T.S. ELLIS, III, District Judge.
This is the latest in the recent series of constitutional challenges to the National Security Agency's ("NSA") data gathering efforts.
The nine plaintiff organizations are as follows:
The six defendants are the following government agencies and officers:
Before setting forth the facts alleged in the amended complaint ("AC"), it is useful to describe briefly the statutory context pertinent to the NSA's data gathering efforts. In 1978, in response to revelations of unlawful government surveillance directed at specific United States citizens and political organizations, Congress enacted FISA to regulate government electronic surveillance within the United States for foreign intelligence purposes. FISA provides a check against abuses by placing certain types of foreign-intelligence surveillance under the supervision of the Foreign Intelligence Surveillance Court ("FISC"), which reviews government applications for surveillance in certain foreign intelligence investigations. See 50 U.S.C. § 1803(a). As originally enacted, FISA required the government to obtain an individualized order from the FISC before conducting electronic surveillance in the United States. See id. § 1804(a). In this respect, the FISC could issue an order authorizing surveillance only if it found that there was "probable cause to believe that the target of the electronic surveillance [was] a foreign power or an agent of a foreign power" and that "each of the facilities or places at which the electronic surveillance [was] directed [was] being
In 2008, thirty years after FISA's enactment, Congress passed the FISA Amendments Act, which established procedures and requirements for the authorization of surveillance targeting persons located outside the United States. See 50 U.S.C. §§ 1881a-1881g. Specifically, FISA Section 702, 50 U.S.C. § 1881a, "supplements pre-existing FISA authority by creating a new framework under which the [g]overnment may seek the FISC's authorization of certain foreign intelligence surveillance targeting ... non-U.S. persons located abroad," Clapper v. Amnesty Int'l USA, ___ U.S. ___, 133 S.Ct. 1138, 1144, 185 L.Ed.2d 264 (2013). Section 702 provides that the Attorney General and the Director of National Intelligence may jointly authorize, for up to one year, the "targeting of [non-U.S.] persons reasonably believed to be located outside the United States to acquire foreign intelligence information"
In effect, an approval of government surveillance by the FISC means that the surveillance comports with the statutory requirements and the Constitution.
Additional details regarding the collection of communications under Section 702 have recently been disclosed in a number of public government reports and declassified FISC opinions. The government has disclosed, for example, that in 2011, Section 702 surveillance resulted in the retention of more than 250 million communications and that in 2014, the government targeted the communications of 92,707 individuals, groups, and organizations under a single FISC Order.
Plaintiffs challenge the NSA's use of Upstream surveillance, alleging that this mode of surveillance enables the government to collect communications as they transit the Internet "backbone," the network of high-capacity cables, switches, and routers that facilitates domestic and international Internet communication. With the assistance of telecommunications providers, Upstream surveillance enables the NSA to copy and review "text-based" communications — i.e., those whose content includes searchable text, such as emails, search-engine queries, and webpages — for search terms called "selectors." Importantly, selectors cannot be key words or names of targeted individuals, but must instead be specific communications identifiers, such as email addresses, phone numbers, and IP addresses.
Plaintiffs allege that Upstream surveillance encompasses the following four processes, one or more of which is implemented by telecommunications providers at the NSA's direction:
See AC ¶¶ 40, 47-49.
Plaintiffs emphasize two aspects of Upstream surveillance. First, surveillance under that program is not limited to communications sent or received by the NSA's targets, as the government has acknowledged that, as part of Upstream surveillance, the NSA also engages in what is called "about surveillance" — the searching of Internet communications that are about its targets. AC ¶ 50. In other words, plaintiffs allege that the NSA intercepts substantial quantities of Internet traffic and examines those communications to determine whether they include references to the NSA's search terms. Second, Upstream surveillance implicates domestic communications because (i) the NSA's filters are imperfect, (ii) the NSA sometimes mistakes a domestic communication for an international one, and (iii) the NSA retains communications that happen to be bundled, while in transit, with communications that contain selectors.
Plaintiffs claim that the alleged injuries result from the NSA's use of Upstream surveillance that violates the First and Fourth Amendments of the Constitution and exceeds the government's authority under Section 702.
Defendants have moved to dismiss plaintiffs' AC pursuant to Rule 12(b)(1), Fed. R.Civ.P., on the ground that plaintiffs lack Article III standing to contest the legality of the NSA's Upstream surveillance because plaintiffs have not alleged facts that plausibly establish an actual injury attributable to the NSA's Upstream surveillance.
Article III limits the jurisdiction of federal courts to certain "Cases" and "Controversies." U.S. Const. art. III, § 2, cl. 2. As the Supreme Court has made clear, one "essential and unchanging part of the case-or-controversy requirement" is that a plaintiff must establish Article III standing to sue. Lujan v. Defenders of Wildlife, 504 U.S. 555, 560, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992). A plaintiff establishes Article III standing by showing that he seeks relief from an injury that is
Because standing is a threshold jurisdictional requirement, it may be attacked at any time, including at the outset of a case pursuant to Rule 12(b)(1), Fed.R.Civ.P. As the Fourth Circuit has made clear, where, as here, "standing is challenged on the pleadings, [a court must] accept as true all material allegations of the complaint and construe the complaint in favor of the complaining party." David v. Alphin, 704 F.3d 327, 333 (4th Cir.2013) (citing Pennell v. City of San Jose, 485 U.S. 1, 7, 108 S.Ct. 849, 99 L.Ed.2d 1 (1988)). But a court should not "take account of allegations in the complaint labeled as fact but that constitute nothing more than `legal conclusions' or `naked assertions.'" Id. (quoting Ashcroft v. Iqbal, 556 U.S. 662, 678, 129 S.Ct. 1937, 173 L.Ed.2d 868 (2009)). A complaint must contain "sufficient factual matter, accepted as true, to `state a claim that is plausible on its face.'" Ashcroft, 556 U.S. at 678, 129 S.Ct. 1937 (2009) (quoting Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 570, 127 S.Ct. 1955, 167 L.Ed.2d 929 (2007)). Standing is adequately alleged only if the "well-pleaded allegations" allow for a "reasonable inference," rather than a "sheer possibility," that the plaintiff has standing, Iqbal, 556 U.S. at 678-79, 129 S.Ct. 1937; David, 704 F.3d at 333.
Clapper v. Amnesty International is the Supreme Court's most recent pronouncement on standing with respect to litigants challenging the NSA's data gathering efforts, and therefore is the leading case in this series. In Clapper, the plaintiffs argued that they had standing to bring a facial challenge to Section 702 because
In the course of oral argument, plaintiffs' counsel was asked to identify the facts and arguments in this case that are different from those asserted in Clapper.
Clearly there are differences between the facts and arguments raised in this case and those raised in Clapper, but the question is not simply whether there are differences, but whether those differences compel the same or a different result from the result reached in Clapper.
Before addressing plaintiffs' arguments, it is important to describe Clapper in more detail. Plaintiffs in Clapper brought a facial challenge to Section 702, seeking a declaration that Section 702 was unconstitutional and an injunction against the surveillance authorized by that provision. 133 S.Ct. at 1142-46. The Supreme Court's opinion began its consideration of the standing issue by reviewing what was known and alleged concerning the NSA's surveillance practices under Section 702. Specifically, the Supreme Court explained that Section 702 surveillance "[was] subject to statutory conditions, judicial authorization, congressional supervision, and compliance with the Fourth Amendment," emphasizing that the government must obtain the FISC's "approval of `targeting' procedures, `minimization' procedures, and a governmental certification regarding proposed surveillance." Id. at 1144, 1145 (quoting 50 U.S.C. § 1881a(a), (c)(1), (i)(2), (i)(3)). As the Supreme Court's opinion noted, "the [FISC's] role includes determining whether the [g]overnment's certification contains the required elements"
The Supreme Court explained that in attempting to establish standing, the Clapper plaintiffs did not provide "any evidence that their communications ha[d] been monitored under" any program authorized by Section 702. Id. at 1148. Instead, plaintiffs argued that they had standing because there was an "objectively reasonable likelihood" that plaintiffs' communications "[would] be intercepted" in the future. Id. at 1147. The Supreme Court's opinion characterized plaintiffs' argument as a "speculative chain of possibilities," id. at 1150.
In holding that plaintiffs' alleged injury was speculative, the Clapper majority rejected the approach advocated by the dissenting Justices. The dissent relied on "commonsense inferences" to find a "very high likelihood" that the government would "intercept at least some of plaintiffs' communications. Id. at 1157 (Breyer, J., dissenting). Specifically, the dissent concluded that (i) the plaintiffs regularly engaged in the type of electronic communications that the government had "the capacity" to collect, (ii) the government was "strong[ly] motiv[ated]" to intercept for counter-terrorism purposes the type of communications in which plaintiffs engaged, and (iii) the government had in fact intercepted the same type of communications on thousands of occasions in the past.
In essence, the Supreme Court held that the Clapper plaintiffs' chain of probabilities and inferences — based on the government's capacity and motivation to intercept communications similar to the Clapper plaintiffs' communications — was speculative, and therefore did not establish standing. The dissent, on the other hand, was convinced that such inferences and probabilities were sufficient to establish standing. At issue here is whether the four differences plaintiffs have identified compel the same or a different result from the result reached in Clapper. Each of plaintiffs' arguments with respect to those differences is separately addressed.
Plaintiffs first argue that Clapper does not control here on the ground that the legal standard in this case is different from the legal standard applicable in Clapper because the standing challenge in the present case arises on a motion to dismiss rather than, as in Clapper, on a motion for summary judgment. To the extent this argument refers to the difference between reliance on factual allegations and reliance on a factual record, plaintiffs are undoubtedly correct. The Supreme Court has made clear that, because the elements of standing are "an indispensable part of the plaintiff's case, each element must be supported in the same way as any other matter on which the plaintiff bears the burden of proof, i.e., with the manner and degree of evidence required at the successive stages in litigation." Lujan, 504 U.S. at 561, 112 S.Ct. 2130. At the summary judgment stage, a plaintiff cannot rest simply on allegations, but must "`set forth' by affidavit or other evidence `specific facts;'" at the motion to dismiss stage, however, "allegations of injury resulting from defendant's conduct may suffice." Id. at 561, 112 S.Ct. 2130 (quoting Rule 56(2), Fed. R.Civ.P.).
But to say the evidentiary basis is different is not to say that the standing requirements change at each successive stage. They do not. The means by which a plaintiff establishes standing — by allegation or by record evidence — changes, but the three elements of standing — actual injury, causation, and redressability — remain constant and applicable at all stages of the case. This is so because standing is a jurisdictional requirement that "is an essential and unchanging part of the case-or-controversy requirement of Article III." Id. at 560, 112 S.Ct. 2130. Indeed, the three elements of standing are the "irreducible constitutional minimum" that "set[] apart the `Cases' and `Controversies' that are of the sort referred to in Article III — "serv[ing] to identify those disputes which are appropriately resolved through the judicial process." Id. (quoting U.S. Const. art. III, § 2, cl. 2; Whitmore, 495 U.S. at 155, 110 S.Ct. 1717).
In sum, the standing requirement — the "irreducible constitutional minimum" — applies here just the same as it applied in Clapper. Lujan, 504 U.S. at 560, 112 S.Ct. 2130. Moreover, the result in Clapper — that standing cannot be established on the basis of a "speculative chain of possibilities" — also applies here. 133 S.Ct. at 1150. Whether speculation is based on allegations in a complaint or facts in a record has no bearing on the outcome, as in neither context may standing be established on a "speculative chain of possibilities." Id.
Plaintiffs next argue that Clapper does not control this case because more is now known about Section 702 surveillance, including Upstream surveillance, than was known at the time of Clapper. Plaintiffs cite in their AC several publicly disclosed documents in support of the allegation that the NS A uses Upstream surveillance to intercept substantially all international text-based Internet communications, including plaintiffs' communications.
Plaintiffs' series of allegations does not establish Article III standing because those allegations depend on suppositions and speculation, with no basis in fact, about how the NSA implements Upstream surveillance. Specifically, plaintiffs assume that the fact that Upstream surveillance equipment has been installed at some of the Internet backbone chokepoints implies that the NSA is intercepting all communications passing through those chokepoints. That may or may not be so; plaintiffs merely speculate that it is so. Even if the NSA's surveillance equipment is capable of "examin[ing] the contents of all transmissions passing through collection devices," as plaintiffs allege, id. ¶ 62, it does not follow that the NSA is, in fact, using the surveillance equipment to its full potential. As with any piece of technology, technical capability is not tantamount to usage levels. For example, a car capable of speeds exceeding 200 mph is not necessarily driven at such speeds; more information is needed to conclude that the top speed is reached. And there may indeed be circumstances that suggest a limited level of use — e.g., a speed limit of 70 mph. The same is true here. Plaintiffs provide no factual basis to support the allegation that the NS A is using its surveillance equipment at full throttle,
Plaintiffs cannot provide a sufficient factual basis for their allegations because the scope and scale of Upstream surveillance remain classified, leaving plaintiffs to prop their allegation of actual injury on suppositions and speculation about how Upstream surveillance must operate in order to achieve the government's "stated goals." AC ¶ 64. Indeed, plaintiffs cite the government's so-called "stated goals" in nearly every facet of their argument, specifically in support of their allegations regarding: (i) the volume of communications collected by Upstream surveillance, Pls. Opp. at 22, 28; (ii) the geographic distribution of the sites at which Upstream collection occurs, id. at 25; and (iii) the scope of Upstream surveillance at any site where it occurs, id. at 23, 30. It is, of course, a "possibility"
In sum, plaintiffs are correct that more is known about the nature and capabilities of NSA surveillance than was known at the time of Clapper, but no more is known about whether Upstream surveillance actually intercepts all or substantially all international text-based Internet communications, including plaintiffs' communications. Thus, although plaintiffs' speculative chain is shorter than was the speculative chain in Clapper, it is a chain of speculation nonetheless. And Clapper makes clear that it is not the length of the chain but the fact of speculation that is fatal. Indeed, plaintiffs' reliance on the government's capacity and motivation to collect substantially all international text-based Internet communications is precisely the sort of speculative reasoning foreclosed by Clapper.
Plaintiffs further allege that Clapper does not control here because newly disclosed information reveals that Upstream surveillance is fundamentally different from the surveillance at issue in Clapper. Specifically, Upstream surveillance involves the use of "about surveillance," which the NSA allegedly uses to review every portion of everyone's communications — a broader mode of surveillance than the targeted surveillance of particular individuals' communications that was at issue in Clapper. Plaintiffs contend that "about surveillance" is the "digital analogue of having a government agent open every piece of mail that comes through the post to determine whether it mentions a particular word or phrase." Pls. Br. at 10. This analogy is inapt; contrary to plaintiffs' contention, the publicly disclosed documents on which plaintiffs rely do not state facts that plausibly support the proposition that "about surveillance" involves examining every portion of every copied communication. According to the PCLOB Report cited by plaintiffs,
PCLOB Report, at 111 n.476. Indeed, "[o]nly those communications ... that contain
Even if plaintiffs' description of "about surveillance" were correct, it would not change the result reached here. Plaintiffs' claim of actual injury resulting from "about surveillance" rests on plaintiffs' allegation that the NSA uses Upstream surveillance to intercept substantially all international text-based Internet communications. And as already discussed, that allegation is a "bare assertion[]" unaccompanied by "factual matter" that raises it "above a speculative level." See Iqbal, 556 U.S. at 681, 129 S.Ct. 1937; see also Clapper, 133 S.Ct. at 1150. Details about the tools of Upstream surveillance reveal how Upstream surveillance functions when the NSA engages in that mode of surveillance, but those details do not cure the speculative foundation on which plaintiffs' claim of actual injury is based — that the NSA is in fact using Upstream surveillance to intercept substantially all text-based international Internet communications, including plaintiffs' communications.
Plaintiffs next argue that Clapper does not control here because plaintiffs are different from the Clapper plaintiffs in important respects concerning their Internet communications. Although six of the nine plaintiffs in this case were plaintiffs in Clapper, plaintiffs identify two differences related to the new parties: (i) two clients of an NACDL attorney have received notice that they are targets of Section 702 surveillance and (ii) Wikimedia engages in over one trillion communications each year that are distributed around the globe.
With respect to the first difference, plaintiffs argue that they adequately allege an actual injury because the government acknowledged that NACDL attorney Joshua Dratel's client, Agron Hasbajrami, was subject to Section 702 surveillance and another Dratel client, Sabirhan Hasanoff, was prosecuted on the basis of officially acknowledged Section 702 surveillance.
Here, however, the facts alleged differ from the Clapper hypothetical in important respects. The Supreme Court in Clapper was describing a situation in which there was some basis for an allegation that the government had "monitor[ed a] target's conversations with his or her attorney" using the type of surveillance at issue in
Plaintiffs next allege that Wikimedia has standing because it is "virtually certain" that Upstream surveillance has intercepted at least some of Wikimedia's communications given the volume and geographic distribution of those communications. Specifically, Wikimedia allegedly engages in more than one trillion international text-based Internet communications each year and exchanges information with individuals in nearly every country on earth.
At the outset, an important implication of plaintiffs' allegation regarding Wikimedia's Internet communications must be noted. Plaintiffs have not alleged that any of the other eight plaintiffs (besides Wikimedia) engage in a substantial number of text-based international Internet communications. Indeed, plaintiffs simultaneously allege that (i) all nine plaintiffs "collectively engage in more than a trillion sensitive international [I]nternet communications each year," AC 58; and (ii) "Wikimedia engages in more than one trillion international communications each year," id. at ¶ 88. The AC does not quantify the other eight plaintiffs' communications. Thus, insofar as plaintiffs seek to establish standing on the basis of probabilities grounded in the volume of communications, plaintiffs' effort is limited to Wikimedia, as the AC says nothing about the volume of the other plaintiffs' communications.
With respect to Wikimedia, plaintiffs contend that Wikimedia's communications traverse all of the chokepoints at which the NSA conducts Upstream surveillance, however many that may be.
Plaintiffs' argument is unpersuasive, as the statistical analysis on which the argument rests is incomplete and riddled with assumptions. For one thing, plaintiffs insist that Wikimedia's over one trillion annual Internet communications is significant in volume.
Moreover, plaintiffs conclude that there is a greater than 99.9999999999% chance that the NSA has intercepted at least one of their over one trillion communications on the basis of an arbitrary assumption, namely that there is a 0.00000001% chance that the NS A will intercept any particular Internet communication. AC ¶ 58. Plaintiffs provide no basis for the 0.00000001% figure, nor do they explain why the figure is presented as a conservative assumption.
In the end, plaintiffs' standing argument boils down to suppositions about how Upstream surveillance must operate in order to achieve the government's stated goals. Of course, in a case like this, plaintiffs necessarily rely on probabilities and speculation because most facts about Upstream surveillance remain classified, and hence plaintiffs see through a glass darkly. Nevertheless, the speculative reasoning plaintiffs advance is not a basis for standing under Clapper. See id. at 1147-50. To see why this must be so, consider the risks of error at play on a threshold standing question. On the one hand, a court that does not find standing on the basis of probabilities and suppositions runs the risk of a false negative — closing the courthouse doors to a plaintiff who suffers an actual injury fairly traceable to the defendant. On the other hand, a court that bases standing on such speculation runs the risk of a false positive — proceeding in a litigation that is not a "Case[]" or "Controvers[y]" under Article III. U.S. Const. art. III, § 2, cl. 2. Obviously, both risks of error should be avoided where possible, but where, as here, a court is confronted with substantial uncertainty, the risk of a false positive is of greater concern because it implicates an existential question about
Plaintiffs further allege actual injury on the ground that Upstream surveillance undermines plaintiffs' ability to carry out activities crucial to their missions (i) by forcing them to take burdensome measures to minimize the chance that the confidentiality of their sensitive information will be compromised and (ii) by reducing the likelihood that individuals will share sensitive information with them. Attorney Dratel, for example, allegedly employed burdensome electronic security measures to protect his communications with his clients and, in some instances, travelled abroad to gather information in person.
The Clapper plaintiffs advanced indistinguishable arguments, and the Supreme Court flatly rejected them, explaining that the alleged injuries were not "fairly traceable to [Section 25 26 702]" because (i) plaintiffs "cannot manufacture standing merely by inflicting harm on themselves based on their fears of hypothetical future harm that is not certainly impending" and (ii) plaintiffs cannot establish injury "based on third parties' subjective fear of surveillance." 133 S.Ct. at 1151, 1152 n.7.
A final point, raised in Clapper, merits mention here: whether the standing requirement as applied in Clapper bids fair to immunize Section 702 and Upstream surveillance from judicial scrutiny. This concern is misplaced. To be sure, no government surveillance program should be immunized from judicial scrutiny, and indeed Section 702 and Upstream surveillance have no such immunity. As the Clapper majority noted, Section 702 surveillance is reviewed when: (i) the FISC reviews targeting and minimization procedures of general surveillance practices to ensure, inter alia, "the targeting and minimization procedures comport with the Fourth Amendment," (ii) criminal defendants prosecuted on the basis of Section 702 surveillance challenge the validity of that surveillance, and (iii) electronic communications service providers who are directed to assist the government in surveillance challenge the directives before the FISC. Clapper, 133 S.Ct. at 1154. Moreover, the recently enacted USA FREEDOM Act provides that amicus curiae may be appointed to represent the public in certain FISC proceedings involving NSA surveillance pursuant to Section 702. Pub.L. No. 114-23, 129 Stat. 268, 279.
For the reasons stated here, defendants' motion to dismiss is granted.
An appropriate Order will issue.