Levinthal v. Federal Election Commission , 219 F. Supp. 3d 1 ( 2016 )


Menu:
  •                            UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    _________________________________________
    )
    Dave Levinthal, et al.,                   )
    )
    Plaintiffs,                         )
    )
    v.                          )                 Civil No. 15-cv-01624 (APM)
    )
    Federal Election Commission,              )
    )
    Defendant.                          )
    )
    _________________________________________ )
    MEMORANDUM OPINION
    I.     INTRODUCTION
    Plaintiffs Dave Levinthal and the Center for Public Integrity bring this suit under the
    Freedom of Information Act (“FOIA”). On July 6, 2015, Plaintiffs submitted a FOIA request to
    Defendant Federal Election Commission seeking:           (1) a copy of a study that assesses
    vulnerabilities in the Commission’s information technology (“IT”) systems and makes
    recommendations to address those vulnerabilities; and (2) any emails and documents related to the
    study. Defendant produced non-exempt materials related to the study, but withheld the study itself.
    Plaintiffs brought this suit claiming that Defendant violated FOIA by failing to produce the study.
    Upon consideration of the parties’ submissions and the record evidence, the court grants
    Defendant’s Motion for Summary Judgment and denies Plaintiffs’ Cross-Motion for Summary
    Judgment.
    II.      BACKGROUND
    As required by Local Civil Rule 7(h)(1), Defendant Federal Election Commission
    (“Commission” or “Defendant”) submitted a detailed statement of undisputed material facts.
    See Def.’s Mot. for Summ. J., ECF No. 13 [hereinafter Def.’s Mot.], Def.’s Stmt. of Material Facts,
    ECF No. 13-1 [hereinafter Def.’s Stmt.]. Plaintiffs, for their part, responded with a bare-boned
    counter-statement that did not dispute Defendant’s factual assertions. Pls.’ Cross-Mot. for Summ.
    J., ECF No. 14 [hereinafter Pls.’ Mot.], Pls.’ Stmt. of Material Facts, ECF No. 14-1 [hereinafter
    Pls.’ Stmt.]. 1 Accordingly, the court treats Defendant’s proffered facts, recited below, as conceded
    by Plaintiffs. See SEC v. Banner Fund Int’l, 
    211 F.3d 602
    , 616 (D.C. Cir. 2000) (“If the party
    opposing the motion fails to comply with [the] local rule, then ‘the district court is under no
    obligation to sift through the record’ and should ‘[i]nstead . . . deem as admitted the moving party’s
    facts that are uncontroverted by the nonmoving party’s Rule [LCvR 7.1(h)] statement.’”
    (alterations in original) (quoting Jackson v. Finnegan, Henderson, Farabow, Garrett & Dunner,
    
    101 F.3d 145
    , 154 (D.D.C. 1996)).
    A.       Factual Background
    In Fiscal Year 2014, the Commission hired an outside contractor, SD Solutions, LLC, to
    determine whether there were vulnerabilities in the Commission’s IT systems and, if there were,
    to provide remedial recommendations. Def.’s Stmt. ¶ 5; Def.’s Mot., Decl. of Alec Palmer, ECF
    No. 13-2 [hereinafter Palmer Decl.], ¶ 7. The Commission ordered the study to assist it in deciding
    whether to implement newly developed information security guidelines published by the U.S.
    Department of Commerce’s National Institute of Standards and Technology (“NIST”). Def.’s
    1
    Plaintiffs later submitted a more fulsome statement of facts with their Reply Brief, see Pls.’ Reply, ECF No. 18, Pls.’
    Stmt. of Genuine Issues of Fact, ECF No. 18-1, but that statement came too late, see LCvR 7(h)(1) (“T]he Court may
    assume that facts identified by the moving party in its statement of material facts are admitted, unless such a fact is
    controverted in the statement of genuine issues filed in opposition to the motion.” (emphasis added)).
    2
    Stmt. ¶ 6; Palmer Decl. ¶ 7. In preparing its report, SD Solutions examined the Commission’s
    “physical and virtual information technology assets” and recommended measures for the
    Commission to protect its infrastructure from “wrongful interference, circumvention, or unlawful
    action by unauthorized persons.” Palmer Decl. ¶ 8. Furthermore, it assessed the “vulnerabilities
    to unlawful breach present in the Commission’s technological infrastructure, describing sensitive
    Commission systems and recommending specific security measures to address the vulnerabilities.”
    
    Id. The Commission
    refers to SD Solutions’ final report and its related documents, collectively,
    as the “NIST Study.” Def.’s Stmt. ¶ 8; Palmer Decl. ¶ 18.
    The NIST Study consists of two parts. The first part is an overview memorandum prepared
    by the Commission’s Office of the Chief Information Officer. The overview memorandum lists
    measures the Office has used in the past to address IT vulnerabilities, summarizes SD Solutions’
    final report, and discusses “the practicalities of implementing the [NIST] guidelines should the
    Commission adopt the recommendations in the Final Report.” Def.’s Stmt. ¶ 10; Palmer Decl.
    ¶¶ 2, 9, 10. The overview memorandum includes two appendices: (1) an abridged version of the
    full final report, and (2) a summary of both the recommendations in the report and the personnel
    and financial resources that would be required to satisfy each recommendation. 
    Id. ¶¶ 10,
    11.
    The second part of the NIST Study is the final report itself. As discussed, the report
    describes the Commission’s IT network, assesses the security of each system and identifies the
    vulnerabilities therein, and contains recommendations for security measures to address the
    identified vulnerabilities. 
    Id. ¶¶ 12,
    14.
    B.      Procedural Background
    Plaintiff Dave Levinthal is an investigative journalist employed by Plaintiff the Center for
    Public Integrity. See Pls.’ Mot. at 1; Def.’s Mot. at 3; Def.’s Stmt. ¶ 4. On July 6, 2015, Plaintiffs
    3
    submitted a FOIA request to the Commission, seeking: (1) “a copy of the 2015 National Institute
    of Standards and Technology Report—also known as the NIST study—pertaining to the Federal
    Election Commission’s operations,” and (2) “any FEC emails, memoranda, correspondence or
    other documents that, in any form or fashion, mention or refer to this National Institute of
    Standards and Technology report, by name or otherwise.” Def.’s Stmt. ¶ 38; Def.’s Mot., Decl. of
    Robert M. Kahn, ECF No. 13-3 [hereinafter Kahn Decl.], ¶ 6 & Ex. A [hereinafter FOIA Request].
    On August 18, 2015, the Commission denied Plaintiffs’ request for a copy of the NIST
    Study, but granted their request for documents that mention or refer to the study, subject to
    applicable FOIA exemptions. Kahn Decl. ¶ 7 & Ex. C (Email from Robert M. Kahn to Dave
    Levinthal (Aug. 18, 2015)). The Commission eventually produced more than 1,450 pages of non-
    exempt records, and non-exempt portions of records, that mentioned or referred to the NIST Study.
    Jt. Status Rep., ECF No. 11.
    Plaintiffs filed an administrative appeal challenging the decision to withhold the NIST
    Study, asserting that it “is likely to contain information that directly benefits the public’s
    understanding of Federal Election Commission capabilities and operations during a high-profile
    election season.” Kahn Decl. ¶ 8 & Ex. C. In September 2015, the Commission denied Plaintiffs’
    appeal. 
    Id. ¶ 10
    & Ex. F (Email from Robert M. Kahn to Dave Levinthal (Sept. 30, 2015)).
    Plaintiffs filed their Complaint in this court on October 5, 2015, challenging only
    Defendant’s non-disclosure of the NIST Study. See Compl., ECF No. 1. On March 17, 2016,
    Defendant filed a Motion for Summary Judgment, claiming that the NIST Study is exempt from
    disclosure both as a law enforcement record under FOIA Exemption 7(E) and as deliberative
    material under FOIA Exemption 5. Def.’s Mot. at 10–21. On April 8, 2016, Plaintiffs filed a
    Cross-Motion for Summary Judgment, which contests categorizing the NIST Study as a law
    4
    enforcement record under Exemption 7(E). See Pls.’ Mot at 4. Additionally, although Plaintiffs
    concede the applicability of Exemption 5, they argue that the Commission has failed to meet its
    obligation under FOIA to release any “reasonably segregable non-exempt information.” 
    Id. at 5.
    III.   LEGAL STANDARD
    A court shall grant summary judgment “if the movant shows that there is no genuine
    dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed. R.
    Civ. P. 56(a). To make this determination, the court must “view the facts and draw reasonable
    inferences in the light most favorable to the [non-moving] party.” Scott v. Harris, 
    550 U.S. 372
    ,
    378 (2007) (internal quotation mark omitted). A dispute is “genuine” only if a reasonable fact-
    finder could find for the nonmoving party, and a fact is “material” only if it is capable of affecting
    the outcome of litigation. Anderson v. Liberty Lobby, Inc., 
    477 U.S. 242
    , 248–49 (1986). A non-
    material factual dispute cannot prevent the court from granting summary judgment. 
    Id. at 249.
    Most FOIA cases are appropriately decided on motions for summary judgment.
    See Defenders of Wildlife v. U.S. Border Patrol, 
    623 F. Supp. 2d 83
    , 87 (D.D.C. 2009). A court
    may award summary judgment in a FOIA case by relying on the information included in the
    agency’s affidavits or declarations if they are “relatively detailed and non-conclusory,” SafeCard
    Servs., Inc. v. SEC, 
    926 F.2d 1197
    , 1200 (D.C. Cir. 1991) (internal quotation marks omitted), and
    if they describe “the documents and the justifications for nondisclosure with reasonably specific
    detail, demonstrate that the information withheld logically falls within the claimed exemption, and
    are not controverted by either contrary evidence in the record nor by evidence of agency bad faith,”
    Military Audit Project v. Casey, 
    656 F.2d 724
    , 738 (D.C. Cir. 1981).
    The agency bears the burden of demonstrating that each FOIA exemption applies, and its
    determinations are subject to de novo review in district court. U.S. Dep’t of Justice v. Reporters
    5
    Comm. for Freedom of the Press, 
    489 U.S. 749
    , 755 (1989) (citing 5 U.S.C. § 552(a)(4)(B)). To
    prevail on a motion for summary judgment, the agency must demonstrate that “each document that
    falls within the class requested either has been produced, is unidentifiable, or is wholly exempt
    from the Act’s inspection requirements.” Goland v. Cent. Intelligence Agency, 
    607 F.2d 339
    , 352
    (D.C. Cir. 1978); see also Students Against Genocide v. Dep’t of State, 
    257 F.3d 828
    , 833 (D.C.
    Cir. 2001).
    IV.      DISCUSSION
    A.     FOIA Exemption 7(E)
    The court first considers whether the NIST Study is exempt from disclosure under FOIA
    Exemption 7(E). Def.’s Mot at 10–17; Pls.’ Mot. at 3–4.
    Under Exemption 7(E), an agency may withhold information (1) “compiled for law
    enforcement purposes” if (2) its release “would disclose techniques and procedures for law
    enforcement investigations or prosecutions, or would disclose guidelines for law enforcement
    investigations or prosecutions,” and (3) such “disclosure could reasonably be expected to risk
    circumvention of the law.” 5 U.S.C. § 552(b)(7)(E). Exemption 7(E) “sets a relatively low bar
    for the agency to justify withholding,” Blackwell v. FBI, 
    646 F.3d 37
    , 42 (D.C. Cir. 2011), and
    “where an agency ‘specializes in law enforcement, its decision to invoke [E]xemption 7 is entitled
    to deference,’” Lardner v. Dep’t of Justice, 
    638 F. Supp. 2d 14
    , 31 (D.D.C. 2009) (quoting
    Campbell v. Dep’t of Justice, 
    164 F.3d 20
    , 32 (D.C. Cir. 1998)). This does not excuse an agency,
    however, from the requirement of describing its “justifications for withholding the information
    n with specific detail.” Am. Civil Liberties Union v. Dep’t of Def., 
    628 F.3d 612
    , 619 (D.C. Cir.
    2011).
    6
    In this case, Plaintiffs offer a single argument challenging Defendant’s invocation of
    Exemption 7(E): the NIST Study was not “compiled for law enforcement purposes.” Pls.’ Mot.
    at 4.2 The court has little trouble rejecting that contention.
    A record is “compiled for law enforcement purposes” so long as there is (1) a rational
    “nexus” between the record and the agency’s law enforcement duties, and (2) a connection
    between the subject of the record and a possible security risk or violation of federal law.
    See 
    Campbell, 164 F.3d at 32
    ; see also Pratt v. Webster, 
    673 F.2d 408
    , 420 (D.C. Cir. 1982). The
    latter requirement must be satisfied “to establish that the agency acted within its principal function
    of law enforcement, rather than merely engaging in a general monitoring of individuals’ activities.”
    
    Pratt, 673 F.3d at 420
    . The NIST Study satisfies both requirements.
    First, the NIST Study meets the rational “nexus” requirement because a federal agency,
    like the Commission, cannot effectively carry out its law enforcement function unless it has a
    secure and reliable IT system. The Commission is responsible for investigating violations of the
    Federal Election Campaign Act.              See Def.’s Mot. at 5–6; Def.’s Stmt. ¶¶ 1–3; 52 U.S.C.
    § 30109(a)(1)–(2). Its IT system contains sensitive information related to investigations, including
    “subpoenas, requests for information and documents, reports of investigation, and responses to
    Commission-issued subpoenas and requests.” Palmer Decl. ¶ 17. The system also contains a
    “confidential scoring system, the Enforcement Priority System, which identifies significant cases
    for enforcement[.]” 
    Id. ¶ 16.
    In short, the Commission’s IT system is central to its law
    2
    The court, therefore, treats as conceded the remaining elements of Exemption 7(E)—namely, that the exempted
    record (1) “would disclose techniques and procedures for law enforcement investigations or prosecutions, or would
    disclose guidelines for law enforcement investigations or prosecutions” and (2), if disclosed, “could reasonably be
    expected to risk circumvention of the law.” 5 U.S.C. § 552(b)(7)(E). See Wilkins v. Jackson, 
    750 F. Supp. 2d 160
    ,
    162 (D.D.C. 2010) (“It is well established that if a plaintiff fails to respond to an argument raised in a motion for
    summary judgment, it is proper to treat that argument as conceded.”); Sykes v. Dudas, 
    573 F. Supp. 2d 191
    , 202
    (D.D.C. 2008) (“[W]hen a party responds to some but not all arguments raised on a Motion for Summary Judgment,
    a court may fairly view the unacknowledged arguments as conceded.”).
    7
    enforcement function. See 
    id. (“The Commission’s
    information systems network allows it to fulfill
    its statutory obligation to administer and enforce campaign finance laws.”).
    The NIST Study in turn was designed to promote the integrity of that system and thus itself
    serves a law enforcement function. The study’s purpose was to “assess the vulnerabilities of the
    Commission’s information technology systems” and to make “recommendations about how the
    Commission could protect its systems from wrongful interference, circumvention, or unlawful
    action by authorized persons.” Palmer Decl. ¶¶ 7, 8. A study designed to evaluate and improve a
    critical law enforcement tool, such as an IT system, easily meets the rational nexus requirement.
    Second, there is a connection between the NIST Study and a possible security risk or
    violation of federal law. According to the Commission’s Chief Information Officer, Alec Palmer,
    the NIST Study is the type of assessment “that, if publicly disclosed, could be used by persons
    with malicious objectives to do great harm.” 
    Id. ¶ 19.
    Palmer asserts that “information contained
    in the NIST Study could be used to gain unlawful access to the Commission’s technology systems,
    obtain and manipulate sensitive and confidential data about candidates, officeholders, party
    committees, and others who interact with the Commission, or obtain and manipulate data stored
    within the Commission’s systems regarding [Commission] enforcement matters.” 
    Id. Further, Palmer
    explains that a person with access to the NIST Study “could use the information contained
    [therein] to seriously threaten the Commission’s ability to fulfill its civil enforcement and other
    statutory duties.” 
    Id. Finally, Palmer
    attests that the NIST Study “provides a blueprint to the
    Commission’s networks” and that its public disclosure “could thus enable hackers to bypass the
    Commission’s current protection mechanisms.”          
    Id. ¶ 21.
    This court observed in Long v.
    Immigration and Customs Enforcement, 
    149 F. Supp. 3d 39
    , 53 (D.D.C. 2015), that “[j]udges are
    not cyber specialists, and it would be the height of judicial irresponsibility for a court to blithely
    8
    disregard . . . a claimed risk” of a cyber-attack or a security breach. The court will not disregard
    such risk in this case. Accordingly, the court finds that the NIST Study satisfies the second prong
    of the “compiled for law enforcement purposes” inquiry.
    Plaintiffs offer two rejoinders. First, they contend that the NIST Study is not “compiled
    for a law enforcement purpose” because “[i]t is not connected to an investigation.” Pls.’ Mot. at
    4. That argument misconstrues the law. The Court of Appeals consistently has held that records
    do not have to be linked to a specific investigation to be properly withheld under Exemption 7(E).
    For instance, in Tax Analysts v. Internal Revenue Service (IRS), the court held that IRS materials
    related to law enforcement activities “outside of the context of a specific investigation” met the
    threshold for materials “compiled for law enforcement purposes” under Exemption 7(E). See 
    294 F.3d 71
    , 73, 78–79 (D.C. Cir. 2002).         In so holding, it observed that Congress amended
    Exemption 7 in 1986 to make clear that 7(E) “was not limited to records or information addressing
    only individual violations of the law.” 
    Id. at 79.
    More recently, in Blackwell v. Federal Bureau
    of Investigation, the Court of Appeals held that the FBI had properly withheld methods of data
    collection, organization, and presentation contained in certain reports under Exemption 
    7(E). 646 F.3d at 42
    . The methods were developed for the FBI to meet the agency’s “investigative needs,”
    rather than linked to a specific investigation. 
    Id. Moreover, as
    Defendant correctly points out, Def.’s Mot. at 11, 13–14, courts in this
    District repeatedly have held that information connected to law enforcement databases qualifies
    for exemption under 7(E). See, e.g., 
    Long, 149 F. Supp. 3d at 44
    (holding that requests for metadata
    and database schema of law enforcement information databases qualify for exemption under 7(E));
    Strunk v. U.S. Dep’t of State, 
    905 F. Supp. 2d 142
    , 146–48 (D.D.C. 2012) (holding that computer
    transaction and function codes that reveal how to navigate and retrieve information from a law
    9
    enforcement database were properly withheld under Exemption 7(E)); Miller v. U.S. Dep’t of
    Justice, 
    872 F. Supp. 2d 12
    , 29 (D.D.C. 2012) (holding that numerical codes used to identify
    information and individuals, as well as codes “relate[d] to procedures concerning the use of law
    enforcement resources and databases . . . [and] case program and access codes[,]” were properly
    withheld under Exemption 7(E)); Skinner v. U.S. Dep’t of Justice, 
    893 F. Supp. 2d 109
    , 113–14
    (D.D.C. 2012) (holding that user access codes that facilitated access to a law enforcement database
    were properly redacted under Exemption 7(E)), aff’d sub nom. Skinner v. Bureau of Alcohol,
    Tobacco, Firearms & Explosives, No. 12-5319, 
    2013 WL 3367431
    (D.C. Cir. May 31, 2013)).
    Thus, the fact that the NIST Study does not pertain to a particular investigation does not place it
    outside Exemption 7(E).
    Second, Plaintiffs argue that Exemption 7(E) is inapplicable because Defendant “has not
    established that the vulnerabilities described in the NIST Study still exist.” Pls.’ Mot. at 4. More
    specifically, Plaintiffs argue that, even if Exemption 7(E) applies “to portions of the NIST Study,
    to the extent that facts on the ground have changed since the preparation of the report, disclosure
    of previous vulnerabilities would not fall under Exemption 7(E).” 
    Id. at 5.
    That argument is a
    nonstarter. Again, the Palmer Declaration, which the court described above, amply supports
    Defendant’s contention that the public release of the NIST Study—or any portion of it—would
    run the risk of compromising the Commission’s law enforcement function. According to Palmer,
    if released, unauthorized readers of the NIST Study could “gain unlawful access to the
    Commission’s technology systems, obtain and manipulate sensitive and confidential data about
    candidates, officeholders, party committees, and others who interact with the Commission, or
    obtain and manipulate data stored within the Commission’s systems regarding [Commission]
    enforcement matters.” 
    Id. ¶ 19.
    Additionally, Palmer states that an unauthorized individual or
    10
    government armed with the NIST Study could “seriously threaten the Commission’s ability to
    fulfill its civil enforcement and other statutory duties” and “alter the disclosure data that the
    Commission makes available on its public website, thereby providing false disclosure information
    that could adversely influence the outcome of an election.” 
    Id. ¶¶ 19–20.
    Further, disclosing the
    NIST Study could allow hackers to gain access to the Commission’s networks, enabling them to
    “distort or prevent access to campaign finance reports,” or “expose sensitive information about
    parties regulated by the Commission.” 
    Id. ¶¶ 21,
    24. Palmer’s Declaration credibly demonstrates
    that disclosure of any portion of the NIST Study would pose a present and genuine security threat
    to the Commission’s law enforcement function. Accordingly, the court rejects Plaintiffs’ argument
    that the NIST Study is not exempt under 7(E).
    B.      FOIA Exemption 5 and Segregability
    Defendant also invokes FOIA Exemption 5 to withhold the NIST Study. Def.’s Mot. at
    17. Exemption 5 shields disclosure of “inter-agency or intra-agency memorandums or letters
    which would not be available by law to a party other than an agency in litigation with the agency.”
    5 U.S.C. § 552(b)(5). Exemption 5 has been interpreted to incorporate the three traditional civil
    discovery privileges—the attorney work product privilege, the deliberative process privilege, and
    the attorney-client privilege. Burka v. U.S. Dep’t of Health & Human Servs., 
    87 F.3d 508
    , 518
    (D.C. Cir. 1996). Here, Defendant asserts the deliberate process privilege as the basis for invoking
    Exemption 5. Def.’s Mot. at 17–21; see Tax Analysts v. IRS, 
    117 F.3d 607
    , 616 (D.C. Cir. 1997)
    (describing the deliberative process privilege as covering records that are both “predecisional” and
    “deliberative”).
    Plaintiffs do not contest the applicability of the deliberative process privilege to the NIST
    Study. See Pls.’ Mot. at 5 (“Plaintiffs do not doubt that the NIST Study contains predecisional
    11
    recommendations.”). Instead, they challenge whether Defendant has satisfied its duty to segregate
    and produce non-exempt factual material contained within the NIST Study. 
    Id. Specifically, Plaintiffs
    argue that Defendant “has not established that [the factual material is] actually
    ‘inextricably entwined’ with deliberations.” Id.; see Mead Data Cent., Inc. v. U.S. Dep’t of the
    Air Force, 
    566 F.2d 242
    , 260 (D.C. Cir. 1977) (collecting cases and explaining that “[i]t has long
    been a rule in this Circuit that non-exempt portions of a document must be disclosed unless they
    are inextricably intertwined with exempt portions”). The court disagrees.
    Because “the focus of FOIA is information, not documents . . . an agency cannot justify
    withholding an entire document simply by showing that it contains some exempt material.” Mead
    Data 
    Cent., 566 F.2d at 260
    . FOIA therefore requires that “[a]ny reasonably segregable portion
    of [the] record shall be provided to any person requesting such record after deletion of the portions
    which are exempt.” 5 U.S.C. § 552(b). An agency must provide a “detailed justification” and not
    just make “conclusory statements” to support its segregability determination. Mead Data 
    Cent., 566 F.2d at 261
    . Agencies, however, “are entitled to a presumption that they complied with the
    obligation to disclose reasonably segregable material,” which can be overcome by contrary
    evidence produced by the requester. Sussman v. U.S. Marshals Serv., 
    494 F.3d 1106
    , 1117 (D.C.
    Cir. 2007).
    The Palmer Declaration provides a “detailed justification” for the Commission’s decision
    that no part of the NIST Report is segregable, and Plaintiffs have not offered any evidence to the
    contrary.     According to Palmer, the Commission’s Office of the Chief Information Officer
    conducted a line-by-line analysis of the NIST Study to determine if any portion could be
    segregated and released without jeopardizing the security of its networks. Palmer Decl. ¶¶ 25–27.
    Palmer observes that the “factual descriptions of the Commission’s information technology
    12
    systems and their vulnerabilities in the Final Report form the basis of the Report’s analysis[] . . .
    and they reflect the need for the recommended protocols that constitute the core of the NIST
    Study.” 
    Id. ¶ 26.
    If the factual content of the NIST Study were publicly disclosed, Palmer explains,
    it “would effectively release many of the NIST Study’s recommendations, as well as the substance
    of the vulnerability analysis that [the Office of the Chief Information Officer] submitted to the
    Commission for its determination on whether to accept those recommendations.” 
    Id. ¶ 27.
    “The
    factual descriptions expose the Commission to risk of a security breach of its network and
    information technology systems.” 
    Id. Palmer’s Declaration
    clearly establishes that the factual portions of the NIST Study are
    “inextricably intertwined” with its deliberative elements. Mead Data 
    Cent., 566 F.2d at 260
    . It
    also sets forth with “reasonable specificity” why those factual portions cannot be segregated.
    Armstrong v. Exec. Office of the President, 
    97 F.3d 575
    , 578–79 (D.C. Cir. 1996). Accordingly,
    the court rejects Plaintiffs’ argument that Defendant has not met its duty of segregability.
    V.     CONCLUSION
    For the foregoing reasons, the court grants Defendant’s Motion for Summary Judgment
    and denies Plaintiffs’ Cross-Motion for Summary Judgment. A separate final order accompanies
    this Memorandum Opinion.
    Dated: November 23, 2016                              Amit P. Mehta
    United States District Judge
    13
    

Document Info

Docket Number: Civil Action No. 2015-1624

Citation Numbers: 219 F. Supp. 3d 1, 2016 U.S. Dist. LEXIS 162427, 2016 WL 6902111

Judges: Judge Amit P. Mehta

Filed Date: 11/23/2016

Precedential Status: Precedential

Modified Date: 10/19/2024

Authorities (21)

Scott Armstrong v. Executive Office of the President , 97 F.3d 575 ( 1996 )

Lardner v. Department of Justice , 638 F. Supp. 2d 14 ( 2009 )

Tax Analysts v. Internal Revenue Service , 294 F.3d 71 ( 2002 )

Mead Data Central, Inc. v. United States Department of the ... , 566 F.2d 242 ( 1977 )

Scott v. Harris , 127 S. Ct. 1769 ( 2007 )

Defenders of Wildlife v. United States Border Patrol , 623 F. Supp. 2d 83 ( 2009 )

Campbell v. United States Department of Justice , 164 F.3d 20 ( 1998 )

Sykes v. Dudas , 573 F. Supp. 2d 191 ( 2008 )

Securities & Exchange Commission v. Banner Fund ... , 211 F.3d 602 ( 2000 )

Anderson v. Liberty Lobby, Inc. , 106 S. Ct. 2505 ( 1986 )

Wilkins v. Jackson , 750 F. Supp. 2d 160 ( 2010 )

Sussman v. United States Marshals Service , 494 F.3d 1106 ( 2007 )

Susan D. Goland and Patricia B. Skidmore v. Central ... , 607 F.2d 339 ( 1978 )

robert-a-burka-v-united-states-department-of-health-and-human-services , 87 F.3d 508 ( 1996 )

Tax Analysts v. Internal Revenue Service , 117 F.3d 607 ( 1997 )

Students Against Genocide v. Department of State , 257 F.3d 828 ( 2001 )

Safecard Services, Inc. v. Securities and Exchange ... , 926 F.2d 1197 ( 1991 )

Military Audit Project, Felice D. Cohen, Morton H. Halperin ... , 656 F.2d 724 ( 1981 )

United States Department of Justice v. Reporters Committee ... , 109 S. Ct. 1468 ( 1989 )

Blackwell v. Federal Bureau of Investigation , 646 F.3d 37 ( 2011 )

View All Authorities »