KLAYMAN v. OBAMA et al
Filing
31
REPLY to opposition to motion re 13 MOTION for Preliminary Injunction filed by LARRY E. KLAYMAN, CHARLES STRANGE, MARY ANN STRANGE. (Attachments: # 1 Exhibit 1 - Letter to Senator Grassley, # 2 Exhibit 2 -- Supplemental Affidavit of Larry Klayman, # 3 Exhibit 3 -- NSA Touhy Request, # 4 Text of Proposed Order)(Klayman, Larry)
IN UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
LARRY KLAYMAN, et. al
Plaintiffs,
v.
Civil Action No. 13-CV-881
and
Civil Action No. 13-CV-851
BARACK HUSSEIN OBAMA II, et. al
Defendants.
[PROPOSED] MEMORANDUM OF OPINION AND ORDER GRANTING
PLAINTIFFS' MOTIONS FOR PRELIMINARY INJUNCTION
Plaintiff, Larry Klayman, (“Klayman”), a former U.S. Department of Justice prosecutor,
Plaintiff Michael Ferrari, (“Ferrari”), Plaintiff Charles Strange, (“Strange”), and Plaintiff Matt
Garrison, (“Garrison”), (collectively “Plaintiffs”), have moved for a preliminary injunction,
pursuant to Federal Rule of Civil Procedure (“FRCP”) 65, to enjoin the National Security
Agency ("NSA" or "Defendants") from continuing their illegal mass warrantless surveillance of
ordinary Americans without reasonable suspicion or probable cause and to order Defendants to
comply with statutory and constitutional laws.
Having considered the motion, the opposition thereto, the record of the case, and the
argument of counsel at the hearing, the Court finds that Plaintiffs have demonstrated a
substantial likelihood of succeeding on the merits, that they are likely to suffer irreparable harm
without a preliminary injunction, that a preliminary injunction would not substantially injure the
other parties, and that the public interest would be furthered by granting the order. Accordingly,
the Court GRANTS Plaintiffs' Motion for a preliminary injunction enjoining Defendants from
exceeding statutory and constitutional authority and further ORDERS Defendants to comply
with any and all applicable laws.
1
I.
PROCEDURAL HISTORY
The National Security Agency ("NSA") has been collecting mass amounts of telephonic
and online metadata in violation of the Patriot Act and the First, Fourth, and Fifth Amendments
to the U.S. Constitution. Until recently, the public knew little about Defendants' mass
surveillance tactics. It was not until the actions of key NSA whistleblower, Edward Snowden,
that the American people became aware of Defendants' mass, secretive surveillance, such as
obtaining unlawful orders through the Foreign Intelligence Surveillance Court ("FISC") directing
Verizon to turn over ALL communication records on an ongoing daily basis in addition to
implementing mass surveillance programs, including the PRISM program, designed to collect
communication records of U.S. Citizens. Verizon Compl. ¶¶3, 8; PRISM Compl. ¶2. Plaintiffs
subsequently filed two separate class action lawsuits challenging the legality of Defendants’
secret and illicit schemes to systematically gather, intercept and analyze vast quantities of
telephonic and online “metadata” of U.S. citizens.
On June 12, 2013, Plaintiffs filed a class action Complaint seeking monetary, declaratory,
equitable, and injunctive relief as a result of Defendants' illicit and warrantless surveillance
program, PRISM, which not only violated Plaintiffs' constitutional rights under the First, Fourth,
and Fifth Amendments but also infringed on Plaintiffs' privacy rights and due process rights.
PRISM Compl. ¶2. The PRISM lawsuit also challenges Defendants' expansive acquisition of
Plaintiffs’ telephonic and online communication records under Section 215 of the Patriot Act, 50
U.S.C. §1860 through the PRISM surveillance program1, which monitors and intercepts
communication data from telephone and internet companies such as Skype, Google, Youtube,
AOL, Yahoo!, Facebook, Paltalk, AT&T, Sprint, and Microsoft. Id.
1
The PRISM program did not receive a court order from the FISA court.
2
In addition to the PRISM action, on June 9, 2013, Plaintiffs filed a Complaint challenging
the legality of the "Verizon Order," a top-secret order issued by the Honorable Roger Vinson, a
judge of the FISC, which compelled the disclosure of all call detail records in possession of
Verizon Telecommunication for analysis by the NSA on an ongoing daily basis.2
Pursuant to its secret surveillance tactics, the NSA intercepted telephone and email/internet communications that originated or terminated inside the United States. Said
communications were, and/or being, collected by the NSA without reasonable suspicion or
probable cause, and without obtaining a warrant or any other proper type of judicial
authorization.
On October 29, 2013, Plaintiffs filed, in both cases, a Motion for Preliminary Injunction
seeking to enjoin Defendants from continuing their illegal mass warrantless surveillance of
ordinary Americans without reasonable suspicion or probable cause and to order Defendants to
comply with statutory and constitutional laws. Defendants filed an Opposition to Plaintiffs'
Motions for Preliminary Injunctions on November 12, 2013 (despite this Court's Order that the
deadline for Defendants to file their Opposition was November 11, 2013). The matter regarding
the issuance of a preliminary injunction was set for hearing on November 18, 2013.
II.
JURISDICTION
This Court has jurisdiction over the subject matter of this case and it has jurisdiction over
all the parties hereto pursuant to 28 U.S.C. §1331. 28 U.S.C. §1331 states, in pertinent part,
"[t]he district courts shall have original jurisdiction of all civil actions arising under the
Constitution, laws, or treaties of the United States." Venue is proper under 28 U.S.C. §1391.
2
Compl. ¶26; See, In re Application of the FBI for an Order Requiring the Production of
Tangible Things from Verizon Bus. Network Servs., Inc. on Behalf of MCI Commc’n Servs., Inc.
d/b/a Verizon Bus. Servs., No. BR 13-80 (FISA Ct. Apr. 25, 2013) (“Verizon Order”).
3
This Court has supplemental jurisdiction pursuant to 28 U.S.C. §1367, which states in
pertinent part, "…in any civil action of which the district courts have original jurisdiction, the
district courts shall have supplemental jurisdiction over all other claims that are so related to
claims in the action within such original jurisdiction that they form part of the same case or
controversy under Article III of the U.S. Constitution. Additionally, this Court has authority to
grant a preliminary injunction and other appropriate relief pursuant to FRCP Rule 65.
III.
STANDING
Plaintiffs have standing under Article III. They have suffered an injury because they are
U.S. citizens who have, at all material times, been subscribers, users, customers, and otherwise
have availed themselves to Verizon, Facebook, Yahoo, Google, Microsoft, YouTube, AOL,
PalTalk, Skype, Sprint, AT&T, and/or Apple. PRISM Compl. ¶ 1; Verizon Compl. ¶ 1. Plaintiffs'
communications have been, and continue to be, monitored by Defendants under the Verizon
Order and/or Defendants’ PRISM surveillance program PRISM Mot. for Preliminary Injunction
at 4 (hereafter "Mot. for PI").
The injury is plainly traceable to the conduct they challenge—that is, to Defendants’
collection of their call records as well as their internet communications and activities. And the
injury would be redressed by the relief they seek—principally, an injunction against their mass
warrantless surveillance tactics. The practice is akin to snatching every American’s address
book—with annotations detailing whom they spoke to, when they talked, for how long, and from
where. Verizon Compl. ¶ 28. The collection of Plaintiffs’ communication records, specifically
telephonic and online metadata belonging to Plaintiffs, is itself an injury sufficient for Article III;
indeed, the collection of Plaintiffs’ records constitutes a gross invasion of their privacy. PRISM
Compl. ¶10.
4
Defendants have acknowledged that it has engaged in such metadata collection.
Specifically, in regard to the PRISM surveillance program, Defendants have essentially
confirmed the existence of the wide-ranging program known as PRISM, which allows the NSA
to directly tap into consumer data from telephone and internet communication service providers,
including Apple, Google, Yahoo!, Microsoft, Facebook, Skype, and others. Mot. for PI at 10-11.
In addition, the Primary Order/Verizon Order indicates that every time the NSA queries the callrecords database, it reviews everyone’s records—Plaintiffs’ among them—to determine whether
they, their contacts, or their contacts’ contacts are connected to a phone number that the NSA
deems suspicious. See Primary Order at 6–7, 11.
In any event, there can be no dispute that the bulk collection of Plaintiffs’ communication
records gives them the stake in this litigation that Article III requires. Courts frequently analyze
third-party challenges to records requests at the merits stage, rather than as a question of
standing. See, e.g., Local 1814, Int’l Longshoremen’s Ass’n v. Waterfront Comm’n of N.Y.
Harbor, 667 F.2d 267, 270 (2d Cir. 1981).Plaintiffs’ First Amendment claim asserts a direct
intrusion into their associational privacy, not just a chilling effect. PRISM Compl. ¶ 76-78.
This intrusion and the resulting injury is complete when Defendants collect Plaintiffs’
communication records—regardless whether the surveillance ultimately dissuades any third
party from communicating with them. Additionally, Plaintiffs suffer a further, discrete injury
because of the program’s chilling effect on their key contacts and sources. As way of example,
Plaintiff Larry Klayman is an attorney and, more significantly, is the founder, chairman, and
general counsel of Freedom Watch, an organization devoted to promoting and preserving civil
liberties and individual rights. Mot. for PI at 13-19. As an attorney, Plaintiff Klayman routinely
communicates by phone and by email with existing and potential clients about their legal
5
representation, discusses confidential issues, and engages in legally privileged attorney-client
and other privileged or private communications regarding ongoing legal proceedings. Klayman
Aff. at ¶¶5, 10. Defendants’ illegal surveillance directly and significantly impacts Plaintiff
Klayman’s ability to communicate via telephone, email, and otherwise, out of fear that his
confidential, private, and often legally privileged communications will be overheard or obtained
by the NSA’s surveillance program. Klayman Aff. at ¶¶9, 10. Defendants’ overly broad, highly
intrusive illicit surveillance program has and will continue to dissuade, potential clients and
others from contacting Plaintiff Klayman, fearing reprisal, and, additionally, compromises
Plaintiff Klayman’s ability to serve their clients’ interest and Freedom Watch’s organizational
goals. Klayman Aff. at ¶10. With public knowledge and wide disclosure of the NSA's
surveillance, the NSA's monitoring has and will continue to dissuade crucial contacts from
associating with Plaintiff. Id. Because he now fears that his telephone conversations and emails
are being monitored -- because they are -- Plaintiff Klayman no longer engages in sensitive
attorney-client conversations over the phone or by email. Supplemental Klayman Aff. at ¶13.
Plaintiff Klayman has been forced to travel to meet with clients in order to ensure that his
conversations are indeed private. Supplemental Klayman Aff. at ¶14. This constant travel has
come as a great expense to Plaintiff Klayman. Id.
The NSA seems to believe that there is something implausible about the notion that the
NSA’s surveillance might chill lawful expression and association, but “[i]t is hardly a novel
perception that compelled disclosure of affiliation with groups engaged in advocacy may
constitute [an] effective . . . restraint on freedom of association.” NAACP v. Alabama, 357 U.S.
449, 462 (1958); Talley v. California, 362 U.S. 60, 64 (1960).
IV.
STATUTORY AND REGULATORY
6
BACKGROUND AND FRAMEWORK
Defendants’ surveillance program is ostensibly based on Section 215 of the Patriot Act,
which allows Defendants to obtain an order requiring the production of “any tangible things”
upon a “showing that there are reasonable grounds to believe that the tangible things sought are
relevant to an authorized investigation (other than a threat assessment)…to obtain foreign
intelligence information not concerning a United States person or to protect against international
terrorism or clandestine intelligence activities.” (emphasis added) 50 U.S.C. §1860.
In 1978, Congress enacted the Foreign Intelligence Surveillance Act (“FISA”) to regulate
government surveillance conducted for foreign-intelligence purposes. Congress adopted FISA
after the Supreme Court held, in United States v. U.S. District Court (Keith), 407 U.S. 297
(1972), that the Fourth Amendment does not permit warrantless surveillance in intelligence
investigations of domestic security threats. In enacting FISA, Congress created the Foreign
Intelligence Surveillance Court (“FISC”) and empowered it to grant or deny government
applications for surveillance orders in foreign intelligence investigations. 50 U.S.C. § 1803(a).
The provision at issue in this case was originally added to FISA in 1998. See 50 U.S.C.§§
1861–1862 (2000 ed.). The Patriot Act and several successor bills modified that provision in
several respects. In its current form, the statute—commonly referred to as Section 215—allows
the government to obtain an order requiring the production of “any tangible things” upon a
“showing that there are reasonable grounds to believe that the tangible things sought are relevant
to an authorized investigation (other than a threat assessment) . . . to obtain foreign intelligence
information not concerning a United States person or to protect against international terrorism or
clandestine intelligence activities.” Id. § 1861(b)(2)(A). While the amendments to this provision
expanded the government’s investigative power, this expansion was not without limits. For
7
example, language added by the Patriot Act prohibits the government from using the provision to
obtain tangible things that could not be obtained through analogous mechanisms.
V.
FACTUAL BACKGROUND
The National Security Agency ("NSA") has been collecting mass amounts of telephonic
and online metadata in violation of the Patriot Act and the First, Fourth, and Fifth Amendments
to the U.S. Constitution. Until recently, the public knew little about Defendants’ use of Section
215. It was not until the actions of key NSA whistleblower Edward Snowden that the American
people became aware of Defendants’ illegal actions. Glen Greenwald, "XKeyscore: NSA tool
collects 'nearly everything a user does on the internet'," The Guardian (July 31, 2013),
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. Plaintiffs
filed two lawsuits, first challenging the constitutionality of the NSA's actions in collecting
telephony metadata from Verizon as a result of secret FISA court orders. Specifically, on June
12, 2013, Plaintiffs filed suit challenging the legality of Defendants’ secret and illicit scheme to
systematically gather, intercept and analyze vast quantities of telephonic and online “metadata”
of U.S. citizens through the NSA's PRISM program3, which would monitor and intercept
communications from internet companies such as Skype, Google, Youtube, AOL, Yahoo!,
Facebook, Paltalk, AT&T, Sprint, and Microsoft. On June 9, 2013, Plaintiffs filed suit
challenging the legality of Verizon Order. Pursuant to its secret surveillance program, the NSA
intercepted telephone and e-mail/internet communications that originated or terminated inside
the United States. Said communications were, and/or being, collected by the NSA without
probable cause, and without obtaining a warrant or any other proper type of judicial
authorization.
3
The PRISM program did not receive a court order from the FISA court.
8
(i)
Defendants’ PRISM Program
Since 2007, the NSA implemented a highly classified, unlawful mass surveillance
program, referred to as PRISM, which is an internal computer system that operates through
compelled “partnerships” with major internet companies such as Defendants, who provide
Internet, email, social networking, and the like to millions of Americans that use these services
as a primary means of communication. Compl. ¶¶3, 8; See also, James Ball "NSA stores
metadata of millions of web users for up to a year, secret files show," The Guardian, (Sept. 30,
2013), www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents.
PRISM allows the NSA to directly access and retrieve private electronic data belonging to all
users and customers of Defendants’ online services. PRISM Compl. ¶7; See, i.e. HJC Hearing at
29:33–36:00 (testimony of John C. Inglis, NSA Deputy Director).
In collaboration with these internet companies, PRISM allows the NSA to directly access
and retrieve private electronic data belonging to all users and customers of Defendants’ online
services. According to Snowden, he, sitting at his desk, could "wiretap anyone, from you or your
accountant, to a federal judge or even the president, if I had a personal email".4 Glen Greenwald,
"XKeyscore: NSA tool collects 'nearly everything a user does on the internet'," The Guardian
(July 31, 2013), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-onlinedata. In fact, programs such as PRISM were used to illegally wiretap Chancellor Angela
Merkel of Germany. See Alison Smale and David E. Sanger, "Spying Scandal Alters U.S. Ties
4
Pursuant to Federal Rules of Evidence Rule 804, the following is not excluded by the hearsay
rule if the declarant is unavailable as a witness: “Declaration Against Interest: A statement which
was at the time of its making so far contrary to the declarant's pecuniary or proprietary interest,
or so far tended to subject the declarant to civil or criminal liability, or to render invalid a claim
by the declarant against another, that a reasonable person in the declarant's position would not
have made the statement unless believing it to be true. A statement tending to expose the
declarant to criminal liability and offered to exculpate the accused is not admissible unless
corroborating circumstances clearly indicate the trustworthiness of the statement.”
9
With Allies and Raises Talk of Policy Shift," The New York Times (November 11, 2013),
http://www.nytimes.com/2013/11/12/world/spying-scandal-alters-us-ties-with-allies-and-raisestalk-of-policy-shift.html. The data obtained by the NSA through PRISM not only includes the
contents of emails, chats, VoIP calls, and cloud-stored files, and more but also provides the
Agency with online metadata, such as email logs, geolocation data (IP addresses), and web
search activities, which can be just as revealing as the content. Compl. ¶7.
The metadata gathered through PRISM allows the NSA to build comprehensive profiles
of ordinary Americans, including their social connections, familial, political, professional,
religious, and personal associations, speech, location, and public movements, while revealing
personal, intimate, and, often times, extremely sensitive details about an individual. Under
PRISM, the NSA has direct access to records detailing the daily activities, interactions, social,
political, and personal associations, as well as private and intimate facts of millions of ordinary
Americans.
(ii)
Verizon Order
On April 25, 2013, Defendant Judge Roger Vinson issued a highly classified order
directing the Custodian of Records of Verizon Business Network Services, Inc. ("Verizon") to
produce, and to continue production on an ongoing daily basis thereafter, the following tangible
things to the NSA: all call detail records or “telephony metadata” created by Verizon for
communication (i) between the United States and abroad; or (ii) wholly within the United States,
including local calls. In re Application of the FBI for an Order Requiring the Production of
Tangible Things from Verizon Bus. Network Serv., Inc. on Behalf of MCI Commc’n Serv., Inc.
D/B/A Verizon Bus. Serv., Dkt. No. BR 13-80 at 1-2 (FISA Ct. Apr. 25, 2013) (hereinafter
“Verizon Order”).
10
“Telephony metadata includes comprehensive communications routing information,
including, but not limited to, session identifying information (e.g. originating and terminating
telephone number, International Mobile Subscriber Identity (IMSI) number, International Mobile
station Equipment Identity (IMEI) number, etc.), trunk identifiers, telephone calling card
numbers, and time and duration of call.” Compl. The “call detail records” referred to in the
Verizon Order likely include “[a]ny information that pertains to the transmission of specific
telephone calls, including, for outbound calls, the number called, and the time, location, or
duration of any call and, for inbound calls, the number from which the call was placed and the
time, location, or duration of any call.” 47 C.F.R. §64.2003 (2012) (defining “call detail
information”).
Defendants have disclosed that the Verizon Order was issued as part of a broader
program that has been in place for seven years and that involves the collection of information
about virtually every phone call, domestic and international, made or received in the United
States. Administration White Paper: Bulk Collection of Telephony Metadata Under Section 215
of the USA PATRIOT Act 1 (Aug. 9, 2013), http://bit.ly/15ebL9k (“White Paper”); Dep’t of
Justice, Report on the National Security Agency’s Bulk Collection Programs for USA PATRIOT
Act Reauthorization 3 (Feb. 2, 2011), http://1.usa.gov/1cdFJ1G.
The Primary Order and the administration’s White Paper explain how Defendants
analyze and disseminate information housed in the massive database assembled by the call
tracking program. Specifically, the documents indicate that the NSA is permitted to query this
database when a “designated approving official” at the NSA determines that “there are facts
giving rise to a reasonable, articulable suspicion (RAS) that the selection term to be queried is
11
associated with” a “foreign terrorist organization.” Primary Order at 7. Defendants have
acknowledged that the NSA has violated the Primary Order’s restrictions on multiple occasions.
White Paper at 5. (“Since the telephony metadata collection program under Section 215 was
initiated, there have been a number of significant compliance and implementation issues that
were discovered as a result of DOJ and ODNI reviews and internal NSA oversight.”). White
Paper at 5.
(iii)
NSA'S Repeated Pattern of Lying Regarding Mass Surveillance, NonCompliance with Court Orders, and Engaging in Illegal Surveillance Tactics.
As an initial matter, this Court, cannot rely on the statements made by the NSA in their
pleadings, particularly as the NSA has shown a pattern of lying to the American people, raising a
strong inference of their continuing deceptive allegations. Defendants’ deceptive conduct has
been evidenced through numerous instances of unlawful actions, including repeatedly misleading
the FISC, presenting inaccurate statements in court filings, making false misrepresentations, and
exceeding the bounds of the surveillance as set forth in court orders. See Nicole Perlott, Jeff
Larson, and Scott Shane, “N.S.A. Able to Foil Basic Safeguards of Privacy on Web,” The New
York Times (Sept. 5, 2013) http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internetencryption.html. More than deeply troubling are the number of misleading statements senior
officials have made about domestic surveillance and the extent of Defendants’ false
misrepresentations and blatant lies. In fact, James Clapper, the Director of National Intelligence,
lied under oath during a congressional hearing by denying that the NSA was collecting mass
quantities of domestic communication records. Specifically, Clapper was asked during a hearing
in March by Sen. Ron Wyden if the NSA gathered “any type at all on millions or hundreds of
12
millions of Americans.”5 Clapper initially answered definitely: “No.” When pressed by Widen,
Clapper changed his answer. “Not wittingly,” he said. “There are cases where they could
inadvertently perhaps collect, but not wittingly.” Clapper now admits that his testimony is a
“clearly erroneous” lie. In addition, the Obama administration has been caught lying in one
scandal after another, including but not limited to Obamacare, Benghazi, the IRS, and Fast and
Furious, just to name a few.
The FISC has made findings of repeated violations of court orders. In 2011, the
Honorable John D. Bates, then serving as chief judge on the FISC, admonished the NSA for
repeatedly violating the requirements and limitations set forth by Court Orders, privacy laws, and
the U.S. Constitution. As Judge Bates emphasized, “[c]ontrary to the government’s repeated
assurances, N.S.A. has been routinely running queries of the metadata using querying terms that
did not meet the standard for querying,” and that this requirement had been “so frequently and
systematically violated that it can fairly be said that this critical element of the overall…regime
has never functioned effectively.” Charlie Savage and Scott Shane, “Secret Court Rebuked
N.S.A. on Surveillance,” The New York Times, (Aug. 21, 2013).
http://www.nytimes.com/2013/08/22/us/2011-ruling-found-an-nsa-programunconstitutional.html?r=0.
Judge Bates further emphasized the NSA's unlawful conduct and egregious and illicit
surveillance tactics, by stating:
"The Court is troubled that the government's revelations regarding NSA's acquisition of
Internet transactions mark the third instance in less than three years in which the
government has disclosed a substantial misrepresentation regarding the scope of a major
collection program. In March, 2009, the Court concluded that it s authorization of NSA's
See, “Clapper apologizes for ‘erroneous’ answer on NSA.” http://news.yahoo.com/clapperapologizes-erroneous-answer-nsa-221238030.html (summarizing Clapper’s misleading
statements to Congress on the extent of U.S. surveillance on U.S. citizens).
5
13
bulk acquisition of telephone call detail records from [redacted] in the so-called "big
business records" matter "ha[d] been premised on a flawed depiction of how the NSA
uses [the acquired] metadata," and that "[t]his misperception by the FISC existed from
the inception of its authorized collection in May 2006, buttressed by repeated inaccurate
statements made in the government's submissions…"
Memorandum Opinion, In re Government's Ex Parte Submission of Reauthorization
Certification and Related Procedures, Ex Parte Submission of Amended Certifications, and
Request for an Order Approving Such Certification and Amended Certification (FISC Ct. Oct. 3.
2013) at fn. 14.
Defendants have continuously engaged in a pattern of non-compliance with respect to the
NSA’s handling of produced information, as demonstrated through publicly released FISC orders
addressing the NSA’s surveillance and requests for production of information. In her Amended
Memorandum Opinion, dated August 29, 2013, the Honorable Claire V. Eagan recognized and
acknowledged Defendants’ repeated lack of adherence to minimization procedures implicit in the
authorization to compel production of the documents, stating, “[t]he Court is aware that in prior
years there have been incidents of non-compliance with respect to NSA’s handling of produced
information.” Amended Memorandum Opinion, In Re Application of the Federal Bureau of
Investigation For An Order Requiring the Production Of Tangible Things From [Redacted],
(FISC Ct. Aug. 29, 2013) at n.9.
Similarly, in an order issued by the FISC on March 2, 2013, questioning the credibility,
trustworthiness, and ability for Defendants to fully comply with court orders, the Honorable
Reggie B. Walton held, “[i]n light of the scale of this bulk [telephone records] collection
program, the Court must rely heavily on the government to monitor this program to ensure that it
continues to be justified…and that it is being implemented in a manner that protects the privacy
interests of U.S. persons as required by applicable minimization procedures. To approve such a
14
program, the Court must have every confidence that the government is doing its utmost to ensure
that those responsible for implementation fully comply with the Court’s orders. The Court no
longer has such confidence.” [emphasis added] In Re Production of Tangible Things
[Redacted], Dkt. No: BR. 08-13 (FISA Ct. March 2, 2009).
Moreover, NSA Inspector General George Ellard admitted that since 2003, there have
been “12 substantiated instances of intentional misuse” of “surveillance authorities.” See
Attached Touhy Letter with Attached Documents Requesting Authentication From the NSA,
Exhibit 1. (Letter of NSA Inspector General George Ellard to Senator Chuck Grassley.) About
all of these cases involved an NSA employee spying on a girlfriend, boyfriend, or some kind of
love interests. Jake Gibson, “Too tempting? NSA watchdog details how officials spied on love
interests,” FOX News, (Sept. 27, 2013).
The actions of the NSA went beyond scope of the Patriot Act, and, as such, these actions
are unconstitutional, in violation of the First, Fourth, and Fifth Amendments to the U.S.
Constitution.
VI.
CONCLUSIONS OF LAW
A.
Standard for Preliminary Injunctive Relief
This Court may issue a preliminary injunction only when the movant demonstrates: (1) a
substantial likelihood of success on the merits; (2) that it would suffer irreparable injury if the
injunction is not granted; (3) that an injunction would not substantially injure other interested
parties; and (4) that the public interest would be furthered by the injunction. Mova Pharm. Corp.
v. Shalala, 140 F.3d 1060, 1066 (D.C. Cir. 1998) (quoting CityFed Fin. Corp. v. Office of Thrift
Supervision, 58 F.3d 738, 746 (D.C. Cir. 1995). "These factors interrelate on a sliding scale and
15
must be balanced against each other." Serono Labs., Inc. v. Shalala, 158 F.3d 1313, 1318 (D.C.
Cir. 1998).
(1)
Plaintiffs have Demonstrated a Substantial Likelihood of Success on the Merits
Plaintiffs will suffer irreparable injury if preliminary relief is not granted, and they are
substantially likely to succeed on the merits of their claims. The mass call-tracking program is
ostensibly based on Section 215 of the Patriot Act but the program disregards that provision’s
core requirements, including its “relevance” requirement. The program violates the Fourth
Amendment because the surveillance carried out is warrantless and unreasonable, and it violates
the First Amendment because it substantially and unjustifiably burdens Plaintiffs’ associational
rights when more narrow methods could be used to achieve Defendants’ ends.
(2)
Plaintiffs Will Suffer Irreparable Harm
Plaintiffs will suffer irreparable harm absent a preliminary injunction, restraining Defendants
from continuing their unlawful surveillance of Plaintiffs especially during this proceeding.
Plaintiffs assert injuries resulting from the mass call-tracking surveillance program engaged in by
Defendants, which violate Plaintiffs’ First, Fourth, and Fifth Amendment rights as well as the
program’s violation of Section 215 of the Patriot Act. Without a preliminary injunction,
Defendants would inherently have a significantly greater and substantially unfair advantage in
this lawsuit, especially during the pendency of this action, thus depriving Plaintiffs of their right
to a fair trial.
Additionally, courts have consistently held that a colorable constitutional violation gives
rise to a showing of irreparable harm. See Mills v. District of Columbia, 571 F.3d1304, 1312
(D.C. Cir. 2009) (a constitutional violation and loss of constitutional protections "'for even
minimal periods of time, unquestionably constitutes irreparable injury'") (quoting Elrod v.Burns,
16
427 U.S. 347, 373 (1976)); see also Serets-Khama v. Ashcroft, 215 F. Supp. 2d 37, 53 (D.D.C.
2002) (deprivation of constitutional protection "is an undeniably substantial and irreparable
harm"). Plaintiffs are subjected to ongoing, intrusive, and unlawful surveillance as a result of the
mass call tracking surveillance program implemented by Defendants, who do not have the proper
statutory or constitutional authority to engage in such warrantless, mass surveillance tactics,
through obtaining such orders as the Verizon Order and implementing programs such as the
PRISM program.
(3)
Defendants Will Not be Substantially Harmed by an Issuance of a Preliminary
Injunction
Defendants cannot be said to be “burdened” by a requirement to comply with the law.
Defendants are already defending against constitutional challenges to its mass call tracking
surveillance program, both in court and in Congress. Unless and until such challenges are
resolved, Defendants should not be permitted to continue its highly intrusive surveillance tactic
and collection of vast quantities of communication records, particularly where, as here, there are
legitimate questions of agency overreach.
(4)
Public Interest
The public interest prong is met because “there is an overriding public interest…in the
general importance of an agency’s faithful adherence to its statutory mandate.” Jacksonville Port
Auth. V. Adams, 556 F.2d 52, 59 (D.C. Cir. 1977). The public has a substantial interest in
Defendants following the law. See, e.g., In re Medicare Reimbursement Litigation, 414 F.3d 7,
12 (D.C. Cir. 2005 (Additional administrative burden “[would] not outweigh the public’s
substantial interest in the Secretary’s following the law.”) O'Donnell Const. Co. v. District of
Columbia, 963 F.2d 420, 429 (D.C. Cir. 1992) (holding that "issuance of a preliminary
injunction would serve the public's interest in maintaining a system of laws" free of
17
constitutional violations). See also Seretse-Khama v. Ashcroft, 215 F. Supp. 2d 37, 54 (D.D.C.
2002), (holding that the public interest is served by a court order that avoids "serious
constitutional risks"); N. Mariana Islands v. United States, 686 F. Supp. 2d 7, 21 (D.D.C. 2009)
(noting "the general public interest served by agencies' compliance with the law"); Cortez III
Serv. Corp. v. Nat'l Aeronautics & Space Admin., 950 F. Supp. 357, 363 (D.D.C. 1996) (public
interest served by enforcing constitutional requirements).
Given Defendants’ fundamental defects in complying with court orders and their
substantially likely constitutional violations, the public interest will be served if this Court
preliminarily enjoins Defendants from continuing their warrantless, unlawful surveillance.
III.
CONCLUSION
In accordance with the memorandum opinion issued this date, and upon consideration of
the Plaintiffs' Motion for a Preliminary Injunction, the opposition thereto, the reply brief, the
applicable law, and the arguments made by counsel during the hearing conducted by the Court
on this matter, it is hereby ORDERED that the Plaintiffs' Motion for the Preliminary Injunction
is GRANTED; and it is further ORDERED that the Court hereby enters the following
preliminary injunction.
1.
The Court hereby preliminary RESTRAINS AND ENJOINS Defendants, its
agents, servants, employees, attorneys, and all others in active concert or participation with
Defendants, from implementing surveillance procedures, tactics, and programs that exceed
statutory authority and constitutional provisions.
2.
Defendants are further ORDERED to comply with any and all laws regarding the
Defendants’ authority, power, and limits in conducting such mass warrantless domestic
18
surveillance, including, but not limited to, Section 215 of the Patriot Act, Section 702 of the
FISA Amendment Act, and the provisions of the U.S. Constitution.
3.
It is further ORDERED that within twenty (20) days of this date, Defendants must
submit declarations and any pertinent records, reports, and/or other documents to the Court
regarding compliance with any and all minimization procedures implemented to prevent further
warrantless collection of records belonging to U.S. Citizens without reasonable suspicion or
probably cause, any and all incidences of non-compliance, identification of any and all "targets"
subject to Defendants' surveillance, and all other relevant reports, risk assessments, memoranda,
and other documents. In the event that the records, reports, and/or other documents contain
classified information, Defendants shall present such information in camera to the Court.
4.
The plaintiffs, in accordance with their discovery rights reaffirmed in Section 3,
may take discovery regarding Defendants' declarations. The Plaintiffs must file any responses to
Defendants submissions under this section within thirty (30) days of the completion of the
Plaintiffs' discovery. The Court will consider the parties' submissions, conduct any necessary
evidentiary hearing, and order further relief as appropriate.
5.
It is further ORDERED that proper procedures shall be taken by Plaintiffs'
counsel to obtain a security clearance in order to conduct said discovery.6
6.
It is further ORDERED, in accordance with the Federal Rules of Civil Procedure,
that the Plaintiffs' discovery rights are reconfirmed.
a.
The Plaintiffs may take discovery, by deposition or otherwise, regarding
any pertinent records, reports, and/or other documents to the Court regarding compliance with
any and all minimization procedures implemented to prevent further warrantless collection of
6
Plaintiffs' counsel, Larry Klayman, was a former Department of Justice attorney with the anti-trust division and has
previously obtained a security clearance.
19
records belonging to U.S. citizens without reasonable suspicion or probably cause, any and all
incidences of non-compliance, identification of any and all "targets" subject to Defendants'
surveillance, and all other relevant reports, risk assessments, memoranda, and other documents.
b.
The scope of Plaintiffs' discovery requests may include "all relevant
reports, risk assessments, memoranda, and other documents, whether prepared by the National
Security Agency officials or employees, officials or employees of other government agencies, or
third parties, any pertinent records, reports, and/or other documents to the Court relating to
Defendants' compliance with any and all minimization procedures implemented to prevent
further warrantless collection of records belonging to U.S. citizens without reasonable suspicion
or probably cause, any and all incidences of non-compliance, identification of any and all
"targets" subject to Defendants' surveillance, and all other relevant reports, risk assessments,
memoranda, and other documents.
c.
The parties shall endeavor to agree upon and submit to the Court, within
ten (10) days of this date, a proposed protective order to govern disclosure of information and
materials related to Defendants' surveillance. In the event that the parties are unable to agree on a
proposed protective order, each party must submit a proposed protective order to the Court
within ten (10) days of this date.
7.
No bond is required. The balance of hardships favors Plaintiffs, who are
experiencing harm to fundamental rights guaranteed them by the Constitution, while Defendants
do not face a likelihood of financial or other harm from complying with this injunction.
IT IS SO ORDERED
_________________________
Hon. Richard J. Leon
20
United States District Judge
21
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?