Case Information
*1 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA AGILITY PUBLIC WAREHOUSING
COMPANY K.S.C.,
Plaintiff, Civil Action No. (BAH) 14-0946 v. Judge Beryl A. Howell NATIONAL SECURITY AGENCY,
Defendant. MEMORANDUM OPINION
The plaintiff, Agility Public Warehousing Company K.S.C., brings suit against the National Security Agency (“NSA”), pursuant to the Freedom of Information Act (“FOIA”), 5 U.S.C. § 552. As part of its FOIA request, the plaintiff sought “all [of the] email, letter, telephonic, or other communications” of the plaintiff in the NSA’s possession. See Compl. ¶ 11, ECF No. 1. Relying on information leaked to the media regarding various classified NSA communication collection programs, the plaintiff argues that the NSA “indiscriminately collect[s] millions of telephone and email communications” from U.S. citizens and therefore maintains records of the plaintiff’s historical communications. Pl.’s Mem. Supp. Cross-Mot. Summ. J. (“Pl.’s Mem.”) at 1, ECF No. 19-1. The NSA, however, issued a “Glomar” response— neither confirming nor denying the existence of records responsive to the plaintiff’s request.
The plaintiff challenges the NSA’s provision of a “Glomar” response regarding the requested documents as well as the adequacy of the NSA’s search efforts for certain other requested documents. Now pending before the Court are the parties’ cross motions for summary judgment. For the reasons stated below, the NSA’s motion for summary judgment is granted and the plaintiff’s cross-motion for summary judgment is denied.
I. BACKGROUND
A. The Plaintiff’s FOIA Request
The plaintiff is a Kuwaiti logistics company that provided food to U.S. troops stationed in Iraq, Kuwait, Qatar, and Jordan from 2003 through 2010, as part of a series of contracts with the Defense Logistics Agency. Compl. ¶ 3. On November 9, 2009, the plaintiff was indicted in the Northern District of Georgia on charges of conspiracy to defraud the United States in violation of 18 U.S.C. § 371, major fraud against the United States in violation of 18 U.S.C. § 1031, and wire fraud in violation of 18 U.S.C. § 1343, stemming from the plaintiff’s provision of goods under these contracts. The charges remain pending. See United States v. The Public Warehousing Co., K.S.C. , No. 1:09-CR-490 (N.D. Ga. 2009). The plaintiff was also sued in that same court for violations of the False Claims Act, 31 U.S.C. 3729 et seq. , which violations likewise stem from the plaintiff’s provision of goods to U.S. soldiers. See United States ex rel. Kamal Mustafa Al-Sultan v. The Public Warehousing Company, K.S.C. , No. 1:05-CV-2968 (N.D. Ga. 2005). [1] In defending against these civil and criminal charges, the plaintiff “makes extensive use of email and telephone communications” to communicate from Kuwait with its U.S.-based attorneys at Skadden, Arps, Slate, Meagher & Flom LLP (“Skadden”). Decl. of Emily L. Aviad ¶ 9 (“Pl.’s Aviad Decl.”), ECF No. 19-3. Skadden was a “customer of Verizon Business Network Services from 2010 through the first quarter of 2014.” [2] See Suppl. Decl. of Emily L. Aviad ¶ 2 (“Pl.’s Aviad Suppl. Decl.”), ECF No. 26-1.
On December 19, 2013, the plaintiff submitted a FOIA request to the NSA seeking seven categories of documents: (1) “all email, letter, telephonic, or other communications” by the *3 plaintiff; (2) the name of any U.S. or foreign communications provider that intercepted the plaintiff’s communications; (3) documents relating to two contracts between the plaintiff and Defense Supply Center Philadelphia; (4) documents relating to the two lawsuits brought against the plaintiff in the Northern District of Georgia; (5) all communications between the NSA and any other investigative or law enforcement agency regarding the plaintiff; (6) documents pertaining to meetings among employees or contractors of any of the Department of Justice, the Office of the Director of National Intelligence, and the NSA regarding the plaintiff; and (7) documents pertaining to meetings between employees or contractors of the NSA and employees or contractors of the Federal Bureau of Investigation, the Central Intelligence Agency, the Department of Defense, and the Department of Homeland Security, relating to the plaintiff. Compl. ¶ 11.
Although the plaintiff and the NSA exchanged communications clarifying the scope of the plaintiff’s FOIA request, the NSA never provided a response to the plaintiff prior to this litigation. Id. at ¶¶ 14–16. As a result, the plaintiff appealed to the NSA’s FOIA Appeal Authority based on the NSA’s constructive denial of its FOIA request. Id. The NSA indicated that processing of the plaintiff’s appeal would be based on a “first-in, first-out” policy, but over the course of two months, the NSA never responded to the plaintiff. at ¶¶ 17–19; Decl. of David J. Sherman (“NSA’s Sherman Decl.”) at ¶ 24, ECF No. 18-2. As a result, the plaintiff filed the instant action. See generally Compl.
After the initiation of litigation, the Chief of NSA’s FOIA/Privacy Act Office provided the plaintiff with a letter purporting to be a final response to the plaintiff’s FOIA request. NSA’s Sherman Decl. ¶ 25. The NSA noted that, to the extent the plaintiff sought records concerning the contracts and lawsuits mentioned in the plaintiff’s FOIA request, the NSA had *4 conducted a thorough search and was unable to locate any responsive records. Id. ¶ 27. As detailed in two declarations, the NSA tasked “its Office of General Counsel, its acquisition organization, and its logistics organization” to conduct the relevant searches. Id. The NSA queried the records of the relevant organizations using variations of the plaintiff’s name as specified in the plaintiff’s FOIA request—Agility Public Warehousing Company, Agility, and the Public Warehousing Company—and the numbers for the relevant contracts. Supplemental Decl. of David J. Sherman (“NSA’s Suppl. Sherman Decl.”) at ¶ 3, ECF No. 23-1. The NSA’s filing systems contained memoranda, meeting minutes, reports, manuals, and other documents. NSA’s Sherman Decl. ¶ 27 . Within the Office of General Counsel, attorneys searched their Microsoft Outlook email accounts while administrative personnel and paralegals searched the organization’s litigation filings systems. Id. The NSA also searched the “contracting management information system database,” which is maintained in support of the NSA’s contracting activity. Id.
In addition, the NSA’s response informed the plaintiff that, to the extent the plaintiff’s FOIA request called for intelligence information, the NSA could not confirm or deny the existence of any such records as their existence or non-existence is protected by FOIA Exemptions 1 and 3. id. ¶ 26. The NSA’s “foreign intelligence mission includes the responsibility to collect, process, analyze, produce and disseminate signals intelligence (‘SIGINT’) information, of which communications intelligence (‘COMINT’) is a significant subset, for foreign intelligence and counterintelligence purposes to support national and departmental missions to include the conduct of military operations.” ¶ 5. In light of its mission, the NSA determined that “[a]cknowledging the existence or non-existence of responsive records on particular individuals or organizations subject to surveillance would provide . . . *5 adversaries with critical information about the capabilities and limitations” of the NSA and its operations. Id. ¶ 33. Likewise, “[c]onfirmation by NSA that a specific person’s or organization’s activities are not of foreign intelligence interest or that NSA is unsuccessful in collecting foreign intelligence information on their activities” would undermine the NSA’s mission and permit adversaries to “accumulate information and draw conclusions about NSA’s technical capabilities, sources, and methods.” Id. As a result, the disclosure of such information “could reasonably be expected to cause exceptionally grave and irreparable damage to the national security by providing . . . adversaries a road map that instructs them on which communication modes or personnel remain safe or are successfully defeating NSA’s capabilities.” Id. ¶34. Moreover, disclosure of such information would permit adversaries to change their communications behavior or otherwise “alert targets that their existing means of communications are potentially safe.” Id. Accordingly, the NSA did not confirm the existence or non-existence of any such records.
B. The NSA’s Metadata Program
Almost seven months before the plaintiff filed the FOIA request at issue, a United Kingdom-based newspaper, The Guardian, published, on June 6, 2013, an article claiming that the “National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, . . . under a top secret court order issued in April.” Ex. 3, Pl.’s Aviad Decl. (Glenn Greenwald, NSA collecting phone records of millions of Verizon customers daily , The Guardian, June 6, 2013). The Guardian attached to the article a then-classified Foreign Intelligence Surveillance Court (“FISC”) “Secondary Order,” dated April 25, 2013, which it had obtained from a former U.S. government contractor, Edward Snowden. ; see also Ex. 4, Pl.’s Aviad Decl. ( In re Application of the FBI for an Order Requiring the Prod. of Tangible Things *6 From Verizon Bus. Network Servs., Inc., ex rel. MCI Commc'n Servs., Inc., d/b/a Verizon Bus. Servs. (“Secondary Order”), No. BR 13–80 (F.I.S.C. Apr. 25, 2013)). The FISC Secondary Order required Verizon Business Network Services to provide “on an ongoing daily basis . . . all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.” Secondary Order at 2. Telephony metadata includes, inter alia , the originating and terminating telephone number along with the time and duration of the call. [3] Telephony metadata “does not include the substantive content of any communication . . . or the name, address, or financial information of a subscriber or customer.”
In the aftermath of The Guardian’s disclosure, the government began to release details regarding the telephony metadata program along with declassified and redacted copies of other FISC orders. See Ex. 11, Pl.’s Aviad Decl. (Press Release, DNI Clapper Declassifies Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act (FISA) , Nov. 18, 2013). These disclosures reveal that since at least May 2006, the FBI has sought orders from the FISC authorizing the bulk collection of telephony metadata from U.S. telecommunications providers pursuant to Section 215 of the USA PATRIOT Act, 50 U.S.C. § 1861. In re Application of the Fed. Bureau of Investigation for an Order Requiring the Production of Tangible Things from [Redacted] , No. BR 06–05, at 2 (F.I.S.C. May 24, 2006); see also Ex. 7, Pl.’s Aviad Decl. (Declaration of Teresa H. Shea, Signals Intelligence Director, NSA (“NSA’s Shea Decl.”), Smith v. Obama , No. 13-cv-0257 (D. Idaho Jan. 24, 2013), ECF No. 15-2).
Section 215 authorizes the FBI to “make an application for an order requiring the
production of any tangible things (including books, records, papers, documents, and other items)
for an investigation to obtain foreign intelligence information concerning a United States person
or to protect against international terrorism or clandestine intelligence activities . . . .” 50 U.S.C.
§ 1861. Under the program, the FBI seeks orders from the FISC “directing certain
telecommunications service providers to produce all business records created by them (known as
call detail records)” for a designated period of time. NSA’s Shea Decl. ¶ 14. “FISC orders must
be renewed every 90 days, and the program has therefore been renewed 41 times since May
2006.”
Am. Civil Liberties Union v. Clapper
,
Once collected from the telecommunications provider and stored in a secure database,
strict procedures govern the NSA’s access to and use of the collected telephony metadata.
See
In re Application of the FBI for an Order Requiring the Prod. of Tangible Things From
[
REDACTED
], No. BR 13–80,
Before information pertaining to any U.S. person may be disseminated outside the NSA, certain high-level officials “must determine that the information identifying the U.S. person is in fact related to counterterrorism information and that it is necessary to understand the counterterrorism information or assess its importance.” Primary Order at 3. The NSA may also share the results from searches of the metadata with the Executive Branch in order to permit the Executive Branch to determine if such “information contains exculpatory or impeachment information or is otherwise discoverable in legal proceedings” or to “facilitate their lawful oversight functions.” Primary Order at 3.
Almost immediately following these revelations, individuals and public interest groups
filed numerous lawsuits throughout the country challenging the constitutional and statutory basis
for the program.
See, e.g.
,
Clapper
,
C. Other Data Collection Programs
In addition to the NSA’s telephony metadata program, the NSA’s involvement in at least three other classified programs concerning the bulk collection of communications are implicated by the plaintiff’s claim. Under the Pen Register and Trap and Trace (“PR/TT”) program, the government sought FISC orders permitting the collection from service providers of certain electronic communications metadata, including the “to,” “from,” and “cc” lines of an email, along with the time and date of an email. See Ex. 11, Pl.’s Aviad Decl (Press Release, Office of the Director of National Intelligence, DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act , Nov. 18, 2013). Once collected, the information was stored in a secured database. Id. The maintenance and searching of the collected database records was subject to strict requirements similar to those set forth for the NSA’s telephony metadata program. The NSA has not acknowledged a partnership with any specific telecommunications provider regarding the PR/TT program and the program has since been discontinued. See id.
Similarly, media reports have also discussed what have been referred to as the NSA’s
PRISM collection and the “upstream collection” program. Under the PRISM program, the NSA
acquired electronic communications, including e-mails, directly from “compelled U.S.-based
providers,” such as Google, Apple, and Facebook. Ex. 8, Pl.’s Aviad Decl. (Declassified
Declaration of Frances J. Fleisch, NSA (“NSA’s Fleisch Decl.”), at ¶ 38,
Jewel v. Nat’l Sec.
*10
Agency
, No. 08-CV-04373 (N.D. Cal. May 5, 2014), ECF No. 227); Ex. 12, Pl.’s Aviad Decl.
(Glenn Greenwald & Ewan MacAskill,
NSA Prism Program Taps into User Data of Apple,
Google, and Others
, The Guardian, June 7, 2013). In the separate “upstream collection”
program, “the NSA collects electronic communications with the compelled assistance of
electronic communication service providers as they transit Internet ‘backbone’ facilities within
the United States.” NSA’s Fleisch Decl. ¶ 38;
see
[Redacted] Mem. Op.,
II. LEGAL STANDARD
Congress enacted the FOIA as a means “to open agency action to the light of public
scrutiny.”
Am. Civil Liberties Union v. U.S. Dep’t of Justice
,
The agency invoking an exemption to the FOIA “bears the burden of showing that a
claimed exemption applies.”
Elec. Frontier Found. v. U.S. Dep’t of Justice
,
The FOIA provides federal courts with the power to “enjoin the agency from withholding
agency records and to order the production of any agency records improperly withheld from the
complainant.” 5 U.S.C. § 552(a)(4)(B). Moreover, a district court has an “affirmative duty” to
consider whether the agency has produced all segregable, non-exempt information.
Elliott v.
U.S. Dep’t of Agric.
,
Summary judgment is appropriate when “there is no genuine dispute as to any material
fact.” Fed. R. Civ. P. 56. “In FOIA cases, ‘[s]ummary judgment may be granted on the basis of
agency affidavits if they contain reasonable specificity of detail rather than merely conclusory
statements, and if they are not called into question by contradictory evidence in the record or by
evidence of agency bad faith.’”
Judicial Watch, Inc. v. U.S. Secret Serv
.,
III. DISCUSSION
In the present case, “to the extent [the] plaintiff’s [FOIA] request sought surveillance or other intelligence records, or communications about such records,” the NSA issued the plaintiff a so-called “Glomar” response, which neither confirmed nor denied the existence of records relevant to the plaintiff’s request. [4] Mem. Supp. Def.’s Mot. Summ. J. (“Def.’s Mem.”). at 1, ECF No. 18-1. The Glomar response covered all documents sought by the plaintiff, except for those documents “concerning the government contracts and criminal and civil lawsuits specified by and involving plaintiff, or communications concerning those contracts and court cases.” [5] With respect to the plaintiff’s request for documents concerning lawsuits and contracts, the NSA searched for but found no responsive documents. The plaintiff challenges both the NSA’s Glomar response and the adequacy of the NSA’s search for responsive documents. Each of those challenges is addressed separately below.
A. The NSA’s Glomar Response
A Glomar response is “an exception to the general rule that agencies must acknowledge
the existence of information responsive to a FOIA request and provide specific, non-conclusory
justifications for withholding that information.”
Roth v. U.S. Dep’t of Justice
,
A Glomar response may be challenged in two distinct but related ways. A plaintiff may
challenge the agency’s assertion that confirming or denying the existence of any records would
result in a cognizable harm under a FOIA exemption.
See, e.g., People for the Ethical Treatment
of Animals v. Nat’l Institutes of Health
,
The plaintiff asserts both bases to overcome the NSA’s Glomar response. See Pl.’s Mem. at 27 (“Even if the Court were to find that the information that [the plaintiff] seeks is properly protected under the exemptions (which it is not), . . . the NSA’s official acknowledgements over the last 18 months regarding its bulk collection programs . . . override even valid exemption claims.”). The Court first addresses the propriety of the NSA’s invocation of Exemptions 1 and 3 for its Glomar response before turning to the plaintiff’s argument that the NSA has officially acknowledged the requested records.
1. The NSA Properly Invoked Exemptions 1 and 3. The NSA grounds its Glomar response in Exemptions 1 and 3 of the FOIA statute. Def.’s Mem. at 9. Although the plaintiff expressly challenges the propriety of the NSA’s *16 invocation of Exemptions 1 and 3 for purposes of its Glomar response, the plaintiff devotes only two brief paragraphs of the more than 55 pages of briefing to this argument, and for good reason.
“In reviewing an agency’s
Glomar
response, this Court exercises caution when the
information requested ‘implicat[es] national security, a uniquely executive purview.’”
EPIC/NSA
,
Exemption 1 protects from disclosure records that are “(A) specifically authorized under
criteria established by an Executive order to be kept secret in the interest of national defense or
foreign policy, and (B) are in fact properly classified pursuant to such an Executive order.” 5
U.S.C. § 552(b)(1);
see Milner v. U.S. Dep’t of Navy
,
In this case, the NSA has sufficiently established that the existence or non-existence of responsive records is classified under Executive Order (“E.O.”) 13,526. This E.O. sets forth four requirements for the classification of national security information: (1) an original classification authority must classify the information; (2) the U.S. Government must own, produce, or control the information; (3) the information must be within at least one of eight protected categories enumerated in section 1.4 of the E.O.; and (4) the original classification authority must determine that the unauthorized disclosure of the information reasonably could be expected to result in a specified level of damage to the national security, and the classification authority is able to identify or describe the damage. E.O. 13526 § 1.1(a).
The NSA avers that “[a]cknowledgement of the existence or non-existence of intelligence information referencing Plaintiff would reveal information that is currently and properly classified as set forth in Section 1.4(c) of E.O 13,526,” which covers “intelligence sources [or] methods.” NSA Sherman Decl. ¶ 31. Specifically, “[a]cknowledging the existence or non- existence of responsive records on particular individuals or organizations subject to surveillance *18 would provide . . . adversaries with critical information about the capabilities and limitations of the NSA . . . .” NSA’s Sherman Decl. ¶ 33. As set forth in the NSA’s declaration, “[c]onfirmation by NSA that a specific person’s or organization’s activities are not of foreign intelligence interest or that NSA is unsuccessful in collecting foreign intelligence information on their activities” would undermine the NSA’s mission and permit adversaries to “accumulate information and draw conclusions about NSA’s technical capabilities, sources, and methods.” Id. Such information would permit adversaries to change their communications behavior or otherwise “alert targets that their existing means of communications are potentially safe.” Id. ¶ 34. As a result, disclosure “could reasonably be expected to cause exceptionally grave and irreparable damage to the national security by providing . . . adversaries a road map that instructions them on which communication modes or personnel remain safe or are successfully defeating NSA’s capabilities.” Id.
The plaintiff challenges whether the acknowledgment of the existence or non-existence of the requested records would implicate intelligence sources and methods and would otherwise cause national harm. According to the plaintiff, “the bulk data collection programs under which the NSA obtained the information [the plaintiff] seeks sweep up not just the communications data of individuals that the NSA has specifically targeted, but rather, the data of millions of people whose communications cross the United States border, whether those people are targets of the NSA or not.” [6] Pl.’s Mem. at 27. As a result, “the mere fact that the NSA possesses information regarding [the plaintiff’s] communications would not reveal anything about [the plaintiff’s] status as a target, thus keeping the NSA’s ‘intelligence sources and methods’ intact.” In other words, because the NSA collects everything, disclosure would reveal nothing.
A variant of the plaintiff’s argument was considered and rejected in
Competitive
Enterprise Institute v. National Security Agency
,
The NSA’s invocation of Exemption 3 is likewise proper. The NSA invokes a
recognized withholding statute, Section 102A(i)(1) of the National Security Act of 1947, in
*20
support of its Glomar response.
See ACLU/DOD
,
2. The NSA Officially Acknowledged a Limited Subset of Records. The central dispute between the parties concerns whether the NSA has previously acknowledged the existence of the records requested by the plaintiff, thereby waiving its right to claim an exemption regarding the existence vel non of any responsive records. The plaintiff claims that the NSA has made “multiple official disclosures that it collects a broad and voluminous scope of the telephone and electronic communications data of Americans through a series of programs with the compelled assistance of some of the largest U.S. telecommunications and internet service providers.” Pl.’s Mem. at 20. In light of these disclosures, the plaintiff argues that the NSA has waived its right to issue a Glomar response to the plaintiff’s FOIA *21 request, which encompassed “all email, letter, telephonic, or other communications” by the plaintiff. Id. at 18–28.
The D.C. Circuit has recognized that if “the agency has officially acknowledged the
existence of [a] record, the agency can no longer use a Glomar response, and instead must either:
(1) disclose the record to the requester or (2) establish that its contents are exempt from
disclosure and that such exemption has not been waived.”
Moore
,
An agency’s official acknowledgment must meet three criteria: First, the information requested must be as specific as the information previously released. Second, the information requested must match the information previously disclosed . . . . Third, . . . the information requested must already have been made public through an official and documented disclosure.
Fitzgibbon,
In the present case, the plaintiff points to the NSA’s public acknowledgements regarding its various bulk data collection programs—the telephony metadata program, the PR/TT program, the PRISM program, and the upstream collection program—to argue that the NSA has waived its right to issue a Glomar response. As explained below, the Court finds that the NSA has officially acknowledged the collection of certain telephony metadata from Verizon Business Network Services from April 25, 2013 through July 19, 2013, but has not otherwise officially acknowledged its possession of any other records sought by the plaintiff.
a) Telephony Metadata Program The plaintiff has compiled multiple documents concerning the NSA’s telephony metadata program, of which the NSA has acknowledged two publically released FISC orders detailing the program. Specifically, the plaintiff notes that the publically acknowledged FISC Secondary Order directed Verizon Business Network Services to provide to the NSA “on an ongoing daily basis . . . all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.” Secondary Order at 2. The Secondary Order was limited to a 90-day period between April 25, 2013 and July 19, 2013, and included the originating and terminating *23 telephone number along with the time and duration of the call. The plaintiff further contends that the NSA has conceded in public disclosures that the program has been in existence since at least May 2006 and that the NSA has admitted that as of January 3, 2014, “at least 15 different FISC judges have entered a total of 36 orders authorizing NSA’s bulk collection of telephony metadata.” Reply Supp. Pl.’s Cross Mot. Summ. J. (“Pl.’s Reply”) at 9, ECF No. 26 (citing NSA’s Shea Decl. ¶¶ 13-14). Taken together, the plaintiff argues that it communicated regularly with its legal counsel, a Verizon Business Network Services subscriber, and therefore, “based on the NSA’s own admissions, some of [the plaintiff’s] privileged communications with its counsel were almost certainly collected.” [9] Pl.’s Reply at 9. Moreover, while the Secondary Order was limited to the period between April 25, 2013 and July 19, 2013, the plaintiff argues that the NSA “has made sufficient public acknowledgements of the recurring, ever-renewing nature of these orders that the existence of prior or subsequent orders is virtually certain.” [10] Pl.’s Reply at 9. Thus, the plaintiff argues, at a minimum, the NSA has acknowledged the existence of records relating to its communications sent through Verizon Business Network Services between April 25, 2013 and July 19, 2013, and, at a maximum, has acknowledged the existence of records *24 relating to communications sent through Verizon Business Network Services and other providers since at least May 2006. See Pl.’s Reply at 9.
As noted previously, another decision in this District considered the propriety of an NSA
Glomar response in light of the NSA’s public statements regarding the bulk collection of
telephony metadata. In
Competitive Enterprise Institute
, the plaintiff cited many of the same
documents relied upon by the plaintiff in the present case: public statements by agency officials;
an administration white paper; declarations of agency officials; newspaper reports; court
opinions; and the Primary and Secondary Orders.
See
With respect to other telephone service providers and other periods of time, the plaintiff
has not pointed to any disclosures documenting the specific telephone service providers that
participated in the program and during what periods of time. Such imprecision will not suffice to
overcome the NSA’s Glomar response. The D.C. Circuit has expressly directed courts to apply
the “official acknowledgement” exception “strictly,” such that the “official acknowledgement”
only extends to the
specific
records that are acknowledged by the agency.
See Moore
, 666 F.3d
at 1333;
Wolf
,
Rather than pinpoint specific acknowledged disclosures, the plaintiff instead makes a
series of logical deductions based on the nature of the telephony metadata program and general
media speculation regarding the scope of the program to claim that the NSA has acknowledged
other participants in the telephony metadata program. Pl.’s Mem. at 7 (discussing
implication of “Federal Communications Commission (FCC) report” discussing AT&T, Verizon,
and Sprint as the nation’s “three largest international telephone call providers”),
id.
at 8 n.6
*26
(“[T]he NSA’s draft report strongly suggests that AT&T and Verizon have assisted the NSA in
collecting both telephonic and email communications in the past);
id.
at 22–25. Logical
deductions may not substitute for official acknowledgements, however.
See Valfells v. CIA
, 717
F. Supp. 2d 110, 117 (D.D.C. 2010) (“Logical deductions are not, however, official
acknowledgments.”),
aff’d sub nom. Moore v. CIA
,
The plaintiff’s further reliance on
ACLU v. CIA
,
The plaintiff has been unable to pinpoint an official acknowledgment by the NSA of the
specific records sought by the plaintiff beyond those records encompassed by the Secondary
Order and relating to Verizon Business Network Services.
Moore
,
b) Other Electronic Communications
Although the plaintiff compiled a robust record detailing the public disclosures of the
NSA’s telephony metadata program, the plaintiff has made no such showing regarding any of the
other electronic communications programs—the PR/TT program, the PRISM program, and the
*28
upstream collection program.
[12]
Indeed, to the contrary, the plaintiff
concedes
that the NSA has
not acknowledged a service provider with respect to the bulk collection of electronic
communications.
See
Pl.’s Mem. at 24 (conceding that the NSA “has not specifically named any
telecommunications or Internet service providers participating in its bulk electronic
communications collections programs.”). Nonetheless, the plaintiff claims that other official
acknowledgements are sufficient to override the NSA’s Glomar response because the NSA has
acknowledged “the broad scope of electronic communications collected through its programs.”
at 25. Yet, for the reasons stated above, speculation by the plaintiff regarding the scope of the
programs at issue will not suffice to overcome the NSA’s Glomar response.
See Competitive
Enter. Inst.
,
B. Improper Withholding
Although the NSA’s Glomar response was improper with respect to certain Verizon Business Network Services documents, this finding does not end the inquiry into the NSA’s FOIA response. The NSA makes the alternative argument that even if its Glomar response was improper as to the limited set of documents relating to Verizon Business Network Services, the terms of the Primary Order and Secondary Order do not permit the NSA to disclose any records to the plaintiff. See Mem. Further Supp. Def.’s Mot. Summ. J. (“Def.’s Reply”) at 13–15, ECF No. 23.
FOIA confers jurisdiction on the district court to compel an agency to release requested
records only if those records are “improperly withheld.”
Morgan
,
Ultimately, “the proper test for determining whether an agency improperly withholds
records [subject to a court order] is whether the [order], like an injunction,
prohibits
the agency
from disclosing the records.”
Morgan
,
The agency may satisfy its burden under
Morgan
by referring to (1) the order itself; (2)
extrinsic evidence, such as papers filed with the court that provide the rationale for the sealing;
(3) orders of the same court in similar cases that explain the purpose of the order; or (4) the
court’s general rules of procedures governing the order.
Morgan
,
The text of the Primary Order makes plain the NSA’s lack of discretion to access and disclose to the plaintiff the requested metadata. Indeed, the Primary Order permits the agency to access metadata records only in certain defined circumstances. Specifically, the Primary Order *31 “prohibit[s]” the government “from accessing business record metadata acquired pursuant to this Court’s orders in the above-captioned docket and its predecessors . . . for any purpose except as described herein .” Primary Order at 2 (emphasis added). The Primary Order designates two purposes. First, certain authorized technical personnel “may access the . . . metadata for purposes of obtaining foreign intelligence information.” Id. Second, “technical personnel may access the . . . metadata to perform those processes needed to make it usable for intelligence analysis.” Neither scenario affords the NSA the discretion to access the metadata for purposes of complying with the plaintiff’s FOIA request.
Although the Primary Order does not make specific reference to FOIA, the Primary Order is clear that the metadata may not be accessed “for any purpose except as” permitted by the Primary Order. Given the context of the Primary Order, the broad language regarding “ any purpose” is sufficient to encompass FOIA. Such strict limitations regarding access to the collected metadata make abundant sense. In permitting the NSA to collect large amounts of personal information regarding U.S. citizens, the FISC was careful to put limitations on its access and use. The metadata may be accessed only for certain limited purposes (foreign intelligence) and only in certain limited ways (using specially approved searches). To permit FOIA plaintiffs (and thereby the public at large) access to all of the collected metadata would be to undermine the careful architecture erected by the FISC and enshrined in the Primary Order.
Likewise, the Primary Order restricts the subsequent dissemination of metadata information. Before the NSA may disseminate information pertaining to any U.S. person, certain high-level officials “must determine that the information identifying the U.S. person is in fact related to counterterrorism information and that it is necessary to understand the counterterrorism information or assess its importance.” Primary Order at 3. To be sure, the *32 Primary Order does contemplate disclosure of the accessed metadata beyond the NSA in certain limited scenarios, including disclosure to the Executive Branch in order to (1) “enable them to determine whether the information contains exculpatory or impeachment information or is otherwise discoverable in legal proceedings” and (2) “facilitate their lawful oversight functions.” While such language might ordinarily weigh against the NSA in the Morgan analysis, the Primary Order’s relative flexibility on disclosure is of less importance in the present case. As discussed, the NSA is forbidden under the terms of the Primary Order from accessing the collected telephony metadata in order to respond to the plaintiff’s FOIA request. In other words, the only responsive telephony metadata records that the Primary Order might permit the NSA to disseminate concern telephony metadata records previously accessed as a result of an authorized search as part of an ongoing investigation. Consequently, the NSA “would only have communications in its searchable intelligence files of entities that are related to foreign intelligence investigations” because those were the only searches that would have been previously authorized under the Primary Order. Def.’s Reply at 9. Yet the existence or non- existence of such records as they relate to the plaintiff has never been acknowledged by the NSA. The records are therefore properly covered by the NSA’s Glomar response and no disclosure is required.
Both the limitations upon the Court’s holding and the peculiar circumstances of this case require highlighting. The instant case presents multiple competing interests all of significant public concern: personal privacy; national security; and transparency in government, along with the related concern of ensuring agency accountability. Under the plaintiff’s theory on the applicability of the FOIA in this case, the telephony metadata records (and any email communications) held in databases by the NSA could potentially be searched and accessed by *33 any person through the timely submission of a FOIA request. [13] Fortunately, the FISC orders at issue carefully balanced the competing interests: The materials obtained pursuant to the telephony metadata program may be accessed only in the most limited fashion, and not for purposes of the FOIA. Given the plain language in the Primary Order and the general context of the telephony metadata program, the Court will not require the NSA to seek clarification from the FISC regarding whether the Primary Order contemplates prohibiting disclosure under the FOIA. Rather, as the Primary Order makes clear, the NSA is not permitted to access the requested materials for purposes of complying with a FOIA request. As a result, the NSA’s failure to comply with the plaintiff’s request was not “improper” and the NSA will not be required to disclose the requested documents to the plaintiff.
C. Defendant’s Search
As noted, the NSA did not issue a Glomar response as to the entirety of the plaintiff’s FOIA request. Rather, the NSA conducted a search for documents relating to the non- intelligence records sought by the plaintiff, i.e. , the plaintiff’s request for documents relating to its business contracts and pending civil and criminal cases. The NSA’s search yielded no results and the plaintiff correspondingly challenges the adequacy of the NSA’s search for responsive records.
“The court applies a reasonableness test to determine the adequacy of a search
methodology.”
Morley
,
Agency affidavits should identify the terms search and explain how the search was
conducted.
See Morley
,
The NSA presents two affidavits from the NSA’s Associate Director for Policy and Records in support of its search for records in the present case. The NSA tasked “its Office of *35 General Counsel, its acquisition organization, and its logistics organization” to conduct the relevant searches. NSA’s Sherman Decl. ¶ 27. These organizations were chosen as they were deemed to be the organizations “that would possess records responsive to the Plaintiff’s FOIA request, if any such records existed,” as only those organizations maintained contract and litigation-related records. Id. The NSA determined that “[n]o other non-intelligence organization within the NSA would have such records” and that “if any non-intelligence related information response to the Plaintiff’s FOIA request existed at the NSA, it would have been located by these three organizations in their respective filing system based on the search methodology” employed. NSA’s Suppl. Sherman Decl. ¶¶ 2, 4. The NSA queried the records of the relevant organizations using three variants of the plaintiff’s name and the numbers for the relevant contract. The records databases contained memoranda, meeting minutes, reports, manuals, and other documents. NSA’s Sherman Decl. ¶ 27. Within the Office of General Counsel, attorneys also searched their Microsoft Outlook email accounts while administrative personnel and paralegals searched the organization’s litigation filings systems. The NSA also searched the “contracting management information system database,” which is maintained in support of the NSA’s contracting activity. Id. No responsive records were found as a result of any of these searches.
The plaintiff objects to the adequacy of the NSA’s search, challenging both the scope of the search and the search terms employed. Neither objection withstands scrutiny. First, the plaintiff attacks the NSA’s decision to limit its search of records to those contained in the Office of General Counsel, the acquisitions organization, and the logistics organization. The plaintiff argues that “[b]ecause those organizations only handle matters on behalf of the NSA, there was no reason for them to possess documents regarding contracts and lawsuits that did not involve *36 the Agency.” Pl.’s Mem. at 30. The plaintiff misconstrues the nature of the NSA’s search. The NSA searched these organizations because “[n]o other non-intelligence organization within the NSA would have [contract or litigation related records] because these other organizations would only have records of individuals and organizations . . . that have some affiliation with the NSA.” NSA’s Suppl. Sherman Decl. ¶ 2 (emphasis added). The fact that these organizations were unlikely to maintain the requested contracting and litigation records reflects not on the NSA’s choice of organizations to search but on the nature of the plaintiff’s FOIA request: the plaintiff sought records concerning a company with which the NSA neither engaged in contracts nor contract litigation.
Second, the plaintiff attacks the use of search terms employed by the NSA. The NSA used three variations of the plaintiff’s name and the contract numbers for its search. [14] The plaintiff posits that the NSA should have used alternative search terms to yield responsive documents. Specifically the plaintiff suggests that the NSA should have included “PWC” as a search term, along with the legal case numbers for the relevant litigation. Pl.’s Reply at 16–17. Although the parties did agree regarding the scope of one of the plaintiff’s requested categories of information, the parties did not discuss, and the plaintiff did not suggest, the use of any specific search terms. See NSA’s Sherman Decl. ¶ 19.
“In general, the adequacy of a search is ‘determined not by the fruits of the search, but by
the appropriateness of [its] methods.’”
Hodge v. FBI
,
The plaintiff’s insistence on its own preferred search terms does not undermine the reasonableness of the NSA’s search terms. Moreover, the plaintiff’s terms are not without their own criticism. Indeed, the plaintiff proffers no explanation for how the inclusion of legal case numbers would be likely to yield responsive documents when the NSA already searched by the plaintiff’s name. Moreover, while the NSA could have also used an abbreviation of the plaintiff’s name as a search term, an abbreviation in a record typically follows after the full name is used, and the search terms used employed both full and shortened versions of the plaintiff’s name. In short, the plaintiff offers only speculation as to the results of an alternative search, but speculation as to the potential results of a different search does not necessarily undermine the adequacy of the agency’s actual search. Although the NSA could have used additional variations of the plaintiff’s name or the legal case numbers, the NSA’s search terms were reasonably calculated to lead to responsive documents.
Through two declarations by the NSA’s Associate Director for Policy and Records, the NSA identified the records systems searched, the rationale for searching those records systems, the search terms employed, and averred that all files likely to contain responsive materials were searched. The plaintiff has presented no grounds for upsetting the presumption of regularity afforded to these declarations, and the Court finds that the declarations are reasonably detailed and the NSA’s search was reasonably calculated to lead to responsive documents. [15]
IV. CONCLUSION
For the foregoing reasons, the NSA’s Motion for Summary Judgment is granted and the plaintiff’s Cross-Motion for Summary Judgment or, in the Alternative, for Limited Discovery is denied. An appropriate Order accompanies this Memorandum Opinion.
Date: July 10, 2015
__________________________ BERYL A. HOWELL United States District Judge
Notes
[1] The civil case has been administratively closed pending an order from the Kuwaiti High Court of Appeals regarding whether the plaintiff was properly served as a defendant in that case. See Public Warehousing Company , No. 1:05-CV-2968 (N.D. Ga. 2005).
[2] The plaintiff has not specified whether Verizon Business Network Services provided both telephonic and internet services, only that it was a customer. Pl.’s Aviad Suppl. Decl ¶ 2.
[3] Telephony metadata also includes other “session-identifying information,” such as the “International Mobile Subscriber Identity (IMSI) number, International Mobile station Equipment Identity (IMEI) number . . . trunk identifier, [and] telephone calling card numbers . . . .” Secondary Order at 2.
[4] Glomar responses are “named for the Hughes Glomar Explorer, a ship used in a classified Central Intelligence
Agency project ‘to raise a sunken Soviet submarine from the floor of the Pacific Ocean to recover the missiles,
codes, and communications equipment onboard for analysis by United States military and intelligence experts.’”
Roth v. U.S. Dep’t of Justice
,
[5] As noted above, such materials refer primarily to categories 3 and 4 of the plaintiff’s request, which sought documents relating to two contracts between the plaintiff and Defense Supply Center Philadelphia and documents relating to the two lawsuits brought against the plaintiff in the Northern District of Georgia. Compl. ¶ 11.
[6] The plaintiff does not challenge that the materials were classified by an individual with classification authority or that the NSA controls the materials. Pl.’s Mem. at 26–27.
[7] The NSA also relies on two additional statutory provisions as support for withholding under Exemption 3: (1)
Section 6 of the National Security Act of 1959 (codified at 50 U.S.C. § 3605), which provides that “[n]othing in this
Act or any other law . . . shall be construed to require the disclosure of the organization or any function of the
National Security Agency, or any information with respect to the activities thereof . . .”; and (2) a criminal statute,
18 U.S.C. § 798, which prohibits a person from knowingly and willfully disclosing “any classified information . . .
concerning the communication intelligence activities of the United States . . . or . . . obtained by the processes of
communication intelligence from the communications of any foreign government, knowing the same to have been
obtained by such processes.” Both statutes qualify as Exemption 3 statutes.
See Larson
,
[8] Nor may a statement by an anonymous agency insider be deemed an “official acknowledgement” because an
anonymous leak is presumptively an unofficial and unsanctioned act.
See ACLU/DOD
,
[9] Throughout its briefing the plaintiff makes much of the fact that the NSA may have intercepted privileged
communications between the plaintiff and its counsel. Regardless of the propriety of such interceptions, FOIA is not
the appropriate vehicle to vindicate discovery abuses or otherwise conduct discovery.
Williams & Connolly v.
SEC
,
[10] To showcase the potential breadth of the captured information, the plaintiff points to a draft NSA Inspector General Report from 2009, which indicates that the NSA “could gain access to approximately 81% of the international calls into and out of the United States through three corporate partners: COMPANY A had access to 39%, COMPANY B 28%, and COMPANY C 14%.” Pl.’s Mem. at 7. Although the draft report does not identify the three companies, the plaintiff notes that, as of 1999, MCI/Worldcom (now Verizon) was one of the three largest telecommunications providers. See id. (citing Common Carrier Bureau, FCC, 1999 International Telecommunications Data (Dec. 2000)).
[11] Although the Secondary Order reflects only that the government sought such records from Verizon Business Network Services, the NSA has subsequently confirmed in public declarations that Verizon Business Network Services produced records and participated in the program. NSA’s Fleish Decl. ¶ 71 (“[T]he United States has not confirmed or denied the past or current participation of any specific provider in the telephony metadata program apart from the participation of VBNS for the approximately 90 day duration of the now-expired April 25, 2013 FISC Order.”).
[12] To the extent the NSA has made any acknowledgment regarding the records obtained during the course of the PR/TT program, the NSA has stated that all records obtained through the program have been destroyed. NSA Fleisch Decl. ¶ 76 n.32 (“On December 7, 2011, the NSA completed the destruction of all PR/TT metadata collected under the authorization of the FISC from the agency’s repositories.”).
[13] The plaintiff’s theory also would raise the analytically “fraught” issue of when the querying of a database constitutes the creation of a new record not subject to FOIA. See Nat’l Sec. Counselors v. C.I.A ., 960 F. Supp. 2d 101, 160 n.28 (D.D.C. 2013). This issue was not formally framed by the parties and does not require resolution here.
[14] The plaintiff argues that the NSA failed to identify its search terms because it did not use quotation marks to designate the search terms identified in its declaration. Pl.’s Reply at 15. The Court declines the plaintiff’s invitation to impose a quotation marks requirement on the NSA as context reveals the terms in question to be the search terms employed by the NSA.
[15] Since the Court finds that both the declarations and the search itself were adequate, the plaintiff’s alternative request for limited discovery regarding the NSA’s search, see Pl.’s Mem. at 33, is denied.
