Carter v. National Security Agency , 962 F. Supp. 2d 130 ( 2013 )


Menu:
  •                            UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    ___________________________________
    :
    GLEN CARTER,                        :
    :
    Plaintiff,              :
    :
    v.                            :               Civil Action No. 12-0968 (CKK)
    :
    NATIONAL SECURITY AGENCY,           :
    :
    Defendant.              :
    ___________________________________ :
    MEMORANDUM OPINION
    This matter is before the Court on Defendant’s Motion for Summary Judgment [ECF No.
    10]. 1 For the reasons discussed below, the motion will be granted.
    I. BACKGROUND
    In February 2006, Plaintiff submitted a request to the National Security Agency (“NSA”
    or “Agency”) for the following information:
    Information received from the Canadian authorities in the early
    nineties alerting [NSA] and calling for concern letters I am
    suspected of having written to a television Christian ministry.
    1
    Also before the Court are “Plaintiff’s Memorandum of Points and Authorities in Support
    of his Cross-Motion for Summary Judgment” and “Plaintiff’s Memorandum of Points and
    Authorities in Support of His Reply to Defendant’s Motion for Summary Judgment” [ECF No.
    19]. These documents do not comply in form and substance with Rule 56 of the Federal Rules of
    Civil Procedure and Local Civil Rule 7(h), and Plaintiff’s cross-motion for summary judgment
    will be denied. Instead, the Court construes these submissions together as Plaintiff’s opposition
    to Defendant’s Motion for Summary Judgment (“Pl.’s Opp’n”), the page numbers of which are
    designated by ECF.
    1
    Information portraying me as a dangerous person or, in the
    alternative, a suspected terrorist.
    Information relating to the cross border transfer of personal
    information of all descriptions to the United States.
    Information relating to the interception of communications of all
    descriptions.
    Information relating to the seeking of a remedy to a suspected
    criminal offence.
    Information relating to the issuance of an order, adverse in effect,
    curtailing my civil liberties in Canada, Barbados and the United
    Kingdom.
    Information relating to a restriction of my freedom of movement
    and the withholding of individual rights and freedoms under law.[2]
    Def.’s Mem. of P. & A. in Supp. of its Mot. for Summ. J., Decl. of Diane M. Janosek (“Janosek
    Decl.”), Ex. 1 (Letter to NSA, Attn: FOIA/PA Office, from Plaintiff dated February 14, 2006) at
    2; see Compl. at 2–3 (page numbers designated by ECF). 3 NSA processed the request under the
    Freedom of Information Act (“FOIA”), see 
    5 U.S.C. § 552
    . Janosek Decl. ¶ 9 n.1. 4
    2
    Plaintiff apparently wrote letters “to a television Christian Ministry” in the United States,
    and he believes that personal information about him has been “exported from Canada via the
    Canadian authorities (Royal Canadian Mounted Police, Canadian Security Service Intelligence
    Agency) via Interpol Ottawa to the Central Intelligence Agency,” subsequently “transferred from
    the Central Intelligence Agency to the National Security Agency,” resulting in the “invasion of
    [his] personal privacy through technological methods employed by US, Canadian and British
    authorities.” Def.’s Mem. of P. & A. in Supp. of its Mot. for Summ. J., Decl. of Diane M.
    Janosek, Ex. 3 (Appeal under Freedom of Information Act, 5 U.S.C. sect. 552, As Amended By
    Public Law No. 104-231, 
    110 Stat. 3048
    ) at 2. Allegedly “writ[ten] during a very difficult phase
    of [Plaintiff’s] life,” these letters “criticized the US, the media and corporate America,” and
    “later broadened in scope to encompass and address other social issues.” 
    Id.,
     Ex. 3 at 6. Plaintiff
    “never intended to cause public harm and dismay.” Compl. at 5.
    3
    The Court construes Plaintiff’s “Petition for Review” and the attached “Plaintiff’s
    Memorandum in Appeal of Administrative’s [sic] Agency’s Internal Appeal Decision of
    September 14, 2006,” together as a civil complaint (“Compl.”).
    4
    NSA declined to process the request under the Privacy Act, see 5 U.S.C. § 552a, because
    the Privacy Act applies only to United States citizens. Janosek Decl. ¶ 9 n.1. Plaintiff has
    identified himself as “a Canadian citizen who has retained British citizenry (a dual citizen, that
    is).” Pl.’s Opp’n at 1.
    2
    “To the extent that Plaintiff’s request could be considered a request for intelligence
    information,” NSA treated it as one “for records on the surveillance, targeting, and/or domestic
    collection of [information pertaining to Plaintiff] by NSA.” Janosek Decl. ¶ 9. Relying on
    Exemptions 1 and 3, NSA denied the request in its entirety and explained its reasons as follows:
    We have determined that the fact of the existence or non-existence
    of the materials you request is a currently and properly classified
    matter in accordance with Executive Order 12958, as amended.
    Thus, your request is denied pursuant to the first exemption of the
    FOIA which provides that the FOIA does not apply to matters that
    are specifically authorized under criteria established by an
    Executive Order to be kept secret in the interest of national defense
    or foreign relations and are, in fact[,] properly classified pursuant
    to such Executive Order.
    In addition, this Agency is authorized by various statutes to protect
    certain information concerning its activities. The third exemption
    of the FOIA provides for the withholding of information
    specifically protected from disclosure by statute. Thus, your
    request is also denied because the fact of the existence or non-
    existence of the information is exempted from disclosure pursuant
    to the third exemption. The specific statutes applicable in this case
    are Title 18 U.S. Code 798; Title 50 U.S. Code 403-1(i); and
    Section 6, Public Law 86-36 (50 U.S. Code 402 note).
    Id., Ex. 2 (Letter to Plaintiff from Louis F. Giles, Director of Policy, NSA, dated April 20, 2006,
    regarding FOIA Case No. 48604) at 2.
    Plaintiff filed an administrative appeal of NSA’s initial determination on June 19, 2006.
    See generally id., Ex. 3 (Appeal under Freedom of Information Act, 5 U.S.C. sect. 552, As
    Amended By Public Law No. 104-231, 
    110 Stat. 2048
    ). NSA acknowledged its receipt of the
    appeal on August 3, 2006. 
    Id.,
     Ex. 4 (Letter to Plaintiff from Ariane E. Cerlenko, Associate
    General Counsel, NSA, regarding Case No. 48604/Appeal No. 3145, dated August 3, 2006).
    NSA’s initial determination was affirmed, and it was determined that “the appropriate response
    3
    to [Plaintiff’s] request is to continue to neither confirm nor deny the existence or non-existence
    of the materials . . . request[ed].” 
    Id.,
     Ex. 5 (Letter to Plaintiff from John Inglis, Freedom of
    Information Act/Privacy Act Appeals Authority, dated September 14, 2006) at 2. The
    affirmance was explained in part as follows:
    Regardless of whether NSA has records related to you, or any
    individual, NSA can neither confirm nor deny alleged activities or
    targets. To do otherwise when challenged under the FOIA would
    result in the exposure of intelligence information, sources, and
    methods and would severely undermine surveillance activities in
    general. For example, if NSA denied allegations about intelligence
    activities or targets in cases where such allegations were false (e.g.,
    we told one FOIA requester that we had no records), but remained
    silent in cases were the allegations were accurate, it would tend to
    reveal that the individuals in the latter cases were targets. Any
    further elaboration concerning these matters would reveal
    information that is currently and properly classified under
    Executive Order 12958, as amended.
    
    Id.
    Plaintiff challenges this administrative appeal decision “refusing him access to personal
    information believed to be contained in intelligence records.” Compl. at 2. He alleges that NSA
    “failed to properly invoke a Glomar [response] and to properly support this response with
    applicable statutes . . . by properly stating the precise grounds on which access to responsive
    records, if any, was denied.” 5 
    Id. at 3
    . According to Plaintiff, the issues presented are:
    (a) did NSA properly rely on the exempt provisions of FOIA, (b)
    was a Glomar response standard of refusal . . . appropriate to the
    categories of personal information requested, (c) did the Agency
    make proper use of the general exemption review standards
    5
    A Glomar response “takes its name from the Hughes Glomar Explorer, a ship built (we
    now know) to recover a sunken Soviet submarine, but disguised as a private vessel for mining
    manganese nodules from the ocean floor.” Elec. Privacy Info. Ctr. v. Nat’l Sec. Agency, 
    678 F.3d 926
    , 931 n.2 (D.C. Cir. 2012) (quoting Bassiouni v. CIA, 
    392 F.3d 244
    , 246 (7th Cir. 2004)
    (internal quotation marks omitted)). As is discussed below, an agency providing a Glomar
    response neither confirms nor denies the existence of information responsive to a FOIA request.
    See Gardels v. CIA, 
    689 F.2d 1100
    , 1103 (D.C. Cir. 1982).
    4
    established in non Glomar cases, and (d) did the Agency properly
    meet the burden of proof required of it in order to sustain its action.
    
    Id.
    II. DISCUSSION
    A. Summary Judgment in a FOIA Case
    “FOIA cases typically and appropriately are decided on motions for summary judgment.”
    Defenders of Wildlife v. U.S. Border Patrol, 
    623 F. Supp. 2d 83
    , 87 (D.D.C. 2009). The Court
    will grant summary judgment if the movant shows that there is no genuine dispute as to any
    material fact and is entitled to judgment as a matter of law. See Fed. R. Civ. P. 56(a). In a FOIA
    action to compel production of agency records, the agency “is entitled to summary judgment if
    no material facts are in dispute and if it demonstrates ‘that each document that falls within the
    class requested either has been produced . . . or is wholly exempt from the [FOIA’s] inspection
    requirements.’” Students Against Genocide v. Dep’t of State, 
    257 F.3d 828
    , 833 (D.C. Cir. 2001)
    (quoting Goland v. CIA, 
    607 F.2d 339
    , 352 (D.C. Cir. 1978)).
    Summary judgment may be based solely on information provided in an agency’s
    supporting affidavits or declarations if they are relatively detailed and when they describe “the
    documents and the justifications for nondisclosure with reasonably specific detail, demonstrate
    that the information withheld logically falls within the claimed exemption, and are not
    controverted by either contrary evidence in the record [or] by evidence of agency bad faith.”
    Military Audit Project v. Casey, 
    656 F.2d 724
    , 738 (D.C. Cir. 1981). “To successfully challenge
    an agency’s showing that it complied with the FOIA, the [P]laintiff must come forward with
    ‘specific facts’ demonstrating that there is a genuine issue with respect to whether the agency has
    5
    improperly withheld extant agency records.” Span v. U.S. Dep’t of Justice, 
    696 F. Supp. 2d 113
    ,
    119 (D.D.C. 2010) (quoting Dep’t of Justice v. Tax Analysts, 
    492 U.S. 136
    , 142 (1989)).
    In a FOIA case, the Court determines de novo whether an agency properly withholds
    information under a claimed exemption. See, e.g., King v. U.S. Dep’t of Justice, 
    830 F.2d 210
    ,
    217 (D.C. Cir. 1987). This is so even if national security matters are at issue. See Halperin v.
    CIA, 
    629 F.2d 144
    , 148 (D.C. Cir. 1980). Deference is accorded, however, to an agency’s
    expertise in national security matters. See, e.g., Taylor v. Dep’t of the Army, 
    684 F.2d 99
    , 109
    (D.C. Cir. 1982) (according “utmost deference” to classification affidavits); Goland, 
    607 F.2d at 352
    .
    B. SIGINT and the NSA’s National Security Mission
    The NSA’s declarant explains that the Agency is “a separately organized agency within
    the Department of Defense under the direction, authority, and control of the Secretary of
    Defense.” Janosek Decl. ¶ 4. Its “foreign intelligence mission includes the responsibility to
    collect, process, analyze, produce, and disseminate signals intelligence (SIGINT) information, of
    which communications intelligence (COMINT) is a significant subset, for (a) national foreign
    intelligence purposes, (b) counterintelligence purposes, and (c) the support of military
    operations.” 
    Id.
     NSA performs its SIGINT mission by “exploit[ing] foreign electromagnetic
    signals to obtain intelligence information necessary for the national defense, national security, or
    conduct of foreign affairs.” Id. ¶ 5. The declarant further explains that, through “a sophisticated
    worldwide SIGINT collection network,” the Agency “acquires, among other things, foreign and
    international electromagnetic communications.” Id. The technological infrastructure supporting
    6
    these efforts, she states, “has taken years to develop at the cost of billions of dollars and untold
    human effort,” and it “relies on sophisticated collection and processing technology.” Id.
    Intelligence information is gathered and analyzed for two main purposes: “to direct
    United States resources as necessary to counter threats” and “to direct the foreign policy of the
    United States.” Id. ¶ 6. The declarant states that “intelligence produced by NSA is often
    unobtainable by other means.” Id. Such information is distributed to the President of the United
    States, various senior government officials, military departments and law enforcement agencies,
    and it may include information relevant to “military order of battle[,] threat warnings and
    readiness[,] arms proliferation[,] terrorism[,] and foreign aspects of international narcotics
    trafficking.” Id. The declarant further states that “NSA’s ability to produce foreign intelligence
    information depends on its access to foreign and international electronic communications.” Id. ¶
    7. The technology used in these processes “is both expensive and fragile,” and “[p]ublic
    disclosure of either the capability to collect specific communications or the substance of the
    information itself can easily alert targets to the vulnerability of their communications.” Id.
    C. Interpretation of Plaintiff’s FOIA Request
    The NSA treated Plaintiff’s FOIA request as if it “encompass[ed] a request for
    information regarding whether [Plaintiff] was a target of NSA’s surveillance efforts.” Janosek
    Decl. ¶ 11; see id. ¶ 9. According to Plaintiff, the NSA “erred right from the start by
    misunderstanding and misinterpreting this request for something other than that which was
    intended by the Plaintiff, by assuming that his request was a request for records on surveillance,
    targeting, and the domestic collection of responsive records.” Pl.’s Mem. of P. & A. in Supp. of
    his Cross-Mot. for Summ. J. (“Pl.’s Opp’n”) at 4 (emphasis in original); see id. at 7. His request
    7
    “refer[red] to ‘information’ and not [‘]intelligence information’ per se.” Id. at 4. According to
    Plaintiff, “both NSA and the CIA have been collecting and processing personal information on
    him not on national security grounds for a Glomar response to have effect but out of service to
    special media interests.” Id. “Only 1/7th of [his] access request (item[] No. 4, that is) related to
    the Plaintiff possibly being the target of surveillance activities conducted by NSA whilst the
    other aspects to it refer to personal information which would ordinarily fall outside the scope of
    Exemptions 1 and 3,” such that a “Glomar response should in no way be used” with respect to
    the other six items listed in his request. Id. at 12.
    By means of this FOIA request, Plaintiff seeks “personal information believed to be
    caught up in intelligence records believed to be in the custody, control and management of the
    Agency.” Id. at 1. He apparently is under the impression that NSA not only is able to separate
    out “personal” information from all the information that the Agency would have or could have
    acquired only through SIGINT, but also is required do so. In light of the origin, function, and
    mission of the NSA, it is reasonable for its staff to have interpreted Plaintiff’s FOIA request as
    one for information about him which the Agency obtained in the course of its communications
    surveillance activities. After all, Plaintiff did seek “[i]nformation relating to the interception of
    communications of all descriptions.” Janosek Decl., Ex. 1 (FOIA request). And for the reasons
    discussed below, NSA’s Glomar response is appropriate.
    D. Exemption 1
    Exemption 1 protects matters that are “(A) specifically authorized under criteria
    established by an Executive [O]rder to be kept secret in the interest of national defense or foreign
    policy and (B) are in fact properly classified pursuant to such Executive [O]rder[.]” 
    5 U.S.C. §
                                                      8
    552(b)(1). Pursuant to Executive Order 13,526, 
    75 Fed. Reg. 707
     (Dec. 29, 2009), information
    may be classified only if all of the following conditions are met:
    (1) an original classification authority is classifying the
    information;
    (2) the information is owned by, produced by or for, or is under the
    control of the United States Government;
    (3) the information falls within one or more of the categories of
    information listed in section 1.4 of this order; and
    (4) the original classification authority determines that the
    unauthorized disclosure of the information reasonably could be
    expected to result in damage to the national security, which
    includes defense against transnational terrorism, and the original
    classification authority is able to identify or describe the damage.
    
    Id.
     § 1.1(a). Information may be classified either at the “top secret,” “secret,” or “confidential”
    level, id. § 1.2(a), and such classified information must fall within one of the following
    categories:
    (a) military plans, weapons systems, or operations;
    (b) foreign government information;
    (c) intelligence activities (including covert action), intelligence
    sources or methods, or cryptology;
    (d) foreign relations or foreign activities of the United States,
    including confidential sources;
    (e) scientific, technological, or economic matters relating to the
    national security;
    (f) United States Government programs for safeguarding nuclear
    materials or facilities;
    (g) vulnerabilities or capabilities of systems, installations,
    infrastructures, projects, plans, or protection services relating to
    the national security; or
    (h) the development, production, or use of weapons of mass
    destruction.
    9
    Id. § 1.4 (emphasis added). 6
    The declarant, who is a “TOP SECRET original classification authority,” Janosek Decl. ¶
    2, explains that “[c]onfirming the existence or nonexistence of responsive records would disclose
    information that is currently and properly classified TOP SECRET . . . because such a positive or
    negative response could reasonably be expected to cause exceptionally grave damage to national
    security,” id. ¶ 14. She further explains:
    Confirmation by NSA that a person’s activities are not of a foreign
    intelligence interest or that NSA is unsuccessful in collecting
    foreign intelligence information in [his] activities on a case-by-
    case basis would allow our adversaries to accumulate information
    and draw conclusions about the NSA’s technical capabilities,
    sources, and methods. NSA’s adversaries would have a roadmap
    instructing them as to which communication modes and personnel
    remain safe or are successfully defeating NSA’s capabilities. For
    example, if NSA were to admit publicly in response to [a FOIA]
    request that no information about Persons X, Y, and Z exist, but in
    response to a separate . . . request about Person T state only that
    the Agency can neither confirm nor deny the existence of such
    6
    The Agency initially relied on Executive Order No. 12,958, 
    60 Fed. Reg. 19825
     (Apr. 17,
    1995), which in relevant part read:
    (c) intelligence activities (including special activities), intelligence
    sources or methods, or cryptology; . . .
    (g) vulnerabilities or capabilities of systems, installations, projects
    or plans relating to the national security.
    
    Id.
     § 1.5. Executive Order 12,958 “has since been revoked and replaced by Executive Order
    13[,]526 . . . .” Janosek Decl. ¶ 9 n.2.
    “[A] reviewing court [assesses] the propriety of a classification decision purportedly
    supporting an Exemption 1 claim in terms of the [E]xecutive [O]rder in force at the time the
    agency’s ultimate classification decision is actually made.” King, 
    830 F.2d at 217
    . The
    declarant does not provide the date on which NSA made its initial classification decision. The
    language of subparagraphs (c) and (g) of both Executive Orders is substantially similar, and the
    Court finds that the classified information at issue in this case falls within the scope of either
    Order.
    10
    records, this would give rise to the inference that Person T is a
    target of NSA’s surveillance efforts. These inferences would
    disclose the targets and capabilities (i.e. NSA’s sources and
    methods) of NSA’s SIGINT activities and functions and inform
    our adversaries of the degree to which NSA is aware of some of
    their operatives or is able to successfully exploit particular
    communications.
    
    Id.
     For these reasons, NSA invokes Exemption 1 and offers only a Glomar response because
    “the fact of the existence or nonexistence of the intelligence information requested by Plaintiff is
    a currently and properly classified matter in accordance with Executive Order 13[,]526, as
    amended.” 
    Id.
    E. Exemption 3
    Exemption 3 protects records that are “specifically exempted from disclosure by statute .
    . . provided that such statute (A) [requires withholding] in such a manner as to leave no
    discretion on the issue, or (B) establishes particular criteria for withholding or refers to particular
    types of matters to be withheld.” 
    5 U.S.C. § 552
    (b)(3). It “differs from other FOIA exemptions
    in that its applicability depends less on the detailed factual contents of specific documents; the
    sole issue for decision is the existence of a relevant statute and the inclusion of withheld material
    within that statute’s coverage.” Goland, 
    607 F.2d at 350
    ; Ass’n of Retired R.R. Workers v. U.S.
    R.R. Ret. Bd., 
    830 F.2d 331
    , 336 (D.C. Cir. 1987). In other words, NSA “need only show that
    the statute claimed is one of exemption as contemplated by Exemption 3 and that the withheld
    material falls within the statute.” Larson v. Dep’t of State, 
    565 F.3d 857
    , 868 (D.C. Cir. 2009)
    (citing Fitzgibbon v. CIA, 
    911 F.2d 755
    , 761-62 (D.C. Cir. 1990)).
    NSA’s declarant explains that “any confirmation or denial that Plaintiff has been or is a
    target is precluded by three statutes.” Janosek Decl. ¶ 11. First, NSA relies on Section 6 of the
    National Security Agency Act of 1959, which in relevant part provides:
    11
    [N]othing in [the National Security Agency Act of 1959] or any
    other law . . . shall be construed to require the disclosure of the
    organization or any function of the [NSA], or any information with
    respect to the activities thereof, or the names, titles, salaries, or
    number of persons employed by such agency.
    
    50 U.S.C. § 402
     (note). 7 Second, NSA relies on 
    18 U.S.C. § 798
    , under which a person who
    knowingly and willfully discloses to an unauthorized person “any classified information . . .
    concerning the communication intelligence activities of the United States . . . or . . . obtained by
    the processes of communication intelligence from the communications of any foreign
    government, knowing the same have been obtained by such processes,” commits a criminal
    offense punishable by a fine or a maximum prison term of ten years or both. 
    18 U.S.C. § 798
    (a)(3), (4). Third, NSA relies on Section 102(A)(i)(1) of the Intelligence Reform and
    Terrorism Prevention Act of 2004, which provides that “[t]he Director of National Intelligence
    shall protect intelligence sources and methods from unauthorized disclosure.” 
    50 U.S.C. § 403
    -
    1(i)(1) (emphasis added). 8 It is settled that these statutes are among those contemplated by
    Exemption 3. See Am. Civil Liberties Union v. U.S. Dep’t of Defense, 
    628 F.3d 612
    , 619 (D.C.
    Cir. 2011) (recognizing prior holding that “the National Security Act, which also authorizes the
    Executive to withhold ‘intelligence sources and methods’ from public disclosure, 
    50 U.S.C. § 403
    –1(i)(1), qualifies as an exemption statute under [E]xemption 3”); Larson, 
    565 F.3d at 868
    (recognizing that 
    18 U.S.C. § 798
     qualifies as an Exemption 3 statute).
    The declarant asserts that the “release of any confirmation or denial that Plaintiff has
    been or is a target is precluded by . . . statute[].” Janosek Decl. ¶ 11. For this reason, NSA takes
    the position that “the existence or nonexistence of [the information Plaintiff requests] is exempt
    7
    This section of the National Security Agency Act of 1959, which formerly appeared as a
    note to 
    50 U.S.C. § 402
    , may now be found at 
    50 U.S.C. § 3605
    (a).
    8
    This section of the Intelligence Reform and Terrorism Prevention Act of 2004, which
    formerly appeared at 
    50 U.S.C. § 403-1
    , may now be found at 
    50 U.S.C. § 3024
    (i)(1).
    12
    from disclosure pursuant to Exemption[] . . . 3 of the FOIA.” 
    Id.
     The three statutes on which
    NSA relies, the declarant states, are designed “to protect the fragile nature of NSA’s SIGINT
    efforts to include, but not limited to, the existence and depth of signals intelligence-related
    successes, weaknesses, and exploitation techniques.” 
    Id. ¶ 20
    . “These statutes recognize the
    vulnerability of signals intelligence to countermeasures and the significance of the loss of
    valuable intelligence information to national policy makers and the Intelligence Community.”
    
    Id.
     Where “Congress specifically prohibited the disclosure of information related to NSA’s
    functions and activities and its communications intelligence activities, as well as the sources and
    methods used by the Intelligence Community as a whole,” the declarant concludes that “NSA’s
    SIGINT activities and functions, and its intelligence sources and methods[,] would be revealed if
    any of the withheld information about NSA’s collection were disclosed,” if any such information
    exists. 
    Id.
     “[A]cknowledgement of the existence or nonexistence of intelligence information
    relating to Plaintiff is prohibited by statute” and thus, concludes the declarant, is “exempt from
    disclosure” under FOIA. 
    Id. ¶ 21
    .
    F. Plaintiff’s Objections
    Plaintiff raises a handful of objections, none of which establishes the existence of a
    genuine issue of material fact in dispute with respect to NSA’s compliance with the FOIA.
    First, Plaintiff attacks the sufficiency of NSA’s supporting declaration. With respect to
    NSA’s reliance on Exemption 1, Plaintiff “denies that the withheld information substantively
    falls within the scope of Executive Order 13526.” Pl.’s Opp’n at 7. According to Plaintiff,
    “NSA’s response presupposes that every person on whom foreign intelligence is shared is [a]
    surveillance target,” 
    id.,
     even though “not all foreign intelligence received by NSA may have the
    13
    credibility to even come close to be considered surveillance information.” 
    id. at 8
    . He further
    disputes NSA’s assertion that revelation of the Agency’s “capability to collect specific
    communications . . . can so easily alert a surveillance target to the vulnerability of [his]
    communications.” 
    Id.
     Plaintiff deems this notion an “exceptional stretch of one’s imagination”
    and dismisses the argument as having “no real merit.” 
    Id.
     With respect to Exemption 3, while
    Plaintiff does not dispute the content or purpose of the three statutes on which NSA relies, he
    argues that the statutes are not designed “to unjustifiably excuse the [Agency] from providing a
    proper response under FOIA.” 
    Id. at 9
    . He sees no reason why NSA cannot protect its “raw
    data,” 
    id.,
     while disclosing to him a “final outcome” which withholds any sensitive information
    that is not personal to him, 
    id.
     For example, Plaintiff posits that “a set of operations is performed
    on signals intelligence so as to provide a refined, reproducible product to work with” and that he
    is entitled to the finished product “after all irrelevant information such as methods and
    techniques relating to national defence [sic] ha[ve] been stripped away,” 
    id. at 8
    ., without posing
    a risk to national security, see 
    id. at 9
    .
    The Agency’s declaration is “presumed to be in good faith,” and a requester “can rebut
    this presumption with evidence of bad faith.” Elec. Privacy Info. Ctr. v. Dep’t of Homeland Sec.,
    
    384 F. Supp. 2d 100
    , 107 (D.D.C. 2005) (citing SafeCard Servs., Inc. v. SEC, 
    926 F.2d 1197
    ,
    1200 (D.C. Cir.1991)). Plaintiff offers nothing more than opinion and speculation as to the
    deficiencies in the declaration, and therefore does not undermine the deference normally
    afforded to an agency, and particularly in the realm of national security matters. See Friedman
    v. U.S. Secret Service, No. 06-2125, 
    2013 WL 588288
    , at *14 (D.D.C. Feb. 14, 2013) (finding
    that, for Exemption 1, Plaintiff’s “speculation as to the declarants’ bad faith does not overcome
    the deference generally accorded to agency declarations.”).
    14
    Nor does Plaintiff demonstrate any other basis to conclude that NSA’s Glomar response,
    which is “an exception to the general rule that agencies must acknowledge the existence of
    information responsive to a FOIA request and provide specific, non-conclusory justifications for
    withholding that information,” Roth v. U.S. Dep't of Justice, 
    642 F.3d 1161
    , 1178 (D.C. Cir.
    2011), is not proper in this case. If there were any personal information about Plaintiff in NSA’s
    records, its very existence—without more—reveals classified intelligence information. Here,
    NSA refuses to confirm or deny the existence or nonexistence of the information Plaintiff
    requests because Exemptions 1 and 3 “would . . . preclude the acknowledgement of such
    documents.” Elec. Privacy Info. Ctr. v. NSA, 
    678 F.3d 926
    , 931 (D.C. Cir. 2012); see Wilner v.
    NSA, 
    592 F.3d 60
    , 70 (2d Cir. 2009) (stating that a Glomar response is “applicable in cases
    where to answer the FOIA inquiry would cause harm cognizable under a[ ] FOIA exception—in
    other words, in cases in which the existence or nonexistence of a record is a fact exempt from
    disclosure under a FOIA exception”) (quoting Gardels v. CIA, 
    689 F.2d 1100
    , 1103 (D.C. Cir.
    1982) (internal quotation marks omitted)), cert. denied, 
    131 S. Ct. 387
     (2010). “When the
    Agency’s position is that it can neither confirm nor deny the existence of the requested records,
    there are no relevant documents for the court to examine other than the affidavits which explain
    the Agency’s refusal.” Phillippi v. CIA, 
    546 F.2d 1009
    , 1013 (D.C. Cir. 1976).
    NSA establishes that any further response to Plaintiff’s FOIA request would result in
    disclosure of intelligence information which, in light of the NSA’s intelligence responsibilities,
    amounts to the disclosure of the sources of and methods by which its intelligence is collected.
    See Bassiouni v. CIA, 
    392 F.3d 244
    , 245 (7th Cir. 2004) (affirming a Glomar response to a first-
    person request for CIA records on the ground that “providing a list of the documents that
    mention [the requester], and claiming document-by-document exemptions for those whose
    15
    contents are classified, would reveal details about intelligence-gathering methods,” even if
    “disclosure could be innocuous”); People for the Am. Way Found. v. NSA/Cent. Sec. Serv., 
    462 F. Supp. 2d 21
    , 31 (D.D.C. 2006) (concluding that the NSA’s Glomar response to a request for
    records related to surveillance of Plaintiff was appropriate because confirmation that a person’s
    activities are not of foreign intelligence interest or that the NSA was unable to collect foreign
    intelligence information on his activities “would allow our adversaries to accumulate information
    and draw conclusions about NSA’s technical capabilities, sources, and methods”); see also Wolf
    v. CIA, 
    473 F.3d 370
    , 376 (concluding that revealing the existence of CIA records “regarding
    specific foreign nationals could potentially reveal targets of CIA surveillance and, thus, CIA
    methods” by “signal[ing] to a foreign intelligence service the specific persons and areas in which
    the CIA is interested and upon which it focuses its methods and resources”). Further, the
    Agency establishes that any such information is classified in accordance with Executive Order
    13,526, and is otherwise protected from release by the relevant provisions of the National
    Security Act of 1959, 
    18 U.S.C. § 798
    , and the Intelligence Reform and Terrorism Prevention
    Act of 2004.
    III. CONCLUSION
    The Court concludes that there are no genuine issues of material fact in dispute as to the
    NSA’s compliance with the FOIA, and that the NSA is entitled to judgment as a matter of law.
    Accordingly, Defendant’s motion for summary judgment will be granted. An Order
    accompanies this Memorandum Opinion.
    DATE: August 26, 2013                                 COLLEEN KOLLAR-KOTELLY
    United States District Judge
    16
    

Document Info

Docket Number: Civil Action No. 2012-0968

Citation Numbers: 962 F. Supp. 2d 130, 2013 WL 4505284, 2013 U.S. Dist. LEXIS 120559

Judges: Judge Colleen Kollar-Kotelly

Filed Date: 8/26/2013

Precedential Status: Precedential

Modified Date: 11/7/2024

Authorities (20)

People for the American Way Foundation v. National Security ... , 462 F. Supp. 2d 21 ( 2006 )

Span v. United States Department of Justice , 696 F. Supp. 2d 113 ( 2010 )

Harriet Ann Phillippi v. Central Intelligence Agency and ... , 546 F.2d 1009 ( 1976 )

Morton H. Halperin v. Central Intelligence Agency , 629 F.2d 144 ( 1980 )

Wolf v. Central Intelligence Agency , 473 F.3d 370 ( 2007 )

Defenders of Wildlife v. United States Border Patrol , 623 F. Supp. 2d 83 ( 2009 )

Military Audit Project, Felice D. Cohen, Morton H. Halperin ... , 656 F.2d 724 ( 1981 )

Students Against Genocide v. Department of State , 257 F.3d 828 ( 2001 )

Susan D. Goland and Patricia B. Skidmore v. Central ... , 607 F.2d 339 ( 1978 )

Cynthia King v. United States Department of Justice , 830 F.2d 210 ( 1987 )

Jack H. Taylor, Jr. v. Department of the Army , 684 F.2d 99 ( 1982 )

Nathan Gardels v. Central Intelligence Agency , 689 F.2d 1100 ( 1982 )

Association of Retired Railroad Workers, Inc. v. United ... , 830 F.2d 331 ( 1987 )

United States Department of Justice v. Tax Analysts , 109 S. Ct. 2841 ( 1989 )

Electronic Privacy Information Center v. National Security ... , 678 F.3d 926 ( 2012 )

Wilner v. National Security Agency , 592 F.3d 60 ( 2009 )

American Civil Liberties Union v. United States Department ... , 628 F.3d 612 ( 2011 )

Larson v. Department of State , 565 F.3d 857 ( 2009 )

Alan L. Fitzgibbon v. Central Intelligence Agency Alan L. ... , 911 F.2d 755 ( 1990 )

Electronic Privacy Information Center v. Department of ... , 384 F. Supp. 2d 100 ( 2005 )

View All Authorities »