(Slip Opinion)
Temporary Certification Under the President
John F. Kennedy Assassination Records
Collection Act of 1992
Section 5(g)(2)(D) of the President John F. Kennedy Assassination Records Collection
Act of 1992 authorizes the President to issue a temporary certification postponing dis-
closure of a set of records without articulating record-specific justifications for further
postponement of each individual record. The purpose of this postponement would be
limited to providing sufficient time to resolve which specific records warrant post-
ponement under section 5(g)(2)(D). There is a strong likelihood that many of the rec-
ords in question implicate the kinds of sensitivities about national security, law en-
forcement, and foreign affairs contemplated by the statute.
Serious constitutional concerns would arise if the Act were construed to require the
President to make premature disclosures of records while they are likely to contain
still-sensitive information.
October 26, 2017
MEMORANDUM OPINION FOR THE COUNSEL TO THE PRESIDENT
Under the President John F. Kennedy Assassination Records Collection
Act of 1992, Pub. L. No. 102-526, 106 Stat. 3443 (codified as amended
at 44 U.S.C. § 2107 note) (“JFK Act” or “the Act”), approximately 34,000
records relating to President Kennedy’s assassination that have not previ-
ously been disclosed in full or in part to the public are to be released by
October 26, 2017, unless the President certifies that their release would
present identifiable harm that outweighs the public’s interest in disclo-
sure. See JFK Act § 5(g)(2)(D). In an October 12, 2017 memorandum,
the Archivist of the United States expressed “significant concerns” about
the manner in which certain federal agencies had applied that standard in
their proposals for postponing the release of some of their records beyond
that deadline. Memorandum for the President, from David S. Ferriero,
Archivist of the United States, Re: Concerns Regarding Agency Proposals
to Postpone Records Pursuant to Section 5 of the President John F.
Kennedy Assassination Records Collection Act of 1992 (JFK Act) at 1
(Oct. 12, 2017) (“Archivist Memorandum”). Although the Archivist
acknowledged that legitimate sensitivities “could warrant continued
postponement” of some of these records under the Act, he concluded that
“there is insufficient time for [the National Archives and Records Admin-
istration (“NARA”)] and the pertinent agencies to . . . identify those
certain, specific instances” in which continued postponement is appropri-
ate. Id. at 1, 2.
1
Opinions of the Office of Legal Counsel in Volume 41
You have asked whether section 5(g)(2)(D) of the Act allows the Presi-
dent to issue a temporary certification postponing disclosure of a set of
records without articulating record-specific justifications for further
postponement of each individual record. The purpose of this postpone-
ment would be limited to providing sufficient time to resolve which
specific records warrant postponement under section 5(g)(2)(D). Under
the circumstances, in which the initial postponement would last for only a
few months and there is a strong likelihood that many of the records in
question implicate the kinds of sensitivities about national security, law
enforcement, and foreign affairs contemplated by the statute, we conclude
that section 5(g)(2)(D) authorizes the President to make such a certifica-
tion.
I.
A.
The Act mandates that governmental entities with records relating to
the assassination of President Kennedy collect, review, and transfer those
records to the President John F. Kennedy Assassination Records Collec-
tion (“JFK Collection”) maintained by NARA. See JFK Act §§ 2(a)(1), 4,
5(a). Approximately 272,000 records have already been released in full
under the Act. See Memorandum for John A. Eisenberg, Legal Adviser to
the National Security Council, from John P. Fitzpatrick, Senior Director
for Records, Access and Information Security Management, National
Security Council, Re: Department and Agency Requests for Continued
Postponement of Records under the JFK Assassination Records Collec-
tion Act at 1 (Oct. 25, 2017) (“NSC Memorandum”). As relevant now, the
Act provides that each yet-to-be-released assassination record “shall be
publicly disclosed in full” and made “available in the [JFK] Collection”
by October 26, 2017, “unless the President certifies” that “an identifiable
harm to the military defense, intelligence operations, law enforcement, or
conduct of foreign relations” necessitates continued postponement of
disclosure and “outweighs the public interest in disclosure.” JFK Act
§ 5(g)(2)(D). 1
The Act defines an “assassination record” as “a record that is related to
the assassination of President John F. Kennedy, that was created or made
1 We assume without deciding that the President’s certification power under section
5(g)(2)(D) is not delegable.
2
Temporary Certification Under the JFK Assassination Records Collection Act
available for use by, obtained by, or otherwise came into the possession
of ” various governmental entities. Id. § 3(2). In 1995, the Assassination
Records Review Board (“Board”)—a short-lived agency established by the
Act, see id. § 7—issued regulations interpreting “assassination record”
broadly, to encompass “[a]ll records collected by or segregated by all
Federal, state, and local government agencies in conjunction with any
investigation or analysis of or inquiry into the assassination of President
Kennedy.” 36 C.F.R. § 1290.1(b)(2). Under the Board’s interpretation,
“assassination record[s]” include documents created well into the 1990s
pertaining to investigations, analyses, or inquiries into President Kenne-
dy’s assassination. 2
The Act gave federal offices until late 1993 to identify and review all
assassination records in their possession and to begin transferring them
to NARA for immediate public release. See JFK Act § 5(c)(1). The Act,
however, also established an exception under section 6, which allowed
public disclosure to be postponed up to October 26, 2017. A postpone-
ment under section 6 required “clear and convincing evidence that” the
record in question implicated (1) certain sensitive information whose
disclosure would threaten national security or foreign affairs; (2) living
individuals who provided confidential information and would face a
substantial risk of harm if their identities were revealed; (3) unwarranted
intrusions into personal privacy; (4) confidential understandings between
United States agents and cooperating individuals or foreign governments
that would be compromised and cause harm if publicly revealed; or
(5) security or protective procedures that the government uses or might
use, where disclosure of those procedures would be sufficiently harmful. 3
2 Conducting an “Expert Search” of the JFK Collection Reference System for records
dated between 1990 and 1998 returns nearly 5,000 records. See NARA, JFK Assassina-
tion Records, Collection Reference System, https://www.archives.gov/research/jfk/search.
html (last visited Oct. 26, 2017).
3 More specifically, section 6 authorizes postponement of public disclosure of records
or portions of records only when
there is clear and convincing evidence that—
(1) the threat to the military defense, intelligence operations, or conduct of foreign
relations of the United States posed by the public disclosure of the assassination
record is of such gravity that it outweighs the public interest, and such public dis-
closure would reveal—
(A) an intelligence agent whose identity currently requires protection;
3
Opinions of the Office of Legal Counsel in Volume 41
The Board reviewed every record that a “[g]overnment office” identi-
fied as subject to postponement of disclosure under section 6 and made its
own determination whether the record qualified as an “assassination
record” and whether postponement was warranted. See id. § 7(i)(2). The
Board began its work in April 1994 and ceased operating on September
30, 1998. See Final Report of the Assassination Records Review Board
at 13, 15 (Sept. 30, 1998) (“ARRB Report ”), https://www.archives.gov/
files/research/jfk/review-board/report/arrb-final-report.pdf. In many cases,
the Board appears not only to have upheld the postponement of disclosure
but also to have concluded that postponement until 2017 was warranted.
See id. at 30 (“[T]he Review Board employs the term ‘postponed’ to mean
‘redacted until the year 2017.’”); see generally id. at 48–74 (identifying
various types of records as “postponed”; explicitly identifying certain
types of records as postponed for shorter periods of time when appropri-
ate). The Act also allowed agencies to appeal the Board’s determinations
to the President, who was to issue a written certification specifying his
(B) an intelligence source or method which is currently utilized, or reasonably
expected to be utilized, by the United States Government and which has not been
officially disclosed, the disclosure of which would interfere with the conduct of
intelligence activities; or
(C) any other matter currently relating to the military defense, intelligence oper-
ations or conduct of foreign relations of the United States, the disclosure of which
would demonstrably impair the national security of the United States;
(2) the public disclosure of the assassination record would reveal the name or
identity of a living person who provided confidential information to the United
States and would pose a substantial risk of harm to that person;
(3) the public disclosure of the assassination record could reasonably be expected
to constitute an unwarranted invasion of personal privacy, and that invasion of pri-
vacy is so substantial that it outweighs the public interest;
(4) the public disclosure of the assassination record would compromise the exist-
ence of an understanding of confidentiality currently requiring protection between a
Government agent and a cooperating individual or a foreign government, and pub-
lic disclosure would be so harmful that it outweighs the public interest; or
(5) the public disclosure of the assassination record would reveal a security or
protective procedure currently utilized, or reasonably expected to be utilized, by the
Secret Service or another Government agency responsible for protecting Govern-
ment officials, and public disclosure would be so harmful that it outweighs the pub-
lic interest.
JFK Act § 6. Although section 6 itself does not limit postponements to October 26, 2017,
section 5(g)(2)(D) requires that postponed records “be publicly disclosed in full” by that
date unless the President certifies a further postponement under a different standard.
4
Temporary Certification Under the JFK Assassination Records Collection Act
determination “under the standards set forth in section 6” whether to
postpone or disclose a record. JFK Act § 9(d)(1).
Even when the Board found that an assassination record qualified for a
postponement under section 6, the Act thereafter required periodic review
“by the originating agency and the Archivist” of whether the justifications
for postponement remained valid. See id. § 5(g)(1)–(2). Under this pro-
cess, many records that previously qualified for postponement of disclo-
sure under section 6 have already been released. Most recently, in July
2017, NARA released “3,810 documents, including 441 formerly with-
held-in-full documents and 3,369 documents formerly released with
portions redacted,” originating from the Federal Bureau of Investigation
and the Central Intelligence Agency. NARA, JFK Assassination Records
– 2017 Additional Documents Release, https://www.archives.gov/research/
jfk/2017-release (last visited Oct. 26, 2017).
While approximately 272,000 assassination records have already been
released in full, approximately 34,000 documents have yet to be dis-
closed, in whole or in part, because they have continued to satisfy section
6. NSC Memorandum at 1, 2. In other words, federal agencies identified
these records as being subject to postponed disclosure under section 6, the
Board confirmed that “clear and convincing evidence” established that
one of the section 6 criteria applied, and the Act required periodic re-
review to confirm that postponed disclosure remained justified. “Over
90% of the remaining postponed records originated from or contain equi-
ties of the Central Intelligence Agency or the Federal Bureau of Investiga-
tion.” Id. at 2 n.5.
In light of section 5(g)(2)(D), the authority to withhold assassination
records under section 6 expires on October 26, 2017. At that point, each
remaining record “shall be publicly disclosed in full . . . unless the Presi-
dent certifies” that continued postponement is necessary to protect against
identifiable harm to national security, law enforcement, or foreign affairs,
and that the harm outweighs the public interest in disclosure. JFK Act
§ 5(g)(2)(D).
B.
When President George H.W. Bush signed the Act in 1992, he issued a
signing statement—consistent with this Office’s recommendation 4—
4 See Memorandum for W. Lee Rawls, Assistant Attorney General, Office of Legisla-
tive Affairs, from David G. Leitch, Deputy Assistant Attorney General, Office of Legal
5
Opinions of the Office of Legal Counsel in Volume 41
explaining that section 6 is unduly restrictive because it “does not con-
template nondisclosure of executive branch deliberations or law enforce-
ment information of the executive branch . . . , and it provides only a
narrow basis for nondisclosure of national security information.” State-
ment on Signing the President John F. Kennedy Assassination Records
Collection Act of 1992 (Oct. 26, 1992), 2 Pub. Papers of Pres. George
Bush 2004, 2004–05 (1992–93) (“1992 Signing Statement”). He further
explained that the President’s “authority to protect these categories of
information comes from the Constitution and cannot be limited by stat-
ute,” and that the President “cannot abdicate [his] constitutional responsi-
bility to take such action when necessary.” Id. at 2004.
C.
Between September 2014 and November 2015, NARA sent notices to
all agencies that still had records or portions of records postponed under
section 6, reminding them of the Act’s October 26, 2017 disclosure dead-
line. See NSC Memorandum at 3. The National Security Council’s Rec-
ords Access and Information Security Interagency Policy Committee
instructed each affected agency to provide by May 1, 2017, a memoran-
dum either advising that it was not asking the President to certify under
section 5(g)(2)(D) that continued postponement of records was necessary,
or requesting continued postponement and supplying justifications that
would support presidential certification. Id. at 3–4. The agencies have
requested that the President certify that it is necessary to continue postpon-
ing the disclosure, either in whole or in part, of approximately 31,000
records. Id. at 4.
In recent months, subject-matter experts at NARA reviewed the agen-
cies’ requests and raised concerns with National Security Council staff
about whether the agencies had complied with the statutory standard. As
noted above, on October 12, 2017, the Archivist of the United States
wrote to the President of his “significant concerns” about the proposed
postponements. Archivist Memorandum at 1. In light of “the information
at issue and the related sensitivities,” the Archivist “agree[d]” that the
records “could warrant continued postponement in certain, specific in-
Counsel, Re: Enrolled Bill S. 3006, President John F. Kennedy Assassination Records
Collection Act, att. at 1–2 (Oct. 6, 1992) (recommending that the President “make clear
that the bill cannot restrict the President’s authority under the Constitution to protect
confidential information”).
6
Temporary Certification Under the JFK Assassination Records Collection Act
stances.” Id. Based on NARA’s review of a sampling of postponed rec-
ords, however, the Archivist expressed doubt that agencies had properly
applied the standard for postponing disclosure under section 5(g)(2)(D)
in every instance. The Archivist also expressed the view that inconsisten-
cies existed between the agencies’ current requests for postponing disclo-
sure of certain information and prior instances in which the same infor-
mation had been disclosed. Accordingly, the Archivist concluded that
“there is insufficient time for NARA and the pertinent agencies to further
consider our concerns and identify those certain, specific instances where
information could warrant continued postponement.” Id. at 2.
II.
You have asked whether the Act permits the President to make a tem-
porary certification that would postpone disclosure of a large number of
the remaining undisclosed records (or portions of records) to enable
completion of the full review contemplated by the Archivist. You expect
the process of resolving the Archivist’s concerns and making the neces-
sary determinations to require an additional six months beyond the Octo-
ber 26, 2017 statutory deadline. For the reasons that follow, we conclude
that section 5(g)(2)(D) of the Act authorizes the President to certify the
short-term postponement you describe.
A.
The Act requires public disclosure of all remaining assassination rec-
ords by October 26, 2017, unless the requisite certification is made. In
relevant part, it provides as follows:
Each assassination record shall be publicly disclosed in full, and
available in the Collection no later than the date that is 25 years after
the date of enactment of this Act [Oct. 26, 1992], unless the Presi-
dent certifies, as required by this Act, that—
(i) continued postponement is made necessary by an identi-
fiable harm to the military defense, intelligence operations, law
enforcement, or conduct of foreign relations; and
(ii) the identifiable harm is of such gravity that it outweighs
the public interest in disclosure.
JFK Act § 5(g)(2)(D). We conclude that the certification you propose
would satisfy the balancing test in section 5(g)(2)(D). As explained more
7
Opinions of the Office of Legal Counsel in Volume 41
fully below, the President could reasonably determine that a short-term
postponement is necessary because a premature release of records without
adequate time to resolve agencies’ concerns would present an identifiable
harm to the interests identified in clause (i). Furthermore, he could rea-
sonably determine that the public interest in immediate disclosure does
not outweigh the identifiable harm because disclosures would be post-
poned for, at most, six months.
1.
Such a certification would satisfy section 5(g)(2)(D) even though the
President would be determining that a group of records collectively war-
rants continued postponement. Section 5(g)(2)(D), in our view, does not
require the President to articulate record-specific justifications for further
postponement of each individual record. Although section 5(g)(2)(D)
requires that “[e]ach assassination record” withheld until 2017 “shall be
publicly disclosed in full” unless the President makes the necessary certi-
fication, that provision is silent as to whether the President must make a
certification regarding each individual record, or whether he may make a
certification applicable to a group of withheld records that raises an iden-
tifiable harm. In the absence of specificity on this point, we believe that
section 5(g)(2)(D) gives the President discretion to issue a certification
postponing disclosure of an entire group of records.
Language in sections 6 and 9 of the Act reinforces the conclusion that
the contrasting language in section 5(g)(2)(D) does not require the Presi-
dent to determine that each individual record (or portion of a record),
considered in isolation, would pose an identifiable harm outweighing the
public interest in disclosure. All of these provisions set forth criteria for
postponing the disclosure of records. Within section 6, which defines the
threshold criteria that supported withholding records up until now, every
subsection demands an assessment of whether “the public disclosure of the
assassination record ” would cause particular harms. JFK Act § 6(1), (2),
(3), (4), & (5) (emphasis added). For instance, section 6(1) requires that
“the threat to the military defense, intelligence operations, or conduct of
foreign relations . . . posed by the public disclosure of the assassination
record [be] of such gravity that it outweighs the public interest.” Similarly,
section 9(c), which specifies the Board’s process for reviewing agencies’
determinations that records satisfy section 6, commands the Board to
review each assassination record individually before making “a determina-
tion that an assassination record shall be publicly disclosed in the Collec-
8
Temporary Certification Under the JFK Assassination Records Collection Act
tion or postponed for disclosure.” Id. § 9(c)(4)(A) (emphasis added); see
id. § 9(c)(1)(A)–(B) (the Board must direct public disclosure unless “a
Government record is not an assassination record” or “a Government
record or particular information within an assassination record qualifies for
postponement”); id. § 9(c)(2) (setting forth requirements for “approving
postponement of public disclosure of an assassination record”). And sec-
tion 9(d), which authorizes the President to issue a certification approving
or disapproving the Board’s decision, similarly requires the President to
apply the section 6 criteria separately to each record to determine whether
postponement is warranted. See id. § 9(d)(1) (“After the Review Board has
made a formal determination concerning the public disclosure or post-
ponement of disclosure of an executive branch assassination record or
information within such a record . . . the President shall have the sole and
nondelegable authority to require the disclosure or postponement of such
record or information under the standards set forth in section 6[.]”).
Section 5(g)(2)(D)(i), however, uses very similar language to section
6(1) in describing “an identifiable harm to the military defense, intelli-
gence operations, law enforcement, or conduct of foreign relations,”
without expressly tying that harm to an individual assassination record.
These textual differences indicate that section 5(g)(2)(D) authorizes the
President to certify that it is necessary to withhold an entire group of
records the disclosure of which would present an identifiable harm out-
weighing the public interest in disclosure. See Sebelius v. Cloer, 569 U.S.
369, 378 (2013) (“We have long held that where Congress includes par-
ticular language in one section of a statute but omits it in another section
of the same Act, it is generally presumed that Congress acts intentionally
and purposely in the disparate inclusion or exclusion.”) (internal quotation
marks and brackets omitted).
This reading also reflects sensible policy aims. By the time the Presi-
dent determines whether to continue to postpone records under section
5(g)(2)(D), each record has gone through an extensive and individualized
multi-year review process to verify that public disclosure would have
been harmful in the 1990s and would still be harmful through October 26,
2017. That history explains why Congress would have afforded the Presi-
dent additional flexibility when determining the necessity of postponing
disclosure beyond 2017. The different timetables for review under
section 6 and section 5(g)(2)(D) bolster this conclusion. By design, the
section 6 process took years and multiple stages of review—including the
possibility of presidential review—to resolve which individual records
9
Opinions of the Office of Legal Counsel in Volume 41
should be withheld. Congress could have concluded that the President’s
review under section 9(d)(1) of the Board’s determinations about individ-
ual records would not interfere with the President’s core duties, since any
appeals would likely be staggered in time and most Board determinations
would not demand presidential action. Section 5(g)(2)(D), on the other
hand, requires the President to make determinations about all remaining
postponed records in a very short timeframe, because he must determine
whether postponement remains necessary in light of current concerns
about national security, law enforcement, and foreign affairs. If the Presi-
dent were barred from determining that a group of records collectively
warranted continued postponement, he would be forced to evaluate the
individual justifications for postponing tens of thousands of records on a
compressed timetable without adequate time for full consideration. Policy
concerns thus support interpreting section 5(g)(2)(D) to allow the Presi-
dent to issue a certification encompassing multiple records.
We further conclude that the proposed certification would satisfy the
requirement of section 5(g)(2)(D)(i) that there be “an identifiable harm to
the military defense, intelligence operations, law enforcement, or conduct
of foreign relations.” An “identifiable harm” to national security, law
enforcement, or foreign affairs includes the potential harm to those inter-
ests resulting from prematurely disclosing a batch of records that appears
to contain sensitive information. The ordinary meaning of “identifiable”
is “[a]ble to be identified; capable of identification.” 7 Oxford English
Dictionary 618 (2d ed. 1989); see also, e.g., Random House Dictionary of
the English Language (Unabridged) 950 (2d ed. 1987) (defining “identi-
fy” as “[t]o recognize or establish as being a particular person or thing”).
And the ordinary meaning of “harm” in this context is “injury” or “dam-
age.” 6 Oxford English Dictionary at 1121. Thus, an “identifiable harm”
under section 5(g)(2)(D)(i) involves the type of damage to national securi-
ty, law enforcement, or foreign affairs that could be articulated or ascer-
tained.
Textual differences between sections 6, 9(d)(1), and 5(g)(2)(D) support
the conclusion that section 5(g)(2)(D) authorizes continued postponement
based on broad but recognizable harms. Specific language in section 6
expressly compels the government both to identify why disclosure would
present particularized harms to national security, law enforcement, or
foreign affairs and also to substantiate that such harms would materialize.
For instance, section 6(1) does not just require that “the threat to the
military defense, intelligence operations, or conduct of foreign relations
10
Temporary Certification Under the JFK Assassination Records Collection Act
. . . posed by . . . public disclosure . . . [be] of such gravity that it out-
weighs the public interest.” JFK Act § 6(1). It also demands evidence that
public disclosure (A) would specifically threaten the identity of an intelli-
gence agent who “requires protection,” (B) would “interfere with the
conduct of intelligence activities” by compromising intelligence sources
or methods that the United States presently used or was likely to use, or
(C) “would demonstrably impair the national security of the United
States.” Id. Similarly, under section 9(d)(1), if the President wishes to
reverse a Board determination to disclose or postpone a record, he must
not only apply “the standards set forth in section 6,” but must also issue
“an unclassified written certification . . . stating the justification for the
President’s decision, including the applicable grounds for postponement
under section 6.”
Under section 5(g)(2)(D), by contrast, the President need only certify
that “continued postponement is made necessary by an identifiable harm
to the military defense, intelligence operations, law enforcement, or
conduct of foreign relations,” and that “the identifiable harm is of such
gravity that it outweighs the public interest in disclosure.” Section
5(g)(2)(D) contains no additional specifications of the types of harms that
would warrant postponing disclosure. Nor does it compel the President to
describe which specific grounds necessitate postponement. Those differ-
ences from the earlier process are strong evidence that Congress intended
section 5(g)(2)(D) to be a less exacting standard that would not require
the President to pinpoint specific instances of harm that could arise from
disclosure. For the reasons noted above, there are also convincing policy
reasons why Congress would have chosen to make section 5(g)(2)(D) less
stringent than sections 6 and 9 in these regards.
Nor, in our view, does section 5(g)(2)(D) require evidentiary proof sub-
stantiating the likelihood that disclosing a record would cause “identifia-
ble harm.” Section 5(g)(2)(D) merely provides that the President must
certify that it is “necessary” to postpone disclosure in light of an “identifi-
able harm,” not that the President must establish that such harm would
occur. By contrast, section 6 requires evidence that disclosing an intelli-
gence source or method “would interfere with the conduct of intelligence
activities,” id. § 6(1)(B), or that disclosing other sensitive information
“would demonstrably impair the national security of the United States,”
id. § 6(1)(C). Those showings, like others under section 6, must be sup-
ported by “clear and convincing evidence.” Id. § 6. In other statutes, too,
Congress has specified the necessary level of certainty that harm to na-
11
Opinions of the Office of Legal Counsel in Volume 41
tional security will occur. See, e.g., 50 U.S.C. § 1885a(c) (requiring the
Attorney General to certify that disclosure of certain materials in litigation
“would harm the national security of the United States”); id. § 1845
(requiring the Attorney General to certify that disclosure of evidence
derived from the use of a pen register or trap-and-trace device “would
harm the national security of the United States”); id. § 2656 (requiring the
Secretary of Energy to notify Congress of intelligence losses deemed
“likely to cause significant harm or damage to the national security inter-
ests of the United States”). The fact that Congress did not specify in
section 5(g)(2)(D) the degree of likelihood that disclosure would harm
national security, law enforcement, or foreign affairs suggests that Con-
gress authorized the President to determine what level of risk necessitates
postponing disclosure. 5
Thus, for purposes of the first half of section 5(g)(2)(D)’s balancing
test, the President may reasonably conclude that the premature disclosure
of the records at issue would present “an identifiable harm to the military
defense, intelligence operations, law enforcement, or conduct of foreign
relations.” JFK Act § 5(g)(2)(D)(i). Courts have long recognized that
forcing the Executive Branch to disclose sensitive information can harm
national security, law enforcement, or foreign affairs. 6
5 We recognize that section 5(g)(2)(D) refers to an “identifiable harm to the military
defense, intelligence operations, law enforcement, or conduct of foreign relations,”
whereas section 6(1) instead refers to a “threat to the military defense, intelligence
operations, or conduct of foreign relations” (emphases added). While a “harm” is an
“injury” and a “threat” generally refers to the prospect of an impending injury, “harm” in
the present context is necessarily a prediction of what injury may occur after disclosure.
We do not believe that Congress’s use of the term “harm” in section 5(g)(2)(D) implies
that this predicted injury must be more certain to occur than the “threats” described in
section 6. Rather, as noted above, Congress in section 6 and other statutes appears to have
deliberately required the Executive Branch to specify a particular degree of likelihood or
certainty about a future harm, yet declined to add any such language to section 5(g)(2)(D).
6 See CIA v. Sims, 471 U.S. 159, 175–77 (1985) (“[F]orced disclosure of the identities
of [the CIA’s] intelligence sources could well have a devastating impact on the Agency’s
ability to carry out its mission” and “[d]isclosure of the subject matter of the Agency’s
research efforts and inquiries may compromise the Agency’s ability to gather intelligence
as much as disclosure of the identities of intelligence sources.”); Snepp v. United States,
444 U.S. 507, 511–12 (1980) (per curiam) (disclosure of even unclassified information
“can be detrimental to vital national interests” by “reveal[ing] information that the CIA—
with its broader understanding of what may expose classified information and confidential
sources—could have identified as harmful”); Haig v. Agee, 453 U.S. 280, 307–08 (1981)
(“foreign policy and national security considerations cannot neatly be compartmental-
12
Temporary Certification Under the JFK Assassination Records Collection Act
Moreover, the risk that the yet-to-be-released assassination records in-
clude sensitive information is not speculative. These records have previ-
ously and reliably been found to contain sensitive information about
national security, law enforcement, or foreign affairs, making it highly
likely that their release would present the harm identified in section
5(g)(2)(D)(i). Disclosure of each of these records has already been post-
poned on the ground that the withheld information satisfied one of section
6’s standards, which overlap considerably with the interests protected by
section 5(g)(2)(D)(i). For example, for a record to have been protected
from disclosure until 2017 under section 6(2), there had to be “clear and
convincing evidence” that disclosure would risk substantial harm to a
living confidential informant by revealing his or her identity and that this
harm outweighed the public interest in disclosure. If that informant is
alive today, disclosure would still likely pose “an identifiable harm to . . .
law enforcement.” JFK Act § 5(g)(2)(D)(i). 7 The examples of records that
ized,” and “[s]ecrecy in respect of information gathered by [diplomatic officials] may be
highly necessary, and the premature disclosure of it productive of harmful results”)
(internal quotation marks omitted); Halkin v. Helms, 690 F.2d 977, 993 (D.C. Cir. 1982)
(“[I]t is obvious that the exposure of one who acted—and indeed may still be acting—as a
CIA operative here and abroad would pose a threat to our diplomatic and military inter-
ests.”); Roviaro v. United States, 353 U.S. 53, 59 (1957) (recognizing “the Government’s
privilege to withhold from disclosure the identity of persons who furnish information of
violations of law to officers charged with enforcement of that law” and noting that the
“purpose of the privilege is the furtherance and protection of the public interest in effec-
tive law enforcement”); United States v. Ortega, 854 F.3d 818, 824 (5th Cir. 2017) (citing
Roviaro); Smith v. Lanier, 726 F.3d 166, 167 (D.C. Cir. 2013) (same).
7 To be sure, the section 6 categories are not wholly subsumed within the section
5(g)(2)(D) standard. Section 6(3)—covering records whose disclosure “could reasonably
be expected to constitute an unwarranted invasion of personal privacy”—does not have an
obvious analogue in section 5(g)(2)(D). But that is a relatively minor concern, as very few
of the remaining postponements were made under section 6(3). See ARRB Report at 63
(noting that the Board “almost never agreed to sustain [an] agency’s requests for post-
ponements on personal privacy grounds”); id. at 64 (noting that certain prisoner-of-war
information was postponed under section 6(3), but only until 2008). Of the privacy
postponements that remain in effect, some may still fall within one of the categories
identified in section 5(g)(2)(D)(i). For example, the Board “agreed to sustain the post-
ponement of the identity of a 13-year-old girl who was a rape victim . . . in the file of an
organized crime figure.” Id. at 63. The President could still find that the continued
postponement of this sort of information is necessary to prevent identifiable harm to law
enforcement sufficient to meet section 5(g)(2)(D)(i). Such a finding would be consistent
with part of the “oft-cited Frankenhauser test” for the law enforcement component of
executive privilege, which asks courts to consider, among other factors, “the extent to
13
Opinions of the Office of Legal Counsel in Volume 41
the Board deemed eligible for postponement under section 6 underscore
this point. For instance, the Board authorized postponing disclosure of
records containing “CIA surveillance methods where CIA provided con-
vincing evidence that the method still merited protection.” ARRB Report
at 53. It is reasonable to conclude that disclosing such a method now
could still present “an identifiable harm to . . . intelligence operations.”
JFK Act § 5(g)(2)(D)(i). More generally, NARA’s independent review of
a sampling of the records at issue concluded that many still contain highly
sensitive information. See Archivist Memorandum at 1 (“We are familiar
with the information at issue and the related sensitivities and agree that
they could warrant continued postponement in certain, specific instanc-
es.”). And in the absence of further interagency coordination and review,
it is not yet possible to determine which specific records would warrant
continued postponement of disclosure.
2.
We also believe that it would be reasonable for the President to con-
clude that the identifiable harm from premature disclosure of such records
would, as section 5(g)(2)(D)(ii) requires, be “of such gravity that it out-
weighs the public interest in disclosure.”
Importantly, the proposed postponement would last only a few more
months. As a result, the relevant public interest consists only in the differ-
ence between having disclosures occur now and having disclosures occur
within the next six months. That interest weighs comparatively little in the
statutory balance, especially in the wake of fully authorized postpone-
ments of decades. 8 The public interest in full access to assassination
records is significant. But a temporary delay in disclosure would still
allow that interest to be vindicated fairly soon; in contrast, disclosure of
which disclosure will thwart governmental processes by discouraging citizens from giving
the government information.” In re U.S. Dep’t of Homeland Sec., 459 F.3d 565, 570 (5th
Cir. 2006) (quoting Frankenhauser v. Rizzo, 59 F.R.D. 339, 344 (E.D. Pa. Mar. 13, 1973)
(unpublished)); see also, e.g., Manna v. U.S. Dep’t of Justice, 51 F.3d 1158, 1166 (3d Cir.
1995) (protecting the withholding of names of “law enforcement officers, interviewees,
and witnesses” because of the possibility of “harassment and retaliation”).
8 Accounting for the length of the proposed postponement is consistent with the
Board’s analysis under section 6 of whether particular types of risks from disclosure
outweighed the public interest. See, e.g., ARRB Report at 64 (postponing until 2008 the
release of private details from prisoner-of-war records from the Korean conflict, based on
the expected lifespan of affected individuals).
14
Temporary Certification Under the JFK Assassination Records Collection Act
sensitive information would compromise other important interests irrevo-
cably. In our view, the concrete risk of harm that premature disclosure of
sensitive records would pose to national security, law enforcement, and
foreign affairs clearly outweighs the public interest in accessing these
records up to six months earlier.
It could of course be said that the government has already had 25 years
to review the records at issue, and that the public interest in disclosure
after the Act’s statutory deadline should outweigh the Executive’s need
for still more time to assess these records. But that argument misappre-
hends the review process, as well as the Act’s different standards for
delaying the disclosure of records before and after October 26, 2017. As
noted, the records at issue have already been repeatedly reviewed. Thus
far, the Act has required the government to satisfy section 6’s criteria for
delaying disclosure of each record. As part of that process, the Board
confirmed that records could remain exempt from disclosure until October
26, 2017. After that date, however, the government must instead rely on
a certification under section 5(g)(2)(D) that continued postponement is
necessary. But during the certification review process, NARA’s questions
about other agencies’ applications of section 5(g)(2)(D) have prevented
the Executive Branch from definitively resolving which remaining records
can continue to be withheld. Nor would it have been feasible to begin
reviewing records under the section 5(g)(2)(D) standard much earlier. The
further in advance of 2017 that agencies tried to apply section 5(g)(2)(D),
the greater the risk of inaccurately assessing whether disclosure in 2017
would risk an identifiable harm to national security, law enforcement, or
foreign affairs.
B.
Principles of constitutional avoidance strongly support our conclusion
that section 5(g)(2)(D) authorizes the President to postpone temporarily
the full disclosure of the records at issue. See, e.g., Edward J. DeBartolo
Corp. v. Fla. Gulf Coast Bldg. & Constr. Trades Council, 485 U.S. 568,
575 (1988) (“[W]here an otherwise acceptable construction of a statute
would raise serious constitutional problems, the Court will construe the
statute to avoid such problems unless such construction is plainly contrary
to the intent of Congress.”). Serious constitutional concerns would arise
if the Act were construed to require the President to make premature
disclosures of records while they are likely to contain still-sensitive
information.
15
Opinions of the Office of Legal Counsel in Volume 41
The President’s position as “head of the Executive Branch and as
Commander in Chief ” confers upon him the “authority to classify and
control access to information bearing on national security”—an authority
that “exists quite apart from any explicit congressional grant.” Dep’t of
the Navy v. Egan, 484 U.S. 518, 527 (1988). Courts accordingly “show[]
deference to what the Executive Branch has determined . . . is essential to
national security.” Ziglar v. Abbasi, 137 S. Ct. 1843, 1861 (2017) (inter-
nal quotation marks omitted); see also Egan, 484 U.S. at 529 (finding that
“the protection of classified information must be committed to the broad
discretion of the agency responsible,” and declining to “determine what
constitutes an acceptable margin of error in assessing the potential risk”
of improper access or disclosure). The Supreme Court has similarly em-
phasized “the generally accepted view that foreign policy [is] the province
and responsibility of the Executive,” and that “courts have traditionally
shown the utmost deference to Presidential responsibilities” in that area.
Id. at 530 (internal quotation marks and citations omitted).
Opinions by Attorneys General and this Office have repeatedly recog-
nized the President’s authority and responsibility to protect against the
release of information affecting the Executive Branch’s intelligence
activities, military operations, conduct of foreign affairs, or law enforce-
ment proceedings, even in the face of statutory disclosure requirements.
See, e.g., Whistleblower Protections for Classified Disclosures, 22 Op.
O.L.C. 92, 95 (1998) (discussing “the right of the President to decide to
withhold national security information from Congress under extraordinary
circumstances”); Presidential Certification Regarding the Provision of
Documents to the House of Representatives Under the Mexican Debt
Disclosure Act of 1995, 20 Op. O.L.C. 253, 265–76 (1996) (discussing the
“President’s constitutional authority to control the disclosure of docu-
ments and information relating to diplomatic communications”); Assertion
of Executive Privilege in Response to Congressional Demands for Law
Enforcement Files, 6 Op. O.L.C. 31, 35 (1982) (opinion of Attorney
General William French Smith) (“[I]f the President believes that certain
types of information in law enforcement files are sufficiently sensitive
that they should be kept confidential, it is the President’s constitutionally
required obligation to make that determination.”); see also Prosecution
for Contempt of Congress of an Executive Branch Official Who Has
Asserted a Claim of Executive Privilege, 8 Op. O.L.C. 101, 140 (1984)
(“Nearly every President since George Washington has found that in order
to perform his constitutional duties it is necessary to protect the confiden-
tiality of certain materials, including . . . national security information[]
16
Temporary Certification Under the JFK Assassination Records Collection Act
and sensitive law enforcement proceedings, from disclosure to Con-
gress.”). Those opinions are consistent with President Bush’s determina-
tion that the Act’s disclosure requirement could not be allowed to inter-
fere with the President’s constitutional authority to “protect confidential
executive branch materials and to supervise and guide executive branch
officials.” 1992 Signing Statement at 2005.
One necessary incident of the President’s authority to control sensitive
executive branch information is the ability to determine in the first in-
stance which records contain such information. Thus, construing section
5(g)(2)(D) to deprive the President of the ability to withhold records in
order to give the Executive Branch adequate time to determine which
records contain still-sensitive information about national security, law
enforcement, or foreign affairs would impermissibly encroach upon a core
presidential prerogative. In an analogous circumstance, when it had not
been possible to review a large set of documents in the time allowed by a
congressional subpoena, Attorney General Janet Reno concluded that a
protective assertion of executive privilege was appropriate, pending final
decisions about “which specific documents are deserving of a conclusive
claim of executive privilege.” Protective Assertion of Executive Privilege
Regarding White House Counsel’s Office Documents, 20 Op. O.L.C. 1, 1
(1996). There, the protective assertion was necessary because the volume
of documents could not be “specifically and individually reviewed” with-
in the time available. Id. Here, too, the Archivist has concluded that it
is not possible within the time available to resolve remaining questions
regarding whether individual records still contain sensitive information.
As we have explained, “[w]here the President’s authority concerning
national security or foreign relations is in tension with a statutory rather
than a constitutional rule, the statute cannot displace the President’s
constitutional authority and should be read to be ‘subject to an implied
exception in deference to such presidential powers.’” Title III Electronic
Surveillance Material and the Intelligence Community, 24 Op. O.L.C.
261, 274 (2000) (quoting Rainbow Navigation, Inc. v. Dep’t of the Navy,
783 F.2d 1072, 1078 (D.C. Cir. 1986) (Scalia, J.)); see also, e.g., Presi-
dential Certification Under the Mexican Debt Disclosure Act, 20 Op.
O.L.C. at 264 (finding that constitutional avoidance required a particular
construction of a statute “because any other reading would fail to preserve
the President’s constitutional authority and responsibility to preserve the
absolute confidentiality of documents the disclosure of which would be
contrary to the public interest”); Prosecution for Contempt of Congress,
17
Opinions of the Office of Legal Counsel in Volume 41
8 Op. O.L.C. at 139–41 (concluding, in light of the Executive’s sole
authority over law enforcement, that “the constitutionally mandated
separation of powers requires the [criminal-contempt-of-Congress] statute
to be interpreted so as not to apply to Presidential assertions of executive
privilege”). Accordingly, principles of constitutional avoidance require
interpreting the Act to authorize the President to postpone the disclosure
of the records at issue on a temporary basis.
III.
For the reasons set forth above, we conclude that section 5(g)(2)(D)
of the Act authorizes the President to issue a temporary certification
postponing the full disclosure of certain undisclosed records in the JFK
Collection to allow for further review before they are fully released to the
public.
CURTIS E. GANNON
Acting Assistant Attorney General
Office of Legal Counsel
18