UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
COMPETITIVE ENTERPRISE
INSTITUTE, et al.,
Plaintiffs,
v. Civil Action No. 14-975 (JEB)
NATIONAL SECURITY AGENCY,
Defendant.
MEMORANDUM OPINION
Over the past several years, Plaintiffs Competitive Enterprise Institute, Energy &
Environmental Legal Institute, and Free Market Environmental Law Clinic have filed numerous
Freedom of Information Act requests with the Environmental Protection Agency, seeking to
obtain information about EPA officials’ phone calls, e-mails, and text messages. Apparently
dissatisfied with this more traditional approach, Plaintiffs now attempt a novel and inventive
gambit to obtain these records – they demand them from the National Security Agency. After
all, doesn’t the NSA have everyone’s phone, e-mail, and text-message records?
Relying on information leaked in June 2013 about an NSA program that collects vast
troves of “metadata” about Americans’ phone communications, Plaintiffs submitted FOIA
requests to the NSA for records relating to two EPA officials’ Verizon Wireless accounts. The
NSA, however, issued a so-called “Glomar response” – i.e., refusing to confirm or deny that it
has responsive records – because it believes that disclosing whether it has records (or not) could
1
compromise national-security efforts. The agency now moves for summary judgment on the
ground that it has no further obligations to Plaintiffs under FOIA.
Plaintiffs do not contest that a Glomar response is generally appropriate in an NSA case
like this. Instead, their principal argument is that the NSA has waived its right to issue such a
response by its previous official acknowledgment that it has the records they seek. Plaintiffs,
however, fail to point this Court to anything concrete showing that the NSA has actually
admitted this fact. The Court, consequently, will grant the agency’s Motion for Summary
Judgment.
I. Background
A. FOIA Requests to the EPA
Plaintiffs are non-profit organizations “dedicated to advancing responsible regulation,”
particularly “economically sustainable environmental policy.” Compl., ¶¶ 12-14. In pursuit of
their missions, each operates a “transparency initiative” that seeks to obtain “public records”
about energy and environmental policy. Id. Plaintiffs have, accordingly, filed numerous FOIA
requests with the EPA. Among other things, they have sought phone, e-mail, and text-message
records for high-ranking EPA officials, including Lisa P. Jackson and Gina McCarthy, the
former and current Administrator at the EPA. See, e.g., Compl. in Competitive Enterprise
Institute v. EPA, No. 13-779 (D.D.C. dismissed Sept. 13, 2013). They believe that EPA officials
have hidden their work by using unofficial methods of communications. See Competitive
Enterprise Institute v. EPA, 12 F. Supp. 3d 100, 106 (D.D.C. 2014) (CEI I).
In response to some requests, Plaintiffs have received voluminous records for Jackson
and McCarthy’s communications. See, e.g., id. (noting EPA had produced over 10,000 records
in response to request for emails from Jackson’s secondary e-mail accounts); Competitive
2
Enterprise Institute v. EPA, No. 13-1532, 2014 WL 4359191, at *4 (D.D.C. Sept. 4, 2014) (CEI
II) (noting CEI had received a document containing metadata for 5,392 text messages McCarthy
sent or received on an EPA-issued device). The EPA’s responses to other requests, however,
have been less to Plaintiffs’ liking. For instance, after CEI requested Jackson and McCarthy’s
text messages, the EPA allegedly informed the organization that it did not have any responsive
records and that it may not even have a duty to preserve text messages. See Compl., ¶¶ 3-5 in
CEI II, 2014 WL 4359191. CEI is currently challenging the EPA’s compliance with federal
record-keeping laws in another court in this jurisdiction. See id., ¶ 1.
As a result of Plaintiffs’ and others’ efforts, the EPA has come under significant fire in
recent years for its record-keeping practices and transparency. See, e.g., Senate Environment
and Public Works Comm., Minority Report, A Call for Sunshine: EPA’s FOIA and Federal
Records Failures Uncovered (Sept. 9, 2013), available at http://goo.gl/KmtqJT. It has, for
instance, been accused of “haphazard[ly]” maintaining federal records and withholding
information that could embarrass the agency. Id. at 1. Likely out of concern that the EPA has
not responded to their requests adequately and in good faith, Plaintiffs have now trained their
sights on a different target.
B. NSA’s Metadata Program 1
Since at least May 2006, the NSA has obtained bulk “telephony metadata” from U.S.
telecommunications service providers to use in counterterrorism investigations. See Declaration
of Teresa H. Shea, Director of Signals Intelligence, NSA, ¶ 13 in Klayman v. Obama, No. 13-
851 (D.D.C. 2013), ECF No. 25-4 (Shea Klayman Decl.); see also In re Application of the Fed.
Bureau of Investigation for an Order Requiring the Production of Tangible Things from
1
The discussion of this program is based entirely on publicly available documents and materials submitted by the
parties.
3
[Redacted], No. BR 06-05, at 2 (F.I.S.C. May 24, 2006). According to the NSA, the “metadata”
includes general information about phone calls, such as the numbers of incoming and outgoing
calls and the times calls are placed, but it does not include anything about the calls’ contents or
the parties’ identities. See Shea Klayman Decl., ¶ 7. The agency has obtained this data – at least
since 2006 – pursuant to orders of the Foreign Intelligence Surveillance Court. Id., ¶ 13. That
court concluded that the bulk collection of U.S. persons’ metadata is permitted under the
“business records” provision in Section 215 of the USA Patriot Act. Id., ¶ 14. The FISC orders
thus only require companies to turn over whatever metadata they already create and maintain in
the regular course of business. Id., ¶ 18.
Once the data is turned over to the government, there are strict limitations on its use. For
instance, NSA analysts cannot simply browse the database, but must use “identifiers,” such as
telephone numbers, to run targeted queries. See id., ¶¶ 17, 19. The FISC orders, furthermore,
delineate very narrow circumstances under which the NSA can disseminate information derived
from this data outside of the agency. See, e.g., Shea Klayman Decl., ¶ 28; Opp., Declaration of
Hans Bader, Exh. 2 (Primary Order, In re Application of the [FBI] for an Order Requiring the
Production of Tangible Things from [Redacted], No. BR 13-80 (F.I.S.C. Apr. 25, 2013)) (FISC
Primary Order, April 25, 2013).
While the Section 215 metadata-collection program dates back to 2006, it was concealed
from the public for years. Then, in early June 2013, Edward Snowden, a former government
contractor, leaked an April 25, 2013, FISC Order requiring Verizon Business Network Services
to provide the NSA with “telephony metadata” for the following 90 days. See Glenn Greenwald,
NSA Collecting Phone Records of Millions of Verizon Customers Daily, The Guardian, June 5,
2013, available at www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-
4
order; Bader Decl., Exh. 1 (Secondary Order, In re Application of the [FBI] for an Order
Requiring the Production of Tangible Things from Verizon Business Network Services, Inc. on
Behalf of MCI Communication Services, Inc. d/b/a Verizon Business Services, No. BR 13-80
(F.I.S.C. Apr. 25, 2013)) (FISC Secondary Order, April 25, 2013); see also Klayman, 957 F.
Supp. 2d at 14. In the weeks and months that followed, the government declassified redacted
versions of Section 215 FISC orders and some documents about the program. See, e.g., Shawn
Turner, DNI Clapper Declassifies and Releases Telephone Metadata Collection Documents (July
31, 2014), available at www.dni.gov/index.php/newsroom/press-releases/191-press-releases-
2013/908-dni-clapper-declassifies-and-releases-telephone-metadata-collection-documents.
The leaks and subsequent government disclosures have set off a series of legal
challenges. Several courts have already been called upon to address the legality of the NSA’s
collecting and analyzing U.S. citizens’ metadata in bulk. See, e.g., Am. Civil Liberties Union v.
Clapper, 959 F. Supp. 2d 724 (S.D.N.Y. 2013); Klayman, 957 F. Supp. 2d 1; Smith v. Obama,
No. 13-257, 2014 WL 2506421 (D. Idaho June 3, 2014). This case, however, presents an
entirely different question – that is, whether FOIA requires the NSA to disclose the existence (or
nonexistence) of metadata records for specific individuals or accounts.
C. The Present Litigation
This case stems from two FOIA requests that Plaintiffs submitted to the NSA following
the Snowden leaks. The first, submitted by E&E Legal – known at the time as the American
Tradition Institute – and Free Market on August 16, 2013, requested:
[C]opies of all metadata (duration and time of the communication,
sender and recipient, etc.) from Verizon voice and/or data accounts
in NSA’s possession for the phone/PDA/text/instant message
and/or email account(s) held by Lisa P. Jackson. To properly
identify the individual at issue in this matter, one such email
5
account associated with Ms. Jackson’s Verizon account and which
was used to conduct public business is LisaPJackson@Verizon.net.
Mot., Declaration of David J. Sherman, Exh. E (FOIA Request, Aug. 16, 2013) at 2. The
second, submitted by CEI on December 16, 2013, sought:
[C]opies of 1) all text message data, and 2) particularly all
metadata (date, duration and time of the communication, sender
and recipient, etc.) of text messaging activity using Verizon voice
and/or data accounts in NSA’s possession for the
phone/PDA/text/instant message account(s) associated with the
number (202) 596-0247, a number assigned by Verizon to the U.S.
Environmental Protection Agency (note: for most or all of the
relevant period this account was held in the name of “F.
Rusincovith/Eon 8344” but provided over the time period relevant
to this request to then-Assistant Administrator for Air and
Radiation, and now-Administrator, Regina “Gina” McCarthy).
Responsive records will be for billing periods ending, and/or will
be dated, during the period from July 1, 2009 through April 2011
(inclusive), at which time EPA switched providers for these
relevant offices, from Verizon to AT&T.
Sherman Decl., Exh. A (FOIA Request, Dec. 16, 2013) at 2. In answer to both requests, the
NSA issued “Glomar responses,” informing Plaintiffs that it could neither confirm nor deny the
existence of responsive records. See Def.’s Statement of Material Facts, ¶ 3. The agency
explained in its letters to Plaintiffs that, while its Section 215 metadata program had been
publicly acknowledged, “details about [the program] remain classified and/or protected from
release by statutes,” and that providing “[a]ny positive or negative response on a request-by-
request basis would allow our adversaries to accumulate information and draw conclusions about
NSA’s technical capabilities, sources, and methods.” Sherman Decl., Exh. B (Letter from
Pamela N. Phillips, Chief, FOIA/PA Office, NSA to Christopher C. Horner, CEI, Dec. 20, 2013)
at 2; Exh. F (Letter from Phillips to Brittany Madni, Free Market, Aug. 23, 2013) at 2. Plaintiffs
administratively appealed these decisions, but the agency upheld them, again explaining that
6
revealing such information could be detrimental to national-security efforts. See Sherman Decl.,
Exh. D (CEI Appeal Denial); Exh. H (Free Market Appeal Denial). They subsequently filed this
suit to compel the agency to produce responsive records, and the NSA now moves for summary
judgment.
Before moving on, a brief aside is in order. In a recent FOIA case against the EPA, this
Court warned CEI about its excessive and distracting use of footnotes. See CEI I, 12 F. Supp. 3d
at 108. CEI had filed a 44-page opposition containing 114 footnotes, many of which were
lengthy and substantive. See id. The Court stated then that it “trust[ed] . . . it w[ould] not
receive its like in the future.” See id. Unfortunately, those words appear to have struck stony
ground. While CEI’s use of footnotes in this case is not quite so egregious, Plaintiffs’ inclusion
of 51 substantial footnotes in a 28-page brief again imposes on the reader’s patience. Additional
briefs like this will, in the future, result in the striking of pleadings and the imposition of explicit
limits on footnotes.
II. Legal Standard
Summary judgment may be granted if “the movant shows that there is no genuine dispute
as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P.
56(a); see also Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247-48 (1986); Holcomb v.
Powell, 433 F.3d 889, 895 (D.C. Cir. 2006). A fact is “material” if it is capable of affecting the
substantive outcome of the litigation. See Liberty Lobby, 477 U.S. at 248; Holcomb, 433 F.3d at
895. A dispute is “genuine” if the evidence is such that a reasonable jury could return a verdict
for the nonmoving party.” See Scott v. Harris, 550 U.S. 372, 380 (2007); Liberty Lobby, 477
U.S. at 248; Holcomb, 433 F.3d at 895. “A party asserting that a fact cannot be or is genuinely
disputed must support the assertion” by “citing to particular parts of materials in the record” or
7
“showing that the materials cited do not establish the absence or presence of a genuine dispute,
or that an adverse party cannot produce admissible evidence to support the fact.” Fed. R. Civ. P.
56(c)(1). The moving party bears the burden of demonstrating the absence of a genuine issue of
material fact. See Celotex Corp. v. Catrett, 477 U.S. 317, 323 (1986).
FOIA cases typically and appropriately are decided on motions for summary judgment.
See Brayton v. Office of U.S. Trade Rep., 641 F.3d 521, 527 (D.C. Cir. 2011). In FOIA cases,
the agency bears the ultimate burden of proof. See Dep’t of Justice v. Tax Analysts, 492 U.S.
136, 142 n.3 (1989). The Court may grant summary judgment based solely on information
provided in an agency’s affidavits or declarations when they describe “the documents and the
justifications for nondisclosure with reasonably specific detail, demonstrate that the information
withheld logically falls within the claimed exemption, and are not controverted by either contrary
evidence in the record nor by evidence of agency bad faith.” Military Audit Project v. Casey,
656 F.2d 724, 738 (D.C. Cir. 1981).
III. Analysis
A. Glomar Response
Congress enacted FOIA “to pierce the veil of administrative secrecy and to open agency
action to the light of public scrutiny.” Dep’t of Air Force v. Rose, 425 U.S. 352, 361 (1976)
(citation omitted). Consistent with this purpose, the statute provides that “each agency, upon any
request for records which (i) reasonably describes such records and (ii) is made in accordance
with published rules . . . shall make the records promptly available to any person,” 5 U.S.C. §
552(a)(3)(A), unless the records fall within one of nine narrowly construed exemptions. See 5
U.S.C. § 552(b); Rose, 425 U.S. at 361. When an agency withholds documents or parts of
8
documents, it typically must explain what it is withholding and the statutory exemptions that
apply. See Vaughn v. Rosen, 484 F.2d 820, 825-28 (D.C. Cir. 1973).
In certain circumstances, however, an agency may refuse to confirm or deny that it has
relevant records. See, e.g., Wolf v. CIA, 473 F.3d 370, 374 (D.C. Cir. 2007). This is called a
“Glomar response,” in reference to the CIA’s refusal to confirm or deny whether it had records
about the Hughes Glomar Explorer, a ship later revealed to have been involved in a Cold War
mission. See Phillippi v. CIA, 546 F.2d 1009, 1011 (D.C. Cir. 1976); Am. Civil Liberties Union
v. CIA, 710 F.3d 422, 426 n.1 (D.C. Cir. 2013) (ACLU). Glomar responses are appropriate
when disclosing the existence (or nonexistence) of responsive records would itself “cause harm
cognizable under [a] FOIA exception.” See Wolf, 473 F.3d at 374 (quoting Gardels v. CIA, 689
F.2d 1100, 1103 (D.C. Cir. 1982)) (internal quotation marks omitted).
In such instances, the Government must show that the mere fact of whether it has (or
does not have) relevant records is protected from disclosure under an exemption. See Wolf, 473
F.3d at 374 (citations omitted). It must do so on the public record, “explaining in as much detail
as is possible” why it cannot provide a definitive response. Phillippi, 546 F.2d at 1013; see also,
e.g., Elec. Privacy Info. Ctr. v. NSA, 678 F.3d 926, 931 (D.C. Cir. 2012) (EPIC). Courts
considering Glomar responses apply the exemption standards developed in non-Glomar cases to
determine whether the information is properly withheld. See Wolf, 473 F.3d at 374 (citing
Gardels, 689 F.2d at 1103-05). Importantly, when a Glomar response touches upon issues of
national security – “a uniquely executive purview” – courts must give agency decisions
substantial deference. EPIC, 678 F.3d at 931 (quoting Ctr. for Nat’l Sec. Studies v. Dep’t of
Justice, 331 F.3d 918, 926-27 (D.C. Cir. 2003)) (internal quotation marks omitted).
9
In this case, the NSA based its Glomar responses on FOIA Exemption 1 (which covers
materials classified by Executive Order) and Exemption 3 (which covers materials specifically
protected from disclosure by statute). Because Plaintiffs do not contest that this information falls
within the scope of Exemption 3, see Opp.; Pl.’s Statement of Disputed Facts at 7, this Opinion
need not address whether the information would also fall within the ambit of Exemption 1. See
Larson v. Dep’t of State, 565 F.3d 857, 862-63 (D.C. Cir. 2009) (“[C]ourts may uphold agency
action under one exemption without considering the applicability of the other.”). Instead, this
Opinion focuses on Plaintiffs’ principal contention that the NSA has waived its right to issue a
Glomar response by officially acknowledging the existence of the records Plaintiffs seek.
It is well established that “when an agency has officially acknowledged otherwise exempt
information through prior disclosure, the agency . . . waive[s] its right to claim an exemption
with respect to that information.” See ACLU, 710 F.3d at 426.
[A]n official acknowledgment must meet three criteria:
First, the information requested must be as specific as the
information previously released. Second, the information
requested must match the information previously disclosed.
. . . Third, . . . the information requested must already have
been made public through an official and documented
disclosure.
Wolf, 473 F.3d at 378 (quoting Fitzgibbon v. CIA, 911 F.2d 755, 765 (D.C. Cir. 1990)). The
burden is on plaintiffs claiming that information has been acknowledged to “point[] to specific
information in the public domain that appears to duplicate that being withheld.” ACLU, 710
F.3d at 427 (quoting Wolf, 473 F.3d at 378) (quotation marks omitted). “In the Glomar context,
the ‘specific information’ at issue is not the contents of a particular record, but rather ‘the
existence vel non’ of any records responsive to the FOIA request.” Id. (quoting Wolf, 473 F.3d
10
at 379). Plaintiffs in this case must therefore point to specific information in the public domain
establishing that the NSA has metadata records for Jackson and McCarthy’s accounts.
This they have not done. To begin, they fail to point to any source suggesting that the
government engages in the widespread collection of Americans’ e-mail and text-message
records, making the agency’s Glomar response appropriate at least with respect to those.
Second, on the issue of phone records, the sources that they provide do not give any indication
that the government collects metadata for all U.S. phone customers or even the subset of all
Verizon Wireless users. As such, they do not show that the government has the specific records
they seek. Third, although general information about the program has been released, Plaintiffs
are simply incorrect that there can be no further harm from acknowledging the existence of the
requested records. Finally, the present case is also readily distinguishable from those in which
courts have rejected agencies’ Glomar responses. The Court will elaborate on each of these
issues in turn.
B. E-mail and Text Records
Despite their FOIA requests for e-mail and text records, Plaintiffs do not point to any
evidence showing that the NSA actually collects this information on a widespread basis. Their
Opposition, in fact, never mentions e-mails and provides only a brief discussion of text-message
metadata. That discussion focuses solely on the fact that phone companies collect and retain this
information in the course of providing services. See Opp. at 20-21. Plaintiffs’ underlying
assumption seems to be that providers must turn over to the NSA all of the data that they
possess, regardless of form.
But an unfounded assumption cannot overcome an agency’s right to assert a Glomar
response, and none of the sources that Plaintiffs cite in their discussion of text messages gives
11
any indication that the government collects this information in bulk from companies. See Opp.
at 20-21 and accompanying footnotes. Even if the sources did suggest such collection, however,
it is difficult to see how these particular sources – which include a law-review article, an ACLU
publication, a newspaper article, and a declaration from a computer-science professor – could
constitute official acknowledgments of that fact. See, e.g., Am. Civil Liberties Union v. Dep’t of
Defense, 628 F.3d 612, 621 (D.C. Cir. 2011) (“[W]e are hard pressed to understand the ACLU’s
contention that the release of [a leaked Red Cross Report,] a nongovernmental document by a
nonofficial source can constitute a disclosure affecting the applicability of the FOIA
exemptions.”).
The sources Plaintiffs cite that do acknowledge the government’s collection of metadata
discuss only the collection of “telephony metadata.” Those sources consistently define
“telephony metadata” as details about phone calls, not texts or e-mails. See, e.g., Administration
White Paper: Bulk Collection of Telephony Metadata Under Section 215 of the USA Patriot Act
2 (Aug. 9, 2013) (White Paper), available at http://perma.cc/8RJN-EDB7 (“The term ‘metadata’
as used here refers to data collected under the program that is about telephone calls.”) (emphasis
added); Declaration of Teresa H. Shea, Director of Signals Intelligence, NSA, ¶¶ 7, 14 in
Clapper, No. 13-3994, ECF No. 63 (Shea Clapper Decl.) (explaining that, under the program,
telecommunications service providers turn over “call detail records”); see also FISC Secondary
Order, April 25, 2013. Particularly in the national-security context, this Court should not be in
the business of guessing whether information about text messages falls under the heading of
“telephony metadata.”
Regardless, then, of whether the NSA has officially acknowledged the existence of
metadata for Jackson and McCarthy’s phone calls, the Court will not require the agency to
12
confirm or deny the existence of records regarding their e-mails or texts. This disposes of the
Glomar issue with respect to Plaintiffs’ second request, which sought “copies of 1) all text
message data, and 2) particularly all metadata . . . of text messaging activity . . . for the
phone/PDA/text/instant message account(s) associated with the number [provided to
McCarthy].” FOIA Request, Dec. 16, 2013, at 2. It also disposes of a large part of the first
request, which sought “copies of all metadata . . . from Verizon voice and/or data accounts in
NSA’s possession for the phone/PDA/text/instant message and/or email account(s) held by Lisa
P. Jackson.” FOIA Request, Aug. 16, 2013, at 2. Since the latter request, however, also
encompasses metadata associated with Jackson’s phone calls, the Court will now turn to whether
a Glomar response for those records is also appropriate.
C. Phone Records
Plaintiffs, unsurprisingly, do not point to any statements from the NSA – or anyone else
for that matter – that explicitly acknowledge that the agency has obtained Jackson’s telephony-
metadata records. Instead, they emphasize that the program involves the collection of metadata
for most, if not all, Americans and Verizon customers, and that the metadata related to Jackson’s
Verizon Wireless account must have been “swept up” in this collection. See Opp. at 21. As
evidence, they provide citations to statements of the NSA, other government agencies and
officials, federal courts, and the press. The Court will address these categories separately.
1. NSA statements
Plaintiffs cite two NSA-issued documents in support of their claim that the agency has
waived its right to issue a Glomar response. The first is an agency document, available on its
website, that describes generally certain of the NSA’s activities. See NSA, The National
Security Agency: Missions, Authorities, Oversight and Partnerships (Aug. 9, 2013), available at
13
http://www.nsa.gov/public_info/_files/speeches_testimonies/ 2013_08_ 09_the_nsa_story.pdf.
The second is a declaration that the agency submitted in one of the cases challenging the
program’s legality. See Shea Clapper Decl. These documents undoubtedly fall within the
category of “official” disclosures, so the only question is whether they acknowledge the
collection of the specific information still at issue – i.e., phone records for Jackson.
While the Court agrees with Plaintiffs’ assertion that these documents show that the NSA
engages in the “bulk” collection of telephony metadata, see Opp. at 8, the problem is that “bulk”
does not mean universal. These documents, in other words, in no way suggest that the NSA
collects metadata records for all phone customers in the U.S. For instance, one states only that
“specified U.S. telecommunications providers are compelled by court order to provide NSA with
information about telephone calls to, from, or within the U.S.” The National Security Agency:
Missions, Authorities, Oversight and Partnerships at 5 (emphasis added). The other
acknowledges only that “[p]ursuant to Section 215, the FBI obtains orders from the FISC
directing certain telecommunications service providers to produce all business records created by
them . . . that contain information about communications between telephone numbers.” Shea
Clapper Decl., ¶ 14 (emphasis added). There is no indication that all companies – and thus all
phone customers – are included. Indeed, while the documents state that certain companies must
provide this data, they do not say which ones. As a result, they also do not acknowledge that the
government has Verizon Wireless records, including the ones at issue here. See, e.g., Afshar v.
Dep’t of State, 702 F.2d 1125, 1133 (D.C. Cir. 1983) (holding release of information that
“provide[s] only the most general outline” of an intelligence effort does not waive right to
withhold documents giving “a far more precise idea” of that effort because withheld information
14
must have “already been specifically revealed to the public”) (quoting Lamont v. Dep’t of
Justice, 475 F. Supp. 761, 772 (S.D.N.Y. 1979)) (internal quotation marks omitted).
The Court also finds it worth noting here that the agency has consistently represented that
it does not collect metadata records for all U.S.-based phone customers. See, e.g., Declaration of
Major General Gregg C. Potter, Military Deputy Director for Signals Intelligence, NSA, ¶ 4 in
Schuchardt v. Obama, No. 14-0705 (W.D. Pa. filed June 6, 2014), ECF No. 14-1 (“Although
there has been speculation that the NSA, under the bulk telephony metadata program, acquires
metadata relating to all telephone calls to, from, or within the United States, that is not the
case.”) (emphasis added); id. (“[A]s the FISC observed in a decision last year, the program has
never captured information on all (or virtually all) calls made and/or received in the U.S.”). The
NSA has, therefore, not made admissions that would waive its right to assert a Glomar response
here.
2. Statements of other government agencies and officials
Plaintiffs next point to statements and reports from other government agencies and
officials. In general, an agency may withhold information “despite the prior disclosure of
another, unrelated agency.” ACLU, 710 F.3d at 429 n.7; see also, e.g., Frugone v. CIA, 169 F.3d
772 (D.C. Cir. 1999) (allowing CIA to issue Glomar response for requester’s personnel file
despite Office of Personnel Management’s acknowledgment of his employment relationship with
CIA). “That rule does not apply, however, where the disclosures are made by an authorized
representative of the agency’s parent.” ACLU, 710 F.3d at 429 n.7. In ACLU, the Circuit thus
held that “[a] disclosure made by the President, or by his counterterrorism advisor acting as
‘instructed’ by the President, falls on the ‘parent agency’ side of that line,” and could waive the
CIA’s ability to issue a Glomar response. Id.
15
Based on this caselaw, the NSA concedes that the President’s statement and an
administration white paper that Plaintiffs cite are attributable to the NSA. This concession,
however, does not get Plaintiffs very far. The President’s statement acknowledged only that “the
intelligence community . . . is looking at phone numbers and durations of calls.” President
Barack Obama, Statement at the Fairmont Hotel, San Jose, Cal. (June 7, 2013), available at
www.whitehouse.gov/the-press-office/2013/06/07/statement-president. It did not say that the
intelligence community was looking at this information for everyone, or even for specific
subgroups. The white paper, similarly, did not admit to the universal collection of Americans’
phone records. In fact, it begins with the statement that “the Federal Bureau of Investigation
(FBI) obtains court orders directing certain telecommunications service providers to produce
telephony metadata in bulk” – not all such providers. White Paper at 1 (emphasis added). As
with the NSA’s documents, it too does not name the companies that have produced data.
Turning next to the other government-issued documents Plaintiffs cite – namely,
materials from the Director of National Intelligence (DNI), the Privacy and Civil Liberties
Oversight Board (PCLOB), and the President’s Review Group on Intelligence and
Communications Technologies (PRGICT) – the NSA argues that these should not be imputed to
itself. See Reply at 4 n.4. It is not readily apparent, though, whether these fall on the “unrelated
agency” or “parent agency” side of the line. The NSA’s own website, for instance, states that the
DNI is the “the head of the Intelligence Community,” which includes the NSA. See Frequently
Asked Questions about NSA, https://www.nsa.gov/about/faqs/about_nsa.shtml# about6 (last
visited Jan. 12, 2015). Thankfully, the Court need not decipher organizational charts to resolve
this issue because none of the materials provides the sort of definitive acknowledgment that
Plaintiffs claim.
16
Beginning with the DNI statement that they cite, the Court finds that it at most indicates
that the NSA’s metadata collection “is broad in scope.” See James R. Clapper, DNI Statement
on Recent Unauthorized Disclosures of Classified Information (June 6, 2013), available at
http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-
statement-on-recent-unauthorized-disclosures-of-classified-information. Next, Plaintiffs’
citations to the PCLOB Report demonstrate merely that “records are collected in bulk,” that
“certain telephone companies” are required to turn over records, and that the program results in
the collection of “call detail records for a large volume of telephone communications.” Privacy
and Civil Liberties Oversight Board, Report on the Telephone Records Program Conducted
Under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence
Surveillance Court 10, 22 (Jan. 23, 2014), available at http://www.eff.org/files/2014/
01/23/final_ report_1-23-14.pdf.
Last, with regard to the PRGCIT report, Plaintiffs – as they do numerous times
throughout their brief and statement of facts – leave out a key word from the quote they provide
to make the document appear more helpful to them than it really is. Specifically, in their
Opposition, Plaintiffs quote the report as saying “service providers must turn over to the
government on an ongoing basis call records for every telephone call.” Opp. at 7. This might
seem to imply that all service providers are included, but Plaintiffs conveniently omitted the
word “specified” from the beginning of the quote. See President’s Review Group on Intelligence
and Communications Technologies, Liberty and Security in a Changing World 97 (Dec. 12,
2013), available at www.whitehouse.gov/ sites/default/files/docs/2013-12-
12_rg_final_report.pdf). This document thus also fails to establish that all data is collected. And
once again, the materials do not name the specific companies that have produced this data to the
17
government, so they also do not establish that Verizon Wireless customers’ metadata has been
collected. Even if these sources fall on the “parent agency” side of the line, therefore, none
amounts to an official acknowledgment that the NSA has the metadata records that Plaintiffs
seek.
3. Court opinions
Plaintiffs next rely on several court opinions, but these also do not demonstrate that the
agency has waived its right to issue a Glomar response. For instance, Plaintiffs pluck several
quotes from Klayman that suggest that the court explicitly found that the NSA has collected
records for all “Verizon” customers. See Opp. at 9 n.18, 11-12, 19-21, 25. To put those quotes
in context, the court there stated only that it believed the plaintiffs had standing to sue because
there was “strong evidence that, as Verizon customers, their telephony metadata ha[d] been
collected.” Klayman, 957 F. Supp. 2d at 26. The court assumed that because Verizon Wireless
was the “single largest wireless carrier in the United States,” and because the benefit of the
metadata program derives from the government’s ability to analyze significant numbers of calls,
the government must have collected this data from the plaintiffs’ phone company. Id. at 27.
This analysis, however, was based on inferences and assumptions – not an official and actual
acknowledgement by someone in a position to know whether this is true. Indeed, the NSA has
maintained throughout that litigation that it does not collect call records for all U.S. callers, and it
also has not admitted to collecting the information for all “Verizon” customers. See id. at 27;
Response and Reply Brief for Government Appellants/Cross-Appellees, Klayman v. Obama, No.
14-5004 (D.C. Cir. oral argument Nov. 4, 2014) (asserting that plaintiffs “offer only unsupported
speculation that metadata about their calls must have been provided” to NSA). While relying on
“strong evidence” may be acceptable in a standing analysis, it does not suffice under the official-
18
acknowledgement doctrine. See, e.g., Valfells v. CIA, 717 F. Supp. 2d 110, 117 (D.D.C. 2010)
(“Logical deductions are not . . . official acknowledgments.”), aff’d sub nom. Moore v. CIA, 666
F.3d 1330 (D.C. Cir. 2011); Afshar, 702 F.2d at 1133 (finding that even CIA-reviewed books
were not “official and documented disclosure[s]”).
Clapper, another case Plaintiffs cite, more strongly pronounced that “the Government
[has] acknowledged that since May 2006, it has collected this information for substantially every
telephone call in the United States.” 959 F. Supp. 2d at 734. But this dog doesn’t hunt either. In
support of this conclusion, the court cited only the administration white paper and Shea
declaration discussed above. See id. Because this Court has already looked at those documents
and determined that they do not contain sufficiently specific acknowledgements, it will not rely
on Clapper’s broad-brush statement summarizing them.
Moving on, Plaintiffs cite two redacted, declassified orders from the FISC. See FISC
Primary Order, April 25, 2013; FISC Secondary Order, April 25, 2013. The Primary Order is
clearly directed at specified companies, but the names of those companies are redacted and
remain classified. See FISC Primary Order, April 25, 2013, at 3. It therefore does not offer any
clues as to the records that the NSA actually possesses. The Secondary Order is more specific
and is actually the closest Plaintiffs come to providing this Court with evidence of a specific
acknowledgement that the NSA has particular records. That order, however, was directed to
Verizon Business Network Services, Inc., not Verizon Wireless. See FISC Secondary Order,
April 25, 2013. The two are not one and the same. See, e.g., United States ex rel. Shea v.
Verizon Bus. Network Servs., Inc., 904 F. Supp. 2d 28, 30 (D.D.C. 2012). It thus has no bearing
on whether metadata for Verizon Wireless accounts, such as Jackson’s, has ever been produced
to the NSA. See Clapper, 959 F. Supp. 2d at 735 (noting that April 25, 2013, Secondary Order
19
from the FISC “does not cover calls placed on Verizon Wireless’s network”) (emphasis added);
Danny Yadron & Evan Perez, T-Mobile, Verizon Wireless Shielded from NSA Sweep, Wall St.
J., June 14, 2013 (reporting shortly after revelation that Verizon Business Network Services was
required to turn over metadata that Verizon Wireless was not among the companies required to
produce records “in part because of their foreign ownership ties”).
4. Newspaper articles
Finally, Plaintiffs cite numerous press accounts to argue that “[t]he press, too, has
recognized that the NSA’s bulk collection of telephony metadata, including the Verizon ‘cell
phone’ metadata at issue in this case, as [sic] a publicly-disclosed fact acknowledged by the NSA
and the Obama administration.” Opp. at 14-16, 25 and accompanying footnotes. But
speculation by the press – no matter how widespread – and disclosures in the press from
unnamed sources are not sufficient to waive an agency’s right to withhold information under
FOIA. As the D.C. Circuit noted in Fitzgibbon, “It is one thing for a reporter or author to
speculate or guess that a thing may be so or even, quoting undisclosed sources, to say that it is
so; it is quite another thing for one in a position to know of it officially to say that it is so.” 911
F.2d at 765 (quoting Alfred A. Knopf, Inc. v. Colby, 509 F.2d 1362, 1370 (4th Cir. 1975))
(internal quotation marks omitted); see also EPIC, 678 F.3d at 933 n.5 (“[T]he national media are
not capable of waiving NSA’s statutory authority to protect information related to its functions
and activities.”); Afshar, 702 F.2d at 1130-31, 1133 (explaining that “[u]nofficial leaks and
public surmise can often be ignored by foreign governments,” while official acknowledgments
cannot be, and finding that books by former CIA officials were not “official and documented
disclosure[s]”). This means, for example, that reported statements of “senior administration
official[s]” are insufficient to waive the agency’s right to claim an exemption. See Opp. at 16
20
(quoting Aaron Blake, Administration: NSA Phone Record Collection Vital to Fighting
Terrorism, Wash. Post, June 6, 2013).
Yet even if the Court could rely exclusively on the media, Plaintiffs would still be out of
luck; news accounts of the program have provided anything but a clear picture of its scope. In
fact, several articles by leading newspapers acknowledge that the NSA does not collect this data
for even a majority of people, and that it is not known publicly whether Verizon Wireless records
are collected. See, e.g., Ellen Nakashima, NSA Is Collecting Less than 30 Percent of U.S. Call
Data, Officials Say, Wash. Post, Feb. 7, 2014 (“according to current and former U.S. officials,”
by summer 2013, NSA was collecting less than 30 percent of all Americans’ call records
“because of an inability to keep pace with the explosion in cellphone use”); Charlie Savage &
Edward Wyatt, U.S. Is Secretly Collecting Records of Verizon Calls, N.Y. Times, June 5, 2013
(noting leaked FISC Order applied only to Verizon Business Network Services and it was “not
clear whether similar orders ha[d] gone to other parts of Verizon, like its residential or cellphone
services”). In any event, none of the articles Plaintiffs cite constitutes an official
acknowledgment that the NSA has the specific records they requested.
D. Harm From Requiring Further Disclosures
Next, Plaintiffs claim that even if the NSA does not collect this data for everyone, the
existence of the program is so well known that the agency cannot withhold further details about
it. They also assert a variant of this argument – namely, that because the agency has admitted
collecting the records in bulk, it would not reveal important intelligence information to
acknowledge that EPA officials’ calls were swept up in the collection. But this Circuit has
repeatedly recognized that “[t]he fact that some ‘information resides in the public domain does
not eliminate the possibility that further disclosures can cause harm to intelligence sources,
21
methods and operations.” Students Against Genocide v. Dep’t of State, 257 F.3d 828, 835 (D.C.
Cir. 2001) (quoting Fitzgibbon, 911 F.2d at 766) (internal quotation marks omitted); Afshar, 702
F.2d at 1132-33.
Here, the agency’s description of the potential harm from further disclosures is both
logical and plausible. See Students Against Genocide, 257 F.3d at 837. As the NSA’s
declaration in this case explained, “[A]cknowledging the existence or non-existence of
responsive records on particular individuals or organizations subject to surveillance would
provide our adversaries with critical information about the capabilities and/or limitations of the
NSA, such as the types of communications that may be susceptible to NSA detection.” Sherman
Decl., ¶ 24. These responses, collectively, could provide “a road map” for those who wish to
evade detection by informing them “which communications modes or personnel remain safe or
are successfully defeating NSA’s capabilities.” Id., ¶ 25. In essence, were the agency required
to confirm or deny the existence of records for specific individuals, it would begin to sketch the
contours of the program, including, for example, which providers turn over data and whether the
data for those providers is complete. See Elec. Frontier Foundation v. Dep’t of Justice, No. 11-
5221, 2014 WL 3945646, at *7 (N.D. Cal. Aug. 11, 2014) (“The inherent risks to national
security and government investigations of identifying the specific telecommunications carriers is
not mitigated by the government’s declassification of general information about the call record
collection program.”); Larson, 565 F.3d at 864 (“Minor details of intelligence information may
reveal more information than their apparent insignificance suggests because, much like a piece of
jigsaw puzzle, each detail may aid in piecing together other bits of information even when the
individual piece is not of obvious importance in itself.”) (quoting Gardels, 689 F.2d at 1106)
(alterations and internal quotation marks omitted)).
22
In sum, public knowledge about the general contours of the program does not vitiate the
NSA’s Glomar response here.
E. Past Glomar Cases
In the end, this case stands in stark contrast to previous cases Plaintiffs cite in this Circuit
that have found an agency waived its right to issue a Glomar response by officially
acknowledging information. For instance, in Wolf, the Court considered a plaintiff’s FOIA
request for CIA records pertaining to a deceased Colombian politician. See 473 F.3d at 372.
Although the Circuit found that whether the agency had such records (or not) would ordinarily
qualify for withholding under Exemptions 1 and 3, see id. at 375-378, it determined that the
CIA’s Glomar response was unjustified with respect to certain documents because an agency
official had explicitly referenced them when he testified before Congress. See id. at 379. As a
result, it was absolutely clear that the agency had those records. See id. By contrast, Plaintiffs
here have failed to point to any clear indication that the NSA has the requested records for
Jackson and McCarthy.
This case is also markedly different from National Security Archive v. CIA, No. 99-1160,
slip op. (D.D.C. July 31, 2000). There, in response to a request for biographies of certain Eastern
European heads of state, the CIA had refused to confirm or deny whether it possessed relevant
records. Id. at 2. The court found the response inappropriate in light of the CIA’s
acknowledgment that it maintained biographies on all heads of state. Id. at 16. The court said
the situation was akin to the CIA saying that it held a full deck of cards, while denying that it
held specific cards. Id. at 17. Here, however, the NSA has not admitted that it holds a full deck
of cards. Nor has it admitted that it holds all of the cards of particular suits, such as all of the
metadata records for Verizon Wireless accounts. Requiring it to confirm or deny the existence of
23
specific cards would, therefore, reveal which cards it has and which it is missing. Because of the
potential consequences that additional disclosures could have on national security, the Court will
not require the agency to tip its hand any further.
IV. Conclusion
For the foregoing reasons, the Court will grant the NSA’s Motion for Summary
Judgment. A contemporaneous Order will so state.
/s/ James E. Boasberg
JAMES E. BOASBERG
United States District Judge
Date: January 13, 2015
24