Legal Research AI

Wikimedia Foundation v. NSA/CSS

Court: Court of Appeals for the Fourth Circuit
Date filed: 2021-09-15
Citations:
Copy Citations
Click to Find Citing Cases

                                         PUBLISHED

                           UNITED STATES COURT OF APPEALS
                               FOR THE FOURTH CIRCUIT


                                          No. 20-1191


WIKIMEDIA FOUNDATION,

                        Plaintiff − Appellant,

                and

NATIONAL ASSOCIATION OF CRIMINAL DEFENSE ATTORNEYS; HUMAN
RIGHTS WATCH; PEN AMERICAN CENTER; GLOBAL FUND FOR WOMEN;
THE NATION MAGAZINE; THE RUTHERFORD INSTITUTE; WASHINGTON
OFFICE ON LATIN AMERICA; AMNESTY INTERNATIONAL USA,

                        Plaintiffs,
                v.

NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE;
GENERAL PAUL M. NAKASONE, in his official capacity as Director of the
National Security Agency and Chief of the Central Security Service; OFFICE OF
THE DIRECTOR OF NATIONAL INTELLIGENCE; RICHARD GRENELL, in
his official capacity as acting Director of National Intelligence; MERRICK B.
GARLAND, Attorney General; DEPARTMENT OF JUSTICE,

                        Defendants – Appellees.

------------------------------

CENTER FOR DEMOCRACY & TECHNOLOGY; NEW AMERICA'S OPEN
TECHNOLOGY INSTITUTE; DAVID H. KAYE, Evidence Law Professor;
EDWARD J. IMWINKELRIED, Evidence Law Professor; D. MICHAEL
RISINGER, Evidence Law Professor; REBECCA WEXLER, Evidence Law
Professor; PROFESSOR STEPHEN I. VLADECK; AMERICANS FOR
PROSPERITY FOUNDATION; BRENNAN CENTER FOR JUSTICE;
ELECTRONIC FRONTIER FOUNDATION; ELECTRONIC PRIVACY
INFORMATION       CENTER;       FREEDOMWORKS     FOUNDATION;
TECHFREEDOM; NETWORK ENGINEERS AND TECHNOLOGISTS,
                     Amici Supporting Appellant.


Appeal from the United States District Court of Maryland, at Baltimore. T. S. Ellis, III,
Senior District Judge. (1:15−cv−00662−TSE)


Argued: March 12, 2021                                      Decided: September 15, 2021


Before MOTZ, DIAZ, and RUSHING, Circuit Judges.


Affirmed by published opinion. Judge Diaz wrote the majority opinion, in which Judge
Motz joined as to Parts I and II.A, and in which Judge Rushing joined as to Part II.B.2 and
C. Judge Motz wrote an opinion concurring in part and dissenting in part. Judge Rushing
wrote an opinion concurring in part and in the judgment.


ARGUED: Patrick Christopher Toomey, AMERICAN CIVIL LIBERTIES UNION
FOUNDATION, New York, New York, for Appellant. Joseph Forrest Busa, UNITED
STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellees. ON BRIEF:
Deborah A. Jeon, David R. Rocah, AMERICAN CIVIL LIBERTIES UNION
FOUNDATION OF MARYLAND, Baltimore, Maryland; Ashley Gorski, Charles Hogle,
AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York, New York;
Benjamin H. Kleine, COOLEY LLP, San Francisco, California; Alex Abdo, Jameel Jaffer,
KNIGHT FIRST AMENDMENT INSTITUTE AT COLUMBIA UNIVERSITY, New
York, New York, for Appellant. Ethan P. Davis, Acting Assistant Attorney General, H.
Thomas Byron III, Civil Division, UNITED STATES DEPARTMENT OF JUSTICE,
Washington, D.C., for Appellees. Avery W. Gardiner, Gregory T. Nojeim, Mana Azarmi,
Stan Adams, CENTER FOR DEMOCRACY & TECHNOLOGY, Washington, D.C.;
Sharon Bradford Franklin, Ross Schulman, NEW AMERICA’S OPEN TECHNOLOGY
INSTITUTE, Washington, D.C.; Andrew A. Bank, Bret S. Cohen, Allison M. Holt Ryan,
Stevie N. DeGroff, HOGAN LOVELS US LLP, Washington, D.C., for Amici Center for
Democracy & Technology and New America’s Open Technology Institute. Benjamin B.
Au, W. Henry Huttinger, Los Angeles, California, Aditya V. Kamdar, DURIE TANGRI
LLP, San Francisco, California, for Amici Evidence Law Professors. Lauren Gallo White,
San Francisco, California, Brian M. Willen, WILSON SONSINI GOODRICH & ROSATI
PROFESSIONAL CORPORATION, New York, New York, for Amicus Professor
Stephen I. Vladeck.         Eric R. Bolinder, AMERICANS FOR PROSPERITY
FOUNDATION, Arlington, Virginia; Sophia Cope, Mark Rumold, Andrew Cocker,
ELECTRONIC FRONTIER FOUNDATION, San Francisco, California, for Amici


                                            2
Americans for Prosperity Foundation, Brennan Center for Justice, Electronic Frontier
Foundation, Electronic Privacy Information Center, FreedomWorks Foundation, and
TechFreedom. Jonathan Blavin, Elizabeth Kim, Alexander Gorin, MUNGER, TOLLES
& OLSON LLP, San Francisco, California, for Amici Network Engineers and
Technologists.




                                         3
DIAZ, Circuit Judge:

       We consider, for the second time, the Wikimedia Foundation’s contentions that the

government is spying on its communications using Upstream, an electronic surveillance

program run by the National Security Agency (“NSA”). In the first appeal, we found

Wikimedia’s allegations of Article III standing sufficient to survive a motion to dismiss

and vacated the district court’s judgment to the contrary. On remand, the court again

dismissed the case, holding that Wikimedia didn’t establish a genuine issue of material fact

as to standing and that further litigation would unjustifiably risk the disclosure of state

secrets.

       Although the district court erred in granting summary judgment to the government

as to Wikimedia’s standing, we agree that the state secrets privilege requires the

termination of this suit. We thus affirm.



                                             I.

       Our prior opinion contains many of the relevant facts, including descriptions of the

Upstream surveillance program and its authorizing statute, Section 702 of the Foreign

Intelligence Surveillance Act (“FISA”), 50 U.S.C. § 1881a. See Wikimedia Found. v. Nat’l

Sec. Agency/Cent. Sec. Serv., 857 F.3d 193, 200–07 (4th Cir. 2017). We take a moment

here to briefly review the inner workings of Upstream, recap our previous decision, and

relate what has occurred since then.




                                             4
                                            A.

       As its name suggests, Upstream surveillance involves the NSA’s collection of

communications on the Internet backbone, “upstream” of the Internet user, by compelling

the assistance of telecommunications-service providers. By contrast, the NSA obtains the

“vast majority” of Internet communications collected under Section 702 directly from a

user’s Internet-service provider through the PRISM surveillance program, Redacted, 2011

WL 10945618, at *9 & n.23 (FISA Ct. Oct. 3, 2011), which isn’t at issue here.

       The Internet backbone consists of domestic “high-speed, ultra-high bandwidth data-

transmission lines” and the relatively limited number of submarine and terrestrial circuits

that carry Internet communications into and out of the United States, J.A. 2739, which are

often referred to as “chokepoint” cables. More specifically:

       The NSA performs Upstream surveillance by first identifying a target and
       then identifying “selectors” for that target. Selectors are the specific means
       by which the target communicates, such as e-mail addresses or telephone
       numbers. Selectors cannot be keywords (e.g., “bomb”) or names of targeted
       individuals (e.g., “Bin Laden”).

       The NSA then “tasks” selectors for collection and sends them to
       telecommunications-service providers. Those providers must assist the
       government in intercepting communications to, from, or “about” the
       selectors. “About” communications are those that contain a tasked selector
       in their content, but are not to or from the target.

Wikimedia Found., 857 F.3d at 202. 1




       1
        The NSA suspended its collection of “about” communications in 2017 but
continues to collect “to” and “from” communications.


                                             5
       Importantly, “[w]hile Upstream surveillance is intended to acquire Internet

communications, it does so through the acquisition of Internet transactions.” Id. at 203

(cleaned up). When an individual sends a communication over the Internet, it’s broken up

into one or more data packets that are transmitted to, and reassembled by, the receiving

device. Each packet travels separately across the Internet backbone. This means that

packets may take different paths to the recipient, and while in transit, they’re mixed with

countless other packets making their own journeys.

       “[A] complement of packets traversing the Internet that together may be understood

by a device on the Internet” as one or many discrete communications comprises an Internet

“transaction.”   Redacted, 2011 WL 10945618, at *9 n.23 (quoting a government

submission to the Foreign Intelligence Surveillance Court (“FISC”)). “If a single discrete

communication within [a ‘multi-communication transaction’] is to, from, or [until 2017]

about, a Section 702-tasked selector, and at least one end of the transaction is foreign, the

NSA will acquire the entire [multi-communication transaction].” Privacy & Civil Liberties

Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702

of the Foreign Intelligence Surveillance Act 44 (2014) (“PCLOB Report”).

                                             B.

       Wikimedia and eight other plaintiffs sued the government, seeking “among other

things, a declaration that Upstream surveillance violates the First and Fourth Amendments,

an order permanently enjoining the NSA from conducting Upstream surveillance, and an

order directing the NSA to purge all records of Plaintiffs’ communications” obtained




                                             6
through Upstream surveillance. Wikimedia Found., 857 F.3d at 202 (cleaned up). The

district court dismissed the case for lack of Article III standing, and the plaintiffs appealed.

       Article III “[s]tanding is part and parcel of the constitutional mandate that the

judicial power of the United States extend only to ‘cases’ and ‘controversies.’” Libertarian

Party of Va. v. Judd, 718 F.3d 308, 313 (4th Cir. 2013) (quoting U.S. Const. art. III, § 2).

To establish standing, a plaintiff must show: “(1) an injury in fact, (2) a sufficient causal

connection between the injury and the conduct complained of, and (3) a likelihood that the

injury will be redressed by a favorable decision.” Susan B. Anthony List v. Driehaus, 573

U.S. 149, 157–58 (2014) (cleaned up).

       In what we called the “Wikimedia Allegation,” Wikimedia claimed it had standing

because (1) its communications travel across every international Internet link 2; (2) the NSA

conducts Upstream surveillance on at least one such link; and (3) “in order for the NSA to

reliably obtain communications to, from, or about its targets in the way it has described,

the government must be copying and reviewing all the international text-based

communications that travel across a given link.” J.A. 57.

       Together, these assertions were “sufficient to make plausible the conclusion that the

NSA is intercepting, copying, and reviewing at least some of Wikimedia’s

communications,” establishing an injury-in-fact for a Fourth Amendment violation.

Wikimedia Found., 857 F.3d at 211. “And, because Wikimedia has self-censored its speech


       2
        Wikimedia uses “international” to describe something occurring between the
United States and a foreign country and “international Internet link” to mean a chokepoint
cable.


                                               7
and sometimes forgone electronic communications” as a result of that surveillance, it

established an injury-in-fact for purposes of its First Amendment claim. Id. Wikimedia

also met the two other requirements for standing because “Upstream surveillance is the

direct cause of the alleged injury, and there’s no reason to doubt that the requested

injunctive and declaratory relief would redress the harm.” Id. at 210.

       We thus vacated the district court’s judgment as to Wikimedia. We affirmed as to

the other eight plaintiffs, who alleged that given the government’s incentives to cast a wide

net, “the NSA is intercepting, copying, and reviewing substantially all text-based

communications entering and leaving the United States, including their own.” Wikimedia

Found., 857 F.3d at 202 (cleaned up). We concluded that such claims “about what the

NSA ‘must’ be doing” based on its goals “lack sufficient factual support to get ‘across the

line from conceivable to plausible.’” Id. at 214 (quoting Bell Atl. Corp. v. Twombly, 550

U.S. 544, 570 (2007)).

                                             C.

       On remand, the district court ordered jurisdictional discovery. But when Wikimedia

sought evidence related to Upstream, the NSA invoked the state secrets privilege.

       The privilege permits the United States to “prevent the disclosure of information in

a judicial proceeding if ‘there is a reasonable danger’ that such disclosure ‘will expose

[matters of state] which, in the interest of national security, should not be divulged.’” El-

Masri v. United States, 479 F.3d 296, 302 (4th Cir. 2007) (quoting United States v.

Reynolds, 345 U.S. 1, 10 (1953)). In Reynolds, the decision that modernized the privilege,

three civilian observers aboard an Air Force bomber testing secret electronic equipment


                                             8
died when the plane caught fire and crashed. 345 U.S. at 3. Their widows sued the United

States under the Federal Tort Claims Act and sought discovery related to the incident. Id.

at 3, 6. Instead of producing the requested information, the Secretary of the Air Force filed

a formal claim of privilege, citing national security concerns. Id. at 4–5. The Supreme

Court concluded that the government properly invoked the privilege and sustained its

refusal to disclose the documents at issue. Id. at 6.

       Thus, to invoke the state secrets privilege, the United States must make “a formal

claim of privilege, lodged by the head of the department which has control over the matter,

after actual personal consideration by that officer.” Id. at 7–8. Here, the government filed

the declaration of Daniel Coats, the then Director of National Intelligence, who attested

that the disclosures requested by Wikimedia “reasonably could be expected to cause

serious damage, and in many cases exceptionally grave damage, to the national security of

the United States.” 3 J.A. 174.

       In particular, Director Coats asserted the privilege over seven categories of

information:

       (A) information that would tend to confirm what individuals or entities are
       subject to Upstream surveillance activities; (B) information concerning the
       operational details of the Upstream collection process; (C) the location(s) at
       which Upstream surveillance is conducted; (D) the categories of Internet-
       based communications collected through Upstream surveillance activities;
       (E) information concerning the scope and scale of Upstream surveillance; (F)
       NSA cryptanalytic capabilities; and (G) additional categories of classified




       The government also filed the classified declaration of George Barnes, the then
       3

Deputy Director of the NSA, describing the national security concerns in greater detail.


                                              9
       information regarding Upstream surveillance contained in opinions and
       orders issued by, and submissions made to, the [FISC].

J.A. 174–75.

       Director Coats also confirmed several key facts about Upstream surveillance. He

explained that “in the course of the Upstream collection process, certain Internet

transactions transiting the Internet backbone network(s) of certain electronic

communication service provider(s) are filtered for the purpose of excluding wholly

domestic communications.” J.A. 177. The NSA then scans the remaining communications

“to identify for acquisition those transactions that are to or from” (or, until 2017, “about”)

the targeted selector and “ingest[s]” them into government databases. J.A. 177–78.

       Director Coats further acknowledged that the NSA “is monitoring at least one circuit

carrying international Internet communications.”       J.A. 186.    But he maintained that

“[w]hile the Upstream collection process has been described in general terms in this

declaration and in declassified documents and unclassified reports, certain operational

details of Upstream collection remain highly classified.” J.A. 178.

       Despite the NSA’s claim of privilege, Wikimedia moved to compel discovery.

Wikimedia argued that FISA’s discovery procedures, as provided in 50 U.S.C. § 1806(f),

displace the state secrets privilege in cases involving government-run electronic

surveillance. This provision permits an “aggrieved person” who is the target of electronic

surveillance to request, under certain circumstances, that the court conduct an in camera

and ex parte review of “the application, order, and such other materials relating to the

surveillance as may be necessary to determine whether the surveillance of the aggrieved



                                             10
person was lawfully authorized and conducted.”           50 U.S.C. § 1806(f).      Wikimedia

contended that (1) it had successfully alleged that it was an aggrieved person; and (2)

§ 1806(f) required the district court to review evidence related to Upstream surveillance in

camera and ex parte to determine whether the NSA lawfully surveilled Wikimedia’s

communications, instead of dismissing the entire action.

       The district court, however, concluded that FISA doesn’t apply and denied

Wikimedia’s motion. In particular, the court explained that the “§ 1806(f) procedures do

not apply where, as here, a plaintiff has not yet established that it has been the subject of

electronic surveillance.” Wikimedia Found. v. Nat’l Sec. Agency/Cent. Sec. Serv., 335

F. Supp. 3d 772, 780 (D. Md. 2018). Because Wikimedia had “merely plausibly alleged

that it has been the target of surveillance and ha[d] not yet adduced evidence establishing

this fact of surveillance,” the court determined that “it [wa]s not appropriate . . . to engage

in ex parte and in camera review of the materials responsive to plaintiff’s interrogatories

or to those plaintiff describe[d] in its motion to compel.” Id. at 786.

                                              D.

       The government then moved for summary judgment, contending that Wikimedia

didn’t establish a genuine issue of material fact as to the second or third prongs of the

Wikimedia Allegation 4 and that the state secrets privilege independently requires dismissal

of the case. As we explain in further detail below, the district court granted this motion,

holding that (1) Wikimedia established a genuine issue of material fact as to the second but


       4
           The government didn’t dispute that Wikimedia had established the first prong.


                                              11
not the third prong of the Wikimedia Allegation, 5 (2) the state secrets privilege foreclosed

further litigation, and (3) Wikimedia didn’t show any other injury that gives rise to

standing.

                                               1.

       The district court first determined that Wikimedia had established a genuine issue

of material fact as to the second prong of the Wikimedia Allegation, which posits that the

NSA conducts Upstream surveillance on at least one international Internet link.

       To prove this assertion, Wikimedia primarily relied on a declassified 2011 FISC

opinion, which states that “the government readily concedes that [the] NSA will acquire a

wholly domestic ‘about’ communication if the transaction containing the communication

is routed through an international Internet link being monitored by [the] NSA or is routed

through a foreign server.” Redacted, 2011 WL 10945618, at *15 (citing a government

submission to the FISC). An NSA witness confirmed the accuracy of this sentence, and of

the opinion generally, as of October 2011. 6



       5
         The district court held that Wikimedia “established” the second prong of the
Wikimedia Allegation “without a genuine dispute as to any material fact.” Wikimedia
Found. v. Nat’l Sec. Agency/Cent. Sec. Serv., 427 F. Supp. 3d 582, 603 (D. Md. 2019).
Read literally, the court appears to have granted partial summary judgment for Wikimedia
on the second prong. But, although Wikimedia opposed the government’s summary
judgment motion, it never filed its own motion. Nor did the court invoke Federal Rule of
Civil Procedure 56(f), which allows it to grant summary judgment to a nonmovant under
certain circumstances. To square this circle, we assume that the district court found only
that Wikimedia established a genuine issue of material fact on the second prong.
       6
        The district court recognized the quoted sentence as an admissible statement by a
party opponent. See Wikimedia Found., 427 F. Supp. 3d at 602. On appeal, Wikimedia


                                               12
       But the government contended that the meaning of the phrase “international Internet

link” as used in the FISC opinion isn’t the same as that used in the Wikimedia Allegation.

In fact, the NSA witness testified that the “NSA has an understanding of this term that is

specific to how [the FISC] described it,” but that its true definition can’t be confirmed or

denied because “it’s classified.” J.A. 447. And the government pointed out that the 2011

FISC opinion may not reflect the NSA’s current practices.

       “Rather than belabor the squabble between the parties about the meaning of this

particular term” in the FISC opinion, the district court zeroed in on an entirely different

government disclosure. Wikimedia Found., 427 F. Supp. 3d at 602–03. The court sua

sponte relied on Director Coats’s statement that the “NSA is monitoring at least one circuit

carrying international Internet communications” to conclude that Wikimedia had produced

sufficient evidence to raise a genuine issue of material fact as to the second prong of the

Wikimedia Allegation (i.e., that the NSA conducts Upstream surveillance on at least one

international Internet link). Id. at 603.

                                             2.

       But the district court found that Wikimedia didn’t establish a genuine issue of

material fact as to the third prong of the Wikimedia Allegation, which asserts that the NSA

is copying all communications on a monitored link. At the motion-to-dismiss stage,

Wikimedia had alleged that “as a technical matter, the government cannot know




asserts, and the government doesn’t dispute, that the NSA also adopted the facts in the
FISC opinion as a whole.


                                            13
beforehand which communications will contain selectors associated with its targets, and

therefore it must copy and review all international text-based communications transiting a

circuit in order to identify those of interest.” Wikimedia Found., 857 F.3d at 204 (cleaned

up).

       To undermine that claim, the government offered the declarations of Henning

Schulzrinne, an “expert in internet technology.” Appellee’s Br. at 44. Schulzrinne wasn’t

privy to any classified or other non-public information about how the NSA actually

operates Upstream surveillance, so he instead opined that the NSA could “in theory” use a

technique called traffic mirroring to conduct Upstream-style surveillance without copying

Wikimedia’s communications. J.A. 719.

       According to Schulzrinne, traffic mirroring requires installing a link (i.e., a fiber-

optic cable) between the surveilling entity’s equipment and a mirror port on the router or

switch directing Internet traffic at the target location. The router or switch is then

configured to copy traffic from one link to another without interrupting the original. It can

also be programmed to whitelist or blacklist certain IP addresses, thereby filtering the data

before copying it. Whitelisting involves copying only communications from specific IP

addresses, while blacklisting involves copying everything except communications from

specific IP addresses.

       Wikimedia responded with the declarations of Scott Bradner, “an Internet

networking expert.”      Appellant’s Br. at 23.     Although Bradner conceded that it’s

“technically possible” to use traffic mirroring with filtering (as envisioned by Schulzrinne),




                                             14
“doing so would purposefully ignore most of the Internet” and “would be inconsistent with

the publicly known details about the [U]pstream collection program.” J.A. 3898.

        Bradner explained that traffic mirroring with filtering “would require either that the

[Internet Service Provider (“ISP”)] agree to place an NSA-operated device into the heart

of its network”—which could negatively impact “the ISP’s network in the event of an

equipment failure or misconfiguration—or that the ISP’s personnel have enough

knowledge of the filter criteria to configure the ISP’s router.” J.A. 1023. Moreover, these

filters would “place potentially significant additional demands on the router’s processing

power, which could affect the performance of the router and create a risk of overloading

the router, thereby interfering with the ISP’s ability to support its customers’ traffic.” J.A.

1025.

        Bradner further opined that rather than traffic mirroring with filtering, the NSA is

“most likely” using link-layer copying (essentially traffic mirroring without filtering) or

optical splitters. J.A. 1022. An optical splitter is a physical device attached to a fiber-optic

cable that reflects a portion of the light traveling down that circuit to a different receiver.

The information continues on its original course, while an exact duplicate is sent to the

surveilling entity. Any filtering must take place after the copy is made. The technology is

“extremely reliable as it consumes no power, has no software, and cannot slow traffic.”

Technologists’ Amicus Br. at 10; see also J.A. 3921. According to Bradner, link-layer

copying and optical splitters offer the NSA the “greatest operational control and

confidentiality in carrying out upstream collection with the least risk of interference with

the ISP’s ordinary network operations.” J.A. 1025.


                                              15
       Bradner also pointed to several government disclosures as evidence that the NSA is

copying all communications on a monitored link. These include the previously discussed

statement from the 2011 FISC opinion, which provides that the “NSA will acquire a wholly

domestic ‘about’ communication if the transaction containing the communication is routed

through an international Internet link being monitored by [the] NSA or is routed through a

foreign server,” Redacted, 2011 WL 10945618, at *15; and a government report stating

that the NSA’s goal is to “comprehensively acquire communications that are sent to or

from its targets,” PCLOB Report 10, 37, 123. 7

       Of these disclosures, the district court mentioned only the PCLOB Report in the

context of Bradner’s opinion that the NSA is likely conducting Upstream surveillance

using link-layer copying or optical splitters rather than traffic mirroring with filtering. See

Wikimedia Found., 427 F. Supp. 3d at 603–10. It declined to consider this opinion,

reasoning that it rests on “speculative assumptions about the NSA’s surveillance practices


       7
        Wikimedia’s evidence also included (1) another government report revealing that
the NSA had more than 120,000 Section 702 targets in 2017, Office of the Director of
National Intelligence Statistical Transparency Report for 2017 (Apr. 2018); (2) “[t]he
leading treatise on national security investigations, co-authored by the former Assistant
Attorney General for National Security,” Appellant’s Br. at 31–32 (citing David Kris & J.
Douglas Wilson, Nat’l Security Investigations & Prosecutions 2d § 17.5 (2015)); (3)
“[r]ecent disclosures by the United Kingdom about functionally equivalent surveillance
undertaken by the NSA’s British counterpart,” id. at 32 (citing Further Observations of the
Government of the United Kingdom, Human Rights Organizations v. United Kingdom,
Eur. Ct. H.R. (Dec. 16, 2016), https://privacyinternational.org/sites/default/files/2018-
02/2016.12.16%20Government%27s%20further%20obs.pdf); and (4) descriptions of “the
U.S. government’s EINSTEIN 2 surveillance program, which protects government
networks through a similar form of Internet surveillance,” id. (citing Legal Issues Relating
to the Testing, Use, and Deployment of an Intrusion-Detection System (EINSTEIN 2.0),
33 Op. O.L.C. 1 (Jan. 9, 2009)).


                                              16
and priorities and [its] resources and capabilities.” Id. at 604–05 (citing Fed. R. of Evid.

702 and Daubert v. Merrell Dow Pharms., Inc., 509 U.S. 579 (1993)).

        The court instead focused on the technical arguments presented by both sides and

concluded that the record didn’t establish that the NSA must copy all communications on

a surveilled circuit by “technological necessity.” Id. at 609. It therefore held that

Wikimedia had failed to establish a genuine issue for trial as to standing.

                                             3.

        The district court next “assum[ed] arguendo that[] there is a genuine dispute of

material fact as to the third prong of the Wikimedia Allegation,” yet still determined that

the case must be dismissed because of the state secrets privilege. Id. at 610.

        In doing so, the court again rejected Wikimedia’s argument that FISA displaces the

state secrets privilege in this case. This time, it distinguished Wikimedia’s case from the

only other circuit case directly addressing this issue, Fazaga v. FBI, 916 F.3d 1202 (9th

Cir. 2019), amended on denial of reh’g en banc by 965 F.3d 1015 (9th Cir. 2020), cert.

granted, 2021 WL 2301971 (June 7, 2021), which holds that FISA’s discovery procedures

in § 1806(f) apply instead of the state secrets privilege under certain circumstances.

        The plaintiffs there challenged a counter-terrorism investigation involving

electronic surveillance conducted by an informant for the Federal Bureau of Investigation.

“Several sources,” including the Bureau, had confirmed the identity of the informant and

that he “created audio and video recordings” for the investigation. Fazaga, 965 F.3d at

1028.




                                             17
       The Fazaga district court dismissed all but one of the plaintiffs’ claims at the

pleading stage based on the government’s assertion of the state secrets privilege. But the

Ninth Circuit reversed, holding that FISA displaces the privilege whenever “an aggrieved

person affirmatively challenges, in any civil case, the legality of electronic surveillance or

its use in litigation, whether the challenge is under FISA itself, the Constitution, or any

other law” and that “[t]he complaint’s allegations are sufficient if proven to establish that

Plaintiffs are ‘aggrieved persons’” who had been subjected to electronic surveillance by

the government. Id. at 1030, 1053.

       The district court here determined that even if Fazaga were binding in our circuit

such that § 1806(f) displaces the state secrets privilege, it wouldn’t help Wikimedia. That’s

because the Ninth Circuit found the Fazaga plaintiffs’ allegations sufficient to establish

that they were aggrieved persons (as required to apply § 1806(f)) at the motion-to-dismiss

stage. Wikimedia, on the other hand, faced summary judgment and thus needed to establish

a genuine issue of material fact that it was the subject of electronic surveillance but had

failed to do so. Accordingly, the court concluded once more that the § 1806(f) procedures

don’t apply.

       That being so, the court turned to the government’s claim of privilege. It determined

that state secrets are “so central” to litigating the Wikimedia Allegation that “the defendants

cannot properly defend themselves without using privileged evidence,” Wikimedia Found.,

427 F. Supp. 3d at 613, and that further proceedings “would present an unjustifiable risk”

of disclosing privileged information, id. at 612. The court thus ruled that the case must

also be dismissed because of the state secrets privilege.


                                              18
                                               4.

       Finally, the district court concluded that none of Wikimedia’s other alleged injuries

independently establish standing. In addition to the Wikimedia Allegation, Wikimedia

asserted that: (1) Upstream surveillance impaired Wikimedia’s communications with its

community members, as evidenced by the drop in readership for certain Wikipedia pages;

(2) Wikimedia had to take costly protective measures against Upstream surveillance; and

(3) Wikimedia has third party standing to assert its users’ rights. The court held that the

first two theories fail under Clapper v. Amnesty International USA, 568 U.S. 398 (2013),

and the last collapses under its own weight.

       In Clapper, several plaintiffs in the United States challenged Section 702, alleging

that their work “requires them to engage in sensitive international communications with

individuals who they believe are likely targets of surveillance.” 568 U.S. at 401. As we

described in our prior opinion, the plaintiffs there “had two separate theories of Article III

standing: (1) there was an ‘objectively reasonable likelihood’ that their communications

would be intercepted in the future pursuant to Section 702 surveillance, and (2) they were

forced to undertake costly and burdensome measures to avoid a substantial risk of

surveillance.” Wikimedia Found., 857 F.3d at 206 (quoting Clapper, 568 U.S. at 407).

“They did not, however, have actual knowledge of the Government’s Section 702 targeting

practices.” Id. (cleaned up). The Supreme Court held that neither theory was sufficient to

prove standing at the summary-judgment stage because they depended on a “speculative

chain of possibilities [that] does not establish that injury based on potential future




                                               19
surveillance is certainly impending or is fairly traceable” to Section 702 surveillance.

Clapper, 568 U.S. at 414.

       As relevant to Wikimedia’s claim of decreased readership, Clapper explained that

“a chilling effect arising merely from the individual’s knowledge that a governmental

agency was engaged in certain activities or from the individual’s concomitant fear that,

armed with the fruits of those activities, the agency might in the future take some other and

additional action detrimental to that individual” doesn’t establish standing. 568 U.S. at

417–18; see also id. at 418 (“Because allegations of a subjective ‘chill’ are not an adequate

substitute for a claim of specific present objective harm or a threat of specific future harm,

the plaintiffs . . . lack standing.” (cleaned up)).

       The district court found that Wikimedia made a similarly deficient assertion: that its

“decreased readership is a result of individual[] fear that the government might be

monitoring their Internet activity and might use that information at some later date.”

Wikimedia Found., 427 F. Supp. 3d at 616. The court then determined that Wikimedia

otherwise lacked objective evidence of “an ongoing and sustained drop in [its] readership,”

or that any such decline stemmed from “Upstream surveillance specifically” rather than

“media coverage of NSA surveillance generally.” Id. (cleaned up). It thus concluded that

Wikimedia’s reduction in readership didn’t establish standing.

       In assessing Wikimedia’s standing based on protective measures, the district court

pointed to Clapper’s admonition that plaintiffs “cannot manufacture standing merely by

inflicting harm on themselves based on their fears of hypothetical future harm.” 568 U.S.

at 416. By finding the summary judgment record inadequate to establish the Wikimedia


                                               20
Allegation, the court had already ruled that any harm to Wikimedia from Upstream

surveillance was “purely hypothetical” and thus insufficient to prove standing. Wikimedia

Found., 427 F. Supp. 3d at 617. As an additional nail in the coffin, the court observed that

Wikimedia began implementing its protective measures years before learning about

Upstream for a variety of other reasons, “including protecting against individual computer

hackers and keeping . . . company policies up-to-date and transparent,” so the requested

injunctive and declaratory relief “would not redress any alleged injury from these

protective expenditures.” Id. at 617 n.63.

       Nor was the district court persuaded that Wikimedia had established third party

standing. For third party standing, a plaintiff must demonstrate “(1) an injury-in-fact; (2)

a close relationship between [itself] and the person whose right [it] seeks to assert; and (3)

a hindrance to the third party’s ability to protect his or her own interests.” Freilich v. Upper

Chesapeake Health Inc., 313 F.3d 205, 215 (4th Cir. 2002).

       The court held that Wikimedia didn’t satisfy any of these elements. As discussed,

the court had already rejected all of Wikimedia’s alleged injuries-in-fact. The court also

determined that, unlike lawyers and clients or doctors and patients, Wikimedia doesn’t

have the requisite “protected, close relationships” with its “largely unidentified

contributors.” Wikimedia Found., 427 F. Supp. 3d at 617 & n.65. In fact, Wikimedia “only

presented declarations from one single contributor,” who claimed that the “normal burdens

of litigation” and her “workload as a medical student” make it “impossible” for her to bring

suit. Id. at 617–18. The court found this “insufficient” to show that an obstacle prevents

her from protecting her own interests. Id. at 618.


                                              21
       The district court thus dispatched all of Wikimedia’s theories of standing, dismissed

the case, and entered judgment for the government. This appeal followed.



                                            II.

       Wikimedia contends that the district court erred in dismissing its case because (1)

the evidence it presented establishes a genuine dispute of material fact with respect to its

standing; (2) FISA displaces the state secrets privilege in this context; (3) even if FISA

doesn’t apply, the state secrets privilege doesn’t require dismissal because “Wikimedia can

establish its standing without resort to privileged evidence[]” and the government hasn’t

shown that it can’t defend itself without privileged evidence; and (4) “Wikimedia has

presented evidence of additional injuries” that don’t implicate any state secrets.

Appellant’s Br. at 14, 17.

       As we explain, the record evidence is sufficient to establish a genuine issue of

material fact as to Wikimedia’s standing. But FISA doesn’t displace the state secrets

privilege, and further litigation would unjustifiably risk the disclosure of privileged

information. And because Wikimedia’s other alleged injuries don’t provide independent

bases for standing, this case must be dismissed.

                                            A.

       Because standing is jurisdictional, we begin our discussion there. See Libertarian

Party of Va., 718 F.3d at 313. Our review of a district court’s decision on summary

judgment is de novo, and we view all facts and reasonable inferences in the light most




                                            22
favorable to the nonmovant—here, Wikimedia. See Sylvia Dev. Corp. v. Calvert Cnty., 48

F.3d 810, 817 (4th Cir. 1995).

                                             1.

       The government maintains that Wikimedia hasn’t established a genuine issue for

trial as to standing on the second prong of the Wikimedia Allegation: that Upstream

surveillance occurs on at least one international Internet link. We disagree.

       Wikimedia contends that an “international Internet link” is a “chokepoint” cable,

which refers to one of the relatively limited number of circuits that carry Internet

communications into and out of the United States. Because Wikimedia claims that its

communications traverse all chokepoint cables—but not necessarily all other circuits on

the Internet backbone—the second prong of the Wikimedia Allegation centers on showing

that the NSA is monitoring at least one of these chokepoint cables.

       The problem for Wikimedia is that the NSA never uses the words “chokepoint

cable” in its public disclosures. The NSA does, however, use the phrase “international

Internet link.” The parties therefore dispute whether those terms are interchangeable, and

even if they are, whether the relevant disclosures reveal that the NSA is actually monitoring

such a circuit.

       At the outset, we focus on the government’s concession in the 2011 FISC opinion

and not the Coats declaration (on which the district court relied).          As Wikimedia

acknowledges, Director Coats’s statement that the NSA is “monitoring at least one circuit

carrying international Internet communications,” J.A. 186, doesn’t identify where on the




                                             23
Internet backbone that circuit is located. The Coats declaration thus doesn’t show that the

NSA is monitoring a chokepoint cable.

        By contrast, the FISC opinion recites a government concession in that case “that

[the] NSA will acquire a wholly domestic ‘about’ communication if the transaction

containing the communication is routed through an international Internet link being

monitored by [the] NSA.” Redacted, 2011 WL 10945618, at *15 (emphasis added).

According to Wikimedia, this concession—the accuracy of which the NSA has confirmed

in this case—is evidence that NSA is in fact monitoring a circuit carrying international

communications.

        The government argues that the statement from the FISC opinion doesn’t reveal that

the NSA is actually monitoring an international Internet link. Rather, it conveys only that

if the NSA is monitoring such a link, the agency will acquire the communications traversing

it.   But the government’s strained construction ignores grammar.            The consequence

described in the independent clause (i.e., the NSA’s acquisition of a domestic

communication) is tied to a conditional clause that turns on whether the transaction is on

an international Internet link that the NSA is monitoring—not whether the NSA is

monitoring such a link at all. The sentence is thus premised on the NSA surveilling at least

one international Internet link, over which a transaction of interest may travel.

        The government also says that Wikimedia has no evidence that the NSA still adheres

to these practices, even if it did in 2011, and that “at least the conclusion of this conditional

statement is no longer accurate” because “‘about’ collection ended in 2017.” Appellee’s

Br. at 40 n.3 (quoting Wikimedia Found., 427 F. Supp. 3d at 602 n.38). But the government


                                               24
never says that the way it acquired “about” communications differs from the way it collects

“to” and “from” communications. Nor have we seen anything in the record to suggest that.

       To the contrary, Upstream collection is often described as a single process across

all types of communications. See, e.g., Redacted, 2011 WL 10945618, at *11 (“[The]

NSA’s upstream Internet collection devices are generally incapable of distinguishing

between transactions containing only a single discrete communication to, from, or about a

tasked selector and transactions containing multiple discrete communications, not all of

which may be to, from, or about a tasked selector.”). And given the lack of evidence that

the NSA has changed the way it operates Upstream, it’s reasonable to infer that the

government’s concession in the FISC opinion remains accurate despite the passage of time

and even though the government no longer retains “about” communications.

       Next, the government argues that Wikimedia didn’t dispute the district court’s

determination that “the differences between the term ‘international internet link’ and the

term [‘chokepoint cable’] . . . cannot be known without violation of the state secrets

privilege.” Wikimedia Found., 427 F. Supp. 3d at 602. Because the “opening brief does

not mention the district court’s ruling on this point, much less argue that the court erred or

explain how [it erred],” the government contends that Wikimedia failed to preserve this

issue. Appellee’s Br. at 41 (citing Grayson O Co. v. Agadir Int’l LLC, 856 F.3d 307, 316

(4th Cir. 2017)).

       But it’s not clear that the district court actually ruled on the definition of

“international Internet link,” as opposed to merely describing the government’s position on

it. See Wikimedia Found., 427 F. Supp. 3d at 602 (“Defendants, however, assert . . . .


                                             25
Thus, the differences between the term . . . .”). The court then turned away from the FISC

opinion to focus on the Coats declaration, suggesting that the court didn’t intend to resolve

the significance of “international Internet link” at all—on state secrets or any other

grounds. Id. at 602–03.

       Even if the court was commenting on the secret nature of the phrase “international

internet link,” it ultimately found for Wikimedia on the second prong. Wikimedia thus had

no reason to raise any arguments on the second prong before the government contested it. 8

See Nw. Airlines, Inc. v. Cnty. of Kent, 510 U.S. 355, 364 (1994) (“A prevailing party need

not . . . defend a judgment on any ground properly raised below, so long as that party seeks

to preserve, and not to change, the judgment.”).

       The government argues that the meaning of “international Internet link” is in fact

classified and that Wikimedia thus lacks evidence showing that the meaning of those words

as used in the FISC opinion is the same as that used in the Wikimedia Allegation. But the

government’s insistence that the true definition of this phrase is a secret doesn’t invalidate

its concession in the FISC opinion as “concrete evidence from which a reasonable juror

could return a verdict in [Wikimedia’s] favor.” Anderson v. Liberty Lobby, Inc., 477 U.S.

242, 256 (1986). Even if “international Internet link” could conceivably be code for



       8
         In any event, Wikimedia’s opening brief explains how the FISC opinion supports
the second prong based on publicly available information. This preserves its arguments on
the point. See Appellant’s Br. at 25–27; see also Blackwelder v. Millman, 522 F.2d 766,
771 (4th Cir. 1975) (holding that a prevailing party “may support the judgment by urging
any theory, argument, or contention which is supported by the record, even though it was
specifically rejected by the lower court”).


                                             26
anything from a chihuahua to a chandelier, it’s sensible to infer that the FISC opinion uses

that phrase to refer to a chokepoint cable. 9

       Indeed, the ordinary meaning of “international Internet link” is a connection

carrying Internet traffic between two countries. And its usage in describing Upstream

surveillance suggests that one of those countries must be the United States. See, e.g.,

PCLOB Report at 40 (“Upstream collection . . . [occurs] with the compelled assistance

(through a Section 702 directive) of the providers that control the telecommunications

backbone . . . . The collection therefore does not occur at . . . foreign telephone or Internet

companies, which the government cannot compel to comply with a Section 702 directive.”

(emphasis added)); id. at 36–37 (“Once tasked, selectors used for the acquisition of

upstream Internet transactions are sent to a United States electronic communication service

provider to acquire communications that are transiting through . . . the ‘Internet

backbone.’” (emphasis added)); J.A. 1003 (Bradner Decl.) (“This of course makes sense,

given that public Internet traffic on [chokepoint cables] . . . is the traffic that the NSA is

authorized to monitor under its Section 702 procedures.”).

       To be sure, “whether an inference is reasonable cannot be decided in a vacuum;

it must be considered in light of the competing inferences to the contrary.” Sylvia Dev.

Corp., 48 F.3d at 818 (cleaned up). But the government doesn’t offer any evidence

suggesting that “international Internet link” has a counterintuitive meaning. Wikimedia’s


       9
         Wikimedia also argues that it’s reasonable to infer from government disclosures
that the NSA is monitoring multiple chokepoints. But this assertion is superfluous to what
Wikimedia must prove for standing, so we don’t address it further.


                                                27
argument that the government’s concession in the FISC opinion refers to a chokepoint

cable thus falls well “within the range of reasonable probability.” Id. (quoting Ford Motor

Co. v. McDavid, 259 F.2d 261, 266 (4th Cir. 1958)). And because we must draw all

reasonable inferences in Wikimedia’s favor, this is sufficient to establish a genuine issue

of material fact as to the second prong of the Wikimedia Allegation.

                                            2.

       Wikimedia next argues that summary judgment for the government wasn’t

appropriate as to the third prong of the Wikimedia Allegation: that the NSA copies all

communications on a monitored link. In particular, Wikimedia asserts that this prong is

supported by (1) “the government’s own disclosures”; (2) the “technical and practical

necessities” of conducting Upstream surveillance; and (3) the NSA’s goal of

“comprehensively acquir[ing] communications that are sent to or from its targets.”

Appellant’s Br. at 28–30. Relatedly, Wikimedia contends that the court shouldn’t have

excluded a portion of Bradner’s expert opinion when assessing this prong.

       We agree in part. Because reasonable inferences drawn from the government’s

concession in the FISC opinion establish a genuine issue of material fact as to the third

prong, the district court erred in granting summary judgment to the government.

       The government doesn’t dispute that Wikimedia may prove the third prong by

showing that the NSA is copying all transactions on a monitored link by choice, as

Wikimedia urges now, rather than by technological necessity, as it argued at the motion-

to-dismiss stage.    This shift in focus is hardly surprising, given Wikimedia’s




                                            28
acknowledgment that it’s technically feasible to conduct Upstream surveillance without

copying all communications on a monitored link.

       The district court, when discussing the third prong of the Wikimedia Allegation,

made no mention of most of the government disclosures Wikimedia cited for its claim that

the NSA is copying all communications transiting a monitored link by choice. To the

extent that the court touched on copying by choice at all, it did so only in the context of

excluding from its analysis Bradner’s expert opinion that discusses why the NSA might

prefer link-layer copying or optical splitters (which both result in wholesale copying). We

thus conduct the analysis that the district court passed on: whether Wikimedia “set forth

specific facts showing that there is a genuine issue for trial” with respect to the allegation

that the NSA has elected to copy all transactions on a surveilled circuit. Lujan v. Nat’l

Wildlife Fed., 497 U.S. 871, 888 (1990).

       As support for this proposition, Wikimedia again leads with the same statement

from the 2011 FISC opinion, this time highlighting a different portion of it.            The

government’s concession in that case that the “NSA will acquire a domestic ‘about’

communication if the transaction containing the communication is routed through an

international Internet link being monitored by [the] NSA” can only be true, says

Wikimedia, if the NSA is copying all traffic on a surveilled circuit. 10 Redacted, 2011 WL

10945618, at *15 (emphasis added).


       10
         The “will acquire” language also appears once more in the FISC opinion,
expressing essentially the same notion. See Redacted, 2011 WL 10945618, at *11 (“[The]
NSA likely acquires tens of thousands more wholly domestic communications every year,


                                             29
       The government says that this portion of the FISC opinion lacks technical precision.

In particular, it points to another part of the FISC opinion that says the “NSA may acquire

wholly domestic communications,” id. at *11 n.34 (emphasis added), which it claims is

inconsistent with the “will acquire” statement. This argument, however, takes the “may

acquire” quote out of context.

      The “may acquire” phrase comes from a portion of the opinion describing a specific

kind of transaction (a multi-communication transaction), and not how transactions on a

monitored link are generally acquired. One or more of the discrete communications

contained within a single multi-communication transaction may be wholly domestic but

the NSA may “lack[] sufficient information . . . to determine the location or identity” of

the sender. Id. Accordingly, “[the] NSA may acquire wholly domestic communications”

within a particular multi-communication transaction without knowing that it has done so.11

Id. (emphasis added). But this says nothing about how the NSA obtained the multi-

communication transaction—i.e., whether it’s because, as Wikimedia alleges, the NSA is

copying all transactions on a monitored link.

      The government also offers a competing interpretation of its concession in the FISC

opinion. It argues that the “will acquire” quote doesn’t mean the NSA acquires every



given that [the] NSA’s upstream collection devices will acquire a wholly domestic ‘about’
[communication] if it is routed internationally.” (emphasis added)).
       11
          In fact, when the NSA manually reviewed a random sample of transactions
collected through Upstream, it couldn’t “determine conclusively” whether 224 out of 5,081
multi-communication transactions contained wholly domestic communications. Redacted,
2011 WL 10945618, at *11 n.34.


                                            30
domestic communication on a monitored link. Why? Because, posits the government, the

relevant sentence says only the NSA will acquire “a” domestic communication, not “all”

such communications. While literally true, the government’s myopic reading ignores the

significance of the word “a” in context.

       As an indefinite article, “a” can mean “any” and precedes a “singular noun[] when

the referent is unspecified.”    A, MERRIAM-WEBSTER, https://www.merriam-webster.

com/dictionary/a (last visited August 18, 2021).      Therefore, the best reading of the

government’s concession is that the NSA “will acquire” any single, unspecified domestic

communication, so long as it’s traversing a monitored international Internet link. In the

context of the “will acquire” sentence then, the NSA’s surefire acquisition of “a” domestic

communication on a surveilled circuit is equivalent to its acquisition of “all” such

transactions.

       Judge Rushing says that we take the government’s concession in the FISC opinion

out of context. Not so. The fact that the “will acquire” phrase appears in a section of the

FISC opinion explaining that the NSA intentionally designed its collection devices to

acquire wholly domestic communications is entirely consistent with the inference that the

NSA has chosen to copy all communications on a monitored link.

       Moreover, the government’s concession isn’t a stray statement swimming against a

tide of contrary text. In fact, only a few subparts of the eighty-page FISC opinion are

relevant to how the NSA acquires transactions. See Redacted, 2011 WL 10945618, at *9–

16 (discussing the scope of the NSA’s Upstream collections and the NSA’s targeting

procedures). And it’s telling that the FISC opinion recites the “will acquire” language a


                                            31
second time, see id. at *11, when describing the government’s collection of wholly

domestic communications in a portion of the opinion dedicated to “the comprehensiveness

of the NSA’s collection practices,” Concurrence at 66. Indeed, neither the government nor

my colleague have pointed to a single sentence in the other seventy-nine pages of the FISC

opinion that refutes Wikimedia’s interpretation of the government’s concession. 12

                                            3.

       Wikimedia’s “grab-bag” of other support for the third prong, Appellee’s Br. at 51,

doesn’t contain standalone proof that the NSA is copying before filtering. For example,

the NSA’s desire to be “comprehensive[]” in its surveillance, PCLOB Report at 10, 123,

doesn’t necessarily mean that its collection of communications is exhaustive, especially

given the agency’s technical, logistical, and financial restraints in the face of competing

mission priorities—all of which are classified.

       But Wikimedia’s supplemental evidence is at least consistent with its reasonable

interpretation of the government’s concession in the FISC opinion, and the government

again fails to offer any contradictory evidence that casts doubt on those inferences.




       12
          At best, Judge Rushing’s belief that the government’s concession in the FISC
opinion can be reasonably interpreted another way confirms that Wikimedia has raised a
genuine issue of material fact sufficient to preclude summary judgment. See W. C. English,
Inc. v. Rummel, Klepper & Kahl, LLP, 934 F.3d 398, 404 (4th Cir. 2019) (explaining that
when there are “two reasonable interpretations” of a phrase, “the granting of summary
judgment for either side [is] improper” (cleaned up)).


                                            32
Wikimedia thus has established a genuine issue of material fact with respect to the third

prong of the Wikimedia Allegation and its Article III standing. 13

                                                B.

       Having confirmed our jurisdiction, we now turn to Wikimedia’s contention that the

court erred in relying on the state secrets privilege to deny its motion to compel discovery

and grant the government’s motion to dismiss because § 1806(f) of FISA displaces the

privilege. 14 We review de novo both questions of statutory interpretation, United States v.

Abugala, 336 F.3d 277, 278 (4th Cir. 2003), and “legal determinations involving state

secrets,” El-Masri v. United States, 479 F.3d 296, 302 (4th Cir. 2007). Because we

conclude that § 1806(f) is relevant only when a litigant challenges the admissibility of the

government’s surveillance evidence, it doesn’t apply here. Instead, we apply the state

secrets privilege and hold, like the district court, that it forecloses further litigation.




       13
         Because we hold that the case must nonetheless be dismissed because of the state
secrets privilege, we don’t tackle Wikimedia’s claim that the district court abused its
discretion in excluding some of Bradner’s opinions. Nor do we address Wikimedia’s
arguments about the merits of Schulzrinne’s opinions.
       14
            Judge Motz chides us for (as she describes it) rushing to decide this issue in the
face of the Supreme Court’s grant of certiorari in Fazaga. But this case was briefed and
argued months before the Court decided to take Fazaga, and we have given it all due
deliberation. Moreover, our superior Court is often informed by the views of the circuits.
See, e.g., Hertz Corp. v. Friend, 559 U.S. 77, 92 (“In an effort to find a single, more uniform
interpretation of the statutory phrase, we have reviewed the Courts of Appeals’ divergent
. . . interpretations.”). As we’ve done in the past, we respectfully offer our perspective on
this “novel and difficult question” (Dissent at 56) before the Court provides a definitive
answer. See, e.g., Int’l Refugee Assistance Project v. Trump, 883 F.3d 233 (4th Cir. 2018)
(affirming the district court’s grant of a preliminary injunction despite the Supreme Court’s
grant of a writ of certiorari on the same issues).


                                               33
                                              1.

       The parties first debate the origin of the state secrets privilege. Wikimedia calls it

a common law privilege, which Congress can abrogate by passing a statute that “speak[s]

directly to the question addressed by” the privilege, even if the statute doesn’t

“affirmatively proscribe it.” United States v. Texas, 507 U.S. 529, 534 (1993). The

government says the privilege is “constitutionally grounded,” Appellee’s Br. at 11, and can

only be supplanted where “Congress specifically has provided” for a statute to do so. Dep’t

of Navy v. Egan, 484 U.S. 518, 530 (1988).

       We have indeed observed that the state secrets privilege is an evidentiary rule

“bas[ed] in the common law of evidence.” El-Masri, 479 F.3d at 303–04; see also Gen.

Dynamics Corp. v. United States, 563 U.S. 478, 485 (2011) (“Reynolds . . . decided a purely

evidentiary dispute by applying evidentiary rules.”). But we’ve also recognized that the

privilege “performs a function of constitutional significance[] because it allows the

executive branch to protect information whose secrecy is necessary to its military and

foreign-affairs responsibilities.” El-Masri, 479 F.3d at 303; see also United States v.

Nixon, 418 U.S. 683, 711 (1974) (“[T]o the extent [an evidentiary privilege] relates to the

effective discharge of a President’s powers, it is constitutionally based.”).

       Fortunately, we need not decide today who has the better argument. As we explain,

even if we agree with Wikimedia that the state secrets privilege is grounded in the common

law (which Congress may abrogate), FISA doesn’t “speak directly” to the situation here.

Texas, 507 U.S. at 534.




                                             34
                                             2.

                                             a.

       “We begin, as always in deciding questions of statutory interpretation, with the text

of the statute.” Othi v. Holder, 734 F.3d 259, 265 (4th Cir. 2013). The relevant subsection

of FISA provides:

       Whenever a court or other authority is notified pursuant to subsection (c) or
       (d) of this section, or whenever a motion is made pursuant to subsection (e)
       of this section, or whenever any motion or request is made by an aggrieved
       person pursuant to any other statute or rule of the United States or any State
       before any court or other authority of the United States or any State to
       discover or obtain applications or orders or other materials relating to
       electronic surveillance or to discover, obtain, or suppress evidence or
       information obtained or derived from electronic surveillance under this
       chapter, the United States district court or, where the motion is made before
       another authority, the United States district court in the same district as the
       authority, shall, notwithstanding any other law, if the Attorney General files
       an affidavit under oath that disclosure or an adversary hearing would harm
       the national security of the United States, review in camera and ex parte the
       application, order, and such other materials relating to the surveillance as
       may be necessary to determine whether the surveillance of the aggrieved
       person was lawfully authorized and conducted.                 In making this
       determination, the court may disclose to the aggrieved person, under
       appropriate security procedures and protective orders, portions of the
       application, order, or other materials relating to the surveillance only where
       such disclosure is necessary to make an accurate determination of the legality
       of the surveillance.

50 U.S.C. § 1806(f). FISA further defines an “aggrieved person” as a “person who is the

target of an electronic surveillance or any other person whose communications or activities

were subject to electronic surveillance.” Id. at § 1801(k).

       The first lines of this subsection describe three conditions that trigger the district

court’s in camera and ex parte review obligations. These are: (i) when the federal or state

government notifies the court that it intends to use electronic surveillance information


                                             35
against an aggrieved person, which it’s required to do before introducing such evidence in

a judicial proceeding under § 1806(c) or (d); (ii) when an aggrieved person makes a motion

to suppress electronic surveillance information used by the government under § 1806(e);

and (iii) when an aggrieved person makes “any motion or request . . . pursuant to any other

statute or rule . . . to discover or obtain applications or orders or other materials relating to

electronic surveillance or to discover, obtain, or suppress evidence or information obtained

or derived from electronic surveillance.” Id. at § 1806(f).

                                               b.

       Relying heavily on Fazaga, Wikimedia claims that the third condition

unambiguously encompasses the circumstances at hand: Wikimedia is an aggrieved person

that made a motion before the district court under Federal Rule of Civil Procedure 37(a) to

compel discovery of “materials relating to electronic surveillance.” Id. at § 1806(f).

Wikimedia thus reads § 1806(f) as a free-floating right to obtain information related to the

government’s electronic surveillance pursuant to any (and all) federal statutes or rules.

       But “[t]he plainness or ambiguity of statutory language is determined by reference

to the language itself, the specific context in which that language is used, and the broader

context of the statute as a whole.” Healthkeepers, Inc. v. Richmond Ambulance Auth., 642

F.3d 466, 471 (4th Cir. 2011) (quoting Robinson v. Shell Oil Co., 519 U.S. 337, 340

(1997)). “This includes employing various grammatical and structural canons of statutory

interpretation which are helpful in guiding our reading of the text.” Id. (citing United Sav.

Ass’n. v. Timbers of Inwood Forest Assocs., 484 U.S. 365, 371 (1988)).




                                               36
       Reading the third condition in context reveals that Wikimedia’s gloss makes for a

shiny but ill-fitting shoe. Both parties agree that § 1806(f) may apply regardless of who

initiated the suit. But we agree with the government that § 1806(f) describes procedures

for determining the admissibility of electronic surveillance information only when the

government seeks to use such evidence in a particular proceeding—whether civil or

criminal. Thus, even assuming that Wikimedia is an aggrieved person, 15 we conclude that

it can’t use § 1806(f) to force the government to introduce electronic surveillance

information into this case. To the extent our reasoning, as laid out below, is inconsistent

with Fazaga, we decline to follow our sister circuit.

       “[W]e rely on the principle of noscitur a sociis—a word is known by the company

it keeps—to avoid ascribing to one word a meaning so broad that it is inconsistent with its

accompanying words, thus giving unintended breadth to the Acts of Congress.” Yates v.

United States, 574 U.S. 528, 543 (2015) (cleaned up). Both of the specific conditions in

§ 1806(f) (notice of government intent to use surveillance information and a motion to

suppress) presume the government’s introduction of surveillance evidence into the

proceedings. The subsequent general condition “is therefore appropriately read to refer,

not to any [motion],” as Wikimedia asserts, “but specifically to the subset” of motions

contingent on the government’s use of surveillance evidence. Id. at 544; see also id. at 543




       15
          Given our assumption, we don’t have to determine what a litigant must prove to
qualify as an aggrieved person and whether Wikimedia has done so.


                                            37
(explaining that the meaning of a word in a list may be limited by the other enumerated

terms, “even though the list began with the word ‘any’”).

       Relatedly, where “general words follow specific words in a statutory enumeration,”

the ejusdem generis canon counsels that “the general words are construed to embrace only

objects similar in nature to those objects enumerated by the preceding specific words.”

Wash. State Dep’t of Soc. & Health Servs. v. Guardianship Estate of Keffeler, 537 U.S.

371, 384 (2003); see also CSX Transp., Inc. v. Ala. Dept. of Revenue, 562 U.S. 277, 295

(2011) (“We typically use ejusdem generis to ensure that a general word will not render

specific words meaningless.”). Here, if § 1806(f)’s third condition requiring the district

court to act on “any motion or request” were as “all encompassing” as Wikimedia alleges,

it would render the second condition superfluous. See Yates, 574 U.S. at 546. “Congress

would have had no reason to refer specifically to [motions to suppress]”—in fact, it’s “hard

to see why [Congress] would have needed to include the examples at all.” Id. at 545–46.

       It makes more sense to conclude that, by including the two preceding conditions,

Congress signaled its intent to “cabin the contextual meaning” of the third condition. Id.

at 543. Like its predecessors, the third condition thus applies only when an aggrieved

person makes a motion or request in response to the government’s attempt to use

surveillance evidence in a proceeding.

       This interpretation accords with the limitations that Congress attached to the third

condition on the back end. Section 1806(f) specifies that the litigant’s motion must be “to

discover, obtain, or suppress.” These are familiar “procedural motions pertaining to the

admissibility of evidence.” Fazaga, 965 F.3d at 1083 (Butamay, J. dissenting). The direct


                                            38
objects of those actions are the “applications or orders or other materials relating to

electronic surveillance” or the “evidence or information obtained or derived from [such]

surveillance.” 50 U.S.C. § 1806(f). And the district court’s review is correspondingly

restricted to the “application, order, and such other materials relating to the surveillance as

may be necessary to determine whether the surveillance . . . was lawfully authorized and

conducted.” Id.

       Here, too, noscitur a sociis and ejusdem generis color our understanding of “other

material” and “such other material” to mean those like a FISA application or order—i.e.,

documents related to officially approving and defining the scope of FISA surveillance that

can thus be used to determine the legality of the government’s surveillance operations. See

also Such, MERRIAM-WEBSTER, https://www.merriam-webster.com/dictionary/such (last

visited August 18, 2021) (defining “such” as “of the character, quality, or extent previously

indicated or implied”).

       In short, the third condition in § 1806(f) is confined to procedural requests related

to a circumscribed body of evidence (i.e., the government’s FISA documentation and the

resulting intelligence). This corresponds with interpreting § 1806(f) as directed towards

determining the admissibility of the fruits of the government’s surveillance—a question

that arises only when the government offers such evidence in a case—and not as an

unbounded invitation for litigants to acquire any information they desire about the

government’s intelligence programs.




                                              39
                                              c.

       The remedy available to a successful movant confirms our reading of this condition.

As the very next subsection provides:

       If the United States district court pursuant to subsection (f) determines that
       the surveillance was not lawfully authorized or conducted, it shall, in
       accordance with the requirements of law, suppress the evidence which was
       unlawfully obtained or derived from electronic surveillance of the aggrieved
       person or otherwise grant the motion of the aggrieved person. If the court
       determines that the surveillance was lawfully authorized and conducted, it
       shall deny the motion of the aggrieved person except to the extent that due
       process requires discovery or disclosure.

50 U.S.C. § 1806(g).

       The paradigmatic remedy is thus the suppression of evidence. It’s even the focus

of the subsection’s title: “Suppression of evidence; denial of motion.” Id.; see also Fla.

Dept. of Revenue v. Piccadilly Cafeterias, Inc., 554 U.S. 33, 47 (2008) (“[A] subchapter

heading cannot substitute for the operative text of the statute. Nonetheless, statutory titles

and section headings are tools available for the resolution of a doubt about the meaning of

a statute.” (cleaned up)). 16 And a litigant would seek such a remedy only in response to

the government’s introduction of surveillance evidence into the case.

       By contrast, consider the mismatch between the remedy described in § 1806(g) and

the remedy that Wikimedia seeks. Rather than request the suppression of evidence,

Wikimedia wants the district court to review the evidence requested by the motion to




       16
         The titles of § 1806 as a whole, “Use of information,” and § 1806(f), “In camera
and ex parte review by district court,” are less illuminating but remain consistent with the
notion that it’s the government’s use of information that matters.


                                             40
compel to decide both standing and the merits of its unlawful surveillance claims. But that

approach would contort the §1806(f) and (g) procedures beyond recognition. The statutory

text doesn’t permit the district court to rule on anything other than the motion at hand or

consider evidence beyond the FISA application and related materials, let alone conduct an

entire trial in camera and grant final judgment on the merits of the underlying claim. 17

       We note that every other subsection under § 1806 speaks to the government’s use

of electronic surveillance evidence. Section 1806(a) provides that such evidence “may be

used and disclosed by Federal officers and employees” in compliance with minimization

procedures; (b) says that such evidence “may only be used in a criminal proceeding with

the advance authorization of the Attorney General”; (c) and (d) mandate that federal and

state governments give notice before using such information against an aggrieved person;

(e) permits an aggrieved person to file a motion to suppress such evidence when used

against him; (i) requires that the government destroy information unintentionally acquired

through electronic surveillance; (j) instructs a court about notifying an aggrieved person

when the government conducts emergency surveillance without pre-authorization; and (k)

allows federal officers who conduct electronic surveillance to coordinate with federal or

state law enforcement officers. 18 We think it unlikely that Congress stashed away an


       17
          Wikimedia argues that this emphasis on motions to suppress is misguided because
§ 1806(f) expressly includes more than that. Even accepting that as true, we are confident
that it doesn’t contemplate what Wikimedia seeks in this litigation.
       18
         Section 1806(h) is the only subsection that doesn’t expressly relate to the
government’s use of information, but it merely provides that a district court’s decisions
under subsection (g) are final and binding upon all other federal courts.


                                             41
expansive right for litigants within a statute directed entirely toward the government’s use

of information. See Whitman v. Am. Trucking Ass’ns, 531 U.S. 457, 468 (2001) (“Congress

. . . does not, one might say, hide elephants in mouseholes.”).

       Still, Wikimedia resists this interpretation, contending that the government’s

reading effectively means that a plaintiff can only rely on § 1806(f) after the government

has given notice that it’s using electronic surveillance information per § 1806(c) or (d), 19

which renders the two other conditions for obtaining in camera and ex parte review

superfluous. That might be the case if the government were always scrupulous in providing

such notice. But even the government admits that there has been some “dispute” about its

withholding of notice in the past, though it claims to have “redoubled its efforts” since the

Solicitor General’s 2013 confession of error on this front. Oral Argument at 35:07–35:56.

       It’s therefore reasonable for Congress to have crafted additional paths for

ascertaining the legality of electronic surveillance evidence that the government intends to

marshal against a litigant who can show that it is an “aggrieved person,” even when the

government has violated its duty to provide notice of such use. Cf. United States v. Belfield,

692 F.2d 141, 146 (D.C. Cir. 1982) (explaining that a litigant “claim[ing] that he has been

the victim of an illegal surveillance [operation] and seek[ing] discovery of the [surveillance

records] to ensure that no fruits thereof are being used against him” can trigger the




       19
          As mentioned above, § 1806(c) and (d) require federal and state governments,
respectively, to give notice to the court or to the aggrieved person when they intend to use
surveillance evidence against such a person in a judicial proceeding.


                                             42
§ 1806(f) procedures even though the government “has purported not to be offering any

[such] evidence”).

       Additionally, Wikimedia asserts that the phrase “notwithstanding any other law” is

an indication that FISA displaces the state secrets privilege. But that clause applies only

when the plaintiff has fulfilled one of the three pre-requisite conditions for triggering the

court’s in camera and ex parte review, and the Attorney General has filed the necessary

affidavit.   Only then “shall” the court apply the § 1806(f) in camera procedures,

“notwithstanding any other law” that would require some other, public resolution of the

litigant’s motion challenging the government’s use of electronic surveillance information.

See S. Rep. No. 95-701, at 63 (“Although a number of different procedures might be used

to attack the legality of the surveillance, it is this procedure ‘notwithstanding any other

law’ that must be used to resolve the question. . . . This is necessary to prevent the carefully

drawn procedures in subsection [(f)] from being bypassed by the inventive litigant using a

new statute, rule or judicial construction.”). 20

       And although § 1806(f) and the state secrets privilege are triggered by an affidavit

from the government, it doesn’t follow that FISA speaks directly to the state secrets

privilege, as Wikimedia claims. Tellingly, these procedures contemplate different affiants.

Because the privilege is a shield to protect state secrets from disclosure, the head of the



       20
         In the draft of the statute discussed by this report, what is now subsection (f) was
located under subsection (e). See S. Rep. No. 95-701, at 88. Despite the different lettering,
the substance of the provision was largely the same. We have edited the quote to
correspond with the current organization of § 1806’s provisions.


                                               43
department controlling the information must assert it. By contrast, FISA applies when the

government is attempting to offer electronic surveillance evidence in a case. In such an

instance, responsibility for invoking § 1806(f) falls to the one who wields the sword: the

Attorney General (or his delegees, under 50 U.S.C. § 1801(g)). The triggering mechanisms

for each procedure thus strengthen the inference that FISA wasn’t intended to displace the

state secrets privilege.

                                              d.

       Wikimedia further contends that limiting the applicability of § 1806(f) and (g) to

when the government offers electronic surveillance evidence in a case is inconsistent with

FISA as a whole. In particular, Wikimedia complains that if § 1806(f) doesn’t displace the

state secrets privilege, the government can invoke the privilege “in every FISA suit brought

by a civil plaintiff.” Reply Br. at 5. This would, in turn, give the government “nearly

exclusive control over challenges to FISA surveillance” and “profoundly undermine the

civil remedies that Congress enacted for surveillance abuses[] and the very purpose of

FISA itself,” which Wikimedia asserts is “to ensure judicial review of executive branch

surveillance.” Appellant’s Br. at 51–52.

       We are not convinced. The government knows that it carries the burden “to satisfy

the reviewing court that the Reynolds reasonable-danger standard is met,” Abilt v. CIA,

848 F.3d 305, 312 (4th Cir. 2017) (cleaned up), and that the judiciary is “firmly in control

of deciding whether an executive assertion of the state secrets privilege is valid,” El-Masri,

479 F.3d at 304–05. Indeed, the court stands as a gatekeeper to the privilege, and “[w]e

take very seriously our obligation to review the [government’s claims] with a very careful,


                                             44
indeed a skeptical, eye,” Abilt, 848 F.3d at 312 (quoting Al–Haramain Islamic Found., Inc.

v. Bush, 507 F.3d 1190, 1203 (9th Cir. 2007)), so that “the state secrets privilege is asserted

no more frequently and sweepingly than necessary,” id. (quoting Ellsberg v. Mitchell, 709

F.2d 51, 58 (D.C. Cir. 1983)). There have thus been FISA cases where the government

hasn’t invoked the privilege, see, e.g., Am. Civil Liberties Union v. Clapper, 785 F.3d 787,

801–03 (2d Cir. 2015), or has invoked the privilege narrowly, see, e.g., Fazaga, 965 F.3d

at 1042 (“Here, although the Government has claimed the Reynolds privilege over certain

state secrets, it has not sought dismissal of the Fourth Amendment and FISA claims based

on its invocation of the privilege.”).

       Nor do we see any actual contradictions between FISA and the Reynolds privilege.

Congress provided for judicial review of executive branch surveillance, but it did so to

“strike[] a fair and just balance between protection of national security and protection of

personal liberties.” S. Rep. No. 95-604, pt. 1, at 7 (1978). The government’s reading of

§ 1806(f) fits that schema exactly. In that provision, Congress permits the government to

use electronic surveillance evidence in court against a litigant while withholding materials

related to that surveillance from that individual in the interests of national security. But in

the same breath, Congress also allows an aggrieved person to challenge the government’s

use of such evidence and have a court evaluate the lawfulness of the government’s actions.

       Far from giving the government exclusive control over challenges to surveillance,

we think this reading of § 1806(f) acknowledges the court’s role in preserving the

compromise Congress made between individual rights and national security. See Belfield,

692 F.2d at 149 (“If anything, the legality inquiry mandated by FISA is easier for a court


                                              45
to perform ex parte than the pre-FISA inquiry into the legality of warrantless electronic

surveillance . . .”). For instance, when “the Court believes that disclosure is necessary to

make an accurate determination of legality, but the Government argues that to do so . . .

would damage the national security,” § 1806(f) says that “the Government must choose—

either disclose the material or forgo the use of the surveillance-based evidence.” See S.

Rep. No. 95-701, at 65.

       Additionally, judicial review occurs at another point in the FISA process.

“Congress created a comprehensive scheme in which the [FISC] evaluates the

Government’s certifications, targeting procedures, and minimization procedures—

including assessing whether the targeting and minimization procedures comport with the

Fourth Amendment,” Clapper, 568 U.S. at 421, which we described more fully in our prior

opinion, see Wikimedia Found., 857 F.3d at 200–01. “Any dissatisfaction that [Wikimedia]

may have about the [FISC]’s rulings—or the congressional delineation of that court’s

role—is irrelevant” to our analysis. Clapper, 568 U.S. at 421.

       In sum, the government’s reading of § 1806 is entirely consistent with ensuring

judicial review of executive branch surveillance. That’s not surprising considering the

history of courts uniformly using in camera procedures to determine the legality of foreign-

intelligence surveillance even before FISA’s enactment. See Belfield, 692 F.2d at 149 &

n.38 (collecting cases). As the government observes, “[t]hat such [in camera] procedures

comfortably coexisted with the [state secrets] privilege before FISA underscores that

codification of in camera procedures for certain purposes,” without more, doesn’t suggest

that Congress intended to displace the privilege. Appellee’s Br. at 35; see also H.R. Rep.


                                            46
No. 95-1283 (1978) (“[O]nce the surveillance is determined to be unlawful, the intent of

[§ 1806] is to leave to otherwise existing law the resolution of what, if anything, is to be

disclosed.”).

       The only “inconsistency” between FISA and the state secrets privilege Wikimedia

identifies is that Congress provided civil remedies for violations of FISA that a plaintiff

may have to forego when the government invokes the Reynolds privilege. These include

50 U.S.C. § 1810, whereby a plaintiff may recover damages from a person who is

criminally prosecuted under 50 U.S.C. § 1809 for intentionally engaging in, disclosing, or

using electronic surveillance in violation of FISA; and 18 U.S.C. § 2712, which permits a

plaintiff to recover damages from the United States for a willful violation of FISA.

       But this problem isn’t unique to FISA. Every state secrets case presents the

possibility that a plaintiff will be denied—in the interests of national security—a remedy

available by law. See El-Masri, 479 F.3d at 313 (“[T]he successful interposition of the

state secrets privilege imposes a heavy burden on the party against whom the privilege is

asserted . . . not through any fault of his own, but because his personal interest in pursuing

his civil claim is subordinated to the collective interest in national security.”); Fitzgerald

v. Penthouse Int’l, Ltd., 776 F.2d 1236, 1238 n.3 (“When the state secrets privilege is

validly asserted, the result is unfairness to individual litigants—through the loss of

important evidence or dismissal of a case—in order to protect a greater public value.”);

Sterling v. Tenet, 416 F.3d 338, 348 (4th Cir. 2005) (“[I]n limited circumstances like these,

the fundamental principle of access to courts must bow to the fact that a nation without

sound intelligence is a nation at risk.”).


                                             47
       Accordingly, we conclude that § 1806(f) doesn’t displace the state secrets privilege,

even in actions pertaining to government-run electronic surveillance.

                                              3.

       Because FISA’s discovery procedures don’t govern here, we turn to whether the

district court properly applied the state secrets privilege. We hold that the privilege indeed

requires dismissal of this case.

                                              a.

       When a state secrets question arises, a court applies a three-part analysis. First, “the

court must ascertain that the procedural requirements for invoking the state secrets

privilege have been satisfied”—i.e., that the government properly made a formal claim of

privilege. El-Masri, 479 F.3d at 304. Wikimedia doesn’t dispute that the government

satisfied this condition.

       Second, “the court must decide whether the information sought to be protected

qualifies as privileged” because it is a state secret. Id. That is, it must determine, “from

all the circumstances of the case,” whether “there is a reasonable danger that compulsion

of the evidence will expose military matters which, in the interest of national security,

should not be divulged.” Reynolds, 345 U.S. at 10.

       This inquiry “pits the judiciary’s search for truth against the Executive’s duty to

maintain the nation’s security.” El-Masri, 479 F.3d at 305. Accordingly, “[t]he degree to

which such a reviewing court should probe depends in part on the importance of the

assertedly privileged information to the position of the party seeking it”: “where there is a

strong showing of necessity, the claim of privilege should not be lightly accepted,” but


                                              48
“even the most compelling necessity cannot overcome the claim of privilege if the court is

ultimately satisfied that [state] secrets are at stake.” Id.

                                               b.

       The district court found that “the entities subject to Upstream surveillance activity

and the operational details of the Upstream collection process” were state secrets because

their disclosure “would (i) undermine ongoing intelligence operations, (ii) deprive the NSA

of existing intelligence operations, and significantly, (iii) provide foreign adversaries with

the tools necessary both to evade U.S. intelligence operations and to conduct their own

operations against the United States and its allies.” Wikimedia Found., 427 F. Supp. 3d at

613. The court thus sustained the government’s claim of privilege for the seven categories

of information identified by the NSA.

       Wikimedia doesn’t meaningfully dispute the court’s finding on this prong either.

Instead, it quibbles that to the extent the seven categories cover material that the

government has already disclosed, the district court’s ruling is overly broad. But we don’t

read the court’s decision to make privileged what’s already public. The court instead

concluded that because of the state secrets privilege, Wikimedia couldn’t compel the

government to produce, or otherwise continue to pursue litigation that would risk the

disclosure of, additional information related to those categories. See Wikimedia Found.,

427 F. Supp. 3d at 611.

       And based on the totality of the circumstances, including the Coats and Barnes

affidavits, we agree that “there is a reasonable danger” to national security should these

facts be disclosed. El-Masri, 479 F.3d at 305; see also id. (“Frequently, the explanation of


                                               49
the department head who has lodged the formal privilege claim . . . is sufficient to carry

the Executive’s burden.”).

       This leads us to the third step, which is to resolve “how the matter should proceed

in light of the successful privilege claim.” El-Masri, 479 F.3d at 304. Once a court

determines that certain facts are state secrets, they are “absolutely protected from

disclosure.” Id. at 306. “[N]o attempt is made to balance the need for secrecy of the

privileged information against a party’s need for the information’s disclosure.” Id.

       As a result, “[i]f a proceeding involving state secrets can be fairly litigated without

resort to the privileged information, it may continue.” Id. But if “any attempt to proceed

will threaten disclosure of the privileged matters, dismissal is the proper remedy.” Id.

(cleaned up). The latter situations include where: (1) “the plaintiff cannot prove the prima

facie elements of his or her claim without privileged evidence”; (2) “even if the plaintiff

can prove a prima facie case without resort to privileged information, . . . the defendants

could not properly defend themselves without using privileged evidence”; and (3) “further

litigation would present an unjustifiable risk of disclosure.” Abilt, 848 F.3d at 313–14. 21



       21
          Wikimedia asserts (without further explanation) that the third basis for invoking
the state secrets privilege “wrongly collapses the Reynolds privilege and the Totten [v.
United States, 92 U.S. 105 (1876)] bar.” Appellant’s Br. at 58 n.19 (citing Gen. Dynamics,
563 U.S. at 485). “Totten has come to primarily represent . . . a categorical bar on actions
to enforce secret contracts for espionage” that leads to dismissal at the pleading stage
“without ever reaching the question of evidence,” but it rested “on the proposition that a
cause cannot be maintained if its trial would inevitably lead to the disclosure of privileged
information.” El-Masri, 479 F.3d at 306 (citing Totten, 92 U.S. at 107; Reynolds 345 U.S.
at 11 n.26). Abilt held that dismissal is appropriate in such a circumstance, and we are
bound by circuit precedent.


                                             50
       Here, the district court determined that both the second and third situations apply

such that “dismissal is the appropriate, and only available, course of action.” Wikimedia

Found., 427 F. Supp. 3d at 611. Wikimedia now argues that because it established a prima

facie case for standing using public evidence, the court should have reviewed the

purportedly privileged material in camera to determine the validity—or at least the

existence—of the government’s hypothetical defense before ordering the case dismissed.

       We agree with the district court that in camera review in this instance would fly in

the face of the state secrets privilege as espoused by “both Supreme Court precedent and

our own cases.” Sterling, 416 F.3d at 345. A district court may consider any evidence it

deems necessary at step two of the Reynolds inquiry—i.e., when determining whether the

information at issue comprises state secrets. See id. (“There may . . . be cases where the

necessity for evidence is sufficiently strong and the danger to national security sufficiently

unclear that in camera review of all materials is required to evaluate the claim of

privilege.”). But after a court makes that determination, the privileged evidence is excised

from the case, and not even the court may look at such material in camera. See id. (“[W]hen

a judge has satisfied himself that the dangers asserted by the government are substantial

and real, he need not—indeed, should not—probe further.”); El-Masri, 479 F.3d at 306

(“On this point, Reynolds could not be more specific: ‘When the occasion for the privilege

is appropriate, the court should not jeopardize the security which the privilege is meant to

protect by insisting upon an examination of the evidence, even by the judge alone, in

chambers.’” (cleaned up)).




                                             51
       Nevertheless, Wikimedia contends that we should hold that a court dismissing a

claim in the second situation (for defenses made unavailable by the state secrets privilege)

must first determine that the putative defense is “valid,” even if that requires limited review

of privileged material by the court. See In re Sealed Case, 494 F.3d 139, 149 (D.C. Cir.

2007). But even if we adopted that rule—a decision we leave for another day—it wouldn’t

apply here. In the very case that Wikimedia cites for this proposition, the D.C. Circuit

distinguishes between a situation where the government alleges that there are “possible

defenses that [the defendant] cannot pursue without resort to privileged materials,” in

which dismissal is not required unless the government demonstrates that one of those

defenses is valid, and where “any valid defense . . . would require resort to privileged

materials,” in which dismissal is warranted without further ado. Id. at 149 (emphasis

added).

       The latter ties into the third condition for dismissal under the state secrets privilege:

where “further litigation would present an unjustifiable risk of disclosure.” Abilt, 848 F.3d

at 314. Circumstances in which any valid defense would require resort to privileged

materials are those in which “state secrets are so central to [the] proceeding that it cannot

be litigated without threatening their disclosure.” El-Masri, 479 F.3d at 308; see also In

re Sealed Case, 494 F.3d at 149.

       That’s the situation here.      Wikimedia claims that the NSA is acquiring all

communications on a chokepoint cable that it is monitoring.               There’s simply no

conceivable defense to this assertion that wouldn’t also reveal the very information that the

government is trying to protect: how Upstream surveillance works and where it’s


                                              52
conducted. Indeed, “the whole object of [Wikimedia’s] suit and of the discovery” is to

inquire into “the methods and operations of the [NSA]”—“a fact that is a state secret.”22

Sterling, 416 F.3d at 348.

       Wikimedia contends that “the district court need not conclusively determine that

Wikimedia is or was in fact subject to Upstream surveillance.” Appellant’s Br. at 61–62.

Even at trial, says Wikimedia, the factfinder need only find by a preponderance of the

evidence that the NSA copied Wikimedia’s communications.

       We, however, can’t condone holding a one-sided trial. At the summary-judgment

stage, the nonmovant need only support its claims with specific facts that “will be taken to

be true.” Lujan v. Defs. of Wildlife, 504 U.S. 555, 561 (1992). But “at the final stage, those

facts (if controverted) must be supported adequately by the evidence adduced at trial.” Id.

(cleaned up). And given that the government’s hands are so clearly tied by state secrets,

“it would be a mockery of justice for the court” to permit Wikimedia to substantiate its

claims by presenting its half of the evidence to the factfinder as if it were the whole. In re

Sealed Case, 494 F.3d at 148 (quoting Molerio v. FBI, 749 F.2d 815, 825 (D.C. Cir. 1984)).




       22
          Judge Motz says that the district court could ascertain in camera the validity of
the government’s “discrete” defenses that (1) it’s not copying all communications on a
monitored link, and (2) it’s hypothetically possible for Upstream to avoid Wikimedia’s
communications. Dissent at 60-61. Respectfully, a hypothetical is not a defense to
reasonable inferences drawn from specific facts (here, a 2011 FISC opinion). Yet that’s
all the government can offer because how the NSA is actually conducting Upstream is a
state secret. That’s exactly why the case must be dismissed. In short, there isn’t a state
secrets problem because the government offers only hypothetical defenses; the government
only offers hypothetical defenses because there’s a state secrets problem.


                                             53
       The district court thus correctly held that, in the face of the state secrets privilege,

Wikimedia can’t continue to litigate the Wikimedia Allegation to support standing. 23

                                              C.

       In a last-ditch attempt to avoid dismissal, Wikimedia maintains that Upstream

inflicted three additional injuries that independently establish standing without implicating

state secrets (and therefore may continue to be litigated): (1) a drop in the readership of

certain Wikipedia pages; (2) the cost of implementing protective measures against

surveillance over its communications; and (3) third party standing.

       On the first, we conclude for substantially the reasons given by the district court that

Wikimedia’s decline in readership isn’t “fairly traceable to the challenged action” such that

it confers standing. Clapper, 568 U.S. at 409.

       The second and third theories of standing aren’t actually independent of the

Wikimedia Allegation. Both require that Wikimedia establish an injury-in-fact. See id. at

402 (“[R]espondents cannot manufacture standing by choosing to make expenditures based

on hypothetical future harm that is not certainly impending.”); Freilich, 313 F.3d at 215

(“Our [third-party] standing inquiry involves both constitutional limitations on federal-

court jurisdiction and prudential limitations on its exercise. . . .       [A] plaintiff must

demonstrate . . . an injury-in-fact.”). Because further litigation premised on the Wikimedia



       23
           Although this case can’t proceed to the merits because of the state secrets
privilege, that result is not a fait accompli in every case, as Judge Motz fears. Rather, “[t]he
effect of a successful interposition of the state secrets privilege by the United States will
vary from case to case.” El-Masri, 479 F.3d at 306.


                                              54
Allegation—the only remaining and viable injury-in-fact—is foreclosed by the state secrets

privilege, so too are these supplementary theories of standing.

                                        *      *       *

       To sum up, evidence of the Wikimedia Allegation establishes a genuine issue of

material fact as to standing, but the state secrets privilege prevents further litigation of that

issue. And because Wikimedia’s other alleged injuries don’t support standing, the district

court’s judgment dismissing this case is

                                                                                   AFFIRMED.




                                               55
DIANA GRIBBON MOTZ, concurring in part and dissenting in part:

         I concur in Parts I and II.A of Judge Diaz’s majority opinion. Specifically, I concur

in the holding that the district court erred in granting summary judgment as to Wikimedia’s

standing. But I cannot join the remainder of Judge Diaz’s opinion. For reasons unclear to

me, both of my colleagues rush to decide a novel and difficult question that the Supreme

Court will resolve within the year.



                                               I.

         My colleagues conclude that § 106(f) of the Foreign Intelligence Surveillance Act

(“FISA”), 50 U.S.C. § 1806(f), does not displace the common law state secrets privilege.

See Maj. Op. Part II.B.2; Judge Rushing Concurring Op. at 64. Two months ago, the

Supreme Court granted certiorari on this very question. See Fazaga v. Fed. Bureau of

Investigation, 965 F.3d 1015 (9th Cir. 2020), cert. granted, 2021 WL 2301971 (U.S.

June 7, 2021). I would stay this case pending the outcome of the case before the Supreme

Court.

          In Fazaga, the Ninth Circuit closely examined FISA’s text and history and

concluded that “the procedures outlined in § 1806(f) [of FISA] . . . constitute Congress’s

specific and detailed description for how courts should handle claims by the government

that the disclosure of material relating to or derived from electronic surveillance would

harm national security.” Id. at 1048 (cleaned up). The Fazaga court reasoned that FISA’s

“plain language, statutory structure, and legislative history demonstrate that Congress




                                              56
intended FISA to displace the state secrets privilege and its dismissal remedy with respect

to electronic surveillance.” Id. at 1052.

       When, as here, the Supreme Court will, in a matter of months, address a question

that is central to a case before a lower court, that court should exercise its “inherent” “power

to stay proceedings.” Landis v. N. Am. Co., 299 U.S. 248, 254 (1936). We have followed

precisely this practice in the past, see Hickey v. Baxter, 833 F.2d 1005 (4th Cir. 1987)

(unpublished table decision) (holding that it was proper to “stay[] proceedings while

awaiting guidance from the Supreme Court in a case that could decide relevant issues”), as

have our sister circuits, see, e.g., Chowdhury v. Worldtel Bangladesh Holding, Ltd., 746

F.3d 42, 47–48 (2d Cir. 2014); Golinski v. U.S. Office of Personnel Mgmt., 724 F.3d 1048,

1050 (9th Cir. 2013); Trump Plaza Assocs. v. NLRB, 679 F.3d 822, 826 (D.C. Cir. 2012).

In such cases, staying our hand to await the Supreme Court’s guidance “is an expression

of prudence, judicial restraint, and respect for the role of a [lower court] that must

scrupulously adhere to the instructions of” a higher authority. Benisek v. Lamone, 266 F.

Supp. 3d 799, 808 (D. Md. 2017). With these principles in mind, I would not attempt to

resolve a question that the Supreme Court will soon answer.



                                              II.

       Because I would not, at this time, reach the question whether FISA displaces the

state secrets privilege, judicial restraint similarly counsels against determining whether the

state secrets privilege requires dismissal of Wikimedia’s case. I will not do that here. But




                                              57
I must note that Judge Diaz’s state secrets analysis, see Maj. Op. Part II.B.3, does raise

some serious concerns. 1

       That opinion stands for a sweeping proposition: A suit may be dismissed under the

state secrets doctrine, after minimal judicial review, even when the Government premises

its only defenses on far-fetched hypotheticals. Maj. Op. at 52. This conclusion marks a

dramatic departure from United States v. Reynolds, 345 U.S. 1 (1953), and its progeny.

And it relegates the judiciary to the role of bit player in cases where weighty constitutional

interests ordinarily require us to cast a more “skeptical eye.” Abilt v. CIA, 848 F.3d 305,

312 (4th Cir. 2017) (cleaned up).

       In Reynolds, the Supreme Court cautioned that, even in cases implicating national

security, “[j]udicial control over the evidence in a case cannot be abdicated to the caprice

of executive officers.” 345 U.S. at 9–10. Thus, the Court developed a “formula of

compromise,” mindful that “[t]oo much judicial inquiry into [a] claim of privilege would

force disclosure of the thing the privilege was meant to protect, while a complete

abandonment of judicial control would lead to intolerable abuses.” Id. at 8–9.

       Under the Reynolds framework, before a court passes on a claim of privilege, it must

first “determine how far [it] should probe in satisfying itself that the occasion for invoking


       1
         Judge Rushing believes that Wikimedia did not demonstrate a dispute of material
fact as to its standing, and so she would hold that the Government’s motion for summary
judgment — not the state secrets doctrine — requires dismissal of this case. See Judge
Rushing Concurring Op. at 64 (joining only Parts I, II.B.2, and II.C of Judge Diaz’s
opinion). However, Judge Rushing does agree with Judge Diaz that the Government
“successful[ly] assert[ed] [] the state secrets privilege” when opposing Wikimedia’s
discovery requests. Id. at 68.


                                             58
the privilege is appropriate.” Id. at 11. This threshold inquiry necessitates considering

both the Government’s “showing of privilege” and the plaintiff’s “showing of necessity.”

Id. On one end of the spectrum, “[w]here there is a strong showing of necessity” or the

security threat posed by disclosure is unclear, “the claim of privilege should not be lightly

accepted.” Id.; Sterling v. Tenet, 416 F.3d 338, 345 (4th Cir. 2005), cert. denied, 546 U.S.

1093 (2006).     At the other end, “where necessity is dubious, a formal claim of

privilege . . . will have to prevail.” Reynolds, 345 U.S. at 11.

       Applying this framework, the Court in Reynolds determined that the plaintiff’s

“necessity was greatly minimized” by the availability of non-privileged evidence and so a

formal claim of privilege — filed by the Secretary of the Air Force — constituted “a

sufficient showing of privilege to cut off further demand for the [privileged evidence].” Id.

at 10–11. The Court concluded that in the case before it, “examination of the [privileged]

evidence, even by the judge alone, in chambers” was inappropriate, because a “court should

not jeopardize the security which the [state secrets] privilege is meant to protect” when it

is confident the privilege applies. Id. at 10.

       While the Reynolds Court refused to “automatically require a complete disclosure

to the judge before [a] claim of privilege will be accepted,” it expressly recognized that in

camera review might sometimes be necessary to evaluate a privilege claim. Id.; Sterling,

416 F.3d at 345 (“There may of course be cases where the necessity for evidence is

sufficiently strong and the danger to national security sufficiently unclear that in camera

review of all materials is required to evaluate the claim of privilege.”); see also Doe v. CIA,

576 F.3d 95, 105 (2d Cir. 2009).


                                                 59
       In the decades since Reynolds, courts have repeatedly concluded that in camera

review is a “necessary process” when, as here, the Government asserts that the state secrets

privilege will preclude it from raising a valid defense to a constitutional claim. Molerio v.

FBI, 749 F.2d 815, 825 (D.C. Cir. 1984) (Scalia, J.); Fazaga, 965 F.3d at 1067; In re Sealed

Case, 494 F.3d 139, 149–51 (D.C. Cir. 2007); see also Tenenbaum v. Simonini, 372 F.3d

776, 777 (6th Cir. 2004). Indeed, “allowing the mere prospect of a privileged defense to

thwart a citizen’s efforts to vindicate his or her constitutional rights would run afoul of the

Supreme Court’s caution against precluding review of constitutional claims.” In re Sealed

Case, 494 F.3d at 151 (citing Webster v. Doe, 486 U.S. 592, 603–04 (1988)). Thus,

particularly when constitutional rights are at stake, courts routinely probe a claim of

privilege through an “appropriately tailored in camera review” to determine whether

“resort to privileged material” is in fact necessary for the Government to pursue a

“meritorious and not merely plausible” defense. Id. at 149–51.

       Judge Diaz eschews this widely adopted approach. Instead, he concludes that we

need not scrutinize the Government’s claim of privilege because the Government has

demonstrated that “any valid defense” to Wikimedia’s arguments “would require resort to

privileged materials.” Maj. Op. at 52. My colleague concludes that “state secrets are so

central to [the] proceeding that it cannot be litigated without threatening their disclosure,”

and so the case must be dismissed. Id. (quoting El-Masri v. United States, 479 F.3d 296,

308 (4th Cir. 2007)).

       That simply is not so. The Government has offered two discrete defenses to

Wikimedia’s standing: (1) that the Government might not engage in Upstream surveillance


                                              60
at any chokepoint cables carrying Internet traffic between the United States and other

countries; and (2) that it is hypothetically possible for Upstream to operate such that the

Government filters communications before copying or reviewing them, thus avoiding

Wikimedia’s communications entirely. Gov’t Br. at 39, 44–45, 60. Judge Diaz himself

explains at some length that the first defense cannot be reconciled with numerous public

disclosures — and simple common sense. Maj. Op. at 22–27. As to the second defense,

the Government offers no reason why an “appropriately tailored in camera review” could

not ascertain the validity of the defense without imperiling state secrets. In re Sealed Case,

494 F.3d at 151. As Wikimedia concedes, such review need not probe “the identities of

[the Government’s] targets, the specific geographic locations where Upstream surveillance

is conducted, or the participating companies.” Reply Br. at 15–16.

       Moreover, the Government’s public disclosures and publicly available information

about the Internet’s workings raise serious doubts about whether privileged material even

exists to bolster the Government’s second defense. See Brief of Amici Curiae Network

Engineers and Technologists in Support of Plaintiff-Appellant Wikimedia and Reversal

at 3, 12, Wikimedia Found. v. Nat’l Sec. Agency (No. 20-1191) (concluding, based on

public disclosures and expertise in Internet networking, that the Government’s defense

“lacks a basis in both Internet technology and engineering” and so “[i]t is highly unlikely,

if not virtually impossible,” that Upstream’s operation resembles the Government’s

hypothetical).

       Judge Diaz suggests that, because the Government offered only totally inadequate

hypotheticals as defenses, we must assume — based on nothing more than boilerplate


                                             61
claims of privilege — that any valid defense would resort to privileged materials. But this

turns Reynolds on its ear. When the Government makes an inadequate showing, that is

precisely when we should not “lightly accept[]” its claims. Reynolds, 345 U.S. at 11;

Ellsberg v. Mitchell, 709 F.2d 51, 59 (D.C. Cir. 1983) (holding that the scope of a court’s

review should depend on whether the Government’s claims are “plausible and

substantial”), cert. denied, 465 U.S. 1038 (1984); see also In re United States, 872 F.2d

472, 479 (D.C. Cir.) (rejecting a claim of privilege after in camera review, notwithstanding

the Government’s submission of an “affidavit ostensibly describ[ing] the harms that would

be dealt to our nation’s security . . . were [the] case to continue through the normal course

of litigation”), cert. denied sub nom., United States v. Albertson, 493 U.S. 960 (1989).

       At bottom, my colleague concludes that whenever the Government has not disclosed

whether a plaintiff’s communications have been subject to FISA surveillance, vague claims

of privilege and far-fetched hypotheticals will suffice to obtain dismissal. But FISA

surveillance is not a subject that categorically falls outside the bounds of judicial review.

Cf. Tenet v. Doe, 544 U.S. 1, 9 (2005) (noting that “where the very subject matter of [an]

action,” such as “a contract to perform espionage, [is] a matter of state secret,” a case may

be “dismissed on the pleadings without ever reaching the question of evidence, since it [is]

so obvious that the action should never prevail over the privilege”) (quoting Reynolds’s

discussion of Totten v. United States, 92 U.S. 105 (1876)) (emphasis omitted). And if the

Reynolds privilege is stretched to require dismissal — before a court may scrutinize the




                                             62
Government’s claims — in cases like this one, I am left to wonder whether any electronic

surveillance case could ever proceed to the merits. 2



                                      *      *       *

       I recognize that when it considers the issues raised in Fazaga and the case at hand,

the Supreme Court may bless the majority’s approach. But the Court may conclude that

the Ninth Circuit properly reconciled “transparency, accountability and national security”

in resolving the difficult questions before it. Fazaga, 965 F.3d at 1068. The Court may

even articulate new factors for lower courts to consider in electronic surveillance cases. In

any event, I would await guidance from the Supreme Court.




       2
          My colleagues suggest that we should be comforted by the fact that the
Government has, in two cases involving FISA surveillance, either declined to invoke the
state secrets privilege or declined to seek outright dismissal of some claims pursuant to the
privilege. Maj. Op. at 44-45; Judge Rushing Concurring Op. at 64 (joining Part II.B.2 of
Judge Diaz’s opinion). Recent history indicates that these two cases are outliers. See
Daniel R. Cassman, Note, Keep It Secret, Keep It Safe: An Empirical Analysis of the State
Secrets Doctrine, 67 Stan. L. Rev. 1173, 1190–91 (2015) (documenting a dramatic increase
in Government assertions of the state secrets privilege, including in FISA cases). In any
event, Reynolds’s admonition remains applicable: “Judicial control over the evidence in a
case cannot be abdicated to the caprice of executive officers.” 345 U.S. at 9–10.


                                             63
RUSHING, Circuit Judge, concurring in part and in the judgment:

       I agree with Judge Diaz that FISA’s discovery procedures do not govern here,

therefore the district court did not err in denying Wikimedia’s motion to compel discovery.

See Maj. Op. Part II.B.2. And I join my colleagues in concluding that Wikimedia’s

supplementary theories of standing fail. See Maj. Op. Part II.C. I write separately because

I would also hold that Wikimedia has failed to demonstrate a dispute of material fact

regarding its standing based on the Wikimedia Allegation and therefore would affirm the

district court’s grant of summary judgment on standing grounds.

       Summary judgment is proper if Wikimedia—which bears the burden to prove its

standing at trial—failed to make a showing sufficient to establish that it has suffered an

injury in fact. See Celotex Corp. v. Catrett, 477 U.S. 317, 327 (1986); see also Spokeo,

Inc. v. Robins, 136 S. Ct. 1540, 1547 (2016). At the summary judgment stage, Wikimedia

“can no longer rest on mere allegations but must set forth . . . specific facts” that create a

genuine dispute at each necessary step of its standing theory. Clapper v. Amnesty Int’l

USA, 568 U.S. 398, 411–412 (2013) (original alterations and internal quotation marks

omitted). The third prong of the Wikimedia Allegation requires Wikimedia to prove

that the NSA actually copies and reviews “all the international text-based communications

that travel across a given link upon which it has installed surveillance equipment.”

Wikimedia Found. v. Nat’l Sec. Agency, 857 F.3d 193, 210 (4th Cir. 2017) (internal

quotation marks omitted). Because much of the information about how the NSA collects

communications is shielded from discovery by the state secrets privilege, Wikimedia’s task

is a difficult one. Unlike the majority, I would hold that Wikimedia has not presented


                                             64
sufficient evidence from which a reasonable jury could find in its favor on prong three of

the Wikimedia Allegation and therefore the Government “is entitled to judgment as a

matter of law.” Fed. R. Civ. P. 56(a); see also Anderson v. Liberty Lobby, Inc., 477 U.S.

242, 249 (1986) (“[T]here is no issue for trial unless there is sufficient evidence favoring

the nonmoving party for a jury to return a verdict for that party.”).

       The majority hangs its hat on the statement in a declassified 2011 FISC opinion that

the “NSA will acquire a wholly domestic ‘about’ communication if the transaction

containing the communication is routed through an international Internet link being

monitored by NSA.” Redacted, 2011 WL 10945618, at *15 (FISA Ct. Oct. 3, 2011).

Wikimedia reads this sentence as conceding that the NSA will acquire all wholly domestic

“about” communications routed through a monitored link, which, for technological

reasons, can only be true if the NSA is copying all traffic on a surveilled circuit. The

premise of Wikimedia’s argument—that the Government has admitted the NSA collects

all domestic “about” communications routed through a monitored link—is based not on

technological facts, expert opinion, or other evidence in the record but on an unreasonable

inference from the 2011 FISC opinion.

       By relying on a capacious reading of an indefinite article while ignoring the other

eighty pages of the FISC opinion, it is Wikimedia that fails to account for “context.” Maj.

Op. 31. The section of the 2011 FISC opinion from which Wikimedia plucks its chosen

quotation analyzed whether the NSA’s acquisition of wholly domestic communications

was unintentional.    After reviewing the facts concerning collection of both single

communication transactions and multiple communication transactions, the FISC concluded


                                             65
that the collection of wholly domestic communications within those transactions could not

be considered unintentional because nothing “suggest[s] that NSA’s technical means are

malfunctioning or otherwise failing to operate as designed. Indeed, the government readily

concedes that NSA will acquire a wholly domestic ‘about’ communication if the

transaction containing the communication is routed through an international Internet link

being monitored by NSA or is routed through a foreign server.” Redacted, 2011 WL

10945618, at *15; see id. (“[After] a manual review of a sample of its upstream collection

. . . there is no question that the government is knowingly acquiring Internet transactions

that contain wholly domestic communications through its upstream collection.”). Read in

context, this statement affirmed that, by design rather than accident, the NSA was

collecting communications containing tasked selectors—even wholly domestic

communications—on the circuits it monitored.

       Nothing in this statement or the surrounding analysis, however, suggested that the

NSA was collecting all such communications. In reviewing the NSA’s targeting and

minimization procedures, the FISC was concerned with whether the NSA was intentionally

acquiring any wholly domestic communications. Id. at *15–*16; see also 50 U.S.C.

§ 1881a(d)(1)(B). It was not evaluating the comprehensiveness of the NSA’s collection

practices, i.e., whether the agency was acquiring every last communication “about” a

tasked selector or was leaving some communications of interest uncollected because of

other restrictions or priorities irrelevant to the question before the FISC. And it did not

purport, in this statement, to present a comprehensive description of the NSA’s collection

procedures.


                                            66
        The Government’s traffic-mirroring-with-filtering hypothetical illustrates the point.

Both parties agree that, as a technological matter, the NSA would acquire some wholly

domestic “about” communications if it applied filters before copying Internet traffic. The

Government’s concession in the 2011 FISC opinion is thus entirely compatible with the

possibility that the NSA filtered out certain categories of Internet traffic before acquiring

the wholly domestic transactions discussed. It says nothing about filtering one way or the

other, because that stage of the collection process was not the focus of the FISC’s analysis.

Wikimedia stretches the bounds of inference too far when it reads into the FISC’s statement

an off-topic proposition not necessarily implied by that statement, and one that would,

apparently by accident, reveal state secrets to boot.

        Even drawing “all justifiable inferences” in Wikimedia’s favor, its out-of-context

interpretation of one statement from the 2011 FISC opinion could not support a jury finding

in its favor that the NSA actually copies and reviews all communications on a monitored

link.    Anderson, 477 U.S. at 255.       And as the majority correctly acknowledges,

“Wikimedia’s ‘grab-bag’ of other support” does little to help it bear its burden. Maj. Op.

32.     Nor does the excluded portion of Brader’s expert report—which is based on

speculative assumptions about the NSA’s undisclosed surveillance priorities and

capabilities—appreciably boost Wikimedia’s evidentiary showing. See, e.g., Obama v.

Klayman, 800 F.3d 559, 567 (D.C. Cir. 2015) (Williams, J.) (rejecting the plaintiffs’

assertion that the NSA’s collection must be comprehensive to be effective because it “rests

on an assumption that the NSA prioritizes effectiveness over all other values” and fails to




                                             67
account for “competing interests that may constrain the government’s pursuit of effective

surveillance”).

       The Government’s successful assertion of the state secrets privilege erected a

significant hurdle for Wikimedia’s effort to set forth specific facts showing a genuine

dispute on the third prong of the Wikimedia Allegation. I would hold that Wikimedia failed

to surmount its burden.




                                           68