 8 or ‘telephony metadata,’” Oct. 11, FISC Mem., Primary Order at 3-4, created by the recipient providers for calls to, from, or wholly within the United States. The NSA then stores, (and in limited circumstances) queries, and analyzes the metadata for counter-terrorism purposes. Under the terms of the FISC’s orders, the NSA’s authority to continue the program expires after 90 days and must be renewed. The FISC first authorized the program in May 2006, and since then has renewed the program thirty-five times under orders issued by fifteen different FISC judges. Declaration of Teresa H. Shea (Shea Decl.) ¶¶ 13-14, 16-17, 20 (Exh. C, hereto); Declaration of Robert J. Holley (Holley Decl.) ¶¶ 3, 6 (Exh. D, hereto); Aug. 29 FISC Op. at 29; Oct. 11 FISC Mem. at 2-6; see also In re Application of the FBI for an Order Requiring the Production of Tangible Things [etc.], Dkt. No. BR 13-80, Primary Order (F.I.S.C. Apr. 25, 2013) (Exhibit E, hereto) at 3-4, 17; id., Secondary Order (Exhibit F, hereto) at 1-2, 4. Under the FISC’s orders, telephony metadata is defined as “comprehensive communications routing information” including but not limited to “originating and terminating telephone number[s], International Mobile Subscriber Identity (IMSI) number[s], International Mobile Station Equipment Identity (IMEI) number[s], trunk identifier[s], telephone calling card numbers, and time and duration of call.” Primary Order at 3 n.1. By the express terms of the FISC’s orders, “[t]elephony metadata does not include the name, address, or financial information of a subscriber or customer.” Id.; Secondary Order at 2. The data are numerical only. The FISC’s orders do not allow the NSA to obtain the name, address, or financial information of a subscriber, customer, or any party to a call. Nor do they permit the Government, under this program, to listen to or record the contents of any telephone conversations. Shea Decl. ¶¶ 13, 15, 18; Holley Decl. ¶¶ 7, 11. The Government obtains these FISC orders by submitting detailed applications from the FBI explaining that the records are sought for investigations to protect against international 9 terrorism that concern specified foreign terrorist organizations identified in the application. Holley Decl. ¶ 10; see 50 U.S.C. § 1861(a)(1), (b)(2)(A). As required by Section 215, the application contains a statement of facts showing that there are reasonable grounds to believe that the metadata as a whole are relevant to the investigations of these organizations. The application is supported by a declaration from a senior official of NSA’s Signals Intelligence Directorate. Holley Decl. ¶ 10. FISC orders authorizing the NSA’s collection of the metadata are in turn predicated on findings by the Court that there are “reasonable grounds to believe that the [records] sought are relevant to authorized investigations . . . being conducted by the FBI . . . to protect against terrorism.” See Primary Order at 1-2; Aug. 29 FISC Op. at 28. As also required by Section 215, the FISC’s orders direct the Government to comply with “minimization procedures” that strictly limit access to and review of the metadata, and limit dissemination of information derived from the data, to valid counter-terrorism purposes. See 50 U.S.C. § 1861(b)(2)(B), (g), (h); Primary Order at 4-17; Holley Decl. ¶ 8; Shea Decl. ¶¶ 29-35. Under these restrictions, NSA analysts may access the metadata only for purposes of obtaining foreign intelligence information, and may do so only through “contact-chaining” queries (electronic term searches) of the metadata using identifiers (typically telephone numbers) approved as “seeds” by one of twenty-two designated officials in NSA’s Signals Intelligence Directorate. Such approval may only be given upon a determination that, based on the factual and practical considerations of everyday life on which reasonable and prudent persons act, there are facts giving rise to a reasonable, articulable suspicion that a selection term used to query the database is associated with one or more foreign terrorist organizations previously identified to and approved for targeting by the FISC. Where the selection term is reasonably believed to be used by a U.S. person, NSA’s Office of General Counsel must also determine that the term is not regarded as associated with a foreign terrorist group solely on the basis of activities protected by 10 the First Amendment. These determinations are effective for finite periods of time. Shea Decl. ¶¶ 19-23, 31; Primary Order at 6-9. This “reasonable, articulable suspicion” requirement bars the indiscriminate querying of the telephony metadata based on identifiers not connected with terrorist activity. Indeed, because of this requirement, the vast majority of the data obtained under this program are never seen by any person; only the tiny fraction of the records responsive to queries authorized under the “reasonable, articulable suspicion” standard are reviewed or disseminated by NSA analysts. Shea Decl. ¶¶ 20, 23. Also under the FISC’s orders, the accessible results of an approved query are limited to records of communications within three “hops” from the seed. That is, the query results may only include identifiers and associated metadata having a direct contact with the seed (the first “hop”), identifiers and associated metadata having a direct contact with first “hop” identifiers (the second “hop”), and identifiers and associated metadata having a direct contact with second “hop” identifiers (the third “hop”). Id. ¶¶ 22, 31. Query results do not include the names or addresses of individuals associated with the responsive telephone numbers, because that information is not included in the database in the first place. Id. ¶ 21. The NSA’s ability under this program to accumulate metadata in bulk, and to quickly conduct contact-chaining analyses beyond the first hop, is crucial to the utility of the database. These capabilities allow the NSA to use the database to conduct a level of historical analysis, and to discover contact links, that cannot practically be accomplished through targeted intelligencegathering authorities. For example, the metadata may reveal that a seed telephone number has been in contact with a previously unknown U.S. telephone number. Examining the chain of communications out to the second and in some cases a third hop may reveal a contact with other telephone numbers already known to be associated with a foreign terrorist organization, thus establishing that the previously unknown telephone number is itself likely associated with 11 terrorism. This type of contact-chaining is possible because the bulk collection of telephony metadata under the program creates an historical repository that permits retrospective analysis of terrorist-related communications across multiple telecommunications networks, and that can be immediately accessed as new terrorist-associated telephone identifiers come to light. Id. ¶¶ 4649, 57-63; Holley Decl. ¶¶ 27-29. Plaintiffs speculate that metadata collected under the program is being used to compile “rich comprehensive profile[s]” of every citizen, including “intimate details” about their lives and personal associations, see Pls.’ Mem. in Supp. of their Mot. for Prelim. Inj., No. 13-cv-0851, ECF No. 13-1 (Klayman I Br.), at 11, but these anxieties are unfounded. Under the FISC’s orders, the data may be queried, and the results may be shared, only to allow Government investigators to discover persons, including persons (and their associates) located in the United States, who have been in contact with known or suspected terrorist organizations, see Primary Order at 4, and may themselves be engaged in terrorist activity. The NSA does not use the data to provide the FBI with profiles on suspected terrorists (or anyone else), or comprehensive records of their associations. Nor does it provide the FBI with a list of all identifiers directly or indirectly connected (at one, two, and three hops) with a suspected terrorist identifier. Rather, it applies the tools of signals intelligence tradecraft to focus only on those identifiers which, based on the NSA’s analytic judgment and experience, and other intelligence available to it, may be of use to the FBI in detecting persons in the United States who may be associated with the specified foreign terrorist organizations, and acting in furtherance of their goals. Shea Decl. ¶¶ 26, 28. In addition to these, the NSA’s activities under the FISC’s orders are subject to an extensive regime of internal reporting, audits, and oversight; regular consultation with the NSA Office of the Inspector General, and the Department of Justice, to assess compliance with FISC orders; and monthly reports to the FISC including, inter alia, a discussion of NSA’s application 12 of the “reasonable, articulable suspicion” standard and the number of times that query results containing U.S. person information have been shared with anyone outside NSA. Id. at 4-16.2 The Government has recently made public (and Plaintiffs have pointed to) FISC orders and opinions concerning various failures to fully implement and comply with these minimization procedures, owing to human error and technological issues, that were discovered in 2009. The Government reported these problems to the FISC (and Congress) and remedied them, and the FISC (after temporarily suspending the Government’s authority to query the database without the court’s approval) reauthorized the program in its current form.3 Shea Decl. ¶¶ 36-43. B. Targeted Collection of Communications Content Pursuant to Section 702 Plaintiffs’ allegations also appear to put at issue the targeted collection of electronic communications under Section 702 of the FISAunder the PRISM collection. Although Plaintiffs offer no evidence to support their allegations about this program, the Government has acknowledged the following facts concerning this activity: Section 702 facilitates the targeted acquisition of foreign intelligence information concerning foreign targets located outside the United States under court oversight. Electronic communication service providers supply information to the Government pursuant to authorized directives issued by the Attorney General and the DNI. ODNI Fact Sheet at 1 (June 8, 2013) (Exh. G, hereto); see 50 U.S.C. § 2 FISA also requires the Government to report to Congress regarding the use of its Section 215 authority, including copies of significant FISC orders and the Government’s supporting pleadings. 50 U.S.C. §§ 1862, 1871. 3 Among the most serious compliance problems was an “alert list” process by which telephone identifiers that had been associated with foreign terrorist organizations, but which in many cases had not been approved under the “reasonable, articulable suspicion” standard, were used, not as terms to query the metadata archive, but to alert analysts if identifiers associated with foreign terrorist groups were in contact with someone in the United States. Analysts could not query the database using these “alert list” identifiers to learn what numbers they had been in contact with unless and until they were approved under the “reasonable, articulable suspicion” standard. Shea Decl. ¶ 37. (Other compliance incidents have occurred since 2009, due to human error and technology issues, although not on the same scale as the incidents discovered in 2009. All have likewise been reported to the FISC and appropriately remedied). 13 1881a(h)(1). Once targeted surveillance under Section 702 has been authorized, the NSA takes the lead in tasking relevant telephone and electronic communications selectors to target specific non-US persons reasonably believed to be located outside the United States. IC’s Collection Programs Under Title VII of the FISA, at 3 (Exh. H, hereto). Consistent with the statute, the NSA’s targeting procedures require that there be an appropriate, documented foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and that the selector be used by a non-U.S. person reasonably believed to be located outside the United States. Id.; ODNI Fact Sheet at 1. Once a target has been approved, the NSA uses two means to acquire the target’s electronic communications. First, it acquires such communications directly from U.S.-based providers. This has been publicly referred to as the NSA’s PRISM collection. Second, in addition to collection directly from providers, the NSA collects electronic communications as they transit internet “backbone” facilities within the United States. This is known as “upstream” collection. See IC’s Collection Programs Under Title VII of the FISA, at 3-4; Oct. 3, 2011 FISC Op., 2011 WL 10945618, at *9 & n.24. Acquired communications are routed to the NSA, and the NSA can designate communications from specified selectors acquired through PRISM collection to be dual-routed to other intelligence agencies. Each agency that receives the collection has its own FISCapproved minimization procedures and may retain and disseminate communications acquired under Section 702 only in accordance with those procedures. In general, before an agency may disseminate information identifying a U.S. person, the information must reasonably appear to be foreign intelligence or evidence of a crime, or necessary to understand or assess foreign intelligence information. IC’s Collection Programs Under Title VII of the FISA at 4. The FISC has approved the NSA’s minimization procedures for collections under Section 702. See Aug. 14 24, 2012 FISC Op., 2012 WL 9189263, at *2-3; Nov. 30, 2011 FISC Op., 2011 WL 10947772; Oct. 3, 2011 FISC Op., 2011 WL 10945618.4 Finally, the NSA’s Section 702 collection activities are subject to extensive oversight by all three branches of the Government. ODNI Fact Sheet at 1-3; IC’s Collection Programs Under Title VII of the FISA at 4-5. C. Bulk Collection of Internet Metadata Plaintiffs have also alleged unlawful collection by the Government of bulk Internet metadata. In addition to recent official declassification of the existence of the FISC-authorized collection of bulk telephony metadata under Section 215, the Government has also recently declassified the existence of FISC-authorized bulk collection of Internet metadata—that is, certain routing, addressing, and signaling information about Internet-based electronic communications such as e-mail. As explained in a recently released report to Congress, the Government at one time acquired bulk Internet metadata under orders issued by the FISC pursuant to FISA’s pen/trap provision. See Report on the [NSA’s] Bulk Collection Programs for USA PATRIOT Act Reauthorization (Exh. I, hereto) at 3.5 The data collected included certain routing, addressing, and signaling information such as “‘to’ and ‘from’ lines in an e-mail . . . and the date and time an e-mail [was] sent,” but not “the content of [an] e-mail [or] the ‘subject’ line.” Id. at 3. NSA collected large amounts of this transactional information from certain telecommunications service providers and analyzed it to obtain foreign intelligence information. 4 In an opinion issued on October 3, 2011, the FISC found the NSA’s minimization procedures as applied to one aspect of the proposed collection—NSA’s upstream collection of internet transactions containing multiple communications, or “MCTs”—deficient. Oct. 3, 2011 FISC Op., 2011 WL 10945618. The FISC subsequently determined that the NSA adequately remedied the deficiencies such that the procedures met the applicable statutory and constitutional requirements, and allowed the collection to continue. Aug. 24, 2012 FISC Op., 2012 WL 9189263, at *2-3; Nov. 30, 2011 FISC Op., 2011 WL 10947772. See also IC’s Collection Programs Under Title VII of the FISA at 5. 5 This 2011 report, and a similar briefing paper in 2009, were provided by the Department of Justice to the Senate and House Intelligence Committees. See infra at 38 & n.23. 15 Id. at 2. The FISC’s orders authorizing this collection required the Government to comply with “minimization procedures” limiting the retention and dissemination of the metadata, including a requirement of “reasonable articulable suspicion” that selection terms used to query the bulk data were associated with foreign terrorist organizations. Id. at 3. This program of bulk Internet metadata collection was terminated in 2011, for operational and resource reasons. Letter from James R. Clapper to the Hon. Ron Wyden (July 25, 2013) (Exh. J, hereto), at 3. III. PLAINTIFFS’ ASSERTIONS IN THEIR PRELIMINARY INJUNCTION MOTIONS According to Plaintiffs’ submissions, Plaintiff Larry Klayman is an attorney and the founder, chairman, and general counsel of Freedom Watch, a public interest organization engaged in political activism. See Klayman I Br. at 12. He and his co-Plaintiffs, Charles and Mary Ann Strange, who are the parents of a U.S. Navy Seal Team Six member killed in Afghanistan in 2011, id. at 14, allege that a “secret and illicit government scheme” of “mass surveillance” “systematically gather[s], intercept[s] and analyze[s] vast quantities of telephonic and online ‘metadata’ of U.S. citizens,” Pls.’ Mem. in Supp. of their Mot. for Prelim. Inj., No. 13-cv-0881, ECF No. 10-1 (Klayman II Br.), at 1, and that electronic communications service providers have given the NSA “blanket access to [their] vast databases,” id. at 3, so “the government collects and stores every internet communication made through the major online services . . . .” Id. at 27.6 Plaintiffs alleged that the NSA is using this information “to build 6 Almost all of Plaintiffs’ assertions about the nature and extent of the challenged programs are based on unsubstantiated allegations in their complaints or unverified online media reports. Such evidence is insufficient to support the issuance of a preliminary injunction. See In re Akers, 487 B.R. 326, 331 (D.D.C. 2012) (denying preliminary injunction motion that “only set[ ] forth insufficient conclusory assertions of wrong”); Miniter v. Moon, 684 F. Supp. 2d 13, 16 (D.D.C. 2010) (“As the plaintiff has offered no evidence from which the court could assess the merits of his arguments, he has failed to demonstrate a likelihood of success on the merits of his claim.”). This is especially true to the extent that Plaintiffs seek to rely on these sources to support allegations about the scope and conduct of classified intelligence-gathering activities. 16 comprehensive profiles of ordinary Americans,” including their “personal associations” and “extremely sensitive details” about them. Id. at 2. Plaintiffs also claim that “it is logical to conclude that Plaintiff Klayman is subjected to excessive and intrusive surveillance and monitoring by the NSA,” in order to “coerce” and “intimidate” him “into silence,” because “it is indisputable that [he] has become the prime target of the NSA.” Klayman I Br. at 13. Plaintiffs contend that the NSA’s alleged’ “illegal surveillance directly impacts [their] ability to communicate via telephone, email, and otherwise, out of fear” that their confidential and private “communications will be overheard or obtained by the NSA’s surveillance program.” Id. at 14, 15. They argue that bulk collection of telephony metadata—which has been found to be lawful thirty-five times by fifteen different Article III judges on the FISC—exceeds the authority conferred by Section 215, see id. at 17-19, and violates the First, Fourth, and Fifth Amendments. See id. at 19-27. Plaintiffs also argue that the “PRISM program,” and bulk collection of Internet metadata, violates the same provisions of the Constitution, Klayman II Br. at 30, and exceeds statutory authority under Section 215, see id. at 5, 19-20, even though the authority for those programs lies under Section 702 and the pen/trap provision, respectively. Plaintiffs seek preliminary injunctions (1) enjoining these FISC-authorized activities (2) requiring the NSA to “purge” all of Plaintiffs’ collected metadata, if any, and (3) prohibiting the NSA from querying the metadata using identifiers associated with Plaintiffs. See Klayman I Br. at 4, 30-31; Klayman II Br. at 4-5, 32-33. ARGUMENT “A preliminary injunction is an extraordinary and drastic remedy; it is never awarded as of right.” Munaf v. Geren, 553 U.S. 674, 689-90 (2008) (quotation marks and citations omitted). Media speculation about the Government’s sources and methods of acquiring intelligence cannot be equated with official release or acknowledgment of such information. See Afshar v. Department of State, 702 F.2d 1125, 1130-31 (D.C. Cir. 1983) 17 The movant bears the burden of demonstrating “by a clear showing” that the remedy is necessary and that the prerequisites for issuance of the relief are satisfied. Mazurek v. Armstrong, 520 U.S. 968, 972 (1997). “[P]laintiff[s] seeking a preliminary injunction must establish that [they are] likely to succeed on the merits, that [they are] likely to suffer irreparable harm in the absence of preliminary relief, that the balance of equities tips in [their] favor, and that an injunction is in the public interest.” Winter v. NRDC, 555 U.S. 7, 20 (2008); In re Navy Chaplaincy, 697 F.3d 1171, 1178 (D.C. Cir. 2012). “A positive showing on all four factors is required.” Bayer HealthCare, LLC v. FDA, __ F. Supp. 2d __, 2013 WL 1777481, *5 (D.D.C. Apr. 17, 2013).7 Where, as here, the moving parties seek a mandatory injunction that alters the status quo, and that will affect government action taken in the public interest pursuant to a statutory scheme, the movants must make a “somewhat higher” demonstration of entitlement to preliminary relief than is normally required. See Paleteria La Michoacana, Inc. v. Prods.Lacteos Tocumbo S.A. de C.V., 901 F. Supp. 2d 54, 56 (D.D.C. 2012); Sierra Club v. Johnson, 374 F. Supp. 2d 30, 33 (D.D.C. 2005). Further, a preliminary injunction cannot issue on the mere basis of speculation. Winter, 555 U.S. at 21-22. Rather than allowing relief based on a “‘possibility’ of irreparable harm,” id. at 21, the Supreme Court has emphasized that a preliminary injunction should issue only upon a showing that irreparable harm is “likely in the absence of an injunction.” Id. at 22; see also Sherley v. Sebelius, 644 F.3d 388, 392-93 (D.C. Cir. 2011). Finally, a court deciding a preliminary injunction motion “must balance the competing claims of injury and must consider the effect on each party of the granting or withholding of the requested relief,” Winter, 555 U.S. 7 While Plaintiffs assume that a “continuum” or “sliding scale” approach applies here with respect to these four factors, Klayman I Br. at 17; Klayman II Br. at 19 (citing CityFed Fin. Corp. v. OTS, 58 F.3d 738, 747 (D.C. Cir. 1995)), they overlook that the decision they cite in support of this proposition preceded the Supreme Court’s decision in Winter, and that the “continued viability” of the sliding scale approach in all cases post-Winter has been called into question by the D.C. Circuit and this court. Sherley v. Sebelius, 644 F.3d 388, 392-93 (D.C. Cir. 2011); Jack’s Canoes & Kayaks, LLC v. Nat’l Park Serv., 933 F. Supp. 2d 58, 76 (D.D.C. 2013). 18 at 24 (internal quotations omitted), and “should pay particular regard for the public consequences in employing the extraordinary remedy of injunction.” Id. (internal quotations omitted). I. PLAINTIFFS HAVE NOT DEMONSTRATED INJURY SUFFICIENT TO ESTABLISH THEIR STANDING, NOR SHOWN ANY IRREPARABLE HARM Plaintiffs’ request for preliminary injunctive relief must be denied because they have not alleged injuries sufficient to sustain Article III standing, a jurisdictional defect in their case that precludes any likelihood of success on their claims. Likewise, Plaintiffs have not shown that they will suffer any irreparable harm absent an injunction, an equally insuperable bar to relief. A. Plaintiffs Lack Standing and Therefore Cannot Show a Substantial Likelihood of Success on the Merits. “The judicial power of the United States” is limited by Article III of the Constitution “to the resolution of ‘cases’ and ‘controversies’,” Valley Forge Christian Coll. v. Americans United for Separation of Church & State, Inc., 454 U.S. 464, 471 (1982), and a demonstration of a plaintiff’s standing to sue “is an essential and unchanging part of the case-or-controversy requirement,” Lujan v. Defenders of Wildlife, 504 U.S. 555, 560 (1992). Standing is also usually the “first component of the likelihood of success on the merits prong,” Jack’s Canoes & Kayaks, 933 F. Supp. 2d at 76 (quotations omitted), because Plaintiffs “must have standing” for “this Court to have subject matter jurisdiction over” their “motion[s] for a preliminary injunction.” Dominquez v. Dist. of Columbia, 536 F. Supp. 2d 18, 23-24 (D.D.C. 2008) (Leon, J.). The standing inquiry “has been especially rigorous when reaching the merits of the dispute would force [a court] to decide whether an action taken by one of the other two branches of the Federal Government was unconstitutional.” Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1147 (2013) (internal quotations omitted). The Supreme Court has also “often found a lack of standing in cases in which the Judiciary has been requested to review actions of the political branches in the fields of intelligence gathering and foreign affairs.” Id. 19 To establish Article III standing, Plaintiffs must show that they have suffered injury in fact, “an invasion of a legally protected interest,” Lujan, 504 U.S. at 560, that is “concrete, particularized, and actual or imminent.” Amnesty Int’l USA, 133 S. Ct. at 1147. A “threatened injury must be certainly impending to constitute injury in fact,” whereas “allegations of possible future injury are not sufficient.” Id. The alleged injury must also be “fairly traceable to the challenged action” and be “redressable by a favorable ruling.” Monsanto Co. v. Geertson Seed Farms, 130 S. Ct. 2743, 2752 (2010). Because Plaintiffs must show that they have standing “with the manner and degree of evidence required at the successive stages of the litigation,” Lujan, 504 U.S. at 561, Plaintiffs cannot now rely on mere allegations but must come forth with evidence to support their standing in order to obtain preliminary injunctive relief. See Doe v. Rumsfeld, 297 F. Supp. 2d 119, 130 (D.D.C. 2003). Plaintiffs have failed to adduce specific facts demonstrating that they have standing to challenge any of the intelligence-gathering activities they allege. Plaintiffs Larry Klayman and Charles Strange attest that they have for many years been subscribers of cellular telephone service provided by Verizon Wireless, and users of Internet services offered by a variety of electronic communications service providers “at all material times.” Affidavit of Larry Klayman (Klayman Aff.) ¶ 3, ECF No. 13-2; Affidavit of Charles Strange (Strange Aff.) ¶¶ 2-3, ECF No. 13-3. They state that the alleged collection of information about (and contained in) their telephonic and electronic communications “impact[s]” their ability to communicate by telephone, e-mail, and other means due to their “concern” that these communications will be “overheard” or “obtained” by the NSA and “used against” them in some manner. Klayman Aff. ¶ 10; Strange Aff. ¶ 11. On the strength of these assertions, Plaintiffs claim to have standing to challenge the legality of the Government’s (1) bulk collection of telephony metadata, (2) alleged “mass” collection of the contents of U.S.-person communications, and (3) alleged bulk collection 20 of Internet metadata. See Klayman I Br. at 9-12; Klayman II Br. at 13, 15. In fact, Plaintiffs have not demonstrated that they have suffered injury traceable to any of these activities. Plaintiffs have not asserted sufficient facts to show that any information about or contained in their telephonic or Internet-based communications has been or imminently will be collected under any of these alleged programs. With regard to bulk telephony metadata, although Plaintiffs Klayman and Strange assert that they are or have been subscribers and users of cellular telephone service provided by “Verizon Wireless,” Klayman Aff. ¶ 3; Strange Aff. ¶ 2, they offer no proof that the Government has ever collected bulk telephony metadata from that company. And although the Government has acknowledged that the telephony metadata program remains ongoing, and that multiple telecommunications service providers have been participants in the program since its inception in 2006, see supra at 9, 11-12, the Government has not officially disclosed the identities of the group of providers from which bulk telephony metadata are collected. Plaintiffs’ assertion that they are Verizon Wireless customers does not establish that the NSA has collected telephony metadata regarding their communications.9 With respect to NSA’s alleged “PRISM” collection of communications under Section 702, the Government has acknowledged that, for foreign intelligence purposes, the NSA targets non-U.S. persons, located outside the United States, by acquiring communications directly from 9 The Government has acknowledged the authenticity of an unlawfully disclosed Secondary Order of the FISC dated April 25, 2013, which listed Verizon Business Network Services, Inc. (VBNS) as a recipient of that order at that time. VBNS, however, is a separate business entity from Verizon Wireless. See United States ex rel Shea v. Verizon Bus. Network Servs., Inc., 904 F. Supp. 2d 28, 30 (D.D.C. 2012). Except for this single order of April 2013, the Government has not declassified any further information regarding VBNS’s participation in this program or that of any other provider. In any event, at this stage of proceedings, Plaintiffs’ allegations do not indicate that they were subscribers of VBNS or that Verizon Wireless is subject to Section 215 collection. Plaintiffs protest that “the facts, information, documents, and evidence” pertinent to their claims “are uniquely in the hands of Defendants,” Klayman I Br. at 31, but as the Supreme Court pointedly observed in Amnesty International, it is Plaintiffs’ “burden to prove their standing by pointing to specific facts, not the Government’s burden to disprove standing by revealing details of its surveillance” programs. 133 S. Ct. at 1149 n.4 21 certain U.S.-based electronic communications service providers. This activity is conducted pursuant to authority conferred by and (approval obtained from) the FISC under Section 702. See supra at 13-15; Oct. 3, 2011 WL 10945618, at *9 & n.24. Although Plaintiffs have asserted that they are users of Internet-based communications services offered by a number of U.S.-based providers, see Klayman Aff. ¶ 3; Strange Aff. ¶ 3, their affidavits contain no evidence that the NSA actually has targeted communications of theirs (or of any non-U.S. persons with whom they communicate) for foreign intelligence purposes authorized under Section 702. Nor do they allege that communications of theirs have been or will be acquired incidental to the targeting of non-U.S. persons under Section 702. See Oct. 3, 2011 WL 10945618, at 5. Rather, they simply speculate that their communications have been intercepted based on their level of political activism, see, e.g., Klayman Aff. ¶¶ 4-8, 12, or assume that is so based on their allegations of “mass surveillance” of the contents of Americans’ electronic communications, allegations for which they offer no proof whatsoever. See Klayman II Br. at 3, 12, 27.10 With regard to bulk Internet metadata, the Government has declassified the existence of a program under which the NSA obtained such data pursuant to court orders issued by the FISC, but that the program ceased in 2011, see supra at 16, and the Government has not disclosed the scope on which it operated. Plaintiffs offer no proof that the NSA has actually acquired Internet metadata about their communications, or continues to do so. See Klayman Aff. ¶¶3, 10; Strange Aff. ¶¶ 3, 4, 11, 18-19. 10 Plaintiffs assert in their briefs that “it is logical to conclude that Plaintiff Klayman is subjected to excessive and intrusive surveillance and monitoring by the NSA. In fact, it is indisputable that [he] has become the prime target of the NSA . . . .” Klayman I Br. at 13; Klayman II Br. at 14. These conclusory and unsubstantiated arguments of counsel, and others like them in Plaintiffs’ legal memoranda, are not evidence of injury on which they can base their standing. Conservation Force v. Salazar, 715 F. Supp. 2d 99, 106 n.9 (D.D.C. 2010). 22 Given that Plaintiffs fail to establish that any information about their communications (whether metadata or content) has been or will be collected, their stated “concern” that communications of theirs “will be overheard or obtained by” NSA, Klayman Aff. ¶ 10; Strange Aff. ¶ 11, is speculative and does not constitute injury-in-fact. See Amnesty Int’l USA, 133 S. Ct. at 1148-50. In Amnesty International, various individuals and organizations challenged the constitutionality of Section 702, which expanded the Government’s authority to intercept the communications of non-U.S. persons located abroad. See id. at 1144. They alleged, similar to Plaintiffs here, that there was an “objectively reasonable likelihood that their communications [would] be acquired . . . at some point in the future,” based on claims that they maintained regular contact with persons whose communications they believed would be targeted for acquisition by the Government. Id. at 1145-46. The Supreme Court found that this “threatened injury” was not “certainly impending” and so did not constitute an injury in fact, because it “was speculative whether the Government [would] imminently target communications to which [they would be] parties.” Id. at 1148. The same is true, indeed, all the more so here. As the foregoing discussion reveals, Plaintiffs fail to show that NSA collection of information about or contained in their communications has ever occurred, or is “certainly impending.”11 In addition, given that Plaintiffs have not established that their communications, or metadata about their communications, either have been or imminently will be subject to collection under any of the challenged NSA programs, their assertions that these programs have 11 Nor do any of the incidents that Plaintiff Strange labels “technological abnormal intrusions,” Strange Aff. ¶¶ 12-17; Klayman Aff. ¶ 11, support a finding that Plaintiffs’ telephony or Internet-based communications were collected by the NSA. The incidents that Plaintiffs describe—unexplained text messages, a “hoax” e-mail, and a widely publicized computer virus scam, see FBI: New Internet Scam (Aug. 2012), www.fbi.gov/news/stories/2012/august/newinternet-scam; Citadel Malware Continues to Deliver Ransomware in Attempts to Extort Money (Aug. 9, 2012), www.ic3.gov/media/2012/120809.aspx-- bear no resemblance to the alleged NSA data-collection activities, and Plaintiffs point to no evidence linking these incidents to the NSA, or any other Government agency. 23 “directly and significantly impacted” their “ability to communicate via telephone, e-mail, or otherwise,” and to engage in public advocacy, Klayman Aff. ¶¶ 9-10; Strange Aff. ¶¶ 11, 19-20, reflect only subjective fears on their part, fears that are insufficient to establish a cognizable injury for purposes of standing. Amnesty Int’l USA, 133 S. Ct. at 1152 (holding that the costs allegedly incurred in efforts to avoid possible surveillance was the “product of” the plaintiffs’ “fear of surveillance” and that “such fear is insufficient to create standing”); Laird v. Tatum, 408 U.S. 1, 10, 14 (1972) (holding that “[a]llegations of a subjective ‘chill’” arising from plaintiffs’ knowledge of the existence of “a governmental investigative and data-gathering activity,” without “any specific action of the [Government] against them,” were “not an adequate substitute for a claim of specific present objective harm or a threat of specific future harm”); United Presbyterian Church in the USA v. Reagan, 738 F.2d 1375, 1378 (D.C. Cir. 1984) (chilling effect produced by fear of surveillance is an sufficient basis for standing under Laird).12 For these reasons, Plaintiffs have not shown a clear or substantial likelihood of success on their claims because they have not established their standing. B. Plaintiffs’ Speculative Injuries Also Do Not Establish Irreparable Harm To satisfy the “high standard” for showing irreparable harm, Chaplaincy of Full Gospel Churches v. England, 454 F.3d 290, 297 (D.C. Cir. 2006), which is “perhaps the single most important prerequisite for the issuance of a preliminary injunction,” Stand Up for California! v. U.S. Dep’t of the Interior, 919 F. Supp. 2d 51, 81 (D.D.C. 2013) (internal quotations omitted), 12 In their brief, Plaintiffs also assert that the challenged programs “undoubtedly will dissuade, and has dissuaded, potential clients, whistleblowers, and others from contacting Plaintiff Klayman . . . .” Klayman II Br. at 16. Even setting aside that the arguments of counsel in legal memoranda are not evidence, Conservation Force, 715 F. Supp. 2d at 106 n.9, this assertion would not otherwise “establish injury that is fairly traceable to” the challenged NSA programs because it rests on speculation about unidentified third parties’ own speculative “fear[s] of surveillance.” Amnesty Int’l USA, 133 S. Ct. at 1152 n.7; see also Lujan, 504 U.S. at 562 (plaintiffs have the burden of “showing that [the] choices [of third-parties] have been or will be made in such manner as to produce causation and permit redressability of injury.”). 24 Plaintiffs must show that their asserted injuries are “certain” and “great,” rather than “theoretical,” and “of such imminence that there is a ‘clear and present’ need for equitable relief” to prevent this harm that would otherwise be “beyond remediation.” Id. (internal quotations omitted). For the same reasons that Plaintiffs failed to demonstrate that they suffered a sufficiently concrete injury to establish standing, they have failed to produce competent evidence showing that they are “likely to suffer irreparable harm before a decision on the merits can be rendered.” Id. (internal quotations omitted). Further exposing Plaintiffs’ lack of irreparable harm is their four-month delay in filing their preliminary injunction motions. See Gordon v. Holder, 632 F.3d 722, 725 (D.C. Cir. 2011); see also Fund for Animals v. Frizzel, 530 F.2d 982, 987 (D.C. Cir. 1975) (denying preliminary injunctive relief and noting that a delay of forty-four days after final regulations were issued was “inexcusable”); Brown v. Dist. of Columbia, 888 F. Supp. 2d 28, 33 (D.D.C. 2012) (Leon, J.) (finding that the plaintiff’s six-month delay in seeking injunctive relief “directly undercuts any argument that her injury is of such imminence that there is a clear and present need for equitable relief to prevent irreparable harm”) (internal quotations omitted). Here, Plaintiffs filed their Complaints against the Government Defendants in these cases on June 6 (Klayman I, Dkt. No. 1) and June 12, 2013 (Klayman II, Dkt. No. 1), but then inexplicably waited over four months, until October 29, to seek preliminary injunctive relief. See Klayman I, Dkt. No. 13; Klayman II, Dkt. No. 10. This is yet another reason why this Court “should be reluctant to award relief.” NRDC v. Pena, 147 F.3d 1012, 1026 (D.C. Cir. 1998). II. PLAINTIFFS’ CLAIM THAT THE ALLEGED NSA ACTIVITIES EXCEED STATUTORY AUTHORITY IS PRECLUDED BY STATUTE Plaintiffs’ requests for preliminary injunctions must also be denied because they have not shown a likelihood of success on the merits of any of their claims. 25 As an initial matter, neither of Plaintiffs’ complaints even purports to state a claim against the Government Defendants that the alleged NSA collection of information about their communications exceeds statutory authority. The only statutory claims in Klayman I are directed against Verizon and its Chief Executive Officer Lowell McAdam (Sixth and Seventh Claims for Relief). The complaint in Klayman II contains two claims for “Divulgence of Communications Records in Violation of 18 U.S.C. §§ 2702(a)(1) and/or (a)(2)” that purport to be against “Each and Every Defendant” (Sixth and Seventh Claims for Relief).13 Plaintiffs allege that those claims are brought pursuant to 18 U.S.C. § 2707, which they claim “provides a civil action for any person aggrieved by knowing or intentional violation of 18 U.S.C. § 2702,” (Klayman II Compl. ¶¶ 108, 115). 18 U.S.C. § 2707, however, expressly excludes the United States from the cause of action. 18 U.S.C. § 2707(a) (“Except as provided in section 2703(e), any provider of electronic communication service, subscriber, or other person aggrieved by any violation of this chapter in which the conduct constituting the violation is engaged in with a knowing or intentional state of mind may, in a civil action, recover from the person or entity, other than the United States, which engaged in that violation such relief as may be appropriate.”) (emphasis added). 18 U.S.C. § 2712 provides for a cause of action against the United States for certain violations, but (1) Plaintiffs have not alleged a claim under this statute, (2) this statute only provides for money damages, not injunctive relief, and (3) this statute contains an exhaustion requirement that Plaintiffs have not satisfied. 18 U.S.C. § 2712(b). To the extent Plaintiffs might seek to rely on the Administrative Procedure Act (APA), 5 U.S.C. § 706, for a cause of action for injunctive relief against the United States for alleged violations of 18 U.S.C. § 2702(a)(1), (2) (although it is not pled), such a claim would be 13 18 U.S.C. § 2702(a)(1) and (a)(2) relate to the divulgence of the contents of communications, as opposed to communication records. 26 impliedly precluded by Congress through its establishment of a cause of action for money damages only in 18 U.S.C. § 2712. In Jewel v. NSA, 2013 WL 3829405, at *12 (N.D. Cal. July 23, 2013), the court held that by excluding the United States from 18 U.S.C. § 2707, which provides for injunctive relief, and only authorizing a cause of action for money damages against the United States in § 2712, Congress intended to forbid injunctive and declaratory relief against the United States under the Stored Communications Act (18 U.S.C. § 2701, et seq.). As a general matter, APA section 702 waives sovereign immunity for actions against the Government “seeking relief other than money damages.” It is subject to a number of significant exceptions, however, two of which apply here. First, section 702 itself provides that “[n]othing herein . . . confers authority to grant relief if any other statute that grants consent to suit expressly or impliedly forbids the relief which is sought.” 5 U.S.C. § 702. Second, mirroring the first exception, the APA provides that its chapter on judicial review, including section 702, does not apply “to the extent that . . . statutes preclude judicial review.” Id. § 701(a)(1). The first exception “prevents plaintiffs from exploiting the APA’s waiver to evade limitations on suit contained in other statutes.” Match-E-Be-Nash-She-Wish Band of Pottawatomi Indians v. Patchak, 132 S. Ct. 2199, 2204-05 (2012). As Congress explained when it enacted the APA’s waiver of immunity, this “important carve-out,” id. at 2204, makes clear that Section 702 was “not intended to permit suit in circumstances where statutes forbid or limit the relief sought,” that is, where “Congress has consented to suit and the remedy provided is intended to be the exclusive remedy.” H.R. Rep. No. 94-1656, at 12-13 (1976), 1976 WL 14066, *12-13. “For example, . . . a statute granting the United States’ consent to suit, i.e., the Tucker Act, ‘impliedly forbids’ relief other than the [damages] remedy provided by the Act.” Id. Thus, “‘when Congress has dealt in particularity with a claim and [has] intended a specified remedy’— including its exceptions—to be exclusive, that is the end of the matter; the APA does not undo 27 the judgment.” Pottawatomi Indians, 132 S. Ct. at 2205 (quoting Block v. North Dakota ex rel. Bd. of Univ. and Sch. Lands, 461 U.S. 273, 286 n. 22 (1983)). To much the same effect, section 701(a)(1) of the APA withdraws section 702’s waiver of immunity where “statutes preclude judicial review.” 5 U.S.C. § 701(a)(1) (“This chapter applies, according to the provisions thereof, except to the extent that (1) statutes preclude judicial review”). “Whether and to what extent a particular statute precludes judicial review is determined not only from its express language, but also from the structure of the statutory scheme, its objectives, its legislative history, and the nature of the administrative action involved.” Block v. Cmty. Nutrition Inst., 467 U.S. 340, 349 (1984). “[W]hen a statute provides a detailed mechanism for judicial consideration of particular issues at the behest of particular persons, judicial review of those issues at the behest of other persons may be found to be impliedly precluded.” Id.; see Pottawatomi Indians, 132 S. Ct. at 2208. Congress evidenced its intent that persons such as Plaintiffs, who claim to be subscribers and users of electronic communications services, not be permitted to challenge the statutory basis of orders to produce electronic communications or communications records, by explicitly providing a right of judicial review only to the recipients of such orders. Congress specifically authorized challenges to Section 215 production orders only by recipients of those orders—the entities that create and own the records—and permitted those entities to challenge production orders only by filing a challenge in the FISC. 50 U.S.C. § 1861(f)(2)(A)(i), (B). The purpose of this provision was to “place Section 215 proceedings on a par with grand jury proceedings, where the subpoena recipient obviously knows of its existence and can challenge it in court.” Implementation of the USA PATRIOT Act: Hearing Before the H. Subcomm. on Crime, Terrorism, and Homeland Security, Comm. on the Judiciary, 109th Cong. at 65 (2005) 28 (statement of Robert Khuzami). Congress recognized, however, that allowing a similar right of action by third parties would be incompatible with the secrecy required for Section 215 orders.14 To promote its effective functioning as a tool for counter-terrorism, Section 215, like other provisions of FISA, establishes a secret and expeditious process that involves only the Government and the recipient of the order. See 50 U.S.C. § 1861(d)(1) (recipient may not “disclose to any other person that the [FBI] has sought or obtained” an order under Section 215). Under the statutory framework, third parties such as Plaintiffs, who are not recipients of Section 215 orders, are not even supposed to know of their existence, nor play a role in the process of testing their compliance with the statute. See, e.g., H.R. Rep. No. 109-174 at 128 (2005). The fact that Plaintiffs learned about the telephony metadata program order as the result of an unauthorized and unlawful disclosure does not change this essential facet of FISA’s structure. Allowing third parties to contest an order’s compliance with Section 215’s relevance and other requirements would potentially compromise the secrecy and efficiency of the process that Congress envisioned. Were there any doubt, Congress provided expressly that a Section 215 order “shall remain in effect” unless it has been “explicitly modified or set aside consistent with this subsection.” 50 U.S.C. § 1861(f)(2)(D). Thus, Congress clearly limited the right to contest the legality of Section 215 production orders to recipients of such orders who file petitions for review with the FISC. This “detailed mechanism for judicial consideration of particular issues” under Section 215 “at the behest of particular persons” means that “judicial review of those 14 See id. (“Beyond this amendment, however, the confidentiality provisions of Section 215 should not be disturbed. You do not want potential terrorists to know you are investigating them or are aware of their plans.”). See also H.R. Rep. No. 109-174 at 128 (right to challenge Section 215 order can only be given to the recipient, not the target, because the target does not know about it); id. at 268 (statutory prohibition on disclosing Section 215 order to subject prevents the subject from challenging it). 29 issues at the behest of other persons” is “impliedly precluded.” Cmty. Nutrition Inst., 467 U.S. at 349 (holding that statutory scheme allowing dairy handlers to seek review of milk market orders precluded actions by consumers); see also Ark. Dairy Co-op Assn., Inc. v. USDA, 573 F.3d 815, 822-23 (D.C. Cir. 2009) (dairy producers, who like handlers are given a role in the regulatory process, could also challenge milk market order); In re Application of the U.S. for an Order Pursuant to 18 U.S.C. § 2703(d), 830 F. Supp. 2d 114, 128-29 (E.D. Va. 2011) (provision of Stored Communications Act allowing Twitter subscribers to challenge orders requiring production to Government of “backup information” impliedly prohibited statutory challenge by subscribers to order requiring production of electronic records pertaining to them).15 18 U.S.C. § 2712 also expresses Congress’ intent to preclude a statutory claim under Section 215 by Plaintiffs. 18 U.S.C. § 2712 creates a damages action against the Government for violations of three specified provisions of FISA but omits Section 215 from that list, and provides no action for prospective relief. 18 U.S.C. § 2712(a). The three specified provisions of FISA are sections 106(a), 305(a), and 405(a), which respectively impose restrictions on the use and disclosure of information obtained from electronic surveillance, physical searches, and pen registers or trap and trace devices authorized under FISA. See 50 U.S.C. §§ 1806(a), 1825(a), 1845(a).16 Significantly, violations of the parallel “use” provision of Section 215, 50 U.S.C. § 1861(h), which restricts the Government’s use and disclosure of tangible things received in 15 Like Section 215, Section 702 of FISA, under which PRISM collection occurs, provides that an electronic communications service provider who receives a directive under Section 702 may challenge its lawfulness before the FISC. 50 U.S.C. § 1881a(h)(4), (6). See also Amnesty Int’l, 133 S. Ct. at 1154. Thus, any claim by Plaintiffs that the NSA exceeded its statutory authority in collecting their communications under PRISM—should it survive the significant standing problems discussed above—would be impliedly precluded as well. 16 As explained above, even if the complaints did plead a violation of 50 U.S.C. § 1845(a), 18 U.S.C. § 2712 only provides a damages remedy for such a violation, impliedly precluding a remedy for injunctive relief. In addition, as also already explained, the FISCauthorized collection under § 1845(a) lapsed in 2011. 30 response to a production order, are not made actionable under section 2712.17 Congress further stipulated that an action under § 2712 shall be the exclusive remedy against the United States for claims falling within its purview. Id. § 2712(d). Section 2712 thus deals with claims for misuses of information obtained under FISA in great detail, including the intended remedy, and Plaintiffs cannot rely on section 702 to bring a claim for violation of FISA’s terms that Congress did not provide for under 18 U.S.C. § 2712. Pottawatomi Indians, 132 S. Ct. at 2205. The same conclusion was reached by the district court in Jewel, supra, which held that § 2712, “by allowing suits against the United States only for damages based on three provisions of [FISA], impliedly bans suits against the United States that seek injunctive relief under any provision of FISA.” 2013 WL 3829405, at *12. III. PLAINTIFFS’ CLAIM THAT THE ALLEGED NSA INTELLIGENCEGATHERING PROGRAMS EXCEED THE GOVERNMENT’S STATUTORY AUTHORITY IS ALSO UNLIKELY TO SUCCEED ON THE MERITS Even if judicial review of Plaintiffs’ statutory claim were not precluded, the claim lacks merit. Plaintiffs assert that “Defendants’ surveillance program” is unauthorized under Section 215 because (i) the records obtained by the NSA are not “relevant” to authorized national security investigations, and (ii) the FISC may not prospectively direct the production of business records that do not yet exist. Klayman I Br. at 17-19; Klayman II Br. at 19-21. The Government Defendants address Plaintiffs’ arguments first as they apply to the telephony metadata program, and then as they apply (or, rather, do not apply) to the NSA’s collection of bulk Internet metadata and of communications targeted under Section 702. 17 The enactment of section 223 of the USA PATRIOT Act in 2001 preceded enactment of 50 U.S.C. § 1861(h) in 2006. 1 Kris & Wilson § 19:11 at 718. Congress has not since amended § 2712 to include violations of § 1861(h) as a basis for suit. In fact, when Congress amended Section 215 to add subsection (h), it also added the review provision at subsection (f), but made review available only to persons to whom Section 215 orders are directed. 31 A. The Telephony Metadata Program Is Authorized Under Section 215 Section 215 authorizes the FISC to order “production of any tangible things” upon application by the FBI “showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized [counter-terrorism] investigation.” 50 U.S.C. § 1861(a)(1), (b)(2)(A). Since May 2006, fifteen separate judges of the FISC have concluded on thirty-five occasions that the Government satisfied this requirement, finding “reasonable grounds to believe” that the telephony metadata sought by the Government “are relevant to authorized investigations . . . being conducted by the FBI . . . to protect against international terrorism.” Holley Decl. ¶¶ 6, 11; Aug. 29 FISC Op. at 28; Oct. 11 FISC Mem., Primary Order, at 2. Plaintiffs now ask this Court to second-guess the FISC’s repeated conclusions and declare instead that the call-detail records the FISC order produced to the NSA are not, in fact, relevant to authorized counter-terrorism investigations. The Court should reject this invitation. 1. Bulk telephony metadata are “relevant” within the meaning of Section 215. The concept of “relevance” has developed an accepted legal meaning in the context of official investigations and civil proceedings, for which purposes documents are considered “relevant” not only where they directly bear on a matter, but also where they reasonably could lead to other information that may bear on the matter. In civil discovery, for example, the phrase “relevant to the subject matter involved in the pending action” broadly encompasses “any matter that bears on, or that reasonably could lead to other matters that could bear on, any issue that is or may be in the case.” Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340, 351 (1978) (emphasis added). An even broader relevance standard applies to grand jury subpoenas, which will be enforced unless “there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury’s investigation.” 32 United States v. R. Enters., Inc., 498 U.S. 292, 301 (1991) (emphasis added). Likewise, the statutory authority conferred on administrative agencies to subpoena evidence that is “relevant to [a] charge under investigation” affords them “access to virtually any material that might cast light on the allegations” at issue in an investigation, EEOC v. Shell Oil Co., 466 U.S. 54, 68-69 (1984) (internal quotations omitted). In light of that basic understanding of relevance, courts in each of these contexts have categorically authorized the production of entire repositories of records, even when any particular record is unlikely to bear directly on the matter being investigated, where searching a large volume of information is the only feasible means of locating much smaller amounts of critical information within the data that directly bears on the matter under investigation.18 Analogously, courts also issue search warrants permitting Government agents to copy entire computer hard drives and then later review their contents for the specific evidence described in the warrant. See Fed. R. Crim. P. 41(e)(2)(B).19 These practices demonstrate the broad understanding of relevance developed in the context of investigatory information-gathering. 18 See, e.g., In re Subpoena Duces Tecum, 228 F.3d 341, 350-51 (4th Cir. 2000) (subpoena for 15,000 patient files); In re Grand Jury Proceedings, 827 F.2d 301, 305 (8th Cir. 1987) (upholding grand jury subpoenas for records of wire money transfers “involving hundreds of innocent people”); FTC. v. Invention Submission Corp., 965 F.2d 1086 (D.C. Cir. 1992); Carrillo Huettel, LLP v. SEC, 2011 WL 601369, at *2 (S.D. Cal. Feb. 11, 2011) (trust account information for all of law firm’s clients held relevant to SEC investigation); Goshawk Dedicated Ltd. v. American Viatical Servs., LLC, 2007 WL 3492762, at *1 (N.D. Ga. Nov. 5, 2007) (compelling production of business’s entire underwriting database); In re Adelphia Commc’ns Corp., 338 B.R. 546, 549 and 553 (Bankr. S.D.N.Y. 2005) (permitting inspection of “approximately 20,000 large bankers boxes of business records”); Medtronic Sofamor Danek, Inc. v. Michelson, 229 F.R.D. 550, 552 (W.D. Tenn. 2003) (compelling discovery of “approximately 996 network backup tapes . . . plus an estimated 300 gigabytes of other electronic data”). 19 See, e.g., United States v. Hill, 459 F.3d 966, 975 (9th Cir. 2006) (recognizing that “blanket seizure” of the defendant’s entire computer system, followed by subsequent review, may be permissible); United States v. Upham, 168 F.3d 532, 535 (1st Cir. 1999). 33 Both the text and legislative history confirm that Congress was acutely aware of and incorporated this accepted legal meaning of relevance when it enacted Section 215’s relevance requirement, see USA PATRIOT Act Improvement Act of 2005, Pub. L. No. 109-177, § 106(b), 120 Stat. 192 (2006). It was well understood at the time that relevance was the equivalent of the “well established standard” applied to grand jury subpoenas, administrative subpoenas, and civil discovery requests. See 152 Cong. Rec. S1598, 1606 (Mar. 2, 2006) (statement of Sen. Kyl).20 And Congress in fact described the items subject to production under Section 215 as things obtainable by “a subpoena duces tecum issued by a court . . . in aid of a grand jury investigation” or “any other order issued by a court . . . directing the production of records or tangible things.” 50 U.S.C. § 1861(c)(2)(D).21 Of course, the case law in the contexts of civil discovery, grand jury subpoenas, and administrative investigations does not involve data acquisition on the scale of the telephony metadata collection authorized by the FISC, because the information gathered in those contexts is sought in aid of focused judicial and administrative proceedings involving identifiable individuals and events. But in this context relevance must be evaluated in light of the special nature, purpose, and scope of national security investigations. See Okla. Press Publ’g Co. v. Walling, 327 U.S. 186, 209 (1946). Counter-terrorism investigations serve uniquely important purposes beyond the ambit of routine criminal or administrative inquiries, which ordinarily focus 20 See also 152 Cong. Rec. S1379, 1395 (Feb. 16, 2006) (statement of Sen. Kyl) (“We all know the term ‘relevance.’ It is a term that every court uses . . . The relevance standard is exactly the standard employed for the issuance of discovery orders in civil litigation, grand jury subpoenas in a criminal investigation, and for each and every one of the 335 different administrative subpoenas currently authorized by the United States Code.”); 151 Cong. Rec. S13636, 13642 (Dec. 15, 2005) (statement of Sen. Hatch); H.R. Rep. No. 109-174, pt. 1 at 131 (statement of Rep. Lungren). 21 See also NLRB v Amax Coal Co., 453 U.S. 322, 329 (1981) (“Where Congress uses terms that have accumulated settled meaning under either equity or the common law, a court must infer, unless the statute otherwise dictates, that Congress means to incorporate the established meaning of these terms.”). 34 retrospectively on specific crimes or violations that have already occurred and the persons known or suspected to have committed them. The key purpose of terrorism investigations is to prevent terrorist attacks before they occur. Hence, national security investigations often have remarkable breadth, spanning long periods of time and multiple geographic regions to identify terrorist groups, their members, intended targets, and means of attack, many of which are often unknown to the intelligence community at the outset. See CIA v. Sims, 471 U.S. 159, 171 (1985) (“foreign intelligence [gathering] consists of securing all possible data pertaining to . . . the national defense and security of the United States”); United States v. U.S. Dist. Court (Keith), 407 U.S. 297, 322-23 (1972). Relevance in this context, therefore, must take into account the far-reaching information-gathering required to shed light on suspected terrorist organizations, their size and composition, recruitment, geographic reach, relation to foreign powers, financial resources, past acts, goals, and capacity for carrying out their plans. When Congress codified the relevance standard under Section 215, the critical differences between the breadth and attributes of counter-terrorism investigations and routine criminal investigations were well understood. See H.R. Rep. No. 109-174(1) at 129 (statement of Rep. Lungren) (“[t]his is in the nature of trying to stop terrorists before they act, not in the nature of a regular criminal investigation . . . and it strikes . . . precisely at when a 215 order is most useful”); see also 152 Cong. Rec. S1325, 1330 (Feb. 15, 2006) (statement of Sen. Feingold). The purpose underlying the USA PATRIOT Act, and Section 215 in particular, was to provide the intelligence community the enhanced investigatory tools needed to bring terrorist activities to light before they culminate in a loss of life and property. See H.R. Rep. No. 109174, pt. 2 at 4 (“[M]any of the core enhanced authorities of the [Patriot Act] are fundamentally intelligence authorities intended to gather information to counter threats to national security from terrorists.”); S. Rep. No. 109-85 at 40 (noting “critical” nature and “broad reach” of authority 35 conferred by Section 215). Consistent with this core legislative objective, Section 215 should be understood to authorize the collection of records that can help to identify previously unknown operatives and activities, and thus detect and prevent terrorist attacks before they are launched. Bulk telephony metadata are therefore relevant (at the least) to FBI counter-terrorism investigations because, as experience has shown, the collection and aggregation of these data permit the effective use of NSA analytical tools to detect contacts between foreign terrorists and their unknown associates located in the United States who may be planning attacks on the U.S. soil. Holley Decl. ¶¶ 8-9, 18-26; Shea Decl. ¶¶ 44, 46-48; see Aug. 29 FISC Op. at 20. Targeted tools of investigation that do not involve bulk collection of the data cannot always achieve this objective as effectively, if at all, because the Government cannot know, in advance of linking a phone number (or other identifier) to a terrorist organization, where in the data the terrorists’ communications can be found. Holley Decl. ¶¶ 9, 27-29; Shea Decl. ¶¶ 57-63. Absent the creation of an historical repository of information that bulk collection and aggregation of the data allow, it may not be feasible for NSA to identify chains of communications among known and unknown terrorist operatives that cross different time periods and providers’ networks. Holley Decl. ¶¶ 9, 27-29; Shea Decl. ¶ 60; see Aug. 29 FISC Op. at 21-22. Thus, there are reasonable grounds, at the least, for concluding that “the whole of the metadata produced” is “relevant” to authorized national security investigations. Aug. 29 FISC Op. at 22.22 22 Notably in this regard, Section 215 permits the collection of information relevant “to an authorized investigation,” 50 U.S.C. § 1861(b)(2)(A), not simply information relevant to the “subject matter” involved a matter, as in civil discovery, Fed. R. Civ. P. 26(b)(1). Business records can therefore be “relevant” to an investigation not merely if they relate to its subject matter, but also if there is reason to believe they are necessary or useful to the application of investigative techniques that will advance its purposes. As discussed above, NSA analysis enables discovery of otherwise hidden connections between individuals suspected of engaging in terrorist activity and unknown co-conspirators with whom they maintain contact in the United States. The metadata records are therefore relevant to FBI investigations whose object is to thwart the plots in which these individuals are engaged before they come to bitter fruition. 36 2. Congress has legislatively ratified the construction of Section 215 as allowing for the bulk collection of telephony metadata records That conclusion is reinforced, as the FISC recently recognized, by Congress’s extension of Section 215’s authorization without substantive change, in 2010 and 2011, after receiving notice that the FISC and the Executive Branch had interpreted Section 215 to authorize the bulk collection of telephony metadata. Aug. 29 FISC Op. at 23-28. On both occasions the Executive Branch worked to ensure that all Members of Congress had access to information about this program and the legal authority for it. In December 2009, a classified briefing paper, explaining that the Government and the FISC had interpreted Section 215 to authorize the bulk collection of telephony metadata, was provided to the House and Senate Intelligence Committees and made available for review, as well, by all Members of Congress, “to inform the legislative debate about reauthorization of Section 215.”23 Additionally, the classified use of this authority has been briefed numerous times over the years to the Senate and House Intelligence and Judiciary Committees, as several Members of Congress have acknowledged.24 23 See Letter from Ronald Weich to Rep. Silvestre Reyes (Dec. 14, 2009) (Exh. K, hereto); Report on the [NSA’s] Bulk collection Programs for USA PATRIOT Act Reauthorization (Exh. L, hereto). Both Intelligence Committees made this document available to all Members of Congress prior to the February 2010 reauthorization of Section 215. See Letter from Sens. Feinstein and Bond to Colleagues (Feb. 23, 2010) (Exh. M, hereto); Letter from Rep. Reyes to Colleagues (Feb. 24, 2010) (Exh. N, hereto); see also 156 Cong. Rec. H838 (daily ed. Feb. 25, 2010) (statement of Rep. Hastings); 156 Cong. Rec. S2109 (daily ed. Mar. 25, 2010) (statement of Sen. Wyden). An updated version of the briefing paper was provided to the Senate and House Intelligence Committees again in February 2011 in connection with the reauthorization that occurred later that year. See Letter from Ronald Weich to Sens. Diane Feinstein and Saxby Chambliss (Feb. 2, 2011) (Exh. O, hereto); Letter from Ronald Weich to Reps. Mike Rogers and C.A. Dutch Ruppersberger (Feb. 2, 2011) (Exh. P, hereto). The Senate Intelligence Committee made this updated paper available to all Senators later that month. See Letter from Sens. Feinstein and Chambliss to Colleagues (Feb. 8, 2011) (Exh. Q, hereto). 24 See Press Release of Sen. Select Comm. on Intelligence (June 6, 2013) (Exh. Q, hereto)); How Disclosed NSA Programs Protect Americans, and Why Disclosure Aids Our 37 After receiving these “extensive and detailed” briefing papers “regarding the nature and scope” of the program, Congress twice extended Section 215’s authorization, in 2010 and 2011. Aug. 29 FISC Op. at 25 & n.23.25 “‘Congress is presumed to be aware of an administrative or judicial interpretation of a statute and to adopt that interpretation when it re-enacts a statute without change.’” Forest Grove Sch. Dist. v. T.A., 557 U.S. 230, 239-40 (2009) (quoting Lorillard v. Pons, 434 U.S. 575, 580 (1978)). That presumption is ironclad in this instance, where Congress had actual and repeated notice of the Executive Branch’s administrative construction of Section 215 over a period of years.26 Imposing a limiting construction now on Section 215 that would prohibit bulk collection of telephony metadata would be contrary to the express understanding of the statute that Congress ratified on two separate occasions. 3. Plaintiffs present no persuasive reasons for concluding that bulk telephony metadata are not “relevant” to authorized counterterrorism investigations within the meaning of Section 215 Plaintiffs nevertheless maintain that the NSA’s bulk collection of telephony metadata exceeds the Government’s authority under Section 215 because it disregards the relevance requirement. But since May 2006, fifteen separate judges of the FISC have concluded otherwise, Adversaries: Hearing Before the House Perm. Select Comm. on Intelligence 2, 35, 58, 113th Cong., 1st Sess. (2013) (statements of Reps. Rogers, Langevin, and Pompeo) (Exh. R, hereto). 25 USA PATRIOT Act – Extension of Sunsets, Pub. L. No. 111-141, § 1(a), 124 Stat. 37; PATRIOT Sunsets Extension Act of 2011, Pub. L. No. 112-14, § 2(a), 125 Stat. 216. 26 See EEOC v. Shell Oil Co., 466 U.S. 54, 69 & n.21 (1984), and Haig v. Agee, 453 U.S. 280, 297-98 & n.37 (1981) (both finding “clear[ ]” and “undoubted” Congressional awareness of the pertinent judicial and executive interpretations, based on references in committee reports). Moreover, in both 2009 and 2011, when the Senate Judiciary Committee was considering possible amendments to Section 215, it made clear that it had no intention of affecting the telephony metadata collection program. The Committee reports accompanying the USA PATRIOT Act Sunset Extension Acts of 2009 and 2011 explained that proposed changes to Section 215 were “not intended to affect or restrict any activities approved by the FISA court under existing statutory authorities.” S. Rep. No. 111-92, at 7 (2009); S. Rep. No. 112-13, at 10 (2011). Ultimately, Section 215 was extended to June 1, 2015 without change. See Patriot Sunsets Extension Act of 2011, Pub. L. No. 112-14, 125 Stat. 216 (2011). 38 finding “reasonable grounds to believe” that the telephony metadata sought by the Government “are relevant to authorized investigations . . . being conducted by the FBI . . . to protect against international terrorism.” Holley Decl. ¶¶ 6, 11; see Primary Order at 1; Aug. 29 FISC Op. at 11; Oct. 11 FISC Mem. at 3. As the FISC concluded recently: [b]ecause known and unknown international terrorist operatives are using telephone communications, and because it is necessary to obtain the bulk collection of a telephone company’s metadata to determine those connections between known and unknown international terrorist operatives as part of authorized investigations, the production of the information sought meets the standard for relevance under Section 215. Aug. 29 FISC Op. at 18; see also Oct. 11 FISC Mem. at 3. Considering that the Government has consistently demonstrated the relevance of the requested records to the FISC’s satisfaction, as Section 215 requires, it is difficult to understand how the Government can be said to have acted in excess of statutory authority. At bottom, Plaintiffs are asking this Court to conclude that the FISC exceeded its authority when it authorized the NSA’s bulk collection of telephony metadata, and that this Court should substitute its judgment for the decisions that the FISC reached thirty-five times. That approach cannot be reconciled with the legislative plan. When courts are called on to enforce grand jury or administrative subpoenas—instruments that informed Congress’s understanding of Section 215, see supra at 34-35, — the Government’s determination that records are “relevant” to its investigation is subject only to the most deferential review.27 In the analogous context of electronic surveillance, FISC orders receive only “minimal scrutiny by 27 See R. Enters., 498 U.S. at 301 (grand jury subpoena challenged on relevancy grounds must be upheld unless “there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury’s investigation”); FTC v. Invention Submission Group, 965 F.2d 1086, 1089 (D.C. Cir. 1992) (in a proceeding to enforce an administrative subpoena, the agency’s appraisal of relevancy to its investigation “must be accepted so long as it is not obviously wrong,” and the district court’s finding of relevancy will be affirmed unless it is “clearly erroneous”) . 39 [reviewing] courts.” See, e.g., United States v. Abu-Jihaad, 630 F.3d 102, 130 (2d Cir. 2010); United States v. Campa, 529 F.3d 980, 993 (11th Cir. 2008). An equally deferential standard of review is called for in this context, where ensuring the Government’s access to the information needed to carry out its national security mission is imperative, and where deferential review is commanded by the terms of Section 215 itself. Section 215 conditions the Government’s access to business records, not on a showing of relevance, but on a showing of “reasonable grounds to believe that the [records] are relevant” to authorized counter-terrorism investigations. 50 U.S.C. § 1861(b)(2)(A) (emphasis added), (c)(1). Under this standard, in order to find that the FISC’s production orders exceeded its authority, this Court would have to conclude that the fifteen FISC judges who repeatedly issued those orders lacked any reasonable basis for doing so. That proposition is self-defeating. The fact that fifteen judges of the FISC have granted the FBI’s applications for bulk production of telephony metadata should itself demonstrate that the grounds advanced by the Government for believing these records to be relevant to authorized counter-terrorism investigations are, at the very least, reasonable. Plaintiffs offer no convincing arguments to the contrary. At bottom, Plaintiffs argue that bulk telephony metadata cannot be considered relevant under Section 215 because the vast majority of the data collected do not pertain to persons who “are subjects of an authorized investigation,” or who are reasonably suspected, based on “specific and articulable facts,” of terrorist activity. Klayman I Br. at 17-18. This argument fails, however, because when Congress passed the USA PATRIOT Act in 2001, it expanded the Government’s authority to obtain business records under FISA by eliminating the requirement in prior law of “specific and articulable facts giving reason to believe that the person to whom the records pertain is a foreign power or an agent of a foreign power.” 50 U.S.C. § 1862(b)(2)(B) (2000 ed.); Pub. L. 107-56, § 215, 115 Stat. 288; see Aug. 29 FISC Op. at 13. Again in 2006, 40 when Congress codified Section 215’s relevance requirement, it rejected a proposal to restrict the statute’s scope to records pertaining to individuals suspected of terrorist activity.28 Limiting the reach of Section 215 to specific records bearing directly on known terrorist threats and operatives would inhibit the use of this authority for its intended purposes—detecting unknown terrorist threats—and frustrate, not vindicate, the will of Congress. Moreover, Plaintiffs’ underlying complaint, that the “vast majority” of call-detail records collected by the NSA are not related to specific counter-terrorism investigations, Klayman I Br. at 18, comes as no revelation. The Government has always acknowledged, and the FISC has understood, that the vast majority of the call-detail records the Government expects to collect do not document communications between terrorist operatives. See supra at 34-37; Aug. 29 FISC Op. at 20-23; Shea Decl., ¶ 5, 23-24. At the same time, the FISC has recognized that bulk collection of the data is necessary to the program—and therefore that the records are relevant as a whole—because the NSA cannot know in advance of making authorized queries (under the “reasonable articulable suspicion” standard) which communications occurring at what times, on which providers’ networks, will reflect connections between terrorist groups and operatives located in the United States. See id. at 22. Thus, the collateral acquisition of records that do not pertain to such communications is not evidence that the Government (or the FISC) has exceeded its authority, but an outgrowth of the leeway that Congress extended to the Government to obtain foreign intelligence information under Section 215 “to meet its national security responsibilities.” Id. at 23. As the FISC has recognized, Congress anticipated this prospect, and 28 See S. 2369, 109th Cong. § 3, reprinted at 152 Cong. Rec. S1791 (Mar. 6, 2006); 151 Cong. Rec. S14275-01 (Dec. 21, 2005) (statement of Sen. Dodd) (“Unfortunately, the conference report . . . maintains the minimal standard of relevance without a requirement of fact connecting the records sought, or the individual, [to] suspected . . . terrorist activity”). See also 152 Cong. Rec. S1598-03 (2006) (statement of Sen. Levin); 152 Cong. Rec. H581-02 (Mar. 7, 2006) (statement of Rep. Nadler). 41 so provided for the imposition of minimization procedures to safeguard against the improper use or dissemination of U.S.-person information produced under Section 215 orders. Id. at 11, 2223; Shea Decl. ¶¶ 29-35. In the final analysis, Plaintiffs succeed only in demonstrating their own disagreement with the FISC’s repeated determinations that bulk telephony metadata are relevant to FBI counter-terrorism investigations. They cite nothing in the text or legislative history of the statute demonstrating that the FISC, in reaching those conclusions, exceeded the authority that Congress granted to it. Congress assigned the FISC the responsibility of making relevance determinations under Section 215, and Plaintiffs have not explained how the FISC has exercised that authority in a way, not simply that they object to, but that Congress did not intend. 4. Nothing in Section 215 prohibits the FISC from prospectively directing the production of business records as they are created Plaintiffs’ next contention, that Section 215 does not authorize the collection of business records “not yet in existence,” Klayman I Br. at 17, is erroneous as a matter of law. Section 215 authorizes the FISC to direct the production of “any tangible things,” “documents,” or “records.” 50 U.S.C. § 1861(a)(1)(emphasis added). Nothing in the text of the statute suggests that FISC orders may apply only to records created before the FISC renders its order. Nor do the FISC’s orders require the creation or preservation of documents that would otherwise not exist, or compel telecommunications service providers to retain information they would otherwise discard. For example, telephony metadata such as the records at issue here are routinely created and maintained by providers for at least 18 months, pursuant to Federal Communications Commission regulations. See 47 C.F.R. § 42.6. Prospective production of business records has been deemed appropriate in analogous contexts. For example, under the SCA, the Government may obtain a court order requiring a 42 provider of cell-phone service to produce non-content “record[s] or other information pertaining to a subscriber . . . or customer” on a specific showing of “reasonable grounds to believe that . . . the records or other information sought, are relevant and material to an ongoing criminal investigation.” 18 U.S.C. § 2703(c)(1), (d). Courts have held that the Government may seek prospective disclosure of records under the SCA because “the prospective . . . information sought by the Government . . . becomes a ‘historical record’ as soon as it is recorded by the provider,” and the statute “in no way limits the ongoing disclosure of records to the Government as soon as they are created.” In re Application of the United States, 632 F. Supp. 2d 202, 207 n.8 (E.D.N.Y. 2008).29 Like the SCA, there is nothing in the text or legislative history of Section 215 indicating that Congress meant to prohibit contemporaneous production to the Government of business records that are generated on a daily basis. This approach does not provide the Government with indefinite access to bulk telephony metadata, as Plaintiffs suggest, see Klayman I Br. at 19, as the Government must obtain a new order for production of these metadata every 90 days. See supra at 9.30 Plaintiffs have demonstrated no likelihood of success on their claim that the NSA’s collection of bulk telephony metadata exceeds the Government’s authority under Section 215. 29 See also United States v. Booker, 2013 WL 2903562, at *6-7 (N.D. Ga. June 13, 2013); In re Application of the United States, 622 F. Supp. 2d 411, 418-19 (S.D. Tex. 2007); In re Application of the United States, 460 F. Supp. 2d 448, 459 (S.D.N.Y. 2006); In re Application of the United States, 433 F. Supp. 2d 804, 806 (S.D. Tex. 2006); In re Application of the United States, 411 F. Supp. 2d 678, 680 (W.D. La. 2006); In re Application of the United States, 405 F. Supp. 2d 435, 446-47 (S.D.N.Y. 2005). 30 Furthermore, Section 215 expires on June 1, 2015, pursuant to section 102(b)(1) of the USA PATRIOT Improvement and Reauthorization Act of 2005, Pub. L. 109-177, 120 Stat. 195 (50 U.S.C. § 1805 note), as amended by section 2(a) of the PATRIOT Sunsets Extension Act of 2011, Pub. L. 112-4, 125 Stat. 216. Congress will have to decide before then whether to re-enact Section 215 without change, or amend it, in light of what is now publicly known about the Government’s exercise of authority under the statute. 43 B. Plaintiffs Have No Likelihood of Success on Their Statutory Challenge to the Government’s Targeted Collection Directed Against non-U.S. Persons Located Outside the United States To the extent Plaintiffs mean to argue that the Government has also engaged in “bulk acquisition” of the content of Americans’ electronic communications, in excess of the authority conferred by Section 215, see Klayman II Br. at 13-15, 19-21, their argument is misguided as a matter of fact and law. As discussed above, Section 702 of FISA authorizes the Government to conduct surveillance that targets non-U.S. persons located outside the United States to acquire foreign intelligence information, 50 U.S.C. § 1881a(a), (b), subject to FISC approval of the Government’s procedures to ensure lawful targeting of its surveillance and minimization of the acquisition, retention, and dissemination of non-public information about non-consenting U.S. persons, id. § 1881a(i)(2)-(3). The Government has acknowledged its use of this authority to target non-U.S. persons located abroad. See supra at 13-15. Plaintiffs have adduced no evidence, however, that the Government has ever collected the contents of electronic communications in bulk—whether of American citizens or otherwise—or that it has ever collected the contents of such communications, in bulk or otherwise, under authority of Section 215. C. Plaintiffs Have No Likelihood of Success on Their Statutory Challenge to the Government’s Prior Collection of Bulk Internet Metadata Plaintiffs similarly maintain that the collection of bulk Internet metadata exceeds the Government’s authority under Section 215, on the ground that bulk collection of Internet metadata does not comport with Section 215’s relevance requirement. Klayman II Br. at 19-21. To the extent Plaintiffs are referring to the FISC-authorized bulk collection of Internet metadata recently declassified by the DNI, the DNI has explained that the program was discontinued in 44 2011, and thus there is no current collection to enjoin that warrants consideration of whether that activity exceeded statutory authority. Second, as also explained above, that program of bulk Internet metadata collection was authorized by the FISC under authority of the pen/trap statute, 50 U.S.C. § 1842 (not Section 215).31 Accordingly, Plaintiffs’ allegations concerning the bulk collection of Internet metadata cannot support an award of preliminary injunctive relief. In sum, Plaintiffs have demonstrated no likelihood of success on the merits of their claims against the Government Defendants. IV. PLAINTIFFS CANNOT SUCCEED ON THE MERITS OF THEIR FOURTH AMENDMENT CLAIM BECAUSE THE CHALLENGED SURVEILLANCE DOES NOT VIOLATE PLAINTIFFS’ FOURTH AMENDMENT RIGHTS A. Plaintiffs Have No Fourth Amendment Privacy Interest in Telecommunications Metadata The Fourth Amendment provides in relevant part that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” As the Supreme Court remarked just last year, “for most of our history the Fourth Amendment was understood to embody a particular concern for government trespass upon the areas (‘persons, houses, papers, and effects’) it enumerates.” United States v. Jones, 132 S. Ct. 945, 949-50 (2012). In addition to the core concern over searches and seizures within these enumerated areas, it is now understood that a Fourth Amendment “search” takes place when the government’s investigative activities “violate a person’s ‘reasonable expectation of privacy.’” Id. (quoting Katz v. United States, 389 U.S. 347, 360 (1967)). The Government’s collection of telephony metadata pursuant to orders of the FISC does not involve a “search” of individual subscribers or their property. The orders are directed to telecommunications service providers, not to subscribers, and direct the production of what are 31 Moreover, the FISC has previously found that bulk collection of information comports with the relevance requirement of the pen/trap statute. See Aug. 29 FISC Op. at 19-20. 45 indisputably the providers’ own business records. Nor do telephone subscribers have a reasonable expectation of privacy in telephony metadata. In Smith v. Maryland, 442 U.S. 735, 741-46 (1979), the Supreme Court held that the government’s recordation of numbers dialed from an individual’s home telephone, through a pen register installed at the telephone company’s central offices, did not constitute a search of that individual under the Fourth Amendment, because persons making telephone calls, even from their own homes, lack a reasonable expectation of privacy in the numbers they call. In contrast to the contents of telephone calls, the Court held that there is no reasonable expectation of privacy in the telephone numbers dialed, because telephone users “typically know that they must convey numerical information to the phone company; that the phone company has facilities for recording this information; and that the phone company does in fact record this information for a variety of legitimate business purposes,” such as billing and fraud detection. Id. at 743. Furthermore, the Court reasoned, even if a subscriber harbored a subjective expectation that the phone numbers he dialed would remain private, such an expectation of privacy would not be reasonable, because “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Id. at 743-44. The Court explained that someone who uses a phone has “voluntarily conveyed numerical information to the telephone company and ‘exposed’ that information to its equipment in the ordinary course of business,” and therefore has “assumed the risk that the company would reveal to police the numbers he dialed.” Id. at 744. The third-party doctrine has consistently been applied, both pre- and post-Smith, to telephone call detail records like the business records at issue here, which are also third-party records.32 32 See, e.g., Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030, 1043-46 (D.C. Cir. 1978); United States v. Baxter, 492 F.2d 150, 167 (9th Cir. 1973); United States v. Fithian, 452 F.2d 505, 506 (9th Cir. 1971); United States v. Doe, 537 F. Supp. 838, 839-40 46 Smith is fatal to Plaintiffs’ claim that the collection of their telephony metadata violates the Fourth Amendment. See Aug. 29 FISC Op. at 6 (“The production of telephone service provider metadata is squarely controlled by Smith . . . . [Smith] and its progeny have governed Fourth Amendment jurisprudence with regard to telephony and communications metadata for more than 30 years.”). So far as metadata include such information as the times and duration of calls and the numbers of the parties with whom they spoke, that is information that telephone subscribers voluntarily turned over to their providers. The remaining data, such as trunk identifiers, is information generated by the phone companies themselves. See Primary Order at 3 n.1. Call-detail records memorializing this information belong to the phone companies, as the parties providing the equipment and services required to make those calls possible. See United States v. Miller, 425 U.S. 435, 440-41 (1976) (rejecting a bank depositor’s Fourth Amendment challenge to a subpoena of bank records because, inasmuch as the bank was a party to the transactions, the records belonged to the bank). Thus, under Smith, there can be no reasonable expectation of privacy in this information, even if—as has not been alleged here—there were an understanding that the third party (i.e., the telephone company) would treat the information as confidential. SEC v. Jerry T. O’Brien, Inc., 467 U.S. 735, 743 (1984); Miller, 425 U.S. at 443. Importantly, the call-detail records reveal only phone numbers and other numeric data, not any information identifying the caller or the person called. See Shea Decl. ¶¶ 15, 21; Holley Decl. ¶¶ 7, 11. Thus, these data do not in fact reveal any information about the subscriber’s professions, political activities, or other activities in which they may have a privacy interest. See Klayman I Br. at 20; Klayman II Br. at 21-22. The mere fact that the numbers dialed from a phone could, in some hypothetical sense, reveal the identities of the persons and the places (E.D.N.Y. 1982). Cf. United States v. Covello, 410 F.2d 536, 540-42 (2d Cir. 1969); United States v. Gallo, 123 F.2d 229, 231 (2d Cir. 1941). 47 called, was raised by the dissenters in Smith, 442 U.S. at 748 (Stewart, J., dissenting), but the Court nonetheless ruled that there is no reasonable expectation of privacy in telephone numbers dialed. Id. at 741-42; see also U.S. Telecom Ass’n v. FCC, 227 F.3d 450, 454 (D.C. Cir. 2000) (“telephone numbers are not protected by the Fourth Amendment”) (citing Smith). Remarkably, Plaintiffs fail to even cite, let alone attempt to distinguish, Smith. Instead, they rely on Justice Sotomayor’s concurring opinion in United States v. Jones, 132 S. Ct. 945 (2012), for the proposition that “Plaintiffs’ expectation that their communication records will not be subject to long-term recording, aggregation, and surveillance by the government[] is objectively reasonable, particularly as the intrusive surveillance at issue allows the government to gather intricate details of each individual and their associations with one another, including their clients, supporters, and membership.” Klayman I Br. at 20, Klayman II Br. at 22. Justice Sotomayor expressed concern that the GPS monitoring at issue in Jones, which the Court held constituted a search under a trespass theory completely inapplicable here, “‘generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.’” Jones, 132 S. Ct. at 955-56 (Sotomayor, J., concurring). That was so because the GPS device used in Jones was attached by law enforcement officers to a single, known person’s vehicle and recorded the vehicle’s locations over a period of time. Law enforcement learned from the GPS data where that particular person had been over 28 days and used that information to prosecute him. In contrast here, however, the bulk telephony metadata program provides the NSA with information about calls between unidentified phone numbers, when the calls occurred, and how long they lasted. Thus, unlike in Jones, the NSA does not know the identity of anyone making or receiving the calls (apart, 48 perhaps, from the suspected terrorist actors associated with the “seed” identifiers), and under the terms of the FISC’s orders, cannot use the metadata to detail individuals’ associations.33 Nor does the scope of the telephony metadata collection under the FISC’s orders alter the Fourth Amendment analysis. Fourth Amendment rights “are personal in nature, and cannot bestow vicarious protection on those who do not have a reasonable expectation of privacy in the place to be searched.” Steagald v. United States, 451 U.S. 204, 219 (1981); accord, e.g., Minnesota v. Carter, 525 U.S. 83, 88 (1998); Rakas v. Illinois, 439 U.S. 128, 133-34 (1978). No Fourth Amendment-protected interest of Plaintiffs is implicated, therefore, by virtue of the fact that the metadata of many other individuals’ calls are collected as well as their own. See In re Grand Jury Proceedings, 827 F.2d 301, 305 (8th Cir. 1987) (rejecting argument that a subpoena was unreasonable under the Fourth Amendment because it “may make available to the grand jury [money transfer] records involving hundreds of innocent people”); United States v. Rigmaiden, 2013 WL 1932800, at *13 (D. Ariz. May 8, 2013) (Government did not violate defendant’s Fourth Amendment rights by acquiring a high volume (1.8 million) of IP addresses). Courts have also specifically applied the reasoning of Smith to find no reasonable expectation of privacy in Internet metadata, finding the use of a pen register to obtain data such as the to/from addresses of email messages to be “constitutionally indistinguishable from the use of a pen register that the Court approved in Smith.” United States v. Forrester, 512 F.3d 500, 33 For this reason, even in the absence of Smith, the mere collection of Plaintiffs’ telephony metadata under the Section 215 program, without review of the data pursuant to a query made under “reasonable articulable suspicion” standard, would not rise to the level of a search under the Fourth Amendment, because the Government’s acquisition of an item without examining its contents “does not compromise the interest in preserving the privacy of its contents.” Horton v. California, 496 U.S. 128, 142 n.11 (1990). See also United States v. Van Leeuwen, 397 U.S. 249, 252-53 (1970) (defendant’s interest in the privacy of his detained firstclass mail “was not disturbed or invaded” until the Government searched the packages). 49 510 (9th Cir. 2008).34 Thus, Plaintiffs have no Fourth Amendment privacy interest in the collection of internet metadata either, and the acknowledged internet metadata collection program has ceased. It is therefore not necessary to address its reasonableness (which in any event tracks the reasonableness of the telephony metadata collection), even if its collection amounted to a search (which it did not under Smith and its progeny). B. The Government’s Acquisition of Telephony Metadata Is Reasonable Even if collecting telephony metadata involved a Fourth Amendment “search” (it does not), the Fourth Amendment bars only “unreasonable” searches and seizures, whereas the collection of metadata at issue here is reasonable under the standard the Supreme Court applies to assess suspicionless searches that serve special government needs. As the Supreme Court has explained, “where a Fourth Amendment intrusion serves special governmental needs, beyond the normal need for law enforcement, it is necessary to balance the individual’s privacy expectations against the Government’s interests to determine whether it is impractical to require a warrant or some level of individualized suspicion in the particular context.” Nat’l Treasury Emps. Union v. Von Raab, 489 U.S. 656, 665-66 (1989). More specifically, the scope of the legitimate expectation of privacy and the character of the intrusion are balanced against the nature of the government interests to be furthered, as well as the immediacy of the government’s concerns regarding those interests and the efficacy of the policy at issue in addressing those concerns. See Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 658, 660, 662-63 (1995). 34 See also Guest v. Leis, 255 F.3d 325, 335-36 (6th Cir. 2001); In re Application of the U.S. for an Order Pursuant to 18 U.S.C. § 2703(d), 830 F. Supp. 2d 114, 131-38 (E.D. Va. 2011) (Internet protocol (“IP”) address information); United States v. Qing Li, No. 07 CR 2915 JM, 2008 WL 789899, at *4-5 (S.D. Cal. Mar. 20, 2008) (IP log-in histories and addressing information). As the Court explained in Forrester, email and internet users also rely on thirdparty companies and equipment to engage in their communications; and email to/from addresses and IP addresses are addressing information and do not necessarily reveal any more about the contents of communications than do phone numbers. 512 F.3d at 510-11. 50 The NSA’s collection of telephony metadata clearly serves special governmental needs above and beyond normal law enforcement. The undisputed programmatic purpose of the collection of this metadata is identifying unknown terrorist operatives and preventing terrorist attacks—forward-looking goals that fundamentally differ from most ordinary criminal law enforcement, which typically focuses on solving crimes that have already occurred, not protecting public safety and national security. The Supreme Court has distinguished between domestic-security surveillance and surveillance in connection with ordinary crime: The gathering of security intelligence is often long range and involves the interrelation of various sources and types of information. The exact targets of such surveillance may be more difficult to identify than in surveillance operations against many types of crime . . . . Often, too, the emphasis of domestic intelligence gathering is on the prevention of unlawful activity or the enhancement of the Government’s preparedness for some possible future crisis or emergency. Thus, the focus of domestic surveillance may be less precise than that directed against more conventional types of crime. United States v. U.S. Dist. Court (Keith), 407 U.S. 297, 322-23 (1972). See also Bd. of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls, 536 U.S. 822, 828 (2002) (the probable cause standard “is peculiarly related to criminal investigations and may be unsuited to determining the reasonableness of administrative searches where the Government seeks to prevent the development of hazardous conditions.”) (internal quotations omitted); Abu-Jihaad, 630 F.3d at 122 (extending the distinction noted in Keith to foreign intelligence surveillance); In re Sealed Case, 310 F.3d 717, 746 (FISC-R 2002) (“FISA’s general programmatic purpose, to protect the nation against terrorists and espionage threats directed by foreign powers, has from its outset been distinguishable from ‘ordinary crime control.’”). If, contrary to Smith, Plaintiffs could be said to have any Fourth Amendment privacy interest that is implicated by collection of non-content telephony metadata, that interest would be minimal. Moreover, the intrusion on that interest would be mitigated still further by the 51 statutorily mandated restrictions on access to and dissemination of the metadata that are written into the FISC’s orders. See Primary Order, at 4-14. See also Maryland v. King, 133 S. Ct. 1958, 1979 (2013) (safeguards limiting DNA analysis to identification information alone reduced any intrusion into privacy); Board of Educ. of Indep. Sch. Dist. No. 92 of Pottawatomie Cnty. v. Earls, 536 U.S. 822, 833 (2002) (restrictions on access to drug-testing results lessened intrusion on privacy); Vernonia Sch. Dist., 515 U.S. at 658 (intrusion of urine-testing on privacy was reduced by fact that student athletes were tested only for illegal drugs and not for medical condition). On the other side of the balance, the collection and analysis of telephony metadata promote overriding public interests. The Government’s interest in identifying and tracking terrorist operatives for the purpose of preventing terrorist attacks is a national security concern of overwhelming importance. See Haig v. Agee, 453 U.S. 280, 307 (1981) (“no governmental interest is more compelling than the security of the Nation.”) (internal quotation marks omitted); In re Directives, 551 F.3d 1004, 1012 (FISC-R 2008) (“the relevant governmental interest—the interest in national security—is of the highest order of magnitude.”). Requiring individualized suspicion here would indeed be impracticable. The Government’s interests in identifying unknown terrorist operatives and preventing terrorist attacks cannot be as effectively achieved by requiring individualized suspicion to collect metadata, because such a requirement would not permit the type of historical analysis and contact chaining that the broader collection enables and to quickly identify contacts. See Aug. 29 FISC Op. at 20-22; Report on the National Security Agency’s Bulk Collection Programs for USA PATRIOT Act Reauthorization, at 5. Thus, given that the program might be rendered entirely infeasible, it would certainly be “impracticable” to require individualized suspicion in this context. See Von Raab, 489 U.S. at 665-66. 52 Thus, even if Plaintiffs had a reasonable expectation of privacy in telephony metadata, which they do not, the NSA’s acquisition of these data is reasonable and does not violate Plaintiffs’ Fourth Amendment rights. C. The NSA’s PRISM Collection Does Not Violate Plaintiffs’ Fourth Amendment Rights To the extent the Klayman II motion for preliminary injunction claims that the NSA’s PRISM collection violates Plaintiffs’ Fourth Amendment rights, Plaintiffs are unlikely to succeed on the merits of this claim as well. The Government has acknowledged that the NSA targets non-U.S. persons located overseas under its PRISM collection, pursuant to Section 702 of the FISA. See Oct. 3, 2011 FISC Op., 2011 WL 10945618, at *9 n.24; IC’s Collection Programs Under Title VII of the FISA, at 3. As discussed above, Plaintiffs have not alleged any facts that would suggest that their communications have been either targeted or incidentally collected under the PRISM collection, which in and of itself prevents them from succeeding on such a claim. But even if they could get past this hurdle, their Fourth Amendment claim would still fail because (i) the PRISM collection may target only non-U.S. persons located outside the United States, who lack Fourth Amendment rights altogether; (ii) any privacy interests in communications incidentally intercepted in a Section 702 acquisition are protected through minimization procedures required by Section 702 and approved by the FISC; (iii) foreign intelligence-gathering comes within the special governmental needs exception to the warrant requirement; and (iv) the PRISM collection is reasonable. Section 702 acquisitions may target only non-U.S. persons located outside the United States—who lack Fourth Amendment rights to begin with. See United States v. VerdugoUrquidez, 494 U.S. 259, 271 (1990) (holding that only persons who “have come within the territory of the United States and developed substantial connections” to the country have Fourth 53 Amendment rights). Because the Fourth Amendment does not protect such persons in the first instance, it cannot prevent the Government from subjecting them to surveillance without a warrant. To the extent Plaintiffs’ claim is that their communications were collected incidentally under the PRISM collection, the “incidental interception of a person’s conversations during an otherwise lawful surveillance is not violative of the Fourth Amendment.” United States v. Bin Laden, 126 F. Supp. 2d 264, 280 (S.D.N.Y. 2000) (citing, inter alia, United States v. Kahn, 415 U.S. 143, 157 (1974) (holding that interception of wife’s communications incident to lawful wiretap targeting husband’s communications did not violate the Fourth Amendment)). If it were otherwise, virtually all surveillance of foreign targets abroad would require a warrant, because there is almost always the possibility that a foreign target may communicate with a U.S. person. Had any of Plaintiffs’ communications been incidentally intercepted under PRISM, their privacy interests in those communications would be protected by the minimization procedures approved by the FISC under Section 702. By definition, minimization procedures under FISA must be reasonably designed to minimize the acquisition and retention, and to prohibit the dissemination, of private information concerning U.S. persons, to the extent consistent with the Government’s need to obtain, produce, and disseminate foreign intelligence information. 50 U.S.C. § 1801(h). In other words, such procedures by design aim to ensure that any intrusion on the privacy of U.S. persons is reasonably balanced against governmental intelligence needs. Such minimization procedures have been held constitutionally sufficient to protect third-parties in the domestic law enforcement context. See, e.g., United States v. Figueroa, 757 F.2d 466, 471 (2d Cir. 1985) (“Innocent parties are protected from unreasonable surveillance by the requirement contained in [Title III] that surveillance ‘shall be conducted in such a way as to minimize the interception of communications not otherwise subject to interception.’”) (citing Scott v. United States, 436 U.S. 128, 130-31 (1978)). This conclusion applies fully—if not more 54 forcefully—in the foreign intelligence context. See, e.g., In re Sealed Case, 310 F.3d at 740-41 (FISA’s requirement of minimization procedures supports statute’s reasonableness). Moreover, foreign intelligence-gathering serves a purpose beyond the normal need for law enforcement and therefore comes within the special governmental needs exception to the warrant requirement. As the FISC Court of Review has held, the Government’s “programmatic purpose” in obtaining foreign intelligence information is “to protect the nation against terrorist and espionage threats directed by foreign powers—‘a special need’ that fundamentally differs from ‘ordinary crime control.’” In re Sealed Case, 310 F.3d at 717. And, more specifically, the FISC “has previously concluded that the acquisition of foreign intelligence information pursuant to Section 702 falls within the ‘foreign intelligence exception’ to the warrant requirement of the Fourth Amendment.” Oct. 3, 2011 FISC Op., 2011 WL 10945618, at *24. Monitoring foreign targets located overseas under Section 702 is critical to protecting against foreign threats to national security and thus serves governmental interests of the highest order. Balanced against these important interests are the privacy interests of U.S. persons whose communications may be collected incidentally, but, as discussed above, any such interests are adequately protected by Section 702’s minimization procedures. The safeguards built into the statute provide reasonable assurance that the surveillance it authorizes will target only foreign persons outside the United States and will be conducted in a way that minimally affects the privacy of U.S. persons. The Fourth Amendment requires no more. V. PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY TO SUCCEED ON THEIR FIRST AMENDMENT CLAIM A. Good-Faith Investigatory Conduct Not Intended to Deter or Punish Protected Speech or Association Does Not Violate the First Amendment Plaintiffs’ First Amendment claim, that the metadata and content collections violate their freedom of speech and association, Klayman I Br. at 22-26; Klayman II Br. at 24-28, perishes in 55 the wake of their failed Fourth Amendment claim. Recognizing the need to accommodate the Government’s interests where prevention of crime, or, even more imperatively, potential threats to national security are concerned, see ACLU Found. v. Barr, 952 F.2d 457, 471 (D.C. Cir. 1991), courts distinguish for purposes of First Amendment analysis between government investigations that may have the incidental effect of deterring First Amendment activity, and concrete government action of a regulatory, proscriptive, or compulsory nature that is directed against individuals based on their expressive or associational activities. See Zurcher v. Stanford Daily, 436 U.S. 547, 564 (1978); Laird, 408 U.S. at 11; Reporters Comm. for Freedom of the Press v. AT&T, 593 F.2d 1030, 1051-53 (D.C. Cir. 1978). Accordingly, the law is clear that good faith governmental investigations conducted in observance of Fourth Amendment requirements, without purpose to deter or penalize protected expression or association, do not violate the First Amendment. See Reporters Comm., 593 F.2d at 1051-53; see also id. at 1051 (concluding that First Amendment protects activities “subject to the general and incidental burdens that arise from good faith enforcement of otherwise valid criminal and civil laws that are not themselves solely directed” at First Amendment conduct); see also Gordon v. Warren Consol. Bd. of Educ., 706 F.2d 778, 781 n.3 (6th Cir. 1983) (collecting cases). Here, Plaintiffs have not set forth competent evidence proving that the Government’s bulk metadata or targeted content collections are (or were) aimed at curtailing any of their First Amendment expressive or associational activities, or have had any purpose other than to identify terrorist operatives and prevent terrorist attacks. See Klayman I Br. at 22, 25-26, and Am. Compl. ¶¶ 3-4, 30-33, 38-39, 57. With respect to the only targeted program at issue here— PRISM under Section 702—Plaintiffs offer no evidence that their communications have been targeted or acquired under Section 702, which is directed at non-U.S. persons located outside the United States. Accordingly, Plaintiffs’ First Amendment claim has no prospect of success. 56 B. The Programs Plaintiffs Challenge Impose No Direct or Significant Burden on Plaintiffs’ Speech or Associational Rights Plaintiffs’ contention that the metadata and content collection programs should be subjected to “exacting scrutiny” because they impose a “significant” burden on Plaintiffs’ speech and associational rights, Klayman I Br. at 23-26; Klayman II Br. at 25-28, also fails as a matter of law and fact. First, as discussed above, the underlying premise of Plaintiffs’ argument—that the programs expose to government scrutiny all of Plaintiffs’ sensitive contacts with clients, associates, friends and relatives, as well as whistleblowers, and others with whom they might collaborate in their work—is without foundation. Plaintiffs neither allege nor offer any evidence that the metadata related to any of their communications (which do not include the names or addresses of anyone with whom Plaintiffs speak by phone) have ever been accessed or reviewed by NSA analysts for any purpose, whether as the results of queries based on the “reasonable, articulable suspicion” standard, or otherwise. Nor have Plaintiffs offered any evidence that they communicate with non-U.S. persons located overseas who could even be the targets of Section 702 collection, let alone set forth a single, concrete example that the contents of any of their communications have been targeted or incidentally collected pursuant to Section 702. Nor have Plaintiffs set forth any competent evidence of a “chilling effect” attributable to the challenged programs that interferes with their First Amendment rights of speech or association. The evidence proffered by Plaintiffs does not show that they themselves are actually or even subjectively “chilled” by Government’s activities under the challenged programs. Rather, apart from vague and conclusory assertions about the supposed “impact” of their subjective fears of surveillance on their “ability to communicate via telephone, email, and otherwise,” Klayman Aff. ¶ 11; Strange Aff.¶¶ 12-20, Plaintiffs offer no evidence of actually having been chilled from communicating or associating with anyone. Further, while Plaintiffs 57 speculate in their brief that third-parties who regard their associations with Mr. Klayman as confidential may be “chilled” from contacting him because of the challenged programs, see Klayman I Br. at 26; Klayman II Br. at 27-28, they provide no concrete evidence to substantiate this assertion, either. Moreover, any such chill, even if shown, would be attributable to these third parties’ own speculative fears of surveillance, not to conduct of the Government. Amnesty Int’l, 133 S. Ct. at 1152 n.7. These allegations fail to demonstrate an actual chill on speech or associational activity as required to support a First Amendment claim. See Harris v. Holder, 885 F. Supp. 2d 390, 400 (D.D.C. 2012) (“Where a party can show no change in [his] behavior, [he] has quite plainly shown no chilling of [his] First Amendment right to free speech.”) (internal quotations omitted; alterations added); Krieger v. DOJ, 529 F. Supp. 2d 29, 58 (D.D.C. 2008).35 Nor can Plaintiffs draw any meaningful parallel between the instant matter and compelled disclosure cases where courts have applied “exacting” First Amendment scrutiny to government conduct. In NAACP v. Alabama ex rel. Patterson, 357 U.S. 449 (1958), on which Plaintiffs principally rely, Klayman I Br. at 23-25; Klayman II Br. at 25-27, the Alabama courts had ordered the NAACP to produce local membership lists in connection with litigation to oust it from the State as an unregistered corporation. See 357 U.S. at 451-53. The Supreme Court held that Alabama could not compel the NAACP to disclose its membership lists because it “made an uncontroverted showing that on past occasions revelation of the identity of its rank-and-file members has exposed these members to economic reprisal, loss of employment, threat of physical coercion, and other manifestations of public hostility.” Id. at 462. “Under these circumstances,” the Court found it “apparent that compelled disclosure of [NAACP]’s Alabama 35 Indeed, while Plaintiff Klayman baldy alleges that the “NSA Program at issue in this case poses a substantial threat” to his ability to perform his political work as the Founder of Freedom Watch, Klayman Aff. ¶ 9, his affidavit details the ongoing activities of his “Reclaim America Now” movement, which includes an upcoming demonstration in Washington D.C. on November 19, 2013, id. ¶ 8. 58 membership” entailed a “substantial restraint” on the organization’s freedom of association. Id.; see also Brown v. Socialist Workers ’74 Campaign Comm., 459 U.S. 87, 98-99 (1982) (similarly holding unconstitutional the targeted, compelled disclosure of contributions to and expenditures by Socialist Workers Party, based on “substantial evidence” of harassment, threats, assaults, and reprisals against its members); Bates v. City of Little Rock, 361 U.S. 516, 523-24 (1960). In contrast, Plaintiffs present no evidence that NSA’s collection of communications under Section 702 targets Plaintiffs rather than non-U.S. persons located abroad. Nor do Plaintiffs allege, much less point to any evidence, that they communicate with such persons so as to make even incidental collection of their communications possible. Furthermore, the FISC orders authorizing the telephony metadata program are not based on the content of anyone’s communications, and do not compel Plaintiffs to disclose, or direct anyone else, including providers, to disclose names or addresses of Plaintiffs, their members, their clients, or anyone else with whom they associate (or expose them to the public hostility suffered by the parties in such cases as NAACP). See Primary Order at 3-9. Rather, the NSA obtains only numeric telephony metadata, to which analysts and investigators are permitted no access unless they are responsive to queries based on identifiers associated with foreign terrorist organizations. Id. Plaintiffs have neither alleged nor shown that any metadata of their calls have been retrieved or examined by NSA analysts as a result of such queries, or otherwise. Thus, even if this were a compelled-disclosure case, which it is not, Plaintiffs could not establish the “substantial evidence” of a direct and targeted encroachment on First Amendment rights required to trigger “exacting scrutiny,” as was the situation in many of the cases Plaintiffs cite.36 As the Supreme Court has explained, “exacting scrutiny” applies “to regulations that 36 For example, in Clark v. Library of Congress, the D.C. Circuit applied “exacting scrutiny” to a “targeted investigation of an individual based solely on the exercise of his 59 suppress, disadvantage, or impose differential burdens upon speech because of its content.” Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622, 642 (1994) (emphasis added); see also Clark, 750 F.2d at 94 (holding that exacting scrutiny applies to government surveillance “motivated solely by an individual’s lawful beliefs or associations”) (emphasis added). Plaintiffs fall well short of this threshold. They have not alleged or submitted any evidence that the telephony metadata program is (or that the Internet metadata program was) content-based, much less directed at curtailing or punishing free expression or association. See Klayman I Br. at 22-26; Klayman II Br. at 24-28. Nor have they alleged any facts suggesting that their communications have been either targeted or incidentally collected under Section 702. Plaintiffs’ failure to establish “direct and substantial” interference with their speech or associational rights brings the First Amendment inquiry—under exacting scrutiny, or any other standard—to an end. Accordingly, Plaintiffs’ First Amendment claim cannot support an award of preliminary relief. VI. PLAINTIFFS CANNOT DEMONSTRATE THAT THEY ARE LIKELY TO SUCCEED ON THEIR FIFTH AMENDMENT CLAIM Plaintiffs assert substantive and procedural due process claims that are plainly insubstantial and should be rejected. A. Plaintiffs’ Substantive Due Process Claim Should Be Dismissed as Duplicative of Their Fourth Amendment Claim Plaintiffs’ substantive due process argument is premised on an alleged liberty interest in the privacy of their communications. See Klayman I Br. at 26-27; Klayman II Br. at 28-29. However, “[w]here a particular Amendment ‘provides an explicit textual source of constitutional protection’ against a particular sort of government behavior, ‘that Amendment, not the more associational rights,” which resulted in “an extraordinary” full field investigation by the FBI. 750 F.2d 89, 93-95 (D.C. Cir. 1984). See also Elrod v. Burns, 427 U.S. 347, 350 (1976) (applying “exacting scrutiny” to claimed termination of public employees “solely for the reason that they were not affiliated with or sponsored by the Democratic Party”). 60 generalized notion of “substantive due process,” must be the guide for analyzing’these claims.” Albright v. Oliver, 510 U.S. 266, 273 (1994) (quoting Graham v. Connor, 490 U.S. 386, 395 (1989)). Because Plaintiffs ground their substantive due process claim on privacy interests allegedly protected by the Fourth Amendment, that claim cannot serve as an independent basis for issuing a preliminary injunction. See, e.g., Elkins v. Dist. of Columbia, 690 F.3d 554, 562 (D.C. Cir. 2012) (rejecting plaintiff’s attempt to use the Fifth Amendment to challenge allegedly unlawful search and seizure); Lyles v. Micenko, 468 F. Supp. 2d 68, 73 n.5 (D.D.C. 2006) (Leon, J.) (refusing to analyze Fourth Amendment claim under the rubric of substantive due process). B. Plaintiffs’ Procedural Due Process Claim Is Also Meritless. Plaintiffs also fail to state a viable procedural due process claim. They argue that the Government deprived them of the aforementioned privacy interests “the moment” the NSA “secretly collected, acquired, retained, searched, and used” information related to and contained in their communications without providing any pre-deprivation notice to Plaintiffs that would allow them to ascertain “what conduct may subject them to electronic surveillance.” Klayman I Br. at 27; Klayman II Br. at 28-29. Plaintiffs cite not a single authority for the proposition that the Government must give prior notice to persons before it may gather information about their communications as part of a classified, FISC-authorized, intelligence-gathering program conducted for purposes of protecting national security. That alone should be reason enough to reject this claim as a basis for awarding extraordinary injunctive relief. But even if the Court were to entertain this claim, it would not withstand analysis. To establish a violation of procedural due process, Plaintiffs must show that the Government deprived them of a “constitutionally protected [liberty or] property interest,” and that its “procedures in doing so do not satisfy procedural due process.” Simms v. Dist. of Columbia, 872 F. Supp. 2d 90, 95 (D.D.C. 2012); see also Gen. Elec. Co. v. Jackson, 610 F.3d 61 110, 117 (D.C. Cir. 2010). Even assuming that Plaintiffs retain a residual liberty interest in the privacy of their communications that is entitled to due-process protection above and beyond the protections already afforded by the Fourth Amendment, see Brown v. McHugh, No. 12-01071, -- F. Supp. 2d ---, 2013 WL 5310185, at *7 (D.D.C. Sept. 23, 2013) (Leon, J.) (“[O]nly after finding the deprivation of a protected interest do[es] [the Court] look to see if the [government’s] procedures comport with due process.”) (internal quotation omitted)), they are not “due” the predeprivation notice they demand. Where protected liberty interests are implicated, the determination of what process is due requires consideration of three factors: “(1) the significance of the private party’s protected interest, (2) the government’s interest, and (3) the risk of erroneous deprivation and ‘the probable value, if any, of the additional or substitute procedural safeguards.’” Gen. Elec. Co., 610 F.3d at 117 (quoting Mathews v. Eldridge, 424 U.S. 319, 335 (1976)). Due process “is not a technical conception with a fixed content unrelated to time, place and circumstances,” but rather, it “is flexible and calls for such procedural protections as the particular situation demands,” Gilbert v. Homar, 520 U.S. 924, 930 (1997) (internal quotation marks and citation omitted)), and, as relevant here, takes into account “essential national security considerations.” Gonzalez v. Freeman, 334 F.2d 570, 580 n.21 (D.C. Cir. 1964). Here, the Government’s interest in identifying terrorist operatives and intercepting their communications for the purpose of preventing terrorist attacks is a national security concern that far outweighs any residual privacy interest that Plaintiffs may have in their communications not already protected by the Fourth Amendment, and by the same token outweighs any risk of erroneous deprivation of that interest. “[N]o governmental interest is more compelling than the security of the Nation.” Haig v. Agee, 453 U.S. 280, 307 (1981). The NSA’s collection of 62 information about and the contents of telephonic and electronic communications thus promotes a governmental interest of the highest order. See, e.g., id.; In re Sealed Case, 310 F.3d at 746. Requiring the Government, however, to provide advance notice to every individual before acquiring information about his or her communications would be incompatible with the secrecy required for such intelligence-gathering programs, see supra at 29 & n.14, and fatal to their objectives. For example, if the Government disclosed to an individual associated with a foreign terrorist organization that his communications (and/or metadata related to them) were to be collected and subject to scrutiny by the Government, that individual, and his or her associates, could take steps to avoid detection and alter their plans, thus placing national security at greater risk.37 Due process does not require the Government to put national security at risk in such fashion by providing communications services subscribers the process that Plaintiffs demand. See Holder v. Humanitarian Law Project, 130 S. Ct. 2705, 2727 (2010); Jifry v. FAA, 370 F.3d 1174, 1184 (D.C. Cir. 2004). Plaintiffs’ Fifth Amendment claim is without merit and cannot serve as a predicate for issuing a preliminary injunction. VII. THE BALANCE OF EQUITIES AND THE PUBLIC INTEREST REQUIRE THAT AN INJUNCTION BE DENIED Finally, neither the public interest, nor a balancing of the equities, supports the issuance of a preliminary injunction here. Plaintiffs seek to enjoin the Government from continuing the 37 See Implementation, supra, 109th Cong. at 65 (2005) (statement of Robert Khuzami) (explaining that advance notice “could cause conspirators to accelerate the plot to a point where authorities are less prepared to prevent it or protect American lives. Or terrorists might abandon the plot, destroying evidence and taking flight, which would hinder prevention, capture and prosecution. The plot might later resurface, at a point when we are less prepared and more vulnerable.”); Shea Decl. ¶ 49. See also, e.g., Calero-Toledo v. Pearson Yacht Leasing Co., 416 U.S. 663, 679 (1974) (dispensing with pre-deprivation notice or hearing when exigent circumstances exist and the government demonstrates a “pressing need for prompt action”); Global Relief Found., Inc. v. O'Neill, 207 F. Supp. 2d 779, 803 (N.D. Ill. 2002) (“Due to the exigencies of national security and foreign policy considerations, the Executive Branch historically has not provided pre-deprivation notice in sanctions programs under [the International Emergency Economic Powers Act].”). 63 programs implicated by their allegations,38 to bar them from collecting information about Plaintiffs’ communications, to require them to segregate and destroy all such records, and to prohibit the Government Defendants from querying metadata collected under these programs using Plaintiffs’ identifiers. See Klayman I Br. at 30-31; Klayman II Br. at 32-33. The Court must balance Plaintiffs’ asserted irreparable harm if injunctive relief is denied against the harm to the public interest if it is granted. See Winter v. NRDC, 555 U.S. 7, 25 (2008). Whereas Plaintiffs failed to demonstrate irreparable harm, see supra at 25-26, the public has a strong interest in continuing the programs involving the bulk collection of telephony metadata and the targeted collection of communications under Section 702. The former program “is a valuable source of intelligence for the FBI that is relevant to FBI-authorized international terrorism investigations,” Holley Decl. ¶ 22, and the latter program “has produced and continues to produce significant intelligence that is vital to protect the nation against international terrorism and other threats.” Letter from DNI James R. Clapper and Attorney General Eric Holder to the Honorable John Boehner, Harry Reid, Nancy Pelosi, and Mitch McConnell (Feb. 2, 2012) (Exh. T, hereto). Courts accord great deference to the professional judgment of intelligence officials regarding counter-terrorism matters, and they are properly reluctant to interfere with those judgments. Humanitarian Law Project, 130 S. Ct. at 2727 (according deference to Executive judgments on national security). Given that “[e]veryone agrees that the Government’s interest in combating terrorism is an urgent objective of the highest order,” id. at 2724, and that the Court must be particularly mindful of an injunction’s “consequent adverse impact on the public interest 38 The pen/trap program involving the bulk collection of Internet metadata need not be analyzed here because the Government has, for operational and resource reasons, terminated this collection in 2011. See Clapper Letter dated July 25, 2013, Exh. J, supra, at 3. 64 in national defense,” Winter, 555 U.S. at 24, the public interest and the balance of the equities weigh strongly against enjoining the challenged programs.39 The balance of the equities also strongly favors denying Plaintiffs’ demand that the Government Defendants segregate and destroy and records of their communications (if any have been collected). Even if the Government Defendants possessed information concerning Plaintiffs’ communications, segregation of that information would be “extraordinarily burdensome,” could take six months to implement, and could ultimately have a degrading effect on the utility of the program if an injunction in this case precipitated successful requests for such relief by other litigants. See Shea Decl. ¶ 65. Plaintiffs’ demand that the Government Defendants destroy any such information now would essentially and improperly give them full relief on the merits at this preliminary stage. See Dorfmann v. Boozer, 414 F.2d 1168, 1173 n.13 (D.C. Cir. 1969) (“[A] preliminary injunction should not work to give a party essentially the full relief he seeks on the merits.”); Bradshaw v. Veneman, 338 F. Supp. 2d 139, 144–45 (D.D.C. 2004) (Friedman, J.) (“[A] hurried resolution in favor of plaintiffs is not the purpose of temporary or preliminary injunctive relief.”). CONCLUSION For the reasons stated above, Plaintiffs’ motions for preliminary injunctions should be denied. 39 While the Government Defendants acknowledge the public interest in ensuring that the government agencies comply with the law, as argued by Plaintiffs, see Klayman I Br. at 29-30; Klayman II Br. at 32, this interest has been and is being vindicated through the statutory framework for Sections 215 and 702 that involves stringent supervision and oversight by all three branches. See 50 U.S.C. § 1861(a), (b) (Executive must apply to the FISC for an order requiring the production of tangible things under Section 215), id. § 1861(g) (Executive minimization procedures); Letter from Ronald Weich to Rep. Silvestre Reyes (Dec. 14, 2009) (sharing information about the bulk collection of telephony metadata with Congress); see also 50 U.S.C. § 1881a(d), (e), (i) (judicial review of Section 702 Executive certifications, as well as targeting and minimization procedures); id. § 1881a(l) (semi-annual compliance reports by Executive to the FISC and to Congress). 65 Dated: November 12, 2013 Respectfully Submitted, STUART F. DELERY Assistant Attorney General JOSEPH H. HUNT Director, Federal Programs Branch ANTHONY J. COPPOLINO Deputy Branch Director /s/ James J. Gilligan JAMES J. GILLIGAN Special Litigation Counsel james.gilligan@usdoj.gov MARCIA BERMAN Senior Trial Counsel BRYAN DEARINGER RODNEY PATTON Trial Attorneys U.S Department of Justice Civil Division, Federal Programs Branch 20 Massachusetts Ave., N.W., Room 6102 Washington, D.C. 20001 Phone: (202) 514-3358 Fax: (202) 616-8470 Counsel for the Government Defendants

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?