In Re: Science Applications International Corp. (Saic) Backup Tape Data Theft Litigation ( 2014 )


Menu:
  •                             UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF COLUMBIA
    IN RE:
    SCIENCE APPLICATIONS
    INTERNATIONAL CORP. (SAIC)
    BACKUP TAPE DATA THEFT
    LITIGATION
    Misc. Action No. 12-347 (JEB)
    This document relates to:                                 MDL No. 2360
    ALL CASES
    MEMORANDUM OPINION
    In September 2011, a thief broke into a car sitting in a San Antonio parking garage and
    stole the car’s GPS system, stereo, and several data tapes. This seemingly run-of-the mill theft
    has spawned massive litigation. Why? Because of the contents of those pilfered tapes. The car,
    as it turns out, belonged to an employee of Science Applications International Corporation, an
    information-technology company that handles data for the federal government. And the tapes
    contained personal information and medical records concerning 4.7 million members of the U.S.
    military (and their families) who were enrolled in TRICARE health care, which contracts with
    SAIC – somewhat ironically – to protect patients’ data.
    Plaintiffs, who are potential victims of the data breach, filed a number of lawsuits in
    various courts around the country alleging harm from an increased likelihood of identity theft
    and from an invasion of their privacy, among other things. Eight of those suits have been
    consolidated here as a multi-district litigation. Recently, SAIC and the three Government
    Defendants – TRICARE, the Department of Defense, and its Secretary, Chuck Hagel – moved to
    dismiss the now-consolidated Complaint. Defendants claim that the service members can show
    1
    no injury based on the data breach and hence lack standing to sue in federal court; in addition,
    SAIC and the Government contend, none of the victims has stated a claim for relief under any of
    the many federal and state laws that might protect them. Plaintiffs rejoin that they have, in fact,
    been injured by the breach and that their various causes of action – ranging from state tort law to
    the federal Privacy Act of 1974 – are sound.
    This case presents thorny standing issues regarding when, exactly, the loss or theft of
    something as abstract as data becomes a concrete injury. That is, when is a consumer actually
    harmed by a data breach – the moment data is lost or stolen, or only after the data has been
    accessed or used by a third party? As the issue has percolated through various courts, most have
    agreed that the mere loss of data – without evidence that it has been either viewed or misused –
    does not constitute an injury sufficient to confer standing. This Court agrees. Mere loss of the
    data is all that most Plaintiffs allege here, so the majority must be dismissed from this case. Two
    Plaintiffs, however, do plausibly assert that their data was accessed or abused, and those victims
    may move forward with their claims.
    Standing thus resolved, the Court would typically next delve into the merits of the
    remaining Plaintiffs’ claims. In this case, however, the Court believes it more advisable to pause
    and confer with the litigants. The dismissal of most Plaintiffs will have serious consequences
    moving forward, which may well alter the parties’ perceptions of the case and how they prefer to
    proceed. Not every count in the Complaint applies to every Plaintiff, for example – so many of
    the counts may fall on that basis alone. Given that many of the Plaintiffs have been dismissed,
    moreover, they may desire to appeal immediately, which the Court might sanction. See Fed. R.
    Civ. P. 54(b). This matter was, after all, intended to proceed as a class action, and the number of
    potential class members has now considerably diminished. The Court will thus hold a status
    2
    hearing to assess the parties’ intentions before taking up the question of whether the two
    remaining Plaintiffs have stated a legal claim.
    I.       Background
    A. Factual Background
    As outlined above, this case revolves around the theft of several data tapes from an SAIC
    employee’s car in 2011. See Compl., ¶¶ 99-100. As the police report indicates, those tapes were
    taken along with a GPS and stereo when a criminal smashed a window and broke into the vehicle
    in mid-September. See SAIC Mot., Exh. A (San Antonio Police Report of Sept. 14, 2011) at 2-
    3; Compl., ¶ 100.1 Despite the efforts of law enforcement, the thief was never apprehended.
    The tapes were backup copies of medical data related to over 4 million TRICARE
    beneficiaries who had received medical treatment or testing in San Antonio, Texas. See Compl.,
    ¶ 93. On September 29, 2011, TRICARE released a statement detailing the data breach to alert
    customers to the situation. See 
    id. In November,
    SAIC mailed letters to affected service
    members explaining the scope of the theft and noting that “the information contained on the
    tapes may include names, Social Security Numbers, addresses, dates of birth, phone numbers,”
    and a variety of medical information. SAIC Mot., Exh. B (Letter from SAIC to Customer (Nov.
    16, 2011)) at 1; see Compl., ¶ 94.2 But the tapes did not include “any financial data, such as
    credit card or bank account information.” Letter from SAIC at 1. SAIC also observed, “The
    chance that [any] information could be obtained from these tapes is low since accessing, viewing
    and using the data requires specific hardware and software.” 
    Id. SAIC nevertheless
    offered all
    1
    The police report is a public record subject to judicial notice. See Kaempe v. Myers, 
    367 F.3d 958
    , 965
    (D.C. Cir. 2004). In addition, when a court considers jurisdictional arguments, it may rely on evidence outside of
    the Complaint. See Jerome Stevens Pharms., Inc. v. FDA, 
    402 F.3d 1249
    , 1253 (D.C. Cir. 2005).
    2
    The Letter from SAIC is incorporated by reference into the Consolidated Amended Complaint, which
    relies on it heavily. See, e.g., Compl., ¶¶ 30-62, 114-17.
    3
    affected parties free credit monitoring and identity-theft protection and restoration services for
    one year. See 
    id. Still, Plaintiffs
    claim that the data breach caused them substantial harm. Twenty-four of
    the thirty-three Plaintiffs here allege that they have been injured because of the disclosure alone.3
    They claim that, even if no one has yet used their personal information, they face an increased
    risk of identity theft, which they view as a distinct and palpable harm. See Compl., ¶¶ 20, 23.
    They also claim that the data breach violated their expectation of privacy, as codified in various
    statutes, state tort law, and possibly through contract. See 
    id., ¶¶ 1,
    20, 21, 24. In addition, five
    of those twenty-four Plaintiffs claim that they have spent time or money monitoring their credit
    or interfacing with their banks since the theft, and that their time and effort should be
    compensable.4
    Six Plaintiffs also claim that someone used their credit cards or bank accounts without
    their authorization, although no one alleges that financial information was actually on the stolen
    tapes.5 One of those six additionally claims that loans have been opened in his name using his
    personal information – presumably including his social security number, name, date of birth, and
    address, all of which were on the backup tapes.6 Yet another Plaintiff alleges that she was
    harmed because her medical identity has disappeared.7 Finally, two Plaintiffs allege that they
    have received unwanted phone calls or “phishing” emails, and one of those Plaintiffs claims that
    marketers have information about her medical condition that they likely obtained from the tapes.8
    3
    Compl., ¶¶ 30 (Adcock), 31 (Arellano), 32 (Bacon), 33 (Bates), 34 (Biggerman), 36 (Deatrick), 37
    (Erickson), 39 (Hartman), 42 (Johnson), 44 (Losack), 45 (Martin), 46 (Moss-McUmber), 47 (Miller), 50 (Newman),
    51 (O’Hara-Epperly), 52 (Palmer), 53 (Peting), 54 (Pineirovigo), 55 (Reznikov), 56 (Richardson), 57 (Roe), 58
    (Trower), 59 (Walters), 61 (Worrell).
    4
    Compl., ¶¶ 37 (Erickson), 44 (Losack), 52 (Palmer), 56 (Richardson), 59 (Walters).
    5
    Compl., ¶¶ 35 (Curtis), 38 (Gaffney), 40 (Hawk), 41 (Hernandez), 43 (Keller), 48 (Morelli).
    6
    Compl., ¶ 35 (Curtis).
    7
    Compl., ¶ 60 (Warner).
    8
    Compl., ¶¶ 49 (Moskowitz), 62 (Yarde).
    4
    Plaintiffs filed this lawsuit against TRICARE, which is a government agency that
    provides insurance coverage and health care to active-duty service members and their families,
    see 10 U.S.C. §§ 1074, 1076, 1079; 32 C.F.R. pt. 199; Compl., ¶ 3, 9 and against the Department
    of Defense and its Secretary. The breach victims are also suing SAIC, a security firm that
    contracts with TRICARE to ensure the security of the personally identifiable information (PII)
    and protected health information (PHI) in its records. See Compl., ¶ 67.
    In their Consolidated Amended Complaint, Plaintiffs allege no fewer than twenty
    separate causes of action, ranging from the violation of various federal statutes – such as the
    Privacy Act, the Fair Credit Reporting Act, and the Administrative Procedure Act – to the
    contravention of state statutes and common law – such as claims of negligence, breach of
    contract, and violation of various state consumer-protection laws. The injuries alleged include:
    (i) increased risk of identity theft, which Plaintiffs peg at 9.5 times their pre-theft risk; (ii)
    expenses incurred in mitigating the risk of identity theft; (iii) loss of privacy through the
    exposure of their personal information; (iv) loss of the value of their personal and medical
    information; (v) loss of the value of their insurance premiums, which should have been used to
    pay for proper security measures; (vi) SAIC’s failure to meet the requisite standard for data
    security; (vii) the lost right to truthful information about their data security; (viii) statutory (or
    liquidated) damages; and, in at least one case, (ix) actual identity theft. Compl., ¶¶ 20-23. The
    Court will address each theory of injury in turn as it analyzes the standing of Plaintiffs to
    proceed.
    9
    At the time this suit was filed, TRICARE was overseen by a group called Tricare Management Activity,
    which is the entity Plaintiffs originally sued. TMA has since been disestablished, and the Defense Health Agency
    has taken over TMA’s duties. See TMA, Defense Health Agency, http://www.tricare.mil/tma/ (last visited May 1,
    2014). For ease, the Court refers to both TRICARE and its management agency jointly as TRICARE.
    5
    B. Procedural Background
    This action encompasses eight separate cases filed in four different courts around the
    country. While most of those actions originated here in D.C., others were transferred from the
    Northern and Southern Districts of California as well as the Western District of Texas. See ECF
    No. 1 (Transfer Order) at 1-3. Consolidation of those cases for pretrial purposes took effect in
    June 2012, 
    id., and in
    August of that year the Court held a hearing to sort out the administrative
    details of the newly combined multi-district litigation. See ECF No. 13 (Hearing Tr.) at 6. In
    October 2012, Plaintiffs filed a Consolidated Amended Complaint encompassing the allegations
    of thirty-three Plaintiffs from twenty-four states. See Compl., ¶¶ 1, 154. In November 2012,
    Defendants moved to dismiss all thirty-three Plaintiffs for lack of standing or, in the alternative,
    to dismiss each cause of action as unsupported by the factual allegations in the Complaint. Since
    that time, Plaintiffs have moved to supplement their pleadings, Defendants have filed multiple
    notices of supplemental authority, and the case has been reassigned from one judge to another.
    Having recently taken the reins, this Court now addresses the first major issue raised by
    the Motions to Dismiss: standing.
    II.     Legal Standard
    Because this Opinion addresses only Defendants’ jurisdictional arguments, Federal Rule
    of Civil Procedure 12(b)(1) provides the relevant legal standard.
    In evaluating Defendants’ Motions to Dismiss, then, the Court must “treat the
    complaint’s factual allegations as true . . . and must grant plaintiff ‘the benefit of all inferences
    that can be derived from the facts alleged.’” Sparrow v. United Air Lines, Inc., 
    216 F.3d 1111
    ,
    1113 (D.C. Cir. 2000) (quoting Schuler v. United States, 
    617 F.2d 605
    , 608 (D.C. Cir. 1979))
    (internal citation omitted); see also Jerome Stevens Pharms., Inc. v. FDA, 
    402 F.3d 1249
    , 1253
    6
    (D.C. Cir. 2005). This standard governs the Court’s considerations of Defendants’ Motions
    under both Rules 12(b)(1) and 12(b)(6). See Scheuer v. Rhodes, 
    416 U.S. 232
    , 236 (1974) (“in
    passing on a motion to dismiss, whether on the ground of lack of jurisdiction over the subject
    matter or for failure to state a cause of action, the allegations of the complaint should be
    construed favorably to the pleader”); Walker v. Jones, 
    733 F.2d 923
    , 925-26 (D.C. Cir. 1984)
    (same). The Court need not accept as true, however, “a legal conclusion couched as a factual
    allegation,” nor an inference unsupported by the facts set forth in the Complaint. Trudeau v.
    Fed. Trade Comm’n, 
    456 F.3d 178
    , 193 (D.C. Cir. 2006) (quoting Papasan v. Allain, 
    478 U.S. 265
    , 286 (1986)) (internal quotation marks omitted). In addition, the “complaint must contain
    sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’”
    Ashcroft v. Iqbal, 
    129 S. Ct. 1937
    , 1949 (2009) (quoting Bell Atlantic Corp. v. Twombly, 
    550 U.S. 54
    , 570 (2007)).
    To survive a motion to dismiss under Rule 12(b)(1), Plaintiffs bear the burden of proving
    that the Court has jurisdiction to hear their claims. See Lujan v. Defenders of Wildlife, 
    504 U.S. 555
    , 561 (1992); U.S. Ecology, Inc. v. U.S. Dep’t of Interior, 
    231 F.3d 20
    , 24 (D.C. Cir. 2000).
    A court has an “affirmative obligation to ensure that it is acting within the scope of its
    jurisdictional authority.” Grand Lodge of Fraternal Order of Police v. Ashcroft, 
    185 F. Supp. 2d 9
    , 13 (D.D.C. 2001). For this reason, “‘the [p]laintiff’s factual allegations in the complaint . . .
    will bear closer scrutiny in resolving a 12(b)(1) motion’ than in resolving a 12(b)(6) motion for
    failure to state a claim.” 
    Id. at 13-14
    (quoting 5A Charles A. Wright & Arthur R. Miller, Federal
    Practice and Procedure § 1350 (2d ed. 1987)) (alteration in original). Additionally, unlike with a
    motion to dismiss under Rule 12(b)(6), the Court “may consider materials outside the pleadings
    in deciding whether to grant a motion to dismiss for lack of jurisdiction.” Jerome Stevens
    7
    
    Pharms., 402 F.3d at 1253
    ; see also Venetian Casino Resort, LLC v. EEOC, 
    409 F.3d 359
    , 366
    (D.C. Cir. 2005); Herbert v. Nat’l Academy of Sciences, 
    974 F.2d 192
    , 197 (D.C. Cir. 1992).
    III.   Analysis
    Before examining the merits of any claim, courts must begin with questions of
    jurisdiction. See Fla. Audubon Soc’y v. Bentsen, 
    94 F.3d 658
    , 663 (D.C. Cir. 1996) (en banc).
    Plaintiffs’ first battle, then, is to prove that they have standing to pursue their claims. See Steel
    Co. v. Citizens for a Better Env’t, 
    523 U.S. 83
    , 93-95 (1998). That, as it turns out, is an uphill
    climb for all but two of the named Plaintiffs.
    Article III of the Constitution limits the power of the federal judiciary to the resolution of
    “Cases” and “Controversies.” U.S. Const. art. III, § 2; see also Allen v. Wright, 
    468 U.S. 737
    ,
    750 (1984) (discussing the case-or-controversy requirement). Because “standing is an essential
    and unchanging part of the case-or-controversy requirement of Article III,” Lujan v. Defenders
    of Wildlife, 
    504 U.S. 555
    , 560 (1992), standing is a necessary “predicate to any exercise of [the
    Court’s] jurisdiction.” Fla. Audubon 
    Soc’y, 94 F.3d at 663
    .
    “Every plaintiff in federal court,” consequently, “bears the burden of establishing the
    three elements that make up the ‘irreducible constitutional minimum’ of Article III standing:
    injury-in-fact, causation, and redressability.” Dominguez v. UAL Corp., 
    666 F.3d 1359
    , 1362
    (D.C. Cir. 2012) (quoting 
    Lujan, 504 U.S. at 560-61
    ). Even in the class-action context, all
    named Plaintiffs “must allege and show that they personally have been injured, not that injury
    has been suffered by other, unidentified members of the class to which they belong and which
    they purport to represent.” Warth v. Seldin, 
    422 U.S. 490
    , 502 (1975) (emphasis added). Each
    element of standing must be pled or proven with the requisite “degree of evidence required at the
    successive stages of the litigation.” 
    Lujan, 504 U.S. at 561
    . That is, at the motion-to-dismiss
    8
    stage, Plaintiffs must plead facts that, taken as true, make the existence of standing plausible.
    See Galaria v. Nationwide Mut. Ins. Co., Nos. 13-118, 13-257, 
    2014 WL 689703
    , at *3 (S.D.
    Ohio Feb. 10, 2014) (emphasis added). In “considering whether a plaintiff has Article III
    standing, a federal court must assume arguendo the merits of his or her legal claim.” Parker v.
    District of Columbia, 
    478 F.3d 370
    , 377 (D.C. Cir. 2007), aff’d on other grounds sub nom.
    District of Columbia v. Heller, 
    554 U.S. 570
    (2008).
    A. Injury in Fact
    The Court will examine each element of standing in turn, beginning with injury in fact.
    An injury in fact is “an invasion of a legally protected interest which is (a) concrete and
    particularized and (b) actual or imminent, not conjectural or hypothetical.” 
    Lujan, 504 U.S. at 560
    (citations and internal quotation marks omitted). “Allegations of possible future injury do
    not satisfy the requirements of Art. III. A threatened injury must be certainly impending to
    constitute injury in fact.” Whitmore v. Arkansas, 
    495 U.S. 149
    , 158 (1990) (internal quotation
    marks omitted) (emphasis added).
    The Supreme Court recently reviewed the contours of this requirement in Clapper v.
    Amnesty International USA, 
    133 S. Ct. 1138
    (2013). There, plaintiffs – who were attorneys and
    human-rights, labor, legal, and media organizations who worked with foreign clients or sources –
    contended that they were likely to be targeted for surveillance under the Foreign Intelligence
    Surveillance Act. See 
    id. at 1145-46.
    This, they claimed, would work them harm. As such, they
    had taken steps to keep conversations with their clients confidential at their own personal
    expense. See 
    id. The Court
    held, however, that plaintiffs did not have an injury in fact because
    the threat of surveillance was too speculative. There were, the Court reasoned, simply too many
    “ifs” involved before an injury came to pass. The plaintiffs would be impacted by FISA only if
    9
    (1) the government decided to target communications involving their clients and (2) used the
    challenged FISA provision to do so, (3) the Foreign Intelligence Surveillance Court authorized
    the eavesdropping, (4) the government succeeded in picking up their targets’ phone calls or e-
    mails, and, finally, (5) the plaintiffs were involved in whatever communication the government
    intercepted. 
    Id. at 1147-48.
    The Court concluded that such “a highly attenuated chain of
    possibilities[] does not satisfy the requirement that threatened injury must be certainly
    impending.” 
    Id. at 1148;
    see also 
    Whitmore, 495 U.S. at 156-57
    (speculative to assume that
    petitioner would request federal habeas review; habeas would be granted; petitioner would be
    retried for his capital offense; and thus, on appeal from this new trial, petitioner would suffer due
    to a lack of data on similarly situated criminal defendants); O’Shea v. Littleton, 
    414 U.S. 488
    ,
    496-97 (1974) (injury speculative where plaintiff would need to violate the law, be arrested, and
    be tried before a specific magistrate judge to be harmed by the judge’s allegedly illegal
    courtroom practice); Los Angeles v. Lyons, 
    461 U.S. 95
    , 105-09 (1983) (injury conjectural or
    hypothetical where plaintiff would have to commit an illegal act, be arrested, and be subjected to
    a chokehold in the future for injury to occur).
    The Court added, “Respondents’ contention that they have standing because they
    incurred certain costs as a reasonable reaction to a risk of harm” was also “unavailing – because
    the harm respondents seek to avoid is not certainly impending. In other words, respondents
    cannot manufacture standing merely by inflicting harm on themselves based on their fears of
    hypothetical future harm that is not certainly impending.” 
    Clapper, 133 S. Ct. at 1151
    .
    With those precepts in mind – that an injury must be present or certainly impending, that
    an attenuated chain of possibilities does not confer standing, and that plaintiffs cannot create
    10
    standing by taking steps to avoid an otherwise speculative harm – the Court turns to Plaintiffs’
    allegations of injury here.
    1. Increased Risk of Harm and Monitoring Costs
    Plaintiffs begin by asserting that an increased risk of harm alone constitutes an injury
    sufficient to confer standing to sue. Due to the data breach, they claim that they are 9.5 times
    more likely than the average person to become victims of identity theft. Compl., ¶ 23. That
    increased risk, they maintain, in and of itself confers standing. But as Clapper makes clear, that
    is not true. The degree by which the risk of harm has increased is irrelevant – instead, the
    question is whether the harm is certainly impending. See also Public Citizen, Inc. v. Nat’l
    Highway Traffic Safety Admin., 
    489 F.3d 1279
    , 1297-98 (D.C. Cir. 2007) (“‘increased risk’ is”
    not by “itself [a] concrete, particularized, and actual injury for standing purposes” – harm must
    be “actual” or “imminent,” not merely “increased”).
    Here, the relevant harm alleged is identity theft. A handful of Plaintiffs claims that they
    have suffered actual identity theft, and those Plaintiffs have clearly suffered an injury. At least
    twenty-four, however, allege only a risk of identity theft. 
    See supra
    n.3. At this point, the
    likelihood that any individual Plaintiff will suffer harm remains entirely speculative. For identity
    theft to occur, after all, the following chain of events would have to transpire: First, the thief
    would have to recognize the tapes for what they were, instead of merely a minor addition to the
    GPS and stereo haul. Data tapes, after all, are not something an average computer user often
    encounters. The reader, for example, may not even be aware that some companies still use tapes
    – as opposed to hard drives, servers, or even CDs – to back up their data. See Disk or Tape
    Backup: Which is Best?, Backup For Servers, http://goo.gl/7JsXQF (last visited Apr. 28, 2014).
    Then, the criminal would have to find a tape reader and attach it to her computer. Next, she
    11
    would need to acquire software to upload the data from the tapes onto a computer – otherwise,
    tapes have to be slowly spooled through like cassettes for data to be read. 
    Id. After that,
    portions of the data that are encrypted would have to be deciphered. See Compl., ¶ 95 (“a
    portion of the PII/PHI on the data tapes was encrypted”). Once the data was fully unencrypted,
    the crook would need to acquire a familiarity with TRICARE’s database format, which might
    require another round of special software. Finally, the larcenist would have to either misuse a
    particular Plaintiff’s name and social security number (out of 4.7 million TRICARE customers)
    or sell that Plaintiff’s data to a willing buyer who would then abuse it.
    The vast majority of Plaintiffs has not alleged that any of those things have happened –
    because they cannot. Those events are entirely dependent on the actions of an unknown third
    party – namely, the thief. At this point, we do not know who she was, how much she knows
    about computers, or what she has done with the tapes. The tapes could be uploaded onto her
    computer and fully deciphered, or they could be lying in a landfill somewhere in Texas because
    she trashed them after achieving her main goal of boosting the car stereo and GPS.
    Unfortunately, there is simply no way to know until either the crook is apprehended or the data is
    actually used. Courts for this reason are reluctant to grant standing where the alleged future
    injury depends on the actions of an independent third party. See 
    Clapper, 133 S. Ct. at 1150
    (expressing “our usual reluctance to endorse standing theories that rest on speculation about the
    decisions of independent actors”).
    That is, no doubt, cold comfort to the millions of servicemen and women who must wait
    and watch their credit reports until something untoward occurs. After all, it is reasonable to fear
    the worst in the wake of such a theft, and it is understandably frustrating to know that the safety
    of your most personal information could be in danger. The Supreme Court, however, has held
    12
    that an “objectively reasonable likelihood” of harm is not enough to create standing, even if it is
    enough to engender some anxiety. See 
    id., 133 S. Ct.
    at 1147-48. Plaintiffs thus do not have
    standing based on risk alone, even if their fears are rational.
    Nor is the cost involved in preventing future harm enough to confer standing, even when
    such efforts are sensible. See 
    id. at 1150-51.
    There is, after all, nothing unreasonable about
    monitoring your credit after a data breach. In fact, that is exactly what TRICARE and SAIC
    advised Plaintiffs to do – and what SAIC, in part, offered to pay for. See, e.g., Letter from SAIC
    at 1. But the Supreme Court has determined that proactive measures based on “fears of
    . . . future harm that is not certainly impending” do not create an injury in fact, even where such
    fears are not unfounded. 
    Clapper, 133 S. Ct. at 1151
    . Put another way, the Court has held that
    plaintiffs cannot create standing by “inflicting harm on themselves” to ward off an otherwise
    speculative injury. 
    Id. The cost
    of credit monitoring and other preventive measures, therefore,
    cannot create standing.
    There is, however, an alternative argument. Plaintiffs point out that, in Clapper, the
    Court acknowledged that it sometimes “found standing based on a ‘substantial risk’ that . . .
    harm will occur, which [could] prompt plaintiffs to reasonably incur costs to mitigate or avoid
    that harm.” 
    Clapper, 133 S. Ct. at 1150
    n.5 (emphasis added). So Plaintiffs could, theoretically,
    prevail if the risk of harm here were substantial. Yet, Plaintiffs’ Complaint itself makes clear
    that they do not surmount that hurdle. To be sure, Plaintiffs allege that data-breach victims in
    general are 9.5 times more likely than the average person to experience identity theft post-
    breach. Compl., ¶ 132. But then Plaintiffs note that, overall, only about 19% of breach victims
    actually experience identity theft. 
    Id. By Plaintiff’s
    own calculations, then, injury is likely not
    impending for over 80% of victims – and the figure is likely to be considerably higher in this
    13
    case, where the theft was unsophisticated and where the lack of widespread harm suggests that
    the tapes have not ever been accessed. Cf. Galaria, 
    2014 WL 689703
    , at *5. The harm in these
    circumstances, therefore, cannot satisfy the requirement of either the Supreme Court or the D.C.
    Circuit that there be “(i) a substantially increased risk of harm and (ii) a substantial probability of
    harm with that increase taken into account.” Public Citizen, 
    Inc., 489 F.3d at 1295
    .
    The conclusion that an increased risk of harm alone does not confer standing is supported
    by other courts’ analyses in similar data-breach cases. In Reilly v. Ceridian Corp., 
    664 F.3d 38
    (3d Cir. 2011), for example, a payroll company’s database was hacked, possibly exposing
    “employees’ names, addresses, social security numbers, dates of birth, and bank account
    information.” 
    Id. at 40.
    Still, the Third Circuit held that, where it was “not known whether the
    hacker read, copied, or understood the data,” injury remained speculative. 
    Id. In Randolph
    v.
    ING Life Insurance & Annuity Co., 
    486 F. Supp. 2d 1
    (D.D.C. 2007), an unknown crook pilfered
    a laptop containing insurance information, including the “names, addresses, and Social Security
    numbers” of customers. 
    Id. at 3.
    Nonetheless, because plaintiffs did “not allege that the burglar
    who stole the laptop did so in order to access their Information, or that their Information has
    actually been accessed since the laptop was stolen,” it was “mere speculation” to assume “that at
    some unspecified point in the indefinite future they w[ould] be the victims of identity theft.” 
    Id. at 7-8;
    see also Whitaker v. HealthNet of Cal., Inc., No. 11-910, 
    2012 WL 174961
    , at *2 (E.D.
    Cal. Jan. 20, 2012) (“[P]laintiffs do not explain how the loss here has actually harmed them . . .
    or that third parties have accessed their data. Any harm stemming from their loss thus is
    precisely the type of conjectural and hypothetical harm that is insufficient to allege standing.”)
    (footnote omitted); Hammond v. Bank of N.Y. Mellon Corp., No. 08-6060, 
    2010 WL 2643307
    ,
    at *7 (S.D.N.Y. June 25, 2010) (“Plaintiffs lack standing” where backup data tapes were stolen
    14
    and most plaintiffs alleged only a risk of harm “because their claims are future-oriented,
    hypothetical, and conjectural.”); Allison v. Aetna, Inc., No. 09-2560, 
    2010 WL 3719243
    , at *5
    (E.D. Pa. Mar. 9, 2010) (“Plaintiff’s alleged injury of an increased risk of identity theft is far too
    speculative.”); Amburgy v. Express Scripts, Inc., 
    671 F. Supp. 2d 1046
    , 1052 (E.D. Mo. 2009)
    (no standing where “plaintiff does not claim that his personal information has in fact been stolen
    and/or his identity compromised” in the data breach); Bell v. Acxiom Corp., No. 06-485, 
    2006 WL 2850042
    , at *2 (E.D. Ark. Oct. 3, 2006) (“[W]hile there have been several lawsuits alleging
    an increased risk of identity theft, no court has considered the risk itself to be damage. Only
    where the plaintiff has actually suffered identity theft has the court found that there were
    damages.”) (footnote omitted); Key v. DSW, Inc., 
    454 F. Supp. 2d 684
    , 690 (S.D. Ohio 2006) (In
    data-breach case, “plaintiff’s allegations, if true, create only the possibility of harm at a future
    date. Plaintiff[] alleges that her potential injury is contingent upon her information being
    obtained and then used by an unauthorized person for an unlawful purpose.”) (citation omitted);
    Giordano v. Wachovia Sec., LLC, No. 06-476, 
    2006 WL 2177036
    , at *5 (D.N.J. July 31, 2006)
    (“Plaintiff only alleges a potential injury (identity theft) that is contingent on (1) Plaintiff’s
    information falling into the hands of an unauthorized person and (2) that person using such
    information for unlawful purposes to Plaintiff’s detriment.”).
    Litigants’ cost-of-monitoring claims fared no better. See, e.g., 
    Reilly, 664 F.3d at 46
    (“Appellants’ alleged time and money expenditures to monitor their financial information do not
    establish standing, because costs incurred to watch for a speculative chain of future events based
    on hypothetical future criminal acts are no more ‘actual’ injuries than the alleged ‘increased risk
    of injury’ which forms the basis for Appellants’ claims.”); 
    Randolph, 486 F. Supp. 2d at 8
    (The
    “argument that the time and money spent monitoring a plaintiff’s credit suffices to establish an
    15
    injury overlook[s] the fact that their expenditure of time and money was not the result of any
    present injury, but rather the anticipation of future injury that has not materialized.”) (internal
    quotation marks omitted).
    This is not to say that courts have uniformly denied standing in data-breach cases. See,
    e.g., Holmes v. Countrywide Fin. Corp., No. 08-205, 
    2012 WL 2873892
    , at *5-*11(W.D. Ky.
    July 12, 2012); McLoughlin v. People’s United Bank, Inc., No. 08-944, 
    2009 WL 2843269
    , at
    *3-*4 (D. Conn. Aug. 31, 2009); Doe 1 v. AOL, 
    719 F. Supp. 2d 1102
    , 1109 (N.D. Cal. 2010);
    Caudle v. Towers, Perrin, Forster & Crosby, Inc., 
    580 F. Supp. 2d 273
    , 279-80 (S.D.N.Y. 2008).
    Most cases that found standing in similar circumstances, however, were decided pre-Clapper or
    rely on pre-Clapper precedent and are, at best, thinly reasoned. For example, in Ruiz v. Gap,
    Inc., 380 Fed. Appx. 689 (9th Cir. 2010) (Gap III), the court stated that a “credible threat of harm
    is sufficient to constitute actual injury for standing purposes.” 
    Id. at 691;
    see also, e.g., Krottner
    v. Starbucks Corp., 
    628 F.3d 1139
    , 1142 (9th Cir. 2010) (“the possibility of future injury may be
    sufficient to confer standing on plaintiffs; threatened injury constitutes ‘injury in fact’”) (quoting
    Cent. Delta Water Agency v. United States, 
    306 F.3d 938
    , 947 (9th Cir. 2002)); Pisciotta v. Old
    Nat’l Bancorp, 
    499 F.3d 629
    , 632 (7th Cir. 2007) (standing because “the scope and manner of
    access suggests that the intrusion was sophisticated, intentional and malicious”). Yet after
    Clapper, Gap III’s “credible threat of harm” standard is clearly not supportable.
    Indeed, since Clapper was handed down last year, courts have been even more emphatic
    in rejecting “increased risk” as a theory of standing in data-breach cases. As one court noted,
    after “Clapper, the mere fact that the risk has been increased does not suffice to establish
    standing.” Strautins v. Trustwave Holdings, Inc., No. 12-9115, 
    2014 WL 960816
    , at *4 (N.D.
    Ill. Mar. 12, 2014). After all, an increased risk or credible threat of impending harm is plainly
    16
    different from certainly impending harm, and certainly impending harm is what the Constitution
    and Clapper require. 
    Clapper, 133 S. Ct. at 1148
    ; see, e.g., Strautins, 
    2014 WL 960816
    , at *4
    (deciding in light of Clapper that injury was speculative based “on a number of variables, such as
    whether their data was actually taken during the breach, whether it was subsequently sold or
    otherwise transferred, whether anyone who obtained the data attempted to use it, and whether or
    not they succeeded”); Galaria, 
    2014 WL 689703
    , at *5 (noting the similarity to Clapper and
    holding that “[i]n this case, an increased risk of identity theft, identity fraud, medical fraud or
    phishing is not itself an injury-in-fact because Named Plaintiffs did not allege – or offer facts to
    make plausible – an allegation that such harm is ‘certainly impending’”); Polanco v. Omnicell,
    Inc., No. 13-1417, 
    2013 WL 6823265
    , at *14 (D.N.J. Dec. 26, 2013) (relying on Clapper and
    Reilly to conclude that mere loss of data, without misuse, is not “an injury sufficient to confer
    standing”); but see In re Sony Gaming Networks & Customer Data Sec. Breach Litigation, MDL
    No. 11-2258, 
    2014 WL 223677
    , at *9 (S.D. Cal. Jan. 21, 2014) (finding standing post-Clapper
    based on a “plausibly alleged . . . ‘credible threat’ of impending harm”).
    In sum, increased risk of harm alone does not constitute an injury in fact. Nor do
    measures taken to prevent a future, speculative harm. At least twenty-four of the thirty-three
    Plaintiffs in this case, then, must rely on an alternative theory of injury.
    2. Privacy
    Plaintiffs also allege that they have been injured because their privacy was invaded by the
    data breach. Yet this claim suffers from the same defects as Plaintiffs’ previous contention. For
    a person’s privacy to be invaded, their personal information must, at a minimum, be disclosed to
    a third party. Existing case law and legislation support that common-sense intuition: If no one
    has viewed your private information (or is about to view it imminently), then your privacy has
    17
    not been violated. See, e.g., 5 C.F.R. § 297.102 (Under Privacy Act, “[d]isclosure means
    providing personal review of a record, or a copy thereof, to someone other than the data subject
    or the data subject’s authorized representative, parent, or legal guardian.”) (emphasis added);
    Walia v. Chertoff, No. 06-6587, 
    2008 WL 5246014
    , at *11 (E.D.N.Y. Dec. 17, 2008)
    (“accessibility” is not the same as “active disclosure”); Schmidt v. Dep’t of Veterans Affairs, 
    218 F.R.D. 619
    , 630 (E.D. Wisc. 2003) (Disclosure is “the placing into the view of another
    information which was previously unknown,” requiring that information be “actually viewed.”);
    Harper v. United States, 
    423 F. Supp. 192
    , 197 (D.S.C. 1976) (Disclose means “the imparting of
    information which in itself has meaning and which was previously unknown to the person to
    whom it was imparted.”); Fairfax Hosp. v. Curtis, 
    492 S.E.2d 642
    , 644 (Va. 1997) (violation
    where third party “possess[ed]” and “reviewed” records).
    Here, the majority of Plaintiffs contend neither that their personal information has been
    viewed nor that their information has been exposed in a way that would facilitate easy, imminent
    access. As in the Third Circuit case Reilly, it would be speculative to assume that the thief
    “read, copied, or understood the 
    data.” 664 F.3d at 40
    . As a result, no invasion of Plaintiffs’
    privacy is imminent. See also Katz v. Pershing, LLC, 
    672 F.3d 64
    (1st Cir. 2012) (dismissing
    privacy claim for lack of standing where information had not been viewed by third party);
    Allison, 
    2010 WL 3719243
    (no standing in data-breach case, even where claim involved
    invasion of privacy); Giordano, 
    2006 WL 2177036
    (same); Strautins, 
    2014 WL 960816
    (same);
    but see Galaria, 
    2014 WL 689703
    (allowing standing for certain claims based only on invasion
    of privacy); Am. Fed’n of Gov’t Emps. v. Hawley, 
    543 F. Supp. 2d 44
    , 50 n.12 (D.D.C. 2008)
    (“emotional trauma alone is sufficient to qualify as an” injury “under Section 552a(g)(1)(D) of
    the Privacy Act”) (internal quotation marks and alterations omitted).
    18
    To be sure, the Supreme Court has intimated that disclosure of personally identifiable
    information alone, along with some attendant emotional distress, may constitute “injury enough
    to open the courthouse door” in privacy actions. Doe v. Chao, 
    540 U.S. 614
    , 624-25 (2004). But
    again, disclosure involves publication to a third party. In that case, Doe’s social security number
    had actually been published by the government on various documents “sent to groups of
    [workers’-compensation] claimants, their employers, and the lawyers involved in their cases.”
    
    Id. at 617.
    In other words, Doe’s information was actually exposed to dozens of readers. Here,
    by contrast, disclosure and access of Plaintiffs’ personal information is anything but certain.
    Rather, the information itself is locked inside tapes that require some expertise to open and
    decipher. Indeed, it is highly unlikely that the crook even understood what the tapes were, let
    alone had the wherewithal to access them or navigate her way to any one of the 4.7 million
    records contained therein. And until Plaintiffs can aver that their records have been viewed (or
    certainly will be viewed), any harm to their privacy remains speculative.
    A few of the Plaintiffs here do allege that their data was used.10 Those Plaintiffs have at
    least claimed an injury to their privacy insofar as they allege that their data was accessed. The
    other Plaintiffs, however, are out of luck.
    3. Loss of Value
    Plaintiffs next contend that they were injured by the loss of two valuable assets. First,
    they argue that they lost the value of their personal and medical information, which could be
    “sold on the cyber black market for $14 to $25 per medical record.” Compl., ¶ 21. Second, they
    claim they forfeited the value of their insurance premiums, which should have been used to pay
    for better security. See 
    id., ¶ 22.
    10
    Compl., ¶¶ 35 (Curtis), 38 (Gaffney), 40 (Hawk), 41 (Hernandez), 43 (Keller), 48 (Morelli), 49
    (Moskowitz), 62 (Yarde).
    19
    As to the value of their personal and medical information, Plaintiffs do not contend that
    they intended to sell this information on the cyber black market in the first place, so it is
    uncertain how they were injured by this alleged loss. Even if the service members did intend to
    sell their own data – something no one alleges – it is unclear whether or how the data has been
    devalued by the breach. For those reasons, Plaintiffs’ first theory of injury is unsuccessful.
    Similarly, as to the value of their insurance premiums, Plaintiffs do not plausibly allege
    any actual loss. They allege that they were paying for “health and dental insurance” – and they
    do not claim that they were denied coverage or services in any way whatsoever. See 
    id. To the
    extent that Plaintiffs claim that some indeterminate part of their premiums went toward paying
    for security measures, such a claim is too flimsy to support standing. They do not maintain,
    moreover, that the money they paid could have or would have bought a better policy with a more
    bullet-proof information-security regime. Put another way, Plaintiffs have not alleged facts that
    show that the market value of their insurance coverage (plus security services) was somehow less
    than what they paid. Nothing in the Complaint makes a plausible case that Plaintiffs were
    cheated out of their premiums. As a result, no injury lies.
    4. Legal Violations
    Plaintiffs next set forth various legal violations that they claim create standing: They
    argue that SAIC failed to meet the requisite legal standards for data security; that SAIC and
    TRICARE violated their right to truthful information about their data; and that certain statutes, if
    violated, give them the right to automatic damages or payment. Standing, however, does not
    merely require a showing that the law has been violated, or that a statute will reward litigants in
    general upon showing of a violation. Rather, standing demands some form of injury – some
    20
    showing that the legal violation harmed you in particular, and that you are therefore an
    appropriate advocate in federal court.
    As the Supreme Court “has repeatedly held . . .[,] an asserted right to have the
    [defendant] act in accordance with law is not sufficient, standing alone, to confer jurisdiction on
    a federal court.” Allen v. Wright, 
    468 U.S. 737
    , 754 (1984). Rather, the unlawful activity must
    work some harm on Plaintiffs.
    In terms of the alleged contravention of security standards, Plaintiffs have not outlined
    any actual or imminent harm caused by that purported violation – aside from the theories the
    Court has already rejected. Plaintiffs, therefore, cannot acquire standing on that basis.
    The same is true of the supposed deprivation of Plaintiff’s “right to truthful information
    about the security of their PII/PHI.” Opp. to SAIC at 7. No independent harm has flowed from
    that so-called deprivation. Of course, as Plaintiffs point out, denial of information alone can
    sometimes create an injury when statutes require disclosure. See Zivotofsky ex rel. Ari Z. v.
    Sec’y of State, 
    444 F.3d 614
    , 617-19 (D.C. Cir. 2006) (noting that violation of plaintiff’s right to
    documents under Freedom of Information Act can create standing). Here, however, Plaintiffs
    have failed to allege any actual deprivation of information, even assuming they have a right to it.
    First, they claim that they were deprived of information before TRICARE and SAIC notified
    them of the data breach. Any injury that might have occurred during that time, however, has
    been cured, since SAIC has now explained the extent of the breach to Plaintiffs in some detail,
    see Letter from SAIC at 1, and no one alleges any independent harm caused by the delay.
    Indeed, expedient notification of the data breach and its scope, along with certain required
    contact information, is all the relevant laws demand. See, e.g., Cal. Civ. Code § 1798.82; Or.
    Rev. Stat. Ann. § 646A.604(1)-(2). In addition, Plaintiffs claim that they have been deprived of
    21
    truthful information because SAIC “[c]ategoriz[ed] the risk of access” to their data “as ‘low’” in
    their letters notifying servicemen of the breach. Compl., ¶ 116. But that is, at best, a difference
    of opinion – Plaintiffs do not identify any actual facts that SAIC or TRICARE has withheld. As
    a result, Plaintiffs’ abstract assertion that their “right to truthful information” has been violated
    does not constitute an injury, since the facts in the complaint identify neither an actual
    deprivation nor any independent harm.
    5. Actual Misuse
    As noted above, Plaintiffs who claim that their information was, in fact, accessed and
    misused have alleged an actual injury. That injury, however, must still be linked to Defendants’
    conduct.
    B. Causation
    The second element of standing, causation, requires “a causal connection between the
    injury and the conduct complained of.” 
    Lujan, 504 U.S. at 560
    . The harm alleged must be
    “fairly . . . trace[able] to the challenged action of the defendant, and not injury that results from
    the independent action of some third party not before the court.” Simon v. E. Ky. Welfare
    Rights Org., 
    426 U.S. 26
    , 41-42 (1976).
    To review the bidding: The majority of Plaintiffs in this case lack standing to sue because
    they failed to allege any cognizable injury. Six Plaintiffs, however, claim that their data was
    actually misused; one Plaintiff claims she has suffered medical fraud; and two claim that their
    privacy was invaded by phone calls and other solicitations from companies that may have
    accessed their medical records. Each of these three groups of Plaintiffs must be able to link their
    harm to the data breach.
    22
    1. Identity Theft
    Six out of thirty-three Plaintiffs allege that their personal information was used for
    fraudulent purposes. 
    See supra
    n.5. Five of those six claim only that unauthorized charges were
    made to their existing credit cards or debit cards, or that money was withdrawn from an existing
    bank account. But here’s the problem: No one alleges that credit-card, debit-card, or bank-
    account information was on the stolen tapes. See, e.g., Letter from SAIC at 1 (tapes did not
    include “any financial data, such as credit card or bank account information” ). To be sure, as
    Plaintiffs’ counsel noted at the Court’s August hearing, a criminal could obtain some of a
    victim’s personal information from a data breach and then go “phishing” to get the rest. See
    Hrg. Tr. at 45-46. That is, the crook could acquire a name and phone number and then make
    calls pretending to be a legitimate business asking for information like credit-card or bank-
    account numbers. Here, however, the identity-theft Plaintiffs have not alleged any phishing.
    Indeed, they proffer no plausible explanation for how the thief would have acquired their
    banking information. In a society where around 3.3% of the population will experience some
    form of identity theft – regardless of the source – it is not surprising that at least five people out
    of a group of 4.7 million happen to have experienced some form of credit or bank-account fraud.
    See Kristin Finklea, Cong. Research Serv., R40599, Identity Theft: Trends and Issues 1 (2014),
    available at http://goo.gl/bCsTEg (10.2 million Americans, out of around 308.7 million total,
    experienced identity theft in 2010). As that information was not on the tapes, though, Plaintiffs
    cannot causally link it to the SAIC breach.
    One Plaintiff, however – Robert Curtis, a Colorado resident – may have a case.11 After
    the data breach, he received “letters in the mail from American Express,” among others,
    11
    Plaintiffs have moved to supplement their factual allegations concerning Curtis. See ECF No. 41
    (Motion for Leave to File Supplemental Pleadings). The Court grants that Motion here, although it notes that its
    23
    “thanking him for applying for loans” that he had never applied for. Compl., ¶ 35. To apply for
    such a loan, one would likely need a person’s name, address, date of birth, and social security
    number – exactly the sort of information that was on the tapes. 
    Id., ¶ 7.
    The Court believes that
    this creates a sufficient causal link between the identity theft – which has hurt Curtis’s credit
    history, 
    id., ¶ 35
    – and the tape theft.
    That said, the Court would be remiss if it did not note that Curtis also alleges a spate of
    identity theft that cannot plausibly be linked to the tapes. For example, he also complains that
    many of his existing accounts have been tampered with in seriously concerning and, no doubt,
    frustrating ways. 
    Id. In one
    instance, Curtis’s bank notified him when “an individual in
    Mexico” called his bank asking for money “and knew Plaintiff Curtis’ account number, unlisted
    telephone number, address, date of birth and e-mail address, Social Security number and answers
    to the security questions.” ECF No. 43 (Reply to Motion to Supplement Pleadings), Exh. A
    (Supplement to Compl., ¶ 35) at 1. No one alleges, however, that the name of Curtis’s bank, his
    account number, his e-mail address, or the answers to his security questions were on the stolen
    tapes. He also claims that “individuals wired approximately $32,500 out of his credit union
    account.” 
    Id. But again,
    he does not claim that the account information was on the tapes,
    although he does aver that he gave TRICARE his payment information at some point. 
    Id. The inescapable
    conclusion is that Curtis has been subjected to another, more profound data breach
    involving his financial – not medical – records.
    As a result, the fraudulent loan applications may also be linked to this other, more severe
    data breach and not the SAIC breach. At this point, however, the Court is willing to give Curtis
    conclusions regarding Curtis would be the same under both the original and the amended pleadings.
    24
    the benefit of the doubt, since there is at least a plausible connection between some of the harm
    he has suffered and the SAIC theft.
    2. Medical Fraud
    Another Plaintiff, Robin Warner, claims that she experienced medical fraud because her
    medical records no longer exist. Compl., ¶ 60. This is a striking allegation, but it cannot
    establish standing because only backup tapes were stolen from the SAIC employee’s car. 
    Id., ¶ 6.
    Warner does not explain how the disappearance of her medical identity can be linked to the
    theft of tapes that contained only copies of her actual medical records. She has thus not carried
    her burden of alleging causation and hence has no standing.
    3. Privacy
    Two final Plaintiffs – in addition to Curtis, who has experienced similar woes – claim
    that their privacy has been invaded due to the data breach. Murray Moskowitz simply alleges
    that he “has received a number of unsolicited calls from telemarketers and scam artists.” 
    Id., ¶ 49.
    He does not otherwise link the calls to the tapes, claim that the callers have personal or
    private information found on the tapes, or even allege that his phone number was unlisted and
    hence would have been difficult for marketers to locate absent the assistance of the data thief.
    Moskowitz seems to simply be one among the many of us who are interrupted in our daily lives
    by unsolicited calls. His harm, consequently, cannot plausibly be linked to the tapes.
    Dorothy Yarde, on the other hand, does allege a credible link to the data breach. She
    claims that her “telephone number is unlisted.” 
    Id., ¶ 62.
    Still, after the theft, “she received
    numerous unsolicited telephone calls from insurance companies and other[s]” pitching “medical
    products and services . . . targeted at a specific medical condition listed in her medical records.”
    
    Id. (emphasis added).
    She had not received such calls in the past. 
    Id. The fact
    that the callers
    25
    had Yarde’s unlisted phone number and medical diagnosis – both of which were on the tapes –
    suffices to create a causal link.
    C. Redressability
    The third and final element of standing is redressability, which requires that it “be
    ‘likely,’ as opposed to merely ‘speculative,’ that the” alleged “injury will be ‘redressed by a
    favorable decision.’” 
    Lujan, 504 U.S. at 561
    (citation omitted).
    At this point, only two Plaintiffs remain: Curtis, who has alleged actual misuse of his
    social security number, and Yarde, who has alleged a privacy violation linked to her medical
    information. Both harms can be redressed, at least in part, by a monetary reward. Those two
    Plaintiffs – and only those two Plaintiffs – therefore have standing to sue.
    ***
    A reasonable reader may still wonder: If Curtis and Yarde’s information was potentially
    accessed or misused, why not presume that the remaining Plaintiffs’ information will suffer the
    same fate? Indeed, other courts have allowed cases to move forward where some form of fraud
    had already taken place. For example, in Anderson v. Hannaford Bros., 
    659 F.3d 151
    (1st Cir.
    2011), the First Circuit declined to question the plaintiffs’ standing where 1,800 instances of
    credit- and debit-card fraud had already occurred and had been clearly linked to the data breach.
    
    Id. at 162-67.
    Similarly, in Pisciotta, the court allowed plaintiffs to proceed where “the scope
    and manner of access suggest[ed] that the intrusion was sophisticated, intentional and
    malicious,” and thus that the potential for harm was indeed 
    substantial. 499 F.3d at 632
    .
    The circumstances here, however, are starkly different. First, the theft from the SAIC
    employee’s car was a low-tech, garden-variety one. Any inference to the contrary is undermined
    by the snatching of the GPS and car stereo. This is hardly a black-ops caper. Second, while
    26
    Curtis and Yarde have alleged personalized injury sufficient to surmount a motion to dismiss
    under Rule 12(b)(1), there are no facts here that plausibly point to imminent, widespread harm.
    In fact, the link between Curtis and Yarde’s injuries and the data breach barely crosses the line
    from possible to plausible. Curtis, after all, was almost certainly the victim of another, more
    severe data breach, and that breach may well have been responsible for every instance of identity
    theft he alleges. It remains likely, in other words, that no one accessed his information from the
    tapes. Yarde’s harm may also stem from another source. For example, she might have bought
    specific medications related to her condition over the counter at the neighborhood drugstore or
    online. That information could have been sold to companies targeting such patients – no data
    breach necessary. At this stage, the Court simply acknowledges that the link between the data
    breach and Yarde and Curtis’s claims is plausible, even if it is very likely that their harm stems
    from another source.
    The fact that Curtis and Yarde’s allegations are plausible, however, does not lead to the
    conclusion that wide-scale disclosure and misuse of all 4.7 million TRICARE customers’ data is
    plausibly “certainly impending.” 
    Clapper, 133 S. Ct. at 1147
    . After all, as previously noted,
    roughly 3.3% of Americans will experience identity theft of some form, regardless of the source.
    See Finklea, Identity Theft: Trends and 
    Issues, supra, at 1
    . So one would expect 3.3% of
    TRICARE’s customers to experience some type of identity theft, even if the tapes were never
    read or misused. To quantify that percentage, of the 4.7 million customers whose data was on
    the tapes, one would expect around 155,100 of them to experience identity fraud simply by
    virtue of living in America and engaging in commerce, even if the tapes had not been lost. Here,
    only six Plaintiffs allege some form of identity theft, and out of those six only Curtis offers any
    plausible link to the tapes. And Yarde is the only other Plaintiff – out of a population of 4.7
    27
    million – who has offered any evidence that someone may have accessed her medical or personal
    information.
    Given those numbers, it would be entirely implausible to assume that a massive identity-
    theft scheme is currently in progress or is certainly impending. Indeed, given that thirty-four
    months have elapsed, either the malefactors are extraordinarily patient or no mining of the tapes
    has occurred. This is simply not a case where hundreds or thousands of instances of fraud have
    been linked to the data breach. See, e.g., 
    Anderson, 659 F.3d at 162-67
    . Rather, as far as the
    Court is aware, only six instances of fraud have been reported, and only two customers can
    plausibly link either identity theft or privacy violations to the tapes’ loss. As such, only those
    two Plaintiffs whose harm is plausibly linked to the breach may move forward with their claims.
    IV.    Conclusion
    Since the majority of Plaintiffs has been dismissed – potentially altering the scope of the
    remaining litigants’ claims moving forward – the Court will pause to confer with the parties
    before determining which, if any, of the Complaint’s twenty counts has been properly alleged.
    The Court thus reserves the issue of whether Defendants’ Rule 12(b)(6) Motions should be
    granted for a future date. It further notes that it expects the parties to confer before the
    forthcoming status to determine if they can reach some agreement on the next procedural steps in
    the case.
    For the aforementioned reasons, the Court will grant in part and deny in part Defendants’
    Motions to Dismiss. A separate Order consistent with this Opinion will be issued this day.
    /s/ James E. Boasberg
    JAMES E. BOASBERG
    United States District Judge
    Date: May 9, 2014
    28