FISA also establishes rules governing the use of information obtained through electronic surveillance. See
shall, notwithstanding any other law, if the Attorney General files an affidavit under oath that disclosure ... would harm the national security of the United States, review in camera and ex parte the application, order, and such other materials relating to the surveillance as may be necessary...."
On the basis of its ex parte and in camera review of the materials at issue, the court must determine "whether the surveillance of the aggrieved person was lawfully authorized and conducted."
In addition to mandating specific procedures governing the use of information obtained through electronic surveillance, FISA establishes additional checks on the Executive's use of electronic surveillance. Two such checks come by way of criminal sanctions and a civil cause of action. Specifically, FISA imposes criminal penalties on any person who intentionally "engages in electronic surveillance under color of law except as authorized by [FISA]" or "discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by [FISA.]"
In 2008, thirty years after FISA's enactment, Congress passed the FISA Amendments Act ("FAA"), which establishes additional procedures and requirements for the authorization of surveillance targeting persons located outside the United States. See 50 U.S.C. § 1881a -g. Specifically,
(i) to ensure that acquisition "is limited to targeting persons reasonably believed to be located outside the United States,"id. § 1881 a(i)(2)(B)(i);
(ii) to prevent the intentional acquisition of wholly domestic communications,id. § 1881a(i)(2)(B)(ii) ;
(iii) to "minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign-intelligence information,"id. § 1801(h)(1); seeid. § 1881a(i)(2)(C); and
(iv) to ensure that the procedures "are consistent with ... the [F]ourth [A]mendment,"id. § 1881a(i)(3)(A).
Unlike FISA, these FAA procedures do not require thе FISC to determine that probable cause exists to believe that the target of electronic surveillance is a foreign power and that each of the facilities at which electronic surveillance is directed is being used or is about to be used by a foreign power.
The recent release of public reports and declassification of FISC opinions have revealed additional details regarding the collection of communications under § 702. For example, the government has disclosed that it conducts § 702 surveillance through two programs-PRISM and Upstream surveillance. See Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act 7 (2014) ("PCLOB Report"). The program at issue here, Upstream surveillance, involves collection of communications of persons reasonably believed to be outside of the United States "with the compelled assistance ... of the providers that control the telecommunicatiоns backbone over which [telephone and Internet] communications transit."Id. at 35. In this respect, "[t]he government 'tasks' certain 'selectors,' such as telephone numbers or email addresses, that are associated with targeted persons, and it sends these selectors to electronic communications service providers to begin acquisition."
II.
With this statutory framework in mind, it is appropriate to turn to the facts and procedural history in this case. Plaintiff Wikimedia Foundation, a non-profit organization based in San Francisco, California, operates several "wiki"-based projects and provides the contents of those projects to individuals around the world free of charge. Defendant National Security
On June 22, 2015, plaintiff, along with eight other organizations,
On August 6, 2015, defendants filed a Motion to Dismiss pursuant to Rule 12(b)(1), Fed. R. Civ. P., arguing that none of the plaintiff organizations plausibly alleged that they were injured by the interception, copying and review of online communications via the Upstream surveillance program and thus plaintiffs lacked Article III standing to contest the legality of the program. Subsequently, on October 23, 2015, an Order and a Memorandum Opinion issued, concluding that the allegations in the Amended Complaint were too speculative to establish Article III standing and granting defendants' motion to dismiss as to all plaintiffs. See Wikimedia Found., et al., v. Nat'l Sec. Agency ,
Shortly after the Fourth Circuit remanded the case to the district court for further proceedings, the parties submitted briefs on how to proceed in the case. Defendants indicated their intent to continue to challenge plaintiff's Article III standing and argued that any discovery should be bifurcated to allow for resolution of the standing question prior to resolution of the merits. Plaintiff opposed defendants' proposed discovery plan, contending that the jurisdictional facts at issue here are so intertwined with the merits as to require simultaneous discovery and summary
The parties then proceeded to engage in the limited discovery as directed. Plaintiff served 84 requests for admission, interrogatories, and requests for productiоn on defendants, seeking what plaintiff describes as three broad categories of information: (i) direct evidence that Wikimedia has been surveilled, (ii) definition of key terms used in describing Upstream surveillance to the public, and (iii) evidence concerning the scope and breadth of Upstream surveillance.
Subsequently, on March 26, 2018, plaintiff filed the Motion to Compel at issue here pursuant to Rule 37(a)(3), Fed. R. Civ. P. Plaintiff contends that where, as here, a party moves to discover material relating to electronic surveillance, the court must follow FISA's § 1806(f) procedures and conduct an ex parte and in camera review of the materials relating to electronic surveillance. Plaintiff argues that these procedures apply despite defendants' assertion of state secrets privilege because in enacting FISA, Congress intended to displace the common law state secrets privilege. And even assuming the state secrets privilege was not displaced by FISA, plaintiff argues that the privilege does not bar disclosure of the information at issue hеre given the amount of information concerning Upstream surveillance already in the public record.
Defendants oppose plaintiff's motion, arguing (i) that § 1806(f) does not apply where, as here, plaintiff has not yet established that it is the target of electronic surveillance and (ii) that even assuming § 1806(f) does apply here, there is no clear statement indicating Congress's intent to displace the common law state secrets privilege through enactment of FISA. Finally, defendants contend that the government's assessment of the national security risks associated with disclosure of the information concerning plaintiff's discovery requests is entitled to deference and that plaintiff's arguments to the contrary are baseless.
III.
A threshold question that must be addressed is whether the ex parte and in camera review procedures established in § 1806(f) apply where, as here, a plaintiff is seeking classified discovery to establish that the plaintiff's communications were
Whenever a court or other authority is notified pursuant to subsection (c) or (d) of this section, or whenever a motion is made pursuant to subsection (e) of this section, or whenever any motion or request is made by an aggrieved person pursuant to any other statute or rule of the United States ... to discover or obtain applications or orders or other materials relating to electronic surveillance ... the United States district court ... shall, notwithstanding any other law, if the Attorney General files an affidavit under oath that disclosure or an adversary hearing would harm the national security of the United States, review in camera and ex parte the application, order, and such other materials relating to the surveillance as may be necessary to determine whether the surveillance of the aggrieved person was lawfully authorized and conducted. In making this determination, the court may disclose to the aggrieved person, under appropriate security procedures and protective orders, portions of the application, order, or other materials relating to the surveillance only where such disclosure is necessary to make an accurate determination of the legality of the surveillance.
This statutory text points persuasively to the conclusion that § 1806(f) procedures do not apply where, as here, a plaintiff has not yet established that it has been the subject of electronic surveillance. Specifically, the text of § 1806(f) identifies only three circumstances in which its procedures apply: (i) when the government notifies the court that it plans to introduce evidence obtained through electronic surveillance, (ii) when an aggrieved person moves to suppress information obtained through electronic surveillance, and (iii) when an aggrieved person makes "any motion or request ... pursuant to any other statute or rule of the United States ... to discover or obtain ... materials relating to electronic surveillance."
This interpretation of the text is confirmed by the nature of § 1806(f)'s procedures once invoked. Specifically,
Had Congress instead intended § 1806(f) to be a vehicle for parties to determine whether they were the target of electronic surveillance, one would expect to see language requiring courts to review materials relating to electronic surveillance to determine whether "electronic surveillance occurred," or requiring the government to affirm or deny the existence of any surveillance. Indeed, Congress has used precisely this language elsewhere in the U.S. Code. Specifically
Consideration of the other circumstances in which § 1806(f) procedures apply further bolsters the conclusion reached here. It is axiomatic that where, as here, "general words follow specific words in a statutory enumeration, the general words are usually construed to embrace only objects similar in naturе to those objects enumerated by the preceding specific words." Yates v. United States , --- U.S. ----,
The statutory provision at issue here- § 1806(f) -is structured in precisely the same way as the provision at issue in Begay . Specifically, like the provision at issue in Bergay , § 1806(f) enumerates two specific situations covered by its procedures-namely, when the government provides notice pursuant to § 1806(c) - (d) and when a person against whom evidence is to be introduсed moves to suppress that evidence pursuant to § 1806(e) -followed by a broadly-worded more general provision that also triggers § 1806(f) -namely, "whenever any motion or request is made by an aggrieved person pursuant to any other statute or rule of the United States ... to discover or obtain applications or orders or other materials relating to electronic surveillance...."
Support for the conclusion reached here is found not solely in the text of § 1806(f) itself, but also in the caption of § 1806 and the general structure of the provision. Although "headings are not commanding," the Supreme Court has recognized that headings can "supply cues" that Congress did not intend a particular meaning of the statute. Yates v. United States , --- U.S. ----,
Finally, as the Supreme Court has recognized, "[i]t is axiomatic that statutes in derogation of the common law should be narrowly cоnstrued[.]" Badaracco v. C.I.R. ,
In an attempt to avoid this conclusion, plaintiff contends that the allegations contained in the complaint are sufficient to establish that plaintiff is an "aggrieved person" within the meaning of § 1806(f). Specifically, defendant cites to the Fourth Circuit's determination that plaintiff's complaint alleges sufficient facts "to make plausible the conclusion that the NSA is intercepting, copying, and reviewing at least some of [plaintiff's] communications" and contends that this plausibility determination is sufficient standing alone to require invocation of § 1806(f)'s procedures. Wikimedia Found., et al. ,
Notably, the only circuit authority to cоnsider this latter question-what a party must show to establish his or her "aggrieved person" status and invoke § 1806(f) -recognized that a party may not trigger § 1806(f) procedures unless and until the party has adduced evidence of its "aggrieved person" status. Specifically, in ACLU Foundation of Southern California v. Barr ,
even plaintiffs who defeat summary judgment motions would not be entitled to obtain any of the materials relating to the authorization of the surveillance or the evidence derived from it unless the district court, in an ex parte, in cameraproceeding, first determined that the surveillance was not "lawfully authorized and conducted."
Plaintiff next argues that to require a plaintiff to adduce evidence of surveillance to demonstrate his or her "aggrieved person" status would necessarily mean that a рlaintiff could not do so unless the government affirmatively acknowledges the fact of surveillance. And to require the government affirmatively to acknowledge the fact of surveillance prior to invocation of § 1806(f) procedures, plaintiffs contend, would be inconsistent with other provisions in the statute, namely the civil cause of action established in § 1810.
This argument fails to persuade because it mischaracterizes both (i) the requirements for establishing "aggrieved person" status and (ii) the nature of the civil remedy established in § 1810. To begin with, affirmative government acknowledgement of surveillance of a specific target is not the only means by which a plaintiff can establish evidence of his or her "aggrieved person" status. Indeed, courts have recognized that plaintiffs can "rely on many non-classified materials, including present and future public disclosures of the government or [telecommunications providers] on the alleged NSA programs" to establish that they have been the target of eleсtronic surveillance. Hepting v. AT&T Corp., et al. ,
And even assuming, arguendo , that affirmative government acknowledgment was the only means by which a plaintiff could prove his or her "aggrieved person" status, this requirement would not be inconsistent with the remedy established in § 1810. That section provides a civil remedy to "[a]n aggrieved person ... who has been subjected to an electronic surveillance or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of section 1809."
Finally, plаintiff cites to one case in which a district court found that the plaintiffs "alleged enough to plead 'aggrieved person' status so as to proceed to the next step in proceedings under FISA sections 1806(f) and 1810." In re NSA Telecommc'ns Records Litig. ,
Plaintiff's reliance on In re NSA Telecommunications Records Litigation and its application of the § 3504 standard in the FISA context is unpersuasive because § 3504 is different from § 1806(f) in significant ways. Notably, although both § 1806(f) and § 3504 use the term "aggrieved," § 1806(f), unlike § 3504, incorporates a statutory definition of an "aggrieved person," which specifies that an "aggrieved person" is "a person who is the target of an electronic surveillance" or "whose communications or activities were subject to surveillance[.]"
Moreover, the reasoning in support of the low burden in the § 3504 context does not apply here. Specifically, in analyzing § 3504, courts have reasoned that the government's obligation to affirm or deny the occurrеnce of unlawful surveillance is triggered by the mere assertion of unlawful wiretapping because "requiring the government to affirm or deny the existence of illegal surveillance of witnesses imposes
In sum, when interpreted in light оf traditional principles of statutory interpretation, the text of § 1806(f) makes clear that § 1806(f) procedures do not apply where, as here, the plaintiff has merely plausibly alleged that it has been the target of surveillance and has not yet adduced evidence establishing this fact of surveillance. Accordingly, it is not appropriate at this time to engage in ex parte and in camera review of the materials responsive to plaintiff's interrogatories or to those plaintiff describes in its motion to compel.
IV.
Given that § 1806(f) procedures do not apply here, it is unnecessary to consider the question whether § 1806(f) displaces the state secrets privilege in situations in which § 1806(f) does apply. As such, the only remaining question is whether the government's invocation of the state secrets privilege defeats plaintiff's motion to compel.
A.
It is necessary first to review the well-settled Supreme Court and Fourth Circuit precedents governing the assertion of the state secrets privilege. Supreme Court and Fourth Circuit precеdent make clear that "[u]nder the state secrets doctrine, the United States may prevent the disclosure of information in a judicial proceeding if 'there is a reasonable danger' that such disclosure 'will expose ... matters which, in the interest of national security
The Fourth Circuit has mandated a three-step analysis for resolution of a state secrets question:
First, "the court must ascertain that the procedural requirements for invoking the state secrets privilege have been satisfied." Second, "the court must decide whether the information sought to be protected qualifies as privileged under the state secrets doctrine." Third, if the "information is determined to be privileged, the ultimate question to be resolved is how the matter should proceed in light of the successful privilege claim."
Abilt ,
With respect to the first step in this analysis, the Supreme Court has specified three procedural requirements for invocation of the state secrets privilege: (i) the state secrets privilege must be asserted by the United States government; it "can neither be claimed nor waived by a private party," (ii) "[t]here must be a formal claim of privilege, lodged by the head of the department which has control over the matter," and (iii) the department head's formal claim of the state secrets privilege must be made only "after actual personal consideration by that officer." Reynolds ,
This second step of the analysis requires courts to "determine whether the information that the United States seeks to shield is a state secret, and thus privileged from disclosure." El-Masri ,
The Supreme Court has balanced these competing concerns by requiring courts to determine "from all the circumstances of the case, [whether] there is a reasonable danger that compulsion of the evidence will expose ... matters which, in the interest of national security, should not be divulged.' " Reynolds ,
If the procedural requirements for invocation of the state secrets privilege are satisfied and the court determines that the information sought to be disclosed is properly privileged, the final step in the analysis is to assess how the matter should proceed. Here, again, Fourth Circuit and Supreme Court precedent is clear: if the state secrets privilege has been successfully invoked, "the claim of privilege will be accepted without requiring further disclosure."
B.
With these principles in mind, it is appropriate now to consider the assertion of the state secrets privilege in this case. To begin with, the procedural requirements for invocation of the state secrets privilege have been satisfied.
The government has similarly satisfied its burden with respect to the second step of the state secrets privilege analysis as careful review of the public Coats declaration and the classified Barnes declaration reveals that "there is a reasonable danger that compulsion of the evidence will expose ... matters which, in the interest of national security, should not be divulged." Reynolds ,
In an attempt to avoid this conclusiоn, plaintiff contends that to acknowledge the fact that plaintiff has been subject to surveillance would not, in fact, threaten national security. This argument plainly fails because courts have concluded that where, as here, the information sought to be disclosed involves the identity of parties whose communications have been acquired, this information is properly privileged. See Al-Haramain ,
Plaintiff contends that, contrary to surveillance of a particular individual with limited communications, plaintiff's communications are so ubiquitous that to reveal surveillance of its communications would not provide information regarding the structure of the Upstream surveillance program or its specific targets. Although this proposition may appear to hаve some force, courts have consistently recognized that "judicial intuition" about a proposition such as this "is no substitute for documented risks and threats posed by the potential disclosure of national security information." Al-Haramain ,
Finally, plaintiff argues that there cannot be a reasonable danger of undermining national security because much of the information plaintiff seeks is already contained in publicly-accessible documents. But importantly, the information disclosed in these public documents is plainly different
In sum, a careful review of defendants' public and classified declarations reveals (i) that defendants have satisfied the procedural requirements necessary to invoke the state secrets privilege and (ii) that the information sought to be protected qualifies as privileged under the state secrets doctrine. Given that defendants have satisfied the requirements of the state secrets privilege, "the claim of privilege will be accepted without requiring further disclosure." Abilt ,
An appropriate Order will issue.
Notes
50 U.S.C. § 1881a.
These original plaintiffs included the National Association of Criminal Defense Lawyers, Human Rights Watch, Amnesty International USA, Pen American Center, Global Fund for Women, the Nation magazine, the Rutherford Institute, and the Washington Office on Latin America.
That these interrogatories covered both standing and merits matters is neither inappropriate nor unexpected, as these matters may well be inextricably entwined.
This common thread uniting the situations in which § 1806(f) applies is further highlighted by the legislative history of this provision. Specifically, the Senate Report notes additional examples of instances in which § 1806(f)'s procedures apply, including "whenever an individual makes a motion pursuant to ...
See also Whitaker v. Barksdale Air Force Base ,
See also H.R. Conf. Rep. No. 95-1720 (noting that the cause of action in § 1810 is afforded "to any aggrieved person about whom information has been disclosed or used in violation of the criminal penalty provisions" and that "civil liability of intelligence agents under this act should coincide with the criminal liability.").
18 U.S.C. 3504
United Stales v. Vielguth ,
It is also worth noting that despite the In re NSA Telecommunications Records Litigation court's determination that the plaintiffs there had sufficiently alleged their aggrieved person status, the court nonetheless declined to follow the mandatory § 1806(f) procedures.
Plaintiff also cites to Jewel v. NSA , a Northern District of California case in which the district court issued several orders, directing the government to produce materials for ex parte and in camera review. But the Jewel court appeared not to address the requisite showing of "aggrieved person" status, and as such, that case did not directly address the issues addressed here. Indeed, the Jewel court has not yet issued an order as to the lawfulness of any alleged surveillance in that case and has recently issued an order requesting additional briefing on how plaintiffs can "establish they may be aggrieved persons without access to [classified] information" and "the current legal standard for asserting standing in these circumstances." Jewel v. NSA , No. 08-cv-4373, at *1 (N.D. Cal. July 5, 2018). As such, it is clear that the Jewel court has not yet definitively resolved the issues addressed here.
Abilt ,
Indeed, Wikimedia does not appear to dispute this point.
See also
See also, e.g., Sterling v. Tenet ,
Plaintiff similarly argues that the fact that the NSA reviews the type of Internet communications in which plaintiff engages, namely HTTP and HTTPS Internet protocols, is available in the public record. But contrary to plaintiff's suggestion, the use of the general phrase "web activity" in an unclassified portion of the June 1, 2011 FISC Opinion does not confirm that the NSA is monitoring any specific Internet protocol, namely either HTTP or HTTPS.
It is worth emphasizing the narrow scope of this decision, namely (i) that FISA § 1806 is not triggered in this case and that this provision and the associated FISA procedures do not operate here to displace the common law state secrets privilege and (ii) that the government has satisfied the well-settled procedural requirements necessary to invoke the privilege. Neither addressed nor resolved here is whether this long-ago judicially created privilege has, or should have, any continuing vitality today. That is not a question within the province of a district court.
