Judicial Watch, Inc. v. Kerry

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA JUDICIAL WATCH, INC., Plaintiff, v. Civil Action No. 15-785 (JEB) REX W. TIILLERSON, in his official capacity as U.S. Secretary of State, Defendant. ------------------------------------------------------- CAUSE OF ACTION INSTITUTE, Plaintiff, v. REX W. TILLERSON, in his official Civil Action No. 15-1068 (JEB) capacity as U.S. Secretary of State, and DAVID S. FERRIERO, in his official capacity as U.S. Archivist, Defendants. MEMORANDUM OPINION A full year has now passed since the 2016 presidential election, but the controversy over Hillary Clinton’s emails endures. As readers well remember, Clinton used private email accounts and servers during her tenure as Secretary of State. When news first broke that those accounts were employed to “conduct official government business,” Plaintiffs Judicial Watch and Cause of Action became concerned that the Government might not have retained records of her emails. See JW Compl., ¶ 5; CAI Compl., ¶ 9. To spur recovery, each filed a separate suit alleging violations of the Federal Records Act, “a collection of statutes governing the creation, 1    management, and disposal of federal records.” Public Citizen v. Carlin, 184 F.3d 900, 902 (D.C. Cir. 1999). Plaintiffs argued that pursuant to the statutory scheme, Defendants State Department and the National Archives and Records Administration (NARA) must enlist the Attorney General’s aid in recovering Clinton’s emails. In the parties’ first consolidated foray before this Court, the Government moved to dismiss the case as moot, arguing that it had done all that the FRA requires. The Court took the bait, holding that because Defendants had already taken significant steps to recover the emails, Plaintiffs suffered no ongoing injury. The Court of Appeals reversed and, in doing so, established a higher hurdle for Defendants to clear. Namely, they must initiate action with the Attorney General unless they either recover all the missing emails or “establish their fatal loss.” Judicial Watch, Inc. v. Kerry, 844 F.3d 952, 956 (D.C. Cir. 2016). On remand, the Administration may have changed, but the Government’s stance remains the same. Relying on new evidence of their additional efforts to track down the Clinton emails, Defendants play the mootness card once more. Based on that supplemented record, the Court again agrees the suit is moot and therefore grants their Motion to Dismiss. I. Background Plaintiffs are two non-profit organizations, which describe themselves as dedicated to promoting “transparency, accountability, and integrity in government.” JW Compl., ¶ 3; see also CAI Compl., ¶ 21. After learning of Clinton’s private email accounts, both organizations believed that the Secretary had unlawfully removed federal records from the State Department. See JW Compl., ¶ 5; CAI Compl., ¶ 9. Judicial Watch therefore filed suit on May 2015, and Cause of Action joined the mix two months later. See Minute Order of August 4, 2015 (granting Government’s Motion to Consolidate Cases). Plaintiffs claimed principally that the State 2    Department had failed to retain agency records in violation of the Federal Records Act, such that the current Secretary of State must “initiate action through the attorney general to recover the Clinton emails.” JW Compl., ¶¶ 7, 29; see also CAI Compl., ¶¶ 16-17, 68. This Court dismissed Plaintiffs’ suit as moot. See Judicial Watch, Inc. v. Kerry, 156 F. Supp. 3d. 69, 73 (D.D.C. 2016). To proceed, it reasoned, Plaintiffs must allege an ongoing injury under the FRA, which they could do only if the Secretary and Archivist had been “‘unable or unwilling’ to recover emails that might be federal records.” Id. at 76. As it happened, both NARA and State had already recovered nearly 55,000 pages of Clinton emails and were partnering with the Federal Bureau of Investigation to search for more. Id. at 76-77. Under this Court’s interpretation of the statute, Defendants’ sustained efforts sufficed to alleviate any injury. Id. at 77. The Court of Appeals reversed, applying a mootness test with more teeth. See Judicial Watch, Inc. v. Kerry, 844 F.3d 952, 953 (D.C. Cir. 2016). It allowed that “actions taken by the Department and the FBI might have mooted appellants’ claims by securing custody of all emails that the Attorney General could have recovered in an enforcement action.” Id. at 955 (emphasis added). Although the tag-team efforts “bore some fruit,” the court believed that “shaking the tree harder . . . might [] bear more still.” Id. In so holding, the Court of Appeals mentioned that the FBI had recovered a server and thumb drive housing emails from one of Clinton’s nongovernmental email addresses. Id. If Plaintiffs had “sought emails from [that] server account” only, the court noted, a mootness argument “might well succeed.” Id. But Clinton had used a second nongovernmental address, a Blackberry account, during her first weeks in office. Id. at 955-56. The record showed no effort by the State Department or FBI to recover those emails. Id. The Court of Appeals thus held that the controversy remained live “[a]bsent a 3    showing that the requested enforcement action could not shake loose a few more emails.” Id. at 955. It acknowledged, however, that Defendants had taken actions subsequent to this Court’s initial decision, permitting them to raise mootness once again on remand. Id. at 956-57. Now back for round two, Defendants accept the invitation and renew their Motion to Dismiss on mootness grounds. See MTD (ECF No. 33). To that end, they have supplemented the record previously before this Court and detailed their more recent attempts to recover the remaining emails. That effort includes piggybacking on a parallel investigation by the FBI, which sought all of Clinton’s work-related emails (with a particular emphasis on the Blackberry ones) to assess whether she had mismanaged classified information. See, e.g., id., Exhs. 1-4. As of June 15, 2017, the FBI has turned over all recovered records to the State Department. See Supp. Declaration of E.W. Priestap, ¶ 12. Defendants consequently conclude that they have no “reason to believe that recoverable Clinton email records remain extant.” Gov’t Reply, Exh. 1 (Second Declaration of Lawrence Brewer), ¶ 3; see also id., Exh. 2 (Second Declaration of Eric F. Stein), ¶ 3. II. Legal Standard To survive a motion to dismiss under Rule 12(b)(1), a plaintiff bears the burden of proving that the Court has subject-matter jurisdiction to hear its claims. See DaimlerChrysler Corp. v. Cuno, 547 U.S. 332, 342 & n.3 (2006); Arpaio v. Obama, 797 F.3d 11, 19 (D.C. Cir. 2015). A court has an “affirmative obligation to ensure that it is acting within the scope of its jurisdictional authority.” Grand Lodge of Fraternal Order of Police v. Ashcroft, 185 F. Supp. 2d 9, 13 (D.D.C. 2001). “For this reason, ‘the [p]laintiff’s factual allegations in the complaint . . . will bear closer scrutiny in resolving a 12(b)(1) motion’ than in resolving a 12(b)(6) motion for failure to state a claim.” Id. at 13-14 (quoting 5A Charles A. Wright & Arthur R. Miller, Federal 4    Practice and Procedure § 1350 (2d ed. 1987)). Additionally, unlike with a motion to dismiss under Rule 12(b)(6), the Court “may consider materials outside the pleadings in deciding whether to grant a motion to dismiss for lack of jurisdiction.” Jerome Stevens Pharms., Inc. v. FDA, 402 F.3d 1249, 1253 (D.C. Cir. 2005). III. Analysis Plaintiffs’ suits contend that Defendants must initiate action through the Attorney General to recover Secretary Clinton’s emails, which they allege are “federal records” under the FRA. See CAI Compl., ¶¶ 35-37. In seeking dismissal, Defendants rejoin that the actions are now moot, as they have already recovered all extant emails and thus need not invoke the Attorney General’s aid. Alternatively, Defendants ask the Court to grant summary judgment in their favor on the merits. Plaintiffs not only oppose Defendants’ Motion, but they cross-move for summary judgment themselves. See ECF Nos. 37 (JW), 38 (CAI). Cause of Action also moves for jurisdictional discovery to aid it in establishing the Court’s subject-matter jurisdiction, see ECF No. 38, and adds a Motion to Strike Defendants’ chief declaration in support of their mootness argument. See ECF No. 54. The Court’s analysis begins by outlining the FRA, proceeds to examine mootness, and concludes with a look at jurisdictional discovery. It need not reach the summary-judgment dispute. A. The Federal Records Act The FRA requires heads of federal agencies to “make and preserve records containing adequate and proper documentation of the organization, functions, policies, decisions, procedures, and essential transactions of the agency.” 44 U.S.C. § 3101. Each agency head shall also “establish safeguards against the removal or loss of records the head of such agency 5    determines to be necessary and required by regulations of the Archivist,” the head of the National Archives and Records Administration. Id. § 3105. When those safeguards fail, the Act sets forth a structure whereby the Archivist and agency heads are to work together to ensure that no documents are unlawfully destroyed. Each agency head shall notify the Archivist of any actual, impending, or threatened unlawful removal, defacing, alteration, corruption, deletion, erasure, or other destruction of records in the custody of the agency, and with the assistance of the Archivist shall initiate action through the Attorney General for the recovery of records the head of the Federal agency knows or has reason to believe have been unlawfully removed from that agency, or from another Federal agency whose records have been transferred to the legal custody of that Federal agency. Id. § 3106. The Act also includes a check against recalcitrant agencies. If the agency head does not enlist the Attorney General, “the Archivist shall request the Attorney General to initiate such an action, and shall notify the Congress when such a request has been made.” Id. And if both the agency head and Archivist “fail[] to initiate remedial action in a timely manner, private litigants may sue under the APA to require them to do so.” CREW v. U.S. Dep’t of Homeland Sec., 527 F. Supp. 2d 101, 110 (D.D.C. 2007) (citation and quotation marks omitted). Notwithstanding the statute’s mandatory language, the D.C. Circuit has made clear that the agency need not “initially attempt to prevent the unlawful action by seeking the initiation of legal action.” Armstrong v. Bush, 924 F.2d 282, 296 n.12 (D.C. Cir. 1991). “Instead, the FRA contemplates that the agency and Archivist may proceed first by” taking their own “intra-agency actions.” Id. In this case, the Court of Appeals affirmed that “an agency might reasonably attempt to recover its records before running to the Attorney General.” Judicial Watch, 844 F.3d 6    at 956. The agency must initiate the referral process, however, if “those initial efforts failed to recover all the missing records (or establish their fatal loss).” Id. B. Mootness At this stage, the Government assumes that Clinton’s emails are federal records and were unlawfully removed from the agency. See MTD at 5 n.3. It nevertheless contends that its subsequent recovery efforts have mooted the suit. As the Supreme Court has explained time and again, a court “may only adjudicate actual, ongoing controversies.” Honig v. Doe, 484 U.S. 305, 317 (1988). “To save a case from mootness the ongoing injury must be more than a remote possibility, not conjectural, [and] more than speculative.” Liu v. INS, 274 F.3d 533, 535 (D.C. Cir. 2001) (quotation marks and citations omitted). “Where the plaintiff has recovered all it has sought, no court action can provide further relief and the case is moot.” Judicial Watch, 844 F.3d at 954. The Court of Appeals has provided a road map for the mootness inquiry in this case. To wit, this Court must start from the premise that Plaintiffs seek to “assur[e] government recovery of emails.” Id. at 955. So long as referral to the Attorney General might recover “a few more emails,” Plaintiffs have not “been given everything [they] asked for.” Id. (quoting Noble v. Sombrotto, 525 F.3d 1230, 1241 (D.C. Cir. 2008)). The case is moot, however, if Defendants have already “secur[ed] custody of all emails that the Attorney General could have recovered in an enforcement action.” Id. To evaluate whether that is so, the Court first surveys exactly which emails went missing. Heeding the D.C. Circuit’s instructions, it then asks whether Defendants have successfully recovered those emails or otherwise established their fatal loss. 7    1. The Missing Emails Although “the Clinton emails” have taken on a larger-than-life role in our political discourse, precision in their description is often lacking. The Secretary’s emails came from different accounts and were stored on different servers. The common thread: the accounts and servers were private. As the Court of Appeals highlighted, Clinton “used two nongovernmental email addresses” while at State. Judicial Watch, 844 F.3d at 955. Before her swearing in, she primarily maintained a Blackberry email account (hr15@mycingular.blackberry.net, and then, presumably after AT&T’s 2007 acquisition of Cingular, hr15@att.blackberry.net). See First Priestap Decl., ¶ 4. By January 2009, she had decided to transition to a new private domain, clintonemail.com. Id., Exh. A (FBI Report) at 3. She created the latter account on January 13, 2009 (before she assumed office), and used it as her “primary e-mail” by mid-to-late January. Id. The Secretary apparently sent and received a few scattered emails on the Blackberry account during the subsequent weeks, but by March 18, 2009, the FBI detected no further communications from that domain. Id. In addition to private email accounts, Clinton also used private email servers while at State. An email server is akin to a virtual post office and moves messages from a sender to its intended recipient. In 2007, an aide to former President Bill Clinton purchased an Apple OS X Server (Apple Server) “for the sole purpose of hosting e-mail services for President Clinton’s staff.” Id. at 2. The Clintons maintained that server in the basement of their Chappaqua, New York, residence. Id. at 4. The Apple Server “initially hosted the domains presidentclinton.com and wjcoffice.com,” which were used exclusively by Bill Clinton’s staff. Id. at 3 & n.f. It also hosted clintonemail.com accounts for at least two Clinton staffers. Id. at 4. It is not clear 8    whether Hillary Clinton ever linked her email accounts to this server. Id. (describing conflicting reports as to whether Clinton linked her clintonemail.com domain). Around January 2009, the staff deemed the Apple Server too antiquated to meet their demands and replaced it with one set up by a former campaign worker, Bryan Pagliano (the Pagliano Server). Id. at 3. Pagliano installed the latter sever in March 2009, and Clinton used it throughout her tenure at State to host her clintonemail.com account. Id. at 4-5. Pagliano transferred emails from the Apple Server to the newer edition and believes no email content remained on the old one. Id. at 4. The Apple Server was then repurposed as a personal computer for household staff, before the Clintons discarded it in 2014. Id. In July 2013, Clinton transitioned to a third server, the Platte River Networks (PRN) server, which was run by a third-party vendor in Secaucus, New Jersey. Once again, the staff migrated all emails from the Pagliano Server to the PRN one. Id. at 6. The Secretary used this latest server exclusively after her departure from the State Department until October 3, 2015, when she voluntarily produced it to the FBI. Id. at 6-7. For those keeping track, then, Clinton used two relevant email domains (Blackberry and clintonemail.com) and at least two private servers (the Pagliano Server and the PRN Server), with the possibility of a third (the Apple Server). Clinton also used a series of personal, rather than State-issued, mobile devices. The FBI found thirteen such phones, eight of which she apparently used while at State. Id. at 8. According to Clinton aides, “[I]t was not uncommon for Clinton to use a new Blackberry for a few days and then immediately switch it out for an older version with which she was more familiar.” Id. at 9. Whenever Clinton moved to a new device, aides would dispose of the older SIM cards. Id. In at least two instances, a Clinton aide destroyed the discarded phones “by 9    breaking them in half or hitting them with a hammer.” Id. In addition to the mobile devices, Clinton used up to five different personal iPads, which she used to send emails from her clintonemail.com domain. 2. The Recovery Effort Given Clinton’s use of private email accounts and servers, the Court assumes that at least some federal records were improperly maintained outside the agency, in violation of the Federal Records Act. Plaintiffs no longer suffer a continuing injury, however, if the Government has successfully recovered those emails or established their fatal loss. See Judicial Watch, 844 F.3d at 956. The Court therefore examines that recovery effort. The State Department first attempted to recover Clinton’s emails in November 2014. The agency sent a letter to Clinton’s attorney requesting copies of emails from her personal email account that constituted federal records, if those records were not otherwise preserved in the Department’s recordkeeping system. See CAI Compl., Exh. 4 (Kennedy Letter to Cheryl Mills) at 1-2. In response, Clinton’s representatives canvassed the PRN Server for any pertinent work emails and ultimately provided State with approximately 55,000 pages of responsive documents (apparently all from the clintonemail.com address) on December 5, 2014. Id., Exh. 4 (Mills Letter to Kennedy); see also First Priestap Decl., Exh. A at 15-16. The Court relied principally on that voluntary production in issuing its initial decision. See Judicial Watch, 156 F. Supp. 3d at 76-77. In 2015, the FBI entered the equation, as part of its investigation to determine whether Clinton had unlawfully handled classified information. With her cooperation, the FBI obtained and forensically searched:  The Pagliano Server and two external hard drives used to create back-ups of it. See First Priestap Decl., ¶ 8; Judicial Watch, 844 F.3d at 955; 10     The PRN Server and an external device used for back-ups. See First Priestap Decl., ¶¶ 9-10; Exh. A at 5-7;  The commercial email account used to migrate data from the Pagliano Server to the PRN Server. See First Priestap Decl., ¶ 9; Exh. A at 17;  Two Blackberry devices associated with Secretary Clinton. See First Priestap Decl., ¶ 12; Exh. A at 8-9; and  Three iPads associated with Secretary Clinton. See First Priestap Decl., ¶ 13; Exh. A at 9. All told, the FBI recovered nearly 17,500 unique pages of emails above and beyond those already submitted by Clinton’s team. Id. at 19. In light of those extensive efforts, the Court of Appeals noted that “[i]f appellants had only sought emails from the [Pagliano] server account, a mootness argument based on the recovery of the server might well succeed.” Judicial Watch, 844 F.3d at 955. Perhaps taking the hint, Plaintiffs do not directly challenge the State Department’s recovery effort related to the Pagliano Server. This Court, too, sees no loose ends: since the initial opinion in this case, the FBI has issued a report summarizing its investigative efforts and turned over all relevant emails from that server to the State Department. See First Priestap Decl., Exh. A; Supp. Priestap Decl., ¶ 12. The Court, accordingly, finds Defendants have “recovered” all relevant communications from the Pagliano Server. See Judicial Watch, 844 F.3d at 955-56. Plaintiffs also forgo any direct challenge to the clintonemail.com account, instead zeroing in on the so-called “Blackberry emails,” — i.e., those sent during Clinton’s first months in office (from January 21, 2009, to March 18, 2009). To recap, she used that email account sporadically after her swearing-in, as she had essentially transitioned to the clintonemail.com account by mid- January. The Blackberry emails thus stand as “[t]he core dispute at this stage of litigation.” CAI Opp. at 3; see also id. at 7 (“As the Court of Appeals recognized, the primary trove of 11    unrecovered federal records at issue in this case is the BlackBerry e-mails from the first three months of Secretary Clinton’s tenure.”) (citing Judicial Watch, 844 F.3d at 955-56). Clinton initially failed to provide the State Department with emails from her Blackberry accounts, as her team could not locate any such records from that period. See First Priestap Decl., Exh. A at 20 n.bbb. As part of its forensic review, the FBI recovered “some” emails from January 23, 2009, to March 18, 2009, from a device used to back up the PRN Server. Id. It suspects, however, that those emails are “likely only a subset” of those sent. Id. On remand, the Government does not contest that some Blackberry emails remain missing. Because Defendants apparently did not “recover[]” all relevant emails, the Court must consider whether they are fatally lost or whether further digging may recover some missing messages. See Judicial Watch, 944 F.3d at 956. On cue, Lawrence Brewer, the Chief Records Officer for NARA, avers that the agency does “not know or have reason to believe that recoverable Clinton email records remain extant.” Second Brewer Decl., ¶ 3. NARA, typically the watchdog for federal records, believes that the State Department’s and FBI’s “efforts to recover the missing Federal records . . . are consistent with what agencies are required to do when records have been destroyed or alienated.” Id. State says the same. See Second Stein Decl., ¶ 3 (“State [has] reached its determination that it does not know or have reason to believe that recoverable Clinton email records remain extant that are not currently in the federal government’s possession.”). In other words, the agencies themselves believe all emails are either recovered or fatally lost. Plaintiffs, understandably, hesitate to take Defendants’ word for it. This Court, too, must be wary of relying solely on the agencies’ self-assessment. Although the D.C. Circuit did not define precisely how Defendants might “establish . . . fatal loss,” it left little doubt that the hurdle 12    was high. See Judicial Watch, 844 F.3d at 956. The Federal Records Act provides that agencies shall initiate action with the Attorney General when they “know[] or [have] reason to believe [records] have been unlawfully removed from that agency.” 44 U.S.C. § 3106. In other words, the statute directs agencies to take action so long as records were removed, leaving little room for the agencies themselves to determine whether those records are “recoverable.” Rather, the FRA treats “the law enforcement authority of the United States [as] a key weapon in assuring record preservation and recovery,” such that a suit would be moot only if there are no more “imaginable” avenues for the Attorney General to pursue. Judicial Watch, 844 F.3d at 956. Ordinarily, then, referral to the Attorney General will be the remedy for unrecovered records. This, however, is no ordinary case. The Government has already deployed the law- enforcement authority of the United States to recover Clinton’s emails, as the FBI has sought those records as part of its investigation into whether Clinton mismanaged classified information. The Court thus need not speculate about what the Attorney General might do. On remand, Defendants have submitted the declaration of Special Agent E.W. Priestap, the FBI’s lead investigator in the Clinton case. Agent Priestap swore that “there were no further steps that could have been reasonably undertaken by the FBI that would have recovered additional Clinton work-related e-mails.” Supp. Priestap Decl., ¶ 12. As Assistant Director in the Counterintelligence Division, Priestap supervised the investigation into Clinton’s private emails and server. Id., ¶¶ 1, 2. His sworn affidavit recounts the FBI’s extensive efforts to locate “all potentially work-related” emails. Id., ¶ 12. During that investigation, the “period of January 21, 2009[,] to March 18, 2009” — i.e., the period in which Clinton used the Blackberry account — was apparently “of particular interest to the FBI[],” as the agency hoped “to understand the [Secretary’s] rationale for establishing a private e-mail server” in the first instance. Id., ¶ 6. 13    The Court’s review of the supplemented record confirms that the FBI has exhausted all imaginable investigative avenues. For starters, the Bureau utilized numerous investigative methods to obtain any missing emails, including 1) seeking consensual access to any email repositories, and 2) obtaining personal electronic devices used by the Secretary that might have contained relevant emails. Id., ¶ 4. In the course of its investigation, the FBI also interviewed individuals who had the most frequent work-related communications with Secretary Clinton, thereby obtaining additional email correspondence. Id. When those initial efforts came up short, the agency shook “the tree harder,” Judicial Watch, 844 F.3d at 955, turning to legal process. See Supp. Priestap Decl., ¶ 5. Most infamously, the FBI discovered conceivably pertinent emails during an unrelated investigation into Anthony Weiner, the then-husband of Clinton’s deputy chief of staff, Huma Abedin. Id., ¶ 12; see also Matt Apuzzo, et al., Justice Department Obtains Warrant to Review Clinton Aide’s Emails, N.Y. Times (Oct. 30, 2016). In response, it sought search warrants of Abedin’s computer to ensure there were no new work-related emails located there. See id.; see also Supp. Priestap Decl., ¶ 12. Since the Court of Appeals issued its decision, the Government has also revealed that it used grand-jury subpoenas to assess whether service providers might still maintain Clinton’s emails. See First Priestap Decl., ¶ 4. In June 2017, Defendants submitted a second declaration sketching in the details of those grand-jury subpoenas. See Judicial Watch, Inc. v. Tillerson, 2017 WL 3835677, at *1 (D.D.C. Aug. 31, 2017). This later declaration came with a catch: the Government redacted the bulk of the public document, submitting the full version for in camera and ex parte review only. Id. Plaintiffs responded with a Motion to Produce, arguing that to the extent the Court might rely on the declaration, they must have unfiltered access. Id. The Court agreed the affidavit should be 14    public and therefore granted Plaintiffs’ motion, subject only to a narrow exception. Id. Defendants thus resubmitted an amended and largely unredacted “Supplemental” Priestap declaration. See ECF No. 52 (Notice of Filing of Supp. Priestap Decl.). Priestap’s latest declaration reveals that the FBI subpoenaed RIM, the maker of Blackberry electronic devices; Cingular Wireless and its successor, AT&T wireless, which provided mobile-phone service and thus data access; and the unnamed third-party service provider for Clinton’s emails. See Supp. Priestap Decl., ¶ 8. All four service providers confirmed that they “no longer retained . . . electronic communications transaction information for the accounts” and, therefore, could not produce even the most basic information (such as the subject lines or headers) requested by the FBI. Id., ¶¶ 9, 10. The Bureau deemed those responses consistent with its understanding of Blackberry devices, which “pulled” information off servers rather than storing it on a separate “cloud” server. Id., ¶ 10. Leaving nothing to chance, however, the FBI reissued the subpoenas and contacted the service providers directly. Id. Once again, the providers confirmed that they stored “no data” related to the accounts, meaning any content would be unavailable. Id. Having come up empty on those fronts, Priestap believes that the FBI has taken “all reasonable and comprehensive efforts to recover email communications relevant to its investigation” and sees no “further steps” to take. Id., ¶ 12. In other words, the Attorney General’s investigative arm joins Defendants’ conclusion that there are no remaining emails for State to recover. The FBI so concluded as part of an investigation related to national security, in which it had every incentive to “shake the tree” with all its might. It strains credulity that the Attorney General would implement a more exhaustive search in response to a federal-records request. 15    Plaintiffs protest that the FBI hunted only for classified emails. See CAI Reply at 13. Not so. Although its investigation focused on whether Clinton transmitted or stored classified information on her private systems, its search for emails was not so limited. Rather, “the FBI sought to obtain all identified e-mail communications that were transmitted or stored upon former Secretary Clinton’s private e-mail servers.” Supp. Priestap Decl., ¶ 4 (emphasis added); see also id., ¶ 12 (saying FBI sought “all potentially work-related emails from the former Secretary’s tenure”) (emphasis added). Only once the Bureau had recovered the universe of emails could it provide “relevant emails for classification review to the appropriate U.S. Government agencies.” Id., ¶ 12. In other words, it conducted blanket searches for any plausibly work-related emails because it could not have known ex ante whether those emails would contain classified information. Its search was thus coextensive with (and perhaps broader than) that required by the Federal Records Act. Cause of Action also moves to strike portions of Agent Priestap’s declaration under Federal Rule of Evidence 702, claiming that he offers an “expert” opinion that is neither relevant nor reliable. Rule 702 governs evidentiary proceedings and permits expert testimony that “will help the trier of fact to understand the evidence.” Even assuming the Court is the trier of fact here, however, Agent Priestap does not purport to be an “expert” on FBI searches. Rather, he has recounted the agency’s efforts to recover Clinton’s emails and, as a supervisor of that investigation, opined on the sufficiency of those efforts. Courts frequently rely on government affidavits to adjudicate an agency’s “retrieval efforts” in the FOIA context. See Perry v. Block, 684 F.2d 121, 126 (D.C. Cir. 1982) (quoting Founding Church of Scientology v. Nat’l Security Agency, 610 F.2d 824, 836 (D.C. Cir. 1979)). Here, too, the Court faces the “peculiar[]” situation in which the agency is “in sole possession” of the relevant information, as FBI 16    personnel have conducted the disputed searches. Id. The Court therefore necessarily relies on the agency’s assessments of those searches, although the above analysis shows that it examines such assessments with care. In any event, the Court finds Priestap’s opinions to be relevant and reliable. As outlined above, he “supervised the Clinton Server Investigation” and thereby witnessed firsthand the “investigative efforts” taken to secure her emails. See Supp. Priestap Decl., ¶ 2. He is thus uniquely situated to assess what further steps the FBI might plausibly pursue. His opinion is also relevant. Although the FBI and the Attorney General are not one and the same, Jeff Sessions would necessarily look to his investigative arm to recover Clinton’s emails. The FBI’s own assessment of its searches is therefore telling. 3. Plaintiffs’ Proposed Recovery Tactics Despite the Bureau’s assurance that no reasonable steps remain to recover Clinton’s emails, Plaintiffs suggest alternative measures that the Attorney General might take. Although they do not always tie these investigative actions to specific missing emails, Plaintiffs presumably target emails from January 21, 2009, to March 18, 2009, as they cite no other possible gaps in the record. The Court addresses each proffered tactic. a. Forensic Searches of Third-Party Servers As explained above, Agent Priestap submitted a declaration as to the FBI’s efforts to recover the Blackberry emails through grand-jury subpoenas. Plaintiffs initially rejected the affidavit as insufficient because it failed to identify the targets and scope of the subpoenas. See CAI Opp. at 8 (asking questions such as “Who or what were the targets of the subpoenas? What did the subpoenas demand? How many subpoenas were there? . . . What were [the] responses?”). 17    Pursuant to an Order from this Court, see ECF No. 49, Defendants have filed an amended declaration making public many of those missing pieces. Plaintiffs nevertheless deem the subpoenas deficient because the FBI did not search those third-party providers’ servers by forensic means. See CAI Reply at 14-15. The Government retorts that while searching Clinton’s servers for her emails was a fruitful task, that process alone took months. See Gov’t Reply at 7. Asking AT&T or Blackberry to search their servers, which house millions of communications from millions of users, is more akin to searching “for specific grains of sand on a beach.” Id. The FBI declined to take that route, as it had (and still has) no basis to believe it would find relevant emails through such a search; indeed, the service providers swore in response to subpoenas that they retained “no data” related to the emails. See Supp. Priestap Decl., ¶ 10. More to the point, the Government apparently sees no legal basis to order those third parties to forensically search their servers. See Gov’t Reply at 6-7 (noting plaintiffs offered no authority that would require the service providers to conduct search or allow Government to do so). If the FBI believes its investigation has provided no factual basis to search those servers, the Court deems it unimaginable that the Attorney General would nevertheless chart that course. b. iMac Computer Cause of Action next suggests that Clinton’s current iMac computer might be “another repository [for] unlawfully removed federal records.” CAI Opp. at 9-10. To refresh, Bill Clinton set up the private Apple Server for his staffers, before the Clintons adopted the Pagliano Server in March 2009. See First Priestap Decl., Exh. A at 4. There is confusion in the record about whether Hillary Clinton linked any of her personal email accounts to the Apple Server. It appears she used third-party servers to host her Blackberry account during that period, but one 18    staffer suggested that the Apple Server briefly hosted the Secretary’s clintonemail.com account. Id. There is no suggestion, however, that any emails from the latter account are actually missing, and Plaintiffs do not argue as much. Indeed, Clinton’s staff members believe that they migrated all emails from the Apple Server to the Pagliano Server in the transition. Id. at 4. If so, there is no meaningful data left on the former. In any event, the Apple Server is long gone. After the server transition, Clinton repurposed the server for use as a personal computer by household staff. Id. In 2014 — more than five years later — she bought a new iMac Computer and apparently transferred some data from the Apple Server onto that device before jettisoning the original server. Id. at 4-5. It is that latest computer that is at issue in this case, and it is only relevant if a) there were any Clinton emails on the Apple Server that b) were omitted in the first migration to the Pagliano Server, but nevertheless c) were inadvertently migrated five years later to a new iMac computer. The Government considers those dots too remote to connect. The FBI concluded that “there was no investigative reason to believe that any email from the original Apple Server” would be on the newer iMac computer. See Gov’t Reply at 11; see also First Priestap Decl., ¶ 7. Given the lack of probable cause, the Government “had no legal basis to attempt to obtain the iMac hard drive.” Gov’t Reply at 12. In an abundance of caution, however, the FBI took the only step legally available to it: it asked Clinton’s lawyers, Williams & Connolly, to voluntarily review the iMac computer for any relevant records by using “a keyword search consisting of terms identified by the FBI.” First Priestap Decl., ¶ 7. After doing so, Williams & Connolly 19    confirmed that the computer contained no emails from Clinton’s time at State, and the Bureau found no information that cast doubt on that conclusion. Id. CAI spills much ink attacking the firm’s conclusions as hearsay and questioning the reliability of its report. See CAI Opp. at 9-17. Its charges, however, miss the mark. Even were hearsay inadmissible in this context, the Court’s conclusion does not hinge on whether Williams & Connolly was correct that the iMac housed no Clinton emails (although this Court has no reason to doubt the firm’s veracity). Rather, the important point is that Williams & Connolly told the FBI as much, and the Bureau believes it has no further routes to pursue. Having apparently concluded there was no legal basis for a warrant to search the iMac computer, the FBI needed to rely on this type of voluntary report. Once again, the Court deems it exceedingly farfetched that the Attorney General would pursue a different course for missing federal records. c. Mobile Devices/iPads In one paragraph, Cause of Action cursorily contends that the FBI should have subpoenaed Clinton’s thirteen mobile devices and five iPads. See CAI Opp. at 16 & n.7. This, too, is not a plausible investigative action. First, the Bureau did request the relevant devices from Clinton’s team and thereby recovered two phones and three iPads. See First Priestap Decl., ¶¶ 11-13. None of the phones contained relevant records. Id., ¶ 12. Two of the iPads were likewise barren, and the remaining iPad contained three emails from 2012 in a “drafts” folder. Id., ¶ 13. The FBI thus had little reason to believe that the other devices would contain emails at all, much less unrecovered emails. That is especially so because, in her interview with FBI agents, Clinton said that she required her aides to dispose of Blackberry SIM cards as soon as she switched to a new device. Id., Exh. A at 9. One aide testified to physically destroying at least two Blackberries with a hammer. Id. Short of resurrecting those phones from the dead, the FBI 20    had no way to examine any such device. The iPads would also lead to dead ends for the Plaintiffs — Apple did not even release the first iPad for public use until April 2010, well after Clinton had switched to the Pagliano Server. Once again, with no reason to believe that the phones or iPads would house relevant emails (or even remain intact), the Attorney General would have no basis to subpoena them. d. Third Parties Finally, Judicial Watch suggests a different course: interviewing third parties. See JW Opp. at 4-6. It alleges that neither “Defendants nor the FBI sought records from persons who received or sent emails to Secretary Clinton and other officials.” Id. at 4. On the contrary, the FBI did interview individuals who most frequently exchanged work-related communications with Secretary Clinton, including Cheryl Mills, Clinton’s Chief of Staff; Jake Sullivan, the Director of Policy Planning; Huma Abedin, the Deputy Chief of Staff; and Sidney Blumenthal, an informal political advisor. See First. Priestap Decl., Exh. A at 24-26. Those interviews are significant, as the FBI determined that only thirteen individuals regularly maintained direct email contact with Clinton through her clintonemail.com account. See id., Exh. A at 13. Indeed, Mills, Sullivan, and Abedin accounted for 68% “of the emails sent directly to Clinton.” Id. Pursuant to those interviews, the Bureau obtained additional email correspondence between those individuals and Clinton, most of which were copies already collected. See Supp. Priestap Decl., ¶ 4. Additionally, as Judicial Watch concedes, any email sent to or from a State employee is already in the Department’s possession. See JW Opp. at 4. Plaintiff would have the FBI go deeper into the well. Most concretely, it seeks email correspondence between Clinton and David Petraeus, who then headed U.S. Central Command (CENTCOM). Id. at 6. Judicial Watch relies on one FBI agent’s handwritten notes from an 21    interview with a State Department employee, which suggest that Clinton and Petraeus exchanged “1000 emails,” “most not in the 30k.” JW Opp., Exh. C (FBI Notes) at HRC-2573. Assuming “not in the 30k” means “unrecovered,” that report might suggest a hole in Defendants’ effort. But in a sworn affidavit, the Government explains that the “1000” emails listed in the report is a red herring. See Second Stein Decl., ¶¶ 5-6. In July 2015, CENTCOM queried its system using the keywords “Hillary” or “Clinton” and estimated that approximately 2,200 emails matched the search. Id., ¶ 6. That search, however, did not reflect the numbers of emails actually sent or received by Clinton; rather, it captured any threads referencing the Secretary. Id. In August 2015, the agency conducted a more targeted search and found 18 email threads between Clinton and Petraeus. Id. Each was a copy of threads already produced to the State Department. Id. To be safe, the Department of Defense nonetheless sent those 18 email threads to State, id., and thereby closed the chapter on the Petraeus emails. Judicial Watch adds a string cite of other potential interviewees. See JW Opp. at 5. To compile the list, it reviewed the State Department’s published database of Clinton’s emails and identified her frequent correspondents, which it deems “likely” to have missing records. Id.; see also id., Exh. A (Declaration of Kristi Jesperson). That logic, however, suffers a fatal flaw: Plaintiff compiled its list from emails already recovered. See JW Opp. at 5. Contra Judicial Watch, it is not obvious — or even likely — that persons on the “frequent sender” list would have exchanged unrecovered emails. A review of the same public database consulted by Plaintiff reveals that Clinton emailed the following people between January 2009 and March 18, 2009:  Huma Abedin  Doug Band, the chief of staff of the Clinton Foundation 22     Colin Powell, a former Secretary of State  Lona Valmoro, a special assistant  Oscar Flores, a personal aide  Lissa Muscatine, a Clinton speechwriter. U.S. Dep’t of State, Virtual Reading Room Documents (last accessed Nov. 1, 2017), available at https://foia.state.gov/search/results.aspx?searchText=*&caseNumber=F-2016-07895. All but Colin Powell used Clinton’s newer clintonemail.com domain, and there is no allegation of any missing records from that account nor reason to think that these contacts sent other, unrecovered messages. Apparently, Clinton’s most frequent contacts knew she had transitioned from the Blackberry account by her swearing-in. From time to time, Clinton would receive emails on her Blackberry account and forward them to her assistant, Oscar Flores, with instructions to print. From reviewing those records, the Court sees no pattern to those contacts and, again, has no reason to suspect that they might harbor additional emails. Against that backdrop, the Archivist, State Department, FBI, and, indeed, the Attorney General would have little reason to suspect that any of Judicial Watch’s “frequent senders” — or any other known email recipients — have copies of any unrecovered records. While it is plausible, albeit barely, that some third parties might retain relevant records nearly a decade after the conversations, and that the FBI might convince such parties to turn them over voluntarily, the Attorney General has no way to know who those third parties might be. The FBI understandably deemed this path too far afield to pursue, and the Court once again concludes that it is implausible that the Attorney General would buck its own investigative arm to demand otherwise. The Court of Appeals may have asked the Government to “shak[e] the tree harder” 23    for more emails, but it never suggested that the FBI must shake every tree in every forest, without knowing whether they are fruit trees. See Judicial Watch, 844 F.3d at 955. * * * To sum up, Defendants and the FBI have recited chapter and verse of their efforts to recover Secretary Clinton’s emails. Those efforts went well beyond the mine-run search for missing federal records, see Second Brewer Decl., ¶¶ 11-14, and were largely successful, save for some emails sent during a two-month stretch. Even then, the FBI pursued every imaginable avenue to recover the missing emails. Plaintiffs, significantly, cast no real doubt on that conclusion. So now, when the Government avers that there are no enforcement steps left for the Attorney General, the Court takes such conclusion seriously. It thus finds that Defendants have “secur[ed] custody of all emails that the Attorney General could have recovered in an enforcement action,” Judicial Watch, 844 F.3d at 955, such that the suit is moot. C. Jurisdictional Discovery In addition to opposing Defendants’ Motion to Dismiss, CAI has separately moved for jurisdictional discovery. See ECF No. 38. In this circuit, “if a party demonstrates that it can supplement its jurisdictional allegations through discovery, then jurisdictional discovery is justified.” GTE New Media Servs. Inc. v. BellSouth Corp., 199 F.3d 1343, 1351 (D.C. Cir. 2000). At the same time, “[i]t is well established that the district court has broad discretion in its resolution of [jurisdictional] discovery problems.” FC Inv. Grp. LC v. IFX Mkts., Ltd., 529 F.3d 1087, 1093 (D.C. Cir. 2008) (internal quotation marks and citations omitted). Courts typically permit jurisdictional discovery where “[t]he record . . . before the court is plainly inadequate,” and the party seeking discovery “may be able to present new facts to bolster [its] theory” regarding jurisdiction. BellSouth Corp., 199 F.3d at 1352. “[H]owever, in 24    order to get jurisdictional discovery a plaintiff must have at least a good faith belief that such discovery will enable it to show that the court” enjoys jurisdiction over the suit. Caribbean Broad. Sys., Ltd. v. Cable & Wireless PLC, 148 F.3d 1080, 1090 (D.C. Cir. 1998). Furthermore, “a plaintiff must make a ‘detailed showing of what discovery it wishes to conduct or what results it thinks such discovery would produce.’” NBC-USA Housing, Inc., Twenty-Six v. Donovan, 774 F. Supp. 2d 277, 295 (D.D.C. 2011) (quoting Atlantigas Corp. v. Nisource, Inc., 290 F. Supp. 2d 34, 53 (D.D.C. 2003)). Importantly, “a request for jurisdictional discovery cannot be based on mere conjecture or speculation.” IFX Mkts., Ltd., 529 F.3d at 1094 (citing Bastin v. Fed. Nat’l Mortgage Ass’n, 104 F.3d 1392, 1396 (D.C. Cir. 1997)). In this case, Cause of Action seeks discovery “to determine the extent of the federal government’s purported efforts to recover the BlackBerry e-mails and adequately search the iMac computer.” CAI Opp. at 23. The Court sees no need for discovery on either score. First, as discussed above, Defendants have extensively documented their (and the FBI’s) efforts to track down the Blackberry account. When CAI moved for discovery, it complained that Defendants had relied on bare allegations that the FBI had used grand-jury subpoenas, without “identifying the targets, the subpoenas’ scope, and the substance of the targets’ response.” Id. at 23-24. Defendants have since supplemented the record with a second declaration, which provides exactly that information. The Government has now documented extensively the subpoenas related to this suit, while staying within the bounds of Federal Rule of Criminal Procedure 6(e), which favors keeping those matters secret. The Court therefore finds nothing left for Plaintiffs to discover. So, too, for the iMac computer. Plaintiff complains that Defendants “rely on inadmissible hearsay in an attempt to establish that the iMac contains no recoverable federal 25    records.” CAI Opp. at 24. In other words, it finds the iMac report unpersuasive to establish mootness, an argument that this Court rejected above. It is unclear, however, how that complaint relates to jurisdictional discovery. Cause of Action also suggests that it cannot “ascertain the complete facts about Defendants[’]” efforts related to the iMac computer. Id. As an initial matter, Plaintiff’s questions relate largely to the FBI, not the State Department, from whom it seeks discovery. It offers no reason, moreover, to suspect that the FBI has withheld information in that regard. Plaintiffs may see Williams & Connolly’s report as vague, but the Bureau did not personally conduct the iMac search, so it, too, had to rely on Clinton’s lawyers. Indeed, it is unclear why the FBI would harbor hidden reports related to the iMac. If the Government had information as to additional search efforts, turning those over to the Court would only have bolstered its case for mootness. Plaintiff has thus failed to persuade the Court that it has “a good faith basis” to believe facts supporting jurisdiction exist and are likely to be found with targeted discovery. See NBC-USA Housing, 774 F. Supp. 2d at 295. As such, the Court will deny its Motion. IV. Conclusion For the foregoing reasons, the Court will deny Cause of Action’s Motions for Jurisdictional Discovery and to Strike, and it will grant Defendants’ Motion to Dismiss. A contemporaneous Order to that effect will issue this day. /s/ James E. Boasberg JAMES E. BOASBERG United States District Judge Date: November 9, 2017   26