UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
JUDICIAL WATCH, INC.,
Plaintiff,
v. Civil Action No. 15-785 (JEB)
REX W. TIILLERSON, in his official
capacity as U.S. Secretary of State,
Defendant.
-------------------------------------------------------
CAUSE OF ACTION INSTITUTE,
Plaintiff,
v.
REX W. TILLERSON, in his official Civil Action No. 15-1068 (JEB)
capacity as U.S. Secretary of State,
and
DAVID S. FERRIERO, in his official
capacity as U.S. Archivist,
Defendants.
MEMORANDUM OPINION
A full year has now passed since the 2016 presidential election, but the controversy over
Hillary Clinton’s emails endures. As readers well remember, Clinton used private email
accounts and servers during her tenure as Secretary of State. When news first broke that those
accounts were employed to “conduct official government business,” Plaintiffs Judicial Watch
and Cause of Action became concerned that the Government might not have retained records of
her emails. See JW Compl., ¶ 5; CAI Compl., ¶ 9. To spur recovery, each filed a separate suit
alleging violations of the Federal Records Act, “a collection of statutes governing the creation,
1
management, and disposal of federal records.” Public Citizen v. Carlin, 184 F.3d 900, 902 (D.C.
Cir. 1999). Plaintiffs argued that pursuant to the statutory scheme, Defendants State Department
and the National Archives and Records Administration (NARA) must enlist the Attorney
General’s aid in recovering Clinton’s emails.
In the parties’ first consolidated foray before this Court, the Government moved to
dismiss the case as moot, arguing that it had done all that the FRA requires. The Court took the
bait, holding that because Defendants had already taken significant steps to recover the emails,
Plaintiffs suffered no ongoing injury. The Court of Appeals reversed and, in doing so,
established a higher hurdle for Defendants to clear. Namely, they must initiate action with the
Attorney General unless they either recover all the missing emails or “establish their fatal loss.”
Judicial Watch, Inc. v. Kerry, 844 F.3d 952, 956 (D.C. Cir. 2016). On remand, the
Administration may have changed, but the Government’s stance remains the same. Relying on
new evidence of their additional efforts to track down the Clinton emails, Defendants play the
mootness card once more. Based on that supplemented record, the Court again agrees the suit is
moot and therefore grants their Motion to Dismiss.
I. Background
Plaintiffs are two non-profit organizations, which describe themselves as dedicated to
promoting “transparency, accountability, and integrity in government.” JW Compl., ¶ 3; see also
CAI Compl., ¶ 21. After learning of Clinton’s private email accounts, both organizations
believed that the Secretary had unlawfully removed federal records from the State Department.
See JW Compl., ¶ 5; CAI Compl., ¶ 9. Judicial Watch therefore filed suit on May 2015, and
Cause of Action joined the mix two months later. See Minute Order of August 4, 2015 (granting
Government’s Motion to Consolidate Cases). Plaintiffs claimed principally that the State
2
Department had failed to retain agency records in violation of the Federal Records Act, such that
the current Secretary of State must “initiate action through the attorney general to recover the
Clinton emails.” JW Compl., ¶¶ 7, 29; see also CAI Compl., ¶¶ 16-17, 68.
This Court dismissed Plaintiffs’ suit as moot. See Judicial Watch, Inc. v. Kerry, 156 F.
Supp. 3d. 69, 73 (D.D.C. 2016). To proceed, it reasoned, Plaintiffs must allege an ongoing
injury under the FRA, which they could do only if the Secretary and Archivist had been “‘unable
or unwilling’ to recover emails that might be federal records.” Id. at 76. As it happened, both
NARA and State had already recovered nearly 55,000 pages of Clinton emails and were
partnering with the Federal Bureau of Investigation to search for more. Id. at 76-77. Under this
Court’s interpretation of the statute, Defendants’ sustained efforts sufficed to alleviate any injury.
Id. at 77.
The Court of Appeals reversed, applying a mootness test with more teeth. See Judicial
Watch, Inc. v. Kerry, 844 F.3d 952, 953 (D.C. Cir. 2016). It allowed that “actions taken by the
Department and the FBI might have mooted appellants’ claims by securing custody of all emails
that the Attorney General could have recovered in an enforcement action.” Id. at 955 (emphasis
added). Although the tag-team efforts “bore some fruit,” the court believed that “shaking the
tree harder . . . might [] bear more still.” Id. In so holding, the Court of Appeals mentioned that
the FBI had recovered a server and thumb drive housing emails from one of Clinton’s
nongovernmental email addresses. Id. If Plaintiffs had “sought emails from [that] server
account” only, the court noted, a mootness argument “might well succeed.” Id. But Clinton had
used a second nongovernmental address, a Blackberry account, during her first weeks in office.
Id. at 955-56. The record showed no effort by the State Department or FBI to recover those
emails. Id. The Court of Appeals thus held that the controversy remained live “[a]bsent a
3
showing that the requested enforcement action could not shake loose a few more emails.” Id. at
955. It acknowledged, however, that Defendants had taken actions subsequent to this Court’s
initial decision, permitting them to raise mootness once again on remand. Id. at 956-57.
Now back for round two, Defendants accept the invitation and renew their Motion to
Dismiss on mootness grounds. See MTD (ECF No. 33). To that end, they have supplemented
the record previously before this Court and detailed their more recent attempts to recover the
remaining emails. That effort includes piggybacking on a parallel investigation by the FBI,
which sought all of Clinton’s work-related emails (with a particular emphasis on the Blackberry
ones) to assess whether she had mismanaged classified information. See, e.g., id., Exhs. 1-4. As
of June 15, 2017, the FBI has turned over all recovered records to the State Department. See
Supp. Declaration of E.W. Priestap, ¶ 12. Defendants consequently conclude that they have no
“reason to believe that recoverable Clinton email records remain extant.” Gov’t Reply, Exh. 1
(Second Declaration of Lawrence Brewer), ¶ 3; see also id., Exh. 2 (Second Declaration of Eric
F. Stein), ¶ 3.
II. Legal Standard
To survive a motion to dismiss under Rule 12(b)(1), a plaintiff bears the burden of
proving that the Court has subject-matter jurisdiction to hear its claims. See DaimlerChrysler
Corp. v. Cuno, 547 U.S. 332, 342 & n.3 (2006); Arpaio v. Obama, 797 F.3d 11, 19 (D.C. Cir.
2015). A court has an “affirmative obligation to ensure that it is acting within the scope of its
jurisdictional authority.” Grand Lodge of Fraternal Order of Police v. Ashcroft, 185 F. Supp. 2d
9, 13 (D.D.C. 2001). “For this reason, ‘the [p]laintiff’s factual allegations in the complaint . . .
will bear closer scrutiny in resolving a 12(b)(1) motion’ than in resolving a 12(b)(6) motion for
failure to state a claim.” Id. at 13-14 (quoting 5A Charles A. Wright & Arthur R. Miller, Federal
4
Practice and Procedure § 1350 (2d ed. 1987)). Additionally, unlike with a motion to dismiss
under Rule 12(b)(6), the Court “may consider materials outside the pleadings in deciding
whether to grant a motion to dismiss for lack of jurisdiction.” Jerome Stevens Pharms., Inc. v.
FDA, 402 F.3d 1249, 1253 (D.C. Cir. 2005).
III. Analysis
Plaintiffs’ suits contend that Defendants must initiate action through the Attorney
General to recover Secretary Clinton’s emails, which they allege are “federal records” under the
FRA. See CAI Compl., ¶¶ 35-37. In seeking dismissal, Defendants rejoin that the actions are
now moot, as they have already recovered all extant emails and thus need not invoke the
Attorney General’s aid. Alternatively, Defendants ask the Court to grant summary judgment in
their favor on the merits. Plaintiffs not only oppose Defendants’ Motion, but they cross-move
for summary judgment themselves. See ECF Nos. 37 (JW), 38 (CAI). Cause of Action also
moves for jurisdictional discovery to aid it in establishing the Court’s subject-matter jurisdiction,
see ECF No. 38, and adds a Motion to Strike Defendants’ chief declaration in support of their
mootness argument. See ECF No. 54.
The Court’s analysis begins by outlining the FRA, proceeds to examine mootness, and
concludes with a look at jurisdictional discovery. It need not reach the summary-judgment
dispute.
A. The Federal Records Act
The FRA requires heads of federal agencies to “make and preserve records containing
adequate and proper documentation of the organization, functions, policies, decisions,
procedures, and essential transactions of the agency.” 44 U.S.C. § 3101. Each agency head shall
also “establish safeguards against the removal or loss of records the head of such agency
5
determines to be necessary and required by regulations of the Archivist,” the head of the
National Archives and Records Administration. Id. § 3105.
When those safeguards fail, the Act sets forth a structure whereby the Archivist and
agency heads are to work together to ensure that no documents are unlawfully destroyed. Each
agency head
shall notify the Archivist of any actual, impending, or threatened
unlawful removal, defacing, alteration, corruption, deletion, erasure,
or other destruction of records in the custody of the agency, and with
the assistance of the Archivist shall initiate action through the
Attorney General for the recovery of records the head of the Federal
agency knows or has reason to believe have been unlawfully
removed from that agency, or from another Federal agency whose
records have been transferred to the legal custody of that Federal
agency.
Id. § 3106. The Act also includes a check against recalcitrant agencies. If the agency head does
not enlist the Attorney General, “the Archivist shall request the Attorney General to initiate such
an action, and shall notify the Congress when such a request has been made.” Id. And if both
the agency head and Archivist “fail[] to initiate remedial action in a timely manner, private
litigants may sue under the APA to require them to do so.” CREW v. U.S. Dep’t of Homeland
Sec., 527 F. Supp. 2d 101, 110 (D.D.C. 2007) (citation and quotation marks omitted).
Notwithstanding the statute’s mandatory language, the D.C. Circuit has made clear that
the agency need not “initially attempt to prevent the unlawful action by seeking the initiation of
legal action.” Armstrong v. Bush, 924 F.2d 282, 296 n.12 (D.C. Cir. 1991). “Instead, the FRA
contemplates that the agency and Archivist may proceed first by” taking their own “intra-agency
actions.” Id. In this case, the Court of Appeals affirmed that “an agency might reasonably
attempt to recover its records before running to the Attorney General.” Judicial Watch, 844 F.3d
6
at 956. The agency must initiate the referral process, however, if “those initial efforts failed to
recover all the missing records (or establish their fatal loss).” Id.
B. Mootness
At this stage, the Government assumes that Clinton’s emails are federal records and were
unlawfully removed from the agency. See MTD at 5 n.3. It nevertheless contends that its
subsequent recovery efforts have mooted the suit. As the Supreme Court has explained time and
again, a court “may only adjudicate actual, ongoing controversies.” Honig v. Doe, 484 U.S. 305,
317 (1988). “To save a case from mootness the ongoing injury must be more than a remote
possibility, not conjectural, [and] more than speculative.” Liu v. INS, 274 F.3d 533, 535 (D.C.
Cir. 2001) (quotation marks and citations omitted). “Where the plaintiff has recovered all it has
sought, no court action can provide further relief and the case is moot.” Judicial Watch, 844
F.3d at 954.
The Court of Appeals has provided a road map for the mootness inquiry in this case. To
wit, this Court must start from the premise that Plaintiffs seek to “assur[e] government recovery
of emails.” Id. at 955. So long as referral to the Attorney General might recover “a few more
emails,” Plaintiffs have not “been given everything [they] asked for.” Id. (quoting Noble v.
Sombrotto, 525 F.3d 1230, 1241 (D.C. Cir. 2008)). The case is moot, however, if Defendants
have already “secur[ed] custody of all emails that the Attorney General could have recovered in
an enforcement action.” Id. To evaluate whether that is so, the Court first surveys exactly which
emails went missing. Heeding the D.C. Circuit’s instructions, it then asks whether Defendants
have successfully recovered those emails or otherwise established their fatal loss.
7
1. The Missing Emails
Although “the Clinton emails” have taken on a larger-than-life role in our political
discourse, precision in their description is often lacking. The Secretary’s emails came from
different accounts and were stored on different servers. The common thread: the accounts and
servers were private. As the Court of Appeals highlighted, Clinton “used two nongovernmental
email addresses” while at State. Judicial Watch, 844 F.3d at 955. Before her swearing in, she
primarily maintained a Blackberry email account (hr15@mycingular.blackberry.net, and then,
presumably after AT&T’s 2007 acquisition of Cingular, hr15@att.blackberry.net). See First
Priestap Decl., ¶ 4. By January 2009, she had decided to transition to a new private domain,
clintonemail.com. Id., Exh. A (FBI Report) at 3. She created the latter account on January 13,
2009 (before she assumed office), and used it as her “primary e-mail” by mid-to-late January.
Id. The Secretary apparently sent and received a few scattered emails on the Blackberry account
during the subsequent weeks, but by March 18, 2009, the FBI detected no further
communications from that domain. Id.
In addition to private email accounts, Clinton also used private email servers while at
State. An email server is akin to a virtual post office and moves messages from a sender to its
intended recipient. In 2007, an aide to former President Bill Clinton purchased an Apple OS X
Server (Apple Server) “for the sole purpose of hosting e-mail services for President Clinton’s
staff.” Id. at 2. The Clintons maintained that server in the basement of their Chappaqua, New
York, residence. Id. at 4. The Apple Server “initially hosted the domains presidentclinton.com
and wjcoffice.com,” which were used exclusively by Bill Clinton’s staff. Id. at 3 & n.f. It also
hosted clintonemail.com accounts for at least two Clinton staffers. Id. at 4. It is not clear
8
whether Hillary Clinton ever linked her email accounts to this server. Id. (describing conflicting
reports as to whether Clinton linked her clintonemail.com domain).
Around January 2009, the staff deemed the Apple Server too antiquated to meet their
demands and replaced it with one set up by a former campaign worker, Bryan Pagliano (the
Pagliano Server). Id. at 3. Pagliano installed the latter sever in March 2009, and Clinton used it
throughout her tenure at State to host her clintonemail.com account. Id. at 4-5. Pagliano
transferred emails from the Apple Server to the newer edition and believes no email content
remained on the old one. Id. at 4. The Apple Server was then repurposed as a personal computer
for household staff, before the Clintons discarded it in 2014. Id.
In July 2013, Clinton transitioned to a third server, the Platte River Networks (PRN)
server, which was run by a third-party vendor in Secaucus, New Jersey. Once again, the staff
migrated all emails from the Pagliano Server to the PRN one. Id. at 6. The Secretary used this
latest server exclusively after her departure from the State Department until October 3, 2015,
when she voluntarily produced it to the FBI. Id. at 6-7. For those keeping track, then, Clinton
used two relevant email domains (Blackberry and clintonemail.com) and at least two private
servers (the Pagliano Server and the PRN Server), with the possibility of a third (the Apple
Server).
Clinton also used a series of personal, rather than State-issued, mobile devices. The FBI
found thirteen such phones, eight of which she apparently used while at State. Id. at 8.
According to Clinton aides, “[I]t was not uncommon for Clinton to use a new Blackberry for a
few days and then immediately switch it out for an older version with which she was more
familiar.” Id. at 9. Whenever Clinton moved to a new device, aides would dispose of the older
SIM cards. Id. In at least two instances, a Clinton aide destroyed the discarded phones “by
9
breaking them in half or hitting them with a hammer.” Id. In addition to the mobile devices,
Clinton used up to five different personal iPads, which she used to send emails from her
clintonemail.com domain.
2. The Recovery Effort
Given Clinton’s use of private email accounts and servers, the Court assumes that at least
some federal records were improperly maintained outside the agency, in violation of the Federal
Records Act. Plaintiffs no longer suffer a continuing injury, however, if the Government has
successfully recovered those emails or established their fatal loss. See Judicial Watch, 844 F.3d
at 956. The Court therefore examines that recovery effort.
The State Department first attempted to recover Clinton’s emails in November 2014. The
agency sent a letter to Clinton’s attorney requesting copies of emails from her personal email
account that constituted federal records, if those records were not otherwise preserved in the
Department’s recordkeeping system. See CAI Compl., Exh. 4 (Kennedy Letter to Cheryl Mills)
at 1-2. In response, Clinton’s representatives canvassed the PRN Server for any pertinent work
emails and ultimately provided State with approximately 55,000 pages of responsive documents
(apparently all from the clintonemail.com address) on December 5, 2014. Id., Exh. 4 (Mills
Letter to Kennedy); see also First Priestap Decl., Exh. A at 15-16. The Court relied principally
on that voluntary production in issuing its initial decision. See Judicial Watch, 156 F. Supp. 3d
at 76-77.
In 2015, the FBI entered the equation, as part of its investigation to determine whether
Clinton had unlawfully handled classified information. With her cooperation, the FBI obtained
and forensically searched:
The Pagliano Server and two external hard drives used to create back-ups of it.
See First Priestap Decl., ¶ 8; Judicial Watch, 844 F.3d at 955;
10
The PRN Server and an external device used for back-ups. See First Priestap
Decl., ¶¶ 9-10; Exh. A at 5-7;
The commercial email account used to migrate data from the Pagliano Server to
the PRN Server. See First Priestap Decl., ¶ 9; Exh. A at 17;
Two Blackberry devices associated with Secretary Clinton. See First Priestap
Decl., ¶ 12; Exh. A at 8-9; and
Three iPads associated with Secretary Clinton. See First Priestap Decl., ¶ 13;
Exh. A at 9.
All told, the FBI recovered nearly 17,500 unique pages of emails above and beyond those
already submitted by Clinton’s team. Id. at 19.
In light of those extensive efforts, the Court of Appeals noted that “[i]f appellants had
only sought emails from the [Pagliano] server account, a mootness argument based on the
recovery of the server might well succeed.” Judicial Watch, 844 F.3d at 955. Perhaps taking the
hint, Plaintiffs do not directly challenge the State Department’s recovery effort related to the
Pagliano Server. This Court, too, sees no loose ends: since the initial opinion in this case, the
FBI has issued a report summarizing its investigative efforts and turned over all relevant emails
from that server to the State Department. See First Priestap Decl., Exh. A; Supp. Priestap Decl.,
¶ 12. The Court, accordingly, finds Defendants have “recovered” all relevant communications
from the Pagliano Server. See Judicial Watch, 844 F.3d at 955-56.
Plaintiffs also forgo any direct challenge to the clintonemail.com account, instead zeroing
in on the so-called “Blackberry emails,” — i.e., those sent during Clinton’s first months in office
(from January 21, 2009, to March 18, 2009). To recap, she used that email account sporadically
after her swearing-in, as she had essentially transitioned to the clintonemail.com account by mid-
January. The Blackberry emails thus stand as “[t]he core dispute at this stage of litigation.” CAI
Opp. at 3; see also id. at 7 (“As the Court of Appeals recognized, the primary trove of
11
unrecovered federal records at issue in this case is the BlackBerry e-mails from the first three
months of Secretary Clinton’s tenure.”) (citing Judicial Watch, 844 F.3d at 955-56).
Clinton initially failed to provide the State Department with emails from her Blackberry
accounts, as her team could not locate any such records from that period. See First Priestap
Decl., Exh. A at 20 n.bbb. As part of its forensic review, the FBI recovered “some” emails from
January 23, 2009, to March 18, 2009, from a device used to back up the PRN Server. Id. It
suspects, however, that those emails are “likely only a subset” of those sent. Id. On remand, the
Government does not contest that some Blackberry emails remain missing. Because Defendants
apparently did not “recover[]” all relevant emails, the Court must consider whether they are
fatally lost or whether further digging may recover some missing messages. See Judicial Watch,
944 F.3d at 956.
On cue, Lawrence Brewer, the Chief Records Officer for NARA, avers that the agency
does “not know or have reason to believe that recoverable Clinton email records remain extant.”
Second Brewer Decl., ¶ 3. NARA, typically the watchdog for federal records, believes that the
State Department’s and FBI’s “efforts to recover the missing Federal records . . . are consistent
with what agencies are required to do when records have been destroyed or alienated.” Id. State
says the same. See Second Stein Decl., ¶ 3 (“State [has] reached its determination that it does
not know or have reason to believe that recoverable Clinton email records remain extant that are
not currently in the federal government’s possession.”). In other words, the agencies themselves
believe all emails are either recovered or fatally lost.
Plaintiffs, understandably, hesitate to take Defendants’ word for it. This Court, too, must
be wary of relying solely on the agencies’ self-assessment. Although the D.C. Circuit did not
define precisely how Defendants might “establish . . . fatal loss,” it left little doubt that the hurdle
12
was high. See Judicial Watch, 844 F.3d at 956. The Federal Records Act provides that agencies
shall initiate action with the Attorney General when they “know[] or [have] reason to believe
[records] have been unlawfully removed from that agency.” 44 U.S.C. § 3106. In other words,
the statute directs agencies to take action so long as records were removed, leaving little room
for the agencies themselves to determine whether those records are “recoverable.” Rather, the
FRA treats “the law enforcement authority of the United States [as] a key weapon in assuring
record preservation and recovery,” such that a suit would be moot only if there are no more
“imaginable” avenues for the Attorney General to pursue. Judicial Watch, 844 F.3d at 956.
Ordinarily, then, referral to the Attorney General will be the remedy for unrecovered records.
This, however, is no ordinary case. The Government has already deployed the law-
enforcement authority of the United States to recover Clinton’s emails, as the FBI has sought
those records as part of its investigation into whether Clinton mismanaged classified information.
The Court thus need not speculate about what the Attorney General might do. On remand,
Defendants have submitted the declaration of Special Agent E.W. Priestap, the FBI’s lead
investigator in the Clinton case. Agent Priestap swore that “there were no further steps that
could have been reasonably undertaken by the FBI that would have recovered additional Clinton
work-related e-mails.” Supp. Priestap Decl., ¶ 12. As Assistant Director in the
Counterintelligence Division, Priestap supervised the investigation into Clinton’s private emails
and server. Id., ¶¶ 1, 2. His sworn affidavit recounts the FBI’s extensive efforts to locate “all
potentially work-related” emails. Id., ¶ 12. During that investigation, the “period of January 21,
2009[,] to March 18, 2009” — i.e., the period in which Clinton used the Blackberry account —
was apparently “of particular interest to the FBI[],” as the agency hoped “to understand the
[Secretary’s] rationale for establishing a private e-mail server” in the first instance. Id., ¶ 6.
13
The Court’s review of the supplemented record confirms that the FBI has exhausted all
imaginable investigative avenues. For starters, the Bureau utilized numerous investigative
methods to obtain any missing emails, including 1) seeking consensual access to any email
repositories, and 2) obtaining personal electronic devices used by the Secretary that might have
contained relevant emails. Id., ¶ 4. In the course of its investigation, the FBI also interviewed
individuals who had the most frequent work-related communications with Secretary Clinton,
thereby obtaining additional email correspondence. Id.
When those initial efforts came up short, the agency shook “the tree harder,” Judicial
Watch, 844 F.3d at 955, turning to legal process. See Supp. Priestap Decl., ¶ 5. Most
infamously, the FBI discovered conceivably pertinent emails during an unrelated investigation
into Anthony Weiner, the then-husband of Clinton’s deputy chief of staff, Huma Abedin. Id., ¶
12; see also Matt Apuzzo, et al., Justice Department Obtains Warrant to Review Clinton Aide’s
Emails, N.Y. Times (Oct. 30, 2016). In response, it sought search warrants of Abedin’s
computer to ensure there were no new work-related emails located there. See id.; see also Supp.
Priestap Decl., ¶ 12. Since the Court of Appeals issued its decision, the Government has also
revealed that it used grand-jury subpoenas to assess whether service providers might still
maintain Clinton’s emails. See First Priestap Decl., ¶ 4.
In June 2017, Defendants submitted a second declaration sketching in the details of those
grand-jury subpoenas. See Judicial Watch, Inc. v. Tillerson, 2017 WL 3835677, at *1 (D.D.C.
Aug. 31, 2017). This later declaration came with a catch: the Government redacted the bulk of
the public document, submitting the full version for in camera and ex parte review only. Id.
Plaintiffs responded with a Motion to Produce, arguing that to the extent the Court might rely on
the declaration, they must have unfiltered access. Id. The Court agreed the affidavit should be
14
public and therefore granted Plaintiffs’ motion, subject only to a narrow exception. Id.
Defendants thus resubmitted an amended and largely unredacted “Supplemental” Priestap
declaration. See ECF No. 52 (Notice of Filing of Supp. Priestap Decl.).
Priestap’s latest declaration reveals that the FBI subpoenaed RIM, the maker of
Blackberry electronic devices; Cingular Wireless and its successor, AT&T wireless, which
provided mobile-phone service and thus data access; and the unnamed third-party service
provider for Clinton’s emails. See Supp. Priestap Decl., ¶ 8. All four service providers
confirmed that they “no longer retained . . . electronic communications transaction information
for the accounts” and, therefore, could not produce even the most basic information (such as the
subject lines or headers) requested by the FBI. Id., ¶¶ 9, 10. The Bureau deemed those
responses consistent with its understanding of Blackberry devices, which “pulled” information
off servers rather than storing it on a separate “cloud” server. Id., ¶ 10. Leaving nothing to
chance, however, the FBI reissued the subpoenas and contacted the service providers directly.
Id. Once again, the providers confirmed that they stored “no data” related to the accounts,
meaning any content would be unavailable. Id.
Having come up empty on those fronts, Priestap believes that the FBI has taken “all
reasonable and comprehensive efforts to recover email communications relevant to its
investigation” and sees no “further steps” to take. Id., ¶ 12. In other words, the Attorney
General’s investigative arm joins Defendants’ conclusion that there are no remaining emails for
State to recover. The FBI so concluded as part of an investigation related to national security, in
which it had every incentive to “shake the tree” with all its might. It strains credulity that the
Attorney General would implement a more exhaustive search in response to a federal-records
request.
15
Plaintiffs protest that the FBI hunted only for classified emails. See CAI Reply at 13.
Not so. Although its investigation focused on whether Clinton transmitted or stored classified
information on her private systems, its search for emails was not so limited. Rather, “the FBI
sought to obtain all identified e-mail communications that were transmitted or stored upon
former Secretary Clinton’s private e-mail servers.” Supp. Priestap Decl., ¶ 4 (emphasis added);
see also id., ¶ 12 (saying FBI sought “all potentially work-related emails from the former
Secretary’s tenure”) (emphasis added). Only once the Bureau had recovered the universe of
emails could it provide “relevant emails for classification review to the appropriate U.S.
Government agencies.” Id., ¶ 12. In other words, it conducted blanket searches for any
plausibly work-related emails because it could not have known ex ante whether those emails
would contain classified information. Its search was thus coextensive with (and perhaps broader
than) that required by the Federal Records Act.
Cause of Action also moves to strike portions of Agent Priestap’s declaration under
Federal Rule of Evidence 702, claiming that he offers an “expert” opinion that is neither relevant
nor reliable. Rule 702 governs evidentiary proceedings and permits expert testimony that “will
help the trier of fact to understand the evidence.” Even assuming the Court is the trier of fact
here, however, Agent Priestap does not purport to be an “expert” on FBI searches. Rather, he
has recounted the agency’s efforts to recover Clinton’s emails and, as a supervisor of that
investigation, opined on the sufficiency of those efforts. Courts frequently rely on government
affidavits to adjudicate an agency’s “retrieval efforts” in the FOIA context. See Perry v. Block,
684 F.2d 121, 126 (D.C. Cir. 1982) (quoting Founding Church of Scientology v. Nat’l Security
Agency, 610 F.2d 824, 836 (D.C. Cir. 1979)). Here, too, the Court faces the “peculiar[]”
situation in which the agency is “in sole possession” of the relevant information, as FBI
16
personnel have conducted the disputed searches. Id. The Court therefore necessarily relies on
the agency’s assessments of those searches, although the above analysis shows that it examines
such assessments with care.
In any event, the Court finds Priestap’s opinions to be relevant and reliable. As outlined
above, he “supervised the Clinton Server Investigation” and thereby witnessed firsthand the
“investigative efforts” taken to secure her emails. See Supp. Priestap Decl., ¶ 2. He is thus
uniquely situated to assess what further steps the FBI might plausibly pursue. His opinion is also
relevant. Although the FBI and the Attorney General are not one and the same, Jeff Sessions
would necessarily look to his investigative arm to recover Clinton’s emails. The FBI’s own
assessment of its searches is therefore telling.
3. Plaintiffs’ Proposed Recovery Tactics
Despite the Bureau’s assurance that no reasonable steps remain to recover Clinton’s
emails, Plaintiffs suggest alternative measures that the Attorney General might take. Although
they do not always tie these investigative actions to specific missing emails, Plaintiffs
presumably target emails from January 21, 2009, to March 18, 2009, as they cite no other
possible gaps in the record. The Court addresses each proffered tactic.
a. Forensic Searches of Third-Party Servers
As explained above, Agent Priestap submitted a declaration as to the FBI’s efforts to
recover the Blackberry emails through grand-jury subpoenas. Plaintiffs initially rejected the
affidavit as insufficient because it failed to identify the targets and scope of the subpoenas. See
CAI Opp. at 8 (asking questions such as “Who or what were the targets of the subpoenas? What
did the subpoenas demand? How many subpoenas were there? . . . What were [the] responses?”).
17
Pursuant to an Order from this Court, see ECF No. 49, Defendants have filed an amended
declaration making public many of those missing pieces.
Plaintiffs nevertheless deem the subpoenas deficient because the FBI did not search those
third-party providers’ servers by forensic means. See CAI Reply at 14-15. The Government
retorts that while searching Clinton’s servers for her emails was a fruitful task, that process alone
took months. See Gov’t Reply at 7. Asking AT&T or Blackberry to search their servers, which
house millions of communications from millions of users, is more akin to searching “for specific
grains of sand on a beach.” Id. The FBI declined to take that route, as it had (and still has) no
basis to believe it would find relevant emails through such a search; indeed, the service providers
swore in response to subpoenas that they retained “no data” related to the emails. See Supp.
Priestap Decl., ¶ 10. More to the point, the Government apparently sees no legal basis to order
those third parties to forensically search their servers. See Gov’t Reply at 6-7 (noting plaintiffs
offered no authority that would require the service providers to conduct search or allow
Government to do so). If the FBI believes its investigation has provided no factual basis to
search those servers, the Court deems it unimaginable that the Attorney General would
nevertheless chart that course.
b. iMac Computer
Cause of Action next suggests that Clinton’s current iMac computer might be “another
repository [for] unlawfully removed federal records.” CAI Opp. at 9-10. To refresh, Bill
Clinton set up the private Apple Server for his staffers, before the Clintons adopted the Pagliano
Server in March 2009. See First Priestap Decl., Exh. A at 4. There is confusion in the record
about whether Hillary Clinton linked any of her personal email accounts to the Apple Server. It
appears she used third-party servers to host her Blackberry account during that period, but one
18
staffer suggested that the Apple Server briefly hosted the Secretary’s clintonemail.com account.
Id. There is no suggestion, however, that any emails from the latter account are actually missing,
and Plaintiffs do not argue as much. Indeed, Clinton’s staff members believe that they migrated
all emails from the Apple Server to the Pagliano Server in the transition. Id. at 4. If so, there is
no meaningful data left on the former.
In any event, the Apple Server is long gone. After the server transition, Clinton
repurposed the server for use as a personal computer by household staff. Id. In 2014 — more
than five years later — she bought a new iMac Computer and apparently transferred some data
from the Apple Server onto that device before jettisoning the original server. Id. at 4-5. It is that
latest computer that is at issue in this case, and it is only relevant if a) there were any Clinton
emails on the Apple Server that b) were omitted in the first migration to the Pagliano Server, but
nevertheless c) were inadvertently migrated five years later to a new iMac computer.
The Government considers those dots too remote to connect. The FBI concluded that
“there was no investigative reason to believe that any email from the original Apple Server”
would be on the newer iMac computer. See Gov’t Reply at 11; see also First Priestap Decl., ¶ 7.
Given the lack of probable cause, the Government “had no legal basis to attempt to obtain the
iMac hard drive.” Gov’t Reply at 12. In an abundance of caution, however, the FBI took the
only step legally available to it: it asked Clinton’s lawyers, Williams & Connolly, to voluntarily
review the iMac computer for any relevant records by using “a keyword search consisting of
terms identified by the FBI.” First Priestap Decl., ¶ 7. After doing so, Williams & Connolly
19
confirmed that the computer contained no emails from Clinton’s time at State, and the Bureau
found no information that cast doubt on that conclusion. Id.
CAI spills much ink attacking the firm’s conclusions as hearsay and questioning the
reliability of its report. See CAI Opp. at 9-17. Its charges, however, miss the mark. Even were
hearsay inadmissible in this context, the Court’s conclusion does not hinge on whether Williams
& Connolly was correct that the iMac housed no Clinton emails (although this Court has no
reason to doubt the firm’s veracity). Rather, the important point is that Williams & Connolly
told the FBI as much, and the Bureau believes it has no further routes to pursue. Having
apparently concluded there was no legal basis for a warrant to search the iMac computer, the FBI
needed to rely on this type of voluntary report. Once again, the Court deems it exceedingly
farfetched that the Attorney General would pursue a different course for missing federal records.
c. Mobile Devices/iPads
In one paragraph, Cause of Action cursorily contends that the FBI should have
subpoenaed Clinton’s thirteen mobile devices and five iPads. See CAI Opp. at 16 & n.7. This,
too, is not a plausible investigative action. First, the Bureau did request the relevant devices
from Clinton’s team and thereby recovered two phones and three iPads. See First Priestap Decl.,
¶¶ 11-13. None of the phones contained relevant records. Id., ¶ 12. Two of the iPads were
likewise barren, and the remaining iPad contained three emails from 2012 in a “drafts” folder.
Id., ¶ 13. The FBI thus had little reason to believe that the other devices would contain emails at
all, much less unrecovered emails. That is especially so because, in her interview with FBI
agents, Clinton said that she required her aides to dispose of Blackberry SIM cards as soon as she
switched to a new device. Id., Exh. A at 9. One aide testified to physically destroying at least
two Blackberries with a hammer. Id. Short of resurrecting those phones from the dead, the FBI
20
had no way to examine any such device. The iPads would also lead to dead ends for the
Plaintiffs — Apple did not even release the first iPad for public use until April 2010, well after
Clinton had switched to the Pagliano Server. Once again, with no reason to believe that the
phones or iPads would house relevant emails (or even remain intact), the Attorney General
would have no basis to subpoena them.
d. Third Parties
Finally, Judicial Watch suggests a different course: interviewing third parties. See JW
Opp. at 4-6. It alleges that neither “Defendants nor the FBI sought records from persons who
received or sent emails to Secretary Clinton and other officials.” Id. at 4. On the contrary, the
FBI did interview individuals who most frequently exchanged work-related communications
with Secretary Clinton, including Cheryl Mills, Clinton’s Chief of Staff; Jake Sullivan, the
Director of Policy Planning; Huma Abedin, the Deputy Chief of Staff; and Sidney Blumenthal,
an informal political advisor. See First. Priestap Decl., Exh. A at 24-26. Those interviews are
significant, as the FBI determined that only thirteen individuals regularly maintained direct email
contact with Clinton through her clintonemail.com account. See id., Exh. A at 13. Indeed, Mills,
Sullivan, and Abedin accounted for 68% “of the emails sent directly to Clinton.” Id. Pursuant to
those interviews, the Bureau obtained additional email correspondence between those individuals
and Clinton, most of which were copies already collected. See Supp. Priestap Decl., ¶ 4.
Additionally, as Judicial Watch concedes, any email sent to or from a State employee is already
in the Department’s possession. See JW Opp. at 4.
Plaintiff would have the FBI go deeper into the well. Most concretely, it seeks email
correspondence between Clinton and David Petraeus, who then headed U.S. Central Command
(CENTCOM). Id. at 6. Judicial Watch relies on one FBI agent’s handwritten notes from an
21
interview with a State Department employee, which suggest that Clinton and Petraeus exchanged
“1000 emails,” “most not in the 30k.” JW Opp., Exh. C (FBI Notes) at HRC-2573. Assuming
“not in the 30k” means “unrecovered,” that report might suggest a hole in Defendants’ effort.
But in a sworn affidavit, the Government explains that the “1000” emails listed in the report is a
red herring. See Second Stein Decl., ¶¶ 5-6. In July 2015, CENTCOM queried its system using
the keywords “Hillary” or “Clinton” and estimated that approximately 2,200 emails matched the
search. Id., ¶ 6. That search, however, did not reflect the numbers of emails actually sent or
received by Clinton; rather, it captured any threads referencing the Secretary. Id. In August
2015, the agency conducted a more targeted search and found 18 email threads between Clinton
and Petraeus. Id. Each was a copy of threads already produced to the State Department. Id. To
be safe, the Department of Defense nonetheless sent those 18 email threads to State, id., and
thereby closed the chapter on the Petraeus emails.
Judicial Watch adds a string cite of other potential interviewees. See JW Opp. at 5. To
compile the list, it reviewed the State Department’s published database of Clinton’s emails and
identified her frequent correspondents, which it deems “likely” to have missing records. Id.; see
also id., Exh. A (Declaration of Kristi Jesperson). That logic, however, suffers a fatal flaw:
Plaintiff compiled its list from emails already recovered. See JW Opp. at 5. Contra Judicial
Watch, it is not obvious — or even likely — that persons on the “frequent sender” list would
have exchanged unrecovered emails.
A review of the same public database consulted by Plaintiff reveals that Clinton emailed
the following people between January 2009 and March 18, 2009:
Huma Abedin
Doug Band, the chief of staff of the Clinton Foundation
22
Colin Powell, a former Secretary of State
Lona Valmoro, a special assistant
Oscar Flores, a personal aide
Lissa Muscatine, a Clinton speechwriter.
U.S. Dep’t of State, Virtual Reading Room Documents (last accessed Nov. 1, 2017), available at
https://foia.state.gov/search/results.aspx?searchText=*&caseNumber=F-2016-07895. All but
Colin Powell used Clinton’s newer clintonemail.com domain, and there is no allegation of any
missing records from that account nor reason to think that these contacts sent other, unrecovered
messages. Apparently, Clinton’s most frequent contacts knew she had transitioned from the
Blackberry account by her swearing-in. From time to time, Clinton would receive emails on her
Blackberry account and forward them to her assistant, Oscar Flores, with instructions to print.
From reviewing those records, the Court sees no pattern to those contacts and, again, has no
reason to suspect that they might harbor additional emails.
Against that backdrop, the Archivist, State Department, FBI, and, indeed, the Attorney
General would have little reason to suspect that any of Judicial Watch’s “frequent senders” — or
any other known email recipients — have copies of any unrecovered records. While it is
plausible, albeit barely, that some third parties might retain relevant records nearly a decade after
the conversations, and that the FBI might convince such parties to turn them over voluntarily, the
Attorney General has no way to know who those third parties might be. The FBI understandably
deemed this path too far afield to pursue, and the Court once again concludes that it is
implausible that the Attorney General would buck its own investigative arm to demand
otherwise. The Court of Appeals may have asked the Government to “shak[e] the tree harder”
23
for more emails, but it never suggested that the FBI must shake every tree in every forest,
without knowing whether they are fruit trees. See Judicial Watch, 844 F.3d at 955.
* * *
To sum up, Defendants and the FBI have recited chapter and verse of their efforts to
recover Secretary Clinton’s emails. Those efforts went well beyond the mine-run search for
missing federal records, see Second Brewer Decl., ¶¶ 11-14, and were largely successful, save
for some emails sent during a two-month stretch. Even then, the FBI pursued every imaginable
avenue to recover the missing emails. Plaintiffs, significantly, cast no real doubt on that
conclusion. So now, when the Government avers that there are no enforcement steps left for the
Attorney General, the Court takes such conclusion seriously. It thus finds that Defendants have
“secur[ed] custody of all emails that the Attorney General could have recovered in an
enforcement action,” Judicial Watch, 844 F.3d at 955, such that the suit is moot.
C. Jurisdictional Discovery
In addition to opposing Defendants’ Motion to Dismiss, CAI has separately moved for
jurisdictional discovery. See ECF No. 38. In this circuit, “if a party demonstrates that it can
supplement its jurisdictional allegations through discovery, then jurisdictional discovery is
justified.” GTE New Media Servs. Inc. v. BellSouth Corp., 199 F.3d 1343, 1351 (D.C. Cir.
2000). At the same time, “[i]t is well established that the district court has broad discretion in its
resolution of [jurisdictional] discovery problems.” FC Inv. Grp. LC v. IFX Mkts., Ltd., 529 F.3d
1087, 1093 (D.C. Cir. 2008) (internal quotation marks and citations omitted).
Courts typically permit jurisdictional discovery where “[t]he record . . . before the court
is plainly inadequate,” and the party seeking discovery “may be able to present new facts to
bolster [its] theory” regarding jurisdiction. BellSouth Corp., 199 F.3d at 1352. “[H]owever, in
24
order to get jurisdictional discovery a plaintiff must have at least a good faith belief that such
discovery will enable it to show that the court” enjoys jurisdiction over the suit. Caribbean
Broad. Sys., Ltd. v. Cable & Wireless PLC, 148 F.3d 1080, 1090 (D.C. Cir. 1998). Furthermore,
“a plaintiff must make a ‘detailed showing of what discovery it wishes to conduct or what results
it thinks such discovery would produce.’” NBC-USA Housing, Inc., Twenty-Six v. Donovan,
774 F. Supp. 2d 277, 295 (D.D.C. 2011) (quoting Atlantigas Corp. v. Nisource, Inc., 290 F.
Supp. 2d 34, 53 (D.D.C. 2003)). Importantly, “a request for jurisdictional discovery cannot be
based on mere conjecture or speculation.” IFX Mkts., Ltd., 529 F.3d at 1094 (citing Bastin v.
Fed. Nat’l Mortgage Ass’n, 104 F.3d 1392, 1396 (D.C. Cir. 1997)).
In this case, Cause of Action seeks discovery “to determine the extent of the federal
government’s purported efforts to recover the BlackBerry e-mails and adequately search the
iMac computer.” CAI Opp. at 23. The Court sees no need for discovery on either score. First,
as discussed above, Defendants have extensively documented their (and the FBI’s) efforts to
track down the Blackberry account. When CAI moved for discovery, it complained that
Defendants had relied on bare allegations that the FBI had used grand-jury subpoenas, without
“identifying the targets, the subpoenas’ scope, and the substance of the targets’ response.” Id. at
23-24. Defendants have since supplemented the record with a second declaration, which
provides exactly that information. The Government has now documented extensively the
subpoenas related to this suit, while staying within the bounds of Federal Rule of Criminal
Procedure 6(e), which favors keeping those matters secret. The Court therefore finds nothing left
for Plaintiffs to discover.
So, too, for the iMac computer. Plaintiff complains that Defendants “rely on
inadmissible hearsay in an attempt to establish that the iMac contains no recoverable federal
25
records.” CAI Opp. at 24. In other words, it finds the iMac report unpersuasive to establish
mootness, an argument that this Court rejected above. It is unclear, however, how that complaint
relates to jurisdictional discovery. Cause of Action also suggests that it cannot “ascertain the
complete facts about Defendants[’]” efforts related to the iMac computer. Id. As an initial
matter, Plaintiff’s questions relate largely to the FBI, not the State Department, from whom it
seeks discovery. It offers no reason, moreover, to suspect that the FBI has withheld information
in that regard. Plaintiffs may see Williams & Connolly’s report as vague, but the Bureau did not
personally conduct the iMac search, so it, too, had to rely on Clinton’s lawyers. Indeed, it is
unclear why the FBI would harbor hidden reports related to the iMac. If the Government had
information as to additional search efforts, turning those over to the Court would only have
bolstered its case for mootness. Plaintiff has thus failed to persuade the Court that it has “a good
faith basis” to believe facts supporting jurisdiction exist and are likely to be found with targeted
discovery. See NBC-USA Housing, 774 F. Supp. 2d at 295. As such, the Court will deny its
Motion.
IV. Conclusion
For the foregoing reasons, the Court will deny Cause of Action’s Motions for
Jurisdictional Discovery and to Strike, and it will grant Defendants’ Motion to Dismiss. A
contemporaneous Order to that effect will issue this day.
/s/ James E. Boasberg
JAMES E. BOASBERG
United States District Judge
Date: November 9, 2017
26