Temporary Certification Under the President John F. Kennedy Assassination Records Collection Act of 1992 ( 2017 )


Menu:
  • (Slip Opinion)
    Temporary Certification Under the President
    John F. Kennedy Assassination Records
    Collection Act of 1992
    Section 5(g)(2)(D) of the President John F. Kennedy Assassination Records Collection
    Act of 1992 authorizes the President to issue a temporary certification postponing dis-
    closure of a set of records without articulating record-specific justifications for further
    postponement of each individual record. The purpose of this postponement would be
    limited to providing sufficient time to resolve which specific records warrant post-
    ponement under section 5(g)(2)(D). There is a strong likelihood that many of the rec-
    ords in question implicate the kinds of sensitivities about national security, law en-
    forcement, and foreign affairs contemplated by the statute.
    Serious constitutional concerns would arise if the Act were construed to require the
    President to make premature disclosures of records while they are likely to contain
    still-sensitive information.
    October 26, 2017
    MEMORANDUM OPINION FOR THE COUNSEL TO THE PRESIDENT
    Under the President John F. Kennedy Assassination Records Collection
    Act of 1992, Pub. L. No. 102-526, 
    106 Stat. 3443
     (codified as amended
    at 
    44 U.S.C. § 2107
     note) (“JFK Act” or “the Act”), approximately 34,000
    records relating to President Kennedy’s assassination that have not previ-
    ously been disclosed in full or in part to the public are to be released by
    October 26, 2017, unless the President certifies that their release would
    present identifiable harm that outweighs the public’s interest in disclo-
    sure. See JFK Act § 5(g)(2)(D). In an October 12, 2017 memorandum,
    the Archivist of the United States expressed “significant concerns” about
    the manner in which certain federal agencies had applied that standard in
    their proposals for postponing the release of some of their records beyond
    that deadline. Memorandum for the President, from David S. Ferriero,
    Archivist of the United States, Re: Concerns Regarding Agency Proposals
    to Postpone Records Pursuant to Section 5 of the President John F.
    Kennedy Assassination Records Collection Act of 1992 (JFK Act) at 1
    (Oct. 12, 2017) (“Archivist Memorandum”). Although the Archivist
    acknowledged that legitimate sensitivities “could warrant continued
    postponement” of some of these records under the Act, he concluded that
    “there is insufficient time for [the National Archives and Records Admin-
    istration (“NARA”)] and the pertinent agencies to . . . identify those
    certain, specific instances” in which continued postponement is appropri-
    ate. Id. at 1, 2.
    1
    Opinions of the Office of Legal Counsel in Volume 41
    You have asked whether section 5(g)(2)(D) of the Act allows the Presi-
    dent to issue a temporary certification postponing disclosure of a set of
    records without articulating record-specific justifications for further
    postponement of each individual record. The purpose of this postpone-
    ment would be limited to providing sufficient time to resolve which
    specific records warrant postponement under section 5(g)(2)(D). Under
    the circumstances, in which the initial postponement would last for only a
    few months and there is a strong likelihood that many of the records in
    question implicate the kinds of sensitivities about national security, law
    enforcement, and foreign affairs contemplated by the statute, we conclude
    that section 5(g)(2)(D) authorizes the President to make such a certifica-
    tion.
    I.
    A.
    The Act mandates that governmental entities with records relating to
    the assassination of President Kennedy collect, review, and transfer those
    records to the President John F. Kennedy Assassination Records Collec-
    tion (“JFK Collection”) maintained by NARA. See JFK Act §§ 2(a)(1), 4,
    5(a). Approximately 272,000 records have already been released in full
    under the Act. See Memorandum for John A. Eisenberg, Legal Adviser to
    the National Security Council, from John P. Fitzpatrick, Senior Director
    for Records, Access and Information Security Management, National
    Security Council, Re: Department and Agency Requests for Continued
    Postponement of Records under the JFK Assassination Records Collec-
    tion Act at 1 (Oct. 25, 2017) (“NSC Memorandum”). As relevant now, the
    Act provides that each yet-to-be-released assassination record “shall be
    publicly disclosed in full” and made “available in the [JFK] Collection”
    by October 26, 2017, “unless the President certifies” that “an identifiable
    harm to the military defense, intelligence operations, law enforcement, or
    conduct of foreign relations” necessitates continued postponement of
    disclosure and “outweighs the public interest in disclosure.” JFK Act
    § 5(g)(2)(D). 1
    The Act defines an “assassination record” as “a record that is related to
    the assassination of President John F. Kennedy, that was created or made
    1 We assume without deciding that the President’s certification power under section
    5(g)(2)(D) is not delegable.
    2
    Temporary Certification Under the JFK Assassination Records Collection Act
    available for use by, obtained by, or otherwise came into the possession
    of ” various governmental entities. Id. § 3(2). In 1995, the Assassination
    Records Review Board (“Board”)—a short-lived agency established by the
    Act, see id. § 7—issued regulations interpreting “assassination record”
    broadly, to encompass “[a]ll records collected by or segregated by all
    Federal, state, and local government agencies in conjunction with any
    investigation or analysis of or inquiry into the assassination of President
    Kennedy.” 
    36 C.F.R. § 1290.1
    (b)(2). Under the Board’s interpretation,
    “assassination record[s]” include documents created well into the 1990s
    pertaining to investigations, analyses, or inquiries into President Kenne-
    dy’s assassination. 2
    The Act gave federal offices until late 1993 to identify and review all
    assassination records in their possession and to begin transferring them
    to NARA for immediate public release. See JFK Act § 5(c)(1). The Act,
    however, also established an exception under section 6, which allowed
    public disclosure to be postponed up to October 26, 2017. A postpone-
    ment under section 6 required “clear and convincing evidence that” the
    record in question implicated (1) certain sensitive information whose
    disclosure would threaten national security or foreign affairs; (2) living
    individuals who provided confidential information and would face a
    substantial risk of harm if their identities were revealed; (3) unwarranted
    intrusions into personal privacy; (4) confidential understandings between
    United States agents and cooperating individuals or foreign governments
    that would be compromised and cause harm if publicly revealed; or
    (5) security or protective procedures that the government uses or might
    use, where disclosure of those procedures would be sufficiently harmful. 3
    2 Conducting an “Expert Search” of the JFK Collection Reference System for records
    dated between 1990 and 1998 returns nearly 5,000 records. See NARA, JFK Assassina-
    tion Records, Collection Reference System, https://www.archives.gov/research/jfk/search.
    html (last visited Oct. 26, 2017).
    3 More specifically, section 6 authorizes postponement of public disclosure of records
    or portions of records only when
    there is clear and convincing evidence that—
    (1) the threat to the military defense, intelligence operations, or conduct of foreign
    relations of the United States posed by the public disclosure of the assassination
    record is of such gravity that it outweighs the public interest, and such public dis-
    closure would reveal—
    (A) an intelligence agent whose identity currently requires protection;
    3
    Opinions of the Office of Legal Counsel in Volume 41
    The Board reviewed every record that a “[g]overnment office” identi-
    fied as subject to postponement of disclosure under section 6 and made its
    own determination whether the record qualified as an “assassination
    record” and whether postponement was warranted. See id. § 7(i)(2). The
    Board began its work in April 1994 and ceased operating on September
    30, 1998. See Final Report of the Assassination Records Review Board
    at 13, 15 (Sept. 30, 1998) (“ARRB Report ”), https://www.archives.gov/
    files/research/jfk/review-board/report/arrb-final-report.pdf. In many cases,
    the Board appears not only to have upheld the postponement of disclosure
    but also to have concluded that postponement until 2017 was warranted.
    See id. at 30 (“[T]he Review Board employs the term ‘postponed’ to mean
    ‘redacted until the year 2017.’”); see generally id. at 48–74 (identifying
    various types of records as “postponed”; explicitly identifying certain
    types of records as postponed for shorter periods of time when appropri-
    ate). The Act also allowed agencies to appeal the Board’s determinations
    to the President, who was to issue a written certification specifying his
    (B) an intelligence source or method which is currently utilized, or reasonably
    expected to be utilized, by the United States Government and which has not been
    officially disclosed, the disclosure of which would interfere with the conduct of
    intelligence activities; or
    (C) any other matter currently relating to the military defense, intelligence oper-
    ations or conduct of foreign relations of the United States, the disclosure of which
    would demonstrably impair the national security of the United States;
    (2) the public disclosure of the assassination record would reveal the name or
    identity of a living person who provided confidential information to the United
    States and would pose a substantial risk of harm to that person;
    (3) the public disclosure of the assassination record could reasonably be expected
    to constitute an unwarranted invasion of personal privacy, and that invasion of pri-
    vacy is so substantial that it outweighs the public interest;
    (4) the public disclosure of the assassination record would compromise the exist-
    ence of an understanding of confidentiality currently requiring protection between a
    Government agent and a cooperating individual or a foreign government, and pub-
    lic disclosure would be so harmful that it outweighs the public interest; or
    (5) the public disclosure of the assassination record would reveal a security or
    protective procedure currently utilized, or reasonably expected to be utilized, by the
    Secret Service or another Government agency responsible for protecting Govern-
    ment officials, and public disclosure would be so harmful that it outweighs the pub-
    lic interest.
    JFK Act § 6. Although section 6 itself does not limit postponements to October 26, 2017,
    section 5(g)(2)(D) requires that postponed records “be publicly disclosed in full” by that
    date unless the President certifies a further postponement under a different standard.
    4
    Temporary Certification Under the JFK Assassination Records Collection Act
    determination “under the standards set forth in section 6” whether to
    postpone or disclose a record. JFK Act § 9(d)(1).
    Even when the Board found that an assassination record qualified for a
    postponement under section 6, the Act thereafter required periodic review
    “by the originating agency and the Archivist” of whether the justifications
    for postponement remained valid. See id. § 5(g)(1)–(2). Under this pro-
    cess, many records that previously qualified for postponement of disclo-
    sure under section 6 have already been released. Most recently, in July
    2017, NARA released “3,810 documents, including 441 formerly with-
    held-in-full documents and 3,369 documents formerly released with
    portions redacted,” originating from the Federal Bureau of Investigation
    and the Central Intelligence Agency. NARA, JFK Assassination Records
    – 2017 Additional Documents Release, https://www.archives.gov/research/
    jfk/2017-release (last visited Oct. 26, 2017).
    While approximately 272,000 assassination records have already been
    released in full, approximately 34,000 documents have yet to be dis-
    closed, in whole or in part, because they have continued to satisfy section
    6. NSC Memorandum at 1, 2. In other words, federal agencies identified
    these records as being subject to postponed disclosure under section 6, the
    Board confirmed that “clear and convincing evidence” established that
    one of the section 6 criteria applied, and the Act required periodic re-
    review to confirm that postponed disclosure remained justified. “Over
    90% of the remaining postponed records originated from or contain equi-
    ties of the Central Intelligence Agency or the Federal Bureau of Investiga-
    tion.” Id. at 2 n.5.
    In light of section 5(g)(2)(D), the authority to withhold assassination
    records under section 6 expires on October 26, 2017. At that point, each
    remaining record “shall be publicly disclosed in full . . . unless the Presi-
    dent certifies” that continued postponement is necessary to protect against
    identifiable harm to national security, law enforcement, or foreign affairs,
    and that the harm outweighs the public interest in disclosure. JFK Act
    § 5(g)(2)(D).
    B.
    When President George H.W. Bush signed the Act in 1992, he issued a
    signing statement—consistent with this Office’s recommendation 4—
    4 See Memorandum for W. Lee Rawls, Assistant Attorney General, Office of Legisla-
    tive Affairs, from David G. Leitch, Deputy Assistant Attorney General, Office of Legal
    5
    Opinions of the Office of Legal Counsel in Volume 41
    explaining that section 6 is unduly restrictive because it “does not con-
    template nondisclosure of executive branch deliberations or law enforce-
    ment information of the executive branch . . . , and it provides only a
    narrow basis for nondisclosure of national security information.” State-
    ment on Signing the President John F. Kennedy Assassination Records
    Collection Act of 1992 (Oct. 26, 1992), 2 Pub. Papers of Pres. George
    Bush 2004, 2004–05 (1992–93) (“1992 Signing Statement”). He further
    explained that the President’s “authority to protect these categories of
    information comes from the Constitution and cannot be limited by stat-
    ute,” and that the President “cannot abdicate [his] constitutional responsi-
    bility to take such action when necessary.” Id. at 2004.
    C.
    Between September 2014 and November 2015, NARA sent notices to
    all agencies that still had records or portions of records postponed under
    section 6, reminding them of the Act’s October 26, 2017 disclosure dead-
    line. See NSC Memorandum at 3. The National Security Council’s Rec-
    ords Access and Information Security Interagency Policy Committee
    instructed each affected agency to provide by May 1, 2017, a memoran-
    dum either advising that it was not asking the President to certify under
    section 5(g)(2)(D) that continued postponement of records was necessary,
    or requesting continued postponement and supplying justifications that
    would support presidential certification. Id. at 3–4. The agencies have
    requested that the President certify that it is necessary to continue postpon-
    ing the disclosure, either in whole or in part, of approximately 31,000
    records. Id. at 4.
    In recent months, subject-matter experts at NARA reviewed the agen-
    cies’ requests and raised concerns with National Security Council staff
    about whether the agencies had complied with the statutory standard. As
    noted above, on October 12, 2017, the Archivist of the United States
    wrote to the President of his “significant concerns” about the proposed
    postponements. Archivist Memorandum at 1. In light of “the information
    at issue and the related sensitivities,” the Archivist “agree[d]” that the
    records “could warrant continued postponement in certain, specific in-
    Counsel, Re: Enrolled Bill S. 3006, President John F. Kennedy Assassination Records
    Collection Act, att. at 1–2 (Oct. 6, 1992) (recommending that the President “make clear
    that the bill cannot restrict the President’s authority under the Constitution to protect
    confidential information”).
    6
    Temporary Certification Under the JFK Assassination Records Collection Act
    stances.” Id. Based on NARA’s review of a sampling of postponed rec-
    ords, however, the Archivist expressed doubt that agencies had properly
    applied the standard for postponing disclosure under section 5(g)(2)(D)
    in every instance. The Archivist also expressed the view that inconsisten-
    cies existed between the agencies’ current requests for postponing disclo-
    sure of certain information and prior instances in which the same infor-
    mation had been disclosed. Accordingly, the Archivist concluded that
    “there is insufficient time for NARA and the pertinent agencies to further
    consider our concerns and identify those certain, specific instances where
    information could warrant continued postponement.” Id. at 2.
    II.
    You have asked whether the Act permits the President to make a tem-
    porary certification that would postpone disclosure of a large number of
    the remaining undisclosed records (or portions of records) to enable
    completion of the full review contemplated by the Archivist. You expect
    the process of resolving the Archivist’s concerns and making the neces-
    sary determinations to require an additional six months beyond the Octo-
    ber 26, 2017 statutory deadline. For the reasons that follow, we conclude
    that section 5(g)(2)(D) of the Act authorizes the President to certify the
    short-term postponement you describe.
    A.
    The Act requires public disclosure of all remaining assassination rec-
    ords by October 26, 2017, unless the requisite certification is made. In
    relevant part, it provides as follows:
    Each assassination record shall be publicly disclosed in full, and
    available in the Collection no later than the date that is 25 years after
    the date of enactment of this Act [Oct. 26, 1992], unless the Presi-
    dent certifies, as required by this Act, that—
    (i) continued postponement is made necessary by an identi-
    fiable harm to the military defense, intelligence operations, law
    enforcement, or conduct of foreign relations; and
    (ii) the identifiable harm is of such gravity that it outweighs
    the public interest in disclosure.
    JFK Act § 5(g)(2)(D). We conclude that the certification you propose
    would satisfy the balancing test in section 5(g)(2)(D). As explained more
    7
    Opinions of the Office of Legal Counsel in Volume 41
    fully below, the President could reasonably determine that a short-term
    postponement is necessary because a premature release of records without
    adequate time to resolve agencies’ concerns would present an identifiable
    harm to the interests identified in clause (i). Furthermore, he could rea-
    sonably determine that the public interest in immediate disclosure does
    not outweigh the identifiable harm because disclosures would be post-
    poned for, at most, six months.
    1.
    Such a certification would satisfy section 5(g)(2)(D) even though the
    President would be determining that a group of records collectively war-
    rants continued postponement. Section 5(g)(2)(D), in our view, does not
    require the President to articulate record-specific justifications for further
    postponement of each individual record. Although section 5(g)(2)(D)
    requires that “[e]ach assassination record” withheld until 2017 “shall be
    publicly disclosed in full” unless the President makes the necessary certi-
    fication, that provision is silent as to whether the President must make a
    certification regarding each individual record, or whether he may make a
    certification applicable to a group of withheld records that raises an iden-
    tifiable harm. In the absence of specificity on this point, we believe that
    section 5(g)(2)(D) gives the President discretion to issue a certification
    postponing disclosure of an entire group of records.
    Language in sections 6 and 9 of the Act reinforces the conclusion that
    the contrasting language in section 5(g)(2)(D) does not require the Presi-
    dent to determine that each individual record (or portion of a record),
    considered in isolation, would pose an identifiable harm outweighing the
    public interest in disclosure. All of these provisions set forth criteria for
    postponing the disclosure of records. Within section 6, which defines the
    threshold criteria that supported withholding records up until now, every
    subsection demands an assessment of whether “the public disclosure of the
    assassination record ” would cause particular harms. JFK Act § 6(1), (2),
    (3), (4), & (5) (emphasis added). For instance, section 6(1) requires that
    “the threat to the military defense, intelligence operations, or conduct of
    foreign relations . . . posed by the public disclosure of the assassination
    record [be] of such gravity that it outweighs the public interest.” Similarly,
    section 9(c), which specifies the Board’s process for reviewing agencies’
    determinations that records satisfy section 6, commands the Board to
    review each assassination record individually before making “a determina-
    tion that an assassination record shall be publicly disclosed in the Collec-
    8
    Temporary Certification Under the JFK Assassination Records Collection Act
    tion or postponed for disclosure.” Id. § 9(c)(4)(A) (emphasis added); see
    id. § 9(c)(1)(A)–(B) (the Board must direct public disclosure unless “a
    Government record is not an assassination record” or “a Government
    record or particular information within an assassination record qualifies for
    postponement”); id. § 9(c)(2) (setting forth requirements for “approving
    postponement of public disclosure of an assassination record”). And sec-
    tion 9(d), which authorizes the President to issue a certification approving
    or disapproving the Board’s decision, similarly requires the President to
    apply the section 6 criteria separately to each record to determine whether
    postponement is warranted. See id. § 9(d)(1) (“After the Review Board has
    made a formal determination concerning the public disclosure or post-
    ponement of disclosure of an executive branch assassination record or
    information within such a record . . . the President shall have the sole and
    nondelegable authority to require the disclosure or postponement of such
    record or information under the standards set forth in section 6[.]”).
    Section 5(g)(2)(D)(i), however, uses very similar language to section
    6(1) in describing “an identifiable harm to the military defense, intelli-
    gence operations, law enforcement, or conduct of foreign relations,”
    without expressly tying that harm to an individual assassination record.
    These textual differences indicate that section 5(g)(2)(D) authorizes the
    President to certify that it is necessary to withhold an entire group of
    records the disclosure of which would present an identifiable harm out-
    weighing the public interest in disclosure. See Sebelius v. Cloer, 
    569 U.S. 369
    , 378 (2013) (“We have long held that where Congress includes par-
    ticular language in one section of a statute but omits it in another section
    of the same Act, it is generally presumed that Congress acts intentionally
    and purposely in the disparate inclusion or exclusion.”) (internal quotation
    marks and brackets omitted).
    This reading also reflects sensible policy aims. By the time the Presi-
    dent determines whether to continue to postpone records under section
    5(g)(2)(D), each record has gone through an extensive and individualized
    multi-year review process to verify that public disclosure would have
    been harmful in the 1990s and would still be harmful through October 26,
    2017. That history explains why Congress would have afforded the Presi-
    dent additional flexibility when determining the necessity of postponing
    disclosure beyond 2017. The different timetables for review under
    section 6 and section 5(g)(2)(D) bolster this conclusion. By design, the
    section 6 process took years and multiple stages of review—including the
    possibility of presidential review—to resolve which individual records
    9
    Opinions of the Office of Legal Counsel in Volume 41
    should be withheld. Congress could have concluded that the President’s
    review under section 9(d)(1) of the Board’s determinations about individ-
    ual records would not interfere with the President’s core duties, since any
    appeals would likely be staggered in time and most Board determinations
    would not demand presidential action. Section 5(g)(2)(D), on the other
    hand, requires the President to make determinations about all remaining
    postponed records in a very short timeframe, because he must determine
    whether postponement remains necessary in light of current concerns
    about national security, law enforcement, and foreign affairs. If the Presi-
    dent were barred from determining that a group of records collectively
    warranted continued postponement, he would be forced to evaluate the
    individual justifications for postponing tens of thousands of records on a
    compressed timetable without adequate time for full consideration. Policy
    concerns thus support interpreting section 5(g)(2)(D) to allow the Presi-
    dent to issue a certification encompassing multiple records.
    We further conclude that the proposed certification would satisfy the
    requirement of section 5(g)(2)(D)(i) that there be “an identifiable harm to
    the military defense, intelligence operations, law enforcement, or conduct
    of foreign relations.” An “identifiable harm” to national security, law
    enforcement, or foreign affairs includes the potential harm to those inter-
    ests resulting from prematurely disclosing a batch of records that appears
    to contain sensitive information. The ordinary meaning of “identifiable”
    is “[a]ble to be identified; capable of identification.” 7 Oxford English
    Dictionary 618 (2d ed. 1989); see also, e.g., Random House Dictionary of
    the English Language (Unabridged) 950 (2d ed. 1987) (defining “identi-
    fy” as “[t]o recognize or establish as being a particular person or thing”).
    And the ordinary meaning of “harm” in this context is “injury” or “dam-
    age.” 6 Oxford English Dictionary at 1121. Thus, an “identifiable harm”
    under section 5(g)(2)(D)(i) involves the type of damage to national securi-
    ty, law enforcement, or foreign affairs that could be articulated or ascer-
    tained.
    Textual differences between sections 6, 9(d)(1), and 5(g)(2)(D) support
    the conclusion that section 5(g)(2)(D) authorizes continued postponement
    based on broad but recognizable harms. Specific language in section 6
    expressly compels the government both to identify why disclosure would
    present particularized harms to national security, law enforcement, or
    foreign affairs and also to substantiate that such harms would materialize.
    For instance, section 6(1) does not just require that “the threat to the
    military defense, intelligence operations, or conduct of foreign relations
    10
    Temporary Certification Under the JFK Assassination Records Collection Act
    . . . posed by . . . public disclosure . . . [be] of such gravity that it out-
    weighs the public interest.” JFK Act § 6(1). It also demands evidence that
    public disclosure (A) would specifically threaten the identity of an intelli-
    gence agent who “requires protection,” (B) would “interfere with the
    conduct of intelligence activities” by compromising intelligence sources
    or methods that the United States presently used or was likely to use, or
    (C) “would demonstrably impair the national security of the United
    States.” Id. Similarly, under section 9(d)(1), if the President wishes to
    reverse a Board determination to disclose or postpone a record, he must
    not only apply “the standards set forth in section 6,” but must also issue
    “an unclassified written certification . . . stating the justification for the
    President’s decision, including the applicable grounds for postponement
    under section 6.”
    Under section 5(g)(2)(D), by contrast, the President need only certify
    that “continued postponement is made necessary by an identifiable harm
    to the military defense, intelligence operations, law enforcement, or
    conduct of foreign relations,” and that “the identifiable harm is of such
    gravity that it outweighs the public interest in disclosure.” Section
    5(g)(2)(D) contains no additional specifications of the types of harms that
    would warrant postponing disclosure. Nor does it compel the President to
    describe which specific grounds necessitate postponement. Those differ-
    ences from the earlier process are strong evidence that Congress intended
    section 5(g)(2)(D) to be a less exacting standard that would not require
    the President to pinpoint specific instances of harm that could arise from
    disclosure. For the reasons noted above, there are also convincing policy
    reasons why Congress would have chosen to make section 5(g)(2)(D) less
    stringent than sections 6 and 9 in these regards.
    Nor, in our view, does section 5(g)(2)(D) require evidentiary proof sub-
    stantiating the likelihood that disclosing a record would cause “identifia-
    ble harm.” Section 5(g)(2)(D) merely provides that the President must
    certify that it is “necessary” to postpone disclosure in light of an “identifi-
    able harm,” not that the President must establish that such harm would
    occur. By contrast, section 6 requires evidence that disclosing an intelli-
    gence source or method “would interfere with the conduct of intelligence
    activities,” id. § 6(1)(B), or that disclosing other sensitive information
    “would demonstrably impair the national security of the United States,”
    id. § 6(1)(C). Those showings, like others under section 6, must be sup-
    ported by “clear and convincing evidence.” Id. § 6. In other statutes, too,
    Congress has specified the necessary level of certainty that harm to na-
    11
    Opinions of the Office of Legal Counsel in Volume 41
    tional security will occur. See, e.g., 50 U.S.C. § 1885a(c) (requiring the
    Attorney General to certify that disclosure of certain materials in litigation
    “would harm the national security of the United States”); id. § 1845
    (requiring the Attorney General to certify that disclosure of evidence
    derived from the use of a pen register or trap-and-trace device “would
    harm the national security of the United States”); id. § 2656 (requiring the
    Secretary of Energy to notify Congress of intelligence losses deemed
    “likely to cause significant harm or damage to the national security inter-
    ests of the United States”). The fact that Congress did not specify in
    section 5(g)(2)(D) the degree of likelihood that disclosure would harm
    national security, law enforcement, or foreign affairs suggests that Con-
    gress authorized the President to determine what level of risk necessitates
    postponing disclosure. 5
    Thus, for purposes of the first half of section 5(g)(2)(D)’s balancing
    test, the President may reasonably conclude that the premature disclosure
    of the records at issue would present “an identifiable harm to the military
    defense, intelligence operations, law enforcement, or conduct of foreign
    relations.” JFK Act § 5(g)(2)(D)(i). Courts have long recognized that
    forcing the Executive Branch to disclose sensitive information can harm
    national security, law enforcement, or foreign affairs. 6
    5 We recognize that section 5(g)(2)(D) refers to an “identifiable harm to the military
    defense, intelligence operations, law enforcement, or conduct of foreign relations,”
    whereas section 6(1) instead refers to a “threat to the military defense, intelligence
    operations, or conduct of foreign relations” (emphases added). While a “harm” is an
    “injury” and a “threat” generally refers to the prospect of an impending injury, “harm” in
    the present context is necessarily a prediction of what injury may occur after disclosure.
    We do not believe that Congress’s use of the term “harm” in section 5(g)(2)(D) implies
    that this predicted injury must be more certain to occur than the “threats” described in
    section 6. Rather, as noted above, Congress in section 6 and other statutes appears to have
    deliberately required the Executive Branch to specify a particular degree of likelihood or
    certainty about a future harm, yet declined to add any such language to section 5(g)(2)(D).
    6 See CIA v. Sims, 
    471 U.S. 159
    , 175–77 (1985) (“[F]orced disclosure of the identities
    of [the CIA’s] intelligence sources could well have a devastating impact on the Agency’s
    ability to carry out its mission” and “[d]isclosure of the subject matter of the Agency’s
    research efforts and inquiries may compromise the Agency’s ability to gather intelligence
    as much as disclosure of the identities of intelligence sources.”); Snepp v. United States,
    
    444 U.S. 507
    , 511–12 (1980) (per curiam) (disclosure of even unclassified information
    “can be detrimental to vital national interests” by “reveal[ing] information that the CIA—
    with its broader understanding of what may expose classified information and confidential
    sources—could have identified as harmful”); Haig v. Agee, 
    453 U.S. 280
    , 307–08 (1981)
    (“foreign policy and national security considerations cannot neatly be compartmental-
    12
    Temporary Certification Under the JFK Assassination Records Collection Act
    Moreover, the risk that the yet-to-be-released assassination records in-
    clude sensitive information is not speculative. These records have previ-
    ously and reliably been found to contain sensitive information about
    national security, law enforcement, or foreign affairs, making it highly
    likely that their release would present the harm identified in section
    5(g)(2)(D)(i). Disclosure of each of these records has already been post-
    poned on the ground that the withheld information satisfied one of section
    6’s standards, which overlap considerably with the interests protected by
    section 5(g)(2)(D)(i). For example, for a record to have been protected
    from disclosure until 2017 under section 6(2), there had to be “clear and
    convincing evidence” that disclosure would risk substantial harm to a
    living confidential informant by revealing his or her identity and that this
    harm outweighed the public interest in disclosure. If that informant is
    alive today, disclosure would still likely pose “an identifiable harm to . . .
    law enforcement.” JFK Act § 5(g)(2)(D)(i). 7 The examples of records that
    ized,” and “[s]ecrecy in respect of information gathered by [diplomatic officials] may be
    highly necessary, and the premature disclosure of it productive of harmful results”)
    (internal quotation marks omitted); Halkin v. Helms, 
    690 F.2d 977
    , 993 (D.C. Cir. 1982)
    (“[I]t is obvious that the exposure of one who acted—and indeed may still be acting—as a
    CIA operative here and abroad would pose a threat to our diplomatic and military inter-
    ests.”); Roviaro v. United States, 
    353 U.S. 53
    , 59 (1957) (recognizing “the Government’s
    privilege to withhold from disclosure the identity of persons who furnish information of
    violations of law to officers charged with enforcement of that law” and noting that the
    “purpose of the privilege is the furtherance and protection of the public interest in effec-
    tive law enforcement”); United States v. Ortega, 
    854 F.3d 818
    , 824 (5th Cir. 2017) (citing
    Roviaro); Smith v. Lanier, 
    726 F.3d 166
    , 167 (D.C. Cir. 2013) (same).
    7 To be sure, the section 6 categories are not wholly subsumed within the section
    5(g)(2)(D) standard. Section 6(3)—covering records whose disclosure “could reasonably
    be expected to constitute an unwarranted invasion of personal privacy”—does not have an
    obvious analogue in section 5(g)(2)(D). But that is a relatively minor concern, as very few
    of the remaining postponements were made under section 6(3). See ARRB Report at 63
    (noting that the Board “almost never agreed to sustain [an] agency’s requests for post-
    ponements on personal privacy grounds”); id. at 64 (noting that certain prisoner-of-war
    information was postponed under section 6(3), but only until 2008). Of the privacy
    postponements that remain in effect, some may still fall within one of the categories
    identified in section 5(g)(2)(D)(i). For example, the Board “agreed to sustain the post-
    ponement of the identity of a 13-year-old girl who was a rape victim . . . in the file of an
    organized crime figure.” Id. at 63. The President could still find that the continued
    postponement of this sort of information is necessary to prevent identifiable harm to law
    enforcement sufficient to meet section 5(g)(2)(D)(i). Such a finding would be consistent
    with part of the “oft-cited Frankenhauser test” for the law enforcement component of
    executive privilege, which asks courts to consider, among other factors, “the extent to
    13
    Opinions of the Office of Legal Counsel in Volume 41
    the Board deemed eligible for postponement under section 6 underscore
    this point. For instance, the Board authorized postponing disclosure of
    records containing “CIA surveillance methods where CIA provided con-
    vincing evidence that the method still merited protection.” ARRB Report
    at 53. It is reasonable to conclude that disclosing such a method now
    could still present “an identifiable harm to . . . intelligence operations.”
    JFK Act § 5(g)(2)(D)(i). More generally, NARA’s independent review of
    a sampling of the records at issue concluded that many still contain highly
    sensitive information. See Archivist Memorandum at 1 (“We are familiar
    with the information at issue and the related sensitivities and agree that
    they could warrant continued postponement in certain, specific instanc-
    es.”). And in the absence of further interagency coordination and review,
    it is not yet possible to determine which specific records would warrant
    continued postponement of disclosure.
    2.
    We also believe that it would be reasonable for the President to con-
    clude that the identifiable harm from premature disclosure of such records
    would, as section 5(g)(2)(D)(ii) requires, be “of such gravity that it out-
    weighs the public interest in disclosure.”
    Importantly, the proposed postponement would last only a few more
    months. As a result, the relevant public interest consists only in the differ-
    ence between having disclosures occur now and having disclosures occur
    within the next six months. That interest weighs comparatively little in the
    statutory balance, especially in the wake of fully authorized postpone-
    ments of decades. 8 The public interest in full access to assassination
    records is significant. But a temporary delay in disclosure would still
    allow that interest to be vindicated fairly soon; in contrast, disclosure of
    which disclosure will thwart governmental processes by discouraging citizens from giving
    the government information.” In re U.S. Dep’t of Homeland Sec., 
    459 F.3d 565
    , 570 (5th
    Cir. 2006) (quoting Frankenhauser v. Rizzo, 
    59 F.R.D. 339
    , 344 (E.D. Pa. Mar. 13, 1973)
    (unpublished)); see also, e.g., Manna v. U.S. Dep’t of Justice, 
    51 F.3d 1158
    , 1166 (3d Cir.
    1995) (protecting the withholding of names of “law enforcement officers, interviewees,
    and witnesses” because of the possibility of “harassment and retaliation”).
    8 Accounting for the length of the proposed postponement is consistent with the
    Board’s analysis under section 6 of whether particular types of risks from disclosure
    outweighed the public interest. See, e.g., ARRB Report at 64 (postponing until 2008 the
    release of private details from prisoner-of-war records from the Korean conflict, based on
    the expected lifespan of affected individuals).
    14
    Temporary Certification Under the JFK Assassination Records Collection Act
    sensitive information would compromise other important interests irrevo-
    cably. In our view, the concrete risk of harm that premature disclosure of
    sensitive records would pose to national security, law enforcement, and
    foreign affairs clearly outweighs the public interest in accessing these
    records up to six months earlier.
    It could of course be said that the government has already had 25 years
    to review the records at issue, and that the public interest in disclosure
    after the Act’s statutory deadline should outweigh the Executive’s need
    for still more time to assess these records. But that argument misappre-
    hends the review process, as well as the Act’s different standards for
    delaying the disclosure of records before and after October 26, 2017. As
    noted, the records at issue have already been repeatedly reviewed. Thus
    far, the Act has required the government to satisfy section 6’s criteria for
    delaying disclosure of each record. As part of that process, the Board
    confirmed that records could remain exempt from disclosure until October
    26, 2017. After that date, however, the government must instead rely on
    a certification under section 5(g)(2)(D) that continued postponement is
    necessary. But during the certification review process, NARA’s questions
    about other agencies’ applications of section 5(g)(2)(D) have prevented
    the Executive Branch from definitively resolving which remaining records
    can continue to be withheld. Nor would it have been feasible to begin
    reviewing records under the section 5(g)(2)(D) standard much earlier. The
    further in advance of 2017 that agencies tried to apply section 5(g)(2)(D),
    the greater the risk of inaccurately assessing whether disclosure in 2017
    would risk an identifiable harm to national security, law enforcement, or
    foreign affairs.
    B.
    Principles of constitutional avoidance strongly support our conclusion
    that section 5(g)(2)(D) authorizes the President to postpone temporarily
    the full disclosure of the records at issue. See, e.g., Edward J. DeBartolo
    Corp. v. Fla. Gulf Coast Bldg. & Constr. Trades Council, 
    485 U.S. 568
    ,
    575 (1988) (“[W]here an otherwise acceptable construction of a statute
    would raise serious constitutional problems, the Court will construe the
    statute to avoid such problems unless such construction is plainly contrary
    to the intent of Congress.”). Serious constitutional concerns would arise
    if the Act were construed to require the President to make premature
    disclosures of records while they are likely to contain still-sensitive
    information.
    15
    Opinions of the Office of Legal Counsel in Volume 41
    The President’s position as “head of the Executive Branch and as
    Commander in Chief ” confers upon him the “authority to classify and
    control access to information bearing on national security”—an authority
    that “exists quite apart from any explicit congressional grant.” Dep’t of
    the Navy v. Egan, 
    484 U.S. 518
    , 527 (1988). Courts accordingly “show[]
    deference to what the Executive Branch has determined . . . is essential to
    national security.” Ziglar v. Abbasi, 
    137 S. Ct. 1843
    , 1861 (2017) (inter-
    nal quotation marks omitted); see also Egan, 
    484 U.S. at 529
     (finding that
    “the protection of classified information must be committed to the broad
    discretion of the agency responsible,” and declining to “determine what
    constitutes an acceptable margin of error in assessing the potential risk”
    of improper access or disclosure). The Supreme Court has similarly em-
    phasized “the generally accepted view that foreign policy [is] the province
    and responsibility of the Executive,” and that “courts have traditionally
    shown the utmost deference to Presidential responsibilities” in that area.
    
    Id. at 530
     (internal quotation marks and citations omitted).
    Opinions by Attorneys General and this Office have repeatedly recog-
    nized the President’s authority and responsibility to protect against the
    release of information affecting the Executive Branch’s intelligence
    activities, military operations, conduct of foreign affairs, or law enforce-
    ment proceedings, even in the face of statutory disclosure requirements.
    See, e.g., Whistleblower Protections for Classified Disclosures, 
    22 Op. O.L.C. 92
    , 95 (1998) (discussing “the right of the President to decide to
    withhold national security information from Congress under extraordinary
    circumstances”); Presidential Certification Regarding the Provision of
    Documents to the House of Representatives Under the Mexican Debt
    Disclosure Act of 1995, 
    20 Op. O.L.C. 253
    , 265–76 (1996) (discussing the
    “President’s constitutional authority to control the disclosure of docu-
    ments and information relating to diplomatic communications”); Assertion
    of Executive Privilege in Response to Congressional Demands for Law
    Enforcement Files, 
    6 Op. O.L.C. 31
    , 35 (1982) (opinion of Attorney
    General William French Smith) (“[I]f the President believes that certain
    types of information in law enforcement files are sufficiently sensitive
    that they should be kept confidential, it is the President’s constitutionally
    required obligation to make that determination.”); see also Prosecution
    for Contempt of Congress of an Executive Branch Official Who Has
    Asserted a Claim of Executive Privilege, 
    8 Op. O.L.C. 101
    , 140 (1984)
    (“Nearly every President since George Washington has found that in order
    to perform his constitutional duties it is necessary to protect the confiden-
    tiality of certain materials, including . . . national security information[]
    16
    Temporary Certification Under the JFK Assassination Records Collection Act
    and sensitive law enforcement proceedings, from disclosure to Con-
    gress.”). Those opinions are consistent with President Bush’s determina-
    tion that the Act’s disclosure requirement could not be allowed to inter-
    fere with the President’s constitutional authority to “protect confidential
    executive branch materials and to supervise and guide executive branch
    officials.” 1992 Signing Statement at 2005.
    One necessary incident of the President’s authority to control sensitive
    executive branch information is the ability to determine in the first in-
    stance which records contain such information. Thus, construing section
    5(g)(2)(D) to deprive the President of the ability to withhold records in
    order to give the Executive Branch adequate time to determine which
    records contain still-sensitive information about national security, law
    enforcement, or foreign affairs would impermissibly encroach upon a core
    presidential prerogative. In an analogous circumstance, when it had not
    been possible to review a large set of documents in the time allowed by a
    congressional subpoena, Attorney General Janet Reno concluded that a
    protective assertion of executive privilege was appropriate, pending final
    decisions about “which specific documents are deserving of a conclusive
    claim of executive privilege.” Protective Assertion of Executive Privilege
    Regarding White House Counsel’s Office Documents, 
    20 Op. O.L.C. 1
    , 1
    (1996). There, the protective assertion was necessary because the volume
    of documents could not be “specifically and individually reviewed” with-
    in the time available. 
    Id.
     Here, too, the Archivist has concluded that it
    is not possible within the time available to resolve remaining questions
    regarding whether individual records still contain sensitive information.
    As we have explained, “[w]here the President’s authority concerning
    national security or foreign relations is in tension with a statutory rather
    than a constitutional rule, the statute cannot displace the President’s
    constitutional authority and should be read to be ‘subject to an implied
    exception in deference to such presidential powers.’” Title III Electronic
    Surveillance Material and the Intelligence Community, 
    24 Op. O.L.C. 261
    , 274 (2000) (quoting Rainbow Navigation, Inc. v. Dep’t of the Navy,
    
    783 F.2d 1072
    , 1078 (D.C. Cir. 1986) (Scalia, J.)); see also, e.g., Presi-
    dential Certification Under the Mexican Debt Disclosure Act, 20 Op.
    O.L.C. at 264 (finding that constitutional avoidance required a particular
    construction of a statute “because any other reading would fail to preserve
    the President’s constitutional authority and responsibility to preserve the
    absolute confidentiality of documents the disclosure of which would be
    contrary to the public interest”); Prosecution for Contempt of Congress,
    17
    Opinions of the Office of Legal Counsel in Volume 41
    8 Op. O.L.C. at 139–41 (concluding, in light of the Executive’s sole
    authority over law enforcement, that “the constitutionally mandated
    separation of powers requires the [criminal-contempt-of-Congress] statute
    to be interpreted so as not to apply to Presidential assertions of executive
    privilege”). Accordingly, principles of constitutional avoidance require
    interpreting the Act to authorize the President to postpone the disclosure
    of the records at issue on a temporary basis.
    III.
    For the reasons set forth above, we conclude that section 5(g)(2)(D)
    of the Act authorizes the President to issue a temporary certification
    postponing the full disclosure of certain undisclosed records in the JFK
    Collection to allow for further review before they are fully released to the
    public.
    CURTIS E. GANNON
    Acting Assistant Attorney General
    Office of Legal Counsel
    18